Hi!

On Wed, Dec 05, 2007 at 06:46:15PM -0500, STeve Andre' wrote:
>[...]

>You know, you're descending into a recursive loop of "if, if, if..." and
>it never ends.  OF COURSE if someone breaks into the site they could
>do things--once you've lost control of your site all bets are off.  I dare
>say that someone breaking into a site might find all the appropriate
>tools to re-sign things, too, and do the spoof that way.

If I released code with cryptographic signatures, I'd not leave a secret
key file, nor a passphrase on the servers with the master web/ftp
site. I'd sign on a box you can't access from the master site (nor
the mirrors). So, no, the attacker would *not* gain access to signing
tools (ok, yes, the tools, perhaps, like gpg or openssl, but not the
key material).

>--STeve Andre'

Kind regards,

Hannah.

Reply via email to