> An additional thing, once a key is revoked by a distro (for whatever reason), 
> they usually sign new rpms with the new key. However it does not mean that 
> the older rpms signed by the old key are no longer secure to use. Unless 
> of-course the old key has been compromised by the attacker and they sign 
> malicious rpms with that.
> 
I mean the rpms signed before the key was revoked.
> So if revokation makes all the installed rpms, seem to be signed with the 
> wrong key, than that could be a problem.
> 
> Therefore there is some amount of onus on the administrator/user as well.



-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/rpm-software-management/rpm/issues/1598#issuecomment-873505143
_______________________________________________
Rpm-maint mailing list
Rpm-maint@lists.rpm.org
http://lists.rpm.org/mailman/listinfo/rpm-maint

Reply via email to