Re: [arch-general] Updating the archlinux-keyring package

2014-02-14 Thread Plonky Duby
I do agree with that, i switched on a laptop which was off since september
2013 and i had some issue with some key.

I had to update key, before having a sucessfull update.




2014-02-13 20:21 GMT+01:00 Leonid Isaev lis...@umail.iu.edu:

 Hi,

 Recently I had to fix a corrupted pacman db from a 3 month old
 livecd
 and realized that this process is not so innocent. Specifically, there is a
 chance to get a trojaned package on the system simply because the
 archlinux-keyring package on the iso is outdated. Of course, other similar
 scenarios are possible, e.g. a fresh install is made from an old livecd,
 or a
 server is updated after several months of uptime: new packages are pulled
 in
 but signature checks are made using the old keyring currently on the host.
 So, instead of relying on the discrete updates of
 archlinux-keyring,
 wouldn't is make more sense to have a systemd timer/cron job to frequently
 refresh pacman keyring?

 Thanks,
 --
 Leonid Isaev
 GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D



Re: [arch-general] Updating the archlinux-keyring package

2014-02-14 Thread Don deJuan
On 02/14/2014 03:00 AM, Plonky Duby wrote:
 I do agree with that, i switched on a laptop which was off since september
 2013 and i had some issue with some key.

 I had to update key, before having a sucessfull update.




 2014-02-13 20:21 GMT+01:00 Leonid Isaev lis...@umail.iu.edu:

 Hi,

 Recently I had to fix a corrupted pacman db from a 3 month old
 livecd
 and realized that this process is not so innocent. Specifically, there is a
 chance to get a trojaned package on the system simply because the
 archlinux-keyring package on the iso is outdated. Of course, other similar
 scenarios are possible, e.g. a fresh install is made from an old livecd,
 or a
 server is updated after several months of uptime: new packages are pulled
 in
 but signature checks are made using the old keyring currently on the host.
 So, instead of relying on the discrete updates of
 archlinux-keyring,
 wouldn't is make more sense to have a systemd timer/cron job to frequently
 refresh pacman keyring?

 Thanks,
 --
 Leonid Isaev
 GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


pacman-key --refresh-keys ??


Re: [arch-general] Updating the archlinux-keyring package

2014-02-14 Thread simon . brand

Am 2014-02-14 12:00, schrieb Plonky Duby:
I do agree with that, i switched on a laptop which was off since 
september

2013 and i had some issue with some key.

I had to update key, before having a sucessfull update.




A cronjob does not help you, when you're laptop is off.


Re: [arch-general] Updating the archlinux-keyring package

2014-02-14 Thread Thomas Bächler
Am 14.02.2014 12:43, schrieb Don deJuan:
 wouldn't is make more sense to have a systemd timer/cron job to frequently
 refresh pacman keyring?
 
 pacman-key --refresh-keys ??

If you are paranoid enough that a former Arch developer or TU will be
able to inject a broken package into a mirror, then it certainly helps
you to run 'pacman-key --refresh-keys' regularly. You can also do so on
the live CD. This will not automatically add new keys, but certainly
remove trust from revoked keys.




signature.asc
Description: OpenPGP digital signature


Re: [arch-general] Updating the archlinux-keyring package

2014-02-14 Thread Plonky Duby
2014-02-14 12:45 GMT+01:00 simon.br...@postadigitale.de:

 Am 2014-02-14 12:00, schrieb Plonky Duby:

  I do agree with that, i switched on a laptop which was off since september
 2013 and i had some issue with some key.

 I had to update key, before having a sucessfull update.



 A cronjob does not help you, when you're laptop is off.


I understand your point, i just wanted to illustrate with another practical
exemple.


[arch-general] Updating the archlinux-keyring package

2014-02-13 Thread Leonid Isaev
Hi,

Recently I had to fix a corrupted pacman db from a 3 month old livecd
and realized that this process is not so innocent. Specifically, there is a
chance to get a trojaned package on the system simply because the
archlinux-keyring package on the iso is outdated. Of course, other similar
scenarios are possible, e.g. a fresh install is made from an old livecd, or a
server is updated after several months of uptime: new packages are pulled in
but signature checks are made using the old keyring currently on the host.
So, instead of relying on the discrete updates of archlinux-keyring,
wouldn't is make more sense to have a systemd timer/cron job to frequently
refresh pacman keyring?

Thanks,
-- 
Leonid Isaev
GPG key fingerprint: C0DF 20D0 C075 C3F1 E1BE  775A A7AE F6CB 164B 5A6D


signature.asc
Description: PGP signature