On Wed, Jan 22, 2014 at 01:46:33PM +0400, Loganaden Velvindron wrote:
> > The signing framework in pkg_add/pkg_create is much older than that, if
> > was written for x509 a few years ago, but signify(1) will probably be more
> > robust and ways simpler.  In particular, there's no "chain-of-trust", so
> > you keep complete control on the sources YOU trust.
> 
> Can you please elborate more on the trusting part ?
> 
> Both DNSSEC and RPKI have a "root anchor" that we're all supposed to trust,
> and your model is different.

There's no chain of trust.

pkg_add trusts pub keys under /etc/signify that end in *pkg.pub
(respectively *fw.pub for firmwares).

Put shit there -> get shit out.

the only way to get keys in there is:
- base install,
- explicitly putting keys there as root.

There's nothing more automated. Keys are not certified nor anything.

Reply via email to