Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 19 Aug 2013 22:11:13 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Eric H. Christensen" <echriste@...hat.com>, security@...tgresql.org,
        kevin@...ye.com
Subject: Re: PostgreSQL insecure install via yum (multiple
 problems)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/19/2013 07:19 PM, Eric H. Christensen wrote:
> On Mon, Aug 19, 2013 at 06:58:22PM -0600, Kurt Seifried wrote:
>> Signing RPM's isn't very useful if you never make the signing
>> key available!
> 
> You mean like this:
> http://keys.fedoraproject.org/pks/lookup?search=0x442df0f8&op=vindex
>
>  I'm pretty sure pgp.mit.edu isn't the best source for PGP keys any
> longer, unfortunately.

Dunno who to ask, so adding Scrye: can we make sure Google indexes the
Fedora key server? This actually raises a good point, what are the key
servers now? The big 3 used to be:

http://pgp.mit.edu/
http://keyserver.pgp.com/
http://sks-keyservers.net/

and it's not on any of them =( Even if the key is uploaded PostgreSQL
doesn't list the key fingerprint anywhere securely, the key ID can be
spoofed, so yeah there might be keys with the ID 442df0f8 but I got no
clue if they're legitimate or not =(.

Really all we need is an HTTPS server (easy) and a web page listing
the key/fingerprint, ideally the full text of the key. I understand
small projects may not do this, but PostgreSQL is pretty big and
professional.

> -- Eric

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=UiGf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.