Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <877fu9cmxy.fsf@mid.deneb.enyo.de>
Date: Sun, 22 Mar 2015 12:04:57 +0100
From: Florian Weimer <fw@...eb.enyo.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE for Kali Linux

* Kurt Seifried:

> So I guess we enter uncharted territory here.

No, this is pretty much the same as bug 998:

  <https://bugzilla.redhat.com/show_bug.cgi?id=998>

Here's one non-working attempt at solving this with the Microsoft
trust root:

  <https://fedoraproject.org/wiki/Features/PackageSignatureCheckingDuringOSInstall>

(It does not work because anyone can have binaries signed under the
Microsoft trust root.)

> Vendor has front page that recommends doing something completely
> insane and insecure (http/md5s/etc.).

Please tone down your language, it's not constructive at all.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.