Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#28771 - {archweb} secure sites related to package signing / keys
Attached to Project:
Arch Linux
Opened by Christian Hesse (eworm) - Sunday, 04 March 2012, 13:54 GMT
Last edited by Dan McGee (toofishes) - Sunday, 21 October 2012, 15:59 GMT
Opened by Christian Hesse (eworm) - Sunday, 04 March 2012, 13:54 GMT
Last edited by Dan McGee (toofishes) - Sunday, 21 October 2012, 15:59 GMT
|
DetailsVerifying keys before trusting them is required for security. At the moment some Arch web sites are accessible unencrypted, which opens door for man in the middle attacks and the like. I think these sites should redirect to https by default, this way modifications one the way from the server to the client should be found easily by complaining clients.
Sites affected (possibly more): Signing Master Keys <http://www.archlinux.org/master-keys/> Arch Linux Developers <http://www.archlinux.org/developers/> Arch Linux Trusted Users <http://www.archlinux.org/trustedusers/> |
This task depends upon
Closed by Dan McGee (toofishes)
Sunday, 21 October 2012, 15:59 GMT
Reason for closing: Implemented
Additional comments about closing: Main site is now HTTPS only.
Sunday, 21 October 2012, 15:59 GMT
Reason for closing: Implemented
Additional comments about closing: Main site is now HTTPS only.
Ok, seriously. Even if you check from different sources, a single network node running netsed could fake all fingerprints from all sources. Only an encrypted connection would prevent this case.
I know i can switch to https and did. But only those who are aware of this risk will do. As it's easily implementable, why not just do it?