Subject: Re: Volunteers to test some kernel code...
To: Brett Lymn <email@example.com>
From: Michael Graff <firstname.lastname@example.org>
Date: 06/15/1999 08:24:07
email@example.com (Brett Lymn) writes:
> Maybe I am being a bit simplistic here but isn't the MD5 signatures
> available from the ftp server good enough to assure some level of
> trust that the distribution has not been tampered with?
In my opinion, no. They are a nice "did this download correctly"
checksum, but I'd not consider them any form of secure.
Now, if those files were PGP signed, sure.
> assuming the files has not been tampered with on the ftp server) Or
> are you suggesting a service should be set up where the signatures can
> be encrypted with a public key and forwarded to the requestor for
Not really, no...
> What I was looking to do was to plug some of the standard script
> kiddie tricks such as loading trojan horses (can be fixed with
> immutable) and running network sniffers. I believed that having a
> validation of the TCB via a cryptographically strong method (I believe
> md5 is one) was a nicety - saves running tripwire or the like over the
> binaries since they are handled automatically.
Yes, this is true.