-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Qubes Master Signing Key to dom0 #2544
Add Qubes Master Signing Key to dom0 #2544
Comments
qubes-core-vm provides |
This would be really nice to have in R3.2 about now. It makes the key verification a bit more secure, and helps users by removing several steps from the process. Even better if the R4.0 signing key is also included. I think it makes sense to include the signing key for the next iteration in the current OS. |
This issue is being closed because:
If anyone believes that this issue should be reopened, please let us know in a comment here. |
@andrewdavidwong This doesn't seem related to a particular release. |
Documented in Verifying Signatures. Related issue: #4292. |
As John David R. Smith suggested, the Qubes Master Signing Key should be included in dom0, to mitigate the risk of an MITM attack replacing the key. This would also provide users with an additional means of confirming that their copy of the key is genuine. (As a corollary, it's yet another place that an attacker would have to attempt to replace the key with a forgery in order to deceive users.)
I recall someone suggesting this a long time ago, and I (think I) also recall @marmarek doing it, but I can't find the original thread or issue, and I don't see the key in
/etc/pki/rpm-gpg/
.The text was updated successfully, but these errors were encountered: