Date: Fri, 9 Jun 2000 17:53:14 -0700 (PDT) From: Kris Kennaway <kris@FreeBSD.org> To: "David O'Brien" <obrien@FreeBSD.org> Cc: Brian Fundakowski Feldman <green@FreeBSD.org>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: ports/comms/minicom/files md5 Message-ID: <Pine.BSF.4.21.0006091752430.10797-100000@freefall.freebsd.org> In-Reply-To: <20000609170125.B62028@dragon.nuxi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 9 Jun 2000, David O'Brien wrote: > On Fri, Jun 09, 2000 at 05:21:20PM -0400, Brian Fundakowski Feldman wrote: > > The diffing-to-find-what-makes-an-md5-change practice is a good > > thing, but how good is it really when the MD5 from a new version is > > generated and we act on blind trust? That happens more often than > > bouncing md5 hashes, so isn't there even _more_ of a chance of a trojan > > coming in? > > EXACTLY. Except on one but me understood this on IRC. I agreed with you, but thats not what the argument^Wdiscussion was about. See my earlier post. Kris -- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0006091752430.10797-100000>