Date: Tue, 6 Jan 2009 10:22:29 +0100 (CET) From: Wojciech Puchar <wojtek@wojtek.tensor.gdynia.pl> To: Mel <fbsd.questions@rachie.is-a-geek.net> Cc: freebsd-questions@freebsd.org Subject: Re: Foiling MITM attacks on source and ports trees Message-ID: <20090106102124.O34151@wojtek.tensor.gdynia.pl> In-Reply-To: <200901052258.39785.fbsd.questions@rachie.is-a-geek.net> References: <20090102164412.GA1258@phenom.cordula.ws> <20090103013825.18910bf5@gumby.homeunix.com> <495F5DD7.2070302@infracaninophile.co.uk> <200901052258.39785.fbsd.questions@rachie.is-a-geek.net>
next in thread | previous in thread | raw e-mail | index | archive | help
>> someone like the FreeBSD Foundation as an appropriate body to own the cert. > > <OT> > I would actually trust a self-signed cert by the FreeBSD security officer, > more then one by Verisign. of course. there is no need to have an "authority" to make key pairs, everybody do it alone. actually i would fear using such keys because i'm sure such companies do have a copy of both keys.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090106102124.O34151>