Date: Sat, 11 Oct 2014 09:21:33 -0400 From: <scratch65535@att.net> To: freebsd-ports <freebsd-ports@freebsd.org> Subject: Re: PKG not quite ready for prime time Message-ID: <e79i3ale313b5iqvuql3ns08m86hmtonoa@4ax.com> In-Reply-To: <543837CF.9070607@FreeBSD.org> References: <sl4g3adpms8lkd2rr38n3666et8eptsp9i@4ax.com> <543817AA.8080305@gmx.de> <he6g3apojoln19fd9d8gr2rs0koq3a6940@4ax.com> <54381E16.9070609@FreeBSD.org> <1a8g3athvnun67c4kljhjtsjjlc30116j1@4ax.com> <543837CF.9070607@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 10 Oct 2014 14:47:27 -0500, you wrote: >On 10/10/2014 1:12 PM, scratch65535@att.net wrote: >> On Fri, 10 Oct 2014 12:57:42 -0500, Brian Drewery wrote: >> >>> find /usr/share/keys/pkg -exec sha256 {} + >> >> No such file > >That's your problem. You are missing the signature fingerprints to >compare against. As such Pkg is refusing to do anything to prevent MITM >attacks. > >You are missing this: >https://www.freebsd.org/security/advisories/FreeBSD-EN-14:03.pkg.asc > >freebsd-update can provide it. Thank you for the pointer. What puzzles me is why the problem wasn't fixed for o/s versions prior to 10.0 since it was being made mandatory for those versions. That doesn't seem like good practice.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?e79i3ale313b5iqvuql3ns08m86hmtonoa>