Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 6 Jan 2009 10:22:29 +0100 (CET)
From:      Wojciech Puchar <wojtek@wojtek.tensor.gdynia.pl>
To:        Mel <fbsd.questions@rachie.is-a-geek.net>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Foiling MITM attacks on source and ports trees
Message-ID:  <20090106102124.O34151@wojtek.tensor.gdynia.pl>
In-Reply-To: <200901052258.39785.fbsd.questions@rachie.is-a-geek.net>
References:  <20090102164412.GA1258@phenom.cordula.ws> <20090103013825.18910bf5@gumby.homeunix.com> <495F5DD7.2070302@infracaninophile.co.uk> <200901052258.39785.fbsd.questions@rachie.is-a-geek.net>

next in thread | previous in thread | raw e-mail | index | archive | help
>> someone like the FreeBSD Foundation as an appropriate body to own the cert.
>
> <OT>
> I would actually trust a self-signed cert by the FreeBSD security officer,
> more then one by Verisign.
of course.

there is no need to have an "authority" to make key pairs, everybody do it 
alone.

actually i would fear using such keys because i'm sure such companies do 
have a copy of both keys.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090106102124.O34151>