Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Jun 2000 17:53:14 -0700 (PDT)
From:      Kris Kennaway <kris@FreeBSD.org>
To:        "David O'Brien" <obrien@FreeBSD.org>
Cc:        Brian Fundakowski Feldman <green@FreeBSD.org>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   Re: cvs commit: ports/comms/minicom/files md5
Message-ID:  <Pine.BSF.4.21.0006091752430.10797-100000@freefall.freebsd.org>
In-Reply-To: <20000609170125.B62028@dragon.nuxi.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 9 Jun 2000, David O'Brien wrote:

> On Fri, Jun 09, 2000 at 05:21:20PM -0400, Brian Fundakowski Feldman wrote:
> >    The diffing-to-find-what-makes-an-md5-change practice is a good
> > thing, but how good is it really when the MD5 from a new version is
> > generated and we act on blind trust? That happens more often than
> > bouncing md5 hashes, so isn't there even _more_ of a chance of a trojan
> > coming in?
> 
> EXACTLY.  Except on one but me understood this on IRC.

I agreed with you, but thats not what the argument^Wdiscussion was
about. See my earlier post.

Kris

--
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0006091752430.10797-100000>