Date: Fri, 6 Feb 2015 22:40:10 +0100 From: Michael Gmelin <freebsd@grem.de> To: =?utf-8?Q?Marko_Cupa=C4=87?= <marko.cupac@mimar.rs> Cc: "freebsd-ports@freebsd.org" <freebsd-ports@freebsd.org> Subject: Re: pkg and https-based repo with self-signed cert Message-ID: <93AF79F4-2F54-4490-80D5-B7B68045F234@grem.de> In-Reply-To: <20150206200309.0d2fb13c@efreet.mimar.rs> References: <20150205205253.GQ44537@home.opsec.eu> <54D4F36C.6050401@rlwinm.de> <20150206171916.GT44537@home.opsec.eu> <20150206200309.0d2fb13c@efreet.mimar.rs>
next in thread | previous in thread | raw e-mail | index | archive | help
> On 06 Feb 2015, at 20:03, Marko Cupa=C4=87 <marko.cupac@mimar.rs> wrote: >=20 > On Fri, 6 Feb 2015 18:19:16 +0100 > Kurt Jaeger <lists@opsec.eu> wrote: >=20 >> It's more along the lines of 'encrypt all the things'... >>=20 >> I'm playing with changing all http stuff to https in general and >> one of them is my repo... >=20 > Indeed, it could happen that - in a few years or a few decades - someone > finds log with "metadata" showing me installing encrypted signed > packages from my own pkg repo. Who can be sure that punishment for such > actions won't be imprisonment or death at that time? Better be safe > than sorry... >=20 > :tongue in a cheek (or not?): For me it's about bidirectional trust as I'm also building "private" package= s. Plus, I don't want any unencrypted traffic on our network. > --=20 > Marko Cupa=C4=87 > https://www.mimar.rs > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?93AF79F4-2F54-4490-80D5-B7B68045F234>