Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 25 Dec 2009 09:53:05 +0800
From:      QIU Quan <jackqq@gmail.com>
To:        Matthew Seaman <m.seaman@infracaninophile.co.uk>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Are source updating mechanisms vulnerable to MITM attacks?
Message-ID:  <53a565700912241753o1a874800l4995c4b50a2c2980@mail.gmail.com>
In-Reply-To: <4B33C731.9030909@infracaninophile.co.uk>
References:  <53a565700912240020s7476721egca5d7801ffcd2bb7@mail.gmail.com>  <4B33C731.9030909@infracaninophile.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Dec 25, 2009 at 03:55, Matthew Seaman
<m.seaman@infracaninophile.co.uk> wrote:
>
> freebsd-update(8), freebsd-update.conf(5) =C2=A0You can use this just to =
pull
> down
> the system sources I believe, but only for release branches, not for
> -CURRENT
> or -STABLE.
>

Yes! freebsd-update(8) verifies download signatures. It's a good idea
to follow the release branch using freebsd-update, since all my
concern is following the security updates.

Thanks! :-)


--=20
=E8=A3=98=E4=BD=BA (QIU Quan) <jackqq@gmail.com>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53a565700912241753o1a874800l4995c4b50a2c2980>