Date: Fri, 25 Dec 2009 09:53:05 +0800 From: QIU Quan <jackqq@gmail.com> To: Matthew Seaman <m.seaman@infracaninophile.co.uk> Cc: freebsd-questions@freebsd.org Subject: Re: Are source updating mechanisms vulnerable to MITM attacks? Message-ID: <53a565700912241753o1a874800l4995c4b50a2c2980@mail.gmail.com> In-Reply-To: <4B33C731.9030909@infracaninophile.co.uk> References: <53a565700912240020s7476721egca5d7801ffcd2bb7@mail.gmail.com> <4B33C731.9030909@infracaninophile.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Dec 25, 2009 at 03:55, Matthew Seaman <m.seaman@infracaninophile.co.uk> wrote: > > freebsd-update(8), freebsd-update.conf(5) =C2=A0You can use this just to = pull > down > the system sources I believe, but only for release branches, not for > -CURRENT > or -STABLE. > Yes! freebsd-update(8) verifies download signatures. It's a good idea to follow the release branch using freebsd-update, since all my concern is following the security updates. Thanks! :-) --=20 =E8=A3=98=E4=BD=BA (QIU Quan) <jackqq@gmail.com>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53a565700912241753o1a874800l4995c4b50a2c2980>