Rober Morales <[EMAIL PROTECTED]> writes:
>> > It'll reduce the security of machine since won't make difference if
>> > the key is or not know before you upgrade or install a package.
>>
>> Agreed; an idea might be to import the key to some "untrusted" keyring,
>> and allow the user to add it to t
> > It'll reduce the security of machine since won't make difference if
> > the key is or not know before you upgrade or install a package.
>
> Agreed; an idea might be to import the key to some "untrusted" keyring,
> and allow the user to add it to the "trusted" list after giving some
> stern lect
Otavio,
> It'll reduce the security of machine since won't make difference if
> the key is or not know before you upgrade or install a package.
Agreed; an idea might be to import the key to some "untrusted" keyring,
and allow the user to add it to the "trusted" list after giving some
stern lectur
tag 389646 + wontfix
thanks
Rober Morales-Chaparro <[EMAIL PROTECTED]> writes:
> Package: apt
> Version: 0.6.45
> Severity: minor
>
> Instead of showing a warning message when apt does not know the key, apt
> cat try to execute (with or without the user confirmation?):
>
> #!/bin/bash
> KEY=$
Package: apt
Version: 0.6.45
Severity: minor
Instead of showing a warning message when apt does not know the key, apt
cat try to execute (with or without the user confirmation?):
#!/bin/bash
KEY=$1
gpg --keyserver subkeys.pgp.net --recv $KEY
gpg --export --armor $KEY | apt-key add -
TI
5 matches
Mail list logo