Version control - The gpg public key distribution method provided on git-scm does not seem to be able to prevent content forgery, right?
某草草
某草草 2017-05-02 09:31:17
0
0
873

https://git-scm.com/book/zh/v2/分布式-Git-维护项目#为发布打标签

Maintainer execution:

gpg -a --export <keyid> | git hash-object -w --stdin | git -a maintainer-pgp-pub -m 'Run "git show maintainer-pgp-pub | gpg --import" to import the PGP public key'

This is indeed done, the public key is distributed, the recipient only needs to

git show maintainer-pgp-pub | gpg --import
git verfy-tag <signed-version>

The public key can be imported and verified.

Then the problem is, if the content is forged, and the public key and content are all generated by the forger, then the verification will still pass. This can only be prevented by publishing the public key fingerprint on the site. In this case, wouldn't it be better to publish the public key directly on the site? There is no point in verifying anything!

某草草
某草草

reply all(0)
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template