SUSE / openSUSEThis Forum is for the discussion of Suse Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I just installed openSuSE 10.3. After installation, I went to online update configuration. When adding the upgrade repositories I received a message saying a file was signed by an untrusted key.
Also, I received the same message while adding community repositories.
I have only been using Linux since the beginning of the year, and have been running Mandriva, and PCLOS. Is this something I should be concerned about? I was forced to accept the files so the update process would continue.
Enter in the same command and see if the fingerprints match. You may have some missing or extra.
If you enter "rpm -qi gpg-pubkey" you can see which disto' the keys are for. Some of them are from the community distro's such as vlc.
It also lists for which repo each key is in the "rpm -qi gpg-pubkey" results. You can also look for a package in rpm.pbone.net and choose the pbone mirror, and download an rpm. Then compare the signature in the package:
rpm -qip <rpm package file>
with the installed version:
rpm -qi <rpm package>
The one potential attacks against mirror sites I have read of is to compromise your DNS and get you to download old package versions on a fake mirror site. The packages would verify correctly because the site contains genuine packages. They are just dated. I think it would be hard to miss however. You can also change to a different mirror if you are concerned about the repo you are using.
If the md5sum & asc values of your installation media matches what is listed in the SuSE site, then you should be OK.
Thanks again!!!....but now I'm over my head. I don't understand most of what you wrote.
I am using the 32 bit, 10.3, which I downloaded and burned in December. I did check the MD5SUM, and it matched.
I am concerned about this because I make many purchases online, as well as do my banking online. I have received the "untrusted key" warning almost every time I added a repository (packman, mozilla, ATI, updates...etc). I am afraid of a "back door."
I suppose I should download another, more recent copy, and see if I get the same messages/warnings. I would like to try SuSE 11.0, but I don't want KDE4 yet, because I have read it's not ready, and incomplete. If I download the 11.0 Live CD, will I have an option to install with KDE 3.5? Or would I be better off downloading a newer version of 10.3?
My last option would be to go back to PCLOS MiniMe 2008, or Mandriva.
If the md5 sum of the install CD matches the published value, and the CD is the source of the keys you have installed, those keys are OK.
When you install a new repository, you don't have their public key at the beginning. You should get a notice asking if you want to trust the new key. My idea to look in rpm.pbone.net and select a mirror to download a package is based on the idea that a man-in-the-middle attack can't cover every mirror site you might visit, and the keys will need to agree. I don't think it would be possible to fake every mirror site you might visit.
Certificates issued by a Certificate Authority use cryptographic techniques to verify that a person is who they say they are. Their private key was issued by a CA after verifying they are who they say (although these standards may have been lax in recent years). Obtaining a certificate from a CA costs thousands of dollars a year, so you will often run into self signed certificates, where the site author creates their own certificates instead of purchasing one from a CA. Because of this, you will get a warning about the certificate not being verified. I'll even get this warning when I connect to my Linksys router's config via https.
Another technique is a web of trust. Sometimes there will even be web of trust parties where people get together to exchange their public keys. After showing a drivers license to prove you are who you say you are, you exchange public keys with the people present. By widely distributing your public key (which is based on your public key) it would be less likely that someone could pretend to be you on the web.
If you install a package from one site that has public keys for itself and of others, and another package from another site that has most or all of these keys, and they agree, that adds integrity to the keys even though they were self signed. Especially from man-in-the-middle attacks, because such an attack can't cover the scope and time frame of the keys.
---
Yes, SuSE 11 has both kde 3.5 and kde 4.0. You can decide which one (or both) to install. The packages and libraries of the two are segregated so you can run 3.5 and have a program written for 4.0 installed and running in 3.5. I have KDE 4 on my desktop and KDE 3.5 on my laptop. Both are running SuSE 11. When you log in, you can choose which desktop to use. KDE 3.5 and KDE 4.0 have different entries.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.