![]() |
[Alert] PR1.2 install bug - take action now!
THE ISSUE
In the upcoming PR1.2 release, the installer contains an issue that will block packages from custom APT repositories from being installed unless they contain Secure APT signatures. This means that it will become rather complicated to install packages from:
These repositories contain ports of important utilities that are useful for developers and advanced N9 users. WHAT YOU CAN DO It's most likely too late to fix this, and Nokia might consider it to be more of a feature than a bug. However, you can still take action:
|
Re: [Alert] PR1.2 install bug - take action now!
"Secure APT signatures."
So whats wrong withg securing my N9!? Do you want to install untrusted sources you should get an crappy android device with lots of Viruses and Malware. If devs to lazy set up certs. I dont want such packages installed on my device anyway. Its there for good reason. EDIT: Sorry my mistake, readed it as you meant the Secure APT signature thing was something that was bad... |
Re: [Alert] PR1.2 install bug - take action now!
Quote:
|
Re: [Alert] PR1.2 install bug - take action now!
Quote:
Also, setting up Secure APT signing won't actually make much of anything more secure by itself. The root problem is a mistake in Aegis, not some sort of well-thought-out security measure. However, this is the easiest way to curtail the damage. Quote:
|
Re: [Alert] PR1.2 install bug - take action now!
Quote:
PFFF, if you don't want those packages installed, you shouldn't install them. Simple as that. Please don't troll here about forcefeeding other users your notion - if anybody else wants to install those packages, it's rather irrelevant if you don't like to install pkgs that can't get installed. :-( /j |
Re: [Alert] PR1.2 install bug - take action now!
Quote:
But I still think its good choice to only support trusted keys. But ofcourse Nokia should fix SDK repo key... |
Re: [Alert] PR1.2 install bug - take action now!
Quote:
I guess they could add an option to in rootmode to ask if not trusted. But personally I am sick and tired of "untrusted" keys both in Linux and on many https:// sites. The more you have to "entyer untrusted" the more you ignore those warnings. So my point was more like get the damn key/certs etc.. in place... |
Re: [Alert] PR1.2 install bug - take action now!
Quote:
@joerg_rw, could you please update folks on what's happening here? H-E-N9 USB hostmode enabler N9 http://forum.meego.com/showthread.php?t=4610&page=3 Been awfully quiet for mths, it'd be great know if any progress or none has been made. If you no longer have time, then we need to find someone else who can take-it-on. TY. |
Re: [Alert] PR1.2 install bug - take action now!
Quote:
Deploying APT signatures also does nothing to protect against malware in any realistic scenario - though since malware follows the money, I highly doubt such programs will ever be a serious threat on Harmattan. However, in order to have things continue to work smoothly on PR1.2, it's going to be necessary to use APT signatures anyway, so it's time to get started. |
Re: [Alert] PR1.2 install bug - take action now!
@itsnotabigtruck:
Do you have any source for your statements? Also, I am wondering, do apps in the OVI store somehow get signed? I pack my (Python) apps in scratchbox, so I am sure there is no signing there, especially since I never generated a key. I have a N9 for testing my apps with a quite up to date PR 1.2 beta and haven’t seen any issues with this. |
All times are GMT. The time now is 11:50. |
vBulletin® Version 3.8.8