Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Thu, 28 Nov 2002 04:46:53 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Thu, 28 Nov 2002 04:46:53 -0500 Received: from hermine.idb.hist.no ([158.38.50.15]:5905 "HELO hermine.idb.hist.no") by vger.kernel.org with SMTP id ; Thu, 28 Nov 2002 04:46:52 -0500 Message-ID: <3DE5E7DC.8F688E0E@aitel.hist.no> Date: Thu, 28 Nov 2002 10:54:36 +0100 From: Helge Hafting X-Mailer: Mozilla 4.76 [no] (X11; U; Linux 2.5.49 i686) X-Accept-Language: no, en, en MIME-Version: 1.0 To: Larry McVoy , linux-kernel@vger.kernel.org Subject: Re: Verifying Kernel source References: <20021127092818.Q24374@work.bitmover.com> <20021127183009.G9443@work.bitmover.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 795 Lines: 20 Larry McVoy wrote: > > > If it's in BK you can be pretty sure that it is what was checked in, > > > BK checksums every diff in every file. It's not at all impossible > > > to fool the checksum but it is very unlikely that you can cause > > > semantic differences in the form of a trojan horse and still fool > > > the checksums. > The bottom line is that, so far, the BK tree is safe. Sure, it is hard to _fake_ bk, but how about someone cracking a machine? Couldn't they check in a trojan using the normal check-in procedures? Helge Hafting - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/