As a result of the recent intrusion, and out of an abundance of caution, the Fedora Project has decided to issue new package signing keys. As announced previously, this process may require users to take affirmative steps to continue receiving updates from official Fedora mirrors.
For Fedora Users
We will soon be posting detailed instructions for users to enable the new package signing key. By enabling the new package signing key, your system can continue to receive security, bug fix, and enhancement updates from the official Fedora mirrors. Systems that do not enable the new key may not be able to receive these udpates.
Fedora Signing Key Plan
This page outlines the new signing key plan that the Fedora Project is in the process of implementing. The history behind the plan can be found [here] and [here]. The release engineering team can be reached in #fedora-devel (irc.freenode.org) or emailed email@example.com.
- Release engineering obtains the security team's approval to the plan shown below.
- Generate a new key for F8 and F9 stable, and a separate key for testing.
- Automatic key migration.
- Announce the new key and details of the migration and end-user impact. (in progress)
- Push updates signed by the new key into the new repository.
- Re-sign all existing F8, F9, update and testing packages in the repository, leaving the .iso's alone. When the re-signed content is ready, minimize contents of the old repository and put the resigned RPMS into the new repository. The minimized old repository contains only the minimal dependencies needed to upgrade to the new fedora-release. The new PackageKit required to handle key import will also be provided. (in progress)
- After the old repository is cleaned, issue a new rpm update in the new repository.
- Create new key for Fedora 10.
- During development and release of Fedora 10, consider and create better ways to handle automatic key migration.
- Decide if the RPMS in the existing .iso's will be re-signed.