diff options
author | David Kalnischkies <david@kalnischkies.de> | 2016-03-18 14:46:24 +0100 |
---|---|---|
committer | David Kalnischkies <david@kalnischkies.de> | 2016-06-22 14:05:01 +0200 |
commit | 952ee63b0af14a534c0aca00c11d1a99be6b22b2 (patch) | |
tree | 098154a03b1616e00289074eda11d4bee72ead8c /doc/apt-get.8.xml | |
parent | b1bdfe682054ea6fc202416968c5342d59b403b1 (diff) |
forbid insecure repositories by default expect in apt-get
With this commit all APT-based clients default to refusing to work with
unsigned or otherwise insufficently secured repositories. In terms of
apt and apt-get this changes nothing, but it effects all tools using
libapt like aptitude, synaptic or packagekit.
The exception remains apt-get for stretch for now as this might break
too many scripts/usecases too quickly.
The documentation is updated and extended to reflect how to opt out or
in on this behaviour change.
Closes: 808367
Diffstat (limited to 'doc/apt-get.8.xml')
-rw-r--r-- | doc/apt-get.8.xml | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/doc/apt-get.8.xml b/doc/apt-get.8.xml index 20d761075..8fc6cc26d 100644 --- a/doc/apt-get.8.xml +++ b/doc/apt-get.8.xml @@ -563,8 +563,9 @@ <varlistentry><term><option>--no-allow-insecure-repositories</option></term> <listitem><para>Forbid the update command to acquire unverifiable - data from configured sources. Apt will fail at the update command - for repositories without valid cryptographically signatures. + data from configured sources. APT will fail at the update command + for repositories without valid cryptographically signatures. See + also &apt-secure; for details on the concept and the implications. Configuration Item: <literal>Acquire::AllowInsecureRepositories</literal>.</para></listitem> </varlistentry> |