Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 May 2013 14:00:10 -0700
From: Russ Allbery <rra@...nford.edu>
To: oss-security@...ts.openwall.com
Subject: Re: upstream source code authenticity checking

Alan Coopersmith <alan.coopersmith@...cle.com> writes:
> On 05/ 2/13 11:10 AM, Russ Allbery wrote:

>> I routinely do this.  It's called a key-signing party.  The only trust
>> that I am expressing with that signature is that I have seen and
>> verified, to the best of my ability, some form of reliable
>> identification for that person (ideally a passport I can verify, or a
>> social environment in which it would be very difficult to impersonate
>> someone you are not) in combination with a proof that the key I signed
>> belongs to the person whose identification I checked.

> Though for many open source projects, having a passport or other
> government id is not the sort of identity we care about - knowing that
> you're the person who does git/hg commits under that e-mail address is
> what we care about - if it's a pseudonym that doesn't match your
> passport, that doesn't affect whether we accept code from you or not.
> (The lawyers might care, when it comes to verifying who owns copyright
> and agreed to release code under a given license, but that's a whole
> separate mess to unravel.)

Right.  And that's part of the problem with using existing PGP key
signatures.  They don't convey the piece of information that the project
probably actually cares about.  Open source projects rarely care that I'm
*actually* Russ Allbery, rather than just using that name on-line while
actually legally being named Roger McDowell.  Lawyers may care if they
want to be able to sue me, but that's an edge case.  What projects
actually care about is that I'm the same person, by whatever name, who has
an established track record in multiple other projects and an established
trust basis in the broader community.

You can kind of get there by tying together multiple different pieces of
data, but it's certainly not directly conveyed by PGP key signatures.

-- 
Russ Allbery (rra@...nford.edu)             <http://www.eyrie.org/~eagle/>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.