Date: Fri, 26 Apr 2013 07:57:05 +0200 From: Alistair Crooks <agc@...src.org> To: Kurt Seifried <kseifried@...hat.com> Cc: oss-security@...ts.openwall.com, Josh Bressers <bressers@...hat.com> Subject: Re: upstream source code authenticity checking On Thu, Apr 25, 2013 at 01:30:23AM -0600, Kurt Seifried wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 04/24/2013 11:55 PM, Alistair Crooks wrote: > > I'm not sure what using PGP gains us? > > > > Regards, Alistair > > So some possible outcomes are: > > 1) They do PGP/GPG and don't get compromised. Long term outcome: we > come out way ahead. > > 2) They do PGP/GPG and do get compromised. Long term outcome: we trust > bad things and lose, hopefully this gets spotted quickly and dealt with. Sure. I actually agree with you. But I'd also like it if we could bear in mind that, with PGP, trust is earned, trust signatures are snapshots in time, and trust levels are private, best guessses by people. All people can see from a key listing is who trusted them and when, not how much, or whether the trust was warranted. > At a minimum this raises the bar for attackers when trying to insert a > fake release/whatever. The real problem however is the cost of doing > this. Key creation/storage/management/backup/etc is all non trivial > and not free. Is the cost of this worth it? > > I think if we are going to push this we need to come up with a pretty > good set of guidelines that are easy to follow and implement. Things > like creation of keys, usage, storage, how to handle key roll overs, > lost keys, etc. Maybe even have a trusted party signs packages sent to > them, confirms the package with the project through some other trusted > channel like secure email or because they know the guy in real life/etc. I do like this idea, although think there should be more than one "trusted" party. But the tools we have don't do that kind of third-party verification; it would be good to get that in there. Regards, Alistair
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.