From: Patrick Lauer <patrick@gentoo.org>
To: gentoo-dev@lists.gentoo.org
Subject: Re: [gentoo-dev] Signing everything, for fun and for profit
Date: Fri, 19 May 2006 13:20:02 +0200 [thread overview]
Message-ID: <1148037602.23382.23.camel@localhost> (raw)
In-Reply-To: <623652d50605190246q625e9c76g820fc4138ee88cb4@mail.gmail.com>
[-- Attachment #1: Type: text/plain, Size: 3214 bytes --]
On Fri, 2006-05-19 at 10:46 +0100, Chris Bainbridge wrote:
> The only attack most people really care about is a compromised rsync
> server. There is no practical way to protect against the other attacks
> - and at the end of the day, if a developer gets compromised it
> doesn't matter whether it's a gpg key or ssh key, the effect is the
> same.
The difference is how you handle any problems. You can't avoid it, but
you can reduce the impact.
> The discussion about which files to sign is pointless - the extra
> computational cost of signing all files in the tree is insignificant,
> and how are we supposed to know how future tools will handle things
> like the licenses? Just do it properly now and sign every file.
In theory yes.
Practically you have to find a non-intrusive way so signatures are per
file.
There are potential problems with "special" files like package.mask that
will be modified often by different people ... signing that is a bit
silly
> We already trust the master cvs server admins (and they could just
> replace the whole tree anyway), so what benefit does a distributed
> signing system like gpg actually give to the developers or users? I
> can't see any that are worth the costs of key management (and there
> are costs, otherwise a system would've been put into place years
> ago).
No central authority --> no single point of failure
Give me a central server and I will focus on hacking that ... hacking 50
developers is much harder ;-)
> So my simple proposal would be to use a single key, and a post-commit
> cvs hook to sign the whole tree. It takes me 1.5 seconds with gnupg to
> generate a signature covering the whole tree on my desktop here. I
> don't know how many commits per day there are (and maybe that would be
> reduced with an atomic commit system like svn), so I don't know if
> this is an acceptable cost. I think it probably is, but if not, then
> signing could be done per-directory.
I don't see what that gains you ... what exactly does this signature
express?
and 1.5sec doesn't appear realistic to me, I'd expect it to take ~1
minute even on a fast system
> The benefits of this would be that changes are minimised - developers
> and users act the same, the impact on the tree is a 191 byte
> signature, and yet it will protect against the most likely and most
> practical form of attack.
So ... DoS scenario
I just add one byte to the tree and the signature fails ... what then?
> I was much more pro-distributed trust system in 2003 (or whenever this
> was last discussed), but I think the right solution now is the
> practical, easy to implement one.
I think I'd prefer a hybrid.
One possibillity would be:
- every dev signs as it is done now
- post commit an automated signature from a master key is added
so the normal user can check the master signature, and the paranoid
people can use the per-dev keys.
Where I fully agree is "practical" and "low impact" - it should be easy
to use so that everyone can use it without lots of configuring. This of
course limits the complexity that we can allow.
wkr,
Patrick
--
Stand still, and let the rest of the universe move
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 198 bytes --]
next prev parent reply other threads:[~2006-05-19 11:28 UTC|newest]
Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-05-18 21:45 [gentoo-dev] Signing everything, for fun and for profit Patrick Lauer
2006-05-18 23:53 ` Kevin F. Quinn
2006-05-18 23:54 ` Ciaran McCreesh
2006-05-19 4:26 ` Robin H. Johnson
2006-05-20 2:03 ` Ned Ludd
2006-05-20 13:03 ` Patrick Lauer
2006-05-20 13:21 ` Jan Kundrát
2006-05-20 20:47 ` Robin H. Johnson
2006-05-21 10:40 ` Paul de Vrieze
2006-05-19 9:46 ` Chris Bainbridge
2006-05-19 11:20 ` Patrick Lauer [this message]
2006-05-19 14:13 ` Chris Bainbridge
2006-05-19 14:39 ` Andrew Gaffney
2006-05-19 15:17 ` Chris Bainbridge
2006-05-19 15:26 ` John Myers
2006-05-19 16:10 ` Chris Bainbridge
2006-05-19 13:30 ` Thomas Cort
2006-05-20 6:30 ` Alin Nastac
2006-05-19 15:32 ` Chris Gianelloni
2006-05-19 15:35 ` Harald van Dijk
2006-05-19 15:26 ` Patrick Lauer
2006-05-19 16:06 ` Chris Bainbridge
2006-05-19 16:50 ` Marius Mauch
2006-05-19 17:04 ` Harald van Dijk
2006-05-19 16:28 ` [gentoo-dev] " Peter
2006-05-19 16:41 ` Chris Bainbridge
2006-05-19 16:51 ` Stephen Bennett
2006-05-19 17:26 ` Marius Mauch
2006-05-20 5:44 ` Lance Albertson
2006-05-19 17:45 ` [gentoo-dev] " Marius Mauch
2006-05-20 8:13 ` Thierry Carrez
2006-05-20 13:10 ` Patrick Lauer
2006-05-20 10:54 ` [gentoo-dev] " Peter
2006-05-20 14:37 ` Chris Bainbridge
2006-05-20 14:51 ` [gentoo-dev] " Peter
2006-05-21 11:31 ` Chris Bainbridge
2006-05-21 13:49 ` Francesco Riosa
2006-05-20 23:48 ` [gentoo-dev] " Robin H. Johnson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1148037602.23382.23.camel@localhost \
--to=patrick@gentoo.org \
--cc=gentoo-dev@lists.gentoo.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox