public inbox for gentoo-dev@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
@ 2009-11-25 21:50 Denis Dupeyron
  2009-11-26  1:34 ` Brian Harring
                   ` (2 more replies)
  0 siblings, 3 replies; 18+ messages in thread
From: Denis Dupeyron @ 2009-11-25 21:50 UTC (permalink / raw
  To: gentoo-dev; +Cc: gentoo-dev-announce

The next council meeting will be on 7 Dec 2009 at 1900UTC. If you want
us to discuss things please let us know in reply to this email. What
is already known is we'll talk about mtime preservation and prefix.
You can find threads about those at:
http://archives.gentoo.org/gentoo-dev/msg_a9e26414f2278275bdfa08baf839704f.xml
http://archives.gentoo.org/gentoo-dev/msg_2a62689c71f95e4de5699a330b8b5524.xml

Denis.



^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-25 21:50 [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Denis Dupeyron
@ 2009-11-26  1:34 ` Brian Harring
  2009-11-26  1:39   ` Zac Medico
  2009-11-26 15:31   ` Ciaran McCreesh
  2009-11-30 11:30 ` Antoni Grzymala
  2009-11-30 17:57 ` [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Thomas Sachau
  2 siblings, 2 replies; 18+ messages in thread
From: Brian Harring @ 2009-11-26  1:34 UTC (permalink / raw
  To: gentoo-dev; +Cc: zmedico

[-- Attachment #1: Type: text/plain, Size: 1127 bytes --]

On Wed, Nov 25, 2009 at 02:50:22PM -0700, Denis Dupeyron wrote:
> The next council meeting will be on 7 Dec 2009 at 1900UTC. If you want
> us to discuss things please let us know in reply to this email. What
> is already known is we'll talk about mtime preservation and prefix.
> You can find threads about those at:
> http://archives.gentoo.org/gentoo-dev/msg_a9e26414f2278275bdfa08baf839704f.xml
> http://archives.gentoo.org/gentoo-dev/msg_2a62689c71f95e4de5699a330b8b5524.xml

I'd like 
http://archives.gentoo.org/gentoo-dev/msg_6b3e00049a1bf35fbf7a5e66d1449553.xml
to be discussed, specifically zacs form of forced mtime updating of 
/var/db/pkg on vdb modifications

Reiterating the reasoning, it'll be used for enabling the managers to 
manage caches, specifically invalidating said caches if an alternative 
manager modifies the vdb.

End result, if we can build better caches for vdb, vdb access can be 
heavily sped up.

At this point, pkgcore/portage both have it implemented.  Not sure if 
portage has released it yet, but >=pkgcore-0.5.2 is in the tree w/ 
said updating support.

~harring

[-- Attachment #2: Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-26  1:34 ` Brian Harring
@ 2009-11-26  1:39   ` Zac Medico
  2009-11-26 15:31   ` Ciaran McCreesh
  1 sibling, 0 replies; 18+ messages in thread
From: Zac Medico @ 2009-11-26  1:39 UTC (permalink / raw
  To: Brian Harring, gentoo-dev

Brian Harring wrote:
> At this point, pkgcore/portage both have it implemented.  Not sure if 
> portage has released it yet, but >=pkgcore-0.5.2 is in the tree w/ 
> said updating support.

It's in >=portage-2.1.7.2 (and 2.1.7.x should be going stable in a
month or so).
-- 
Thanks,
Zac



^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-26  1:34 ` Brian Harring
  2009-11-26  1:39   ` Zac Medico
@ 2009-11-26 15:31   ` Ciaran McCreesh
  2009-11-26 16:33     ` Brian Harring
  1 sibling, 1 reply; 18+ messages in thread
From: Ciaran McCreesh @ 2009-11-26 15:31 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 685 bytes --]

On Wed, 25 Nov 2009 17:34:38 -0800
Brian Harring <ferringb@gmail.com> wrote:
> I'd like 
> http://archives.gentoo.org/gentoo-dev/msg_6b3e00049a1bf35fbf7a5e66d1449553.xml
> to be discussed, specifically zacs form of forced mtime updating of 
> /var/db/pkg on vdb modifications

I've still not had an answer to:

"Provide proof that all existing and future caches that would rely upon
this validation mechanism are functions purely and exclusively
dependent upon the VDB content, and I shall be happy to make the
change."

Without that proof, all introducing that change would do is provide
another unreliable mechanism, so it's of no use at all.

-- 
Ciaran McCreesh

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-26 15:31   ` Ciaran McCreesh
@ 2009-11-26 16:33     ` Brian Harring
  2009-11-26 16:46       ` Ciaran McCreesh
  0 siblings, 1 reply; 18+ messages in thread
From: Brian Harring @ 2009-11-26 16:33 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 1793 bytes --]

On Thu, Nov 26, 2009 at 03:31:17PM +0000, Ciaran McCreesh wrote:
> On Wed, 25 Nov 2009 17:34:38 -0800
> Brian Harring <ferringb@gmail.com> wrote:
> > I'd like 
> > http://archives.gentoo.org/gentoo-dev/msg_6b3e00049a1bf35fbf7a5e66d1449553.xml
> > to be discussed, specifically zacs form of forced mtime updating of 
> > /var/db/pkg on vdb modifications
> 
> I've still not had an answer to:
> 
> "Provide proof that all existing and future caches that would rely upon
> this validation mechanism are functions purely and exclusively
> dependent upon the VDB content, and I shall be happy to make the
> change."

First I've seen this question actually or at least this particular 
interesting phrasing.  That said, "no" comes to mind, since the 
requirement you set is daft.

The timestamp updating is for whenever the vdb content (addition of a 
pkg, pkgmoves being applied, removal of a pkg, modification of 
metadata, etc) is changed.  That's all that timestamp is for.  Vdb 
content.

In light of what the timestamp is, your demand for proof is pretty off 
the mark.  If you still consider it to be a valid question, please 
rephrase it and clarify why exactly proof must be provided that people 
reading that timestamp (which is for vdb content only) will only be 
using that timestamp for vdb content.

Your request is akin to demanding proof that a hammer only be used as 
a hammer.  It's a fricking hammer- it has one use, one way of being 
used.  If someone goes out of their way to be an idiot, they're an 
idiot, not the specs problem.

Seriously, if you're actually worrying about some specific usage case, 
state it- on the face of it, your request for proof right now makes 
zero sense.  Kindly provide a scenario or elucidation.

~harring

[-- Attachment #2: Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-26 16:33     ` Brian Harring
@ 2009-11-26 16:46       ` Ciaran McCreesh
  2009-11-27  8:08         ` Brian Harring
  0 siblings, 1 reply; 18+ messages in thread
From: Ciaran McCreesh @ 2009-11-26 16:46 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 2669 bytes --]

On Thu, 26 Nov 2009 08:33:03 -0800
Brian Harring <ferringb@gmail.com> wrote:
> > "Provide proof that all existing and future caches that would rely
> > upon this validation mechanism are functions purely and exclusively
> > dependent upon the VDB content, and I shall be happy to make the
> > change."
> 
> First I've seen this question actually or at least this particular 
> interesting phrasing.  That said, "no" comes to mind, since the 
> requirement you set is daft.

It's clipboarded from the bug.

> The timestamp updating is for whenever the vdb content (addition of a 
> pkg, pkgmoves being applied, removal of a pkg, modification of 
> metadata, etc) is changed.  That's all that timestamp is for.  Vdb 
> content.
> 
> In light of what the timestamp is, your demand for proof is pretty
> off the mark.  If you still consider it to be a valid question,
> please rephrase it and clarify why exactly proof must be provided
> that people reading that timestamp (which is for vdb content only)
> will only be using that timestamp for vdb content.
> 
> Your request is akin to demanding proof that a hammer only be used as 
> a hammer.  It's a fricking hammer- it has one use, one way of being 
> used.  If someone goes out of their way to be an idiot, they're an 
> idiot, not the specs problem.
> 
> Seriously, if you're actually worrying about some specific usage
> case, state it- on the face of it, your request for proof right now
> makes zero sense.  Kindly provide a scenario or elucidation.

You're asking for a cache validation mechanism that's based not upon
what it logically invalidates, but upon something you assume to be
equivalent. Specifically, you assume that "VDB has changed" and "the
installed packages have changed" are exactly the same thing, and you're
wanting to build a cache based upon that highly questionable
assumption. There are at least two logically different sets of
'changes' that might apply to VDB (metadata changes, and package
version changes), and you're attempting to confuse the two, along with
any others that people come up with later on.

What's wrong with, instead, having cache files for "something has
changed", "the set of installed packages has potentially changed", "the
metadata for installed packages has potentially changed" and "the set of
installable packages has potentially changed"? That way you can write
your cache checks to depend explicitly upon the thing upon which they
depend (along with a global catch-all to make future new validation
mechanisms easier), not upon something you assume is equivalent but
probably isn't.

-- 
Ciaran McCreesh

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-26 16:46       ` Ciaran McCreesh
@ 2009-11-27  8:08         ` Brian Harring
  0 siblings, 0 replies; 18+ messages in thread
From: Brian Harring @ 2009-11-27  8:08 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 4151 bytes --]

On Thu, Nov 26, 2009 at 04:46:49PM +0000, Ciaran McCreesh wrote:
> On Thu, 26 Nov 2009 08:33:03 -0800
> Brian Harring <ferringb@gmail.com> wrote:
> > > "Provide proof that all existing and future caches that would rely
> > > upon this validation mechanism are functions purely and exclusively
> > > dependent upon the VDB content, and I shall be happy to make the
> > > change."
> > The timestamp updating is for whenever the vdb content (addition of a 
> > pkg, pkgmoves being applied, removal of a pkg, modification of 
> > metadata, etc) is changed.  That's all that timestamp is for.  Vdb 
> > content.
> > 
> > In light of what the timestamp is, your demand for proof is pretty
> > off the mark.  If you still consider it to be a valid question,
> > please rephrase it and clarify why exactly proof must be provided
> > that people reading that timestamp (which is for vdb content only)
> > will only be using that timestamp for vdb content.
> > 
> > Your request is akin to demanding proof that a hammer only be used as 
> > a hammer.  It's a fricking hammer- it has one use, one way of being 
> > used.  If someone goes out of their way to be an idiot, they're an 
> > idiot, not the specs problem.
> > 
> > Seriously, if you're actually worrying about some specific usage
> > case, state it- on the face of it, your request for proof right now
> > makes zero sense.  Kindly provide a scenario or elucidation.
> 
> You're asking for a cache validation mechanism that's based not upon
> what it logically invalidates, but upon something you assume to be
> equivalent. Specifically, you assume that "VDB has changed" and "the
> installed packages have changed" are exactly the same thing, and you're
> wanting to build a cache based upon that highly questionable
> assumption. There are at least two logically different sets of
> 'changes' that might apply to VDB (metadata changes, and package
> version changes), and you're attempting to confuse the two, along with
> any others that people come up with later on.
>
> What's wrong with, instead, having cache files for "something has
> changed", "the set of installed packages has potentially changed", "the
> metadata for installed packages has potentially changed" and "the set of
> installable packages has potentially changed"? That way you can write
> your cache checks to depend explicitly upon the thing upon which they
> depend (along with a global catch-all to make future new validation
> mechanisms easier), not upon something you assume is equivalent but
> probably isn't.

Ah... there we go, you're again asking for specific timestamps such 
that specific caches can be invalidated.  Same as I said in the bug, 
you want it, propose it.  As you stated above, *still* a global 
timestamp of some sort is needed.

Seriously- if you want some specific cache timestamp, go nuts.  The 
global timestamp is still needed and that's the only one I give a damn 
about at this juncture- I'm not as much interested in layering in new 
hacky caches on the vdb to try and make it performant as I'm 
interested in building flat out, a new vdb that is designed from the 
ground up for efficiency/performance.

When the old vdb format has the timestamp requirements, I can use that 
to keep the two in sync (maintaining compatibility while being free 
to start developing a better vdb, or alternate implementations- say 
remote).  Beyond that, for people less ambitious it serves as a 
timestamp they can use for updating their own caches- not the most 
fine grained admittedly, but it's also a rare scenario.

Either way, you want specific cache timestamps, it's an addition to 
this proposal- for example I'm specifically disinterested in adding a 
pkg names cache because the gain from it isn't particularly high for 
the scenarios I'm looking at (provides/use/iuse/depends/rdepends per 
node being higher cost in my profilings).  Admittedly it speeds up 
simple lookups in the vdb of "what version do I have installed?", but 
most folk do a pmerge/emerge -Dup for that (meaning full metadata 
access still).

~harring

[-- Attachment #2: Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-25 21:50 [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Denis Dupeyron
  2009-11-26  1:34 ` Brian Harring
@ 2009-11-30 11:30 ` Antoni Grzymala
  2009-11-30 11:41   ` Antoni Grzymala
                     ` (2 more replies)
  2009-11-30 17:57 ` [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Thomas Sachau
  2 siblings, 3 replies; 18+ messages in thread
From: Antoni Grzymala @ 2009-11-30 11:30 UTC (permalink / raw
  To: gentoo-dev

Denis Dupeyron dixit (2009-11-25, 14:50):

> The next council meeting will be on 7 Dec 2009 at 1900UTC. If you want
> us to discuss things please let us know in reply to this email. What
> is already known is we'll talk about mtime preservation and prefix.
> You can find threads about those at:
> http://archives.gentoo.org/gentoo-dev/msg_a9e26414f2278275bdfa08baf839704f.xml
> http://archives.gentoo.org/gentoo-dev/msg_2a62689c71f95e4de5699a330b8b5524.xml

Hi!

How about getting back to GLEP-57 [1]? Robin Hugh Johnson made an effort
a year ago to summarize the then-current state of things regarding tree
and package signing, however the matter seems to have lain idle and
untouched for more than a year since.

I reckon that missing GPG infrastructure is one of the greatest problems
of the Gentoo distribution esp. regarding serious corporate and academic
deployments.

I can devote some time to helping with the matter.

Regards,

Antoni Grzymała

-- 
[a]



^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-30 11:30 ` Antoni Grzymala
@ 2009-11-30 11:41   ` Antoni Grzymala
  2009-11-30 21:18   ` [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting) Richard Freeman
  2009-12-01  1:08   ` [gentoo-dev] Tree Integrity GLEPS for final review and council approval Robin H. Johnson
  2 siblings, 0 replies; 18+ messages in thread
From: Antoni Grzymala @ 2009-11-30 11:41 UTC (permalink / raw
  To: gentoo-dev

Antoni Grzymala dixit (2009-11-30, 12:30):

> Denis Dupeyron dixit (2009-11-25, 14:50):
> 
> > The next council meeting will be on 7 Dec 2009 at 1900UTC. If you want
> > us to discuss things please let us know in reply to this email. What
> > is already known is we'll talk about mtime preservation and prefix.
> > You can find threads about those at:
> > http://archives.gentoo.org/gentoo-dev/msg_a9e26414f2278275bdfa08baf839704f.xml
> > http://archives.gentoo.org/gentoo-dev/msg_2a62689c71f95e4de5699a330b8b5524.xml
> 
> Hi!
> 
> How about getting back to GLEP-57 [1]? Robin Hugh Johnson made an effort

[...]

Forgot the URL, of course:

[1] http://www.gentoo.org/proj/en/glep/glep-0057.html

-- 
[a]



^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC
  2009-11-25 21:50 [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Denis Dupeyron
  2009-11-26  1:34 ` Brian Harring
  2009-11-30 11:30 ` Antoni Grzymala
@ 2009-11-30 17:57 ` Thomas Sachau
  2 siblings, 0 replies; 18+ messages in thread
From: Thomas Sachau @ 2009-11-30 17:57 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 1861 bytes --]

Denis Dupeyron schrieb:
> The next council meeting will be on 7 Dec 2009 at 1900UTC. If you want
> us to discuss things please let us know in reply to this email. What
> is already known is we'll talk about mtime preservation and prefix.
> You can find threads about those at:
> http://archives.gentoo.org/gentoo-dev/msg_a9e26414f2278275bdfa08baf839704f.xml
> http://archives.gentoo.org/gentoo-dev/msg_2a62689c71f95e4de5699a330b8b5524.xml
> 
> Denis.
> 
> 

Hm, i requested the discussion of real multilib support for portage 2 months ago, i requested it for
the following council meeting, i requested it for the last council meeting and i requested it for
the next council meeting. I hope, it will finally get a place on 7 Dec 2009.

I have a git branch with a modified 2.2_rc* version of portage with included multilib support. I
already wrote about basic implementation 2 months ago in the conversation on this list with vapier.

Since zmedico wants a council-ok before accepting any patches for multilib-support in portage, i
request this. My main idea behind this request is, that more people will have a look and there are
potentially more people involved in improving it. In addition it allows more people to easily get
required 32bit libs the way they want them (specific version, specified USE flags, self-compiled, so
up-to-date unlike the emul-linux-x86-* packages).

Since the code may change in the future, my idea is to restrict it currently only to 2.2_rc*
versions and in addition a required feature (e.g. FEATURES="multilib"). Once everyone is ok with the
code and the way it works, it could be proposed as an PMS-update. If other PM-mantainers are
interested in improving it before, they are of course free to also help improving the code and the
way it works.


-- 
Thomas Sachau

Gentoo Linux Developer


[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 316 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting)
  2009-11-30 11:30 ` Antoni Grzymala
  2009-11-30 11:41   ` Antoni Grzymala
@ 2009-11-30 21:18   ` Richard Freeman
  2009-11-30 22:28     ` Dawid Węgliński
  2009-12-01  1:27     ` Robin H. Johnson
  2009-12-01  1:08   ` [gentoo-dev] Tree Integrity GLEPS for final review and council approval Robin H. Johnson
  2 siblings, 2 replies; 18+ messages in thread
From: Richard Freeman @ 2009-11-30 21:18 UTC (permalink / raw
  To: gentoo-dev

Antoni Grzymala wrote:
> How about getting back to GLEP-57 [1]? Robin Hugh Johnson made an effort
> a year ago to summarize the then-current state of things regarding tree
> and package signing, however the matter seems to have lain idle and
> untouched for more than a year since.
> 

One concern I have with the GLEP-57 is that it is a bit hazy on some of 
the implementation details, and the current implementation has some 
weaknesses.

I go ahead and sign my commits.  However, when I do this I'm signing the 
WHOLE manifest.  So, if I stabilize foo-1.23-r5 on my arch, at best I've 
tested that one particular version of that package works fine for me. 
My signature applies to ALL versions of the package even though I 
haven't tested those.

Now, if we had an unbroken chain of custody then that wouldn't be a 
problem.  However, repoman commit doesn't enforce this and the manifest 
file doesn't really contain any indication of what packages are assured 
to what level of confidence.

If we want to sign manifests then the only way I see it actually 
providing real security benefits is if either:

1.  The distro does this in the background in some way in a secure 
manner (ensuring it happens 100% of the time).

2.  Every developer signs everything 100% of the time (make it a QA 
check).

The instant you have a break in the signature chain you can potentially 
have a modification.  If somebody cares enough to check signatures, then 
they're going to care that the signature means something.  Otherwise it 
only protects against accidental modifications, and the hashes already 
provide pretty good protection against this.



^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting)
  2009-11-30 21:18   ` [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting) Richard Freeman
@ 2009-11-30 22:28     ` Dawid Węgliński
  2009-12-01  1:27     ` Robin H. Johnson
  1 sibling, 0 replies; 18+ messages in thread
From: Dawid Węgliński @ 2009-11-30 22:28 UTC (permalink / raw
  To: gentoo-dev

On Monday 30 November 2009 22:18:21 Richard Freeman wrote:
> Antoni Grzymala wrote:
> > How about getting back to GLEP-57 [1]? Robin Hugh Johnson made an effort
> > a year ago to summarize the then-current state of things regarding tree
> > and package signing, however the matter seems to have lain idle and
> > untouched for more than a year since.
> 
> One concern I have with the GLEP-57 is that it is a bit hazy on some of
> the implementation details, and the current implementation has some
> weaknesses.
> 
> I go ahead and sign my commits.  However, when I do this I'm signing the
> WHOLE manifest.  So, if I stabilize foo-1.23-r5 on my arch, at best I've
> tested that one particular version of that package works fine for me.
> My signature applies to ALL versions of the package even though I
> haven't tested those.
> 

I may be wrong - then please correct me. You don't sign every package versions 
but Manifest. Thus you somehow prove every file checksum is correct. If there 
were any changes made on server side, those checksums would be incorrect 
according to your signed Manifest. Currently any change may be fixed by whoever 
it is by the same command ebuild foo digest.

> Now, if we had an unbroken chain of custody then that wouldn't be a
> problem.  However, repoman commit doesn't enforce this and the manifest
> file doesn't really contain any indication of what packages are assured
> to what level of confidence.

That's what should be discussed - forcing developers to sign their commits and 
implementing this support in package managers.

> 
> If we want to sign manifests then the only way I see it actually
> providing real security benefits is if either:
> 
> 1.  The distro does this in the background in some way in a secure
> manner (ensuring it happens 100% of the time).
> 
> 2.  Every developer signs everything 100% of the time (make it a QA
> check).
> 
> The instant you have a break in the signature chain you can potentially
> have a modification.  If somebody cares enough to check signatures, then
> they're going to care that the signature means something.  Otherwise it
> only protects against accidental modifications, and the hashes already
> provide pretty good protection against this.
> 

That's not really true. I see tips like "if you have digest incorrect, run 
ebuild foo.ebuild digest" very often. Really small group of people care about 
broken digests. :(

-- 
Cheers
Dawid Węgliński



^ permalink raw reply	[flat|nested] 18+ messages in thread

* [gentoo-dev] Tree Integrity GLEPS for final review and council approval
  2009-11-30 11:30 ` Antoni Grzymala
  2009-11-30 11:41   ` Antoni Grzymala
  2009-11-30 21:18   ` [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting) Richard Freeman
@ 2009-12-01  1:08   ` Robin H. Johnson
  2 siblings, 0 replies; 18+ messages in thread
From: Robin H. Johnson @ 2009-12-01  1:08 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 2490 bytes --]

On Mon, Nov 30, 2009 at 12:30:51PM +0100, Antoni Grzymala wrote:
> I reckon that missing GPG infrastructure is one of the greatest problems
> of the Gentoo distribution esp. regarding serious corporate and academic
> deployments.
> 
> I can devote some time to helping with the matter.
I would certainly like to get that GLEP series completed and out there.

There are still two GLEPs in the series that have not yet made it to
draft status:
http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/02-developer-process-security
http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/03-gnupg-policies-and-handling

However the main content of GLEPS 58-61 IS ready for the council to
approve, and are NOT blocking on the above two items.

As such, I would like to present GLEPS 58,59,60,61 for final review, and
for the council to vote on their approval during the January meeting.

I'm going to summarize them here:
GLEP58: Security of distribution ... MetaManifest 
-------------------------------------------------
- covers all Manifests with a infra-generated parent Manifest.
- required for end-to-end validation.
- prevents certain package manager attacks.
- NO day-to-day developer actions required.

GLEP59: Manifest2 hash policies and security implications 
---------------------------------------------------------
- Add SHA512 to all Manifest files.
- Schedule removal of SHA1, MD5, RMD160 for 6-18 months after SHA512
  addition.
- Be prepared to add the NIST hash contest candidates/winner.

GLEP60: Manifest2 filetypes
---------------------------
(Has one TODO that needs clarification).
- Breaks down the Manifest2 filetypes into INFOrmational and CRITical.
- If the package manager is being strict, then INFO filetypes are
  treated as CRIT filetypes.
- INFO filetypes merely cause a warning on absence.
- CRIT filetypes may trigger a delayed OR immediate failure of absence.

GLEP61: Manifest2 compression
-----------------------------
- Disk space optimization for MetaManifest from GLEP58.

There is a prototype of the MetaManifest code here:
http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/prototype/
It worked on Portage 2 years ago, but I haven't run it since then.

-- 
Robin Hugh Johnson
Gentoo Linux: Developer, Trustee & Infrastructure Lead
E-Mail     : robbat2@gentoo.org
GnuPG FP   : 11AC BA4F 4778 E3F6 E4ED  F38E B27B 944E 3488 4E85

[-- Attachment #2: Type: application/pgp-signature, Size: 330 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting)
  2009-11-30 21:18   ` [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting) Richard Freeman
  2009-11-30 22:28     ` Dawid Węgliński
@ 2009-12-01  1:27     ` Robin H. Johnson
  2009-12-03 10:32       ` [gentoo-dev] Individual developer signing Torsten Veller
  1 sibling, 1 reply; 18+ messages in thread
From: Robin H. Johnson @ 2009-12-01  1:27 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: text/plain, Size: 2635 bytes --]

On Mon, Nov 30, 2009 at 04:18:21PM -0500, Richard Freeman wrote:
> Antoni Grzymala wrote:
> >How about getting back to GLEP-57 [1]? Robin Hugh Johnson made an effort
> >a year ago to summarize the then-current state of things regarding tree
> >and package signing, however the matter seems to have lain idle and
> >untouched for more than a year since.
> One concern I have with the GLEP-57 is that it is a bit hazy on some
> of the implementation details, and the current implementation has
> some weaknesses.
GLEP57 is purely informational.

The GLEP on Individual developer signing has not made it into a Draft
yet.

But you can view the very brief version here:
http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/02-developer-process-security?view=markup

> I go ahead and sign my commits.  However, when I do this I'm signing
> the WHOLE manifest.  So, if I stabilize foo-1.23-r5 on my arch, at
> best I've tested that one particular version of that package works
> fine for me. My signature applies to ALL versions of the package
> even though I haven't tested those.
This was covered in the draft linked above.
A larger discussion on it is welcome, as while both competing options
exist, neither has a clear advantage over the other.

> Now, if we had an unbroken chain of custody then that wouldn't be a
> problem.  However, repoman commit doesn't enforce this and the
> manifest file doesn't really contain any indication of what packages
> are assured to what level of confidence.
Chain of custody from infrastructure to user is covered in GLEP58
(MetaManifest).

> If we want to sign manifests then the only way I see it actually
> providing real security benefits is if either:
> 
> 1.  The distro does this in the background in some way in a secure
> manner (ensuring it happens 100% of the time).
See GLEP58.

> 2.  Every developer signs everything 100% of the time (make it a QA
> check).
+1 on this.

> The instant you have a break in the signature chain you can
> potentially have a modification.  If somebody cares enough to check
> signatures, then they're going to care that the signature means
> something.  Otherwise it only protects against accidental
> modifications, and the hashes already provide pretty good protection
> against this.
GLEP60 covers the Manifest2 filetypes and better logic on which
missing/mismatches should be considered as fatal.

-- 
Robin Hugh Johnson
Gentoo Linux: Developer, Trustee & Infrastructure Lead
E-Mail     : robbat2@gentoo.org
GnuPG FP   : 11AC BA4F 4778 E3F6 E4ED  F38E B27B 944E 3488 4E85

[-- Attachment #2: Type: application/pgp-signature, Size: 330 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* [gentoo-dev] Individual developer signing
  2009-12-01  1:27     ` Robin H. Johnson
@ 2009-12-03 10:32       ` Torsten Veller
  2009-12-03 12:51         ` Thilo Bangert
  2009-12-03 20:35         ` Robin H. Johnson
  0 siblings, 2 replies; 18+ messages in thread
From: Torsten Veller @ 2009-12-03 10:32 UTC (permalink / raw
  To: gentoo-dev

* "Robin H. Johnson" <robbat2@gentoo.org>:
> The GLEP on Individual developer signing has not made it into a Draft
> yet.
> 
> But you can view the very brief version here:
> http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/02-developer-process-security?view=markup

[...]

> > 2.  Every developer signs everything 100% of the time (make it a QA
> > check).
> +1 on this.

In the GLEPs i missed the point where the signatures of Manifests are verified.
Only the MetaManifest gets verified.

So what's the advantage of individually signed Manifests?

The only thing we can check: Is the key used for signing listed in ldap
(and thus in "the keyring of automated Gentoo keys")? Are the keys in ldap
really mine?

Do I miss anything?


BTW: About a third of the Manifests are signed [1]. We didn't improve
since 2005/2006 [2]. The two parties are working hard against each other [3].
55 Manifests are signed by revoked keys [4].

[1] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest.png
[2] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/ratio_2005.png
[3] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest2.png
[4] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/signatures_by_revoked_keys.txt



^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Individual developer signing
  2009-12-03 10:32       ` [gentoo-dev] Individual developer signing Torsten Veller
@ 2009-12-03 12:51         ` Thilo Bangert
  2009-12-03 20:35         ` Robin H. Johnson
  1 sibling, 0 replies; 18+ messages in thread
From: Thilo Bangert @ 2009-12-03 12:51 UTC (permalink / raw
  To: gentoo-dev

[-- Attachment #1: Type: Text/Plain, Size: 368 bytes --]

> BTW: About a third of the Manifests are signed [1]. 

if we really want to get there, maybe repoman should give a _small_ 
warning, starting now.

i dont sign my commits and have seen how my commits removed signatures of 
others. i am not proud of it - but given that these are apparently never 
checked in any way, then no harm is done... or what?

Thilo

[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

^ permalink raw reply	[flat|nested] 18+ messages in thread

* Re: [gentoo-dev] Individual developer signing
  2009-12-03 10:32       ` [gentoo-dev] Individual developer signing Torsten Veller
  2009-12-03 12:51         ` Thilo Bangert
@ 2009-12-03 20:35         ` Robin H. Johnson
  2009-12-11 16:32           ` [gentoo-dev] " Torsten Veller
  1 sibling, 1 reply; 18+ messages in thread
From: Robin H. Johnson @ 2009-12-03 20:35 UTC (permalink / raw
  To: gentoo-dev

On Thu, Dec 03, 2009 at 11:32:42AM +0100, Torsten Veller wrote:
> * "Robin H. Johnson" <robbat2@gentoo.org>:
> > The GLEP on Individual developer signing has not made it into a Draft
> > yet.
> > 
> > But you can view the very brief version here:
> > http://sources.gentoo.org/viewcvs.py/gentoo/users/robbat2/tree-signing-gleps/02-developer-process-security?view=markup
> 
> [...]
> 
> > > 2.  Every developer signs everything 100% of the time (make it a QA
> > > check).
> > +1 on this.
> 
> In the GLEPs i missed the point where the signatures of Manifests are verified.
> Only the MetaManifest gets verified.
GLEP58:
under "Procedure for verifying an item in the MetaManifest"
4.2: "M2-verifying the contents of the Manifest."

Where "M2-verify" is the verb describing the verification of a Manifest.
It _may_ include signature validation.

> So what's the advantage of individually signed Manifests?
Basically making sure that your SSH keys weren't stolen.
They explicitly protect the commit from the developer to infrastructure.

MetaManifest protects the integrity of the contents from infrastructure
out to the user. It does NOT validate the functionality of the tree or
any prior injection.

> The only thing we can check: Is the key used for signing listed in ldap
> (and thus in "the keyring of automated Gentoo keys")? Are the keys in ldap
> really mine?
> Do I miss anything?
Later on I'd like to REJECT unsigned commits.

> BTW: About a third of the Manifests are signed [1]. We didn't improve
> since 2005/2006 [2]. The two parties are working hard against each other [3].
> 55 Manifests are signed by revoked keys [4].
> [1] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest.png
> [2] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/ratio_2005.png
> [3] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest2.png
> [4] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/signatures_by_revoked_keys.txt
Nice graphs. Can you show them over a larger timespan?

-- 
Robin Hugh Johnson
Gentoo Linux: Developer, Trustee & Infrastructure Lead
E-Mail     : robbat2@gentoo.org
GnuPG FP   : 11AC BA4F 4778 E3F6 E4ED  F38E B27B 944E 3488 4E85



^ permalink raw reply	[flat|nested] 18+ messages in thread

* [gentoo-dev] Re: Individual developer signing
  2009-12-03 20:35         ` Robin H. Johnson
@ 2009-12-11 16:32           ` Torsten Veller
  0 siblings, 0 replies; 18+ messages in thread
From: Torsten Veller @ 2009-12-11 16:32 UTC (permalink / raw
  To: gentoo-dev

* "Robin H. Johnson" <robbat2@gentoo.org>:
> > BTW: About a third of the Manifests are signed [1]. We didn't improve
> > [1] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest.png
> > [2] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/ratio_2005.png
> > [3] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest2.png
> Nice graphs. Can you show them over a larger timespan?

Yes, I recreated them from cvs and the keys available now.
[1] and [3] show the progress for the last year and [4] the history since May
2004.

- In Jan 2008 the transition to Manifest2 was finished and all
  signatures were dropped.
- I guess [2] didn't "require-cross-certification" while gnupg now
  defaults to "require-cross-certification".
  So the number of valid signatures in [4] is lower than in [2].

  After the "Manifest2"-break the level is lower.


[4] http://dev.gentoo.org/~tove/stats/gentoo-x86/Manifest/Manifest-all.png



^ permalink raw reply	[flat|nested] 18+ messages in thread

end of thread, other threads:[~2009-12-11 16:35 UTC | newest]

Thread overview: 18+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-11-25 21:50 [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Denis Dupeyron
2009-11-26  1:34 ` Brian Harring
2009-11-26  1:39   ` Zac Medico
2009-11-26 15:31   ` Ciaran McCreesh
2009-11-26 16:33     ` Brian Harring
2009-11-26 16:46       ` Ciaran McCreesh
2009-11-27  8:08         ` Brian Harring
2009-11-30 11:30 ` Antoni Grzymala
2009-11-30 11:41   ` Antoni Grzymala
2009-11-30 21:18   ` [gentoo-dev] GPG Infrastructure for Gentoo (Was Council Meeting) Richard Freeman
2009-11-30 22:28     ` Dawid Węgliński
2009-12-01  1:27     ` Robin H. Johnson
2009-12-03 10:32       ` [gentoo-dev] Individual developer signing Torsten Veller
2009-12-03 12:51         ` Thilo Bangert
2009-12-03 20:35         ` Robin H. Johnson
2009-12-11 16:32           ` [gentoo-dev] " Torsten Veller
2009-12-01  1:08   ` [gentoo-dev] Tree Integrity GLEPS for final review and council approval Robin H. Johnson
2009-11-30 17:57 ` [gentoo-dev] Next council meeting on 7 Dec 2009 at 1900UTC Thomas Sachau

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox