From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id 2D1201384B4 for ; Mon, 14 Dec 2015 03:02:04 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 6480021C02F; Mon, 14 Dec 2015 03:01:52 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 4CC2721C025 for ; Mon, 14 Dec 2015 03:01:51 +0000 (UTC) Received: from professor-x (S010634bdfa9ecf80.vc.shawcable.net [96.49.31.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: dolsen) by smtp.gentoo.org (Postfix) with ESMTPSA id E6B37340928 for ; Mon, 14 Dec 2015 03:01:49 +0000 (UTC) Date: Sun, 13 Dec 2015 19:00:45 -0800 From: Brian Dolbec To: gentoo-dev@lists.gentoo.org Subject: Re: [gentoo-dev] repo/gentoo.git, or how committing is challenging Message-ID: <20151213190045.1e186781.dolsen@gentoo.org> In-Reply-To: <20151213222001.0c1c466a3f3b8b0b53c69a9d@gentoo.org> References: <566DACB3.2010105@gentoo.org> <20151213222001.0c1c466a3f3b8b0b53c69a9d@gentoo.org> Organization: Gentoo Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@lists.gentoo.org Reply-to: gentoo-dev@lists.gentoo.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; boundary="Sig_/UFbJH3GiPGK2.0CrP0Q.0uk"; protocol="application/pgp-signature" X-Archives-Salt: d791b520-5d05-4060-bfd7-e060fa2e21b9 X-Archives-Hash: b9708fa10e7610d4a34df8a82b559e31 --Sig_/UFbJH3GiPGK2.0CrP0Q.0uk Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable On Sun, 13 Dec 2015 22:20:01 +0300 Andrew Savchenko wrote: > Hi, >=20 > On Sun, 13 Dec 2015 18:36:51 +0100 Patrick Lauer wrote: > > Oh hey. We're in the future. Let's try to commit something to > > repo/gentoo.git! > >=20 > > So apparently we're signing things with gpg now, so let's read the > > official documentation. > > The [1] wiki seems to be the canonical location for such things. ... > > Since signing is mandatory since the git migration, ahem, this means > > that no one in the last 5 months(!) actually followed the > > documentation (because that does NOT work!). I'm almost impressed, > > but, wow, this is enterprisey. =20 >=20 > It is absolutely possible to create correct gpg key, put it into > LDAP according to GLEP and to sign commits and pushes properly. > What is not currently possible is to verify all tree automatically. >=20 > I agree that gkeys needs more work. But we are all volunteers here. > You may help them if you are that interested into this > functionality. >=20 > What worries me more that we still have no way for rsync users to > verify the portage tree (or Gentoo tree in the newspeak someone > prefers here). And most users use rsync. >=20 > > So, what can we do to make this whole story of 'commit (and push) to > > repo/gentoo.git' make sense? And why do I appear to be the only one > > to notice this chain of breakage?! =20 >=20 > We need to complete gkeys project, right? That's not all of the > story, but a start. So send patches :) As for the full story, we > still need to somehow verify rsync tree. For now only snapshots are > verified. > =20 > Best regards, > Andrew Savchenko Thank you Andrew. Let me first say, that while I am leading the gentoo-keys project. I have not been doing much with making progress to get another release out. My time is mostly taken up by full time work, add some health issues (not serious), plus with coding full time now (it was just a hobby before). I am finding it difficult to switch codebases to keep development going in a non work project. There is a certain amount of time needed to get back into the code to make any significant progress. But, one of the biggest things keeping me from doing more work on it when I do have some time, is the fact that barely any of the devs seem to care (other than the OP, who just seems to bitch about everything not working for him). Since the GLEP 63 spec has been approved. Barely any of the gentoo developers have even tried to update their gpg key or generate a new one that does meet the spec. For that reason, I have not endeavored to get more done in it. I've been trying to keep the gentoo-devs seed file reasonably up to date, but since there are few devs actually fixing or generating new keys, it is not needed that often. In fact weeks go by before there is a change in LDAP in regards to gpg keys. As Andrew pointed out in another reply, there is a fairly decent document about generating new gpg keys either directly using gpg or using gkeys-gen (gkeys-gen-9999) has the most troublesome bugs fixed in it btw). But lets get back to the OP's gpg keys. dolsen@vulture /var/lib/gkeys $ gkeys spec-check -C gentoo-devs -n patrick Checking keys... patrick, Patrick Lauer: 0x10F17899A28441CC, 0xA8447784E52864CE =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ---------- Fingerprint......: 0A0901B8F018D5D6A4A31A4410F17899A28441CC Key type ........: PUB Capabilities.: sc =20 Algorithm........: Pass Bit Length...: Fail Create Date......: Pass Expire Date..: Pass Key Version......: Pass Validity.....: e, Expired Days till expiry.: 0 =20 Capability.......: Pass =20 Qualified ID.....: Fail <=3D=3D '@gentoo.org' user id not found This primary key.: Fail ---------- Fingerprint......: 043F1AB5B35382E666BDBEA4058F9332F0BAE0B1 Key type ........: SUB Capabilities.: e =20 Algorithm........: ---- Bit Length...: ---- Create Date......: Pass Expire Date..: Pass Key Version......: Pass Validity.....: e, Expired Days till expiry.: 0 =20 Capability.......: Pass =20 Qualified ID.....: Fail <=3D=3D '@gentoo.org' user id not found This subkey......: Fail Key summary primary..........: Fail signing subkey: Fail encryption subkey: No authentication subkey: No =20 SPEC requirements: Fail ---------- Fingerprint......: F941D86BAA0D851BFE411493A8447784E52864CE Key type ........: PUB Capabilities.: scaESCA =20 Algorithm........: Pass Bit Length...: Fail Create Date......: Pass Expire Date..: Fail Key Version......: Pass Validity.....: -, Unknown Days till expiry.: infinite <=3D=3D Exceeds specification Capability.......: Pass =20 Qualified ID.....: Pass =20 This primary key.: Fail ---------- Fingerprint......: 8FE9C051CD0859ED2E03274104711EEBFBF3D64A Key type ........: SUB Capabilities.: e encrypt Algorithm........: ---- Bit Length...: ---- Create Date......: Pass Expire Date..: Fail Key Version......: Pass Validity.....: -, Unknown Days till expiry.: infinite <=3D=3D Exceeds specification Capability.......: Pass =20 Qualified ID.....: Pass =20 This subkey......: Fail Key summary primary..........: Fail signing subkey: Fail encryption subkey: Yes authentication subkey: No =20 SPEC requirements: Fail No signing capable subkey: Patrick Lauer : 0A0901B8F018D5D6A4A31A4410F17899A28441CC Patrick Lauer : F941D86BAA0D851BFE411493A8447784E52864CE No Encryption capable subkey (Notice only): Patrick Lauer : 0A0901B8F018D5D6A4A31A4410F17899A28441CC Incorrect bit length: Patrick Lauer : 0A0901B8F018D5D6A4A31A4410F17899A28441CC Patrick Lauer : F941D86BAA0D851BFE411493A8447784E52864CE Expiry keys: Patrick Lauer : 8FE9C051CD0859ED2E03274104711EEBFBF3D64A Patrick Lauer : F941D86BAA0D851BFE411493A8447784E52864CE Failed to pass SPEC requirements: Patrick Lauer : 0A0901B8F018D5D6A4A31A4410F17899A28441CC Patrick Lauer : F941D86BAA0D851BFE411493A8447784E52864CE Gkey task results: =20 Found Failures: ------- Revoked................: 0 Invalid................: 0 No Signing subkey......: 2 No Encryption subkey...: 1 Algorithm..............: 0 Bit length.............: 2 Expiry.................: 2 Expiry Warnings........: 0 SPEC requirements......: 2 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D SPEC Approved..........: 0 dolsen@vulture /var/lib/gkeys $=20 Like so many of the dev's gpg keys, they can not ever meet the new spec because the bit length of the keys are unsatisfactory and proven to be crackable. Of which, both of his 2 registered (in LDAP) gpg keys are still the insecure type. At least his first one is now expired, but he has not attempted to remove it from LDAP, hmm... Since he has in the past generated gpg keys on 2 separate occasions, You would think he should be able to generate a new gpg key that does meet the GLEP 63 spec. But we have not seen any change in gpg keys nor had requests for help. Just complaints. I'm sorry, but I'm not volunteering my time to things in Gentoo just because I want to please someone that lately just seems to bitch and moan about things not being a single button or keypress fixable for him. We have offered help to devs many times in the past, but few have taken us up on it and fixed or generated a new gpg key. It has been my contention these past few months that the only way to get devs to fix their gpg keys or generate new ones will be to enforce GLEP 63 approved gpg keys for commit access. I know, that will almost completely stall out progress in the gentoo tree for a while. But it seems that is the only way many people will get off their ass and finally do something about it. As for gkeys integration into portage to be able to verify the manifests. It was not difficult, I had preliminary code working in it in just a few days for both portage and pkgcore. It would use gkeys to do the verification since it controlled the gpg key directories and keyrings. Both Zac and Tim said the tie ins should be done a little differently, but I still had code that did the job. I have a gpg wrapper script that git can be configured to use instead of gpg directly. That way it can use the gkeys keyring system. GPG still does the verification work, gkeys just controls the keyrings it sees) One of the things preventing it from mainstream was properly wrapping only the verify, but re-spawn ggp to do any signing (signed commits) without interference from any of gkeys. I believe I have that done now, but it has not been through enough testing to go into a release. It is very close I think. So volunteers please emerge gkeys-9999 and test the gkeys-gpg script and libs. I need to finish up a few more re-writes of a few more maintenance actions to follow the rest of the code changes Pavlos did as part of his GSOC project work. It should then be ready for another release. There have been some changes in the newest versions of gpg that I have been coming across. I am updating pyGPG to handle them as I discover them. So if anyone testing the live version find one, please report it with the traceback so we can update the code for it. Sorry in advance for spouting off some, but I found Patrick's original post in this thread quite offensive. After all a first release of gkeys-0.1 of a new developing code base had some bugs once tested on a wider machine and user base. Oh my, that has never happened before in the history of computing!!!! Patrick, I think it's time you put up or shut up. Bringing up shortcomings or other things that need attention is useful, but your near constant bitching is quite tiresome. You could start by fixing your own gpg key situation. If you don't find adequate documentation to do it, then create a some that does meets your satisfaction. --=20 Brian Dolbec --Sig_/UFbJH3GiPGK2.0CrP0Q.0uk Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1 iQJ8BAEBCgBmBQJWbjDdXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRBNUQ3Qzc0RTA4MUNDNzBEQjRBNEFBRjVG QkJEMDg3Mjc1ODIwRUQ4AAoJEPu9CHJ1gg7YnyYP/j4OCnXfrugYBN6Wal/k856Q nSx2xLZ2cB8Bdhr6MfuooNyAcLP6WYdy+W7zvfNZ/ZDTk9czxE1qHXxjZAnKHW8b ac9yxpiM8eMD6Bg5ed6LvwP9clc3y08lBCw2ZDV6GVhm3XLiIP4pLAGsCaa1H+DS BEMYm3mgfUz3ZtKA2f4o8tIZDdDlksD/3bdBZ2vi7Vzt0f9NoUXjnCmu2x/HDjWQ I6oCttr9tHC2xIt1J93ch6IwiB9e9XAsmPbNKY2SzMLLYy/rkLABV3T8Jm8P8nE3 uXGudX0F5DFHdLA0omL84MrC+VmOnCIPTesxQV//j4AU0KMO8QdhaxRBL+dVePwe WIBRdk95lQ789YTX5sjPr9oiub+C2OhlVrIqkqLE9xN0DQwHpHX1405R2tLWEheY nXEfrABJDZ2wlpX7WsSVWX4VrGw1xSWTTFN+2rNmkn+3W2WX1ScDx3e/JYneoShG PxXkfMeZqdEFc9gR+g0nHrOuK5n44sfIRwe/z4YzyN0PqafS+jXWHMU+Vr+S8dyN LvW+b7d8uenGX7YDG1gYbFPa75t3uSppysTfojvQpE77o97oAX5k3IXkQ0J+ysGY GkqqyP4aly9Uzu4rcwMSyLnyeCZ4w2tz36Me6ULs8ioFDTFRXWpdM1YZWyCBN0Uk IkB/vyNRfziq+BB6iBrU =ZuAj -----END PGP SIGNATURE----- --Sig_/UFbJH3GiPGK2.0CrP0Q.0uk--