Julian Andres Klode <j...@debian.org> writes:

> I'm strongly opposed to add support for these off-the-shelve solutions.
> We need end-to-end control of all aspects of signing.
>
> What we learned with OpenPGP is that we don't want to be tied to third
> party off-the-shelve solutions as we cannot control the cryptography and
> are subject to the whims of their developers.
>
> Hence we're still stuck with 1024-bit RSA keys in freaking 2024.
>
> I have started apt-sign to get rid of the horrors of OpenPGP and get
> a sensible format. I still have to make some changes to it, but if
> we want to have a solution it essentially will boil down to adding
> this to the Signatures field which will have lines of the form:
>
>   <algorithm> <base64-blob>
>
> where <algorithm> currently is apt-ed448 or apt-ed25519.
>
> It's entirely possible to require signatures from multiple keys
> and implement co-signing that way rather than bolt on off-the-shelve
> crap that we cannot control.

That seems interesting, where can we find this implementation?  I can't
find a branch or merge request.

Where is the Signature: field placed?  Inside the (In)Release file?

All the above seems orthogonal to support for key-usage transparency
mechanisms.  Do you plan to implement that too?  What protocol?

If not, your signature method ought to be extended to support some
key-usage transparency method, in some similar way to what I proposed
how to extend our current PGP-based verification with key-usage
transparency support.  Sigstore and sigsum are two methods that I am
aware of, but there may be others.

Or, finally, if there will be no built-in key-usage transparency method
in apt, and no support for extensions to add support, this will be
supported externally to apt by those who care about it.

/Simon

Attachment: signature.asc
Description: PGP signature

Reply via email to