Re: Please review the draft for March's report

2024-04-12 Thread Chris Lamb
Holger Levsen wrote:

> I also like the final order of the entries, though when I skimmed
> through https://reproducible-builds.org/reports/2024-03/ I wondered
> whether we should add a table of contents to the top of each post?
>
> What do y'all think?

I used to always add one one, but haven't for a while. Still, the
bumper amount of news in this month's report month does seem to ask
for one... Added and pushed.


Best wishes,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2024-04-11 Thread Holger Levsen
Dear Chris et al,

On Thu, Apr 11, 2024 at 07:52:39PM +0100, Chris Lamb wrote:
> > Please review the draft for March's Reproducible Builds report:
> This has now been published — thanks to all who contributed.

great, thank you and everyone involved indeed!

I also like the final order of the entries, though when I skimmed
through https://reproducible-builds.org/reports/2024-03/ I wondered
whether we should add a table of contents to the top of each post?

What do y'all think?


-- 
cheers,
Holger

 ⢀⣴⠾⠻⢶⣦⠀
 ⣾⠁⢠⠒⠀⣿⡁  holger@(debian|reproducible-builds|layer-acht).org
 ⢿⡄⠘⠷⠚⠋⠀  OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
 ⠈⠳⣄

Manchmal kommt der Wind von Lee. (Konny)


signature.asc
Description: PGP signature


Re: Please review the draft for March's report

2024-04-11 Thread Chris Lamb
Chris Lamb wrote:

> Please review the draft for March's Reproducible Builds report:

This has now been published — thanks to all who contributed.

If possible, please share the following link:

  https://reproducible-builds.org/reports/2024-03/

.. and also consider retweeting:

  https://twitter.com/ReproBuilds/status/1778496263027093713


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2024-04-11 Thread kpcyrd

On 4/10/24 7:12 PM, Chris Lamb wrote:

Thank you for all the feedback so far. Unless someone makes these
changes to the draft themselves, I will attend to this (and all the
other critiques here and on Salsa) before publishing.


Thank you! I noticed I submitted the backseat-signed tool in early 
April, so it makes sense it's not being mentioned in the report for 
March. Sorry for the confusion on my end.


cheers,
kpcyrd


Re: Please review the draft for March's report

2024-04-10 Thread Chris Lamb
Holger Levsen wrote:

> On Wed, Apr 10, 2024 at 10:02:56AM -0400, David A. Wheeler via rb-general 
> wrote:
>> I agree, this one is HUGE news. There's been a lot of awesome work related 
>> to reproducible builds, but "minimal container userland is a 100% 
>> reproducible build in a real-world widely-used distro" is a big step forward 
>> and should be widely announced.
>
> agreed.
>
> I also think the news about Vagrant helping Debian to confirm the xz related
> builds have been fine, deserves a bigger headline.

Thank you for all the feedback so far. Unless someone makes these
changes to the draft themselves, I will attend to this (and all the
other critiques here and on Salsa) before publishing.


Best wishes,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2024-04-10 Thread Holger Levsen
On Wed, Apr 10, 2024 at 10:02:56AM -0400, David A. Wheeler via rb-general wrote:
> I agree, this one is HUGE news. There's been a lot of awesome work related to 
> reproducible builds, but "minimal container userland is a 100% reproducible 
> build in a real-world widely-used distro" is a big step forward and should be 
> widely announced.

agreed.

I also think the news about Vagrant helping Debian to confirm the xz related
builds have been fine, deserves a bigger headline.


-- 
cheers,
Holger

 ⢀⣴⠾⠻⢶⣦⠀
 ⣾⠁⢠⠒⠀⣿⡁  holger@(debian|reproducible-builds|layer-acht).org
 ⢿⡄⠘⠷⠚⠋⠀  OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
 ⠈⠳⣄

You cannot ban abortion. You can only ban safe abortions.


signature.asc
Description: PGP signature


Re: Please review the draft for March's report

2024-04-10 Thread David A. Wheeler via rb-general



> On Apr 10, 2024, at 7:42 AM, kpcyrd  wrote:
> 
> On 4/10/24 12:58 PM, Chris Lamb wrote:
>>   https://reproducible-builds.org/reports/2024-03/?draft
> 
> > Reproducible builds developer kpcyrd reported that that the Arch Linux 
> > "minimal container userland" is now 100% reproducible after work by 
> > developers dvzv and Foxboron on the one remaining package. The post, which 
> > kpcyrd suffixed with the question "now what?", continues on to outline some 
> > potential next steps, including validating whether the container image 
> > itself could be reproduced bit-for-bit. The post generated a significant 
> > number of replies.
> 
> Thanks for the kind words :) maybe it should be listed higher though, in its 
> own section, as "major accomplishment within the community"?

I agree, this one is HUGE news. There's been a lot of awesome work related to 
reproducible builds, but "minimal container userland is a 100% reproducible 
build in a real-world widely-used distro" is a big step forward and should be 
widely announced. Like press release level.

I routinely hear "reproducible builds are impractical". Yes, in some cases 
they're hard, but clearly there are cases where it's practical.

--- David A. Wheeler



Re: Please review the draft for March's report

2024-04-10 Thread kpcyrd

On 4/10/24 12:58 PM, Chris Lamb wrote:

   https://reproducible-builds.org/reports/2024-03/?draft


> Reproducible builds developer kpcyrd reported that that the Arch 
Linux "minimal container userland" is now 100% reproducible after work 
by developers dvzv and Foxboron on the one remaining package. The post, 
which kpcyrd suffixed with the question "now what?", continues on to 
outline some potential next steps, including validating whether the 
container image itself could be reproduced bit-for-bit. The post 
generated a significant number of replies.


Thanks for the kind words :) maybe it should be listed higher though, in 
its own section, as "major accomplishment within the community"?


It's also missing both the backseat-signed tool and the discussion in 
it's thread that highlights the idea of "maybe we should put unmodified 
git snapshots into .orig.tar.xz instead of allowing undocumented 
pre-processing", for the security properties this would have. 
Unfortunately the repo of the project is currently difficult to clone, 
I've put 60MB of test data into git LFS, but Github only grants 1GB of 
traffic on free tier, allowing about 16 clones. The files can currently 
not be downloaded because I'd need to buy data packs.


I also didn't have any time to continue the email thread, however I 
think I have made all my points sufficiently clear, for the people 
reading the thread in the future.


There's currently a similar discussion on hacker news: 
https://news.ycombinator.com/item?id=39988269


Thanks!


Please review the draft for March's report

2024-04-10 Thread Chris Lamb
Hi all,

Sorry for the delay in getting this out — it was, quite genuinely, a
bumper amount of things that needed condensing, rewriting and
generally getting into readable shape. Anyway, if folks would be so
kind as to review the draft for last months report here:

  https://reproducible-builds.org/reports/2024-03/?draft

… or, via the Git repository itself:

  
https://salsa.debian.org/reproducible-builds/reproducible-website/blob/master/_reports/2024-03.md

I intend to publish it no earlier than:

  $ date -d 'Thu, 11 Apr 2024 17:30:00 +0100'

  https://time.is/compare/1730_11_Apr_2024_in_BST

§

As ever, please feel free and commit/push to drafts directly without the 
overhead of
sending patches or merge requests. You should make your changes to the
"_reports/2024-03.md" file in the "reproducible-website" repository:

  $ git clone https://salsa.debian.org/reproducible-builds/reproducible-website
  $ cd reproducible-website
  $ sensible-editor _reports/2024-03.md

I am happy to reword and/or rework additions prior to publishing. If you
currently do not have access to the above repository, you can request access
by following the instructions at:

  https://reproducible-builds.org/contribute/salsa/


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2023-04-07 Thread Chris Lamb
Chris Lamb wrote:

> Please review the draft for March's Reproducible Builds report:

This has now been published — thanks to all who contributed.

If possible, please share the following link:

  https://reproducible-builds.org/reports/2023-03/

.. and also consider retweeting:

  https://twitter.com/ReproBuilds/status/1644283929598337024


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Please review the draft for March's report

2023-04-04 Thread Chris Lamb
Hi all,

Please review the draft for March's Reproducible Builds report:

  https://reproducible-builds.org/reports/2023-03/?draft

… or, via the Git repository itself:

  
https://salsa.debian.org/reproducible-builds/reproducible-website/blob/master/_reports/2023-03.md

I intend to publish it no earlier than:

  $ date -d 'Thu, 06 Apr 2023 14:15:00 +0100'

  https://time.is/compare/1415_06_Apr_2023_in_BST

§

Please feel free and commit/push to drafts directly without the overhead of
sending patches or merge requests. You should make your changes to the
"_reports/2023-03.md" file in the "reproducible-website" repository:

  $ git clone https://salsa.debian.org/reproducible-builds/reproducible-website
  $ cd reproducible-website
  $ sensible-editor _reports/2023-03.md

I am happy to reword and/or rework additions prior to publishing. If you
currently do not have access to the above repository, you can request access
by following the instructions at:

  https://reproducible-builds.org/contribute/salsa/


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 💠
⬊   ⬋
  o


Re: Please review the draft for March's report

2022-04-08 Thread Chris Lamb
Chris Lamb wrote:

> Please review the draft for March's Reproducible Builds report:

This has now been published — thanks to all who contributed. If
possible, please share the following link:

  https://reproducible-builds.org/reports/2022-03/

.. and also consider retweeting:

  https://twitter.com/ReproBuilds/status/1512343602600550400


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Please review the draft for March's report

2022-04-05 Thread Chris Lamb
Hi all,

Please review the draft for March's Reproducible Builds report:

  https://reproducible-builds.org/reports/2022-03/?draft

… or, via the Git repository itself:

  
https://salsa.debian.org/reproducible-builds/reproducible-website/blob/master/_reports/2022-03.md

I plan to publish it no earlier than:

  $ date -d 'Thu, 07 Apr 2022 17:00:00 +0100'

  https://time.is/compare/1700_07_Apr_2022_in_BST

§

Please feel free and commit/push to drafts without the overhead of
sending patches or merge requests. You should make your changes to the
"_reports/2022-03.md" file in the "reproducible-website" repository:

  $ git clone https://salsa.debian.org/reproducible-builds/reproducible-website
  $ cd reproducible-website
  $ sensible-editor _reports/2022-03.md

I am happy to reword and/or rework additions prior to publishing. If you
currently do not have access to the above repository, you can request access
by following the instructions at:

  https://reproducible-builds.org/contribute/salsa/


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2021-04-07 Thread Daniel Shahaf
Santiago Torres-Arias wrote on Tue, 06 Apr 2021 23:25 +00:00:
> > Thanks!
> > 
> > Where are those edits?  I don't see them in reproducible-website.git or in 
> > your reply.
> 
> Oh, I just pushed, my bad (I wanted to double check it rendered properly
> locally and I went down a rabbit hole of fixing my gen environment...).
> Let me know if this helps...

Much better, thanks!


Re: Please review the draft for March's report

2021-04-07 Thread Chris Lamb
Chris Lamb wrote:

> Please review the draft for March's Reproducible Builds report:

This has now been published; many thanks to all who contributed. Please
share the following URL:

  https://reproducible-builds.org/reports/2021-03/

And, if you are into that kind of thing, please consider
retweeting:

  https://twitter.com/ReproBuilds/status/1379833931076407307


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2021-04-07 Thread Chris Lamb
John,

> Could someone please review my request for access? I sent my request a
> month or so ago and would like to push typo fixes. My Salsa username is
> jscott.

Done! (For some reason salsa had stopped (?) notifying me that there were
folks waiting.)


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2021-04-06 Thread John Scott
On Mon, 2021-04-05 at 05:03 -0400, Chris Lamb wrote:
> Please feel free and commit/push to drafts without the overhead of
> sending patches or merge requests.
> If you currently do not have access to the above repository, you can
> request access by following the instructions at:
>   https://reproducible-builds.org/contribute/salsa/
Could someone please review my request for access? I sent my request a
month or so ago and would like to push typo fixes. My Salsa username is
jscott.


signature.asc
Description: This is a digitally signed message part


Re: Please review the draft for March's report

2021-04-06 Thread Santiago Torres-Arias
> Thanks!
> 
> Where are those edits?  I don't see them in reproducible-website.git or in 
> your reply.

Oh, I just pushed, my bad (I wanted to double check it rendered properly
locally and I went down a rabbit hole of fixing my gen environment...).
Let me know if this helps...
> 
> > I wasn't trying to be incredibly pedantic about the phrasing, but
> > rather to be upfront about sigstore not having a trust policy (yet).
> > Sigstore is actively working with communities (such as this one) to
> > better identify what policies make sense (e.g., to allow to represent
> > and enforce a build being reproducible).
> > 
> > > Given that you're involved the effort, and perhaps aware of plans to
> > > address this in the future, perhaps you could propose better text for
> > > the blog post?
> > 
> > Definitely, I should've engaged more with the early LF press-releases (I
> > try to stick to systems building, research and education). I supplied a
> > quote as a Purdue University professor, but that's as far as my
> > engagement was with the press push.
> > 
> > My earlier email is intended to help disambiguate. I agree that the
> > blogpost/announcement is quite content-free when read through with a
> > fine comb.
> 
> By "blog post" I actually intended to refer to r-b's monthly report,
> since that one is due to be published tomorrow, but clarifying
> sigstore's docs is of course also a good thing ☺

Oh, well, yeah... :)

Cheers!
-Santiago
> 
> Cheers,
> 
> Daniel


signature.asc
Description: PGP signature


Re: Please review the draft for March's report

2021-04-06 Thread Daniel Shahaf
Santiago Torres-Arias wrote on Tue, 06 Apr 2021 18:17 +00:00:
> On Tue, Apr 06, 2021 at 05:02:58PM +, Daniel Shahaf wrote:
> > > Do notice that verification is not part of the user story yet (i.e.,
> > > anybody can claim to own any artifact).
> > 
> > So, if I understand correctly, sigstore doesn't prove to third parties
> > that Alice had signed foo; rather, sigstore simply states "We have
> > witnessed Alice sign foo".  Alice doesn't actually need to be involved
> > for sigstore to be able to say that.  Thus, I think the technical
> > details boil down to """
> 
> Well, yes in a sense sigstore allows you to get a key based on oidc
> (similar to let's encrypt), or allows you to stick your usual signatures
> in the log (i.e., the witnessing element you're mentioning). Let me try
> to rephrase on the text below and see if I can help with that.
> 
> > 
> > diff --git a/_reports/2021-03.md b/_reports/2021-03.md
> > index 080f089..52dd630 100644
> > --- a/_reports/2021-03.md
> > +++ b/_reports/2021-03.md
> > @@ -18,8 +18,6 @@ In our monthly reports, we try to outline the most 
> > important things that have ha
> > ⋮
> 
> I made some minor edits, that I think may help with clarity.

Thanks!

Where are those edits?  I don't see them in reproducible-website.git or in your 
reply.

> I wasn't trying to be incredibly pedantic about the phrasing, but
> rather to be upfront about sigstore not having a trust policy (yet).
> Sigstore is actively working with communities (such as this one) to
> better identify what policies make sense (e.g., to allow to represent
> and enforce a build being reproducible).
> 
> > Given that you're involved the effort, and perhaps aware of plans to
> > address this in the future, perhaps you could propose better text for
> > the blog post?
> 
> Definitely, I should've engaged more with the early LF press-releases (I
> try to stick to systems building, research and education). I supplied a
> quote as a Purdue University professor, but that's as far as my
> engagement was with the press push.
> 
> My earlier email is intended to help disambiguate. I agree that the
> blogpost/announcement is quite content-free when read through with a
> fine comb.

By "blog post" I actually intended to refer to r-b's monthly report,
since that one is due to be published tomorrow, but clarifying
sigstore's docs is of course also a good thing ☺

Cheers,

Daniel


Re: Please review the draft for March's report

2021-04-06 Thread Daniel Shahaf
Good morning Santiago,

Santiago Torres-Arias wrote on Tue, Apr 06, 2021 at 10:50:20 -0400:
> > I think mentioning sigstore is value. Reproducible builds let you verify 
> > that
> > a given build *is* generated from a given source; sigstore can let you
> > verify that you got the *correct* source or build.
> 
> I think mentioning sigstore is a good idea (Full disclosure, I'm
> involved in the effort), and I think it's somewhat of a natural
> consequence to the work that Benjamin Hof[1] and Morten Linderud[2]
> (both of them involved in this very community) started talking about.
> 
> However, I don't think that "sigstore can let you verify that you got
> the *correct* source or build" is a correct way to frame things. For
> that, you would need something like in-toto (so as to verify that the
> source used is the same, that the output is the same, and that a
> threshold of builders agree on the result of the operation).
> 
> Sigstore is useful in answering questions about artifact discovery
> (i.e., to provide a log of the existing artifacts), when they appeared
> and to remove equivocation about an artifact being published. It in fact
> provides a pluggable type backend (early on, it was only in-toto
> attestations) so that you can upload different types of attestations
> about a software artifact. This way, you can upload signatures for
> artifacts that are cross-ecosystems.  Ideally, you can achieve a more
> global notion about the state of the software supply chain this way.
> 
> Do notice that verification is not part of the user story yet (i.e.,
> anybody can claim to own any artifact).

So, if I understand correctly, sigstore doesn't prove to third parties
that Alice had signed foo; rather, sigstore simply states "We have
witnessed Alice sign foo".  Alice doesn't actually need to be involved
for sigstore to be able to say that.  Thus, I think the technical
details boil down to """

diff --git a/_reports/2021-03.md b/_reports/2021-03.md
index 080f089..52dd630 100644
--- a/_reports/2021-03.md
+++ b/_reports/2021-03.md
@@ -18,8 +18,6 @@ In our monthly reports, we try to outline the most important 
things that have ha
 
 [F-Droid](https://www.f-droid.org/) is a large repository of open source 
applications for the Google Android platform. This month, Felix C. Stegerman 
announced [*apksigcopier*](https://github.com/obfusk/apksigcopier), a new tool 
for copying signatures for `.apk` files from a signed `.apk` file to an 
unsigned one which is necessary in order to verify reproducibly of F-Droid 
components. Felix  filed an [Intent to Package 
(ITP)](https://wiki.debian.org/ITP) bug in Debian to include it in that 
distribution, too ([#986179](https://bugs.debian.org/986179)).
 
-On 9th March, the Linux Foundation announced the 
[*sigstore*](https://sigstore.dev/what_is_sigstore/) project which is intended 
to improve the security of the software supply chains through cryptographically 
signed transparency log techniques. According to the [their 
announcement](https://linuxfoundation.org/en/press-release/linux-foundation-announces-free-sigstore-signing-service-to-confirm-origin-and-authenticity-of-software/):
-
-> sigstore will empower software developers to securely sign software 
artifacts such as release files, container images and binaries. Signing 
materials are then stored in a tamper-proof public log. The service will be 
free to use for all developers and software providers, with the sigstore code 
and operation tooling developed by the sigstore community.
+On 9th March, the Linux Foundation announced the 
[*sigstore*](https://sigstore.dev/what_is_sigstore/#what-is-sigstore) project, 
which is a centralized service that cryptographically signs release artifacts 
for developers who don't wish to manage their own PGP keypairs.
 
 [![]({{ "/images/reports/2021-03/openssf.png#right" | relative_url 
}})](https://openssf.org/)

""", but I'm sure you'll find this inaccurate, unfair, or worse.  Given
that you're involved the effort, and perhaps aware of plans to address
this in the future, perhaps you could propose better text for the blog post?

Cheers,

Daniel



Re: Please review the draft for March's report

2021-04-06 Thread David A. Wheeler



> On Apr 6, 2021, at 10:50 AM, Santiago Torres-Arias  
> wrote:
> 
>> I think mentioning sigstore is value. Reproducible builds let you verify that
>> a given build *is* generated from a given source; sigstore can let you
>> verify that you got the *correct* source or build.
> 
> I think mentioning sigstore is a good idea...
> However, I don't think that "sigstore can let you verify that you got
> the *correct* source or build" is a correct way to frame things.

I was trying to be “simple and one sentence”, which is necessarily imperfect.
How about this as the 1-sentence summary?:

“sigstore is designed to enable simpler cryptographic signing & signature 
verification”?

--- David A. Wheeler

Re: Please review the draft for March's report

2021-04-06 Thread Santiago Torres-Arias
> I think mentioning sigstore is value. Reproducible builds let you verify that
> a given build *is* generated from a given source; sigstore can let you
> verify that you got the *correct* source or build.

I think mentioning sigstore is a good idea (Full disclosure, I'm
involved in the effort), and I think it's somewhat of a natural
consequence to the work that Benjamin Hof[1] and Morten Linderud[2]
(both of them involved in this very community) started talking about.

However, I don't think that "sigstore can let you verify that you got
the *correct* source or build" is a correct way to frame things. For
that, you would need something like in-toto (so as to verify that the
source used is the same, that the output is the same, and that a
threshold of builders agree on the result of the operation).

Sigstore is useful in answering questions about artifact discovery
(i.e., to provide a log of the existing artifacts), when they appeared
and to remove equivocation about an artifact being published. It in fact
provides a pluggable type backend (early on, it was only in-toto
attestations) so that you can upload different types of attestations
about a software artifact. This way, you can upload signatures for
artifacts that are cross-ecosystems.  Ideally, you can achieve a more
global notion about the state of the software supply chain this way.

Do notice that verification is not part of the user story yet (i.e.,
anybody can claim to own any artifact).

Cheers!
-Santiago

[1] https://arxiv.org/abs/1711.07278
[2] https://bora.uib.no/bora-xmlui/handle/1956/20411
> 
> --- David A. Wheeler
> 


signature.asc
Description: PGP signature


Re: Please review the draft for March's report

2021-04-06 Thread Richard Purdie
On Tue, 2021-04-06 at 10:39 -0400, David A. Wheeler wrote:
> Press releases are not the best way to learn technical details :-).
> 
> I suggest adding a link to more details e.g.:
> 
> See https://sigstore.dev/what_is_sigstore/“>”What is sigstore" 
> for more details.
> 
> I think mentioning sigstore is value. Reproducible builds let you verify that
> a given build *is* generated from a given source; sigstore can let you
> verify that you got the *correct* source or build.

An interesting aside but Yocto Project sidesteps this issue by
encoding the checksums of the source tarballs in it's recipes
for software.

Whilst that doesn't guarantee it is the correct source, it means
that you're all using the same source and given the breadth of
use of the project, you'd assume differences would be noticed 
and can certainly be audited.

You'd be amazed how often we find projects that rebuild their
release tarballs :/

Cheers,

Richard




Re: Please review the draft for March's report

2021-04-06 Thread David A. Wheeler
Press releases are not the best way to learn technical details :-).

I suggest adding a link to more details e.g.:

See https://sigstore.dev/what_is_sigstore/“>”What is sigstore" for 
more details.

I think mentioning sigstore is value. Reproducible builds let you verify that
a given build *is* generated from a given source; sigstore can let you
verify that you got the *correct* source or build.

--- David A. Wheeler



Re: Please review the draft for March's report

2021-04-06 Thread Chris Lamb
Daniel Shahaf wrote:

> It's not our business to fix their press release, of course, but if we
> link to something, we should ensure _our_ readers will be able to tell
> what we link to and why it's significant.  If their press release doesn't
> explain that, then we could explain those bits ourselves, or link to
> a more technical write-up [...]

The Linux Foundation's press release is indeed rather content-free,
even after we factor in that they have a different target audience in
mind.

If you have an alternative phrasing (or links to a more-technical
write-up), please feel free to go ahead and commit that; I'm not
wedded to the current text, and would prefer that these reports were
less of a solo effort. Another solution you may wish to explore is
truncating or otherwise shortened this entry — that would have the
effect of deprioritising it, thus making the lack of hard/technical
detail less of a problem when considered in context.


Regards,

--
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 
⬊   ⬋
  o


Re: Please review the draft for March's report

2021-04-06 Thread Bernhard M. Wiedemann
On 06/04/2021 02.24, Daniel Shahaf wrote:
> I don't understand from that post what's so significant about sigstore,
> even after having followed the link to upstream's press release.  

I think, the problem that it tries to address is that most (90%?) of
upstreams publish just tarballs/zipfiles without a cryptographic
signature. E.g. [1]
So as a packager, I download the file and have no way to verify that I
got what the author meant to publish.

Now, if you have a third party that also downloads the file and
publishes a signature over what it got, you at least have another data
point that helps you verify that your local wifi or a rogue mirror did
not mitm your transfer or that at least everyone gets the same version
(you could call it "reproducible downloads").

If it ever happens that such a 3rd party signing key leaked, you do not
want years of signatures to become worthless => this is why they make
keys short-lived - similar to how you can make syslogs tamper-proof.


[1]  https://ftp.gnu.org/gnu/autoconf/
 https://avahi.org/download/
 https://download.gnome.org/sources/audiofile/0.3/
 http://mirror.synyx.de/apache/httpd/mod_fcgid/


Re: Please review the draft for March's report

2021-04-05 Thread Daniel Shahaf
Chris Lamb wrote on Mon, 05 Apr 2021 09:03 +00:00:
> Please review the draft for March's Reproducible Builds report:
> 
>   https://reproducible-builds.org/reports/2021-03/?draft

I don't understand from that post what's so significant about sigstore,
even after having followed the link to upstream's press release.  

The key technical points of upstream's PR seem to be:

> > Signing materials are then stored in a tamper-proof public log

> > Very few open source projects cryptographically sign software
> > release artifacts

> > sigstore seeks to solve […] by utilization of short lived
> > ephemeral keys with a trust root leveraged from an open and
> > auditable public transparency logs.

but none of that says what sigstore _actually does_, what attacks it
aims to thwart, why it's new/significant…

It's not our business to fix their press release, of course, but if we
link to something, we should ensure _our_ readers will be able to tell
what we link to and why it's significant.  If their press release doesn't
explain that, then we could explain those bits ourselves, or link to
a more technical write-up (cf. https://m.xkcd.com/1301/), etc..

HTH,

Daniel


Please review the draft for March's report

2021-04-05 Thread Chris Lamb
Hi all,

Please review the draft for March's Reproducible Builds report:

  https://reproducible-builds.org/reports/2021-03/?draft

… or, via the Git repository itself:

  
https://salsa.debian.org/reproducible-builds/reproducible-website/blob/master/_reports/2021-03.md

I intend to publish it no earlier than:

  $ date -d 'Wed, 07 Apr 2021 16:00:00 +0100'

  https://time.is/compare/1600_07_Apr_2021_in_BST

§

Please feel free and commit/push to drafts without the overhead of
sending patches or merge requests. You should make your changes to the
"_reports/2021-03.md" file in the "reproducible-website" repository:

  $ git clone https://salsa.debian.org/reproducible-builds/reproducible-website
  $ cd reproducible-website
  $ sensible-editor _reports/2021-03.md

I am happy to reword and/or rework additions prior to publishing. If you
currently do not have access to the above repository, you can request access
by following the instructions at:

  https://reproducible-builds.org/contribute/salsa/


Regards,

-- 
  o
⬋   ⬊  Chris Lamb
   o o reproducible-builds.org 💠
⬊   ⬋
  o


Re: Please review the draft for March's report

2020-04-07 Thread Chris Lamb
Chris Lamb wrote:

> Please review the draft for March's Reproducible Builds report:

This has now been published; many thanks to all who contributed.

Please share the following URL:

  https://reproducible-builds.org/reports/2020-03/

Alternatively, if you are into that kind of thing, please consider
retweeting:

  https://twitter.com/ReproBuilds/status/1247457901637140480


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-


Re: Please review the draft for March's report

2020-04-06 Thread Holger Levsen
Hi Chris,

On Sat, Apr 04, 2020 at 02:06:03PM +0100, Chris Lamb wrote:
> Please review the draft for March's Reproducible Builds report:
>   https://reproducible-builds.org/reports/2020-03/?draft

looks good to me, thanks!


-- 
cheers,
Holger

---
   holger@(debian|reproducible-builds|layer-acht).org
   PGP fingerprint: B8BF 5413 7B09 D35C F026 FE9D 091A B856 069A AA1C


signature.asc
Description: PGP signature


Please review the draft for March's report

2020-04-04 Thread Chris Lamb
Hi all,

Please review the draft for March's Reproducible Builds report:

  https://reproducible-builds.org/reports/2020-03/?draft

… or, via the Git repository itself:

  
https://salsa.debian.org/reproducible-builds/reproducible-website/blob/master/_reports/2020-03.md

I intend to publish it no earlier than:

  $ date -d 'Tue, 07 Apr 2020 10:30:00 +0100'

  https://time.is/compare/1030_07_Apr_2020_in_BST

§

Please feel free and commit/push to drafts without the overhead of
sending patches or merge requests. You should make your changes to the
"_reports/2020-03.md" file in the "reproducible-website" repository:

  $ git clone https://salsa.debian.org/reproducible-builds/reproducible-website
  $ cd reproducible-website
  $ sensible-editor _reports/2020-03.md

I am happy to reword and/or rework additions prior to publishing. If you
currently do not have access to the above repository, you can request access
by following the instructions at:

  https://reproducible-builds.org/contribute/salsa/


Regards,

-- 
  ,''`.
 : :'  : Chris Lamb
 `. `'`  la...@debian.org / chris-lamb.co.uk
   `-