On Tue, Feb 5, 2013 at 9:28 AM, Donald Stufft <donald.stu...@gmail.com>wrote:

> On Tuesday, February 5, 2013 at 9:24 AM, Daniel Holth wrote:
>
> As long as you are trusting PyPI itself, a PyPI-hosted/signed/timestamped
> SHA2 hash of the file to be downloaded from an external host would be
> enough to detect tampering over time.
>
> You could do this, still lowers the overall availability of the system
> which kinda sucks, and
> to actually be sane and secure you'd still need to rework the current
> method of trolling for external
> urls.
>
>
> pip could come with a copy of PyPI's ssl certificate, verifying that it
> was identical to the expected cert rather than signed by one of 100s of
> trusted CAs.
>
> That loses the ability to change PyPI's SSL cert, basically forever and
> still doesn't protect MITM against
> someone logging into PyPI through a browser.
>

Or it could just notify you whenever the SSL certificate changed.
http://tack.io/ lets a site sign its SSL certificate with a key that
doesn't change. Of course doing SSL at all is the priority.
_______________________________________________
Catalog-SIG mailing list
Catalog-SIG@python.org
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to