On Thursday, February 7, 2013 at 10:50 AM, Giovanni Bajo wrote:

1. If we're going to implicitly trust PyPI when it says that key X is valid for 
package Y,
    do we really gain much here? If we're trusting PyPI then we only really 
need secure
    ingress and egress neither of which need packaging signing.

2. Any solution that includes the step "install GPG" is going to leave a 
significant
    portion of people without it. If the tools mandate GPG then people won't 
upgrade,
    if the tools don't mandate it people will skip that step. We (probably) 
won't be
    using GPG's trust model so it ends up being just a "dumb" signature method 
of
    which there are multiple. If we're going to sign packages we should be 
looking at
    something that we can ship out of the box with Python proper at least in 
future
    releases. (And I really didn't want to get into Bikeshedding Signature 
methods :/ ).


Let's keep in mind a few things:
    - The right answer might be "not to sign packages", With proper 
egress/ingress protections
      we have a huge avenue of attack solved. Slapping signatures that don't 
buy us anything
      additional but introduce complexity is a net loss.
    - This isn't an urgent pressing issue. Make sure we take the time to 
explore all the options,
      including the take no action option, and arrive at a good solution.
    - A lot of this discussion is going around in circles because there are no 
parameters, threat
      model, requirements, or anything else of that nature. It would be more 
useful at this point
      to figure out what exactly we are trying to achieve before running off 
half cocked to achieve
      "something with package signatures".
_______________________________________________
Catalog-SIG mailing list
[email protected]
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to