Sent from my iPad

> On 17 Feb 2023, at 07:10, Fabian Keil via curl-library 
> <curl-library@lists.haxx.se> wrote:
> 
> Diogo Sant'Anna via curl-library <curl-library@lists.haxx.se> wrote on 
> 2023-02-16 at 16:33 

>>   Moving your release process (i.e., the packaging of the tarball) to an
>>   automated script in GitHub Actions (GHA).
> 
> Are you suggesting that creating the release on (IMHO) untrustworthy
> and proprietary GitHub infrastructure is more secure than using a
> system Daniel controls?
> Should the OpenPGP key that is used to sign the releases copied
> to GitHub infrastructure as well?
> In my opinion this would be a step in the wrong direction.

As someone whose has spent a significantly proportion of the last two years 
trying to secure against supply chain attacks in Java land I would concur that 
this would be a huge step back. A lot of built artifacts come with a signature 
assigned to a robot on insecure infrastructure, why should I trust either the 
artifact or the signing key (particularly since the owners often don’t publish 
them anywhere and change them on a whim)?

As it stands if we needed to include a curl shipped artifact in our bundle I 
could have it set up to be trusted in 5 minutes. If this change happened I 
would be struggling to proceed and instead would build from source 
-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to