Hey :)

On 9/2/25 1:55 PM, Guillem Jover wrote:
To be very honest, I've seen the reproducible and key rotation problems
to be such a concern that I don't think we'd want to have those in the
archive. I think embedded signatures do make sense if your primary way
to transport .debs is off-repos and/or you also want to track provenance,
have a small set of binaries, or are prepared to rebuild everything to
be able to re-sign (even on a stable release), otherwise for something
like Debian the current repo-signing has always felt superior in all
possible ways.

I think there is a certain appeal if we could trust the archive only for versioning (i.e. the set of packages in a suite) and not for content. But that would be very far from where we are and key rotation would need to be built into the system. At which point it should probably be some sort of detached signature, not an embedded one.

And IMA has indeed the same exact problem, where I'm also not convinced
at all about them for the Debian archive. Yet, I still think it would
be nice to have a format that might make it possible to explore that,
because perhaps for some organizations or distribution methods it does
make sense. (Because decoupling the IMA signatures from the general
filesystem metadata payload means injecting or changing them is going
to be way easier.)

Yeah that's fair. Having a format where you can just append some signatures on the fly might make sense here. But then maybe they would need to be authenticated differently than the repo root of trust.

Kind regards and thanks for working on this
Philipp Kern

Reply via email to