On Fri, Jul 17, 2009 at 11:08:00AM -0700, Brian Aker wrote:
> Any thoughts on this:
> http://blogs.gnome.org/jamesh/2007/10/04/signed-revisions-with-bazaar/
>
> I'd like to look at starting to do this at some point.

I like the git way more: SHA1 hash of the tree. So veriying that the
repository is okay is just checking the checksums in the tree (and if
you check out a revision using a known good SHA1, you have a known good
revision).

The signed revisions approach only really works for protecting against
malicious modifications of the source tree iff each 'head' revision is a
merge that has been signed.

During (for example) a bisect, you could easily hit* unsigned revisions
that have been maliciously modified and then run that code on your
machine.

Also, since unsigned revisions are also valid.. there's the possibility
of just removing the signature and modifying the revision - and
depending on various things**, this may only be exposed to people creating
a new branch.


So I'm only convinced of it's partial usefulness.... but would love to
be shown to be very wrong :)


* very much depending on how the repository stores things... which I'm
no longer 100% sure if this attack vector is possible.

** based on a bit of guesswork here.
-- 
Stewart Smith

_______________________________________________
Mailing list: https://launchpad.net/~drizzle-discuss
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~drizzle-discuss
More help   : https://help.launchpad.net/ListHelp

Reply via email to