On Fri, Aug 03, 2018 at 12:06:34PM -0400, Jeff King wrote:
> On Fri, Aug 03, 2018 at 11:43:44AM -0400, Santiago Torres wrote:
> 
> > > This is not a deviation. GPG correctly recognizes difference between 
> > > trusted,
> > > untrusted and unknown levels. git on the other hand does not. Well it did 
> > > until
> > > the commit a4cc18f29. That one removed GPG exit code propagation.
> > 
> > Oh wow. Sorry my assumption parted from looking at the code back in the
> > day where this happens. I assumed git was quietly propagating the gpg
> > error code and took it from there. 
> > 
> > Now that I think about it though, verify tag can verify more than one
> > tag. I assume that this would make it difficult to propagate individual
> > errors in trusting. I honestly don't know what's the best way to modify
> > this behavior then.
> 
> I think the only sensible thing is to err on the conservative side, and
> return non-zero if we saw _any_ invalid signature.
> 
> I will note, though, that just checking the exit code of `verify-tag`
> isn't really that thorough. It shows that there was _a_ signature, but
> we don't know:
> 
>   - if it was an identity the user would expect to be signing tags
> 
>   - if it even matches the refname we used to find the tag
> 
> So I'd argue that any real verification needs to either have a human in
> the loop, or implement a custom policy based on reading the full output.
> 
> I know we (and you specifically Santiago) talked about this a while ago,
> and we ended up providing ways to get more information out of
> verify-tag, so that a tool could sit on top of that and implement more
> project-specific policy. I don't know offhand of any reusable tools that
> do so, though.

I think that it would be even legit to exit on first tag verification failure. 
If
someone wants to really verify all tags then it can be done with simple for 
loop.
git that way does not have to solve problem of error combination.

>   - if it was an identity the user would expect to be signing tags
That can be done just by using trust levels.

>   - if it even matches the refname we used to find the tag
Can you explain this more? You mean that string (such as v1.1) used to lookup 
tag
object is not verified as part of that object?

OK I thing that it was enough of abstract concepts from me. Let me explain you
what am I trying to achieve. I am implementing feeds (in other words git
repositories with packages) and package sources verification for OpenWRT. We
(project Turris by CZ.NIC) are signing all our commits and all our tags. Now we
are using small script that is verifying our repositories just before we run
build. That is against keyring maintained on our server. I am trying to extend
that to whole OpenWRT tree. That introduces problem of having a lot of keys and 
a
lot of packages sharing same allowed keys. Fetching all allowed keys for every
package from key servers is just slow because of that I have to share those
between packages. In general there are two options. First one is to have cache 
of
already fetched keys in armor format. Second one is to have one keyring and by
setting all keys explicitly as never trusted with package given exception.
Unfortunately first option can't be used because of one other request that is 
from
our team. We don't want to be forced to update list of allowed contributors to 
our
projects every time we have new colleague. Solution we come up with is to have
central PGP key that signs our whole team and then verification is done by
allowing GPG to fetch additional keys with max-cert-depth 1. That brings me to 
git
verify-commit/tag that won't exit with zero code when signature is not trusted.

I have a solution for my problem (calling git verify-* twice and grep). That is
not the point of this email nor this contribution. The point is that although
GPG's behavior of exiting with 0 code when trust level is unknown is unexpected
but in the end understandable, git's behavior of exiting with 0 code even if key
is explicitly untrusted is just counterintuitive. I think that few people are
still going to get nasty surprise when I consider that this change was 
introduced
mid 2014 just after v2.4.0 and Ubuntu 14.04 lts (running even on part of our
infrastructure) still contains version 1.9.1 and in that release it was
acknowledging GPG exit code.

K.K.

Attachment: signature.asc
Description: PGP signature

Reply via email to