Hi Willy,

On 30/07/2018 19:55, Willy Tarreau wrote:
On Mon, Jul 30, 2018 at 07:41:33PM +0200, Tim Düsterhus wrote:
Willy,

Am 30.07.2018 um 18:05 schrieb Willy Tarreau:
> A small update happened to the download directory, the sha256 of the
> tar.gz files are now present in addition to the (quite old) md5 ones.
> We may start to think about phasing md5 signatures out, for example
> after 1.9 is released.

I'd even like to see PGP signatures, like you already do for the git
tags (but not the Tarballs). But this is a greater change than just
updating the checksums :-)

I know and I've already thought about it. But I personally refuse to store
my PGP key on any exposed machine. Right now in order to tag, I have to
SSH into an isolated machine, run "git pull --tags", create-release, and
"git push --tags". Then I upload the release.

What I don't like with PGP on an exposed machine is that it reduces the
size of your 4096-bit key to the size of your passphrase (which most
often contains much less than the ~700 characters it would need to be
as large), and also increases your ability to get fooled into entering
it. Some would call me paranoid, but I don't think I am, I'm just trying to keep a balanced level of security, knowing that the global one is not
better than the weakest point.

If I wanted to sign the images, it would require to find a different
release method and would significantly complicate the procedure.

I know old farts don't change, but for the two cents, newer version of OpenSSH (>= 6.7) and GnuPG (>=2.1.1) allow you to forward GnuPG agent over SSH with reduce capacity to reduce the attack surface you are mentioning. More details are available on https://wiki.gnupg.org/AgentForwarding

Cheers

--
Bertrand

Reply via email to