Hello all!

Today I was thinking about the security implications of automatically
downloading and intalling a LuaRocks release, and I noticed that
releases are not signed in any way, and are served over plain ol' HTTP
(read: no encryption). It would be interesting to be able to know
whether a release tarball has been tampered with, to be confident that
harmful code has not been introduced.

I have an idea [1] a possible workaround when using Rockz (a Zsh plugin
which provides a virtualenv-alike tool), but it would still be a good
thing that releases would be provided with an accompanying PGP
signature. This would be as easy as running:

   % gpg --detach-sign --armor luarocks-X.Y.Z.tar.gz

and including the generated “luarocks-X.Y.Z.tar.gz.asc” file in the
releases download page. In order to verify the signature, once the
signature and the tarball are downloaded in the same location, this
would be done:

   % gpg --verify luarocks-X.Y.Z.tar.gz.asc

Is there any chance that upcoming releases could be signed?

Cheers, and thanks for listening^W reading :-)

--
 ☛ Adrián

P.S: A different topic (interesting by itself) would be having support
     for providing signed rocks/rockspecs, and that “luarocks install”
         would verify the signatures of the packages it is installing...

[1] https://github.com/aperezdc/rockz/issues/2

Attachment: signature.asc
Description: signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Luarocks-developers mailing list
Luarocks-developers@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/luarocks-developers

Reply via email to