previously on this list Jean-Philippe Ouellet contributed:

>     The OpenBSD project does not digitally sign releases. The above
>     command only detects accidental damage, not malicious tampering.
>     If the men in black suits are out to get you, they're going to
>     get you.
> 
> It seems the men in black /are/ out to get everyone after all.

I'm sure the build systems are ace and know little about
them aside from espies talks and posts and that they have a good
track record. Also odd program behaviour may get picked up by many
users of a central package. I also love the introduction of signify.

However considering the complexity of building and especially all of the
ports and it may also be mentioned elsewhere in the FAQ already or
considered obvious but considering signify provides trust of OpenBSD
being the source of the built packages and not upstream source code
being guaranteed. 

Then I wonder if it's worth keeping some sort of disclaimer or line
about "black suits" or other highly resourced powers in that it is
suitable to most situations but obviously no replacement for a well
audited and specifically targeted/secured building process and targeted
source review where resources are available though most likely only
close to possible for a few particular ports and where you hope the
compiler(s) are trustable?


Perhaps the following line from your patch and Ken's book (that I
haven't read yet unfortunately) covers it all already and more?

After that you can add whatever measures of real-life verification you
see fit.

-- 
_______________________________________________________________________

'Write programs that do one thing and do it well. Write programs to work
together. Write programs to handle text streams, because that is a
universal interface'

(Doug McIlroy)

In Other Words - Don't design like polkit or systemd
_______________________________________________________________________

Reply via email to