Simon Wilkinson wrote:

I think that regardless of whether or not you protect the signing key, you're trusting that the build host hasn't been compromised. If it has, an adversary could do anything to your rpm _before_ it gets signed by a protected key (or 100 other ways someone who has compromised the host can defeat the signing process).

Indeed. That was my point. None of the other mechanisms for signing (attended keys, organisational keys ...) actually give you any more assurance about RPM integrity than a random key that resides on the disk of the build machine and says "Machine X built this RPM".

I would disagree. If I see an RPM signed with "The One True Simon Wilkinson Key", as opposed to "Machine X" key, I would infer that to the extent I know Simon (he's written some good code, and he talks pretty good to a room full of people), I would guess he hasn't hacked back doors into the openafs RPMs he's signed, and that he hasn't allowed his build host to be compromised, etc. Likewise "The One True Openafs.org Key." Not so "Machine X" key. A signing key is the "Quality assurance" stamp of its owner. To me, it puts the reputation of the owner on the line for whatever it signs.

I think the question here is, who is taking responsibility for the RPMs? If these are Simon Wilkinson RPMs, then I think it's fine for them to be signed by Simon. If openafs.org is asserting that the RPMs are somehow blessed by the organization (which I think is implied by the current structure, but may not be intended), they should carry an openafs.org signature. Choosing who signs the RPMs could make these relationships clearer.

I don't think that the GPG key conveys anything with regards to these relationships. In fact, it may well just serve to muddy the water. What happens if we make the decision that the builder signs the RPM (after all, the builder is the only one who can actually vouch for the RPMs contents - be that a person, or an automated process) The signature has no bearing on the "official", or not, nature of the package. Ultimately, the place you get the RPMs from is probably the key signifier of their status - especially for users for whom GPG keys and webs of trust are a black art.

IMO, by signing an RPM, a person or organization is vouching for the contents of the RPM. If all you want is to be able to verify that an RPM hasn't become corrupt is transit, then a "Machine X" key is appropriate. Just don't make people download too many of them.

And, yes, lots of folks may overestimate what you're getting by verifying the signature of an RPM key. (Maybe you think I'm one of them (smile) That's OK too).

Dave
_______________________________________________
OpenAFS-info mailing list
[email protected]
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to