Maybe we could investigate how the Maven folks handle this problem.  I
know they had to address similar security concerns related to their
central repository, and have had a few years (and a major redesign in
Maven2) to think about the problem.

-- Chad

On 1/17/07, Tom Copeland <[EMAIL PROTECTED]> wrote:
> > > Hm, but that gem wouldn't be deployed on the RubyForge gem index
> > > unless it was uploaded to the rails project on RubyForge... so only
> > > folks who deliberately downloaded the gem from your project
> > area would
> > > get p0wnd...
> >
> > That's a good start, but it doesn't address the situation
> > where one of the mirrors or RubyForge itself is compromised,
> > and a malicious gem is forcibly inserted into the rotation.
>
> Oh, yup, you're quite right there.  I agree with your comments about gem
> signing and such too... but I'm not sure how to help make that happen...
>
> Yours,
>
> Tom
>
> _______________________________________________
> Rubygems-developers mailing list
> Rubygems-developers@rubyforge.org
> http://rubyforge.org/mailman/listinfo/rubygems-developers
>
_______________________________________________
Rubygems-developers mailing list
Rubygems-developers@rubyforge.org
http://rubyforge.org/mailman/listinfo/rubygems-developers

Reply via email to