Thanks Zack for actually explaining the reasoning to me, rather than trying to 
insult my intelligence and then use it as an argument against the proposal.
-- 
Tyler Romeo
0xC86B42DF

From: Zack Weinberg [email protected]
Reply: Wikimedia developers [email protected]
Date: June 11, 2014 at 11:47:34
To: Wikimedia developers [email protected]
Subject:  Re: [Wikitech-l] Making a plain MW core git clone not be installable  

Nothing stops you from installing it over insecure HTTP. (I filed
https://github.com/composer/composer/issues/3047 for that.)

But this is bad practice even with HTTPS; you're relying on
*transport* integrity/authenticity to secure *document* authenticity.
Yeah, we do that all the time on today's Web, but software
installation is (I don't think this is hyperbole) more
security-critical than anything else and should be held to higher
standards. In this case, there should be an independently verifiable
(i.e. not tied to the TLS PKI) PGP signature on the installer and
people should be instructed to check that before executing it.

Note that Git submodules do this for you automatically, because the
revision hash is unforgeable.

Attachment: signature.asc
Description: Message signed with OpenPGP using AMPGpg

_______________________________________________
Wikitech-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikitech-l

Reply via email to