Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#56489 - [p11-kit] using upstream signature
Attached to Project:
Arch Linux
Opened by Levente Polyak (anthraxx) - Tuesday, 28 November 2017, 00:23 GMT
Last edited by Eli Schwartz (eschwartz) - Friday, 27 July 2018, 16:35 GMT
Opened by Levente Polyak (anthraxx) - Tuesday, 28 November 2017, 00:23 GMT
Last edited by Eli Schwartz (eschwartz) - Friday, 27 July 2018, 16:35 GMT
|
DetailsHi, it would be awesome if we can use the tarball releases for p11-kit that include the signature as long as we don't have a makepkg in place that can actually verify signatures of git tags.
This shouldn't affect p11-kit as it doesn't seem to require backporting much. thanks a lot for considering :) |
This task depends upon
Closed by Eli Schwartz (eschwartz)
Friday, 27 July 2018, 16:35 GMT
Reason for closing: Fixed
Additional comments about closing: in trunk
Friday, 27 July 2018, 16:35 GMT
Reason for closing: Fixed
Additional comments about closing: in trunk
Its unlikely/ hardly possible to make this specific commit go evil but that doesn't replace what authentication provides. If that would be like this, we can purge all signatures when we use secure hashes?
Saying "oh, trust that the package maintainer PGP-verified the latest tag and scrutinized all the numerous commits since then to see what precisely they were doing" is not, in fact, PGP.
So, bad example. :p
That being said, it can certainly be used to verify the actual build tag... but why? tarballs work fine too, and more simply. Looking through the history of this package, we've never actually built from anything other than a tag...
2) validating a commit sha1 hash is no more or less secure than using sha1sums=() for a tarball release. It's nice, but also completely missing the point of using PGP.
Building from a clean tree with *our* packaged tools has more value to me than code signing.
In addition, it is easier to pick commits between releases or cherry-pick individual commits as patches.
p11-kit-$ver.tar.gz
p11-kit-$ver.tar.gz.sig
Source code (zip)
Source code (tar.gz)
The signed tar is dirty, as I mentioned. The clean "Source code" archives are unsigned.
In the meanwhile regarding authenticated sources, i gonna leave this his here :)
https://archives.gentoo.org/gentoo-dev/message/03df77a347ec75a9b1ceaab3a2f76ee8
https://www.gentoo.org/news/2018/06/28/Github-gentoo-org-hacked.html
If you want to use pinned commit hashes as well, maybe try asking upstream if they can sign their commits as well as tags?