On 2022-07-23 23:49:09 (+0300), Evangelos Foutras wrote:
> This is solvable by not cutting a release with marginally trusted
> keys. Having all Arch Linux installations make 100-ish requests daily
> to cover such an edge case is a misutilization of resources (on both
> sides).

Refreshing existing and valid keys not only has the upside of pulling in
new signatures on marginally trusted keys, but also to update expiration
dates.
I do not see this as misutilization of the systems, as it solves an
existing and continued issue for users and user experience by making the
upgrade procedure less error-prone (and confusing).

When it comes to utilization of our systems (because we would be on the
giving end of this transaction), I do understand your concerns.
The WKD is a very central and important resource to the distribution and
we need to ensure (in any case), that we can serve many users at once
and that this does not mess with our gitlab setup.
If we could communicate more detailed numbers there and figure out a way
to make the hosting of our WKD very stable and reliable, that would be
fabulous!

> I'm certain there are also privacy concerns about enabling this
> service by default.

Each upgrade of a user system may trigger a request towards our WKD
(unrelated to the proposed service).
As mentioned in my response to Kristian, I believe that it is up to us
to configure our webserver infrastructure as privacy conserving as
possible (for all of our services).

> Furthermore, I doubt our users need to the have their systems babysat
> like this. In the rare situation where archlinux-keyring must be
> updated first, the user should be able to handle it by themselves. As
> you said, pacman will fetch new keys using WKD so, as long as
> marginally trusted keys are excluded from keyring releases, there's no
> issue with onboarding new people.

Marginally trusted keys may not only end up in the keyring by adding new
packagers, but also by existing packagers changing their keys. As
mentioned above, they may be (temporarily) expired as well.

We are not really able to make the guarantees that you stated (e.g. "we
will from now on only release fully trusted keys"). Scenarios such as
emergency key revocations, or just plain oversight may still lead to
marginally trusted keys ending up in the keyring.
Establishing a workflow around the maintenance and release of
archlinux-keyring is challenging in itself and changing it would not
solve the problems with temporarily expiring keys either (unless we
forbid expiring keys).

Spending time on various fora to explain to users of all experience
ranges to "first do a partial upgrade to upgrade the keyring" is not
only tiring and creating friction, but also wasting a more valuable
resource: Contributor time.

The update procedure on Arch Linux should be as easy as possible and as
resilient to failure as possible for as long as possible. Currently we
have reports about this issue (for various reasons) every few weeks and
those are only the users reporting these issues somewhere and are not
those that want to upgrade their system after e.g. one year of downtime.

> tl;dr: I'm vibing way more with continuing to rely on the
> archlinux-keyring package exclusively; auto-updates are sus.

I understand that. However, maintaining a keyring reliably over a longer
period of time is non-trivial.
If the implemented service is not wanted by users, it is always possible
to disable the unit by masking it.

Best,
David

-- 
https://sleepmap.de

Attachment: signature.asc
Description: PGP signature

Reply via email to