Mark,

On 1/24/17 12:36 PM, Mark Thomas wrote:
> On 24/01/2017 16:31, Christopher Schultz wrote:
>> Mark,
>>
>> On 1/23/17 5:53 AM, Mark Thomas wrote:
>>> I think it would be useful if we configured buildbot to publish
>>> snapshots (probably as part of the daily build) to repository.a.o.
>>> Therefore I have requested the appropriate credentials from infra and
>>> when I have them I'll make the necessary changes tot he buildbot config.
>>> It might also be necessary to tweak our build scripts.
>>
>> +1
>>
>> Will those (non) releases be signed?
> 
> No. Handling that is one of the tweaks I'm expecting to have to make to
> the build script.

I'm kind of -0 or +0 on signing nightlies.

On the one hand, they are being auto-signed which is pretty risky
because anyone with access to the build server can then sign releases.

On the other hand, we would certainly be using a "nightly release
signer" and not e.g. markt's release-signing keys, so that's a little
less risky: the signing key will clearly advertise what it's being used for.

I just want to make sure that a nightly-signed release is somehow
flagged by ... whoever cares to check for signatures. I wouldn't want a
normal release signed by the nightly-release key to be mistaken for an
official release.

Is there a sane way to do that?

With X.509, you'd just make sure that the nightly-release signer wasn't
trusted by the root authority that everybody is supposed to trust. That
way, the code is signed, but the signature isn't automatically trusted
by everybody.

I have no idea how the code-signing works for our releases, since I just
grab the binary tarball and use that. GPG checks the signature of the
file for me. But my understanding is that the code-signing that Semantec
provides to us is something else entirely (e.g. signing the installer
.exe for Windows). So I'm happy to be educated.

-chris

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to