On Sun, May 01, 2011 at 04:31:08PM -0700, Brian Harring wrote:
> On Sun, May 01, 2011 at 11:23:40PM +0000, Duncan wrote:
> > What about having a dedicated server-based changlog-signing key?  That's 
> > still a lot of signing with a single key, but as you observed, the hazards 
> > of a loss of integrity there aren't as high as with most of the tree 
> > content.  It'd require changes, but I don't believe they're out of line 
> > with that required for the rest of the proposal.
> 
> It means the only real trust that clients can level is on that key- 
> since it will be the last signer (thus /the/ signer) across all pkgs.
> 
> Get at that key, and you've got the tree, versus the current form, 
> crack all signing keys and you've got the tree.
> 
> Mind you this is ignoring eclasses, but getting eclasses sorted will 
> be mildly pointless if the rest of the solution has been 
> weakened/gutted since.
> 
> Point is, it's not *just* about having a signature on it- it's about 
> mapping the trust of that signature back, and sectioning/containing 
> compromises.  What y'all are suggesting guts that layered defense.
> ~brian

Then the only choice here is to ignore Changelogs from Manifests and
live with that. You have your changelogs unprotected but you keep your
ebuilds safe(?). As I said, it is a balanced choice that has to be made.

Regards,
-- 
Markos Chandras / Gentoo Linux Developer / Key ID: B4AFF2C2

Attachment: pgpggJYfi62pV.pgp
Description: PGP signature

Reply via email to