1 |
On Sat, Mar 26, 2011 at 10:12:10AM +0100, Andreas K. Huettel wrote: |
2 |
> 3) Rely on an existing key list somewhere distributed in portage; the list |
3 |
> file with the key id's (not the keys themselves) is signed with a master key. |
4 |
> Is a mediocre and potentially insecure workaround. |
5 |
> Pros: you can exactly decide what keys are used and trusted, without thinking |
6 |
> about GnuPG's inner workings. A user can edit his key and the key remains |
7 |
> trusted. |
8 |
> Cons: Mainly that the key id is a pretty short hash afaik.(Any better-informed |
9 |
> people around?) |
10 |
1. Generate said list L from the GPG fields in LDAP (w/ long-form keyids) |
11 |
2. Clear-sign L, produces L' |
12 |
3. Include L' in /metadata/ during rsync content build. |
13 |
3.1. Provide all L' files in a trusted Git repository for historical reference. |
14 |
4. Tree-sign per GLEP58, such that signed list is included. |
15 |
|
16 |
Pros: |
17 |
- L' is plaintext and works well w/ rsync deltas. |
18 |
|
19 |
Security weakpoints: |
20 |
- Introduces new weak point if attacker can compromise the automated |
21 |
clear-signing service of #2. |
22 |
|
23 |
> 4) Rely on an existing list of keys somewhere distributed in portage and |
24 |
> possibly somewhere else (keyservers); a key userid is signed with a master |
25 |
> key. Work with GnuPG's well-tested and well-thought-out trust relationships. |
26 |
> Back to start, time to re-read the entire thread... :) |
27 |
What does this actually add over #3 in terms of security? |
28 |
|
29 |
-- |
30 |
Robin Hugh Johnson |
31 |
Gentoo Linux: Developer, Trustee & Infrastructure Lead |
32 |
E-Mail : robbat2@g.o |
33 |
GnuPG FP : 11AC BA4F 4778 E3F6 E4ED F38E B27B 944E 3488 4E85 |