1 |
[Sent from my iPad, as it is not a secured device there are no cryptographic keys on this device, meaning this message is sent without an OpenPGP signature. In general you should *not* rely on any information sent over such an unsecure channel, if you find any information controversial or un-expected send a response and request a signed confirmation] |
2 |
|
3 |
> On 4 Apr 2017, at 12:10, Dirkjan Ochtman <djc@g.o> wrote: |
4 |
> |
5 |
> On Tue, Apr 4, 2017 at 12:03 PM, Andreas K. Huettel |
6 |
> <dilfridge@g.o> wrote: |
7 |
>>> while we're discussing super-strength hash algos, it would be cool to know |
8 |
>>> what's still missing for |
9 |
>>> * rsync-side manifest signing in whatever way |
10 |
>>> * verification of such signatures in portage / emerge |
11 |
>>> |
12 |
>> |
13 |
>> (and just to put it in a reference frame, I'm these days reading mailing list |
14 |
>> discussions how cryptographic signing of our rsync tree is urgently needed... |
15 |
>> ... in the council agenda threads |
16 |
>> ... of the very first council |
17 |
>> ... i.e., 2005 |
18 |
>> ... i.e., roughly 12 years ago.) |
19 |
> |
20 |
> Was thinking exactly the same thing yesterday. How do we make it |
21 |
> happen? Do we have any ideas on feasible paths forward? |
22 |
|
23 |
After having been through two GSoCs , the meta-manifest code is written, gkeys is in testing stage for key management etc |
24 |
|
25 |
iirc (taken from memory, can include faulty info) waiting on (i) infra generation of key material on airgapped system with appropriate signing subkey to use for online server (ii) code to do signing on rsync staging area (which is mostly written) on aforementioned subkey (ii) testing of the aforementioned code before rollout |
26 |
|
27 |
it is coordinated by Gentoo Keys project so questions should really be directed there (gkeys@) |