1 |
On Thu, 03 Apr 2008 13:17:51 +0100 |
2 |
Mike Auty <ikelos@g.o> wrote: |
3 |
> Ciaran McCreesh wrote: |
4 |
> | Signing offers no protection against a malicious developer. |
5 |
> |
6 |
> I had envisaged a system whereby when the tree was synced, as was some |
7 |
> kind of master signed list of all acceptable dev-keys. Every package |
8 |
> would also be signed, and would only be installed when signed. As |
9 |
> soon as a dev becomes a liability their key is removed from the |
10 |
> list/revoked. ~ On next sync any packages or package upgrades signed |
11 |
> after the time of revocation would not be installed. There would be |
12 |
> a window of vulnerability, but no bigger than with revoking a dev's |
13 |
> access to the tree. Do you think this would offer suitable |
14 |
> protection for users from a malicious dev or not? |
15 |
|
16 |
Nope. In fact, using such a system, there are ways of getting in code |
17 |
that doesn't get triggered until someone's key gets invalidated. |
18 |
|
19 |
And if you are worrying about malicious developers, you need to worry |
20 |
about malicious infra people too. An infra member throwing his toys out |
21 |
of the pram can do much more lasting damage than someone who can get |
22 |
some global scope nastiness into an ebuild for an hour or two... |
23 |
|
24 |
-- |
25 |
Ciaran McCreesh |