|
From: | Paul Nathan |
Subject: | Re: ELPA security |
Date: | Sun, 6 Jan 2013 21:32:11 -0800 |
I think it's easier to simply require that every file have its own .sig
and avoid the verification chain from manifest to archive contents.
Then we rely on GPG to handle signing and verification for us, no matter
who actually generates the .sig files (as long as their signing key is
trusted by us). I don't think checksums have any advantage there, but
maybe you see some?
I think the GNU ELPA maintainers should sign everything, but that's
debatable and not essential to the proposal.
AG> Since installing a package produces additional files, they should
AG> probably be listed in the manifest (without checksum) to ensure that
AG> no malicious files are planted upon installation.
I don't know if that's needed, but have no problem with it as a feature.
AG> That moves all the authenticity issues to the signatures or rather the
AG> trust you have in the keys used to produce them.
Yes, that's exactly what I'm trying to accomplish, instead of relying on
SSL/TLS or other transport-level solutions.
[Prev in Thread] | Current Thread | [Next in Thread] |