On Wed, Mar 7, 2012 at 19:11, Brian Smith <br...@linuxfood.net> wrote:
>
> On Wed, Mar 7, 2012 at 4:10 PM, Leo Razoumov <slonik...@gmail.com> wrote:
>>
>> On Wed, Mar 7, 2012 at 18:03, Brian Smith <br...@linuxfood.net> wrote:
>> > On Wed, Mar 7, 2012 at 2:40 PM, Leo Razoumov <slonik...@gmail.com>
>> > wrote:
>> >>
>> >> Looking through the fossil source code I found places where manifests
>> >> are clearsign-ed. But where are signatures verified?
>> >
>> > They're not. It's designed for when you're auditing check-ins (after,
>> > say, a
>> > security breach..)
>>
>> That's precisely my question. How do I audit?
>> What command should I use to verify signed artifacts? Preferably, I
>> would like to see something like "fossil verify" that outputs a list
>> of all clearsign-ed artifacts in the repo annotated with "checked OK",
>> "check Failed" or "cannot check" (e.g. when key is missing).
>>
>> Recent github compromise gives us some food for thought about fossil's
>> mechanism to ensure data integrity.
>>
>> --Leo--
>
> I believe you're supposed to deconstruct the repository, and run each
> manifest through gpg.
>
> -B

Good Lord!  Deconstruct a repo, go through all the artifacts, then
identify which ones are clearsign-ed,  then verify them, then produce
a report...

Rule #1 in security design: if you make a security feature hard to
use, nobody will use it.

Why not have a "fossil verify" or "fossil clearcheck" command that
makes those checks. Paranoid folks can even run it once a weak from a
cron-job.

--Leo--
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to