Hello all! Today I was thinking about the security implications of automatically downloading and intalling a LuaRocks release, and I noticed that releases are not signed in any way, and are served over plain ol' HTTP (read: no encryption). It would be interesting to be able to know whether a release tarball has been tampered with, to be confident that harmful code has not been introduced.
I have an idea [1] a possible workaround when using Rockz (a Zsh plugin
which provides a virtualenv-alike tool), but it would still be a good
thing that releases would be provided with an accompanying PGP
signature. This would be as easy as running:
% gpg --detach-sign --armor luarocks-X.Y.Z.tar.gz
and including the generated “luarocks-X.Y.Z.tar.gz.asc” file in the
releases download page. In order to verify the signature, once the
signature and the tarball are downloaded in the same location, this
would be done:
% gpg --verify luarocks-X.Y.Z.tar.gz.asc
Is there any chance that upcoming releases could be signed?
Cheers, and thanks for listening^W reading :-)
--
☛ Adrián
P.S: A different topic (interesting by itself) would be having support
for providing signed rocks/rockspecs, and that “luarocks install”
would verify the signatures of the packages it is installing...
[1] https://github.com/aperezdc/rockz/issues/2
signature.asc
Description: signature
------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________ Luarocks-developers mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/luarocks-developers
