On 19/02/11 12:00, IgnorantGuru wrote:
On Sat, 19 Feb 2011 11:21:47 +1000
Allan McRae<[email protected]>  wrote:
We are using gpgme which is maintained by gpg developers.  So we are
not reinventing any wheel.  If that is an ill-maintained and contains
security issues, then why trust gpg at all?

I'm not up on the latest in gpg, what is being developed, or how well it has 
been cryptographically tested, and it sounds like you're not either to some 
extent.  I was offering general suggestions - try to see the bigger picture and 
the details won't be so much work.  I still think using command line gpg gives 
users better control over their own security solutions and provides better 
security.  But you're obviously too deeply invested in the libraries now to 
even consider anything else (which is one reason why I advise against them).  
So be it.

We are not too deeply invested in anything. No release has been made... I was just pointed out that you appear to have no idea what the library we are using is and what it actually does. It makes absolutely no sense to have pacman manually fork a process to run gpg to verify a package/database and then manually parse the output when the upstream gpg developers provide a library to do just that.

Have you actually looked at the current implementation at all?

I read some discussions of it, but I have not looked at it.  Frankly it 
interests me far less than having signatures available at this point.  I trust 
that you can implement checking.  I think you're putting the cart before the 
horse, which is why package signing is getting nowhere (no real usable 
results).  But if you have kept it as simple as you describe, good work.

In the end, the only way anything will get implemented is if patches
are provided.  (That includes the suggestion of providing signatures
in repos on Arch Linux - look at that devtools/db-scripts projects).
Dan and I have also mentioned our consulting rates in the past, which
may or may not increase motivation to finish this...

Surely you have some mechanism in makepkg or elsewhere for generating the 
signatures used in your test repo for your pacman sig checking features.  Why 
not push this through to the packaging or database tools now while you're still 
working on pacman?  Or have you completely ignored the need to generate 
signatures (I know you haven't from what I've read, so that's rhetorical).

It seems you or others are stalling on providing signatures because you want 
exclusive control of checking those signatures.  It's trivial to implement 
providing them and surely you know that - man gpg for help.  Like everything 
done by committee, I think you're making things more complicated than they need 
to be.  It's okay, I didn't have high hopes for this communication.  This issue 
is obviously too mired in politics and ego for anything to budge (not you 
personally).

Design by committee implies there is an actually committee making decisions around here, which is far from the truth...

The reason the makepkg changes have not been pushed yet is because they are not finished. As someone who has run the gpg branch version of makepkg for a while, I found it really annoying to not be able to disable/enable signing from the command line. I see Denis just sent a patch for that so it may be possible to push the makepkg changes in the future. But that is very unlikely to happen before the next release which is scheduled to occur quite soon.

Offtopic: Not that this actually matters as far as Arch Linux is concerned. The support needs added to devtools/db-scripts. The package upload script could have a temporary line in it to do the package signing while waiting on makepkg to do that automatically.

Finally, *succinct* reports on where the current implementation in
pacman can be improved are also appreciated.  But that requires
actually paying attention to what has already been done.

Agreed.  FWIW, I think your pacman changes will see reality (as in popular use) 
much more quickly if signatures show up on mirrors sooner rather than later.  
Once the sigs are there, the appetite for your pacman work will be there, and 
the dev politics of Arch will sway.

Simply put, there can be no logical or technical reason for not providing 
signatures for packages.  At the minimum, they can only vastly improve the 
situation, which currently is a complete abdication of any form of responsible 
package security, and they are trivial to add.  The only reason for not 
providing them is a human one - IOW irrational.  I'm no diplomat - I just make 
things work.  I'll leave you to your politics.

I'll repeat, talk to the providers of the repos about getting signatures provided. This list is for pacman-development only and thus any distribution specific conversation is off-topic.. But to be the guy who "makes things work", patches will be required.

Allan




Reply via email to