On Tuesday, August 29, 2017, Steve Dower <steve.do...@python.org> wrote:

> On 29Aug2017 0801, Steve Dower wrote:
>
>> On 29Aug2017 0614, Wes Turner wrote:
>>
>>> Wouldn't it be great to have the resources to source audit all code?
>>> (And expect everyone to GPG sign all their commits someday.)
>>>
>>
>> If you care this much, then you will find the resources to audit all the
>> code manually after you've downloaded it and before you've deployed it (or
>> delegate that trust/liability elsewhere). Plenty of larger companies do it,
>> especially for their high value targets.
>>
>
> On re-reading it wasn't entirely clear, so just to clarify:
>
> * above, "you" is meant as a generally inclusive term (i.e., not just Wes,
> unless Wes is also a sysadmin who is trying to carefully control his
> network :) )
>
> * below, "you" is specifically the author of the email (i.e., Wes)


avc: denied
<[{/end>

Thanks!


>
> Cheers,
> Steve
>
> The rest of your email is highly platform-specific, and so while they are
>> potential *uses* of this PEP, and I hope people will take the time to
>> investigate them, they don't contribute to it in any way. None of these
>> things will be added to or required by the core CPython release.
>>
>> Cheers,
>> Steve
>>
>> Many Linux packaging formats do have checksums of all files in a package:
>>> {RPM, DEB,}
>>>
>>> Python Wheel packages do have a manifest with SHA256 file checksums.
>>> bdist_wheel.write_record():
>>>
>>> https://bitbucket.org/pypa/wheel/src/5d49f8cf18679d1bc6f3e1e
>>> 414a5df3a1e492644/wheel/bdist_wheel.py?at=default&
>>> fileviewer=file-view-default#bdist_wheel.py-436
>>>
>>> Is there a tool for checking these manifest and file checksums and
>>> signatures?
>>>
>>> Which keys can sign for which packages? IIUC, any key loaded into the
>>> local keyring is currently valid for any package?
>>>
>>> "ENH: GPG signatures, branch-environment map (GitFS/HgFS workflow)"
>>> https://github.com/saltstack/salt/issues/12183
>>>
>>> - links to GPG signing support in hg, git, os packaging systems
>>>
>>> ...
>>>
>>> Setting and checking SELinux file context labels:
>>>
>>> Someone else can explain how DEB handles semanage and chcon?
>>>
>>> https://fedoraproject.org/wiki/PackagingDrafts/SELinux
>>>
>>> RPM supports .te (type enforcement), .fc (file context), and .if SELinux
>>> files with an `semodule` command.
>>>
>>> RPM requires various combinations of the policycoreutils,
>>> selinux-policy-targeted, selinux-policy-devel, and   policycoreutils-python
>>> packages.
>>>
>>> Should setup.py (running with set fcontext (eg root)) just call chcon
>>> itself; or is it much better to repack (signed) Python packages as e.g.
>>> RPMs?
>>>
>>> FWIW, Salt and Ansible do support setting and checking SELinux file
>>> contexts:
>>> salt.modules.selinux:
>>>
>>> https://docs.saltstack.com/en/latest/ref/modules/all/salt.mo
>>> dules.selinux.html
>>>
>>> https://github.com/saltstack/salt/blob/develop/salt/modules/selinux.py
>>>
>>> Requires:
>>> - cmds: semanage, setsebool, semodule
>>> - pkgs: policycoreutils, policycoreutils-python,
>>>
>>>
>>> Ansible sefcontext:
>>>
>>> http://docs.ansible.com/ansible/latest/sefcontext_module.html
>>>
>>> https://github.com/ansible/ansible/blob/devel/lib/ansible/
>>> modules/system/sefcontext.py
>>>
>>> Requires:
>>> - pkgs: libselinux-python, policycoreutils-python
>>>
>>> Does it make sense to require e.g. policycoreutils-python[-python] in
>>> 'spython'? ((1) Instead of wrapping `ls -Z` and `chcon` (2) in setup.py (3)
>>> as root)?
>>>
>> _______________________________________________
>> Python-Dev mailing list
>> Python-Dev@python.org
>> https://mail.python.org/mailman/listinfo/python-dev
>> Unsubscribe: https://mail.python.org/mailman/options/python-dev/steve.
>> dower%40python.org
>>
>
>
_______________________________________________
Python-Dev mailing list
Python-Dev@python.org
https://mail.python.org/mailman/listinfo/python-dev
Unsubscribe: 
https://mail.python.org/mailman/options/python-dev/archive%40mail-archive.com

Reply via email to