Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure signature-policy default and options #1

Open
wants to merge 1 commit into
base: omnios
Choose a base branch
from

Conversation

bensummers
Copy link

Set the default signature-policy to require-signatures because software update mechanisms need to be secure.

Remove the verify option because it provides zero security, can't implement policy, and the name is incredibly misleading. Any attacker who can modify the repo, either by MITM or access to the repo server, just needs to remove the signature from the manifest to be able alter a package.

Users currently using 'verify' should be honest about it and use 'ignore'.

Set the default signature-policy to require-signatures because software update mechanisms need to be secure.

Remove the verify option because it provides zero security, can't implement policy, and the name is incredibly misleading. Any attacker who can modify the repo, either by MITM or access to the repo server, just needs to remove the signature from the manifest to be able alter a package.

Users currently using 'verify' should be honest about it and use 'ignore'.
@danmcd
Copy link
Member

danmcd commented Mar 6, 2015

Not accepting this for '014, but keeping it as fodder for a future release.

@bensummers
Copy link
Author

I agree it may be too big a step for the forthcoming release. But I have hope for the future. :-)

@lotheac
Copy link

lotheac commented Oct 8, 2015

+1 on this change, 'verify' is worse than useless because it can provide a false sense of security. Although if require-signatures is made the default for new publishers, will that break third party repos unless they specify ignore?

@danmcd
Copy link
Member

danmcd commented Oct 9, 2015

It will break 3rd-party repos unless they specify ignore. This is why I haven't pulled this in yet.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants