On 29/03/24 at 23:29 -0700, Russ Allbery wrote:
> Antonio Russo <antonio.e.ru...@gmail.com> writes:
> > But, I will definitely concede that, had I seen a commit that changed
> > that line in the m4, there's a good chance my eyes would have glazed
> > over it.
> 
> This is why I am somewhat skeptical that forcing everything into Git
> commits is as much of a benefit as people are hoping.  This particular
> attacker thought it was better to avoid the Git repository, so that is
> evidence in support of that approach, and it's certainly more helpful,
> once you know something bad has happened, to be able to use all the Git
> tools to figure out exactly what happened.  But I'm not sure we're fully
> accounting for the fact that tags can be moved, branches can be
> force-pushed, and if the Git repository is somewhere other than GitHub,
> the malicious possibilities are even broader.
> 
> We could narrow those possibilities somewhat by maintaining
> Debian-controlled mirrors of upstream Git repositories so that we could
> detect rewritten history.  (There are a whole lot of reasons why I think
> dgit is a superior model for archive management.  One of them is that it
> captures the full Git history of upstream at the point of the upload on
> Debian-controlled infrastructure if the maintainer of the package bases it
> on upstream's Git tree.)

I wonder if Software Heritage could help with that part?

Lucas

Reply via email to