Russ Allbery <r...@debian.org> writes:

> Scott Kitterman <deb...@kitterman.com> writes:
>
>> I agree that there's a risk that what the uploader thought they were
>> uploading and what they actually uploaded are different, but that's
>> independent of tag2upload or not.
>
> But it's not independent; tag2upload makes this story somewhat better.
> tag2upload is based on a signed Git tag and moves the source package
> construction off of the uploader's system onto more-secure project
> infrastructure.

I've seen this notion repeated a couple of times now, and I don't think
it is a good argument nor that it is particulary relevant to tag2upload.

One problem is that the tag2upload design aggregates and amplify the
consequences of one successful compromise.  Thus the standards of
security of that single centralized machine has to be higher than the
standards for security of developer machines, since there is a more
limited number of things each individual developer machine can do.

A more reasonable security comparison here is to compare the security of
the tag2upload design with the security of compromising ALL of the
Debian developers.  Both goals leads to similar abilities for the
attacker.  You have to look at security consequences from the attacker
point of view, not the point of view of each (hopefully benign) user of
the system.

Successfully attacking ALL individual developers, with each own
individual security weaknesses, seems to me more costly than attacking a
single known publicly run instance like tag2upload or Salsa.  So now
attackers are probably put off attacking large subsets of individual
developer machines, but may be more interested in attacking the
tag2upload or Salsa box if that leads to the same ability with lower
cost.

Debian has to my knowledge not published any information how private
keys on centralized machines are protected and managed.  Some developers
(like myself) do publish information how they store and protect their
private keys.  This suggests to me that the argument that centralized
Debian systems are unconditionally more secure than individual
developers systems is not valid.

My perspective is that for all projects that rely on non-free
software/hardware we have to assume that the output is compromised,
since it is impossible to do a complete audit of the components.

Still, I think Debian is already too deep in too many security and trust
issues already that adding another attack vector will not break this
camel's back.  We are collectively good at handling technical/security
incidents when they become public, so let's utilize that property to
allow people to do what they want.  The bigger problem in Debian is IMHO
how some people use their technical powers to limit what other people
can do effectively, and I think this is harmful.

/Simon

Attachment: signature.asc
Description: PGP signature

Reply via email to