Russ Allbery:
> Below is the security review that I did of the tag2upload design.
> [...]
> The existing upload architecture requires trusting the host used by the
> uploader to build the source package. If that host is compromised, an
> attacker could inject malicious code into the source package, either by
> modifying the upstream tar file (if signed upstream tar files are not
> used) or by injecting it into the Debian package build system, maintainer
> scripts, or patches.
> 
> This attack is not equivalent to compromise of the uploader's OpenPGP key,
> which neither upload architecture defends against. Many Debian uploaders
> build source packages on less-trusted systems where they also build and
> test binary packages, and then sign the source package from a more-trusted
> system or use a hardware key.

Is this really common practice that Debian uploaders sign (source)
packages they built on less-trusted systems?

And, if yes: Why wouldn't they do the equivalent with the sources in git
(work on the less trusted system, transfer commits (git push/pull) to
the system with signing access and sign there, without review)?

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to