On Fri, Dec 03, 2021 at 05:31:21PM -0000, Boris Burkov via devel wrote:
> The top-level hash is calculated for each file, then that hash is signed with 
> the inputted rsa key pair and the signed hash is appended to the array of 
> signed hashes in the rpm metadata. I am guessing the way we worded the 
> proposal is a little unclear because we call it "the" signature when it's one 
> rpm metadata item that's an array of the signatures.
> 
> fs-verity the kernel feature operates on a per-file basis, and since the 
> ultimate goal is to deliver fs-verity enabled files on the installer's 
> system, we need each file's signature in the rpm. At install, we call the 
> fs-verity enable ioctl for each file, passing in its signature to make use of 
> the kernel authentication functionality.

What exactly is appended to the rpm:
a) the merkle tree
b) the top-level hash from the merkle tree
c) the signature for b
d) some combination of a, b, c?

Above you seem to say "b+c" ("signed hash").

In the Change page:
> at build time, we compute the Merkle tree for the files within a
> package, then sign it and ship it as part of the rpm metadata;

…which is "a".

"c" would make sense to me.

Please clarify.

Zbyszek
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to