On Mon, Jul 2, 2018 at 7:21 PM Michał Górny <mgo...@gentoo.org> wrote:
>
> W dniu pon, 02.07.2018 o godzinie 19∶01 +0200, użytkownik Jason A.
> Donenfeld napisał:
> > On Mon, Jul 2, 2018 at 6:58 PM Michał Górny <mgo...@gentoo.org> wrote:
> > > - Have verification use a keyring of all Gentoo developers, with a
> > > > manual prompt to add new Gentoo developers to it.
> > >
> > > How are you going to distribute this keyring, and how are you going to
> > > protect attacker from injecting malicious key into it?
> >
> > Same model as Arch.
> >
>
> Please write it down here instead of expecting us to figure it out.
> It's your proposal, and it should be complete.

I believe Arch's system relies on some core developers having master
keys and the revocation certificates being distributed amongst them:

https://www.archlinux.org/master-keys/

Then all other developers are signed from there in one way or another.
It's kind of a modified web of trust.

I don't know whether or not this is necessarily the best model to
emulate -- perhaps we could do better, for example -- but it does seem
like a good starting point. Instead we might prefer a single hardware
device somewhere.

The idea would be -- portage fetches an updated "key list" from
somewhere. This new list of keys is considered if it is: a) signed by
the master keys and b) internally fulfills some WoT topological
requirements. Then, if these pass, it is up to the user to then
manually [y/N] the addition of new keys to the key ring. If they
suspect a particular developer has bad security practices, for
example, they could trivially [N] it, and then not have tree files he
touched copied from the shadow location to the portage directory.

Reply via email to