On Tue, Dec 09, 2008 at 06:46:58PM -0500, Micah Anderson wrote:
> I've created documentation in the ticket[0] on this issue about how to
> get a release signing key setup and how to get it deployed into the
> release process for puppet. I am very interested in any comments for how
> to improve this process, how to make it more clear, or if there are any
> glaring omissions.
> 
> I've also created a wiki page which details how people who download the
> archive could cryptographically verify it[1], I'd also be interested in
> discussion or ideas about this!
> 
> 0. http://projects.reductivelabs.com/issues/show/1777
> 1. http://reductivelabs.com/trac/puppet/wiki/VerifyingDownloads

This is great stuff.

I think, however, that it may look overly complicated from a user not
too familiar with PGP. It's basically steps to create a private key
specifically to sign the releases.

I want to underline that the only step required on new releases is this:

$ gpg --homedir $HOME/release_key --detach-sign --output 
puppet-0.24.7.tar.gz.sign --armor puppet-0.24.7.tar.gz

Fairly simple.

If that's too complicated, MD5 sums can also be used, but they must be
signed by someone with a PGP key somewhere, and that key must be well
place enough in the web of trust for this to work.

MD5 sums alone are not enough anymore. They were useful at some point
when you were downloading ISOs or big tarballs and wanted to check that
the FTP transfer didn't break anything, but nowadays, it's mostly
useless: if you can corrupt the tarball, you can regen the MD5.

A.

-- 
Freedom is being able to make decisions that affect mainly you. Power
is being able to make decisions that affect others more than you. If
we confuse power with freedom, we will fail to uphold real freedom.
                        - Richard Stallman

Attachment: signature.asc
Description: Digital signature

Reply via email to