Re: KEYS and releases

2011-06-30 Thread Daniel Shahaf
Robert Burrell Donkin wrote on Thu, Jun 30, 2011 at 08:31:38 +0100: > On Tue, Jun 28, 2011 at 10:20 AM, Christian Grobmeier > wrote: > >>> we copy a KEYS file into that directory upon succesful VOTE of the release > >>> artifacts (which also include the KEYS file). > >> > >> Perhaps, but the point

Re: KEYS and releases

2011-06-30 Thread Robert Burrell Donkin
On Tue, Jun 28, 2011 at 10:20 AM, Christian Grobmeier wrote: >>> we copy a KEYS file into that directory upon succesful VOTE of the release >>> artifacts (which also include the KEYS file). >> >> Perhaps, but the point we're getting at was explicitly stated by Benson, >> "The goal here is to allow

Re: KEYS and releases

2011-06-28 Thread Mattmann, Chris A (388J)
Thanks Bertrand! Cheers, Chris On Jun 28, 2011, at 1:29 AM, Bertrand Delacretaz wrote: > On Mon, Jun 27, 2011 at 11:59 PM, Mattmann, Chris A (388J) > wrote: >> Yep, makes sense. Like I told Benson, I wasn't exactly sure if the mirroring >> system were read only downstream of the Apache root so

Re: Key security (Re: KEYS and releases)

2011-06-28 Thread Daniel Shahaf
Nick Kew wrote on Tue, Jun 28, 2011 at 14:13:51 +0100: > As of now, how would you know if I were to smuggle in a key > pretending to be yours and start signing things? Don't stop here. If you can smuggle a signature into dist/ then you can smuggle an artefact too. -

Re: Key security (Re: KEYS and releases)

2011-06-28 Thread Nick Kew
On 28 Jun 2011, at 13:22, Benson Margulies wrote: > There's another possible dimension to this, which is related to the > 'Apache Key' suggestion. > > The current mechanism gives a\ sophisticated/ consumer tools to get > some confidence that what they downloaded was, in fact, created by > someon

Re: Key security (Re: KEYS and releases)

2011-06-28 Thread Benson Margulies
There's another possible dimension to this, which is related to the 'Apache Key' suggestion. The current mechanism gives a\ sophisticated/ consumer tools to get some confidence that what they downloaded was, in fact, created by someone in the Apache infrastructure. If a dozen black hats create PG

Re: Key security (Re: KEYS and releases)

2011-06-28 Thread Daniel Shahaf
I'm not sure what I think of your suggestion of having an "ASF PGP key". How about requiring committers to specify on id.a.o not just the last few bytes of their key's fingerprints, but the whole fingerprint? Nick Kew wrote on Tue, Jun 28, 2011 at 11:43:24 +0100: > > On 28 Jun 2011, at 09:53, J

Re: KEYS and releases

2011-06-28 Thread Nick Kew
On 28 Jun 2011, at 10:49, Christian Grobmeier wrote: >>> I would like to know how many signing keys are actually trusted which >>> have been used for our releases. >> >> Quite a few, see http://people.apache.org/~henkp/trust/apache.html Aaargh! That needs a health warning: pointing firefox at

Key security (Re: KEYS and releases)

2011-06-28 Thread Nick Kew
On 28 Jun 2011, at 09:53, Jukka Zitting wrote: > Hi, > > On Tue, Jun 28, 2011 at 10:29 AM, Bertrand Delacretaz > wrote: >> Hence the need for people to download KEYS files from an *.apache.org >> domain that we do control. Putting KEYS in a distribution might cause >> people to use them instead

Re: KEYS and releases

2011-06-28 Thread Christian Grobmeier
On Tue, Jun 28, 2011 at 12:22 PM, Daniel Shahaf wrote: > Christian Grobmeier wrote on Tue, Jun 28, 2011 at 11:20:13 +0200: >> >> we copy a KEYS file into that directory upon succesful VOTE of the release >> >> artifacts (which also include the KEYS file). >> > >> > Perhaps, but the point we're get

Re: KEYS and releases

2011-06-28 Thread Daniel Shahaf
Christian Grobmeier wrote on Tue, Jun 28, 2011 at 11:20:13 +0200: > >> we copy a KEYS file into that directory upon succesful VOTE of the release > >> artifacts (which also include the KEYS file). > > > > Perhaps, but the point we're getting at was explicitly stated by Benson, > > "The goal here is

Re: KEYS and releases

2011-06-28 Thread Christian Grobmeier
>> I would like to know how many signing keys are actually trusted which >> have been used for our releases. > > Quite a few, see http://people.apache.org/~henkp/trust/apache.html Interesting - thanks for the link. So, 53% of our software is signed with untrusted keys. I have expected 70% untrust

Re: KEYS and releases

2011-06-28 Thread Jukka Zitting
Hi, On Tue, Jun 28, 2011 at 11:16 AM, Christian Grobmeier wrote: > I would like to know how many signing keys are actually trusted which > have been used for our releases. Quite a few, see http://people.apache.org/~henkp/trust/apache.html BR, Jukka Zitting

Re: KEYS and releases

2011-06-28 Thread Christian Grobmeier
>> we copy a KEYS file into that directory upon succesful VOTE of the release >> artifacts (which also include the KEYS file). > > Perhaps, but the point we're getting at was explicitly stated by Benson, > "The goal here is to allow and encourage consumers to independently verify > signatures.  Tha

Re: KEYS and releases

2011-06-28 Thread Christian Grobmeier
>> Hence the need for people to download KEYS files from an *.apache.org >> domain that we do control. Putting KEYS in a distribution might cause >> people to use them instead of getting them from a trusted source, and >> that's bad. > > The keys should be included in the web of trust, so it should

Re: KEYS and releases

2011-06-28 Thread Jukka Zitting
Hi, On Tue, Jun 28, 2011 at 10:29 AM, Bertrand Delacretaz wrote: > Hence the need for people to download KEYS files from an *.apache.org > domain that we do control. Putting KEYS in a distribution might cause > people to use them instead of getting them from a trusted source, and > that's bad. T

Re: KEYS and releases

2011-06-28 Thread Bertrand Delacretaz
On Mon, Jun 27, 2011 at 11:59 PM, Mattmann, Chris A (388J) wrote: > Yep, makes sense. Like I told Benson, I wasn't exactly sure if the mirroring > system were read only downstream of the Apache root sources (IOW, I thought > we had more control then in reality we did). > > BTW, if someone could

Re: KEYS and releases

2011-06-27 Thread Mattmann, Chris A (388J)
Hey Hyrum, Thanks! Cheers, Chris On Jun 27, 2011, at 7:24 PM, Hyrum K Wright wrote: > On Mon, Jun 27, 2011 at 4:59 PM, Mattmann, Chris A (388J) > wrote: >> Yep, makes sense. Like I told Benson, I wasn't exactly sure if the mirroring >> system were read only downstream of the Apache root so

Re: KEYS and releases

2011-06-27 Thread Hyrum K Wright
On Mon, Jun 27, 2011 at 4:59 PM, Mattmann, Chris A (388J) wrote: > Yep, makes sense. Like I told Benson, I wasn't exactly sure if the mirroring > system were read only downstream of the Apache root sources (IOW, I thought > we had more control then in reality we did). > > BTW, if someone could p

Re: KEYS and releases

2011-06-27 Thread Mattmann, Chris A (388J)
Yep, makes sense. Like I told Benson, I wasn't exactly sure if the mirroring system were read only downstream of the Apache root sources (IOW, I thought we had more control then in reality we did). BTW, if someone could point me to a document where this is described, that would certainly help m

RE: KEYS and releases

2011-06-27 Thread Noel J. Bergman
Chris, This is related to why it also matters how you get and verify your browser. If someone were to successfully distribute a build of Firefox or Chrome with bogus root certs, they could potentially do a lot of damage. --- Noel

Re: KEYS and releases

2011-06-27 Thread Mattmann, Chris A (388J)
Gotcha! OK makes sense. I wasn't sure how the mirroring system worked, and whether or not the mirrors were read-only downstream of the Apache source (I guess we can't ensure that, right?) If that's the case, then I'm +1 for what you're saying. Cheers, Chris On Jun 27, 2011, at 1:48 PM, Benson

Re: KEYS and releases

2011-06-27 Thread Benson Margulies
Mirrors. Lots of non-apache people work for all those many companies that operate all those many, many, mirrors. On Mon, Jun 27, 2011 at 4:48 PM, Mattmann, Chris A (388J) wrote: > Hi Benson, > > On Jun 27, 2011, at 1:37 PM, Benson Margulies wrote: > >> Chris, >> >> If my goal was to hoodwink y

Re: KEYS and releases

2011-06-27 Thread Mattmann, Chris A (388J)
Hi Benson, On Jun 27, 2011, at 1:37 PM, Benson Margulies wrote: > Chris, > > If my goal was to hoodwink you, I'd create a bogus key that claimed to > be owned by an Apache person, put it in a KEYS file, and include in > the release, and sign the release with it. If I was lucky, you'd just > veri

Re: KEYS and releases

2011-06-27 Thread Benson Margulies
Chris, If my goal was to hoodwink you, I'd create a bogus key that claimed to be owned by an Apache person, put it in a KEYS file, and include in the release, and sign the release with it. If I was lucky, you'd just verify the release with the embedded key, and I'd have succeeded. We want people t

Re: KEYS and releases

2011-06-27 Thread Mattmann, Chris A (388J)
On Jun 27, 2011, at 12:58 PM, Noel J. Bergman wrote: >> we copy a KEYS file into that directory upon succesful VOTE of the release >> artifacts (which also include the KEYS file). > > Perhaps, but the point we're getting at was explicitly stated by Benson, > "The goal here is to allow and encoura

RE: KEYS and releases

2011-06-27 Thread Noel J. Bergman
> we copy a KEYS file into that directory upon succesful VOTE of the release > artifacts (which also include the KEYS file). Perhaps, but the point we're getting at was explicitly stated by Benson, "The goal here is to allow and encourage consumers to independently verify signatures. That calls f

Re: KEYS and releases

2011-06-27 Thread Mattmann, Chris A (388J)
Hi All, Just for clarification here (since Gora was specifically called out), we also maintain KEYS files in the podling dist directory as well. However, we copy a KEYS file into that directory upon succesful VOTE of the release artifacts (which also include the KEYS file). So it's not either

Re: KEYS and releases

2011-06-27 Thread Benson Margulies
It seems to me that KEYS in the release is somewhat counterproductive. The goal here is to allow and encourage consumers to independently verify signatures. That calls for KEYS somewhere else than inside the package. On Mon, Jun 27, 2011 at 7:10 AM, Daniel Shahaf wrote: > Jukka Zitting wrote on M

Re: KEYS and releases

2011-06-27 Thread Daniel Shahaf
Jukka Zitting wrote on Mon, Jun 27, 2011 at 11:07:11 +0200: > Hi, > > On Mon, Jun 27, 2011 at 6:32 AM, Noel J. Bergman wrote: > > It seems to me to be a bad idea to distribute keys with releases.  And don't > > we already have some ASF-wide policy for managing keys? > > http://www.apache.org/dev

Re: KEYS and releases

2011-06-27 Thread Jukka Zitting
Hi, On Mon, Jun 27, 2011 at 6:32 AM, Noel J. Bergman wrote: > It seems to me to be a bad idea to distribute keys with releases.  And don't > we already have some ASF-wide policy for managing keys? http://www.apache.org/dev/release-signing.html#keys-policy http://incubator.apache.org/guides/relea

Re: KEYS and releases

2011-06-27 Thread Mohammad Nour El-Din
+1 KEYS should not be distributed with a release, even if the central key infrastructure is not used, at least release manager should point people checking the release to where they can find the KEYS so they can check release signatures, which is normally the way used with most of the projects I

Re: KEYS and releases

2011-06-26 Thread Christian Grobmeier
> It seems to me to be a bad idea to distribute keys with releases. +1 > And don't > we already have some ASF-wide policy for managing keys? I don't know if there is a policy, but I recently found this: http://people.apache.org/foaf/index.html "PGP keys may additionally be added to your profile

RE: KEYS and releases

2011-06-26 Thread Noel J. Bergman
It seems to me to be a bad idea to distribute keys with releases. And don't we already have some ASF-wide policy for managing keys? --- Noel - To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org For additi