Re: tag2upload (git-debpush) service architecture - draft
Bastian Blank writes ("Re: tag2upload (git-debpush) service architecture - draft"):
> We discussed a bit within the ftp team and several points came up. The
> following describes my interpretation of it:
>
> The archive will need to do the final validation to check if an upload
> is accepted. The uploaders signature would need to be added to the
> source package to allow checking the validity also in the future. We
> already retain all user signatures of source packages in the archive and
> such a proposed service must provide the same level of possible
> verification.
I can certainly include a copy of the git signed tag object. This
would require a modest change to dak to accept the new filename. Can
you please tell me what filename would be good ?
> The signature needs to be collision resistant and needs to be verifyable
> with only the stuff included into the source package. The git object
> checksums don't suffice anymore due to SHA1. And as the world moves
> towards SHA3, it will need to have the ability to follow. The output of
> all operations obviously needs to be reproducible to be signed.
The git signed tag object has a signature which is verifiable without
relying on the git object hash system. The tag text directly contains
the source package name, and version, and intended upload target.
> I don't know if any of this requires a new dpkg source format to
> implement properly.
I don't think so.
Ian.
--
Ian Jackson <ijackson@chiark.greenend.org.uk> These opinions are my own.
If I emailed you from an address @fyvzl.net or @evade.org.uk, that is
a private address which bypasses my fierce spamfilter.
Reply to: