Re: RFC: Consequences of redesign of .deb signatures
- To: Simon Josefsson <simon@josefsson.org>
- Cc: debian-dpkg@lists.debian.org, debian-devel@lists.debian.org, Steve McIntyre <93sam@debian.org>, Ferenc Wágner <wferi@debian.org>, Peter Pentchev <roam@debian.org>
- Subject: Re: RFC: Consequences of redesign of .deb signatures
- From: Guillem Jover <guillem@debian.org>
- Date: Tue, 2 Sep 2025 14:25:13 +0200
- Message-id: <[🔎] aLbiKYvEGDAT_xm3@thunder.hadrons.org>
- Mail-followup-to: Simon Josefsson <simon@josefsson.org>, debian-dpkg@lists.debian.org, debian-devel@lists.debian.org, Steve McIntyre <93sam@debian.org>, Ferenc Wágner <wferi@debian.org>, Peter Pentchev <roam@debian.org>
- In-reply-to: <[🔎] 87h5xmxuv0.fsf@josefsson.org>
- References: <[🔎] aLWCMreHqC_RGcSI@thunder.hadrons.org> <[🔎] 87h5xmxuv0.fsf@josefsson.org>
Hi!
On Mon, 2025-09-01 at 13:41:55 +0200, Simon Josefsson wrote:
> Guillem Jover <guillem@debian.org> writes:
> > * Make the format extensible to other signature formats or workflows
> > (such as x509, secure-boot, IMA, etc., even if there's currently no
> > intention to add support for any of this).
>
> I think this is a useful goal to make sure there is no PGP specific
> assumption lurking. The SSH signature format is low complexity, stable
> and widely implemented, so maybe supporting this would be possible? If
> there is a framework to plug things into I may put some cycles into
> implementing SSHSIG support. I think supporting Sigstore and Sigsum
> verification would be useful too, since I think in the coming years
> we'll look at non-transparency-signed software releases in a similar way
> that we look at non-signed software releases today.
While, I think leaving room for extension is important, I have no
immediate plans to consider implementing anything other then OpenPGP
for .deb signatures. Because this is internal to the .deb format,
and I don't see much gain currently in the added complexity of
alternative formats to do the same thing.
Although I think the design should be clear on the behavior when, say
multiple .deb signing formats/workflows are present, and how to react
to them! Or how to distinguish between a different signature format
(covering the same use case say .deb container signing with any of
OpenPGP, x509 or SSHSIG) vs a different signing workflow (say
potentially .deb container signing with OpenPGP/x509/SSHSIG vs
secure-boot for booting or IMA for filesystem metadata, etc.).
Thanks,
Guillem
Reply to: