Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Building a compromise-resilient registry with TUF and in-toto #321

Open
trishankatdatadog opened this issue Aug 6, 2019 · 0 comments
Open

Comments

@trishankatdatadog
Copy link

trishankatdatadog commented Aug 6, 2019

Is this a feature request or a bug?

Feature request

Expected behavior:

In order to better distinguish itself from npm, and add more value, Entropic should use The Update Framework (TUF) to secure the package registry in a compromise-resilient manner: i.e. a compromise of the registry does not result in the instant compromise of all packages. A high-level overview of TUF is available in this podcast with @andrew.

To ease adoption, Entropic may start with the minimum security model, where the registry signs for all packages using online keys, or signing keys that are accessible on-demand by the registry. This model protects users from man-in-the-middle (MitM) attacks, but not a compromise of the registry itself.

To achieve compromise-resilience, Entropic should support the maximum security model, where a subset of packages are signed using offline keys, or signing keys kept off the repository, by their respective developers. This model protects users of these packages from a compromise of the registry itself.

To provide even stronger security guarantees in the maximum security model, Entropic may allow developers to use in-toto to provide end-to-end integrity of packages. in-toto ensures that packages were not tampered with from the moment developers checked in source code to a VCS system to the moment packages were built and uploaded to the registry.

The Datadog Agent integrations are an example of a real-world deployment using both TUF and in-toto to achieve compromise-resilience.

More technical information about how TUF and in-toto can be combined is available in ITE-2 and ITE-3.

Actual behavior:

I haven't looked deeply into it, so I don't want to misrepresent, but Entropic probably uses TLS to secure packages in transit, but not at rest. Please correct me if I am wrong.

Steps to replicate:

N/A

Environment info (where relevant)

N/A

Cc @jlegrone @SantiagoTorres @JustinCappos

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant