You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Lots of ink has been spilled on cryptographic signing in package managers (see "Misc. references" below). And we've certainly had our fair share of discussion in this working group. Still, new package managers pop up every day and must rehash many of these conversations for themselves (not to mention existing package managers that want to add security features after-the-fact).
Subtleties involve:
Do developers need to manage private keys? Or is there some kind of PKI (maybe Sigstore)?
What's the difference between community- and curated- package repositories (i.e., anybody can upload vs. a small set of trusted maintainers)?
Privacy/GDPR concerns: Can we avoid having to store emails/other PII? If we do store them, how can we handle takedown requests?
Can we enable auditability with transparency logs?
For repositories that host binary artifacts, how do we link binaries to source (e.g. trusted builders)?
This group is in a good position to produce some documentation (I've even written some about this though it's not in a digestible format) that covers:
Design considerations for a software signing system for a package repository.
Various exemplar signing system designs: distro package manager with small number of maintainers, large-scale community repo, etc.
Paths to incremental adoption.
I don't think we want to be too prescriptive, but we can help focus some of these discussions and make sure folks have all the relevant context when making decisions, plus even give step-by-step adoption guidelines.
Please feel free to add other references, other open questions, and (best) volunteer to coordinate this!
Misc. references
(Due to personal interest, I pay most attention to the proposals that involve Sigstore, but feel free to suggest others.)
Lots of ink has been spilled on cryptographic signing in package managers (see "Misc. references" below). And we've certainly had our fair share of discussion in this working group. Still, new package managers pop up every day and must rehash many of these conversations for themselves (not to mention existing package managers that want to add security features after-the-fact).
Subtleties involve:
This group is in a good position to produce some documentation (I've even written some about this though it's not in a digestible format) that covers:
I don't think we want to be too prescriptive, but we can help focus some of these discussions and make sure folks have all the relevant context when making decisions, plus even give step-by-step adoption guidelines.
Please feel free to add other references, other open questions, and (best) volunteer to coordinate this!
Misc. references
(Due to personal interest, I pay most attention to the proposals that involve Sigstore, but feel free to suggest others.)
The text was updated successfully, but these errors were encountered: