Skip to content

Tracking: Trust model for signed Rust / Rustup releases #2029

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
3 tasks
kinnison opened this issue Sep 28, 2019 · 3 comments
Open
3 tasks

Tracking: Trust model for signed Rust / Rustup releases #2029

kinnison opened this issue Sep 28, 2019 · 3 comments
Labels
tracking This is a tracking issue
Milestone

Comments

@kinnison
Copy link
Contributor

Once we have simplistic signature checking in place (#2028) we need to decide upon and deploy a more comprehensive trust model so that we're not doing the bare minimum to protect our users.

  • Meeting between relevant parties (e.g. Sequoia-PGP team, Infra team, Rustup team, and DKG) to kick off a working group
  • That working group to discuss and come up with a functional trust model which improves on the status quo
  • Implementation of that trust model in rustup.

People who might be relevant to this are:

Obviously we will not limit the wg to those, but that's a starting point.

@luser
Copy link

luser commented Mar 17, 2020

I'm curious as to what the desired end state would be here--just being able to trust that "yes, the binaries that rustup installed are the ones built by the Rust project" or something broader? With the Rust toolchain build being reproducible nowadays I would love to someday have a way for multiple parties to attest that they produced identical binaries from the same sources and a method for trust based on that.

@kinnison
Copy link
Contributor Author

The goal is indeed to allow third parties to attest to the binaries distributed by rust-lang, and indeed to eventually permit other third parties to say "I will only install my toolchain when at least X independent parties I have identified have attested to the binary signatures"

@luser
Copy link

luser commented Mar 21, 2020

It's currently targeted at building Rust crates, but I think it'd be interesting to find out if synchronicity could be used for that:
https://github.com/iqlusioninc/synchronicity

@rami3l rami3l added this to the On Deck milestone May 1, 2024
@rami3l rami3l added the tracking This is a tracking issue label Jul 10, 2024
@rami3l rami3l changed the title Tracking / Discussion: Trust model for signed Rust / Rustup releases Tracking: Trust model for signed Rust / Rustup releases Jul 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
tracking This is a tracking issue
Projects
None yet
Development

No branches or pull requests

3 participants