Open RubenKelevra opened 2 months ago
While such a feature would be quite convenient, it also poses a security risk. I can see many users impatiently accepting the key just to get on with their lives, and I'm not sure it's right to enable that behaviour.
Maybe display a disclaimer each time that's done? People will accept whatever keys anyway if they wanna install something anyway, and arch users should also know that they should be responsible.
While such a feature would be quite convenient, it also poses a security risk. I can see many users impatiently accepting the key just to get on with their lives, and I'm not sure it's right to enable that behaviour.
There's no difference in terms of security, regardless if Aura does the import or an "impatient user" would paste some random commands on the console.
I think a well designed prompt would potentially improve security here, as @stereomato points out.
A safer approach is to use a separate keyring for AUR packages, instead of automatically dumping keys into the user's keyring. This can be passed on to makepkg with the GNUPGHOME
environment variable.
This also requires no additional prompts to annoy the user.
A safer approach is to use a separate keyring for AUR packages, instead of automatically dumping keys into the user's keyring. This can be passed on to makepkg with the
GNUPGHOME
environment variable.This also requires no additional prompts to annoy the user.
Agreed. I think that's what paru is doing as well, isn't it? 🤔
I think paru naively imports keys into the user keyring. FWIW, I added it in aurutils here: https://github.com/aurutils/aurutils/pull/1180
I think paru naively imports keys into the user keyring.
I don't think so, as I had to create a user key with gpg for aura, after using paru for a while on a fairly new system.
I noticed that aura is lacking a function to automatically fetch unknown GPG keys from PKGBUILDs, which was kind of nice that paru would handle that automatically.
I was wondering if Aura could get a similar function, maybe with some more security in mind. So the user would acknowledge the GPG key-id on import and if the key-id in the PKGBUILD changes, there would be a warning message that this happened, which the user needs to acknowledge, too, before the new key is presented as to be imported.
Currently the build just fails at the time the GPG key needs to verify the source file: