py-sdl / py-sdl2

Python ctypes wrapper around SDL2
Other
298 stars 50 forks source link

Please PGP/GnuPG sign source tarballs #69

Closed marcusva closed 7 years ago

marcusva commented 10 years ago

Originally reported by: Franz Schrober (Bitbucket: franzschrober, GitHub: Unknown)


Distributions now try to verify upstream tarballs to easier detect manipulation by third parties. One of the steps is to have detached, ascii armored signatures done using the PGP/GnuPG signature key of the software author next to the actual source tarball.

Of course, this is only one check but at least this one can help: http://lists.opensuse.org/opensuse-factory/2012-12/msg00235.html https://wiki.debian.org/debian/watch/#Cryptographic_signature_verification


marcusva commented 7 years ago

Original comment by Marcus von Appen (Bitbucket: marcusva, GitHub: marcusva):


New release source packages are signed now.

marcusva commented 9 years ago

Original comment by Franz Schrober (Bitbucket: franzschrober, GitHub: Unknown):


Not very much? When the distribution always checks against the same key before downloading a source.... I bet it helps a lot to identify the source of the tarball with a high probability. At least it would helped a lot in the past:

marcusva commented 9 years ago

Original comment by Marcus von Appen (Bitbucket: marcusva, GitHub: marcusva):


I won't sign any previous release. I'm fine with doing so for future releases, though one has to bear in mind that signing the source tarballs does not improve security very much.

marcusva commented 10 years ago

Original comment by anatoly techtonik (Bitbucket: techtonik, GitHub: techtonik):


That makes it much clearer. Thanks.

marcusva commented 10 years ago

Original comment by Franz Schrober (Bitbucket: franzschrober, GitHub: Unknown):


Most of the stuff is described in the links. Here is another post about how it is done. https://groups.google.com/d/msg/mupen64plus/FgXPLOMgGBE/rgv9rjotXFwJ

This cannot be solved by you because you are not the maintainer/release manager and the maintainer/release manager should do the signing.

What needs to be done:

And as extra step the signer of the keys must be reachable using the mail address to make a simple verification that the signature key belongs to the mail address.

marcusva commented 10 years ago

Original comment by anatoly techtonik (Bitbucket: techtonik, GitHub: techtonik):


You marked this as trivial. Can you describe how it should look like and what is the process? It would be nice if the process will be also Windows-compatible.