hackage, cabal-get, and security

Dominic Steinitz dominic.steinitz at blueyonder.co.uk
Thu May 19 15:19:12 EDT 2005


>
>
>Peter Simons <simons at cryp.to <http://www.haskell.org/mailman/listinfo/libraries>> writes:
>
>(snip)
>Dominic Steinitz asks:
>>/  > 2. How do I get a trusted key given I am not likely to
>/>/  > meet anybody "trusted" in the near future?
>/>/
>/>/ Unfortunately, that is impossible. Your best bet is to have
>/>/ everybody sign everybody else's key at every possible
>/>/ opportunity, and that still won't mean that the key Joe Doe
>/>/ downloaded from the Internet will be for real.
>/
>For now, I'm thinking that a "trusted key", from Hackage's
>perspective, will be a that has a path, which I trust, from me to the
>keyholder.  In particular, in the short term at least, I'm hoping that
>folks in Debian will be willing to sign Haskell users' keys.  This is
>convenient since Debian Developers are scattered all over the world.
>There may even be one near you ;) To me, this is a high-enough bar.
>If anyone disagrees strongly with that, let me know, but please also
>suggest a solution.
>
>Why me?  Because I have physical access to the box that Hackage will
>live on, and I have a good handful of trusted keys.
>  
>

I'm not sure I appreciated this. Are you saying that the package builder 
signs with their key and then uploads it and you sign it?

>(snip)
>>/  > 3. What constitutes a "trusted" key?
>/>/
>/>/ There are no trusted keys. The decision of whether to trust
>/>/ a key or not _must_ be made by the person who downloads the
>/>/ package -- the user. Nobody else can make that decision for
>/>/ him.
>/
>Right.  Hackage will sign packages which are signed by keys that it
>trusts, and cabal-get will come with a hackage public key.  I suppose
>cabal-get should ask whether or not to trust the hackage key by
>default upon installation.
>  
>
So the package installer trusts the hackage key but not the package 
builder's key? This implies you trust the package builder's key 
(somehow) and sign the package with the hackage key. What happens if you 
are not available? How do you do delegation?

I'm still not clear how keys get revoked in pgp. If the hackage key gets 
compromised what happens? If the package builder's key gets compromised 
what happens? I assume you have to revoke the hackage key and the 
builder has to revoke their key. Is my understanding correct?

Another question which I don't think has been answered: suppose I become 
untrustworthy (I start putting trojans in my code) what happens? I 
assume the answer is you, as gatekeeper, find out and then no longer 
sign my code with the hackage key?

>BTW, if anyone wants to help hack on this, let me know :)
>
>  
>
I'd be happy to help if you let me know what needs doing.

Dominic.


More information about the Libraries mailing list