Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Produce cryptographic signing guide for package managers #10

Open
znewman01 opened this issue Jan 12, 2023 · 2 comments
Open

Produce cryptographic signing guide for package managers #10

znewman01 opened this issue Jan 12, 2023 · 2 comments

Comments

@znewman01
Copy link

Lots of ink has been spilled on cryptographic signing in package managers (see "Misc. references" below). And we've certainly had our fair share of discussion in this working group. Still, new package managers pop up every day and must rehash many of these conversations for themselves (not to mention existing package managers that want to add security features after-the-fact).

Subtleties involve:

  • Do developers need to manage private keys? Or is there some kind of PKI (maybe Sigstore)?
  • What's the difference between community- and curated- package repositories (i.e., anybody can upload vs. a small set of trusted maintainers)?
  • Privacy/GDPR concerns: Can we avoid having to store emails/other PII? If we do store them, how can we handle takedown requests?
  • Can we enable auditability with transparency logs?
  • For repositories that host binary artifacts, how do we link binaries to source (e.g. trusted builders)?

This group is in a good position to produce some documentation (I've even written some about this though it's not in a digestible format) that covers:

  • Design considerations for a software signing system for a package repository.
  • Various exemplar signing system designs: distro package manager with small number of maintainers, large-scale community repo, etc.
  • Paths to incremental adoption.

I don't think we want to be too prescriptive, but we can help focus some of these discussions and make sure folks have all the relevant context when making decisions, plus even give step-by-step adoption guidelines.

Please feel free to add other references, other open questions, and (best) volunteer to coordinate this!

Misc. references

(Due to personal interest, I pay most attention to the proposals that involve Sigstore, but feel free to suggest others.)

@feelepxyz
Copy link

@znewman01 great initiative! I would love to help out here and share any learnings from GitHub and working on provenance for npm.

@steiza
Copy link
Member

steiza commented Oct 11, 2023

We covered some, but not all, of this content in #17.

There were some requests for additional content on #17 (comment) that we could think about addressing in future docs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants