[Bug 1834731] Review Request: bitcoin-core - Peer to Peer Cryptographic Currency

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.redhat.com/show_bug.cgi?id=1834731

Björn Persson <bjorn@xxxxxxxxxxxxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 OS|Linux                       |Unspecified
               Type|---                         |Bug
           Severity|medium                      |unspecified
             Status|ASSIGNED                    |NEW
           Hardware|All                         |Unspecified
            Version|rawhide                     |33
              Flags|fedora-review?              |
           Priority|medium                      |unspecified



--- Comment #117 from Björn Persson <bjorn@xxxxxxxxxxxxxxxxxxxx> ---
(In reply to Simone Caronni from comment #105)
> Maybe 10 signatures is a bit too much

You can change that number with every release if you want. Ten happened to be
the number of signatures I could validate.

(In reply to Simone Caronni from comment #106)
> All keys are deleted before regenerating, so at every release it's clear
> what must go and disappear from git (git status).

(In reply to Simone Caronni from comment #108)
> The script now makes sure to download only the valid keys listed in list of
> keys that have been used to sign.

That's a good approach if the set of people who sign releases will be mostly
the same every time. If it turns out that several people sign some releases and
not others, then it will cause their keys to be dropped and added back
repeatedly. In the latter case it may be better to add a key to the package the
first time that key signs a release, and remove only revoked and expired keys.

(In reply to Simone Caronni from comment #108)
> OK, this is much better:
> https://github.com/negativo17/bitcoin-core/blob/
> 1c3ee00c999b0ed8b3e497c7d9019ab1d8bc006b/bitcoin-gpg.sh

bitcoin-gpg.sh relies on the tarball to tell it which keys should be used to
verify the tarball. A manipulated tarball will of course contain a manipulated
keys.txt that lists fake keys generated by the attacker. This makes it all the
more important to not remove and re-add keys in the package unnecessarily. The
continuity of the keys in the Git history becomes the only thing that can show
that the tarball is genuine.

bitcoin-gpg.sh will include a revoked or expired key if it signs a release.
Such keys must be weeded out.

bitcoin-gpg.sh fails for me because the string "Good signature" is
locale-specific. The locale-independent solution is to use --status-fd and grep
for "^\[GNUPG:\] GOODSIG ".


-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
https://bugzilla.redhat.com/show_bug.cgi?id=1834731
_______________________________________________
package-review mailing list -- package-review@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to package-review-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-review@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite Conditions]     [KDE Users]

  Powered by Linux