On Tue, Mar 7, 2017 at 1:23 AM, Jeff King <peff@xxxxxxxx> wrote: > On Mon, Mar 06, 2017 at 11:59:24AM -0800, Stefan Beller wrote: > >> What is the difference between signed commits and tags? >> (Not from a technical perspective, but for the end user) > > I think git has never really tried to assign any _meaning_ to the > signatures. It implements the technical bits and leaves it up to the > user and their workflows to decide what a given signature means. That is a nihilistic approach? ;) As a user I would like to know what I can do with such a signed commit. And I happen to be an experienced user in the sense that I know about git tag --sign as well as git verify-tag; further reading of these two man pages tells me I can even use git-tag to verify a tag. So looking for the verify option in git-commit for signed commits... well, no. Ah! git-verify-commit it is. I assumed to have most discussion in git-tag or at least a pointer from there to further reading. In an ideal world we might have a manpage git-trust-model(7), that explains different workflows and when certain signing mechanisms make sense and what they protect us from. I might write such a man page (after I get the gitmodules page done). Off list I was told "just look at Documentation/technical/signature-format.txt; it explains all different things that you can sign or have signed stuff". But as an end user I refuse to look at that. ;) > > People generally seem to take tag signatures to mean one (or both) of: > > 1. Certifying that the tree contents at that tag are the official, > signed release contents (i.e., this is version 1.0, and I'm the > maintainer, so believe me). > > 2. Certifying that all the history leading up to that tag is > "official" in some sense (i.e., I'm the maintainer, and this was > the tip of my git tree at the time I tagged the release). > > Signing individual commits _could_ convey meaning (2), but "all history > leading up" part is unlikely to be something that the signer needs to > enforce on every commit. I was told signed commits could act as a poor mans push certificate (again off list :/). > In my opinion, the most useful meaning for commit-signing is simply to > cryptographically certify the identity of the committer. We don't > compare the GPG key ident to the "committer" field, but IMHO that would > be a reasonable optional feature for verify-commit (I say optional > because we're starting to assign semantics now). So the signed commit focuses on the committer instead of the content (which is what tags are rather used for) ? > I think one of the reasons kernel (and git) developers aren't that > interested in signed commits is that they're not really that interesting > in a patch workflow. You're verifying the committer, who in this project > is invariably Junio, and we just take his word that whatever is in the > "author" field is reasonable. Well in such a workflow Junio could also sign the tip-commits of pu/next before pushing, such that we can trust it was really him doing the maintenance work and not his evil twin. > But for a project whose workflow is based around pushing and pulling > commits, I think it does make sense. The author field may not always > match the committer (e.g., in a cherry-pick), but it still lets you > trace that attestation of the author back to the committer. And it's up > to UI to make that distinction clear (e.g., if you push a signed > cherry-pick to GitHub, the commit is labeled with something like "A U > Thor committed with C O Mitter", and then you get a little "Verified" > tag for C O Mitter that gives you more information about the signature). > > So I don't think it's just a checkbox feature. It's a useful thing for > certain workflows that really want to be able to attribute individual > commits with cryptographic strength. "certain workflows". :( See, I really like reading e.g. the "On Re-tagging" section of git-tag as it doesn't hand wave around the decisions to make. Now as a user I may already have a workflow that I like. And I might want to "bring in more security". Then I have to figure out possible attack scenarios and which sort of signing can prevent such an attack. And each organisation has to do that themselves, but we as the provider of the tool might have this knowledge because we implemented all these shiny "sign here, please" parts. Thanks for the lively discussion, Stefan