Re: OK to submit l10n PR with signed commits?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Junio C Hamano <gitster@xxxxxxxxx> writes:

>>> Instead of talking first about drawbacks, we should consider the
>>> upsides.  Why would we even want to see your GPG signature, when
>>> most of us do not even have your GPG public key in our keychains?
>>> 
>>> What are we trying to achieve by doing this?
>>
>> Just to ensure that PR commits are really from the respective authors.
>
> Yeah, but my point was that it would not ensure, because practically
> nobody has ways to validate the signature was created with your
> private key, and public keyservers have been tainted long time ago
> with fake keys with the same fingerprint, so would not work as a
> good way to obtain your public key and be sure it is yours.

I think I should rethink this.

Even though I think it is fair to say that more than 99% of people
won't have your public key and even if somebody gave them saying
"this is Bagas' key", they do not have a way to independently verify
it is truly your key (and I think the same thing can be said of my
key).  But in today's world, there are a few places that it does not
matter all that much that you and I do not have each others' keys:
hosting sites.

I think both GitHub and GitLab lets you register your public key, so
when they are about to show a commit (or a tag for that matter),
they can

 - notice it is signed;
 - look up the author/tagger/committer ident of the Git object;
 - look up the ident in their user database;
 - find the key(s) of that user account; and
 - verify the signature using the key(s).

and display the user account that the Git object is signed by a key
registered to it.

Now there may be ways to contaminate hosting sites with fake keys
that have the same fingerprints as the real ones registered to fake
user accounts, and that may render such a feature at the hosting
sites less useful.  I haven't thought through the security
implications.

Of course, $CORP or other organizations can have their members
register their public keys and do pretty much the same thing within
their closed world.  Safeguarding the public key database is their
problem so I won't be worried about, unlike hosting sites where
practically anybody and their dogs can create accounts ;-).

Thanks.




[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux