donaldstufft | 2 years ago | on: Removing PGP from PyPI
donaldstufft's comments
donaldstufft | 2 years ago | on: Removing PGP from PyPI
donaldstufft | 2 years ago | on: Removing PGP from PyPI
But this is a very silly threat model, "I want exactly one person to be able to attack me at a time".
donaldstufft | 2 years ago | on: Removing PGP from PyPI
donaldstufft | 2 years ago | on: Removing PGP from PyPI
Looking at the top 20 packages in the last month by download (packages with hundreds of millions of downloads), only 1 of them shipped a GPG signature with their most recent release. I haven't asked the author of that one, but I do know them and I suspect they agree with the idea that it's not a valuable thing and they do it largely because it exists.
donaldstufft | 2 years ago | on: Removing PGP from PyPI
donaldstufft | 2 years ago | on: Removing PGP from PyPI
However, GPG is not a good tool to build those features on top of, and the vestigial support for GPG signing that PyPI had in no way aided the long term efforts to get proper, secure package signing into PyPI.
donaldstufft | 2 years ago | on: Removing PGP from PyPI
donaldstufft | 2 years ago | on: Removing PGP from PyPI
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
GPG's Web of Trust cannot answer the question of who is trusted to sign for a particular package on PyPI. At best it can tell you that a key that is signed by someone whose key you've signed. That is not a meaningful security control. Practically nobody is signing GPG keys thinking "would I trust this person to sign for every package I might ever want to download" and they are instead at most trying to verify the identify on the key matches.
It's existence creates a bunch of people who insist in trying to take up the oxygen in the room anytime serious security design is trying to happen to try and shoehorn gpg in places where it has no business being.
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
Fundamentally the things you want from a secure crypto system differ depending on the context in which you're applying it. Email needs different things than package signing does than file encryption does. It's silly to pretend that the same tool can provide a good and secure experience for all of them.
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
They're using gpg in spite of its features, not because of them, and would almost certainly be better served by using something else.
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
To me the most interesting part of the article is whether or not the current signatures are even capable of being validated or not, which the answer to that is > 50% of them are not, and those are of the people who care enough in the last 3 years to still be using this undocumented feature.
Is it possible to build a secure signing system ontop of GPG/PGP? Sure. But doing that requires working around or eschewing so many features from it that you might as well just use the base primitives yourself rather than being tied to GPG/PGP.
donaldstufft | 2 years ago | on: TOML: Tom's Obvious Minimal Language
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
Though there is nothing inherently free or decentralized about "PKI", and given your conflation of those concepts I suspect that you're not actually aware of where the lines are drawn from.
Certainly the decentralized nature of PGP adds some challenges to good usability.
However, a large number of the problems come from the PGP spec itself (some of which is defensible in a 20+ year old spec, but not in anything in a modern system) and from GPG's poor implementation.
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
In practice I think the handful of packages that this happens on isn't particularly meaningful or valuable, and in my experience what happens when Debian finds a new key signing packages is.. highly variable. I've seen them just disable signatures when a new key shows up (on major packages even), I've seen them just blanket copy whatever the new key is, I've seen them look at release notes for what the new key is. In one or two cases I've seen them actually track down the project and ask for verification of the new key.
To me, the PGP support in Debian's uscan feels more like security theater than actual security controls, given my experience with the varied responses to a new release being made by a different key.
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
You cannot document your way out of a usability nightmare.
donaldstufft | 2 years ago | on: PGP signatures on PyPI: worse than useless
donaldstufft | 3 years ago | on: Yes, I have opinions on your open source contributions