All of lore.kernel.org
 help / color / mirror / Atom feed
From: James Bottomley <James.Bottomley@HansenPartnership.com>
To: Kees Cook <keescook@chromium.org>,
	Stephen Rothwell <sfr@canb.auug.org.au>
Cc: Konstantin Ryabitsev <konstantin@linuxfoundation.org>,
	 tools@linux.kernel.org, users@linux.kernel.org
Subject: Re: merging pull requests
Date: Fri, 01 Oct 2021 10:07:05 -0700	[thread overview]
Message-ID: <cef357f1ee179c8250fa1507eea7fe39e6ee2e78.camel@HansenPartnership.com> (raw)
In-Reply-To: <202109301630.C2646F8B5@keescook>

On Thu, 2021-09-30 at 16:42 -0700, Kees Cook wrote:
[...]
> The only "hole" I see with the integrity checking is that since only
> tags or mbox headers are signed, and those aren't part of the merge,
> there isn't a easy way that I see to follow the integrity chain for a
> given resulting tree. (Which is technically different from the
> "trust" chain.)
> 
> For example, for stuff going into my tree:
> - If it's from an mbox, I can easily check that the patches haven't
> changed
>   in flight when the author used b4/patatt to wrap the email
> delivery.
> - If it's from a remote tag, I can check the tag signature.
> This is all fine.
> 
> Now I publish my tree, and sign a tag for it for a pull request.
> Whoever does that pull can only check my tag and has to trust I
> checked what went into my tree. At the end of the day, that's exactly
> what the tag signature is for: whoever is pulling must trust the PR
> sender for all kinds of reasons. But there isn't a way to
> mechanically perform an integrity check on the components of those
> results: the merged mbox with the signature headers or the remote tag
> signature aren't associated with the resulting branch any more.
> 
> But given that maintainers may tweak what was sent to them or squash
> fixes, there's likely no point in that kind of integrity chain...

Well, I think you need to re-examine what it is we're attesting to
cryptographically.  We already have an attestation process, it's called
the Signed-off-by: chain.  The DCO is very specific, either: it's your
contribution; a contribution with attribution you modified or it's an
unmodified contribution from another.  This is the base level of legal
attestation the maintainers do and which we're very careful to get
right.  If you want to try and express this crytpographically, that's
fine, but it must match the workflow we currently use.

James



  parent reply	other threads:[~2021-10-01 17:07 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-09-30 17:33 merging pull requests Kees Cook
2021-09-30 20:00 ` Konstantin Ryabitsev
2021-09-30 23:09   ` Kees Cook
2021-09-30 23:22     ` Stephen Rothwell
2021-09-30 23:29       ` Kees Cook
2021-09-30 23:29     ` Stephen Rothwell
2021-09-30 23:42       ` Kees Cook
2021-10-01 11:59         ` Jason Gunthorpe
2021-10-02  0:15           ` Kees Cook
2021-10-01 17:01         ` Steven Rostedt
2021-10-01 17:07         ` James Bottomley [this message]
2021-10-02  0:17           ` Kees Cook
2021-10-01 17:19         ` Konstantin Ryabitsev
2021-10-02  2:35           ` Kees Cook
2021-09-30 23:31     ` Olof Johansson
2021-10-01  0:09       ` Kees Cook
2021-10-01  0:27         ` Olof Johansson
2021-10-01 17:05           ` Steven Rostedt
2021-10-02  0:12             ` Kees Cook
2021-10-01 18:26     ` Konstantin Ryabitsev
2021-10-01 18:47       ` Linus Torvalds
2021-10-01 19:30         ` Konstantin Ryabitsev
2021-10-02  0:08           ` Kees Cook
2021-10-02  6:22         ` Willy Tarreau
2021-10-02  0:11       ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cef357f1ee179c8250fa1507eea7fe39e6ee2e78.camel@HansenPartnership.com \
    --to=james.bottomley@hansenpartnership.com \
    --cc=keescook@chromium.org \
    --cc=konstantin@linuxfoundation.org \
    --cc=sfr@canb.auug.org.au \
    --cc=tools@linux.kernel.org \
    --cc=users@linux.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.