establish trust in community repositories, cryptographically signed by library authors
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
app
nocrypto
openssl
pkg
src
test
unix
.gitignore
.merlin
.ocamlinit
.travis.yml
CHANGES.md
LICENSE.md
README.md
TODO.md
conex-nocrypto.opam
conex.opam
dune-project

README.md

Conex - establish trust in community repositories

%%VERSION%%

Conex is a utility for verify and attest release integrity and authenticity of community repositories through the use of cryptographic signatures (RSA-PSS-SHA256). It is based on the update framework, especially on their CCS 2010 paper, and adapted to the requirements of the opam repository.

The developer sign their release checksums and build instructions. A quorum (with a configurable threshold) of repository maintainers signs the package name to developer key relation. These repository maintainers are enrolled by a quorum of offline root keys.

The TUF spec has a good overview of attacks and threat model, both of which are shared by conex.

Project history

Spring 2017, together with Justin Cappos TAP 8 was designed which extends TUF with key rotation and explicit self-revocation.

Early 2017, a blog post introducing a prototype was published.

We presented an earlier design at OCaml 2016 about an earlier design.

Another article on an even earlier design (from 2015) is also available.

Installation

opam instal conex will install this library and tool, once you have installed OCaml (>= 4.03.0) and opam (>= 2.0.0beta).

A small test repository with two maintainers is available here including transcripts of how it was setup, and how to setup opams repo validation hook.