Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Please add GPG keys to SKS keyservers #35

Closed
hvisage opened this issue Mar 28, 2018 · 5 comments
Closed

Please add GPG keys to SKS keyservers #35

hvisage opened this issue Mar 28, 2018 · 5 comments

Comments

@hvisage
Copy link

hvisage commented Mar 28, 2018

Good day, could you please add the GnuPG keys to the SKS/etc. GnuPG keyservers instead of having to fetch it from the mendix website?

wget -q -O - https://packages.mendix.com/mendix-debian-archive-key.asc | apt-key add -

@knorrie
Copy link
Member

knorrie commented Jan 16, 2019

Can you explain your usecase?

The signing key can be rotated, and the https link always gives you the current one.

Besides that, the only thing that should be done with it is after that installing the debian-mendix-archive-keyring package, and then removing the manually added key again.

And, then keep the debian-mendix-archive-keyring up to date (unattended-upgrades!), so you won't be surprised after the signing key has rotated (which doesn't happen too often, and the new key will always be in that package for a month or maybe two in advance).

Hm, I see that last step (removing manually added key) is not in the documentation at https://github.com/mendix/m2ee-tools/blob/master/doc/install-1.md

@hvisage
Copy link
Author

hvisage commented Jan 16, 2019 via email

@knorrie
Copy link
Member

knorrie commented Jan 17, 2019

Can you elaborate? Why would "https://packages.mendix.com" not be available at the same moment that any keyserver is (this sounds like if your system has working external connectivity or not).

Note that (afaik) anyone can push public keys, so If you want to have some key on a keyserver cluster, you can cause that to happen right now.

You might also like to be able to verify whatever you pull from a keyserver to match some trust path that you're comfortable with. The key that's on the https location has my signature on it, that could be a start. Maybe we can meet at Mendix World 2019 so you can verify that signature was really me?

Still, this will not solve key rotation happening, since it will just be a new key replacing the old one, and you would have no clue where the new key is.

@hvisage
Copy link
Author

hvisage commented Jan 17, 2019 via email

@hvisage hvisage closed this as completed Jan 17, 2019
@knorrie
Copy link
Member

knorrie commented Jan 22, 2019

Ok, you have to choose for yourself how to do things, and I'm indeed just giving unsolicited advise.

I'm interpreting your description above as "When I have a missing GPG key when doing apt operations, I'll just fetch it."

If that's what you mean, I would really recommend against doing that. The repo signing keys are there to help you make sure you're actually getting Mendix stuff and not some other packages from a MitM-ed connection. If you get an apt error about missing signing keys and then fetch them from keyservers, then you're not protected against this at all?

Another idea: if you have a proxy box that is serving a cached archive, then you can also keep the debian-mendix-archive-keyring package up to date on that one and serve the file /usr/share/keyrings/debian-mendix-archive-keyring.gpg somewhere and use that to bootstrap new systems, by throwing that file in /etc/apt/trusted.gpg.d

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants