[pkg-gnupg-maint] Bug#911189: Bug#911189: gpgme-json packaging
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Thu Aug 8 17:50:08 BST 2024
Hi Sébastien--
On Thu 2024-08-08 00:53:04 +0200, Sébastien Noel wrote:
> Thank you very much again for taking the time to respond to my offensive
> email that i'm not proud of :/
I appreciate your retraction of the offensive parts of your message. I
understand the frustration (i've been in your shoes myself), and i hope
we can figure out how to collaborate.
> I am in no position to have done any security analysis of any GnuPG
> component.
> But I am the kind of person that trust upstream devs. So if GnuPG offers
> a binary that browsers can use IF they clear the way by providing a file
> with some kind of UID to identify extensions that are permitted to use
> it, i'm the kind of person that will blindly trust the system.
> Call me naive but that's who i am.
I get it, and i think we're all scattered along a spectrum to some
extent. No downstream packager or redistributor is going to understand
any piece of software as well as its upstream authors. But this is not
a black-and-white situation. As packagers, we still have an obligation
to attempt some analysis along these lines, however faulty or limited it
might be.
For example, when a security issue is reported (this *will* happen, for
sensitive software like GnuPG), as packagers we need to be able to
understand the security issue, its proposed fixes or workarounds, and
how those changes might affect other parts of the tooling.
If we offer packaging without even a first attempt at understanding the
problem space, we're merely putting off starting the kind of analysis
that we'll be forced to engage in eventually. And we're passing the buck
to our own downstreams -- our direct users and the users of derivative
distros that depend on debian's vetting and maintenance processes.
I think we have an obligation to try to be more responsible than that.
> The goal is to allows Mailvelope to talk to secret key material.
> Only Mailvelope.
Thanks, this is a useful scope for this work; it would probably be
useful to have some Mailvelope developers commenting on this thread if
that's the end goal here, if they're interested in this kind of support
on Debian and related systems.
> And i want to emphase that it *talks* to secret key material, it doesn't
> have access to it (secrets keys still doesn't leave the
> opengpgcard/yubikey/whatever-hardware-you-have)
I'm not particularly motivated by this distinction, fwiw, though i used
to be more excited by it.
I currently see this kind of argument (prioritizing defenses against
"kleptography" as it were) as a sort of cryptographic fetishism -- the
confidentiality and authenticity that we care about is confidentiality
and authenticity *of the material we're communicating*.
That's not to say that i want to leave secret key material unguarded. I
do understand the motivation to defend it. But i think emphasizing
"doesn't have access to the secret key material" fundamentally
misunderstands the priorities of cryptographic communication, which is
*to secure the communication*. "Mere" ability to *use* the key material
still risks the truly sensitive stuff, which is the content.
> except for the part where you ask for an analysis, i'm sure I can answer
> to everything else. I will do that promptly.
I hope we can work on the analysis part as well, there are several
questions that i've asked on the MR. Perhaps we can address some of
them, even if not all. I appreciate that some security analysis has
been done by upstream already. Maybe there are pointers to that work
that could be a useful start?
I also note in https://mailvelope.com/en/faq#gnupg that mailvelope
doesn't depend on GnuPG specifically -- by default it uses OpenPGP.js,
but *may* communicate with GnuPG for the secret key material.
If you're using Mailvelope, can you confirm that this is the case? Do
you currently use it without GnuPG?
Regards,
--dkg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 324 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-gnupg-maint/attachments/20240808/f76f2b09/attachment.sig>
More information about the pkg-gnupg-maint
mailing list