[Reproducible-builds] concrete steps for improving apt downloading security and privacy

Jérémy Bobbio lunar at debian.org
Fri Sep 19 22:25:15 UTC 2014


Hans-Christoph Steiner:
> I still strongly disagree.  Very very few people care enough to learn a
> separate process.  For security to be usable, it needs to be as transparent
> and automatic as possible.  APKs and Android have demonstrated that you can
> have this kind of system working well.

Comparing .deb and APKs is misleading when talking of tools. A given
.deb will have dependencies. APKs are self-contained.

This makes `.deb` hard to use without a repository for anything
substantial. I would assume that's why Ubuntu developed the Click
package format.

> They've made the whole process easier by requiring the upstream
> developer be the manager of the signing. I think setting up a similar
> role in Debian will be quite beneficial, and dak and the package
> maintainer are natural roles to be the signer.

With the current .buildinfo signing scheme, we require the Debian
maintainer to provide a package that can be built reproducibly. Then we
can require a proof of that reproducibility from the maintainer, any
other maintainers, and any number of buildds. These assessments that a
build can be properly reproduced can come after the initial upload. We
can only do that if the .deb files do not change after they hits the
archive.

-- 
Lunar                                .''`. 
lunar at debian.org                    : :Ⓐ  :  # apt-get install anarchism
                                    `. `'` 
                                      `-   
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/reproducible-builds/attachments/20140920/37467312/attachment.sig>


More information about the Reproducible-builds mailing list