-
Notifications
You must be signed in to change notification settings - Fork 53
Description
Creating this issue to start gathering thoughts on crates sigstore signing.
Current Status
Cargo performs no signing verification of crates at present.
Users running the cargo install command will download unsigned code which will be compiled and executed.
There has been discussions around using TUF, but progress is arguably very slow, as its been in discussion for over 5 years now [0] / [1].
In thread [0] there appears to be a preference for a TUF based CA / PKI: "So, my vote is for a centrally managed PKI, and more specifically for TUF."
A pull request was made to sign registry index commits [2], was never merged and discussion has moved to this issue [3]. Discussions there have dried up (last comment was late last year). Two sigstore community folks @trishankatdatadog and @joshuagl comment on a document produced here at [4] which supports what we all believe, TUF + TLOGS is a "belt and braces" approach and they compliment each other. I know @SantiagoTorres has looked at this before.
[0] rust-lang/crates.io#75
[1] https://www.reddit.com/r/rust/comments/6qjpzf/could_the_security_of_cargo_and_the_crates_system/
[2] rust-lang/rfcs#2474
[3] rust-lang/cargo#4768
[4] https://ssl.engineering.nyu.edu/blog/2020-02-03-transparent-logs