Return-Path: Delivered-To: apmail-incubator-general-archive@www.apache.org Received: (qmail 46295 invoked from network); 2 Jun 2008 22:09:38 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 2 Jun 2008 22:09:38 -0000 Received: (qmail 53673 invoked by uid 500); 2 Jun 2008 22:09:39 -0000 Delivered-To: apmail-incubator-general-archive@incubator.apache.org Received: (qmail 53523 invoked by uid 500); 2 Jun 2008 22:09:39 -0000 Mailing-List: contact general-help@incubator.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: general@incubator.apache.org Delivered-To: mailing list general@incubator.apache.org Received: (qmail 53512 invoked by uid 99); 2 Jun 2008 22:09:39 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 02 Jun 2008 15:09:39 -0700 X-ASF-Spam-Status: No, hits=1.5 required=10.0 tests=FORGED_MUA_OIMO,MSGID_FROM_MTA_HEADER,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: local policy) Received: from [66.112.202.4] (HELO mail.devtech.com) (66.112.202.4) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 02 Jun 2008 22:08:44 +0000 Message-ID: MIME-Version: 1.0 X-MessageIsInfected: false Received: from mail.devtech.com. ([66.112.202.4]) by mail.devtech.com (JAMES SMTP Server 2.3.1-dev) with SMTP ID 104 for ; Mon, 2 Jun 2008 18:09:06 -0400 (EDT) From: "Noel J. Bergman" To: Subject: RE: enforced signing of artifacts, [was maven repository] Date: Mon, 2 Jun 2008 18:09:11 -0400 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.6604 (9.0.2911.0) X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 In-Reply-To: Importance: Normal X-Virus-Checked: Checked by ClamAV on apache.org Robert Burrell Donkin wrote: > my conclusion was that meta-data signed by [keys in the] WoT would be good enough. > there's no need to distribute a master key +1 > key management is tricky Not that tricky. Let's not make as if this isn't done routinely elsewhere. > this is where the complexity lies. IIRC it was quite tough to come up > with a user friendly trust model that worked correctly. Not so much, seeing as how you just agreed with CLR: > For example, "trust all unsigned", "trust all signed", "trust all signed in > Apache WOT" might be reasonable policies declared by the user. > we don't actually require that the artifacts are signed: just > meta-data about the artifacts What do you think a signature is in the first place? It is a digitally encrypted hash, i.e., meta-data. --- Noel --------------------------------------------------------------------- To unsubscribe, e-mail: general-unsubscribe@incubator.apache.org For additional commands, e-mail: general-help@incubator.apache.org