Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider signing #29

Open
Madis0 opened this issue Feb 19, 2024 · 7 comments
Open

Consider signing #29

Madis0 opened this issue Feb 19, 2024 · 7 comments
Labels
blocked currently blocked on external factors enhancement New feature or request

Comments

@Madis0
Copy link
Member

Madis0 commented Feb 19, 2024

Maybe it is worth it to use this, have to consider
https://about.signpath.io/product/open-source
Ideally it'd support all OSes then, not just Windows

@Madis0 Madis0 added the enhancement New feature or request label Feb 19, 2024
@vgskye
Copy link
Collaborator

vgskye commented Feb 19, 2024

Linux... doesn't have signing in the slightest and I don't think signpath provides macOS, you need the 99$/yr apple developer program for that I think

@Madis0
Copy link
Member Author

Madis0 commented Feb 20, 2024

There's also https://www.sigstore.dev/, which is potentially better because of big names backing it up (some previous attempts did become paid, presumably due to lack of funding).

@vgskye
Copy link
Collaborator

vgskye commented Feb 20, 2024

I don't think sigstore is recognized by any real entity as a code signing cert?

@Madis0
Copy link
Member Author

Madis0 commented Feb 20, 2024

In that case, I guess sigstore is for code signing (which we don't necessarily need for this project) while SignPath is for binary signing.

@vgskye
Copy link
Collaborator

vgskye commented Feb 20, 2024

I think sigstore is more for docker containers and such and making sure the software wasn't tampered with on the way through rather than "can this be reasonably considered virus-free"

@vgskye vgskye added the blocked currently blocked on external factors label Mar 30, 2024
@vgskye
Copy link
Collaborator

vgskye commented Jun 8, 2024

Fabulously-Optimized/fabulously-optimized#849 needs to be merged and verification integrated in here to meet Signpath Foundation reqs

@Madis0
Copy link
Member Author

Madis0 commented Jun 9, 2024

Need to fulfill these criteria as well https://github.com/SignPath/Website-old/blob/v2/src/drafts/oss_policy.md

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
blocked currently blocked on external factors enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants