-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make the Nitrokey app more secure (sig binary, provide checksums+GPG) #110
Comments
Push See also #136 |
Hi! This is on our to-do list and will be done as soon as possible. Please feel free to 'bump/push' in case this would appear forgotten. |
In addition, a signature of the source tar file would be automatically checked by the deb update process. |
And it would be nice if you'd sign your commits: https://mikegerwitz.com/papers/git-horror-story |
push |
Cmon guys, this issue is now 6 months old without any change. |
Thanks @szszszsz for signing (at least most of) your commits now 😉 👍 |
another month... |
I see you pin that to milestone 1.0 |
80% complete |
Hi! |
@sedrubal The other unsigned commits from that time came from using automatic merging offered by Github. I have changed the workflow with merging the changes locally, thus no unsigned commits should be present from my side. |
@davesteele I am not sure I understand when GPG signature will be validated, but I hope to investigate this further. Do you have more materials explaining this? |
Debian packaging includes a 'watch' file, which provides a set of rules for finding and parsing upstream source tars. The uscan(1) utility parses that file to download the source tar, or to determine the most recent version. uscan/watch can support finding and verifying a signature during the download process. For a project on GitHub, the easiest way for you to support this is to add the signature file to the set of files in a 'release'. It helps if the path to the signature is <tgz url>.asc. Here is a succinct summary. |
@szszszsz to valid a GPG you need other guys which validate it, upload that with their own key to the server and then you will see that under your key. I also miss a nitrokey-app-v1.1.exe.asc GPG file to verify the binary, as well as checksums for the binary |
@beerisgood Indeed! Thank you for signing the key. Should not you sent it to me for import and publish though? As for .asc and checksums - these seems redundant in the presence of the code-signing certificate, but in case someone wants to validate using other tools I have uploaded them too into release files. |
@davesteele I will move that to separate issue for easier tracking. |
Initial issue fixed, closing. |
@szszszsz: Why should i upload my key? I upload it to the GPG server |
The apps from https://www.nitrokey.com/download goes over HTTPS- which is good! but:
We can't verify the apps (i only check Windows).
The exe isn't signed- it even give me the window and ask if i realy want to start this app because it comes from another pc. Not realy secure!
And not only this. We can't verify the file is realy from you, because of no checksums (please add SHA512!) and GPG file.
Please fix this
The text was updated successfully, but these errors were encountered: