Skip to content
This repository has been archived by the owner on Jul 23, 2024. It is now read-only.

Sign PyPI releases #1

Open
maltfield opened this issue Aug 10, 2020 · 0 comments
Open

Sign PyPI releases #1

maltfield opened this issue Aug 10, 2020 · 0 comments

Comments

@maltfield
Copy link

maltfield commented Aug 10, 2020

Describe the bug

When a user downloads this python module using pip, there is no cryptographic authenticity or integrity validation to protect the user from a MITM attack.

Therefore, this project is making any other projects that obtain the install module via pip in their build process vulnerable to a watering hole attack.

Expected behavior

A developer should have a mechanism to cryptographically verify the integrity and authenticity of this package when obtaining it through pip.

To Reproduce

pip install install

Additional context

As far as I can tell, this is the only package required for @theupdateframework that cannot be cryptographically validated when installing tuf and its dependencies on Debian, which is a pretty important security risk for users trying to bootstrap a secure updater that itself can't be secured.

Possible solutions include:

  1. Using the --sign argument of twine when uploading packages to PyPI

  2. Publishing a cryptographically signed document (ideally using gpg) listing the hashes for all packages uploaded to PyPI, which users can then pass into pip using the --hash argument

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant