Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

master branch protection #130

Open
2 tasks
trishankatdatadog opened this issue Dec 16, 2020 · 6 comments
Open
2 tasks

master branch protection #130

trishankatdatadog opened this issue Dec 16, 2020 · 6 comments
Labels

Comments

@trishankatdatadog
Copy link
Member

For the master branch, could we:

  • require signed commits?
  • require >=2 reviews?
@joshuagl
Copy link
Member

Agreed that requiring >= 2 reviews, as in the specification repo, is a good idea.

We don't require signed commits anywhere else, are you suggesting we should? I'm not opposed, just trying to clarify.

@trishankatdatadog
Copy link
Member Author

We don't require signed commits anywhere else, are you suggesting we should? I'm not opposed, just trying to clarify.

Might be a good idea to require 2FA, signed commits, and >= 2 reviews on all of our repos.

@joshuagl
Copy link
Member

Completely agree with 2FA and >=2 reviews.

I'm wary about requiring signed commits, because managing GPG keys without a security token is not something I feel comfortable asking folks to do.

What would be the value of signed commits? Would we still get that value from maintainers signing their commits?
We could suggest for signed commits from all contributors and expect it from our maintainers (who I think all have YubiKeys).

@trishankatdatadog
Copy link
Member Author

What would be the value of signed commits? Would we still get that value from maintainers signing their commits?

Although 2FA reduces the risk of unauthorized commits from maintainers, signed commits reduce that risk even further. The threat model is rather specific, but I think it's especially valuable for our project.

We could suggest for signed commits from all contributors and expect it from our maintainers (who I think all have YubiKeys).

Agreed, but it's hard to enforce this. One thing we can do is require signed commits, and use GitHub's automatic signing of merges.

@joshuagl
Copy link
Member

What would be the value of signed commits? Would we still get that value from maintainers signing their commits?

Although 2FA reduces the risk of unauthorized commits from maintainers, signed commits reduce that risk even further. The threat model is rather specific, but I think it's especially valuable for our project.

My original comment should have read "Would we still get that value from only maintainers signing their commits"? To which, I think you're answering no?

I think it's worth pointing out that requiring signed commits places an additional barrier in the way of potential new contributors. That barrier may be an acceptable price to pay, given the nature of our project.

Do we need a TUF contributors key signing party in the post-pandemic era?

@trishankatdatadog
Copy link
Member Author

trishankatdatadog commented Dec 17, 2020

My original comment should have read "Would we still get that value from only maintainers signing their commits"? To which, I think you're answering no?

I think so, yes, if at least for optics. If we talk about nation-state attacks, then we must take things seriously by signing our own commits, but that's just my 0.02 BTC.

I think it's worth pointing out that requiring signed commits places an additional barrier in the way of potential new contributors. That barrier may be an acceptable price to pay, given the nature of our project.

It certainly does place an additional barrier. One way we can solve the problem is by getting GitHub to automatically sign a PR that squashes all the commits from the web site. (Someone correct me if I'm wrong here.) It's much less valuable for contributors to sign their commits, because we can never be certain who they and what their intent really are, so it's on us to thoroughly vet their contributions.

Do we need a TUF contributors key signing party in the post-pandemic era?

🎉

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants