Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cryptographically Signed Releases #8

Open
maltfield opened this issue Oct 5, 2024 · 1 comment
Open

Cryptographically Signed Releases #8

maltfield opened this issue Oct 5, 2024 · 1 comment

Comments

@maltfield
Copy link

maltfield commented Oct 5, 2024

Description

Currently it is not possible to verify the authenticity or cryptographic integrity of the downoads from your website or github.com because the releases are not cryptographically signed.

This makes it hard for epicyon users to safely obtain the epicyon software, and it introduces them (and potentially their instance's users' data) to watering hole attacks.

Steps to Reproduce

  1. Go to the this repo
  2. Look for releases and information about verifying signatures
  3. See there's a website
  4. Go to the website https://libreserver.org/epicyon/
  5. Look for information about verifying signatures
  6. ???
  7. Open Ticket

Expected behavior: [What you expected to happen]

A few things are expected:

  1. I should be able to download the epicyon PGP key out-of-band from popular third-party keyservers (eg https://keys.openpgp.org/)
  2. I should be able to download a cryptographic signature of the release (or, better, the releases' digest file, such as a SHA256SUMS.asc file) along with the release itself
  3. The downloads page itself should include a link to the documentation page that describes how to do the above two steps

Actual behavior: [What actually happened]

There's just literally no information on verifying downloads, and it appears that it is not possible to do so.

@maltfield
Copy link
Author

maltfield commented Oct 5, 2024

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant