See also:

FSFE is misusing FSF name to steal donations from Richard Stallman



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Tor exit nodes



On Tue, Oct 10, 2017 at 09:02:22AM -0400, Roberto C. Sánchez wrote:

> If conflicted allegiance of individual DDs is a concern then it would be
> worth discussing some sort of multi-party/multi-key requirement for
> certain things.  For example, security uploads may require additional
> sponsorship by another DD from another country. …

To me it would be already a big step forward to make Debian workflows
auditable, so anyone can have a look at what other people are doing.

Contributions are generally all in the open, but it's pretty hard to
collate them all into a single audit log that one can look at.

I would find such a thing useful also to audit myself, to see if things
are being done in my name that I am now aware of.

Years ago I tried to make a service that maintains an RSS feed
mentioning each time someone's key was used with regards to Debian.
It's been difficult, and there was no guarantee that the RSS feed would
be complete. In the end I gave up and took it down, because I think that
an audit log that misses things is more dangerous than not having an
audit log.

My bank sends me an audit log of all logins and all money transfers done
on the home banking interface. My health care sends me an audit log of
all logins and documents viewed in their online medical records
interface.

I would like to have the same for my Debian activity, at least for those
kinds of activities that could be considered sensitive, such as package
uploads, logins to Debian machines, signed emails sent to Debian mailing
lists, db.debian.org logins and profile changes, generating a new key on
sso.debian.org, maybe even apache logs for queries authenticated with
one of my sso keys.

It ought to introduce less procedural hurdles compared to
multi-party/multi-key requirements, and still discourage attacks from
those kind of parties that cannot afford to be discovered.

(all my reply can be quoted on a public list)


Enrico

-- 
GPG key: 4096R/634F4BD1E7AD5568 2009-05-08 Enrico Zini <[email protected]>

Attachment: signature.asc
Description: PGP signature