-
-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: GPGFetch #917
Comments
While such a feature would be quite convenient, it also poses a security risk. I can see many users impatiently accepting the key just to get on with their lives, and I'm not sure it's right to enable that behaviour. |
Maybe display a disclaimer each time that's done? People will accept whatever keys anyway if they wanna install something anyway, and arch users should also know that they should be responsible. |
There's no difference in terms of security, regardless if Aura does the import or an "impatient user" would paste some random commands on the console. I think a well designed prompt would potentially improve security here, as @stereomato points out. |
A safer approach is to use a separate keyring for AUR packages, instead of automatically dumping keys into the user's keyring. This can be passed on to makepkg with the This also requires no additional prompts to annoy the user. |
Agreed. I think that's what paru is doing as well, isn't it? 🤔 |
I think paru naively imports keys into the user keyring. FWIW, I added it in aurutils here: aurutils/aurutils#1180 |
I don't think so, as I had to create a user key with gpg for aura, after using paru for a while on a fairly new system. |
I noticed that aura is lacking a function to automatically fetch unknown GPG keys from PKGBUILDs, which was kind of nice that paru would handle that automatically.
I was wondering if Aura could get a similar function, maybe with some more security in mind. So the user would acknowledge the GPG key-id on import and if the key-id in the PKGBUILD changes, there would be a warning message that this happened, which the user needs to acknowledge, too, before the new key is presented as to be imported.
Currently the build just fails at the time the GPG key needs to verify the source file:
The text was updated successfully, but these errors were encountered: