|
|
|
|
|
|
|
|
|
|
Re: Installing 2022-12 products warns about unsigned content [message #1856706 is a reply to message #1856701] |
Fri, 23 December 2022 10:09   |
Eclipse User |
|
|
|
Where are the jars you want to sign coming from?
Keep in mind that if you jar-sign an artifact, you change it, so it will have a different checksum in the artifact metadata. But the artifact ID remains the same, so it's easy to mix up the original artifact and the resigned artifact because p2 considers them the same (considering only the ID as the identity). So resigning jars from Eclipse is resiging jars in general is not a great idea. The PGP signature is external and you can have one or more PGP signatures associated with each artifact in the artifact.xml metadata. And even jar-signed artifacts can also be PGP signed...
Yes, p2 in general (as used by the installer too) won't ask for trust if the certificate is rooted on a certificate in Java's cacerts. Another point to note is that the product catalog used by the installer also includes a set of pre-trusted PGP keys:
https://git.eclipse.org/c/oomph/org.eclipse.oomph.git/tree/setups/keys/trusted-keys.asc
That resource is referenced from this resource:
https://git.eclipse.org/c/oomph/org.eclipse.oomph.git/tree/setups/org.eclipse.setup
These are generated from the SimRel repository and are the PGP signing keys of the projects contributing PGP-signed artifacts to the release train repository.
The installer/p2 does have support for using a key server but this is not enabled by default but you can use -Dp2.keyservers=keyserver.ubuntu.com to enable it. That doesn't help establish trust though, it just helps provide more information about the chain of trust of the key, i.e., who all signed the key as being recognized. Anyone can create a key and upload it and get anyone else to sign it too.
In principle, if you provide your own index you can choose which keys you want trusted. There is also analogous support for pre-trusting certificates (e.g., self-signed ones), but that's not currently used...
|
|
|
|
Re: Installing 2022-12 products warns about unsigned content [message #1856712 is a reply to message #1856708] |
Fri, 23 December 2022 12:44  |
Eclipse User |
|
|
|
I agree that jar-signing your own artifacts with your own rooted certificate is ideal. That's generally how Eclipse is doing it. It's only the redistributed Maven artifacts (and the jar-signed artifacts that are suddenly no longer considered to be securely signed by recent Java 11/17 releases) that are being PGP signed. In general, no wants to see trust prompts nor to make such trust decisions with so little basis for making an informed decision...
|
|
|
Powered by
FUDForum. Page generated in 0.30931 seconds