Sign PyPI Releases #270
Replies: 4 comments
-
Hi @maltfield, Thanks for the great suggestion. Ill get on that and get back to you. |
Beta Was this translation helpful? Give feedback.
-
Hi @maltfield, Thanks for the suggestion. Ive bumped the Opencanary version to |
Beta Was this translation helpful? Give feedback.
-
Thanks! You might also want to work with all your dependent packages to do the same. |
Beta Was this translation helpful? Give feedback.
-
Hi, I see this issue was suddenly closed without any comments. Was it resolved? Is it now possible to install opencanary (and all of its dependencies) securely? |
Beta Was this translation helpful? Give feedback.
-
Describe the bug
When a user downloads this python module using
pip
, there is no cryptographic authenticity or integrity validation to protect the user from a MITM attack.Therefore, this project is making any other projects that obtain the
opencanary
module viapip
in their build process vulnerable to a watering hole attack.Expected behavior
Users should have a mechanism to cryptographically verify the integrity and authenticity of opencanary when obtaining it through
pip
.To Reproduce
pip install opencanary
Additional context
Possible solutions include:
Using the
--sign
argument oftwine
when uploading packages to PyPIPublishing a cryptographically signed document (ideally using
gpg
) listing the hashes for all packages uploaded to PyPI, which users can then pass intopip
using the--hash
argumentBeta Was this translation helpful? Give feedback.
All reactions