!RROtHmAaQIkiJzJZZE:nixos.org

NixOS Infrastructure

389 Members
Next Infra call: 2024-07-11, 18:00 CEST (UTC+2) | Infra operational issues backlog: https://github.com/orgs/NixOS/projects/52 | See #infra-alerts:nixos.org for real time alerts from Prometheus.119 Servers

Load older messages


SenderMessageTime
5 Jan 2025
@emilazy:matrix.orgemilyokay, exactly what I said16:48:00
@vcunat:matrix.orgVladimír ČunátBasically what you wrote.16:48:01
@emilazy:matrix.orgemilythough I wonder if dual-signing is a nicer approach, if it's feasible?16:48:06
@vcunat:matrix.orgVladimír ČunátI didn't see advantages in doing that.16:48:26
@emilazy:matrix.orgemilyoh that was even commented16:48:31
@emilazy:matrix.orgemilyonce you remove the old key, you can still access objects further back16:48:44
@emilazy:matrix.orgemilyso it lets you remove the old key sooner (because you can start using the new key sooner (because it doesn't break compat to))16:48:57
@emilazy:matrix.orgemilymakes "starting to sign with a fresh new key" not a flag day16:49:13
@hexa:lossy.networkhexapeople can switch to the new key as soon as it is announced and forget they switched16:50:16
@hexa:lossy.networkhexaand yeah, I'm opposed to a flag day situation16:50:24
@vcunat:matrix.orgVladimír ČunátYou essentially need to cut all the stuff that's now in the cache.16:51:22
@vcunat:matrix.orgVladimír ČunátUnless we go for resigning.16:51:31
@emilazy:matrix.orgemilyI think it's okay to need adding the old key manually for archaeology16:51:48
@emilazy:matrix.orgemilybut e.g. (compressed schedule for illustration) new key included 25.11, switch over to signing with new key 26.11, remove old key 27.11 – new key can verify two releases back vs. new key included and dual-signed 25.11, remove old key and stop signing with it 26.11 – new key can verify two releases back16:53:42
@emilazy:matrix.orgemilydual-signing seems to significantly compress the schedule given the same choice of trade-offs to me16:53:55
@emilazy:matrix.orgemilythe flag day of "needing the new key to verify things" remains the same, but you can cut off the old one much sooner because you already prepared with the new key16:54:27
@emilazy:matrix.orgemilyit also means that people who know they don't need new releases can opt in to distrusting the old key sooner, though that's marginal16:54:51
@emilazy:matrix.orgemily* it also means that people who know they don't need old releases can opt in to distrusting the old key sooner, though that's marginal16:54:55
@vcunat:matrix.orgVladimír ČunátThe thing is that you can add a new key to be trusted easily.16:54:59
@vcunat:matrix.orgVladimír ČunátDual-signing needs new code AFAIK.16:55:12
@vcunat:matrix.orgVladimír ČunátSo the schedules wouldn't start at the same time in practice.16:55:40
@hexa:lossy.networkhexawhat if nix and hydra would further the nixpkgs effort 🤔16:56:09
@hexa:lossy.networkhexalet's dream for a minute here16:56:16
@emilazy:matrix.orgemily😆16:57:41
@emilazy:matrix.orgemily in all seriousness though, does the .narinfo format even support multiple signatures? 16:58:14
@raitobezarius:matrix.orgraitobezariusyes16:58:18
@emilazy:matrix.orgemilycould be worse then I guess16:58:31
@hexa:lossy.networkhexaso we file an issue with nix to support multiple signing keys in addToStore*?17:00:40
@raitobezarius:matrix.orgraitobezariusi guess so17:01:14
@raitobezarius:matrix.orgraitobezarius alternatively, you can start from there: https://github.com/NixOS/nix/pull/9076 :). 17:01:19

Show newer messages


Back to Room ListRoom Version: 6