Skip to content
This repository was archived by the owner on Sep 9, 2020. It is now read-only.
This repository was archived by the owner on Sep 9, 2020. It is now read-only.

Security model #278

Closed
Closed
@sdboyer

Description

@sdboyer

To date, we've generally deferred the harder security questions in the interest of figuring out what we actually want the tool to be. With the basic vision now settled, security is now at the forefront of our considerations.

To start, we need to articulate a security model for dep; this is just a stub/sketch to get us started.

The essential task of a dependency management system is to select and reproduce a dependency set. Selection should avoid versions of code known to have vulnerabilities, and reproduction should be byte-level precise.

In functional terms, this means a few things:

  • Verifying the integrity of code on disk against an expected hash digest (related: Vendor pruning #120)
  • Verifying the authenticity of code retrieved from a source over the public internet
  • Tracking security issues with and black-listing of released versions (more or less Security service #176)

We needn't necessarily ship a security service as part of 1.9 - speccing and prototyping it is probably sufficient.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions