README clarifications
This commit is contained in:
parent
bc09416869
commit
3684a4ed04
1 changed files with 3 additions and 3 deletions
|
|
@ -26,7 +26,7 @@ I build, test and sign these deb packages **locally** using the following:
|
||||||
* Docker, using the [gvisor/runsc](https://gvisor.dev) hardened runtime.
|
* Docker, using the [gvisor/runsc](https://gvisor.dev) hardened runtime.
|
||||||
* The actual compile and deb build steps occur as an **unprivileged** user in the Docker container, with **no network access**. Network access is only enabled to install the dependencies
|
* The actual compile and deb build steps occur as an **unprivileged** user in the Docker container, with **no network access**. Network access is only enabled to install the dependencies
|
||||||
* My Docker daemon runs inside an ephemeral, disposable [QubesOS](https://qubes-os.org) VM that only has port 80/443 access outbound (for apt repositories and git repo cloning). Qubes is a compartmentalised and reasonably-secure operating system.
|
* My Docker daemon runs inside an ephemeral, disposable [QubesOS](https://qubes-os.org) VM that only has port 80/443 access outbound (for apt repositories and git repo cloning). Qubes is a compartmentalised and reasonably-secure operating system.
|
||||||
* The GPG key that signs the packages is on a Yubikey. The GPG key is accessed by the Qubes VM via a Qubes 'vault' VM across Qubes' backplane - the Qubes VM has no direct access to the key on the filesystem or even to the USB device, except when I'm prompted to sign the package.
|
* The GPG key that signs the packages is on a Yubikey. The GPG key is accessed by the Qubes VM via a Qubes 'vault' VM across Qubes' backplane using Qubes ['split GPG'](https://doc.qubes-os.org/en/latest/user/security-in-qubes/split-gpg.html) - the Qubes VM has no access to the GPG key on the filesystem except when I'm prompted to sign the package.
|
||||||
* The GPG private key does not exist on the apt repository server or in fact **anywhere** other than on the Yubikey.
|
* The GPG private key does not exist on the apt repository server or in fact **anywhere** other than on the Yubikey.
|
||||||
* The signing and apt repo preparation for the built and tested .deb packages, happens in a **separate Qubes VM** to the build machine, that has **no network access** at all.
|
* The signing and apt repo preparation for the built and tested .deb packages, happens in a **separate Qubes VM** to the build machine, that has **no network access** at all.
|
||||||
|
|
||||||
|
|
@ -37,7 +37,7 @@ I consider this reasonably, perhaps even **quite** secure for my use case - but
|
||||||
|
|
||||||
I publish the packages I built, in my own apt repository, using the process described above.
|
I publish the packages I built, in my own apt repository, using the process described above.
|
||||||
|
|
||||||
However, you have no reason to trust me and my apt repository. This repository exists so that you can build the packages yourself instead. See Option 2 for that.
|
However, you have no reason to trust me and my apt repository. This git repo exists so that you can build the packages yourself instead. See Option 2 for that.
|
||||||
|
|
||||||
### 1) Add the GPG key (signed-by)
|
### 1) Add the GPG key (signed-by)
|
||||||
|
|
||||||
|
|
@ -157,7 +157,7 @@ Another technique would be to try and open it with regular SQLite (don't pass `P
|
||||||
|
|
||||||
* These are drop-in **replacements** of the distro's official PHP `sqlite3`/`pdo_sqlcipher` extensions, just linked to SQLCipher.
|
* These are drop-in **replacements** of the distro's official PHP `sqlite3`/`pdo_sqlcipher` extensions, just linked to SQLCipher.
|
||||||
* You should still be able to use regular SQLite3 databases with these packages.
|
* You should still be able to use regular SQLite3 databases with these packages.
|
||||||
* You must be on **Ondřej Surý’s PHP packages** to match headers and packaging expectations.
|
* You must be using **Ondřej Surý’s PHP packages** to match headers and packaging expectations.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue