[MacPorts] FAQ modified

MacPorts Wiki noreply at macports.org
Thu Oct 26 08:51:29 UTC 2023


Page "FAQ" was changed by samulip
Diff URL: <https://trac.macports.org/wiki/FAQ?action=diff&version=198>
Revision 198
Comment: Add section about information security
Changes:
-------8<------8<------8<------8<------8<------8<------8<------8<--------
Index: FAQ
=========================================================================
--- FAQ (version: 197)
+++ FAQ (version: 198)
@@ -346,3 +346,40 @@
 === What changed with the migration to GitHub in fall 2016?
 
 See [wiki:FAQ/GitHubMigration GitHubMigration].
+
+== Information security and the integrity of the MacPorts base sofware and individual packages ==
+
+=== What controls are in place to check that the MacPorts utility is not tainted with malicious contributions and that the port scripts are not installing other than what it says on a Portfile? ===
+
+For the integrity of the base software:
+* the MacPorts.dmg installer is signed by one of the project members, so that ensures the integrity of the initial installation.
+* the selfupdate process also uses signed tarballs that are checked against a public key that is part of the installation.
+
+MacPorts only gives commit access to people who have a considerable history of good contributions.
+Everyone else has to open pull requests which are reviewed by committers before being merged.
+
+For the integrity of the ports tree:
+* the distributed ports tree is also signed and the signature is verified when syncing the Portfiles.
+* the Portfiles itself come from the GitHub git repository, so the whole ports tree can be identified by a commit hash.
+
+It's not impossible that a committer could "turn evil" (though that would probably be noticed), or that software could be packaged that was compromised upstream.
+
+For the integrity of the Portfiles:
+* that relies on what is merged into the ports tree, which are developed on GitHub with Pull Requests and reviews by project members.
+* the Portfiles also contain checksums to verify the upstream sources used for building the software.
+* all downloaded have to be the same for all users (also a requirement in order to mirror these distfiles correctly).
+
+The base code, ports tree, and most upstream software has source readily available, so definitely do your own audit of all of that before using it for anything critical.
+
+=== How to verify the integrity of a MacPorts installation? ===
+
+You could in principle compare existing installation of the base software to a signed tar ball.
+Currently, there is no ready existing tooling for that.
+Also, some ports will be built locally, so there won't be a single "canonical" signed tarball for everything available.
+
+=== What does MacPorts in capabilities for auditing of installation? ===
+
+Being open source, MacPorts is inherently more auditable than proprietary binaries, but the drawback is you have to assume responsibility yourself.
+The MacPorts project is not in a position to make any guarantees and has to disclaim all liability.
+As far as integrity of the local files, we're mainly just relying on filesystem permissions.
+A third party file integrity checker should work fine though.
-------8<------8<------8<------8<------8<------8<------8<------8<--------

--
Page URL: <https://trac.macports.org/wiki/FAQ>
MacPorts <https://www.macports.org/>
Ports system for macOS

This is an automated message. Someone added your email address to be
notified of changes on 'FAQ' page.
If it was not you, please report to admin at macports.org.


More information about the macports-changes mailing list