IMHO, the verify-sig useflag should get added to the hardened profiles. Reproducible: Always
The verify-sig USE flag is meant for developers to verify signatures when they add a new ebuild to the repo. Once the file is in the Manifest, signature verification is mostly pointless overhead. Regardless, this really has nothing to do with "hardening" a system.
I'm fine with adding it even though it's not strictly necessary, as it could help catch a (small class of) developer errors.
I strongly disagree that has nothing to do with "hardening" a system. For things like the kernel or firmware, security conscious installations may require signature verification, no matter what the package manager is. Gentoo's support of key verification is a big plus, not just overhead. verify-sig useflag should get added to the hardened profiles, as it doesn't impose much overhead relative to say compiling a kernel, and not only could help catch a class of developer errors, it may help catch MITM corruption.
(In reply to emdee_is from comment #3) > I strongly disagree that has nothing to do with "hardening" a system. > For things like the kernel or firmware, security conscious installations may > require signature verification, no matter what the package manager is. > Gentoo's support of key verification is a big plus, not just overhead. > > verify-sig useflag should get added to the hardened profiles, as it doesn't > impose much overhead relative to say compiling a kernel, and not only could > help catch a class of developer errors, it may help catch MITM corruption. It doesn't make any difference to MITM outside of developer error in the first instance?
(In reply to Sam James from comment #2) > I'm fine with adding it even though it's not strictly necessary, as it could > help catch a (small class of) developer errors. Terrible ideal, this should be enabled by developers and those few users who want to request such support. This is just more cruft that many users will turn off increasing useflag cruft in make.conf.
I'd like to add my rationale for wanting this to be default in hardened: When I use the hardened profile, it's because I've analysed that the threat model for the system in question is elevated enough that it requires additional defenses. Verifying the PGP signatures of the incoming tarballs adds defense-in-depth against a supply chain attack. While I appreciate that sha512 and blake2 are hard to collide (especially together), tech continues to advance all the time. Having another way to attest that the incoming source is the intended source is, IMO, quite valuable.