Open
Description
Currently it is not possible to verify the authenticity or cryptographic integrity of the downoads from github.com because the releases are not cryptographically signed.
This makes it hard for your users to safely obtain the b2
software, and it introduces them (and potentially their servers) to watering hole attacks.
Steps to Reproduce
- Go to the releases page https://github.com/Backblaze/B2_Command_Line_Tool/releases
- Click download
- ???
Expected behavior: [What you expected to happen]
A few things are expected:
- I should be able to download the Backblaze release signing PGP key out-of-band from popular third-party keyservers (eg https://keys.openpgp.org/)
- I should be able to download a cryptographic signature of the release (or, better, the releases' digest file, such as a
SHA256SUMS.asc
file) along with the release itself - The downloads page itself should include a link to the documentation page that describes how to do the above two steps
Actual behavior: [What actually happened]
There's just literally no information on verifying downloads, and it appears that it is not possible to do so.