[RFC] Exploring Trust and Provenance in Git: The Open Integrity Project

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Git developers,

Today marks Git's 20th anniversary—a remarkable milestone for a tool
that has become foundational to software development worldwide. First,
thank you. Git’s distributed model, flexibility, and robustness have
made it an essential pillar of modern open-source infrastructure.

As someone focused on digital trust architectures (I'm co-author of
the IETF TLS & W3C DID standards), I've been thinking deeply about how
trust is conveyed (or not) in Git repositories, especially over
long-lived, collaborative projects.

Over the past year, I've been developing a proof-of-concept called the
Open Integrity Project, which aims to layer trust and provenance on
top of Git, without altering its internals or requiring new binaries.
It uses a pattern of inception commits (to cryptographically assert
original control) and trust transition commits (to document changes in
maintainership or key rotation).

It builds directly on Git's existing capabilities, particularly commit
signing and SSH-based authentication, but adds some basic structure
for reasoning about ownership and accountability over time. All of
this is done through shell scripts and Git aliases—no new binarys,
patches, or daemons.

Some highlights:

• Musings on the concept:
https://www.blockchaincommons.com/musings/open-integrity/

• Problem statement:
https://github.com/OpenIntegrityProject/core/blob/main/docs/Open_Integrity_Problem_Statement.md

• GitHub repo (PoC implementation):
https://github.com/OpenIntegrityProject/core

• Example inception commit:
https://github.com/OpenIntegrityProject/core/commit/69c8659959f1a6aa281bdc1b8653b381e741b3f6

I’m sharing this here not as a proposal for upstream changes, but as
an open invitation:

• If you think the problem space is worth discussing, I’d welcome any
feedback, either on this list or in our new GitHub discussions area:
https://github.com/orgs/OpenIntegrityProject/discussions
• If you have thoughts on how Git’s existing tooling could better
support trust workflows (even non-normatively), I’d love to hear them.
    - In particular, I've not made any decisions yet on the best
technique to preserve the git-author SSH signatures when a branch is
merged and then the branch is deleted.
• And if this overlaps with any ongoing or past discussions I should
be aware of, I’d appreciate a pointer.

Thank you again for maintaining and evolving Git with such care over
the years. I hope Open Integrity is seen as a complementary experiment
in responsible stewardship of our shared infrastructure.

Warm regards,

Christopher Allen
Principal Architect, Blockchain Commons
https://github.com/ChristopherA
https://www.blockchaincommons.com





[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux