I filed MPOM-118 so maybe we can have this ASF-wide. I wouldn't even know how to make gpg generate multiple signatures with different algorithms from the command-line, so yeah, setting this option would just do SHA512 for the algorithm used in the signature. The separate non-GPG hashes (.md5, .sha1) are generated by an entirely different part of Maven, AFAIK.
On Wed, May 11, 2016 at 11:58 AM Gary Gregory <garydgreg...@gmail.com> wrote: > and for KISS, can we make it generate only SHA512 (not MD5, not SHA1)? > > Gary > > On Wed, May 11, 2016 at 8:03 AM, Christopher <ctubb...@apache.org> wrote: > > > maven-gpg-plugin simply does a pass-through to the underlying gpg > > command-line, with something like the following options: > > gpg -a --detach-sign filename > > > > So, it's normally using whatever the user's personal settings are for the > > digest algorithm. Hopefully that's the best available (SHA512), but it > > depends on their configuration. > > > > You could add something like: > > > > <gpgArguments> > > <arg>--digest-algo=SHA512</arg> > > </gpgArguments> > > > > > > That way, you don't have to rely on individual user settings, and you can > > be assured you're signatures are good. Of course, that won't prevent > users > > from using weak private keys. > > > > I'm actually going to open an issue against MPOM to suggest adding this > the > > ASF Parent POM. > > > > On Tue, May 10, 2016 at 4:02 PM <e...@zusammenkunft.net> wrote: > > > > > Hello, > > > > > > Fully agree for checksum files no stronger hashes are needed. For the > pgp > > > signatures we should however avoid md5/sha1. The advantage isnthat this > > is > > > pretty transparent (alg encoded in .asc file). It only breaks for some > > very > > > old invoked pgp binaries. (Theoretically we can add multiple signatures > > > using sha1+sha2 but that might break even more pgp implementations anf > > the > > > maven/gnupg-plugin does not support it afaik). > > > > > > Gruss > > > Bernd > > > -- > > > http://bernd.eckenfels.net > > > > > > -----Original Message----- > > > From: sebb <seb...@gmail.com> > > > To: Commons Developers List <dev@commons.apache.org> > > > Sent: Di., 10 Mai 2016 11:53 > > > Subject: Re: [eclipse-dev] Notice that Eclipse Platform plans to no > > longer > > > provide MD5 and SHA1 checksums for Neon (but still SHA512) > > > > > > Why bother changing? > > > > > > Checksums/hashes are only intended for checking that a download has > > > completed OK. > > > > > > They don't provide any authentication as anyone can generate them. > > > AFAICT the strength of the hash has no bearing on its utility. > > > > > > People should use the sigs instead. > > > > > > Switching to a stronger hash might give the impression that the hash > > > is intended for authentication. > > > > > > Note that any change ought to be run past Infra, because the release > > > distribution policy might need to be updated. > > > > > > On 10 May 2016 at 10:30, Benedikt Ritter <brit...@apache.org> wrote: > > > > Hi Gary, > > > > > > > > What changes are required for this? Is this just a setting in > > > > commons-parent? > > > > > > > > Benedikt > > > > > > > > Gary Gregory <garydgreg...@gmail.com> schrieb am Di., 10. Mai 2016 > um > > > > 02:51 Uhr: > > > > > > > >> Should we follow suit? > > > >> > > > >> Gary > > > >> > > > >> ---------- Forwarded message ---------- > > > >> From: David M Williams <david_willi...@us.ibm.com> > > > >> Date: Mon, May 9, 2016 at 5:37 PM > > > >> Subject: [eclipse-dev] Notice that Eclipse Platform plans to no > longer > > > >> provide MD5 and SHA1 checksums for Neon (but still SHA512) > > > >> To: eclipse-...@eclipse.org, equinox-...@eclipse.org, > > > >> cross-project-issues-...@eclipse.org > > > >> > > > >> > > > >> The topic of this note is about the downloads and checksums obtained > > > >> directly from the the Eclipse Project. It does not involve the > > checksums > > > >> from the "select a mirror" page -- that is controlled by the Eclipse > > > >> Foundation -- nor any of the packages downloaded from > > > >> http://www.eclipse.org/downloads-- also controlled by the Eclipse > > > >> Foundation. My intuition is that few "casual users" use our > checksums > > > but > > > >> some adopters or committers might use them in automated scripts or > > > builds. > > > >> > > > >> If any of you do get checksums directly from > > > >> .../eclipse/downloads/drops4/<buildid>/checksum/... then this note > is > > > for > > > >> you. > > > >> > > > >> We announced in Luna we would "stop producing MD5 and SHA1 > checksums" > > > after > > > >> Luna's release (*Bug 423714* > > > >> <https://bugs.eclipse.org/bugs/show_bug.cgi?id=423714>)... and I am > > > just > > > >> now getting around to it. Since it has been a long time since that > > > >> announcement, and since we are late in this cycle, I am > cross-posting > > > to 3 > > > >> lists to be sure those that might be impacted will be notified. > > > >> > > > >> We will continue to provide SHA512 checksums and I recently decided > to > > > also > > > >> provide SHA256 checksums since SHA256 seems to be popular "in the > > > >> industry". > > > >> > > > >> This RC1 effort is documented in *Bug 454784* > > > >> <https://bugs.eclipse.org/bugs/show_bug.cgi?id=454784>. If the > > removal > > > of > > > >> the MD5 and SHA1 checksums would unduly burden anyone, please say so > > in > > > >> that *Bug 454784* < > > https://bugs.eclipse.org/bugs/show_bug.cgi?id=454784 > > > > > > > >> and > > > >> we would be happy to accommodate. > > > >> > > > >> I will soon be updating our wiki on *How to verify a download* > > > >> < > > > >> > > > > > > http://wiki.eclipse.org/Platform-releng/How_to_check_integrity_of_downloads > > > >> > > > > >> to contain accurate information for Neon, but wanted to get this > > notice > > > out > > > >> now so if you are negatively impacted you would have time to say so. > > > >> > > > >> Thank you, > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> > > > >> _______________________________________________ > > > >> eclipse-dev mailing list > > > >> eclipse-...@eclipse.org > > > >> To change your delivery options, retrieve your password, or > > unsubscribe > > > >> from this list, visit > > > >> https://dev.eclipse.org/mailman/listinfo/eclipse-dev > > > >> > > > >> > > > >> > > > >> -- > > > >> E-Mail: garydgreg...@gmail.com | ggreg...@apache.org > > > >> Java Persistence with Hibernate, Second Edition > > > >> <http://www.manning.com/bauer3/> > > > >> JUnit in Action, Second Edition <http://www.manning.com/tahchiev/> > > > >> Spring Batch in Action <http://www.manning.com/templier/> > > > >> Blog: http://garygregory.wordpress.com > > > >> Home: http://garygregory.com/ > > > >> Tweet! http://twitter.com/GaryGregory > > > >> > > > > > > --------------------------------------------------------------------- > > > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org > > > For additional commands, e-mail: dev-h...@commons.apache.org > > > > > > > > > --------------------------------------------------------------------- > > > To unsubscribe, e-mail: dev-unsubscr...@commons.apache.org > > > For additional commands, e-mail: dev-h...@commons.apache.org > > > > > > > > > > > > -- > E-Mail: garydgreg...@gmail.com | ggreg...@apache.org > Java Persistence with Hibernate, Second Edition > <http://www.manning.com/bauer3/> > JUnit in Action, Second Edition <http://www.manning.com/tahchiev/> > Spring Batch in Action <http://www.manning.com/templier/> > Blog: http://garygregory.wordpress.com > Home: http://garygregory.com/ > Tweet! http://twitter.com/GaryGregory >