Mickael Istria <mist...@redhat.com> writes:

> While I'm investigating into Maven code to allow re-using checksums of
> Maven artifacts when "p2-ifying" them with Tycho, I noticed only .md5 and
> .sha1 seems to be used by Wagon and then also noticed that Maven Central
> doesn't contain a "safe" digest signature either.

[...]

> Is there an issue already open to move towards sha256 or should I create a
> new one?

Michael, as you know, Maven differs from Equinox's p2 approach to
resolve and download artifacts - in Maven world, closest match to what
p2 does would be a combination of Sonatype Nexus' Remote Index
(metadata) and repo.maven.apache.org (artifacts). So that Maven would
first download remote index (from an ultimately trusted source, which
provides additional information about available artifacts, including
checksums) and resolve list of dependencies to download based on that
information only. In a second step, it would download actual artifacts
using either the same repo.maven.apache.org or any other source. This
second step can then use less trusted sources (3rd-party mirrors).

This difference seems to me as root cause of the initial confusion with
your question. With this in mind, as was mentioned already, moving to
stronger checksums is not that important or useful for Maven.

All discussion about more stronger checksums in p2 [1] was relevant only
because my goal was to enable support for peer-to-peer protocols (more
generally, any content-addressable storage AKA bittorrent, ipfs and
alike) alongside to location-addressable storage. And for this use case
support for extensible set of (cryptographically strong) checksum
algorightms is a must.

[1] https://bugs.eclipse.org/bugs/show_bug.cgi?id=423715

-- 
Mykola

Libre/Free Java Software Developer
https://manandbytes.gitlab.io/


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@maven.apache.org
For additional commands, e-mail: dev-h...@maven.apache.org

Reply via email to