As security experts, you and I know that. But Joe User maybe only checks one 
digest.

(Aren’t we all Joe User sometimes?)

Julian

> On Aug 31, 2017, at 11:30 AM, Mike Jumper <mike.jum...@guac-dev.org> wrote:
> 
> On Aug 31, 2017 11:21, "Julian Hyde" <jh...@apache.org> wrote:
> 
> After downloading artifacts, there are 3 things to check: (1) the download
> is successful; (2) the artifacts were indeed created by the named author;
> and (3) the artifacts have not been tampered with.
> 
> A security expert would know to use the .md5 for (1), the .asc for (2), and
> the .sha256 or .sha512 for (3).
> 
> 
> If there is a danger that the artifacts may be tampered with, there is an
> equivalent danger that the checksum files will be tampered with, as well.
> Checksums alone cannot be relied upon to verify an artifact hasn't been
> altered.
> 
> Only the signature allows verification of authorship and integrity ...
> assuming users have secure access to the corresponding public keys, and
> that those keys are linked into the web of trust.
> 
> - Mike


---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org

Reply via email to