Hey Joe,

Thanks for the pointer. I think Henk needs to be involved.

Regards,
Dave

Sent from my iPhone

> On Aug 31, 2017, at 3:31 PM, Joe Schaefer <joes...@gmail.com> wrote:
> 
> Henk's scripting does that and much more.
> 
>> On Thu, Aug 31, 2017 at 5:09 PM Ted Dunning <ted.dunn...@gmail.com> wrote:
>> 
>> I thought that gpg does that.
>> 
>> On Thu, Aug 31, 2017 at 1:35 PM, Dave Fisher <dave2w...@comcast.net>
>> wrote:
>> 
>>> Regardless of what Jane User knows, and we have 200 million Jane Users of
>>> Apache OpenOffice, I think it would be helpful to have an Apache Download
>>> checker program/script that could be run to confirm the bonafides.
>>> 
>>> An idea.
>>> 
>>> Regards,
>>> Dave
>>> 
>>>> On Aug 31, 2017, at 1:22 PM, Julian Hyde <jhyde.apa...@gmail.com>
>> wrote:
>>>> 
>>>> I know this. You know this. Joe User does not know this. I am trying to
>>> make Joe User’s life easier.
>>>> 
>>>> Since SHA256 is sufficient for both purposes why does release policy
>>> MANDATE that projects include an MD5?
>>>> 
>>>> Julian
>>>> b
>>>> 
>>>>> On Aug 31, 2017, at 1:17 PM, Ted Dunning <ted.dunn...@gmail.com>
>> wrote:
>>>>> 
>>>>> The checksum is not a tampering countermeasure.
>>>>> 
>>>>> It is a "mirror ran out of diskpace" or "IP checksums are only 32
>> bits"
>>>>> countermeasure.
>>>>> 
>>>>> 
>>>>> 
>>>>> On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde <jh...@apache.org>
>> wrote:
>>>>> 
>>>>>> As security experts, you and I know that. But Joe User maybe only
>>> checks
>>>>>> one digest.
>>>>>> 
>>>>>> (Aren’t we all Joe User sometimes?)
>>>>>> 
>>>>>> Julian
>>>>>> 
>>>>>>> On Aug 31, 2017, at 11:30 AM, Mike Jumper <mike.jum...@guac-dev.org
>>> 
>>>>>> wrote:
>>>>>>> 
>>>>>>> On Aug 31, 2017 11:21, "Julian Hyde" <jh...@apache.org> wrote:
>>>>>>> 
>>>>>>> After downloading artifacts, there are 3 things to check: (1) the
>>>>>> download
>>>>>>> is successful; (2) the artifacts were indeed created by the named
>>> author;
>>>>>>> and (3) the artifacts have not been tampered with.
>>>>>>> 
>>>>>>> A security expert would know to use the .md5 for (1), the .asc for
>>> (2),
>>>>>> and
>>>>>>> the .sha256 or .sha512 for (3).
>>>>>>> 
>>>>>>> 
>>>>>>> If there is a danger that the artifacts may be tampered with, there
>>> is an
>>>>>>> equivalent danger that the checksum files will be tampered with, as
>>> well.
>>>>>>> Checksums alone cannot be relied upon to verify an artifact hasn't
>>> been
>>>>>>> altered.
>>>>>>> 
>>>>>>> Only the signature allows verification of authorship and integrity
>> ...
>>>>>>> assuming users have secure access to the corresponding public keys,
>>> and
>>>>>>> that those keys are linked into the web of trust.
>>>>>>> 
>>>>>>> - Mike
>>>>>> 
>>>>>> 
>>>>>> ---------------------------------------------------------------------
>>>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>>>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>>>>> 
>>>>>> 
>>>> 
>>>> 
>>>> ---------------------------------------------------------------------
>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>>> 
>>> 
>>> 
>> 


---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org

Reply via email to