On Sun, 2021-07-25 at 01:12 +0200, Thomas Deutschmann wrote:
> Hi,
> 
> I don't understand. Isn't it the same motion we put down just 2 months 
> ago [1]? Or is this something new?
> 
> If this isn't something new, what has changed since May [2]?

Apparently it has not been 'put down' because it came back via open
bugs.

> To remember: Currently we have two different hashes for every distfile. 
> If we are going to throw this data away, we should really have good 
> reasons to do that. Like said during that council meeting, BLAKE2B and 
> SHA512 are competing hashes. What's wrong with having a backup plan even 
> for a very unlikely scenario, that BLAKE2B will get broken?

Define 'broken'.

> It's not like SHA512 is requiring any additional deps which are 
> unmaintained or something like that. SHA has even hardware acceleration 
> support in modern systems.

...which is entirely irrelevant given that both hashes need to be
calculated.  (SHA512 + BLAKE2B) can be as fast as the slower of two
in the best scenario.

> In addition it is even more likely that you will find SHA checksum files 
> with upstream release tarballs than BLAKE2B files.

Again, I don't see how that's even remotely relevant.

> Remember that verify-sig.eclass I criticized last year? Of course some 
> scenarios I outlined were very unlikely and I never expected that I can 
> run around in near future saying "I told you". But in January 2021, 
> CVE-2021-3345 happened in libgcrypt...

I don't see how this is relevant either.  Are you admitting that you're
criticizing all my ideas because I just happen to propose them?


-- 
Best regards,
Michał Górny



Reply via email to