On Sun April 11 2010, Kenneth Goldman wrote:
> owner-openssl-us...@openssl.org wrote on 04/11/2010 01:38:14 PM:
> 
> > * Kenneth Goldman wrote on Fri, Apr 09, 2010 at 08:12 -0400:
> > >    I notice that the tarballs also include a SHA1 digest. What's the
> > >    point?
> >
> > To have a check whether the FTP download was successful to avoid
> > accidentally using corrupt files, a file integrity check with a
> > checksum is quite common.
> 
> Aha.  So it's just a double check on ftp?  It's not trying to
> protect against an attacker targeting the openssl site or
> the download process?

The e-mail release notices that I receive (and I suppose everyone else)
is cryptographically signed (pgp).

That message contains the tarball's size, md5 sum and sha1 sum along
with the download name and links.

I.E: Those are part of the signed message.

That should be enough to give at least a "warm and fuzzy" feeling about
the tarball's authenticity.
A level of assurance that is probably higher than any assurance that
can be made about the results of the build process the sources are
then subjected to by the users.

Of course, the way to be _certain_ is to _buy_ a copy of the sources
from a known and trusted security provider following whatever security
protocols that provider has established.

Spend enough money and you can probably even get your copy hand
delievered by a certified, armed courier on secured media.

Mike


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to