> On 10/04/14 13:06, Joe Patterson wrote:
> > Not so much a "confidentiality" benefit as an "integrity" benefit,
> > to make sure you really are getting your software from who you
> > think you're getting it from.
>
> The only way to truly get that confirmation is by using the signature
> files, or other signature mechanism (preferably via another channel)
>
> Samuli: Maybe our release announcements should be PGP signed, with
> sha256sums of the files we're releasing?  And maybe we should consider
> a possibility to host at least a copy of the PGP signatures of our
> files on an external server too?  (That should *not* be a mirrored
> setup, but somehow distributed outside of a public HTTP{,S})
>
> <paranoid mode="off"/>
>

What if we'd put the sha256sums to Git? That would be distributed, so
any meddling could be detected easily.

Samuli

------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to