-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/04/14 14:42, Samuli Seppänen wrote:
> 
>> On 10/04/14 13:06, Joe Patterson wrote:
>>> Not so much a "confidentiality" benefit as an "integrity"
>>> benefit, to make sure you really are getting your software from
>>> who you think you're getting it from.
>> 
>> The only way to truly get that confirmation is by using the
>> signature files, or other signature mechanism (preferably via
>> another channel)
>> 
>> Samuli: Maybe our release announcements should be PGP signed,
>> with sha256sums of the files we're releasing?  And maybe we
>> should consider a possibility to host at least a copy of the PGP
>> signatures of our files on an external server too?  (That should
>> *not* be a mirrored setup, but somehow distributed outside of a
>> public HTTP{,S})
>> 
>> <paranoid mode="off"/>
>> 
> 
> What if we'd put the sha256sums to Git? That would be distributed,
> so any meddling could be detected easily.

Not sure I follow this one.  How would that work out?  To which git
tree should this information be committed?  Or did you mean to have a
separate git tree with PGP/GPG signatures published for each of the
released files?  That could actually work, and wouldn't require us to
setup another server anywhere.

But git trees aren't necessarily distributed, it's only distributed in
the moment someone pulls it down to their own systems.  And preferably
pushes that info out on a different server.  Having 10 forked
signature trees on github isn't really that well distributed.  So we
would need to push such a git tree to at least 2-3 non-related sites
(sf.net, github and gitorious?) ... Those being most paranoid should
then be able to pull down all trees into the same local repository
without having any conflicts.

Anyhow, I think we should post those checksums to the mailing list
too, in a signed e-mail.  We should really do release announcements
anyway.  And since mailing lists being distributed as well, tampering
is not getting easier.  That can be a quick check which is easy to do
for most people.  Those who want a more thorough check, can grab one
or more of the git trees.


- -- 
kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlNGqdQACgkQDC186MBRfrrzdQCeJP1zYxlms+OqCYhp48IXpeuS
SMgAnjurZGOa8FICDct5ye2gNMvTl1bF
=+mpB
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Put Bad Developers to Shame
Dominate Development with Jenkins Continuous Integration
Continuously Automate Build, Test & Deployment 
Start a new project now. Try Jenkins in the cloud.
http://p.sf.net/sfu/13600_Cloudbees
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to