Re: Fwd: New Feathercast mailing list

2017-01-26 Thread Faizul Kamarudin
👌

Pada 26 Jan 2017 4:47 PG, "Rich Bowen"  menulis:

> To anyone who has at any time expressed interest in helping out with
> Feathercast, please see below. (Some of you have already received this,
> but sending it to comdev just in case I missed someone!)
>
> Thanks!
>
> --Rich
>
>
>  Forwarded Message 
> Subject: New Feathercast mailing list
> Date: Wed, 25 Jan 2017 15:46:18 -0500
> From: Rich Bowen 
> To: featherc...@apache.org
>
> Hi,
>
> I'm BCC'ing you because at some point you have expressed some interest
> in helping out with Feathercast. Infra has been kind enough as to create
> a featherc...@apache.org mailing list (because the world needs Yet
> Another Mailing List!!) for coordinating work on Feathercast, as well as
> announcing new episodes, events, and so on.
>
> I was on the verge of losing track of who had responded to my various
> calls for help, so this seemed more efficient. It also lets you join and
> drop off at will, rather than getting my emails when you no longer want
> them.
>
> To subscribe to the mailing list, send blank email to
> feathercast-subscr...@apache.org
>
> To unsubscribe, it's feathercast-unsubscr...@apache.org
>
> The list archives are at
> https://lists.apache.org/list.html?featherc...@apache.org and you can,
> if you wish, read and post via that interface instead.
>
> So, thanks again for your interest in Feathercast, and I look forward to
> working with all of you!
>
> --
> Rich Bowen - rbo...@rcbowen.com - @rbowen
> http://apachecon.com/ - @apachecon
>
>
>
>


Re: Hello

2017-01-26 Thread Faizul Kamarudin
👌

Pada 22 Jan 2017 8:28 PG, "Andrew Palumbo"  menulis:

> Hello,
>
>
> I sent an email yesterday regarding swag for Meetups, etc to this list,
> thinking that it was an Apache list that was devoted specifically to that
> type of thing (i was just going off of a comment automatically sent to me
> from the last quarter's board report review).. I've noticed several Emails,
> and realized that I was wrong about this just being a place to ask for swag
> from.
>
>
> So I just wanted to Introduce myself and say hello.  I'm the PMC chair of
> Apache Mahout.  The Mahout team is a die hard group of all volunteer
> committers, devoted to distributed shared nothing machine learning,
> centered currently around an abstract Engine neutral set of Distributed
> Linear Algebra primitives. We're working currently on a release with GPU
> and native multithreaded backed matrix operations, as well as to provide
> more caned algorithms.   We have no corporate backing, which makes it
> challenging at times to keep up; most of us work after our day-jobs.  This
> also makes us flexible and able to answer to no one but our own PMC when
> deciding the best direction for the project to go.
>
>
> So I just wanted to Introduce myself, and give you an overview of our
> team.  The email that I sent yesterday came off more as an order for Apache
> swag..
>
>
> So, Hello, and have a good weekend, all,
>
>
> Andy
>


Use of MD5 and SHA1 for download verification

2017-01-26 Thread Mike Lissner
I filed a bug about this already, but I've been directed to email here
instead. The bug I filed is:
https://issues.apache.org/jira/browse/INFRA-12626

Basically, on download pages we provide obsolete hashes for our downloads
(MD5 and SHA1). These are meant, as I understand it, to serve two purposes.
First, they allow you to make sure that your download succeeded. Second,
they allow you to ensure that your download wasn't tampered with.

For the first purpose: Great. They work. For the second purpose, however,
we need to move away from MD5 and SHA1 hashes, both of which can now be
attacked with relatively modest hardware.

Browsers are moving away from SHA1 at a very fast pace. See:

https://security.googleblog.com/2014/09/gradually-sunsetting-sha-1.html

And:

https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/

I don't know who's responsible for this, but my bug was closed because it's
not the infrastructure team, and so I'm trying here.

I suggest we move to SHA2 hashes for all verification purposes.

Thanks,

Mike


Re: Use of MD5 and SHA1 for download verification

2017-01-26 Thread sebb
On 26 January 2017 at 18:20, Mike Lissner
 wrote:
> I filed a bug about this already, but I've been directed to email here
> instead. The bug I filed is:
> https://issues.apache.org/jira/browse/INFRA-12626
>
> Basically, on download pages we provide obsolete hashes for our downloads
> (MD5 and SHA1). These are meant, as I understand it, to serve two purposes.
> First, they allow you to make sure that your download succeeded.

Agreed

> Second, they allow you to ensure that your download wasn't tampered with.

They aren't intended for that purpose.

> For the first purpose: Great. They work. For the second purpose, however,
> we need to move away from MD5 and SHA1 hashes, both of which can now be
> attacked with relatively modest hardware.
>
> Browsers are moving away from SHA1 at a very fast pace. See:
>
> https://security.googleblog.com/2014/09/gradually-sunsetting-sha-1.html
>
> And:
>
> https://blog.mozilla.org/security/2014/09/23/phasing-out-certificates-with-sha-1-based-signature-algorithms/

Those hashes serve a different purpose.

> I don't know who's responsible for this, but my bug was closed because it's
> not the infrastructure team, and so I'm trying here.
>
> I suggest we move to SHA2 hashes for all verification purposes.

And how do you verify that the SHA2 hash has not been tampered with?

With PGP signatures one can check the WoT (web of trust).
And the PGP public keys are published in the KEYS files which are
derived from a source code repo to which only ASF committers have
write access.

I think it would be a mistake to give the impression that hashes are
of use for anything other than a sophisticated download checksum.

> Thanks,
>
> Mike

-
To unsubscribe, e-mail: dev-unsubscr...@community.apache.org
For additional commands, e-mail: dev-h...@community.apache.org



Re: Use of MD5 and SHA1 for download verification

2017-01-26 Thread Ted Dunning
SHA1 and MD5 have been individually compromised, but a combined hash has
not been.

Regardless, Sebb's comment that hashes are worthless for authentication and
tamper-detection is spot-on. You have to look to trusted signatures for
that.



On Thu, Jan 26, 2017 at 10:20 AM, Mike Lissner <
mliss...@michaeljaylissner.com> wrote:

> I filed a bug about this already, but I've been directed to email here
> instead. The bug I filed is:
> https://issues.apache.org/jira/browse/INFRA-12626
>
> Basically, on download pages we provide obsolete hashes for our downloads
> (MD5 and SHA1). These are meant, as I understand it, to serve two purposes.
> First, they allow you to make sure that your download succeeded. Second,
> they allow you to ensure that your download wasn't tampered with.
>
> For the first purpose: Great. They work. For the second purpose, however,
> we need to move away from MD5 and SHA1 hashes, both of which can now be
> attacked with relatively modest hardware.
>
> Browsers are moving away from SHA1 at a very fast pace. See:
>
> https://security.googleblog.com/2014/09/gradually-sunsetting-sha-1.html
>
> And:
>
> https://blog.mozilla.org/security/2014/09/23/phasing-
> out-certificates-with-sha-1-based-signature-algorithms/
>
> I don't know who's responsible for this, but my bug was closed because it's
> not the infrastructure team, and so I'm trying here.
>
> I suggest we move to SHA2 hashes for all verification purposes.
>
> Thanks,
>
> Mike
>


Re: Use of MD5 and SHA1 for download verification

2017-01-26 Thread Christopher
To be clear, those "trusted signatures" should be using strong hash
algorithms themselves. (As well as sufficiently long keys.)
I raised the issue of weak hashes in GPG signatures for Maven projects at
ASF with https://issues.apache.org/jira/browse/MPOM-118 , but non-Maven
projects which manually sign releases should probably take care to ensure
their signatures are adequate. I consider this a release-voting quality
assurance step, and encourage projects to examine the signatures attached
to their release candidates as part of their release process.

On Thu, Jan 26, 2017 at 2:27 PM Ted Dunning  wrote:

> SHA1 and MD5 have been individually compromised, but a combined hash has
> not been.
>
> Regardless, Sebb's comment that hashes are worthless for authentication and
> tamper-detection is spot-on. You have to look to trusted signatures for
> that.
>
>
>
> On Thu, Jan 26, 2017 at 10:20 AM, Mike Lissner <
> mliss...@michaeljaylissner.com> wrote:
>
> > I filed a bug about this already, but I've been directed to email here
> > instead. The bug I filed is:
> > https://issues.apache.org/jira/browse/INFRA-12626
> >
> > Basically, on download pages we provide obsolete hashes for our downloads
> > (MD5 and SHA1). These are meant, as I understand it, to serve two
> purposes.
> > First, they allow you to make sure that your download succeeded. Second,
> > they allow you to ensure that your download wasn't tampered with.
> >
> > For the first purpose: Great. They work. For the second purpose, however,
> > we need to move away from MD5 and SHA1 hashes, both of which can now be
> > attacked with relatively modest hardware.
> >
> > Browsers are moving away from SHA1 at a very fast pace. See:
> >
> > https://security.googleblog.com/2014/09/gradually-sunsetting-sha-1.html
> >
> > And:
> >
> > https://blog.mozilla.org/security/2014/09/23/phasing-
> > out-certificates-with-sha-1-based-signature-algorithms/
> >
> > I don't know who's responsible for this, but my bug was closed because
> it's
> > not the infrastructure team, and so I'm trying here.
> >
> > I suggest we move to SHA2 hashes for all verification purposes.
> >
> > Thanks,
> >
> > Mike
> >
>
-- 
Christopher


Re: Use of MD5 and SHA1 for download verification

2017-01-26 Thread Owen O'Malley
Infra does filter filenames that match (*.sha256) from the mirror
replication, so it is possible
to use such names and have matching behavior:

Compare mirror: http://apache.cs.utah.edu/orc/orc-1.2.3/
Apache version: http://www-eu.apache.org/dist/orc/orc-1.2.3/

and you can see the sha256 files are dropped just like the *.asc files.

.. Owen

On Thu, Jan 26, 2017 at 12:01 PM, Christopher  wrote:

> To be clear, those "trusted signatures" should be using strong hash
> algorithms themselves. (As well as sufficiently long keys.)
> I raised the issue of weak hashes in GPG signatures for Maven projects at
> ASF with https://issues.apache.org/jira/browse/MPOM-118 , but non-Maven
> projects which manually sign releases should probably take care to ensure
> their signatures are adequate. I consider this a release-voting quality
> assurance step, and encourage projects to examine the signatures attached
> to their release candidates as part of their release process.
>
> On Thu, Jan 26, 2017 at 2:27 PM Ted Dunning  wrote:
>
> > SHA1 and MD5 have been individually compromised, but a combined hash has
> > not been.
> >
> > Regardless, Sebb's comment that hashes are worthless for authentication
> and
> > tamper-detection is spot-on. You have to look to trusted signatures for
> > that.
> >
> >
> >
> > On Thu, Jan 26, 2017 at 10:20 AM, Mike Lissner <
> > mliss...@michaeljaylissner.com> wrote:
> >
> > > I filed a bug about this already, but I've been directed to email here
> > > instead. The bug I filed is:
> > > https://issues.apache.org/jira/browse/INFRA-12626
> > >
> > > Basically, on download pages we provide obsolete hashes for our
> downloads
> > > (MD5 and SHA1). These are meant, as I understand it, to serve two
> > purposes.
> > > First, they allow you to make sure that your download succeeded.
> Second,
> > > they allow you to ensure that your download wasn't tampered with.
> > >
> > > For the first purpose: Great. They work. For the second purpose,
> however,
> > > we need to move away from MD5 and SHA1 hashes, both of which can now be
> > > attacked with relatively modest hardware.
> > >
> > > Browsers are moving away from SHA1 at a very fast pace. See:
> > >
> > > https://security.googleblog.com/2014/09/gradually-
> sunsetting-sha-1.html
> > >
> > > And:
> > >
> > > https://blog.mozilla.org/security/2014/09/23/phasing-
> > > out-certificates-with-sha-1-based-signature-algorithms/
> > >
> > > I don't know who's responsible for this, but my bug was closed because
> > it's
> > > not the infrastructure team, and so I'm trying here.
> > >
> > > I suggest we move to SHA2 hashes for all verification purposes.
> > >
> > > Thanks,
> > >
> > > Mike
> > >
> >
> --
> Christopher
>


Re: Use of MD5 and SHA1 for download verification

2017-01-26 Thread sebb
Yes, hashes etc are not replicated to mirrors; I think this is partly
to encourage people to download them from the ASF hardware.
However a rogue mirror could still provide its own hashes.

But hashes from ASF hardware still only provide a basic download
check; they don't provide authentication, because anyone can create a
hash for any file.

Of course, if you sign a hash with a GPG key, that would allow the
user to authenticate the hash if they trust the key.

AIUI that's basically what sigs are.

On 26 January 2017 at 21:26, Owen O'Malley  wrote:
> Infra does filter filenames that match (*.sha256) from the mirror
> replication, so it is possible
> to use such names and have matching behavior:
>
> Compare mirror: http://apache.cs.utah.edu/orc/orc-1.2.3/
> Apache version: http://www-eu.apache.org/dist/orc/orc-1.2.3/
>
> and you can see the sha256 files are dropped just like the *.asc files.
>
> .. Owen
>
> On Thu, Jan 26, 2017 at 12:01 PM, Christopher  wrote:
>
>> To be clear, those "trusted signatures" should be using strong hash
>> algorithms themselves. (As well as sufficiently long keys.)
>> I raised the issue of weak hashes in GPG signatures for Maven projects at
>> ASF with https://issues.apache.org/jira/browse/MPOM-118 , but non-Maven
>> projects which manually sign releases should probably take care to ensure
>> their signatures are adequate. I consider this a release-voting quality
>> assurance step, and encourage projects to examine the signatures attached
>> to their release candidates as part of their release process.
>>
>> On Thu, Jan 26, 2017 at 2:27 PM Ted Dunning  wrote:
>>
>> > SHA1 and MD5 have been individually compromised, but a combined hash has
>> > not been.
>> >
>> > Regardless, Sebb's comment that hashes are worthless for authentication
>> and
>> > tamper-detection is spot-on. You have to look to trusted signatures for
>> > that.
>> >
>> >
>> >
>> > On Thu, Jan 26, 2017 at 10:20 AM, Mike Lissner <
>> > mliss...@michaeljaylissner.com> wrote:
>> >
>> > > I filed a bug about this already, but I've been directed to email here
>> > > instead. The bug I filed is:
>> > > https://issues.apache.org/jira/browse/INFRA-12626
>> > >
>> > > Basically, on download pages we provide obsolete hashes for our
>> downloads
>> > > (MD5 and SHA1). These are meant, as I understand it, to serve two
>> > purposes.
>> > > First, they allow you to make sure that your download succeeded.
>> Second,
>> > > they allow you to ensure that your download wasn't tampered with.
>> > >
>> > > For the first purpose: Great. They work. For the second purpose,
>> however,
>> > > we need to move away from MD5 and SHA1 hashes, both of which can now be
>> > > attacked with relatively modest hardware.
>> > >
>> > > Browsers are moving away from SHA1 at a very fast pace. See:
>> > >
>> > > https://security.googleblog.com/2014/09/gradually-
>> sunsetting-sha-1.html
>> > >
>> > > And:
>> > >
>> > > https://blog.mozilla.org/security/2014/09/23/phasing-
>> > > out-certificates-with-sha-1-based-signature-algorithms/
>> > >
>> > > I don't know who's responsible for this, but my bug was closed because
>> > it's
>> > > not the infrastructure team, and so I'm trying here.
>> > >
>> > > I suggest we move to SHA2 hashes for all verification purposes.
>> > >
>> > > Thanks,
>> > >
>> > > Mike
>> > >
>> >
>> --
>> Christopher
>>

-
To unsubscribe, e-mail: dev-unsubscr...@community.apache.org
For additional commands, e-mail: dev-h...@community.apache.org