Re: dpkg MD5

2024-11-08 Thread Jeffrey Walton
On Thu, Nov 7, 2024 at 10:12 PM Jeremy Stanley wrote: > [...] > > Probably the most convincing reason to replace such uses of MD5 is > that we collectively get to stop wasting time answering this same > question over and over and over... One more datapoint that might be useful AMD/Intel, ARMv

Re: dpkg MD5

2024-11-08 Thread Jeremy Stanley
On 2024-11-08 15:41:25 + (+), Jeremy Stanley wrote: [...] > Now grab a package file like > https://deb.debian.org/debian/pool/main/o/openssh/ssh_9.9p1-3_all.deb > and unpack it (dpkg-deb ssh_9.9p1-3_all.deb foo) [...] Hopefully obvious, but that should have been `dpkg-deb -R ...` instead,

Re: dpkg MD5

2024-11-08 Thread SZÉPE Viktor
Idézem/Quoting Jeremy Stanley : Mostly. I don't know that the per-file checksums inside the DEB are all that useful to "make sure the packages arrived in one piece and weren't corrupted" since we already have stronger solutions for that: I am a frequent debsums runner. debsums alerts you when

Re: dpkg MD5

2024-11-08 Thread Jeremy Stanley
On 2024-11-08 04:04:19 + (+), debianmailinglists.hz...@simplelogin.com wrote: > I'm not a Debian developer, just a curious onlooker who hasn't > seen all of these messages, so I could completely off base with my > understanding of how things work. But, it was my understanding > that the bu

Re: dpkg MD5

2024-11-08 Thread Simon Josefsson
David Campbell writes: > To whom it may concern, > > dpkg currently uses MD5 to verify packages, but MD5 is considered > insecure, why not switch to SHA256 (and also update lintian)? > > Also, to make verifying packages more useful, why not get a checksum > from a more trusted source, like a main

Re: dpkg MD5

2024-11-07 Thread Jeffrey Walton
From: debianmailinglists.hz...@simplelogin.com: > > I'm not a Debian developer, just a curious onlooker who hasn't seen all > of these messages, so I could completely off base with my understanding > of how things work. But, it was my understanding that the bundled MD5 > inside a .deb file isn't t

Re: dpkg MD5

2024-11-07 Thread Jeffrey Walton
On Thu, Nov 7, 2024 at 10:12 PM Jeremy Stanley wrote: > [...] > Probably the most convincing reason to replace such uses of MD5 is > that we collectively get to stop wasting time answering this same > question over and over and over... Hear, hear! Jeff

Re: dpkg MD5

2024-11-07 Thread debianmailinglists . hz5zm
I'm not a Debian developer, just a curious onlooker who hasn't seen all of these messages, so I could completely off base with my understanding of how things work. But, it was my understanding that the bundled MD5 inside a .deb file isn't there for security, it's just there to make sure the pack

Re: dpkg MD5

2024-11-07 Thread Jeremy Stanley
On 2024-11-07 21:30:26 -0500 (-0500), Jeffrey Walton wrote: > On Thu, Nov 7, 2024 at 7:22 PM Jeremy Stanley wrote: > > > > On 2024-11-07 16:45:54 -0500 (-0500), David Campbell wrote: > > [...] > > > dpkg currently uses MD5 to verify packages, but MD5 is considered > > > insecure, why not switch to

Re: dpkg MD5

2024-11-07 Thread Jeffrey Walton
On Thu, Nov 7, 2024 at 7:22 PM Jeremy Stanley wrote: > > On 2024-11-07 16:45:54 -0500 (-0500), David Campbell wrote: > [...] > > dpkg currently uses MD5 to verify packages, but MD5 is considered > > insecure, why not switch to SHA256 (and also update lintian)? > [...] > > MD5 is considered insecur

Re: dpkg MD5

2024-11-07 Thread Jeremy Stanley
On 2024-11-07 16:45:54 -0500 (-0500), David Campbell wrote: [...] > dpkg currently uses MD5 to verify packages, but MD5 is considered > insecure, why not switch to SHA256 (and also update lintian)? [...] MD5 is considered insecure to collision attacks, but mounting one would require that the creat

Re: dpkg MD5

2024-11-07 Thread David Campbell
Nope, but I thought that may be a way to make check summing more useful. On 11/7/24 17:08, Jonathan Hutchins wrote: Do you have any evidence that there has been an attempt to post bogus packages to the official mirrors? -- David Campbell

Re: dpkg MD5

2024-11-07 Thread Jonathan Hutchins
On 2024-11-07 15:45, David Campbell wrote: To whom it may concern, dpkg currently uses MD5 to verify packages, but MD5 is considered insecure, why not switch to SHA256 (and also update lintian)? Do you have any evidence that there has been an attempt to post bogus packages to the official mir

dpkg MD5

2024-11-07 Thread David Campbell
To whom it may concern, dpkg currently uses MD5 to verify packages, but MD5 is considered insecure, why not switch to SHA256 (and also update lintian)? Also, to make verifying packages more useful, why not get a checksum from a more trusted source, like a main Debian package repository to co