On Thu, Apr 4, 2013 at 12:04 AM, Glyph <gl...@twistedmatrix.com> wrote:
> The release manager already _does_ sign something. Since PyCon, we do > have much better trust web integration, which is great, but that's not > really relevant to this discussion, which is just about changing what we > sign and how it gets signed. > Yes, sorry; I thought there were just a bunch of hashes in a file somewhere, and forgot they were signed. > I think we should carry on with signing the list of signatures for now, > and just upgrade the hash algorithm. Baby steps. Perhaps there are some > theoretical benefits that come from signing the whole binary blob, but > that's a much bigger change for a much smaller benefit. > > If anyone does have an interest in us doing this, I think the first step > would be to write up a clear explanation of how it should be done. > I agree. Can't we just replace "md5sum" in the command line with "shasum -a 512"? Do we need a grace period where we deliver both the MD5 and SHA512 sums? (Perhaps there's an automated system out there that relies on the MD5 version being available, since that's all we have now.) > -glyph > -- cheers lvh
_______________________________________________ Twisted-Python mailing list Twisted-Python@twistedmatrix.com http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python