On Apr 3, 2013, at 3:23 PM, Laurens Van Houtven <_...@lvh.cc> wrote:

> On Thu, Apr 4, 2013 at 12:04 AM, Glyph <gl...@twistedmatrix.com> wrote:
> The release manager already _does_ sign something.  Since PyCon, we do have 
> much better trust web integration, which is great, but that's not really 
> relevant to this discussion, which is just about changing what we sign and 
> how it gets signed.
> 
> Yes, sorry; I thought there were just a bunch of hashes in a file somewhere, 
> and forgot they were signed.
>  
> I think we should carry on with signing the list of signatures for now, and 
> just upgrade the hash algorithm.  Baby steps.  Perhaps there are some 
> theoretical benefits that come from signing the whole binary blob, but that's 
> a much bigger change for a much smaller benefit.
> 
> If anyone does have an interest in us doing this, I think the first step 
> would be to write up a clear explanation of how it should be done.
> 
> I agree. Can't we just replace "md5sum" in the command line with "shasum -a 
> 512"? Do we need a grace period where we deliver both the MD5 and SHA512 
> sums? (Perhaps there's an automated system out there that relies on the MD5 
> version being available, since that's all we have now.)

Signing both certainly doesn't create any problems.  I just have no idea what 
automation stuff parses this file as part of our _own_ release process.  I was 
hoping someone who knew how it worked could examine it and tell me.

-glyph



_______________________________________________
Twisted-Python mailing list
Twisted-Python@twistedmatrix.com
http://twistedmatrix.com/cgi-bin/mailman/listinfo/twisted-python

Reply via email to