l...@gnu.org (Ludovic Courtès) writes: > The behavior of the source download is on purpose as noted in (guix > download): > > ;; No need to validate certificates since we know the > ;; hash of the expected result. > #:verify-certificate? #f))))) > > IOW, since we’re checking the integrity of the tarball anyway, and we > assume developers checked its authenticity when writing the recipe, then > who cares whether downloads.xiph.org has a valid certificate? > > Conversely, ‘guix download’ always checks certificates by default. > > Does it make sense?
Yes, and I agree with this behavior. However, it should be noted that this will reduce the security of a bad practice that I suspect is sometimes used by people when updating packages, namely to update the version number, try building it, and then copy the hash from the error message to the package. FWIW, I always check digital signatures when they're available, and I hope that others will as well, but in practice we are putting our faith in a large number of contributors, some of whom might not be so careful. Also, sadly, many packages are distributed without digital signatures at all. One glaring example is NSS. Mark