Correct. I did open Bug 423715 - move to SHA2 for p2 metadata publishing (and consumption) but that won't change for Luna ... and maybe never ... until there is pressure from some of these "government regulations" or something to motivate a a change.
From: "Sievers, Jan" <jan.siev...@sap.com> To: Cross project issues <cross-project-issues-dev@eclipse.org>, Date: 05/20/2014 04:23 AM Subject: Re: [cross-project-issues-dev] Eclipse and Equinox have moved to using SHA-2, 512 bit hashes for downloads -- Don't panic! Sent by: cross-project-issues-dev-boun...@eclipse.org as far as I got it this is for the eclipse.org download pages only. p2 is still using MD5 for checksums in artifacts.jar, see e.g. [1] Jan [1] http://download.eclipse.org/releases/luna/201405090900/artifacts.jar From: cross-project-issues-dev-boun...@eclipse.org [ mailto:cross-project-issues-dev-boun...@eclipse.org] On Behalf Of Matthias Sohn Sent: Dienstag, 20. Mai 2014 08:33 To: Cross project issues Cc: General development mailing list of the Eclipse project.; Equinox development mailing list Subject: Re: [cross-project-issues-dev] Eclipse and Equinox have moved to using SHA-2, 512 bit hashes for downloads -- Don't panic! On Tue, May 20, 2014 at 8:20 AM, David M Williams < david_willi...@us.ibm.com> wrote: I wanted to be sure everyone knew that beginning with tonight's I-build (I20140519-2000), Eclipse and Equinox have changed to provide SHA512 hashes for downloadable zips and tar files, instead of the previous MD5 and SHA1 hash sums. See the references in https://bugs.eclipse.org/bugs/show_bug.cgi?id=420010#c1 for why it's a bad idea to continue to rely on MD5 and SHA1. Our "conversion" and plan is documented in bug 423714 https://bugs.eclipse.org/bugs/show_bug.cgi?id=423714 The disadvantage of using such a large hash is that its not something you can "verify" just by "looking at it" ... but ... insecure is insecure, and it is a pretty easy task to automate (and is a LOT easier, once you have done that). See https://wiki.eclipse.org/Platform-releng/How_to_check_integrity_of_downloads for "instructions" and links to tools. Feel free to contribute to that page if anyone has any "general purpose" scripts that others could use or know of other tools that would be handy to know about. Now -- here's where your feedback is needed -- we'd actually like to stop producing the MD5 and SHA1 checksums, say, a month after Luna release ... but if if this is just too disruptive or doesn't work for someone, please comment in Bug 423714 explaining. In the mean time, we do not "link" to the old MD5 or SHA1 checksums from the download page, but they are still there ... right where they always were ... to make sure we don't suddenly break someone's scripts or builds. And if you do rely on them now, we hope you can convert after the Luna release (if not before). Do feel free to comment in the bug, if this has some negative consequence we have not anticipated ... but, my guess is that anyone who cares about them in the first place will appreciate the modernization. My new slogan: Test early, test often, and practice safe computing! Thanks, could you share how platform generates SHA512 checksums from Maven / Tycho ? This would be interesting for other projects which want to update their builds as well. -- Matthias _______________________________________________ cross-project-issues-dev mailing list cross-project-issues-dev@eclipse.org https://dev.eclipse.org/mailman/listinfo/cross-project-issues-dev
_______________________________________________ cross-project-issues-dev mailing list cross-project-issues-dev@eclipse.org https://dev.eclipse.org/mailman/listinfo/cross-project-issues-dev