Hi,

Antoine Beaupré wrote:
> Severity set to 'grave' from 'normal'

This is really overdone.

See jigdo as a peculiar way of downloading the ISO with a MD5 check
where e.g. wget has none at all.
And as said, for now jigdo seems indispensible for the fat ISO sets.


> If the ISO image generation is broken, it should be fixed.

My bug report does not say that ISO production is broken or that jigdo
is the reason for any of the checksums in the package management.
I doubt both theories.


> In the meantime, I think it's perfectly acceptable to remove MD5sums
> from the archive, at the cost of breaking jigdo.

I agree to this plan, if you afterwards verify that debian-cd still can
produce a pair of .jigdo and .template which jigdo-lite then can use
to create the identical ISO by help of a package mirror.

I place my bet on no problems, but i may be wrong.


> Or, to put it another way, it's completely unacceptable that jigdo uses
> MD5 to authenticate checksums,

It does so for cross-table key matching, where MD5 suffices by all means
of hash table theory.

It does so for verifying internally what can be verified externally by
the best means which Debian offers for its ISOs. I advise to do the
external check of .jigdo and .template before the run of jigdo-lite and
the external check of .iso afterwards.

There is bug #887837 where i propose to add a reminder message at the end
of the jigdo-lite run.

Debian could really need a end-user comprehensable description of the
credible verification from GPG to SHA512 to ISO. This is completely
independent of jigdo and applies to all download methods for ISOs.


Have a nice day :)

Thomas

Reply via email to