[Christoph Anton Mitterer]
> Wouldn't it make sense to start discussions about moving to the
> "strongest" possible?

No.  What makes sense is to use a hash that has the properties that are
needed for a particular application.

To use your example of dpkg file checksums, their purpose has _nothing_
to do with security.  They cannot protect against a malicious attacker,
because an attacker who can corrupt /usr/bin/lsof can also corrupt
/var/lib/dpkg/info/lsof.md5sums.  (And /var cannot be read-only as /usr
sometimes is.)  If you need protection against a malicious attacker,
you need to generate and store your checksums in some other way.[1]

    [1] Check out 'apt-cache search tripwire' for various ways to
    reinvent that wheel.  tripwire was an early implementation of this
    idea, so it is mentioned in other package descriptions.

Rather, the checksums are for integrity checking in the face of disk
corruption or administrative snafu.  Basically to answer the question
"Would it help to reinstall this package?"  MD5 is perfectly well
suited for that.  The presence of the md5sums file in control.tar.gz is
just a convenience so that end systems don't have to calculate it at
install time, much like providing .pyc or .elc files in a .deb (which
we don't do, but we could).

My point is not to pick on your specific example, but to suggest
actually _thinking_ about what a hash is used for, as opposed to the
common knee-jerk reaction "oooh, MD5 is weak, it must be replaced!"
every time someone sees MD5.  (Or SHA-1.)

Peter


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121011163521.gc4...@p12n.org

Reply via email to