Hi,

I maintain one port (ds9) for which the upstream source tarball is posted on an 
http (no TLS) server. When I uploaded the initial version of the port, I 
recorded the hashes that I calculated from the tarball. There is an update 
available. I asked the developer if he could put a cryptographic hash on an 
https server. He sent me an RMD160 and a SHA1 hash, but in an unsigned e-mail. 
So technically, I have no way to check that the sources have not been tampered 
with. I don't think upstream has the resources to set up an https server.

Am I being way too paranoid? Should I just take the sources and hashes that I 
have?

I have tried to check the sources against the Debian package, but the Debian 
maintainer checked in just a subset of the upstream source because there are 
several dependencies bundled with it.

This is not a security-critical package, but it is used widely, perhaps daily, 
by people in my domain.

Thanks,
Leo Singer
_______________________________________________
macports-dev mailing list
macports-dev@lists.macosforge.org
https://lists.macosforge.org/mailman/listinfo/macports-dev

Reply via email to