Re: Digests in releases

2017-09-04 Thread Bertrand Delacretaz
On Thu, Aug 31, 2017 at 3:15 PM, Henk P. Penning  wrote:
>   -- SHA-1 : not as bad as MD5, but no longer considered secure
>  by some ; https://en.wikipedia.org/wiki/SHA-1 ; skip
>   -- SHA-256 : fine
>   -- SHA-512 : fine
>
>   So, I would suggest we pick SHA-256...

+1

-Bertrand

-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-09-02 Thread Christopher
My proposal was an attempt to achieve two goals:

1. Drop the absolute MD5 requirement in favor of an "at least MD5"
requirement, and
2. Make [2] consistent with [3] by dropping file naming conventions in [2],
and deferring to the constraints in [3].

If my existing wording is too complex, I'm sure it could be rewritten to
achieve both of these goals with simpler wording. If considering both goals
at the same time is too much to address at once, we could just focus on #1,
since that's more relevant to the topic this thread started with.

On Sat, Sep 2, 2017 at 6:00 AM Henk P. Penning  wrote:

> On Fri, 1 Sep 2017, Christopher wrote:
>
> > Date: Fri, 1 Sep 2017 03:29:58 +0200
> > From: Christopher 
> > To: general@incubator.apache.org
> > Subject: Re: Digests in releases
> >
> > On Wed, Aug 30, 2017 at 5:08 PM Julian Hyde  wrote:
> >
> >> What is the correct forum for discussing release distribution policy?
> >>
> >>
> > Good question. I hope it's this one, since this is where the discussion
> is
> > happening.
> >
> >
> >
> >> Current policy [1] states:
> >>
> >>   Every artifact distributed to the public through Apache channels MUST
> >>   be accompanied by one file containing an OpenPGP compatible ASCII
> >>   armored detached signature and another file containing an MD5
> checksum.
> >>
> >>   ...
> >>
> >>   An SHA checksum SHOULD also be created.
> >>
> >>
> >> MD5 is no longer deemed secure[2]. I think we should remove it from
> >> our releases and mandate SHA256 or SHA512.
>
> >> [1] http://www.apache.org/dev/release-distribution.html#sigs-and-sums
> >> [2] https://en.wikipedia.org/wiki/Md5sum
>
> >
> > A good policy is simple and flexible, in my opinion. Rather than require
> > any specific checksum with others optional, I would personally like to
> see
> > the policy changed to simply require "a detached ASCII-armored GPG
> > signature named .asc for each  release artifact, and one or
> > more standard checksums with a minimum strength of MD5 in a standard file
> > format with a convenient file naming convention"
> >
> > Such a policy could easily be updated by simply changing the "minimum
> > strength", if necessary, in the future. But changing the policy to allow
> > PMCs to drop support for legacy hashes, replaced by newer standards, is
> > infinitely better, in my opinion.
>
>The '(legal) release policy' [1] says /what/ we want, and /why/.
>-- note that [1] doesn't even mention checksums.
>The 'Release Distribution Policy' [2] says /how/ we do it.
>-- because [2] is about 'implementation' it should preferably be :
>   -- simple, strict, unambiguous and short
>   -- easy to explain and easy to understand
>   -- ASF-wide
>
>I think the current scheme has the prefered properties.
>
>[1] http://www.apache.org/legal/release-policy.html
>[2] http://www.apache.org/dev/release-distribution
>[3] http://www.apache.org/dev/release-publishing
>
> > If my wording needs clarification:
> >
> >  By "standard checksums", I mean MD5, SHA1, or any of the SHA2 family
> > currently, but maybe SHA3 family in future.
> >  By "standard file format", I mean a plain text file containing only the
> > ASCII encoded hex representation of the hash or in a format such as those
> > output by the 'sha*sum' suite of tools (example:
> > https://www.systutorials.com/docs/linux/man/1-sha512sum/).
> >  By "convenient file naming convention", I mean the artifact file name
> > with an appended ".md5 or .sha\d*" or aggregated into a file such as
> > CHECKSUMS, SHA1SUM, MD5SUM, etc. for the convenience of verifying
> multiple
> > artifact files from a release.
>
>If I understand you correctly, the operational word here is "or"
>in "or aggregated into a file [...]".
>
>-- The scheme you propose is more complex than the current scheme ;
>   therefor, a priori, it isn't better.
>-- In your scheme, the checksum of a given file can be in multiple
>   places ; this error-prone, harder to use, check and report.
>-- Note that [3] /allows/ you to supply 'MD5SUM' and 'SHA*SUM' files,
>   but [3] also says that in general checksum files shouldn't leak
>   to the mirrors, so a list of excluded files is provided ;
>   a short list is better than a long list.
>   [the l

Re: Digests in releases

2017-09-02 Thread Henk P. Penning

On Fri, 1 Sep 2017, Christopher wrote:


Date: Fri, 1 Sep 2017 03:29:58 +0200
From: Christopher 
To: general@incubator.apache.org
Subject: Re: Digests in releases

On Wed, Aug 30, 2017 at 5:08 PM Julian Hyde  wrote:


What is the correct forum for discussing release distribution policy?



Good question. I hope it's this one, since this is where the discussion is
happening.




Current policy [1] states:

  Every artifact distributed to the public through Apache channels MUST
  be accompanied by one file containing an OpenPGP compatible ASCII
  armored detached signature and another file containing an MD5 checksum.

  ...

  An SHA checksum SHOULD also be created.


MD5 is no longer deemed secure[2]. I think we should remove it from
our releases and mandate SHA256 or SHA512.



[1] http://www.apache.org/dev/release-distribution.html#sigs-and-sums
[2] https://en.wikipedia.org/wiki/Md5sum




A good policy is simple and flexible, in my opinion. Rather than require
any specific checksum with others optional, I would personally like to see
the policy changed to simply require "a detached ASCII-armored GPG
signature named .asc for each  release artifact, and one or
more standard checksums with a minimum strength of MD5 in a standard file
format with a convenient file naming convention"

Such a policy could easily be updated by simply changing the "minimum
strength", if necessary, in the future. But changing the policy to allow
PMCs to drop support for legacy hashes, replaced by newer standards, is
infinitely better, in my opinion.


  The '(legal) release policy' [1] says /what/ we want, and /why/.
  -- note that [1] doesn't even mention checksums.
  The 'Release Distribution Policy' [2] says /how/ we do it.
  -- because [2] is about 'implementation' it should preferably be :
 -- simple, strict, unambiguous and short
 -- easy to explain and easy to understand
 -- ASF-wide

  I think the current scheme has the prefered properties.

  [1] http://www.apache.org/legal/release-policy.html
  [2] http://www.apache.org/dev/release-distribution
  [3] http://www.apache.org/dev/release-publishing


If my wording needs clarification:

 By "standard checksums", I mean MD5, SHA1, or any of the SHA2 family
currently, but maybe SHA3 family in future.
 By "standard file format", I mean a plain text file containing only the
ASCII encoded hex representation of the hash or in a format such as those
output by the 'sha*sum' suite of tools (example:
https://www.systutorials.com/docs/linux/man/1-sha512sum/).
 By "convenient file naming convention", I mean the artifact file name
with an appended ".md5 or .sha\d*" or aggregated into a file such as
CHECKSUMS, SHA1SUM, MD5SUM, etc. for the convenience of verifying multiple
artifact files from a release.


  If I understand you correctly, the operational word here is "or"
  in "or aggregated into a file [...]".

  -- The scheme you propose is more complex than the current scheme ;
 therefor, a priori, it isn't better.
  -- In your scheme, the checksum of a given file can be in multiple
 places ; this error-prone, harder to use, check and report.
  -- Note that [3] /allows/ you to supply 'MD5SUM' and 'SHA*SUM' files,
 but [3] also says that in general checksum files shouldn't leak
 to the mirrors, so a list of excluded files is provided ;
 a short list is better than a long list.
 [the list appears to be incomplete, which proves my point ;-]
  -- You talk about a "standard file format" [for checksum files] ;
 note that the current scheme does /not/ specify anything
 about the contents of a checksum file ; yet it works (*).
 Look at the checksum files in /dist/ ; they vary wildly.
 Prescribing the format of checksum files is a bad idea.

  (*) The checker finds some bad checksum files in /dist/ :
  https://checker.apache.org/dist/sums.html
  AFAIK it doesn't report any false negatives or positives ;
  please send comments etc to me (he...@apache.org).

  Regards,

  Henk Penning

   _
Henk P. Penning, ICT-beta R Uithof HFG-406   _/ \_
Faculty of Science, Utrecht UniversityT +31 30 253 4106 / \_/ \
Budapestlaan 6, 3584CD Utrecht, NLF +31 30 253 4553 \_/ \_/
http://www.staff.science.uu.nl/~penni101/ M penn...@uu.nl \_/

-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-31 Thread Daniel Shahaf
Dave Fisher wrote on Thu, 31 Aug 2017 13:35 -0700:
> Regardless of what Jane User knows, and we have 200 million Jane Users of 
> Apache OpenOffice, I think it would be helpful to have an Apache Download 
> checker program/script that could be run to confirm the bonafides.
> 
> An idea.

Why stop here?  On unix this problem is largely solved, by
'${packagemanager} install foo' (substitute your distro's package
manager).  Why not set up a package manager (program + repository
service) for windows?

With 200M users, though, somebody's going to write phishing software
that impersonates the package manager.  There's no easy way around the
web of trust.

-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-31 Thread Dave Fisher
Hey Joe,

Thanks for the pointer. I think Henk needs to be involved.

Regards,
Dave

Sent from my iPhone

> On Aug 31, 2017, at 3:31 PM, Joe Schaefer  wrote:
> 
> Henk's scripting does that and much more.
> 
>> On Thu, Aug 31, 2017 at 5:09 PM Ted Dunning  wrote:
>> 
>> I thought that gpg does that.
>> 
>> On Thu, Aug 31, 2017 at 1:35 PM, Dave Fisher 
>> wrote:
>> 
>>> Regardless of what Jane User knows, and we have 200 million Jane Users of
>>> Apache OpenOffice, I think it would be helpful to have an Apache Download
>>> checker program/script that could be run to confirm the bonafides.
>>> 
>>> An idea.
>>> 
>>> Regards,
>>> Dave
>>> 
 On Aug 31, 2017, at 1:22 PM, Julian Hyde 
>> wrote:
 
 I know this. You know this. Joe User does not know this. I am trying to
>>> make Joe User’s life easier.
 
 Since SHA256 is sufficient for both purposes why does release policy
>>> MANDATE that projects include an MD5?
 
 Julian
 b
 
> On Aug 31, 2017, at 1:17 PM, Ted Dunning 
>> wrote:
> 
> The checksum is not a tampering countermeasure.
> 
> It is a "mirror ran out of diskpace" or "IP checksums are only 32
>> bits"
> countermeasure.
> 
> 
> 
> On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde 
>> wrote:
> 
>> As security experts, you and I know that. But Joe User maybe only
>>> checks
>> one digest.
>> 
>> (Aren’t we all Joe User sometimes?)
>> 
>> Julian
>> 
>>> On Aug 31, 2017, at 11:30 AM, Mike Jumper >> 
>> wrote:
>>> 
>>> On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
>>> 
>>> After downloading artifacts, there are 3 things to check: (1) the
>> download
>>> is successful; (2) the artifacts were indeed created by the named
>>> author;
>>> and (3) the artifacts have not been tampered with.
>>> 
>>> A security expert would know to use the .md5 for (1), the .asc for
>>> (2),
>> and
>>> the .sha256 or .sha512 for (3).
>>> 
>>> 
>>> If there is a danger that the artifacts may be tampered with, there
>>> is an
>>> equivalent danger that the checksum files will be tampered with, as
>>> well.
>>> Checksums alone cannot be relied upon to verify an artifact hasn't
>>> been
>>> altered.
>>> 
>>> Only the signature allows verification of authorship and integrity
>> ...
>>> assuming users have secure access to the corresponding public keys,
>>> and
>>> that those keys are linked into the web of trust.
>>> 
>>> - Mike
>> 
>> 
>> -
>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>> For additional commands, e-mail: general-h...@incubator.apache.org
>> 
>> 
 
 
 -
 To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
 For additional commands, e-mail: general-h...@incubator.apache.org
 
>>> 
>>> 
>> 


-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-31 Thread Christopher
On Wed, Aug 30, 2017 at 5:08 PM Julian Hyde  wrote:

> What is the correct forum for discussing release distribution policy?
>
>
Good question. I hope it's this one, since this is where the discussion is
happening.



> Current policy [1] states:
>
>   Every artifact distributed to the public through Apache channels MUST
>   be accompanied by one file containing an OpenPGP compatible ASCII
>   armored detached signature and another file containing an MD5 checksum.
>
>   ...
>
>   An SHA checksum SHOULD also be created.
>
>
> MD5 is no longer deemed secure[2]. I think we should remove it from
> our releases and mandate SHA256 or SHA512.
>
>

A good policy is simple and flexible, in my opinion. Rather than require
any specific checksum with others optional, I would personally like to see
the policy changed to simply require "a detached ASCII-armored GPG
signature named .asc for each  release artifact, and one or
more standard checksums with a minimum strength of MD5 in a standard file
format with a convenient file naming convention"

Such a policy could easily be updated by simply changing the "minimum
strength", if necessary, in the future. But changing the policy to allow
PMCs to drop support for legacy hashes, replaced by newer standards, is
infinitely better, in my opinion.

If my wording needs clarification:

  By "standard checksums", I mean MD5, SHA1, or any of the SHA2 family
currently, but maybe SHA3 family in future.
  By "standard file format", I mean a plain text file containing only the
ASCII encoded hex representation of the hash or in a format such as those
output by the 'sha*sum' suite of tools (example:
https://www.systutorials.com/docs/linux/man/1-sha512sum/).
  By "convenient file naming convention", I mean the artifact file name
with an appended ".md5 or .sha\d*" or aggregated into a file such as
CHECKSUMS, SHA1SUM, MD5SUM, etc. for the convenience of verifying multiple
artifact files from a release.

Modifying the policy in this way, we can eliminate requirements for legacy
hashes and inconvenient (as determined by PMCs for their users, not by
INFRA) file naming conventions. Of course, the file naming conventions
would still have to fit into constraints imposed by INFRA for the mirroring
system, or Maven deployments, or whatever, but these would simply be
implementation details, rather than enshrined in policy (which I think is
better, because policy should be simple and shouldn't change as much; INFRA
should be able to update implementation details, upon request, to allow
more conventions as new projects come on board with their own conventions,
and as verification tools and de facto standards around the internet
evolve).



> Julian
>
> [1] http://www.apache.org/dev/release-distribution.html#sigs-and-sums
>
> [2] https://en.wikipedia.org/wiki/Md5sum
>
> -
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
>
>


Re: Digests in releases

2017-08-31 Thread Joe Schaefer
Henk's scripting does that and much more.

On Thu, Aug 31, 2017 at 5:09 PM Ted Dunning  wrote:

> I thought that gpg does that.
>
> On Thu, Aug 31, 2017 at 1:35 PM, Dave Fisher 
> wrote:
>
> > Regardless of what Jane User knows, and we have 200 million Jane Users of
> > Apache OpenOffice, I think it would be helpful to have an Apache Download
> > checker program/script that could be run to confirm the bonafides.
> >
> > An idea.
> >
> > Regards,
> > Dave
> >
> > > On Aug 31, 2017, at 1:22 PM, Julian Hyde 
> wrote:
> > >
> > > I know this. You know this. Joe User does not know this. I am trying to
> > make Joe User’s life easier.
> > >
> > > Since SHA256 is sufficient for both purposes why does release policy
> > MANDATE that projects include an MD5?
> > >
> > > Julian
> > >b
> > >
> > >> On Aug 31, 2017, at 1:17 PM, Ted Dunning 
> wrote:
> > >>
> > >> The checksum is not a tampering countermeasure.
> > >>
> > >> It is a "mirror ran out of diskpace" or "IP checksums are only 32
> bits"
> > >> countermeasure.
> > >>
> > >>
> > >>
> > >> On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde 
> wrote:
> > >>
> > >>> As security experts, you and I know that. But Joe User maybe only
> > checks
> > >>> one digest.
> > >>>
> > >>> (Aren’t we all Joe User sometimes?)
> > >>>
> > >>> Julian
> > >>>
> >  On Aug 31, 2017, at 11:30 AM, Mike Jumper  >
> > >>> wrote:
> > 
> >  On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
> > 
> >  After downloading artifacts, there are 3 things to check: (1) the
> > >>> download
> >  is successful; (2) the artifacts were indeed created by the named
> > author;
> >  and (3) the artifacts have not been tampered with.
> > 
> >  A security expert would know to use the .md5 for (1), the .asc for
> > (2),
> > >>> and
> >  the .sha256 or .sha512 for (3).
> > 
> > 
> >  If there is a danger that the artifacts may be tampered with, there
> > is an
> >  equivalent danger that the checksum files will be tampered with, as
> > well.
> >  Checksums alone cannot be relied upon to verify an artifact hasn't
> > been
> >  altered.
> > 
> >  Only the signature allows verification of authorship and integrity
> ...
> >  assuming users have secure access to the corresponding public keys,
> > and
> >  that those keys are linked into the web of trust.
> > 
> >  - Mike
> > >>>
> > >>>
> > >>> -
> > >>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> > >>> For additional commands, e-mail: general-h...@incubator.apache.org
> > >>>
> > >>>
> > >
> > >
> > > -
> > > To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> > > For additional commands, e-mail: general-h...@incubator.apache.org
> > >
> >
> >
>


Re: Digests in releases

2017-08-31 Thread Ted Dunning
I thought that gpg does that.

On Thu, Aug 31, 2017 at 1:35 PM, Dave Fisher  wrote:

> Regardless of what Jane User knows, and we have 200 million Jane Users of
> Apache OpenOffice, I think it would be helpful to have an Apache Download
> checker program/script that could be run to confirm the bonafides.
>
> An idea.
>
> Regards,
> Dave
>
> > On Aug 31, 2017, at 1:22 PM, Julian Hyde  wrote:
> >
> > I know this. You know this. Joe User does not know this. I am trying to
> make Joe User’s life easier.
> >
> > Since SHA256 is sufficient for both purposes why does release policy
> MANDATE that projects include an MD5?
> >
> > Julian
> >
> >
> >> On Aug 31, 2017, at 1:17 PM, Ted Dunning  wrote:
> >>
> >> The checksum is not a tampering countermeasure.
> >>
> >> It is a "mirror ran out of diskpace" or "IP checksums are only 32 bits"
> >> countermeasure.
> >>
> >>
> >>
> >> On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde  wrote:
> >>
> >>> As security experts, you and I know that. But Joe User maybe only
> checks
> >>> one digest.
> >>>
> >>> (Aren’t we all Joe User sometimes?)
> >>>
> >>> Julian
> >>>
>  On Aug 31, 2017, at 11:30 AM, Mike Jumper 
> >>> wrote:
> 
>  On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
> 
>  After downloading artifacts, there are 3 things to check: (1) the
> >>> download
>  is successful; (2) the artifacts were indeed created by the named
> author;
>  and (3) the artifacts have not been tampered with.
> 
>  A security expert would know to use the .md5 for (1), the .asc for
> (2),
> >>> and
>  the .sha256 or .sha512 for (3).
> 
> 
>  If there is a danger that the artifacts may be tampered with, there
> is an
>  equivalent danger that the checksum files will be tampered with, as
> well.
>  Checksums alone cannot be relied upon to verify an artifact hasn't
> been
>  altered.
> 
>  Only the signature allows verification of authorship and integrity ...
>  assuming users have secure access to the corresponding public keys,
> and
>  that those keys are linked into the web of trust.
> 
>  - Mike
> >>>
> >>>
> >>> -
> >>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >>> For additional commands, e-mail: general-h...@incubator.apache.org
> >>>
> >>>
> >
> >
> > -
> > To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> > For additional commands, e-mail: general-h...@incubator.apache.org
> >
>
>


Re: Digests in releases

2017-08-31 Thread Dave Fisher
Regardless of what Jane User knows, and we have 200 million Jane Users of 
Apache OpenOffice, I think it would be helpful to have an Apache Download 
checker program/script that could be run to confirm the bonafides.

An idea.

Regards,
Dave

> On Aug 31, 2017, at 1:22 PM, Julian Hyde  wrote:
> 
> I know this. You know this. Joe User does not know this. I am trying to make 
> Joe User’s life easier.
> 
> Since SHA256 is sufficient for both purposes why does release policy MANDATE 
> that projects include an MD5?
> 
> Julian
> 
> 
>> On Aug 31, 2017, at 1:17 PM, Ted Dunning  wrote:
>> 
>> The checksum is not a tampering countermeasure.
>> 
>> It is a "mirror ran out of diskpace" or "IP checksums are only 32 bits"
>> countermeasure.
>> 
>> 
>> 
>> On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde  wrote:
>> 
>>> As security experts, you and I know that. But Joe User maybe only checks
>>> one digest.
>>> 
>>> (Aren’t we all Joe User sometimes?)
>>> 
>>> Julian
>>> 
 On Aug 31, 2017, at 11:30 AM, Mike Jumper 
>>> wrote:
 
 On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
 
 After downloading artifacts, there are 3 things to check: (1) the
>>> download
 is successful; (2) the artifacts were indeed created by the named author;
 and (3) the artifacts have not been tampered with.
 
 A security expert would know to use the .md5 for (1), the .asc for (2),
>>> and
 the .sha256 or .sha512 for (3).
 
 
 If there is a danger that the artifacts may be tampered with, there is an
 equivalent danger that the checksum files will be tampered with, as well.
 Checksums alone cannot be relied upon to verify an artifact hasn't been
 altered.
 
 Only the signature allows verification of authorship and integrity ...
 assuming users have secure access to the corresponding public keys, and
 that those keys are linked into the web of trust.
 
 - Mike
>>> 
>>> 
>>> -
>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>>> For additional commands, e-mail: general-h...@incubator.apache.org
>>> 
>>> 
> 
> 
> -
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
> 



signature.asc
Description: Message signed with OpenPGP


Re: Digests in releases

2017-08-31 Thread Julian Hyde
I know this. You know this. Joe User does not know this. I am trying to make 
Joe User’s life easier.

Since SHA256 is sufficient for both purposes why does release policy MANDATE 
that projects include an MD5?

Julian


> On Aug 31, 2017, at 1:17 PM, Ted Dunning  wrote:
> 
> The checksum is not a tampering countermeasure.
> 
> It is a "mirror ran out of diskpace" or "IP checksums are only 32 bits"
> countermeasure.
> 
> 
> 
> On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde  wrote:
> 
>> As security experts, you and I know that. But Joe User maybe only checks
>> one digest.
>> 
>> (Aren’t we all Joe User sometimes?)
>> 
>> Julian
>> 
>>> On Aug 31, 2017, at 11:30 AM, Mike Jumper 
>> wrote:
>>> 
>>> On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
>>> 
>>> After downloading artifacts, there are 3 things to check: (1) the
>> download
>>> is successful; (2) the artifacts were indeed created by the named author;
>>> and (3) the artifacts have not been tampered with.
>>> 
>>> A security expert would know to use the .md5 for (1), the .asc for (2),
>> and
>>> the .sha256 or .sha512 for (3).
>>> 
>>> 
>>> If there is a danger that the artifacts may be tampered with, there is an
>>> equivalent danger that the checksum files will be tampered with, as well.
>>> Checksums alone cannot be relied upon to verify an artifact hasn't been
>>> altered.
>>> 
>>> Only the signature allows verification of authorship and integrity ...
>>> assuming users have secure access to the corresponding public keys, and
>>> that those keys are linked into the web of trust.
>>> 
>>> - Mike
>> 
>> 
>> -
>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
>> For additional commands, e-mail: general-h...@incubator.apache.org
>> 
>> 


-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-31 Thread Ted Dunning
The checksum is not a tampering countermeasure.

It is a "mirror ran out of diskpace" or "IP checksums are only 32 bits"
countermeasure.



On Thu, Aug 31, 2017 at 11:35 AM, Julian Hyde  wrote:

> As security experts, you and I know that. But Joe User maybe only checks
> one digest.
>
> (Aren’t we all Joe User sometimes?)
>
> Julian
>
> > On Aug 31, 2017, at 11:30 AM, Mike Jumper 
> wrote:
> >
> > On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
> >
> > After downloading artifacts, there are 3 things to check: (1) the
> download
> > is successful; (2) the artifacts were indeed created by the named author;
> > and (3) the artifacts have not been tampered with.
> >
> > A security expert would know to use the .md5 for (1), the .asc for (2),
> and
> > the .sha256 or .sha512 for (3).
> >
> >
> > If there is a danger that the artifacts may be tampered with, there is an
> > equivalent danger that the checksum files will be tampered with, as well.
> > Checksums alone cannot be relied upon to verify an artifact hasn't been
> > altered.
> >
> > Only the signature allows verification of authorship and integrity ...
> > assuming users have secure access to the corresponding public keys, and
> > that those keys are linked into the web of trust.
> >
> > - Mike
>
>
> -
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
>
>


Re: Digests in releases

2017-08-31 Thread Julian Hyde
As security experts, you and I know that. But Joe User maybe only checks one 
digest.

(Aren’t we all Joe User sometimes?)

Julian

> On Aug 31, 2017, at 11:30 AM, Mike Jumper  wrote:
> 
> On Aug 31, 2017 11:21, "Julian Hyde"  wrote:
> 
> After downloading artifacts, there are 3 things to check: (1) the download
> is successful; (2) the artifacts were indeed created by the named author;
> and (3) the artifacts have not been tampered with.
> 
> A security expert would know to use the .md5 for (1), the .asc for (2), and
> the .sha256 or .sha512 for (3).
> 
> 
> If there is a danger that the artifacts may be tampered with, there is an
> equivalent danger that the checksum files will be tampered with, as well.
> Checksums alone cannot be relied upon to verify an artifact hasn't been
> altered.
> 
> Only the signature allows verification of authorship and integrity ...
> assuming users have secure access to the corresponding public keys, and
> that those keys are linked into the web of trust.
> 
> - Mike


-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-31 Thread Mike Jumper
On Aug 31, 2017 11:21, "Julian Hyde"  wrote:

After downloading artifacts, there are 3 things to check: (1) the download
is successful; (2) the artifacts were indeed created by the named author;
and (3) the artifacts have not been tampered with.

A security expert would know to use the .md5 for (1), the .asc for (2), and
the .sha256 or .sha512 for (3).


If there is a danger that the artifacts may be tampered with, there is an
equivalent danger that the checksum files will be tampered with, as well.
Checksums alone cannot be relied upon to verify an artifact hasn't been
altered.

Only the signature allows verification of authorship and integrity ...
assuming users have secure access to the corresponding public keys, and
that those keys are linked into the web of trust.

- Mike


Re: Digests in releases

2017-08-31 Thread Julian Hyde
After downloading artifacts, there are 3 things to check: (1) the download is 
successful; (2) the artifacts were indeed created by the named author; and (3) 
the artifacts have not been tampered with.

A security expert would know to use the .md5 for (1), the .asc for (2), and the 
.sha256 or .sha512 for (3).

But we are not all security experts. An ordinary user might use the .md5 for 
(3), a purpose that it is not suited for.

If we switch to .sha256 / .sha512 for both (1) and (3) there is one fewer thing 
that can go wrong.

Julian


> On Aug 30, 2017, at 4:12 PM, sebb  wrote:
> 
> Surely the main purpose of the hash is to check that the download has
> been successful.
> As such, MD5 is adequate.


-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-31 Thread Henk P. Penning

On Wed, 30 Aug 2017, Julian Hyde wrote:


Date: Wed, 30 Aug 2017 14:08:42 -0700
From: Julian Hyde 
To: general@incubator.apache.org
Subject: Digests in releases

What is the correct forum for discussing release distribution policy?



MD5 is no longer deemed secure[2]. I think we should remove it from
our releases and mandate SHA256 or SHA512.


  Agree ; we should not require or recommend MD5.

  IMHO, discussions about "MD5 can be used for X but not for Y"
  are a waste of time ; they never stop en convince nobody.
  It is better to adopt something that we can agree on.

  What can we agree on ?

  -- SHA-1 : not as bad as MD5, but no longer considered secure
 by some ; https://en.wikipedia.org/wiki/SHA-1 ; skip
  -- SHA-256 : fine
  -- SHA-512 : fine

  So, I would suggest we pick SHA-256.


Julian


  Regards,

  Henk Penning

   _
Henk P. Penning, ICT-beta R Uithof HFG-406   _/ \_
Faculty of Science, Utrecht UniversityT +31 30 253 4106 / \_/ \
Budapestlaan 6, 3584CD Utrecht, NLF +31 30 253 4553 \_/ \_/
http://www.staff.science.uu.nl/~penni101/ M penn...@uu.nl \_/

-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Re: Digests in releases

2017-08-30 Thread sebb
On 30 August 2017 at 22:08, Julian Hyde  wrote:
> What is the correct forum for discussing release distribution policy?
>
> Current policy [1] states:
>
>   Every artifact distributed to the public through Apache channels MUST
>   be accompanied by one file containing an OpenPGP compatible ASCII
>   armored detached signature and another file containing an MD5 checksum.
>
>   ...
>
>   An SHA checksum SHOULD also be created.
>
>
> MD5 is no longer deemed secure[2]. I think we should remove it from
> our releases and mandate SHA256 or SHA512.

Surely the main purpose of the hash is to check that the download has
been successful.
As such, MD5 is adequate.

> Julian
>
> [1] http://www.apache.org/dev/release-distribution.html#sigs-and-sums
>
> [2] https://en.wikipedia.org/wiki/Md5sum
>
> -
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
>

-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org



Digests in releases

2017-08-30 Thread Julian Hyde
What is the correct forum for discussing release distribution policy?

Current policy [1] states:

  Every artifact distributed to the public through Apache channels MUST
  be accompanied by one file containing an OpenPGP compatible ASCII
  armored detached signature and another file containing an MD5 checksum.

  ...

  An SHA checksum SHOULD also be created.


MD5 is no longer deemed secure[2]. I think we should remove it from
our releases and mandate SHA256 or SHA512.

Julian

[1] http://www.apache.org/dev/release-distribution.html#sigs-and-sums

[2] https://en.wikipedia.org/wiki/Md5sum

-
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org