[Twisted-Python] Release questions

Tristan Seligmann mithrandi at mithrandi.net
Thu Apr 4 14:15:41 EDT 2013


On Thu, Apr 4, 2013 at 12:04 AM, Glyph <glyph at twistedmatrix.com> wrote:

> Security-wise, signing an actually-secure hash is not that much different
> than signing the tarballs themselves.  Signing MD5 hashes, on the other
> hand, is useless as a security measure.
>
> I think we should carry on with signing the list of signatures for now,
> and just upgrade the hash algorithm.  Baby steps.  Perhaps there are some
> theoretical benefits that come from signing the whole binary blob, but
> that's a much bigger change for a much smaller benefit.
>

In fact, I believe there is no such thing as "signing the whole binary
blob". When you use something like gpg --sign, what is actually signed with
a public key signature algorithm is a hash of the content anyway. Thus,
assuming you use the same hash algorithm as you would have instructed gpg
to use (I think the default is SHA512 these days), there isn't any real
difference between signing the content directly, and signing a hash of the
content.
-- 
mithrandi, i Ainil en-Balandor, a faer Ambar
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://twistedmatrix.com/pipermail/twisted-python/attachments/20130404/e8475efc/attachment.htm 


More information about the Twisted-Python mailing list