RPM Community Forums

Mailing List Message of <popt-devel>

File integrity of popt

From: Luke <g4jc@openmailbox.org>
Date: Sat 05 Nov 2016 - 23:31:11 CET
Message-ID: <6af1261c-7dad-f392-9bdf-ccb8471a98fd@openmailbox.org>
Hello,
I am contacting you as a package maintainer of Parabola GNU/Linux-libre,
a fully free operating system in compliance with the Free Software
Foundation's GNU FSDG. We also have a focus on privacy and security.

We attempt to ensure that all of our packages and upstream are secure.
As such I discovered a problem with your package "popt", and .

There is currently no hash check or GPG signature to verify that the
latest source is actually the one you have created.
This is particularly important since there have been recent attacks
which replaced files on upstream servers. Take for example the Linux
Mint hack earlier this year.
(https://micahflee.com/2016/02/backdoored-linux-mint-and-the-perils-of-checksums/)

I would like to request that you please upload a SHA512 checksum of your
popt tar.gz files, as well as sign the SHA512 with a GPG signature.

Technical documentation on how to do this:
http://docs.oracle.com/cd/E36784_01/html/E36870/sha512sum-1.html
sha512sum * > SHA512SUMS

https://help.ubuntu.com/community/GnuPrivacyGuardHowto
https://access.redhat.com/solutions/1541303
gpg --clearsign -o SHA512SUMS.sign SHA512SUMS


The resulting files, SHA512SUMS and SHA512SUMS.sign, can then be
uploaded to your site (or on another site/server for added security), so
that package maintainers can verify that the source is accurate and
unhacked by a third-party prior to packaging.

Thank you for your time and concern.


Sincerely,
Luke
Parabola GNU/Linux-libre Packager






Received on Sat Nov 5 23:51:19 2016
Driven by Jeff Johnson and the RPM project team.
Hosted by OpenPKG and Ralf S. Engelschall.
Powered by FreeBSD and OpenPKG.