Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tools: release signing improvements #9071

Closed
wants to merge 2 commits into from
Closed

Conversation

rvagg
Copy link
Member

@rvagg rvagg commented Oct 13, 2016

Fixes confusion around the Hash: SHA-1 that comes with releases in the SHASUMS256.txt.asc, e.g. nodejs/nodejs.org#956 (this has come up multiple times!). Newer versions of gpg I think default to SHA-512 and we now have a mix of SHA-1 and SHA-512 in our releases (195 SHA-1 and 63 SHA-512)! By setting it to 256 we make it the same as the hash we use for the binaries themselves, so even though these are two separate hashes we don't have the confusion when someone misinterprets what it means.

The second commit in here finally fixes #6821 by adding a detached signature file along with releases. So we'll have SHASUMS256.txt (bare), SHASUMS256.txt.asc (with clear text hash included) and SHASUMS256.txt.sig (binary, signature only) in our releases. So our recommendation for verifying releases will be to download both the .txt and the .sig and doing gpg --verify SHASUMS256.txt.sig SHASUMS256.txt. This commit doesn't update the README.md with the new instructions yet, I figure that can be done later once we actually have some .sig files out there.

Currently I don't imagine we want to remove the .asc files from releases, that'd probably cause more chaos than we need right now.

I'll test this with the v6 LTS release next week to confirm all is good if I can get some 👍's to do so.

@nodejs-github-bot nodejs-github-bot added the tools Issues and PRs related to the tools directory. label Oct 13, 2016
Copy link
Contributor

@MylesBorins MylesBorins left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@jasnell
Copy link
Member

jasnell commented Oct 13, 2016

LGTM

rvagg added a commit that referenced this pull request Oct 18, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
@rvagg rvagg force-pushed the master branch 2 times, most recently from c133999 to 83c7a88 Compare October 18, 2016 17:02
jasnell pushed a commit that referenced this pull request Oct 18, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
@rvagg
Copy link
Member Author

rvagg commented Oct 19, 2016

landed in df163c7 and used for latest releases, they all have detached signatures now!

@rvagg rvagg closed this Oct 19, 2016
@rvagg rvagg deleted the release-signing branch October 19, 2016 03:05
rvagg added a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
rvagg added a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
rvagg added a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
rvagg added a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
jasnell pushed a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
jasnell pushed a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
MylesBorins pushed a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
MylesBorins pushed a commit that referenced this pull request Oct 19, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
@MylesBorins MylesBorins mentioned this pull request Oct 19, 2016
MylesBorins pushed a commit that referenced this pull request Oct 26, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
MylesBorins pushed a commit that referenced this pull request Oct 26, 2016
PR-URL: #9071
Reviewed-By: James M Snell <[email protected]>
Reviewed-By: Myles Borins <[email protected]>
@MylesBorins MylesBorins mentioned this pull request Oct 26, 2016
maclover7 added a commit to maclover7/node that referenced this pull request Sep 12, 2017
It is more secure to verify SHASUMS256.txt files via SHASUMS256.txt.sig
than SHASUMS256.txt.asc.

[This comment](nodejs#6821 (comment)) does the best job at explaining the issue.

Refs: nodejs#6821, nodejs#9071
rvagg pushed a commit that referenced this pull request Sep 13, 2017
It is more secure to verify SHASUMS256.txt files via SHASUMS256.txt.sig
than SHASUMS256.txt.asc.

This comment does the best job at explaining the issue:
  #6821 (comment)

Refer: #6821
Refer: #9071
PR-URL: #15107
Reviewed-By: Rod Vagg <[email protected]>
Reviewed-By: Ruben Bridgewater <[email protected]>
Reviewed-By: James Snell <[email protected]>
Reviewed-By: Luigi Pinca <[email protected]>
jasnell pushed a commit that referenced this pull request Sep 20, 2017
It is more secure to verify SHASUMS256.txt files via SHASUMS256.txt.sig
than SHASUMS256.txt.asc.

This comment does the best job at explaining the issue:
  #6821 (comment)

Refer: #6821
Refer: #9071
PR-URL: #15107
Reviewed-By: Rod Vagg <[email protected]>
Reviewed-By: Ruben Bridgewater <[email protected]>
Reviewed-By: James Snell <[email protected]>
Reviewed-By: Luigi Pinca <[email protected]>
MylesBorins pushed a commit that referenced this pull request Oct 17, 2017
It is more secure to verify SHASUMS256.txt files via SHASUMS256.txt.sig
than SHASUMS256.txt.asc.

This comment does the best job at explaining the issue:
  #6821 (comment)

Refer: #6821
Refer: #9071
PR-URL: #15107
Reviewed-By: Rod Vagg <[email protected]>
Reviewed-By: Ruben Bridgewater <[email protected]>
Reviewed-By: James Snell <[email protected]>
Reviewed-By: Luigi Pinca <[email protected]>
MylesBorins pushed a commit that referenced this pull request Oct 25, 2017
It is more secure to verify SHASUMS256.txt files via SHASUMS256.txt.sig
than SHASUMS256.txt.asc.

This comment does the best job at explaining the issue:
  #6821 (comment)

Refer: #6821
Refer: #9071
PR-URL: #15107
Reviewed-By: Rod Vagg <[email protected]>
Reviewed-By: Ruben Bridgewater <[email protected]>
Reviewed-By: James Snell <[email protected]>
Reviewed-By: Luigi Pinca <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
tools Issues and PRs related to the tools directory.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update Readme section on verifying signatures
4 participants