Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add checksums on easymock.org and GitHub #221

Open
einsteinsfool opened this issue Jul 19, 2018 · 0 comments
Open

Add checksums on easymock.org and GitHub #221

einsteinsfool opened this issue Jul 19, 2018 · 0 comments

Comments

@einsteinsfool
Copy link

Currently there's no way of checking if an official file was downloaded or a malicious one. Checksums help with that. Since the files are on 3rd party server (bintray.com), it would make sense to provide the checksums on easymock.org in plaintext. This way even if bintray.com is compromised, users who verify the files would know not to use them and to report that.

Adding the same checksums to GitHub as well would enhance the security even more. Then, if either GitHub, easymock's GitHub account or easymock.org is compromised, people would still be able to realize that. So people who download files from GitHub would check the checksum from easymock.org and the other way. I'd put the checksums in plaintext (instead of files) in each release description for easy copy.

As for which checksums should be used, I'd recommend both SHA256 and SHA512. For MD5, it's theoretically possible to do a preimage attack, so it's not the best idea to use it. For SHA1, Google were able to create 2 different files that give the same SHA1. SHA256 might be provided in plaintext and SHA512 displayed after clicking a link (as it's longer and might break the page).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant