1 |
On Sun, 2021-07-25 at 01:12 +0200, Thomas Deutschmann wrote: |
2 |
> Hi, |
3 |
> |
4 |
> I don't understand. Isn't it the same motion we put down just 2 months |
5 |
> ago [1]? Or is this something new? |
6 |
> |
7 |
> If this isn't something new, what has changed since May [2]? |
8 |
|
9 |
Apparently it has not been 'put down' because it came back via open |
10 |
bugs. |
11 |
|
12 |
> To remember: Currently we have two different hashes for every distfile. |
13 |
> If we are going to throw this data away, we should really have good |
14 |
> reasons to do that. Like said during that council meeting, BLAKE2B and |
15 |
> SHA512 are competing hashes. What's wrong with having a backup plan even |
16 |
> for a very unlikely scenario, that BLAKE2B will get broken? |
17 |
|
18 |
Define 'broken'. |
19 |
|
20 |
> It's not like SHA512 is requiring any additional deps which are |
21 |
> unmaintained or something like that. SHA has even hardware acceleration |
22 |
> support in modern systems. |
23 |
|
24 |
...which is entirely irrelevant given that both hashes need to be |
25 |
calculated. (SHA512 + BLAKE2B) can be as fast as the slower of two |
26 |
in the best scenario. |
27 |
|
28 |
> In addition it is even more likely that you will find SHA checksum files |
29 |
> with upstream release tarballs than BLAKE2B files. |
30 |
|
31 |
Again, I don't see how that's even remotely relevant. |
32 |
|
33 |
> Remember that verify-sig.eclass I criticized last year? Of course some |
34 |
> scenarios I outlined were very unlikely and I never expected that I can |
35 |
> run around in near future saying "I told you". But in January 2021, |
36 |
> CVE-2021-3345 happened in libgcrypt... |
37 |
|
38 |
I don't see how this is relevant either. Are you admitting that you're |
39 |
criticizing all my ideas because I just happen to propose them? |
40 |
|
41 |
|
42 |
-- |
43 |
Best regards, |
44 |
Michał Górny |