Guilhem Moulin
9 years ago
Hi there,
Your download page lists the SHA256 checksums of the tarballs to let
users verify the integrity of the downloaded file(s). To address a
different threat model and offer integrity verification of cryptographic
quality [0], please also consider signing your git tags (with âgit tag
--signâ), and/or provide detached cryptographic signatures for the
future release tarballs.
As far as Debian is concerned a detached OpenPGP signature would be
preferable since our packaging tools can automatically download tarballs
and cryptographically verify their integrity in one go. Assuming you
have an OpenPGP key [1], an ASCII armored (.asc) detached signature can
be generated with
gpg --armor --detach-sign /path/to/roundcubemail-x.y.z.tar.gz
Completely unrelated, please note that the â1.1.3 â Dependentâ tarball
includes moxieplayer.swf, while the last mention of moxieplayer in your
changelog says âTinyMCE security issue: removed moxieplayer (embedding
flv and mp4 is not supported anymore)â. Was it re-added by mistake?
(Anyway that file is violates the DFSG and will be removed from the
upcoming 1.1.3 Debian packages.)
Thanks!
Cheers,
--
Guilhem.
[0] Fair enough, your checksums are delivered over HTTPS. But an
attacker breaking into your web server could fool us all. On the
other hand cryptographic signatures raise the bar by far (assuming
they are generated on the devs' platform). Furthermore OpenPGP is
independent (and orthogonal) to the X.509 PKI in general, and to the
CA cartel in particular, hence address a different threat model.
[1] Otherwise there are numerous tutorials available online. The Debian
project has its own on http://keyring.debian.org/creating-key.html .
Your download page lists the SHA256 checksums of the tarballs to let
users verify the integrity of the downloaded file(s). To address a
different threat model and offer integrity verification of cryptographic
quality [0], please also consider signing your git tags (with âgit tag
--signâ), and/or provide detached cryptographic signatures for the
future release tarballs.
As far as Debian is concerned a detached OpenPGP signature would be
preferable since our packaging tools can automatically download tarballs
and cryptographically verify their integrity in one go. Assuming you
have an OpenPGP key [1], an ASCII armored (.asc) detached signature can
be generated with
gpg --armor --detach-sign /path/to/roundcubemail-x.y.z.tar.gz
Completely unrelated, please note that the â1.1.3 â Dependentâ tarball
includes moxieplayer.swf, while the last mention of moxieplayer in your
changelog says âTinyMCE security issue: removed moxieplayer (embedding
flv and mp4 is not supported anymore)â. Was it re-added by mistake?
(Anyway that file is violates the DFSG and will be removed from the
upcoming 1.1.3 Debian packages.)
Thanks!
Cheers,
--
Guilhem.
[0] Fair enough, your checksums are delivered over HTTPS. But an
attacker breaking into your web server could fool us all. On the
other hand cryptographic signatures raise the bar by far (assuming
they are generated on the devs' platform). Furthermore OpenPGP is
independent (and orthogonal) to the X.509 PKI in general, and to the
CA cartel in particular, hence address a different threat model.
[1] Otherwise there are numerous tutorials available online. The Debian
project has its own on http://keyring.debian.org/creating-key.html .