* Jonas Smedegaard <jo...@jones.dk> [2023-08-10 12:32]:
Example: An organisation has examines licensing of Chromium as installed
ontheir Android and Linux systems, expressed as SPDX datasets with SHA1
checksums for upstream tarballs.  They need to do a full analysis for
each upstream release, but would prefer to only need a partial analysis
for each Debian repackaging if possible.  If Debian included a SHA1
which matched a SHA1 in their SPDX dataset then they benefit.  If SHA1
for one reason or another don't match then it not a sign if insecurity,
only a more expensive process for them because they then need to analyze
that repackaged tarball as unique instead of as a derivation of
something known to them.

I agree that you describe a valid use-case and a good reason why
Debian maintainers should not repack source archives arbitrarily,
but it does not refute my point. A cryptographic hash is not a
signature, it merely represents a particular binary blob (such as a
source archive) and makes no claim about the authorship of that
blob. In fact, you can even compute it yourself if upstream refuses
to do so, and your described use-case would still work: You don't
need to know about authorship, you only need to know if some tarball
has content you have already seen and examined before.


Cheers
Timo



--
⢀⣴⠾⠻⢶⣦⠀   ╭────────────────────────────────────────────────────╮
⣾⠁⢠⠒⠀⣿⡁   │ Timo Röhling                                       │
⢿⡄⠘⠷⠚⠋⠀   │ 9B03 EBB9 8300 DF97 C2B1  23BF CC8C 6BDD 1403 F4CA │
⠈⠳⣄⠀⠀⠀⠀   ╰────────────────────────────────────────────────────╯

Attachment: signature.asc
Description: PGP signature

Reply via email to