On 2009-09-03, Bram Neijt <bne...@gmail.com> wrote:

> You are correct that you won't benefit from publishing metalinks, but
> your users might.

Which would benefit Ant ...  But I'm not convinced 8-)

> One of the failures a redirect/GeoIP based approach can't solve for
> the user is possible firewall problems. The user may be behind a
> firewall which restricts to HTTP connetions, not knowing that for sure
> he/she would have to try the GeoIP suggestion.

If you look at the actual download page it will list HTTP mirrors first
(since ftp mirrors are so 20th century anyway, I guess).  Most users
will have stopped before reaching the ftp mirrors.

> Another benefit is that the download client can also verify the
> download afterwards,

This depends on my level of paranoia.  Do I want to trust md5 or sha1
hashes at all?  Does the client speak OpenPGP for a stronger checksum
algorithm (unless the signer is in my web of trust, the signature isn't
more than that)?

> without the user having to run any extra commands after the download
> finished.

Do I tust the download client? ;-;

> About the digest information coming from a reliable central source, you
> are already doing that with your download page by pointing only to the
> central MD4/SHA1/signature files. I've rewritten the page to keep other
> people from getting confused about that :)

Thanks.

I think in the ASF's case dynmirror doesn't really help.  The list of
mirrors is dynamic and mirrors come and go (e.g. they may get removed if
they don't sync fast enough) and we like to keep it that way.  The
specific ASF projects (like Ant) aren't even aware of the process.

If I understand dynmirror correctly it would accept any download URL as
a mirror if it can provide matching filenames and MD5 checksums, is that
correct?  This would allow mirrors to add themselves that are not
"approved" (they may want to show ads we don't like for example).

If my understanding is correct it would also allow me to create a trojan
distribution of some software if I manage to create MD5 checksums that
match the original distribution - given that creating hash collisions in
MD5 isn't that difficult for a well-funded bad-guy, this is something
I'd be concerned about.  Given its adoption Apache httpd looks like a
very attractive target for inserting a backdoor, so the well-funded
bad-guy isn't that far-fetched IMHO.

Let's say I hope my understanding is wrong.

Stefan

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@ant.apache.org
For additional commands, e-mail: dev-h...@ant.apache.org

Reply via email to