On Jul 30, 2013, at 3:56 AM, holger krekel <hol...@merlinux.eu> wrote:

>> Yes. I've been using sha256 on simple.crate.io for over a year and
>> zero people have ever stated it didn't work for them. This also fits
>> in with my knowledge of how setuptools and pip works. I know
>> zc.buildout less well but to my knowledge they simple allow setuptools
>> to handle the downloading.
> 
> Sounds good.  Maybe "secondary" tools could get problems, though.
> I know for sure that devpi-server might stumble but i can fix that.
> Also i remember there were tools that memorized MD5 hashes in requirements
> files etc.

The change was nixed but it wasn't about removing the ability for pip and
such to use MD5s. Merely what PyPI serves.

>> Registered externals must register with a md5 hash, scraped links and
>> download urls etc do not require it because they are indirectly added.
>> There is no verification by PyPI that the given hash matches the
>> package at the end of the url.
> 
> Hum, can we allow submitting multiple hashes?  Are there tools already 
> that help with registering externals?

Not easily and in a backwards compatible way.

>> MD5 is currently broken for collision resistance. This means that an
>> author can generate two packages that hash to the same thing. Once
>> package might be benign and one might be malicious. Given those two
>> packages people using the md5 hashes will not be able to differentiate
>> between the benign and the malicous package.
> 
> I think we should not pretend that PyPI has (by itself) any safety belts 
> against malicious authors.  There are numerous ways for malicious authors
> to do evil if they choose to.  The potential ability to fake a package
> using a collision attack merely adds another way.

Correct, which is why I tried to be very specific about the types of attacks :)

> 
> Do you know, btw, if TUF is going to help with any of what we are discussing
> here? (I am again a bit lost as to the roadmap wrt to TUF - is there
> something?)

TUF would provide protections against a pre-image attack yes. However it has
it's own problems and is still likely a ways out (if we use it).

-----------------
Donald Stufft
PGP: 0x6E3CBCE93372DCFA // 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Distutils-SIG maillist  -  Distutils-SIG@python.org
http://mail.python.org/mailman/listinfo/distutils-sig

Reply via email to