Now that 5.5 is officially released, a few notes about our signing
policy. I helped devise the policy, but there are a few operational
details regarding the who and the what and where I don't know (because
I don't need to know). I'll do my best to answer questions, but if this
email doesn't already answer them, you may be out of luck. :)

What should be signed and what shouldn't? In short, we will sign
"artifacts" but not general communications. Artifacts is my word for
anything that we put up on the ftp sites. Releases, packages,
installer ISOs, patches, etc. (We're currently transitioning from ftp
to http servers, which is likely to blur the lines a bit, but the
web site stuff hosted on www.openbsd.org is not an artifact.)

If something looks like an artifact, you should expect it to be
signed. Note packages (including firmware) carry signatures internally
and are automatically verified by pkg_add. Other files are
automatically verified by the installer, so the three files you will
need to verify by hand are 1) the installer itself, using SHA256.sig
2) any src.tar.gz files you download, using SHA256.sig and 3) any errata
patches, which contain signature lines in the header.

(One exception at this time: snapshots/ports.tar.gz isn't signed.)

Emails will not be signed. As you may have noticed, the recent
announcement email to misc@ had some lines stripped out of it (compare
with the version that arrived via tech@). Email isn't a good channel
for byte precise data transmission, which would lead to spurious
signature verification failures. We'd like to avoid that.

If, for some reason it is necessary to send out an announcement and
prove it's authentic, we'll upload it to the appropriate place and email
a link. As a particular example, we're emailing out errata patches. It
is still best if you download the patch from the ftp server and verify
it.

Of course, this applies to 5.5 and forward. 5.4 patches won't be signed.

Reply via email to