On 24 August 2012 11:51, Rory O'Farrell <ofarr...@iol.ie> wrote:
> On Fri, 24 Aug 2012 11:31:05 +0100
> sebb <seb...@gmail.com> wrote:
>
>> On 24 August 2012 09:20, Rory O'Farrell <ofarr...@iol.ie> wrote:
>> > On Thu, 23 Aug 2012 18:01:42 -0400
>> > "Maurice Howe" <maur...@stny.rr.com> wrote:
>> >
>> >> Got a warning msg that your product was unsafe, so I deleted the download.
>> >> Here's the msg.
>> > <snip>
>> >
>> > I have this morning scanned my Windows XP computer on which is installed 
>> > yesterday's release of AOO 3.4.1 using AVG Free edition 2012.0.2197 (this 
>> > morning's update) at the most detailed settings and it has received a 
>> > clean bill of health.
>> >
>> > The question that might arise in connection with the original post is that 
>> > of the filename/download site; if it is from a legitimate (i.e. Apache 
>> > controlled site) there should be no worries.
>> >
>> > It was in the past not unusual for new releases of OOo to give false 
>> > positives on many virus scanners - the hooks for online updating 
>> > registered sometimes as poentialy unwanted programs/possible trojans.
>> >
>> > As another poster (Dan?) pointed out, it is possible to check the Md5Sums 
>> > of the downloaded file against the MD5Sum list on the Apache site, to be 
>> > certain that it is exactly the file prepared and released by Apache.  If 
>> > these sums check out then all should be well.
>>
>> AIUI that's not possible to be *certain* that the file is identical [1].
>> Hashes are fine for checking that a download has not been
>> corrupted/truncated in transit, because the chance of a hash collision
>> in such a case is vanishingly small.
>>
>> But they are not generally considered sufficiently robust to *prove*
>> that the download is what it appears to be.
>> It is theoretically possible to create two different downloads with
>> the same hash.
>>
>> Obviously if the hash check fails, then there is a problem, but a
>> successful check does not provide 100% proof.
>>
>> Checking the detached signature for the download is much more secure,
>> but is of course a bit harder to do.
>>
>> [1] http://www.apache.org/dev/release-signing#secure-hash-algorithms
>>
>> > --
>> > Rory O'Farrell <ofarr...@iol.ie>
>>
>
> I'm not doubting your remarks above about the possibility of duplicate 
> hashes, but for most purposes the hash check is probably sufficient.

Yes.

> In any event, the timescale involved of some few hours after release would 
> make the possibility of a rogue hash matching file quite remote (I hope!).

Actually there will be at least 3-4 days when the files and hashes are
available during release votes.
But more likely the rogue file would be published later when it would
still catch some downloads.

>
> --
> Rory O'Farrell <ofarr...@iol.ie>

Reply via email to