Re: Release file changes

2011-02-24 Thread Luca Niccoli
On 21 February 2011 15:39, Joey Hess jo...@debian.org wrote: Joerg Jaspert wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. cowbuilder --create

Re: Release file changes

2011-02-24 Thread Luca Niccoli
On 24 February 2011 11:29, Luca Niccoli lultimou...@gmail.com wrote: Did Packages.diff/Index use to contain an MD5sum? (it doesn't as of now) Or is this some unrelated breakage? Mmm, if worked using ftp.debian.org, so it was a mirror problem I guess. Aptitude and apt didn't have any problems

Re: Release file changes

2011-02-23 Thread Bernd Zeimetz
On 02/22/2011 07:37 PM, Joerg Jaspert wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. Right. For now I undo this (with next dinstall run), until

Re: Release file changes

2011-02-23 Thread Holger Levsen
Hi, On Dienstag, 22. Februar 2011, Joerg Jaspert wrote: - lenny is gone and the tools are fixed in squeeze with a point update (provided the SRMs approve such updates, but I *hope* so). Do I understand correctly that you again plan to break squeeze, this time for those who then havent

Re: Release file changes

2011-02-23 Thread Philipp Kern
On 2011-02-23, Holger Levsen hol...@layer-acht.org wrote: - wheezy is released. (This is the option I dont really favor, takes ages :) ) I actually prefer this very much over more random breakage in which is supposed to be stable. 2 years aint that long. Seconded. If it would've been

Re: Release file changes

2011-02-22 Thread Holger Levsen
Hi, On Montag, 21. Februar 2011, Joerg Jaspert wrote: Yep. debmirror, reprepro, debootstrap and cdebootstrap seem to be the tools that can't deal with this. fai-mirror came to my mind. And probably older dak setups as well? The latter two are serious enough to keep the change away from

Re: Release file changes

2011-02-22 Thread Joerg Jaspert
until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. Right. For now I undo this (with next dinstall run), until either one of the following happens: - lenny

Re: Release file changes

2011-02-22 Thread Russ Allbery
Joerg Jaspert jo...@debian.org writes: Right. For now I undo this (with next dinstall run), until either one of the following happens: - lenny is gone and the tools are fixed in squeeze with a point update (provided the SRMs approve such updates, but I *hope* so). Until today we

Re: Release file changes

2011-02-22 Thread Joey Hess
Russ Allbery wrote: Joerg Jaspert jo...@debian.org writes: Right. For now I undo this (with next dinstall run), until either one of the following happens: - lenny is gone and the tools are fixed in squeeze with a point update (provided the SRMs approve such updates, but I *hope*

Re: Release file changes

2011-02-22 Thread Henrique de Moraes Holschuh
On Tue, 22 Feb 2011, Joey Hess wrote: Russ Allbery wrote: Joerg Jaspert jo...@debian.org writes: Right. For now I undo this (with next dinstall run), until either one of the following happens: - lenny is gone and the tools are fixed in squeeze with a point update (provided

Re: Release file changes

2011-02-21 Thread Joey Hess
Joerg Jaspert wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files for stable? Next point release? Because that

Re: Release file changes

2011-02-21 Thread brian m. carlson
On Sun, Feb 20, 2011 at 07:03:11PM +0100, Joerg Jaspert wrote: I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Unfortunately, the algorithm used for the GnuPG

Re: Release file changes

2011-02-21 Thread Philipp Kern
On 2011-02-21, Joey Hess jo...@debian.org wrote: Joerg Jaspert wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files

Re: Release file changes

2011-02-21 Thread Florian Weimer
* Joerg Jaspert: I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Please don't. I have more faith in SHA-256 than SHA-512. -- To UNSUBSCRIBE, email to

Re: Release file changes

2011-02-21 Thread Michael Gilbert
On Mon, 21 Feb 2011 18:55:13 +0100, Florian Weimer wrote: * Joerg Jaspert: I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Please don't. I have more

Re: Release file changes

2011-02-21 Thread The Fungi
On Mon, Feb 21, 2011 at 01:05:02PM -0500, Michael Gilbert wrote: What indications are there that SHA-512 is weak? It might be worth approaching from a pragmatic perspective... why generate SHA-512 checksums when you're only going to be signing a SHA-256 digest of that list (that is unless you

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files for stable? Next point release? Because that unfortunatly completly

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
On 12398 March 1977, Joey Hess wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files for stable? Next point release?

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Unfortunately, the algorithm used for the GnuPG signatures (both in InRelease and Release.gpg) is SHA-1.

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Please don't. I have more faith in SHA-256 than SHA-512. Uhh, fine - why? -- bye, Joerg Well, it's 1 a.m.

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
It might be worth approaching from a pragmatic perspective... why generate SHA-512 checksums when you're only going to be signing a SHA-256 digest of that list (that is unless you want to alienate users of OpenPGP-compliant tools which don't implement optional algorithms). Is it because you

Re: Release file changes

2011-02-21 Thread Philipp Kern
On 2011-02-21, Joerg Jaspert jo...@debian.org wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files for stable? Next

Re: Release file changes

2011-02-21 Thread Adam D. Barratt
On Mon, 2011-02-21 at 20:58 +0100, Joerg Jaspert wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files for stable?

Re: Release file changes

2011-02-21 Thread Florian Weimer
* Joerg Jaspert: I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Please don't. I have more faith in SHA-256 than SHA-512. Uhh, fine - why? I think this

Re: Release file changes

2011-02-21 Thread The Fungi
On Mon, Feb 21, 2011 at 09:13:51PM +0100, Joerg Jaspert wrote: Care to make a point for the gpg stuff around it within bug #612657? Gladly! Restating and Cc'ing... While I agree that moving away from SHA-1 is necessary, SHA-512 is not part of the compatibility set according to the gpg(1)

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect Release files for stable? Next point release? Because that unfortunatly

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
I additionally opened a bug with apt to add support for SHA512SUM, so we can start using them. As soon as that is possible I intend to drop SHA256 and end up with SHA1/SHA512 only. Please don't. I have more faith in SHA-256 than SHA-512. Uhh, fine - why? I think this question is a bit rude

Re: Release file changes

2011-02-21 Thread Joey Hess
Joerg Jaspert wrote: Yep. debmirror, reprepro, debootstrap and cdebootstrap seem to be the tools that can't deal with this. The latter two are serious enough to keep the change away from oldstable forever, and stable at least until after next point release, should they get updated there. It's

Re: Release file changes

2011-02-21 Thread Sune Vuorela
On 2011-02-21, Joey Hess jo...@debian.org wrote: --qMm9M+Fa2AknHoGS Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Joerg Jaspert wrote: Yep. debmirror, reprepro, debootstrap and cdebootstrap seem to be the tools that

Re: Release file changes

2011-02-21 Thread Eduard Bloch
#include hallo.h * Joey Hess [Mon, Feb 21 2011, 05:32:00PM]: Joerg Jaspert wrote: Yep. debmirror, reprepro, debootstrap and cdebootstrap seem to be the tools that can't deal with this. The latter two are serious enough to keep the change away from oldstable forever, and stable at least

Re: Release file changes

2011-02-21 Thread Bernd Zeimetz
On 02/21/2011 09:05 PM, Joerg Jaspert wrote: On 12398 March 1977, Joey Hess wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that affect

Re: Release file changes

2011-02-21 Thread Joerg Jaspert
Also, it seems like the Releases file is already including sha1 and sha256 for all the d-i files. Nope. Those Release files in debian-installer subdir are just stubs and don't contain checksum information. And there was nothing for installer-$ARCH subdirs and the image files therein. Instead,

Re: Release file changes

2011-02-21 Thread Michael Gilbert
On Mon, Feb 21, 2011 at 3:05 PM, Joerg Jaspert wrote: On 12398 March 1977, Joey Hess wrote: until today our Release files included 3 Hashes for all their entries: MD5SUM, SHA1, SHA256. I just modified the code to no longer include MD5SUM in *all* newly generated Release files. When will that