On 13/01/2022 01:35, Christopher Schultz wrote:
All,

Having just done the release build for Tomcat 8.5, I was checking to ensure that the various digital signatures were done properly on the .exe files we produce as a part of that build.

I happened to check tomcat8.exe and it's got a sha1 signature instead of a sha512 signature like the other .exe files we sign.

Is that intentional?

Sort of.

Up until early 2021 the ASF used a code signing server originally written by Symantec that was subsequently sold to DigiCert. That service was limited to using SHA-1 for Windows signing.

In late 2020 the ASF started to migrate to a new code signing service written by DigiCert. This allowed use of better hashes for Windows signing. Tomcat was the first project to migrate in January 2021. We first switched to SHA-256 and moved to SHA-512 a few days later.

The Commons Daemon release happened while Tomcat was migrating and before Commons was set up in the new tool.

Those files appear to come from the commons-daemon project, and aren't signed as a part of the release process. The signature on tomcat8.exe for example (which is really prunsrc.exe) is ‎Monday, ‎January ‎18, ‎2021 7:49:06 AM.

Should we ask the commons-daemon project to roll a new release with modern signatures on their .exe files? Or should we authenticate the existing signature and replace it with a new sha512 one? Or should we just ignore the discrepancy?

That would be me that would do that.

There are a few open issues but they are generally of the "it crashes" nature with little detail on how to reproduce. The change log has a few minor fixes and improvements. Given it is a year since the last release I'll look at getting a 1.2.5 release out. We can pick that up once available.

Mark

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to