*** This bug is a duplicate of bug 33438 ***
    https://bugs.launchpad.net/bugs/33438

My understanding from the sysadmin team in the past is that serving
cdimage over HTTPS would add an unacceptable amount of load to an
already stretched set of machines.  That goes double for
releases.ubuntu.com, especially around release time when it is slammed.

The reason we still advertise MD5 in many places is that md5sum binaries
are often easier to lay your hands on if you're using a non-Unix
platform, as many people coming to cdimage naturally are; and, while it
may not defend against a determined second-preimage attack these days,
it still provides perfectly adequate assurance against unintentional
corruption in transit.  For the latter use case, the shorter hash is
much easier to check by eye.

For people who care about security against determined attackers, HTTPS
might well be inadequate anyway, unless you're one of the even fewer
people who carefully audits the set of CA certificates they choose to
trust.  Better security than that is already provided by the GPG
signatures on the SHA256SUMS file (see SHA256SUMS.gpg).  The public half
of the key used for those signatures is widely-distributed (e.g. in
/usr/share/keyrings/ubuntu-archive-keyring.gpg in the ubuntu-keyring
package, key ID FBB75451, so you can bootstrap off an already-trusted
Ubuntu system if one's available), and is well-connected to the global
web of trust by virtue of being signed by my key as creator and
operator.

I would recommend considering UbuntuHashes as merely a way to check for
transport layer corruption, and instead relying on the GPG signatures if
you require real security.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/789688

Title:
  UbuntuHashes doesn't contains SHA256

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to