TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Unsigned Software Downloads

6 点作者 _wldu超过 2 年前
Why do some large, reputable open source projects not provide digital signatures for software downloads? I thought everyone did this now, but neither Golang or Postgres sign downloads they publish. Why not?<p>https:&#x2F;&#x2F;go.dev&#x2F;dl&#x2F;<p>https:&#x2F;&#x2F;www.postgresql.org&#x2F;ftp&#x2F;source&#x2F;v15.0&#x2F;<p>As counter examples, both the Linux kernel and rust sign downloads they publish:<p>https:&#x2F;&#x2F;kernel.org&#x2F;<p>https:&#x2F;&#x2F;forge.rust-lang.org&#x2F;infra&#x2F;other-installation-methods.html#source-code<p>What is the reason that Google and Postgres have for not signing software downloads? MD5 and SHA256 checksums do not verify the authenticity of the downloaded software.

4 条评论

NickRandom超过 2 年前
How would that solve anything? If an adversary has the ability to push an update then it is game over regardless on if it is signed or unsigned because most don’t check existing keys prior to updating.<p>Once an adversary has gotten so deep in to your infrastructure that they can push an update the signing keys are mostly irrelevant since chances are they have those already.<p>If you are asking if each individual contributor should sign&#x2F;publish their signatures for each update then yes, perhaps. But then which takes precedence - The org or the contributor? Which should&#x2F;would you trust more and why? And can that prior trust be worth anything if&#x2F;when either the org or the contributor goes rogue, is compromised, decides to push an obnoxious update or is rubber-hosed in to compliance?<p>F.W.I.W. the approach I take is to let others be the Alpha&#x2F;Beta testers for any update and check out the various channels for abnormal reports. For High Severity issues I take a look at the mitigations sections and adopt those in a &#x27;wait and see&#x27; approach.<p>I can imagine edge cases for both which leads to my conclusion that doing so is meritless unless you are considering nation state actors pushing an update but that then leads to the edge case of which update do you trust? And why do you trust that as the ground truth of good&#x2F;not good?
beauHD超过 2 年前
&gt; SHA256 checksums do not verify the authenticity of the downloaded software<p>Well after googling for various SHA256 sums, and seeing many results that <i>other</i> people have got, it is at least some peace of mind. Then you know you aren&#x27;t targeted specifically. There are &#x27;known good&#x27; hashes of things like Windows ISOs for example, so you can install a clean &#x27;untouched&#x27; Windows that isn&#x27;t trojanized or laden with malware.<p>I am aware that simply seeing 100s of the same sum on various sites doesn&#x27;t mean the executable is &#x27;clean&#x27;, it just means you weren&#x27;t MITM&#x27;d specifically and targeted with malware that is baked into the executable&#x2F;ISO&#x2F;installer&#x2F;whatever.
评论 #33494047 未加载
Am4TIfIsER0ppos超过 2 年前
All those links are HTTPS so you are getting a signed download. Or are you alleging that someone is MITMing your connection to the originating server?
cpach超过 2 年前
Interesting question.<p>Some things to consider:<p>Linux and Rust and Rust use GnuPG to sign their releases. IMHO, Minisign would be better, but okey.<p>Both projects are very large. I wonder how they handle key distribution for the key pair that signs the release. Is the private key online or offline? How do they prevent the private key from leaking?