[slf4j-user] Signatures for verifying Slf4j
Ceki Gülcü
ceki at qos.ch
Wed May 12 11:14:15 CEST 2010
Hello Elisha,
I can't immediately add signatures to our jars. However, please enter
a bug report and I'll look into it.
On 12/05/2010 10:03 AM, Elisha Ebenezer wrote:
> Hi Ceki,
> Can you please provide us an update on when can we expect the
> slf4j (and logback) shipped as signed jars. And also, please consider
> publishing md5/sha1 checksums on your site.
> This would help us to push for using slf4j in security-conscious
> organizations.
> Thanks,
> Elisha Ebenezer
>
> On Sat, May 8, 2010 at 8:44 PM, Joern Huxhorn <jhuxhorn at googlemail.com
> <mailto:jhuxhorn at googlemail.com>> wrote:
>
> Hi Jeff,
>
> thank you very much for this information and your article! I wasn't
> aware of this plugin.
>
> I just changed my build process for Lilith accordingly.
> See
> http://github.com/huxi/lilith/commit/c2689ee57b263c6a2cb6241547a991703354bc6f
>
> I had to jump through some loops, though, since I have gpg2 instead
> of gpg:
>
> The following two properties had to be added to my pom:
> <gpg.useagent>true</gpg.useagent>
> <gpg.keyname>740A1840</gpg.keyname>
>
> The first one makes sure that gpg isn't complaining about an invalid
> option (--no-use-agent was removed in gpg2) and doesn't ask for a
> passphrase anymore.
> This was quite tricky since the documentation of maven-gpg-plugin
> says that it's called useAgent, which it isn't!
>
> The second one selects the correct key used for the signature -
> which is a good idea if you have more than one.
>
> I wanted to comment on your article but, unfortunately, comments are
> disabled.
>
> Cheers,
> Joern.
>
> On 08.05.2010, at 03:23, Jeff Jensen wrote:
>
>> It is best if the artifacts are signed. Sometime in the near
>> future, Central/Nexus will not accept artifacts without being signed.
>> This would prove the source for you more than the hashes.
>> Ceki: you should start signing the release artifacts. It is very
>> easy - I’ve done it already on a few products and Sonatype has a
>> very good page describing how. Maven will do it automatically for
>> you:
>> http://www.sonatype.com/people/2010/01/how-to-generate-pgp-signatures-with-maven
>> *From:* slf4j-user-bounces at qos.ch
>> <mailto:slf4j-user-bounces at qos.ch>
>> [mailto:slf4j-user-bounces at qos.ch
>> <mailto:slf4j-user-bounces at qos.ch>] *On Behalf Of *Joern Huxhorn
>> *Sent:* Friday, May 07, 2010 3:50 AM
>> *To:* User list for the slf4j project
>> *Subject:* Re: [slf4j-user] Signatures for verifying Slf4j
>> One solution could be the use of signed tags for SLF4J and Logback.
>> That way it would be possible to pull the git repository, check
>> the signature of the tag and build SLF4J and Logback yourself
>> afterwards.
>> I think the MD5 and SHA1 of Maven repository are merely a way to
>> prevent corrupted files, not an actual security feature.
>> Cheers,
>> Joern.
>> On 07.05.2010, at 09:26, Elisha Ebenezer wrote:
>>
>>
>> Hi Ceki,
>> I'm trying to push to use Slf4j and logback in our project and my
>> company wants me to get the MD5 or SHA1 hashes or the code-signing
>> certs to verify the integrity of downloaded files.
>>
>> Though repo1.maven.org <http://repo1.maven.org/> site provides the
>> hashes, we are not sure whether the war and the hash are uploaded
>> by genuine party or not.
>>
>> As you are the owner of the project, I request you to kindly
>> publish the hashes or certs on website's download page.. which can
>> be cross-checked with the downloaded war and/or also with the
>> maven repository.
>>
>> Kindly do the needful and oblige.
>>
>> Thanks,
>> Elisha Ebenezer. _______________________________________________
More information about the slf4j-user
mailing list