mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #223] Signature file on sourceforge.net specifies wrong hash #156
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#156
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @genodeftest on GitHub (Jan 13, 2016).
Original GitHub issue: https://github.com/netblue30/firejail/issues/223
The signature file firejail-0.9.36.asc from http://sourceforge.net/projects/firejail/files/firejail/ specifies a line
Hash: SHA1. This hash is instead a SHA256 hash of the file.@netblue30 commented on GitHub (Jan 14, 2016):
SHA1 line is added by GnuPG in the process of signing the message. I think, when you verify the message it defaults to SHA1 if for some reasons you cannot use the public/private keys.
https://www.gnupg.org/download/integrity_check.html
@genodeftest commented on GitHub (Jan 14, 2016):
I don't know how you get to create this hash, but I am unable to reproduce this. The signature file contains SHA256 hashes but states that it has SHA1 hashes. So the hashes are actually valid SHA256 hashes, but they are incorrectly labeled.
What I see here is what's described in https://bugzilla.redhat.com/show_bug.cgi?id=493126 though.
@netblue30 commented on GitHub (Jan 14, 2016):
"--digest-algo SHA256" fixed it, thanks for the Fedora link! Next release it will be with SHA256.