Subject: Port distfiles: sourceforge compromise (fwd)
To: None <tech-pkg@netbsd.org>
From: Hubert Feyrer <hubert.feyrer@informatik.fh-regensburg.de>
List: tech-pkg
Date: 05/30/2001 21:49:16
Borrowing Marc's words (thanks! :), that goes for us as well.
- Hubert
--
Hubert Feyrer <hubert.feyrer@informatik.fh-regensburg.de>
---------- Forwarded message ----------
Date: Wed, 30 May 2001 14:17:57 +0200
From: Marc Espie <espie@schutzenberger.liafa.jussieu.fr>
Reply-To: Marc.Espie@liafa.jussieu.fr
To: announce@openbsd.org
Subject: Port distfiles: sourceforge compromise
I just got belated news that SourceForge got compromised. It's a case
were we are very happy we do have strong cryptographic checksums for
distfiles.
* users, if you compile a port from source, be very paranoid around
checksum changes, especially if the port comes from sourceforge.
* porters, please be very, very careful in updating/importing anything
that comes from sourceforge, at least for a while. This probably means
that ANY update should not be done unless you've actually LOOKED HARD
at the diff between the previous and the current version, or you have
complete insurance that Source Forge is not the main distribution site,
and the project could not have been tainted.