-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verifying firmware sha256 #354
Comments
Adding it to |
Yes, I understand the zip creation has to trail the release of the firmware(s) and is a service to pick the correct image. A separate hash file would be ok, of course. I realize a hash might seem superfluous for a zip with signed files, but keep in mind the tools signature validation outputs versions followed by "signed by: Nitrokey" only (e.g. no key ID). A lot of users will download but perform updates later and offline, hence, may want to double-check the firmware-zip to use at that moment. |
For v1.5.0-test.20231030, I’ve manually added a |
Thanks, having it available for a manual hash-check works fine for me. Once it's decided how to handle it in the future, I can make a suggestion perhaps. As far as I've now seen in my test, pynitrokey already does check for the sha256sum inside the zip with the |
I would keep the checksum inside of the container. |
The releases' sha256sum files do not include the hash for the respective
firmware-nk3-*.zip
(I looked at releases >=1.5). At the same time this archive is whatnitropy nk3 validate-update
expects as input-file. While the zip file itself contains a separate sha256sum file for its content, it should still be listed for the release so that users can verify the download prior to validating it with the tool.The text was updated successfully, but these errors were encountered: