You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@xerces.apache.org by ne...@apache.org on 2002/10/29 23:50:01 UTC
cvs commit: xml-xerces/java/docs install.xml
neilg 2002/10/29 14:50:01
Modified: java/docs install.xml
Log:
addressing bug 1329.
Revision Changes Path
1.14 +62 -1 xml-xerces/java/docs/install.xml
Index: install.xml
===================================================================
RCS file: /home/cvs/xml-xerces/java/docs/install.xml,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -r1.13 -r1.14
--- install.xml 29 Jan 2002 18:04:52 -0000 1.13
+++ install.xml 29 Oct 2002 22:50:01 -0000 1.14
@@ -68,7 +68,10 @@
package (or equivalent) available.
</note>
<note>
- xerces.jar is no longer available in the main distribution. You can still download this jar from deprecated distribution. xerces.jar is a Jar file that contains all the parser class files.
+ xerces.jar is no longer available in the main distribution. You can still
+ download this jar from deprecated distribution. xerces.jar is a Jar file
+ that contains all the parser class files (i.e., it contains
+ the intersection of the contents of xercesImpl.jar and xmlParserAPIs.jar).
</note>
</s2>
<s2 title='Files in the Source Package'>
@@ -181,5 +184,63 @@
more options, please look inside build.xml itself; all possibilities
are documented there.
</p>
+</s2>
+<s2 title="Verifying signatures">
+ <p>In order to provide security-conscious users with the best
+ possible assurance that the Xerces distribution they have
+ downloaded is official, "signatures" are provided for all 6
+ Xerces packages produced in each release. A signature is
+ produced with cryptographic software (such as <jump
+ href="http://www.pgp.com">PGP</jump> or <jump
+ href="http://www.gnupg.org">GNUPG</jump>). The cryptographic
+ software is used to apply an algorithm that uses the secret
+ "key" of a Xerces committer to generate a unique file from
+ each Xerces distribution. The Xerces committer then makes a
+ "public" key available, which the user can use, in
+ conjunction with the downloaded distribution and the
+ accompanying signature, to verify that the distribution was
+ actually produced by that committer.
+ </p>
+ <p>In order to verify the legitimacy of Xerces distributions
+ you download, these steps should be followed:</p>
+ <ol>
+ <li>
+ Get a copy of PGP or GNUPG from the above URL's.
+ </li>
+ <li>
+ Obtain the signature of the Xerces package you wish
+ to verify. For instance, if you want to verify the
+ legitimacy of Xerces-bin.x.y.z.tar.gz, download the
+ Xerces-bin.x.y.z.tar.gz.asc file from the same
+ location as the original file was obtained.
+ </li>
+ <li>
+ Obtain a copy of the public key of the Xerces
+ committer. While most committers have posted their
+ keys to public "key servers", probably the easiest
+ place to get them from is CVS. The public keys of
+ all Xerces committers who post releases are available
+ from the file called <code>KEYS</code> located in the
+ root directory of the <code>xml-xerces/java</code>
+ repository.
+ </li>
+ <li>
+ Add these keys to your "public" keyring. In GNUPG,
+ you'd do this with a command like <code>gpg --import
+ KEYS</code>.
+ </li>
+ <li>
+ Issue the command for verifying signatures
+ appropriate for the cryptographic software you've
+ chosen. For GNUPG, this would be
+ <code>gpg --verify Xerces-J-foo.x.y.z.ext.asc
+ Xerces-J-foo.x.y.z.ext</code>.
+ </li>
+ </ol>
+ <p>Note that, in general, it won't be necessary to acquire new copies
+ of public keys to verify signatures for each Xerces release.
+ This will only be necessary if a new Xerces committer has
+ published the release.
+ </p>
</s2>
</s1>
---------------------------------------------------------------------
To unsubscribe, e-mail: xerces-cvs-unsubscribe@xml.apache.org
For additional commands, e-mail: xerces-cvs-help@xml.apache.org