Release Signing Keys are Susceptible to Attack

Thu Aug 17 05:02:00 GMT 2017

After downloading and verifying the releases on, I found that the maintainers used 1024 bit DSA
keys with SHA1 content digests. 1024 bit keys are considered to be
susceptible to realistic attacks, and SHA1 has been considered broken
for some time., p17

SHA1 is weak enough that a team of researchers was able to mount a
realistic attack at no great cost.

As compilers and their utilities are a high value target I would
appreciate it if the maintainers move to more secure verification


More information about the Gcc mailing list