For example the SHA256sum of an Ubuntu ISO image, or an OpenBSD amd64 image. Are there any sites?
It's important that the site must use HTTPS or at least it must provide GPG check for the hashes.
For example the SHA256sum of an Ubuntu ISO image, or an OpenBSD amd64 image. Are there any sites?
It's important that the site must use HTTPS or at least it must provide GPG check for the hashes.
The National Software Reference Library is a catalog of valid hashes for OS and application files. This listing can then be used, for example, to validate installed OS files on a system. To quote from their site, "In most cases, NSRL file data is used to eliminate known files, such as operating system and application files, during criminal forensic investigations."
I don't know if it includes Ubuntu or OpenBSD, and their index page looks lost at the moment.
To be completely trust-worthy, the hash must be provided by the same person providing the product. In fact, you do not want someone you do not know computing a hash, he may have intention to lie, whereas the provider who don't.
HTTPS is not a requirement. However, if you want to avoid a Man in the Middle attack, where someone could trick you in believing you get the right product with a matching hash, then you need to authenticate the source from where you get the hash. Since this is the validator the integrity of the product, you MUST be able to trust it. For that goal, HTTPS (SSl/TLS) is a mean to achieve authentication. It has the advantage to rely on a known protocol, which get its trust from a chain of certificates. Another way of doing it would be with a digital signature (like GPG sign).
At last, both model are different, but they have a common problem which has to be solved for the trust to exist. YOU must trust someone for doing some job. In the HTTPS case, this would be the Certificate Authority whose root certificate is embedded in your browser, for the GPG it would be the person that gives you the public key of the producer.
As gowenfawr noted, the National Software Reference Library is a useful source for this approach. And while there are indeed risks of trusting third-party hashing sites, there are also advantages to having multiple viewpoints, especially for hashes, which can be easily modified if the primary web site is hacked. This is similar to the approach that Convergence takes - see Convergence - an SSL replacement?. If different sites disagree about what a hash should be, that alerts the user to at least check it out more thoroughly.
In general the company that delivers the image files are the one that provide the hashes. For example, you'd get the ubuntu one's from any of the ubuntu mirrors.