Hi,

While your tool would certainly be a valuable addition to signing-party,
a blocker is that it gets the digest algorithm on certificate signatures
by parsing the output of ‘--list-packets’, which as far as I can tell
isn't documented.

IMHO a better (and faster) approach would be, as you hinted at, to 
extract the OpenPGP signature packets from public key packets, cf. RFC 
4880 sections.  It's non trivial though :-(

Note that if the key of which to check the signatures is in your
keyring, a workaround is to use gpg2 as the digest algorithm is
available on the (documented & parsable) ‘--with-colons’ output.
For instance to list signatures with weak digest algorithms (MD5 and
SHA1 [1]):

  gpg2 --with-colons --list-sigs $keyID | grep -E 
'^(pub|uid|sig(:[^:]*){14}:[12]):'

(But as of 1.1.6-1 gnupg2 is not a dependency of signing-party, and I'm 
unsure if doing it before the whole Debian project migrates away from 
gnupg to gnupg2 is the right move :-/)

Cheers,
-- 
Guilhem.

[1] https://tools.ietf.org/html/rfc4880#section-9.4

Attachment: signature.asc
Description: Digital signature

Reply via email to