Le 20/03/2025 à 00:51, Guillem Jover a écrit :
The problem is that the old openpgp-check hook implementation was
ignoring some verification failures, and silencing stdout/stderr from
the OpenPGP command being used. I assume that with an older dupload you
should have seen the following message instead:

   "  OpenPGP signature in $FILE cannot be checked, maybe due to missing keys"

(or something similar).

No. No warning at all.

With dupload 2.9.12 I have:
$ dupload ccid_1.6.2-1_source.changes --no
dupload note: no announcement will be sent.
Checking OpenPGP signatures before upload......signatures are ok
Uploading (scpb) to ssh.upload.debian.org:/srv/upload.debian.org/UploadQueue/
[ Preparing job ccid_1.6.2-1_source from ccid_1.6.2-1_source.changes
 ccid_1.6.2-1.debian.tar.xz, size ok, md5sum ok, sha1sum ok, sha256sum ok
 ccid_1.6.2-1.dsc, size ok, md5sum ok, sha1sum ok, sha256sum ok
 ccid_1.6.2-1_amd64.buildinfo, size ok, md5sum ok, sha1sum ok, sha256sum ok
 ccid_1.6.2.orig.tar.xz, size ok, md5sum ok, sha1sum ok, sha256sum ok
 ccid_1.6.2.orig.tar.xz.asc, size ok, md5sum ok, sha1sum ok, sha256sum ok
 ccid_1.6.2-1_source.changes ok ]
Uploading (scpb) to debian-ssh (ssh.upload.debian.org)
[ Uploading job ccid_1.6.2-1_source
 ccid_1.6.2-1.debian.tar.xz 10.8 kB, ok
 ccid_1.6.2-1.dsc 2.1 kB, ok
 ccid_1.6.2-1_amd64.buildinfo 7.0 kB, ok
 ccid_1.6.2.orig.tar.xz 192.5 kB, ok
 ccid_1.6.2.orig.tar.xz.asc 0.8 kB, ok
 ccid_1.6.2-1_source.changes 2.4 kB, ok
+ scp   ccid_1.6.2-1.debian.tar.xz ccid_1.6.2-1.dsc 
ccid_1.6.2-1_amd64.buildinfo ccid_1.6.2.orig.tar.xz ccid_1.6.2.orig.tar.xz.asc 
ccid_1.6.2-1_source.changes  
ssh.upload.debian.org:/srv/upload.debian.org/UploadQueue/
+ log to ccid_1.6.2-1_source.upload

+ log successful upload
 ]

I was able to upload using this version of dupload and the package is now in 
unstable.
https://packages.debian.org/search?keywords=libccid

So my GnuPG key is still recognised as valid by the Debian server(s).

The problem is that your key does not appear valid to GnuPG or other
OpenPGP implementations. Running the Sequoia certificate linter (from
the «sq» package) gives this:

   ,---
   $ sq cert lint --cert F5E11B9FFE911146F41D953D78A1B4DFE8F9C57E
   Certificate 78A1B4DFE8F9C57E is not valid under the standard policy: No 
binding signature at time 2025-03-19T23:36:51Z
   Certificate 78A1B4DFE8F9C57E contains a User ID (Ludovic Rousseau 
<ludovic.rouss...@free.fr>) protected by SHA-1
   Certificate 78A1B4DFE8F9C57E contains a User ID (Ludovic Rousseau 
<rouss...@debian.org>) protected by SHA-1
   Certificate 78A1B4DFE8F9C57E, key 36A241532F1BEFF0 uses a SHA-1-protected 
binding signature.
   Examined 1 certificate.
     0 certificates are invalid and were not linted. (GOOD)
     1 certificate was linted.
     1 of the 1 certificates (100%) has at least one issue. (BAD)
   0 of the linted certificates were revoked.
     0 of the 0 certificates has revocation certificates that are weaker than 
the certificate and should be recreated. (GOOD)
   0 of the linted certificates were expired.
   1 of the non-revoked linted certificate has at least one non-revoked User ID:
     1 has at least one User ID protected by SHA-1. (BAD)
     1 has all User IDs protected by SHA-1. (BAD)
   1 of the non-revoked linted certificates has at least one non-revoked, live 
subkey:
     1 has at least one non-revoked, live subkey with a binding signature that 
uses SHA-1. (BAD)
   0 of the non-revoked linted certificates have at least one non-revoked, 
live, signing-capable subkey:
     0 certificates have at least one non-revoked, live, signing-capable subkey 
with a strong binding signature, but a backsig that uses SHA-1. (GOOD)

     Error: 1 certificate have at least one issue
   `---

You should be able to fix your key by following the instructions in
<https://book.sequoia-pgp.org/lint.html>. The same could be done with
GnuPG, but it's way way more tedious (see
<https://lore.kernel.org/keys/fxotnlhsyl2frp54xtguy7ryrucuwselanazixeax3motyyoo3@7vf7ip6gxyvx/T/#u>
in case you prefer that).

I used:
$ sq cert lint --fix --output - --cert F5E11B9FFE911146F41D953D78A1B4DFE8F9C57E 
| gpg --import

and now the key is OK for Sequoia:
$ sq cert lint --cert F5E11B9FFE911146F41D953D78A1B4DFE8F9C57E
Examined 1 certificate.
  0 certificates are invalid and were not linted. (GOOD)
  1 certificate was linted.
  0 of the 1 certificates (0%) have at least one issue. (GOOD)
0 of the linted certificates were revoked.
  0 of the 0 certificates has revocation certificates that are weaker than the 
certificate and should be recreated. (GOOD)
0 of the linted certificates were expired.
1 of the non-revoked linted certificate has at least one non-revoked User ID:
  0 have at least one User ID protected by SHA-1. (GOOD)
  0 have all User IDs protected by SHA-1. (GOOD)
1 of the non-revoked linted certificates has at least one non-revoked, live
subkey:
  0 have at least one non-revoked, live subkey with a binding signature that 
uses SHA-1. (GOOD)
0 of the non-revoked linted certificates have at least one non-revoked, live,
signing-capable subkey:
  0 certificates have at least one non-revoked, live, signing-capable subkey 
with a strong binding signature, but a backsig that uses SHA-1. (GOOD)

I will upload it to update the keyring.

Although this looks like a problem with the key and not with dupload,
I'll leave this open, and then add a hint to its output to try to help
others in a similar situation as yours.

Good idea.
I guess the problem is the use of SHA-1.

I think other DD with have the same problem.
Maybe you could check all the keys present in the keyrings.

Thanks

--
Dr. Ludovic Rousseau

Reply via email to