Hi,

On Fri, Apr 11, 2025 at 09:51:14AM +0100, Jonathan Wiltshire wrote:
> +debian-archive-keyring (2023.3+deb12u2) bookworm; urgency=medium
> +
> +  * Remove buster keys

this broke my "dumat" installation. Now it might be argued that this 
is a bug in dumat, but maybe other things also rely on the keys.

Specifically, dumat exploded when checking the bullseye-security (!)
InRelease file as published on deb.debian.org.

JFTR, dumat calls gpgv for the check:
gpgv --quiet --weak-digest SHA1 --output --keyring ...
and then uses the return code to check for success. From what I read 
recently in gpg bug reports, this might not be a robust 
implementation. Nevertheless it worked so far.

I'm not saying the dumat breakage is a 100% reason to not drop the 
buster keys, but it's a datapoint for further consideration.

Best,
Chris

Reply via email to