Hi

> I wonder if this is really what we want for uscan.  Debian can impose a
> policy on Debian developers' keys, but this is about upstream
> developers' keys: isn't a weak key/signature better than no signature at
> all?

This is an interesting question, and I don't have an answer to it, but
I'll try to reason a bit about it and supply my opinions on the
matter.

First an assumption: The validation protects against a real attack
scenario, I consider the question of this should be done at all to be
out of scope.

Then it maybe be useful to try to put a monetary value on how weak the
key is, so that we can try to get a gut feeling on what we are talking
about.

Based on some googling and finding numbers on the internet ( this
answer: https://security.stackexchange.com/a/275759 and that a more
modern miner uses 9.5 Joules of energy per tera-hash
https://www.asicminervalue.com/miners/bitmain/antminer-s23-hyd-580th)
gives a ball park number of $400k to break such a key. There is a lot
to critique about this methodology to find a number, but it gives a
ballpark at least.

This puts the attack out of reach for most individuals, but within
reach of all organizations and nation states.

We can also look at what the large standardization organizations say
about DSA keys:

FIPS: have forbidden the verification of DSA signatures made after
february 2023.
CA/Browser Forum Baseline Requirements banned DSA certificates.
OpenSSH disabled DSA support by default in OpenSSH 7.0.

We can also assume that the reason that the upstream maintainer
performs the extra work of signing their releases are because that it
protects against an attack scenario that they care about.

Therefore I think that the right course of action in this scenario is
to reach out to the upstream maintainer and ask them to switch to a
secure key.

Better to be upfront about that the signature doesn't provide enough
security to be worth checking, than accepting any signature and
pretending that it protects something. At least then it's explicit
that the key is bad.

In my personal opinion it's a bug in GnuPG that it says "Good
signature" in this case, but I'm not sure that I would be able to
convince the GnuPG maintainers about that.

best regards
Alexander Kjäll

Reply via email to