On Sun, Dec 08, 2024 at 10:49:05PM -0500, James McCoy wrote:
> On Mon, Dec 09, 2024 at 03:41:39AM +0100, Guillem Jover wrote:
> > This is a consequence of the switch from gpg to gpgv, which has now
> > surfaced issues in how the certificates are stored in the Linux
> > packaging (and while checking this also in the certificates themselves).
> > The first issue is that the debian/upstream/signing-key.asc uses
> > concatenated ASCII Armored certificate blocks, which is not a well
> > defined construct, see:
> >   <https://bugs.debian.org/969588>
> >   <https://gitlab.com/dkg/openpgp-stateless-cli/-/issues/28>
> >   <https://bugs.debian.org/969590>
> According to codesearch, about 1/6th - 1/5th of the packages providing
> debian/upstream/signing-key.asc have multiple certificate blocks.

ouch. thanks for that data point.
 
> > So you might also want to contact upstream developers to sort out their
> > certificates.
> While these may very well be issues that upstream should consider, is it
> really uscan's role to be enforcing these strict policies? These are the
> keys that upstream has signed with, so why should we be considering that
> an error?

I tend to agree...
 
> I could see emitting a warning, so there's some data to send back to
> upstream when explaining why they may want to revisit their keys.

Yes, definitly for some grace period.

> However, by the time we're downloading and verifying the artifacts, it's
> kinda too late, isn't it? This also isn't a good story for downloading
> older versions, since what's considered "secure" may have changed in the
> intervening time. It can still be useful to validate what existed, even
> if it's not up to contemporary standards.
 
agreed as well.


-- 
cheers,
        Holger

 ⢀⣴⠾⠻⢶⣦⠀
 ⣾⠁⢠⠒⠀⣿⡁  holger@(debian|reproducible-builds|layer-acht).org
 ⢿⡄⠘⠷⠚⠋⠀  OpenPGP: B8BF54137B09D35CF026FE9D 091AB856069AAA1C
 ⠈⠳⣄

🎵 Covid seems to be the hardest word. 🎵

Attachment: signature.asc
Description: PGP signature

Reply via email to