[ 
https://issues.apache.org/jira/browse/DAFFODIL-2727?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Lawrence reopened DAFFODIL-2727:
--------------------------------------
      Assignee: Olabusayo Kilo  (was: Mike Beckerle)

Reopening and assigning to Lola to create a SHA512 key and delete the old 
SHA256. Being SHA256 doesn't cause any  issues related to the SHA-1 
deprecation, but it would be good to upgrade to ASF recommendations while were 
updating keys.

> KEYS file contains deprecated digest algorithm, RPM key import failures
> -----------------------------------------------------------------------
>
>                 Key: DAFFODIL-2727
>                 URL: https://issues.apache.org/jira/browse/DAFFODIL-2727
>             Project: Daffodil
>          Issue Type: Bug
>          Components: Infrastructure
>            Reporter: Steve Lawrence
>            Assignee: Olabusayo Kilo
>            Priority: Critical
>             Fix For: 3.4.0
>
>
> RHEL9 has disabled support for SHA-1 gpg keys for verifying RPM packages. 
> This is planned to be deprecated in Fedora 39:
> https://www.redhat.com/en/blog/rhel-security-sha-1-package-signatures-distrusted-rhel-9
> Unfortunately, our KEYS file contains a key that uses the SHA-1 algorithm. 
> When installing daffodil via DNF, it imports all the keys and errors when 
> importing that key.
> Here's filtered output of our keys and their digest algorithms:
> {code}
> $ gpg --list-packets KEYS  | grep -E '(user ID|digest algo)'
> :user ID packet: "Steve Lawrence <[email protected]>"
>     digest algo 10, begin of digest 28 8e
>     digest algo 10, begin of digest 6c ff
> :user ID packet: "Michael J. Beckerle (Code Signing Key) 
> <[email protected]>"
>     digest algo 2, begin of digest 5d ac
>     digest algo 2, begin of digest 30 08
> :user ID packet: "Olabusayo Kilo <[email protected]>"
>     digest algo 8, begin of digest 48 eb
>     digest algo 8, begin of digest 48 1d
> :user ID packet: "John Interrante (Code Signing Key) <[email protected]>"
>     digest algo 10, begin of digest d5 29
>     digest algo 10, begin of digest a4 20
> :user ID packet: "Shane Dell <[email protected]>"
>     digest algo 10, begin of digest 11 4d
>     digest algo 10, begin of digest 09 57
> {code}
> Algorithm 2 is SHA-1, algorithm 8 is SHA-256, and algorithm 10 is SHA-512. So 
> only Mike's KEY uses the deprecated algorithm and causes issues on RHEL 9. 
> Though Lola's key is SHA-256, which is not the ASF preferred SHA-512.
> The question is how to deal with this. It's easy enough for Mike and Lola to 
> generate new KEYS (our KEYS file has improved instructions on how to generate 
> a SHA-512 key). If we replace the current KEYS it means old releases can no 
> longer be verified. But if we do not remove the old KEYS, we get errors 
> trying to import the file into RPM.
> It looks like Mike signed versions 2.2.0, 2.7.0, 3.2.0, and 3.2.1, and Lola 
> signed 2.6.0, so it is a handful of somewhat recent versions that wouldn't be 
> able to be verified.
> Maybe since SHA-1 is deprecated, not being able to verify those releases is 
> acceptable, and if someone wants to verify then they need to import an older 
> KEYS file? Maybe this way it's more clear to the user and so they would be  
> more aware of the consequences? And there are still the SHA-512 sums as an 
> alternative form of release verification.
> Thoughts?



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to