* Ritesh Raj Sarraf <r...@debian.org> [250317 11:08]:
I've managed to prepare a fix for this issue. But am having some issues
with the upload.

Possibly, something recent with how keys are managed.

@ dupload bpfcc_0.31.0+ds-5_source.changes
dupload note: no announcement will be sent.
Checking OpenPGP signatures on bpfcc_0.31.0+ds-5_source.changes...
 Using keyring: /usr/share/keyrings/debian-keyring.gpg
 Using keyring: /usr/share/keyrings/debian-nonupload.gpg
 Using keyring: /usr/share/keyrings/debian-maintainers.gpg
Signing key on 43DEF582F9E67111CE008917F2F11C23F00A2BE6 is not bound:
 Error: Policy rejected non-revocation signature (SubkeyBinding) requiring 
second pre-image resistance
because: SHA1 is not considered secure since 2023-02-01T00:00:00Z
0 authenticated signatures, 1 bad key.
 Error: Verification failed: could not authenticate any signatures
openpgp-check: error: cannot verify OpenPGP signature for 
bpfcc_0.31.0+ds-5_source.changes: no acceptable signature found
dupload: error: Pre-upload '/usr/share/dupload/openpgp-check %1' failed for 
bpfcc_0.31.0+ds-5_source.changes

and

@ dput bpfcc_0.31.0+ds-5_source.changes
Uploading bpfcc using ftp to ftp-master (host: ftp.upload.debian.org; 
directory: /pub/UploadQueue/)
running allowed-distribution: check whether a local profile permits uploads to 
the target distribution
running protected-distribution: warn before uploading to distributions where a 
special policy applies
running checksum: verify checksums before uploading
running suite-mismatch: check the target distribution for common errors
running gpg: check GnuPG signatures before the upload
Uploading bpfcc_0.31.0+ds-5.dsc
Could not upload file bpfcc_0.31.0+ds-5.dsc: 229 Extended Passive Mode Entered 
(|||65245|).


I'll try figure out the reason of this failure. Just wanted to keep you
informed that the issue is being taken care of.

You might be workaround this by using an older dupload/dput, which still uses gpg, or maybe by changing the crypto policy [1].

There might also be a possibility to update your key to use a stronger hash (using sqv). However I don't know what effect this has on your key in the Debian ecosystem.

Chris

[1] https://unix.stackexchange.com/a/789406

Reply via email to