Control: reassign -1 rust-sequoia-sqv
Control: tag -1 security

On Tue, Feb 10, 2026 at 09:02:47AM +0100, Johannes Kress wrote:
> Package: apt
> Version: 3.0.3
> 
> When a key for an apt repo expires the key will be still accepted by apt
> I tested it by setting up an apt repo and created an expired key
> Then i run apt update with the debugging option for sqv on apt 3.0.3:
> 
> $ apt -oDebug::Acquire::sqv=true update
> Hit:1https://repos.example.com/deb stable InRelease
> 0% [Working]Setting 
> SEQUOIA_CRYPTO_POLICY=/usr/share/apt/default-sequoia.config
> Executing /usr/bin/sqv --keyring /etc/apt/keyrings/expired.gpg 
> /tmp/apt.sig.rBMAZ6 /tmp/apt.data.d4Yp1h --policy-as-of 2027-2-10
> sqv exited with status 0
> Got GOODSIG 5D276A38B044FF63B56B08669B60EA63B19DD085
> sqv succeeded
> All packages are up to date.
> 
> When using the same repo with apt 2.6.1 you got the following error:
> 
> $ apt -oDebug::Acquire::gpgv=true update
> Get:1https://repos.example.com/deb stable InRelease [1204 B]
> 0% [Working]inside VerifyGetSigners
> Preparing to exec:  /usr/bin/apt-key --quiet --readonly --keyring 
> /etc/apt/keyrings/expired.gpg verify --status-fd 3 /tmp/apt.sig.VDLBNK 
> /tmp/apt.data.hS31kv
> Read: [GNUPG:] NEWSIG
> Read: [GNUPG:] KEY_CONSIDERED 5D276A38B044FF63B56B08669B60EA63B19DD085 0
> Read: [GNUPG:] KEYEXPIRED 1770546861
> Read: [GNUPG:] SIG_ID MCZNnca4nxaNt/A1F1XT6RADCbo 2026-02-03 1770114959
> Read: [GNUPG:] KEY_CONSIDERED 5D276A38B044FF63B56B08669B60EA63B19DD085 0
> Read: [GNUPG:] EXPKEYSIG 9B60EA63B19DD085 Repo Signing Key<[email protected]>
> Got EXPKEYSIG 9B60EA63B19DD085 Repo Signing Key<[email protected]> !
> Read: [GNUPG:] VALIDSIG 5D276A38B044FF63B56B08669B60EA63B19DD085 2026-02-03 
> 1770114959 0 4 0 22 8 01 5D276A38B044FF63B56B08669B60EA63B19DD085
> Got trusted VALIDSIG, key ID: 5D276A38B044FF63B56B08669B60EA63B19DD085
> gpgv exited with status 0
> Summary:
>   Good:
>   Valid: 5D276A38B044FF63B56B08669B60EA63B19DD085
>   Bad:
>   Worthless: EXPKEYSIG 9B60EA63B19DD085 Repo Signing Key<[email protected]>
>   SoonWorthless:
>   NoPubKey:
>   Signed-By:
>   NODATA: no
> Err:1https://repos.example.com/deb stable InRelease
>   The following signatures were invalid: EXPKEYSIG 9B60EA63B19DD085 Repo 
> Signing Key<[email protected]>
> Reading package lists... Done
> W: GPG error:https://repos.example.com/deb stable InRelease: The following 
> signatures were invalid: EXPKEYSIG 9B60EA63B19DD085 Repo Signing 
> Key<[email protected]>
> E: The repository 'https://repos.example.com/deb stable InRelease' is not 
> signed.
> N: Updating from such a repository can't be done securely, and is therefore 
> disabled by default.
> N: See apt-secure(8) manpage for repository creation and user configuration 
> details.
> 
> I tested this on Debian 13 and debian 12 with the latest updates installed.

This is Sequoia's expected behavior provided the signature was created before
the key expiration. I don't think it's the most sensible notion but it's
outside of our control, as long as we don't want to patch that in Debian
to behave differently.

-- 
debian developer - deb.li/jak | jak-linux.org - free software dev
ubuntu core developer                              i speak de, en

Reply via email to