Am Tue, Feb 10, 2026 at 09:08:30PM +0100, schrieb Alexander Kjäll:
> > The idea here is that a repo with an expired key (think e.g. buster)
> > should not be used even if that repo was correctly signed back in the
> > day as the data the key signed is sort of expired by now, too.
> 
> If this is a desired property, shouldn't there rather be an expiration date
> set on the signature?

Maybe that is the correct technical solution, but good luck telling that
each and every repository owner, which then have to adapt all their
generation tools ~ and invent a time machine to use these tools years
ago.

(You could argue that setting every signature to expire is error prune
 and a bit silly if you can treat key expiry as default value, but okay)


If you want, you can also view key expiry as a dead man's switch key
revocation that actually works in our context as key updates (which
would make an actual key revocation possible) are not usually done:

Assuming an attacker manages to get hold of busters secret key now, they
can unexpire the key – but they can not really ship this update to users.
What they can do is use `faketime` to sign a Release file just before
the original key expired that will be accepted by sqv as valid;
while gpgv (+ our methods logic) will refuse it.

(The move to Signed-By drastically reduced the surface of this problem)


Best regards

David Kalnischkies

Attachment: signature.asc
Description: PGP signature

Reply via email to