On 2020-04-23 4:30 p.m., Simon Deziel wrote:
> On 2020-04-23 3:55 p.m., David Sommerseth wrote:
>> On 23/04/2020 19:55, Simon Deziel wrote:
>>> On 2020-04-21 1:41 p.m., David Sommerseth wrote:
>>>> On 21/04/2020 18:32, Simon Deziel wrote:
>>>>> Hello,
>>>>>
>>>>> I cannot validate the Windows exe files [1] and [2] using the key
>>>>> advertised in [3].
>>>>>
>>>>> $ gpg --verify openvpn-install-2.4.9-I601-Win7.exe.asc
>>>>> gpg: assuming signed data in 'openvpn-install-2.4.9-I601-Win7.exe'
>>>>> gpg: Signature made Fri 17 Apr 2020 07:25:11 AM EDT
>>>>> gpg:                using RSA key 333D46306CF9D9F1F630DB8D96AEC408005D6BB4
>>>>> gpg: Can't check signature: No public key
>>>>>
>>>>> $ gpg --verify openvpn-install-2.4.9-I601-Win10.exe.asc
>>>>> gpg: assuming signed data in 'openvpn-install-2.4.9-I601-Win10.exe'
>>>>> gpg: Signature made Fri 17 Apr 2020 07:25:00 AM EDT
>>>>> gpg:                using RSA key 333D46306CF9D9F1F630DB8D96AEC408005D6BB4
>>>>> gpg: Can't check signature: No public key
>>>>>
>>>>>
>>>>> $ gpg --list-keys F554A3687412CFFEBDEFE0A312F5F7B42F2B01E7
>>>>> pub   rsa4096/0x12F5F7B42F2B01E7 2017-02-09 [SC] [expires: 2027-02-07]
>>>>>       Key fingerprint = F554 A368 7412 CFFE BDEF  E0A3 12F5 F7B4 2F2B 01E7
>>>>> uid                   [ unknown] OpenVPN - Security Mailing List
>>>>> <secur...@openvpn.net>
>>>>>
>>>>>
>>>>> Did I download the right files?
>>>>>
>>>>> $ sha256sum openvpn-install-2.4.9-I601-Win*
>>>>> 4f95a674c3ffafd85062df995a182cfb57ca56d96084472a48a65c546c815f0c
>>>>> openvpn-install-2.4.9-I601-Win10.exe
>>>>> 340a6b917c5358a18e4ed283669e8d59073720184dba2d1f2965512c9cac18ad
>>>>> openvpn-install-2.4.9-I601-Win10.exe.asc
>>>>> 495754e6f3e40a056b947d496729f3ba78aaf0458d80ff08991c27bddf386139
>>>>> openvpn-install-2.4.9-I601-Win7.exe
>>>>> b15e4b34756446589cc609d5d08fe5daba98c34463135b7abfab1538722c4c4e
>>>>> openvpn-install-2.4.9-I601-Win7.exe.asc
>>>>
>>>>
>>>> Try refreshing the PGP keys.  We pushed out new keys in early March, but 
>>>> seems
>>>> the web page was not updated.
>>>>
>>>>     $ gpg --refresh-keys F554A3687412CFFEBDEFE0A312F5F7B42F2B01E7
>>>>
>>>> This should do the proper key update and the verification should work just
>>>> fine.  We always publish the security public key to key servers whenever 
>>>> they
>>>> are updated.
>>>
>>> I tried all the above and even did so in a fresh container. The subkey
>>> 333D46306CF9D9F1F630DB8D96AEC408005D6BB4 simply not there:
>>>
>>
>> This is really weird.  From my own test:
>>
>> [user@host ~]$ gpg --list-keys | wc -l
>> 0
>> [user@host ~]$ gpg --recv-key F554A3687412CFFEBDEFE0A312F5F7B42F2B01E7       
>>                                                                              
>>          
>> gpg: requesting key 2F2B01E7 from hkp server keys.gnupg.net
> 
> Indeed, pulling from that key server picked the 'new' subkey.
> 
>> gpg: key 2F2B01E7: public key "OpenVPN - Security Mailing List 
>> <secur...@openvpn.net>" imported
>> gpg: no ultimately trusted keys found
>> gpg: Total number processed: 1
>> gpg:               imported: 1  (RSA: 1)
>> [user@host ~]$ gpg --edit F554A3687412CFFEBDEFE0A312F5F7B42F2B01E7
>> gpg (GnuPG) 2.0.22; Copyright (C) 2013 Free Software Foundation, Inc.
>> This is free software: you are free to change and redistribute it.
>> There is NO WARRANTY, to the extent permitted by law.
>>
>>
>> pub  4096R/2F2B01E7  created: 2017-02-09  expires: 2027-02-07  usage: SC  
>>                      trust: unknown       validity: unknown
>> The following key was revoked on 2019-02-04 by RSA key 2F2B01E7 OpenVPN - 
>> Security Mailing List <secur...@openvpn.net>
>> sub  4096R/F6D9F8D7  created: 2017-02-09  revoked: 2019-02-04  usage: E   
>> The following key was revoked on 2019-02-04 by RSA key 2F2B01E7 OpenVPN - 
>> Security Mailing List <secur...@openvpn.net>
>> sub  4096R/8CC2B034  created: 2017-02-09  revoked: 2019-02-04  usage: S   
>> sub  4096R/AF131CAE  created: 2018-03-07  expired: 2019-03-07  usage: S   
>> sub  4096R/907F94CF  created: 2018-03-07  expired: 2019-03-07  usage: E   
>> sub  4096R/5ACFEAC6  created: 2019-02-04  expired: 2020-03-09  usage: S   
>> sub  4096R/3FEA78DB  created: 2019-02-04  expired: 2020-03-09  usage: E   
>> sub  4096R/005D6BB4  created: 2020-02-21  expires: 2021-03-05  usage: S  
>> <<<<< The key which is used
>> sub  4096R/5EABA192  created: 2020-02-21  expires: 2021-03-05  usage: E   
>> [ unknown] (1). OpenVPN - Security Mailing List <secur...@openvpn.net>
>>
>>
>> Which key server do you try to fetch from?  Might be we need to do
>> some additional pushes to some servers.
> 
> Stock default Ubuntu pulls from hkps://keys.openpgp.org which doesn't
> have the new subkey.

Same for Debian it seems and this goes back to July 2019 according to
gpg's changelog:

gnupg2 (2.2.17-1) unstable; urgency=medium

Upstream GnuPG now defaults to not accepting third-party certifications
from the keyserver network.  Given that the SKS keyserver network is
under attack via certificate flooding, and third-party certifications
will not be accepted anyway, we now ship with the more
tightly-constrained and abuse-resistant system hkps://keys.openpgp.org
as the default keyserver.

Users with bandwidth to spare who want to try their luck with the SKS
pool should add the following line to ~/.gnupg/dirmngr.conf to revert to
upstream's default keyserver:

    keyserver hkps://hkps.pool.sks-keyservers.net

See the 2.2.17 section in the upstream NEWS file at
/usr/share/doc/gnupg/NEWS.gz for more information about fully
reverting to the old, risky behavior.

 -- Daniel Kahn Gillmor <d...@fifthhorseman.net>  Thu, 11 Jul 2019
22:12:07 -0400


_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to