Bug#699661: debian-keyring: please ship a removed-keys keyring

2023-11-28 Thread Dimitri John Ledkov
On Sat, 2 Feb 2013 23:51:42 -0500 Michael Gilbert  wrote:
> package: debian-keyring
> version: 2012.11.15
> severity: important
>
> Signature verification currently fails on source packages that were
> signed by keys that are no longer present in the active keyrings.
> This can easily lead to the incorrect conclusion that those packages
> are not to be trusted or possibly malicious.  Many packages tend to
> remain in the archive far longer than the key used to sign them, so I
> think it would make a lot of sense to ship the removed-keys to be ably
> to easily verify them into the indefinite future.

I wonder if instead the bug report is with dak, that it should strip
signatures from .dsc files (like it strips them from .changes) and
instead replace signature with the verified/trusted gpg output at the
time (good signature from $UID $KEID $HASH $Algo).

Such that .dsc fetched from the archive years later, is only verified
via archive key signature of a future time, rather than relying on the
.dsc signature to remain trusted.

It would also make published .dsc smaller.

Basically the same reasoning as to why .deb files are not signed directly.

Because one is supposed to have received an already authenticated and
verified .dsc after running `apt source`.

Regards,

Dimitri.



Bug#699661: debian-keyring: please ship a removed-keys keyring

2021-07-29 Thread Sherry Williams
Date: Sun, 2 Jun 2013 13:47:04 -0400 >From: Michael Gilbert >-
>Body: On Sat, Feb 02, 2013 at 11:51:42PM -0500, Michael Gilbert wrote: >>
package: debian-keyring >> version: 2012.11.15 >> severity: important >> >>
Signature verification currently fails on source packages that were >>
signed by keys that are no longer present in the active keyrings. >> This
can easily lead to the incorrect conclusion that those packages >> are not
to be trusted or possibly malicious. Many packages tend to >> remain in the
archive far longer than the key used to sign them, so I >> think it would
make a lot of sense to ship the removed-keys to be ably >> to easily verify
them into the indefinite future. > >If we put a key into removed-keys then
it indicates we no longer trust >it; that could be because we've been told
it's revoked, or because we've >lost contact with the owner, because it's
been compromised or because >the owner has transitioned to a stronger key.
Shipping removed-keys for >the purposes of verification is not appropriate.
> >J. > >-- >] http://www.earth.li/~noodles/ [] "F**k a duck." -- Walt
Disney [ >] PGP/GPG Key @ the.earth.li [] [ >] via keyserver, web or email.
[] [ >] RSA: 4096/2DA8B985 [] [


Bug#699661: debian-keyring: please ship a removed-keys keyring

2021-07-29 Thread Sherry Williams
Date: Sat, 2 Feb 2013 23:51:42 -0500 >From: Michael Gilbert >-
>Body: ur-type{attachments


Bug#699661: debian-keyring: please ship a removed-keys keyring

2013-06-02 Thread Michael Gilbert
On Sat, Jun 1, 2013 at 6:48 PM, Jonathan McDowell wrote:
 tags 699661 wontfix
 thanks

 On Sat, Feb 16, 2013 at 03:11:09PM -0500, Michael Gilbert wrote:
  Note that signature date is part of the information
  contained in the gpg signature block.

 Rethinking this, I suppose that could be faked with a compromised key.

 So, really the trust path would also require checking that that
 package originated from debian, i.e. that the dsc matches the
 information known to a release file that's been signed by one of the
 debian archive keys.

 Anyway, done carefully, it could work.

 I think anyone who knows how to be careful enough to ensure they've
 followed the trust path correctly can either find the old debian-keyring
 package from archive.debian.org, rsync the removed-keys.gpg file from
 keyring.debian.org or checkout the bzr tree and get the key from there.

 Marking wontfix; the removed-keys keyring is easily available to those
 that need it and I don't think shipping it in the debian-keyring
 package is helping most of the userbase.

Well, it would help a certain subset of the userbase that prefers to
fetch stuff via the package management system, making it more
convenient for those extracting signed sources with now expired keys.
It will of course require a bit more information (expiration dates) to
actually make that keyring truly useful.

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699661: debian-keyring: please ship a removed-keys keyring

2013-06-01 Thread Jonathan McDowell
tags 699661 wontfix
thanks

On Sat, Feb 16, 2013 at 03:11:09PM -0500, Michael Gilbert wrote:
  Note that signature date is part of the information
  contained in the gpg signature block.
 
 Rethinking this, I suppose that could be faked with a compromised key.
 
 So, really the trust path would also require checking that that
 package originated from debian, i.e. that the dsc matches the
 information known to a release file that's been signed by one of the
 debian archive keys.
 
 Anyway, done carefully, it could work.

I think anyone who knows how to be careful enough to ensure they've
followed the trust path correctly can either find the old debian-keyring
package from archive.debian.org, rsync the removed-keys.gpg file from
keyring.debian.org or checkout the bzr tree and get the key from there.

Marking wontfix; the removed-keys keyring is easily available to those
that need it and I don't think shipping it in the debian-keyring
package is helping most of the userbase.

J.

-- 
] http://www.earth.li/~noodles/ [] 101 things you can't have too much  [
]  PGP/GPG Key @ the.earth.li   []  of : 53 - Space.   [
] via keyserver, web or email.  [] [
] RSA: 4096/2DA8B985[] [


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699661: debian-keyring: please ship a removed-keys keyring

2013-02-16 Thread Michael Gilbert
On Wed, Feb 13, 2013 at 8:18 PM, Jonathan McDowell  wrote:
 On Sat, Feb 02, 2013 at 11:51:42PM -0500, Michael Gilbert wrote:
 package: debian-keyring
 version: 2012.11.15
 severity: important

 Signature verification currently fails on source packages that were
 signed by keys that are no longer present in the active keyrings.
 This can easily lead to the incorrect conclusion that those packages
 are not to be trusted or possibly malicious.  Many packages tend to
 remain in the archive far longer than the key used to sign them, so I
 think it would make a lot of sense to ship the removed-keys to be ably
 to easily verify them into the indefinite future.

 If we put a key into removed-keys then it indicates we no longer trust
 it; that could be because we've been told it's revoked, or because we've
 lost contact with the owner, because it's been compromised or because
 the owner has transitioned to a stronger key. Shipping removed-keys for
 the purposes of verification is not appropriate.

Note that even if those keys are considered untrustworthy for any
signatures past their removal date, that wasn't the case prior to
their removal.

That differentiation is key, and can be addressed by also publishing
information on removal dates.  Then the tools that do package
authentication can do a little more work to check the signature was
made prior to the keys removal date and reject those that are newer
than that date.  Note that signature date is part of the information
contained in the gpg signature block.

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699661: debian-keyring: please ship a removed-keys keyring

2013-02-16 Thread Michael Gilbert
 Note that signature date is part of the information
 contained in the gpg signature block.

Rethinking this, I suppose that could be faked with a compromised key.

So, really the trust path would also require checking that that
package originated from debian, i.e. that the dsc matches the
information known to a release file that's been signed by one of the
debian archive keys.

Anyway, done carefully, it could work.

Best wishes,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699661: debian-keyring: please ship a removed-keys keyring

2013-02-13 Thread Jonathan McDowell
On Sat, Feb 02, 2013 at 11:51:42PM -0500, Michael Gilbert wrote:
 package: debian-keyring
 version: 2012.11.15
 severity: important
 
 Signature verification currently fails on source packages that were
 signed by keys that are no longer present in the active keyrings.
 This can easily lead to the incorrect conclusion that those packages
 are not to be trusted or possibly malicious.  Many packages tend to
 remain in the archive far longer than the key used to sign them, so I
 think it would make a lot of sense to ship the removed-keys to be ably
 to easily verify them into the indefinite future.

If we put a key into removed-keys then it indicates we no longer trust
it; that could be because we've been told it's revoked, or because we've
lost contact with the owner, because it's been compromised or because
the owner has transitioned to a stronger key. Shipping removed-keys for
the purposes of verification is not appropriate.

J.

-- 
] http://www.earth.li/~noodles/ []F**k a duck. -- Walt Disney[
]  PGP/GPG Key @ the.earth.li   [] [
] via keyserver, web or email.  [] [
] RSA: 4096/2DA8B985[] [


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#699661: debian-keyring: please ship a removed-keys keyring

2013-02-02 Thread Michael Gilbert
package: debian-keyring
version: 2012.11.15
severity: important

Signature verification currently fails on source packages that were
signed by keys that are no longer present in the active keyrings.
This can easily lead to the incorrect conclusion that those packages
are not to be trusted or possibly malicious.  Many packages tend to
remain in the archive far longer than the key used to sign them, so I
think it would make a lot of sense to ship the removed-keys to be ably
to easily verify them into the indefinite future.

As an example, I was looking at boost and saw:

  $ apt-get source boost1.49
  Reading package lists... Done
  Building dependency tree
  Reading state information... Done
  NOTICE: 'boost1.49' packaging is maintained in the 'Svn' version
control system at:
  svn://svn.debian.org/svn/pkg-boost/boost/trunk
  Need to get 48.6 MB of source archives.
  Get:1 http://ftp.debian.org/debian/ sid/main boost1.49 1.49.0-3.1
(dsc) [4,696 B]
  Get:2 http://ftp.debian.org/debian/ sid/main boost1.49 1.49.0-3.1
(tar) [48.5 MB]
  Get:3 http://ftp.debian.org/debian/ sid/main boost1.49 1.49.0-3.1
(diff) [105 kB]
  Fetched 48.6 MB in 1min 5s (746 kB/s)
  gpgv: Signature made Sat 23 Jun 2012 05:14:11 AM EDT using DSA key ID 9B7C328D
  gpgv: Can't check signature: public key not found
  dpkg-source: warning: failed to verify signature on ./boost1.49_1.49.0-3.1.dsc

Which made me think that somehow I received invalid files, but the
reality is much more benign.  That package is validly signed by Luk
Claes' old key, but since that key is now in the removed-keys and thus
not shipped, the source package unfortunately looks inauthentic
without a lot more work.

Thanks,
Mike


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org