<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/methods/gpgv.cc, branch 2.9.2</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=2.9.2</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=2.9.2'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2024-04-09T17:59:52Z</updated>
<entry>
<title>Revert "Temporarily downgrade key assertions to "soon worthless""</title>
<updated>2024-04-09T17:59:52Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-04-09T17:56:26Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=81c65f7e86b8f16eaaa91d9c205a594b0ebde159'/>
<id>urn:sha1:81c65f7e86b8f16eaaa91d9c205a594b0ebde159</id>
<content type='text'>
We temporarily downgraded the errors to warnings to give the
launchpad PPAs time to be fixed, but warnings are not safe:
Untrusted keys could be hiding on your system, but just not
used at the moment. Hence revert this so we get the errors we
want.

This reverts commit 66998ed3d299bede651ad40368bdb270f5f5b0f9.

LP: #2060721
Gbp-Dch: full
</content>
</entry>
<entry>
<title>Temporarily downgrade key assertions to "soon worthless"</title>
<updated>2024-02-28T17:22:01Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-02-28T16:04:05Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=66998ed3d299bede651ad40368bdb270f5f5b0f9'/>
<id>urn:sha1:66998ed3d299bede651ad40368bdb270f5f5b0f9</id>
<content type='text'>
This will only issue warnings instead of errors while we continue
cleaning up our repositories.
</content>
</entry>
<entry>
<title>Rename 'weak digest algorithm' to 'weak algorithm'</title>
<updated>2024-02-28T17:22:01Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-02-28T15:52:33Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=8a14c18c5b487139948dcb22abd37bffdd9cf5f4'/>
<id>urn:sha1:8a14c18c5b487139948dcb22abd37bffdd9cf5f4</id>
<content type='text'>
This allows us to render public key algorithms as weak as well.
</content>
</entry>
<entry>
<title>Implement gpgv --assert-pubkey-algo=&gt;=rsa2048,ed25519,ed448</title>
<updated>2024-02-28T17:22:01Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-02-28T14:14:43Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=50e3fee26ae843a812b1c9ec8531946931773fd3'/>
<id>urn:sha1:50e3fee26ae843a812b1c9ec8531946931773fd3</id>
<content type='text'>
The assertion can be overriden using apt::key::assert-pubkey-algo,
the default is the most opinionated one.

This will inform the user during apt-cdrom add as we do not
pass --quiet to user, so adjust test case.

Add a simple test case for it to test-method-gpgv.

LP: #2055193
</content>
</entry>
<entry>
<title>gpgv: Add a reason to worthless signers</title>
<updated>2024-02-28T17:21:01Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-02-28T13:49:48Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=60d653634f889abe09c0f4d88f2559eab9202635'/>
<id>urn:sha1:60d653634f889abe09c0f4d88f2559eab9202635</id>
<content type='text'>
</content>
</entry>
<entry>
<title>gpgv: Surface [GNUPG:] ERROR and [GNUPG:] WARNING status messages</title>
<updated>2024-02-28T17:21:01Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-01-18T17:35:35Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=066121ac4de3f1e07e203583a2c5d00a0289f84a'/>
<id>urn:sha1:066121ac4de3f1e07e203583a2c5d00a0289f84a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Modernize standard library includes</title>
<updated>2024-02-20T12:49:04Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2024-02-20T12:43:08Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=40a75722c43ae24cb9a99d6730a3b25b65819c49'/>
<id>urn:sha1:40a75722c43ae24cb9a99d6730a3b25b65819c49</id>
<content type='text'>
This was automated with sed and git-clang-format, and then I had to
fix up the top of policy.cc by hand as git-clang-format accidentally
indented it by two spaces.
</content>
</entry>
<entry>
<title>Actually delete temporary apt-key.*.asc helper files</title>
<updated>2022-10-31T10:18:13Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2022-10-31T10:17:04Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=c2cb1e42189c5fe3481386cb83a6b03bfe583d1f'/>
<id>urn:sha1:c2cb1e42189c5fe3481386cb83a6b03bfe583d1f</id>
<content type='text'>
During development there was an if (0) there for debugging purposes
that unfortunately stayed in and caused files to accumulate.

LP: #1995247
</content>
</entry>
<entry>
<title>gpgv: Use Valid instead of Good to determine fallback</title>
<updated>2022-03-07T12:04:23Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-03-07T12:03:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=55452afa1e8eb3b252f76e455b49df5883e0b811'/>
<id>urn:sha1:55452afa1e8eb3b252f76e455b49df5883e0b811</id>
<content type='text'>
Change the logic to use "Valid" instead of "Good" to determine
whether we need to fallback and if fallback was successful. That
means that if you have an expired key in trusted.gpg.d, and a
non-expired in trusted.gpg, verification will now fail directly
with the expired key in trusted.gpg.d and not try to fallback.

Likewise, if the key in trusted.gpg is expired, this will now
also be reported correctly again, instead of producing an error
message that the key could not be found.
</content>
</entry>
<entry>
<title>gpgv: Fix legacy fallback on unavailable keys</title>
<updated>2022-03-07T10:53:27Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-03-07T10:53:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ee427f308600a4a3a6f67a4a7835e1172605ba06'/>
<id>urn:sha1:ee427f308600a4a3a6f67a4a7835e1172605ba06</id>
<content type='text'>
If a repository is signed with multiple keys, apt 2.4.0 would
ignore the fallback result if some keys were still missing,
causing signature verification to fail.

Rework the logic such that when checking if fallback was "succesful",
missing keys are ignored - it only matters if we managed to verify
one key now, whether good or bad.

Likewise, simplify the logic when to do the fallback:

If there was a bad signature in trusted.gpg.d, do NOT fallback at all
- this is a minor security issue, as a key in trusted.gpg.d could
fail silently with a bad signature, and then a key in trusted.gpg
might allow the signature to succeed (as trusted.gpg.d key is then
missing).

Only fallback if we are missing a good signature, and there are
keys we have not yet checked.
</content>
</entry>
</feed>
