<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/methods, branch 2.4.2</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=2.4.2</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=2.4.2'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2022-03-07T12:04:23Z</updated>
<entry>
<title>gpgv: Use Valid instead of Good to determine fallback</title>
<updated>2022-03-07T12:04:23Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-03-07T12:03:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=55452afa1e8eb3b252f76e455b49df5883e0b811'/>
<id>urn:sha1:55452afa1e8eb3b252f76e455b49df5883e0b811</id>
<content type='text'>
Change the logic to use "Valid" instead of "Good" to determine
whether we need to fallback and if fallback was successful. That
means that if you have an expired key in trusted.gpg.d, and a
non-expired in trusted.gpg, verification will now fail directly
with the expired key in trusted.gpg.d and not try to fallback.

Likewise, if the key in trusted.gpg is expired, this will now
also be reported correctly again, instead of producing an error
message that the key could not be found.
</content>
</entry>
<entry>
<title>gpgv: Fix legacy fallback on unavailable keys</title>
<updated>2022-03-07T10:53:27Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-03-07T10:53:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ee427f308600a4a3a6f67a4a7835e1172605ba06'/>
<id>urn:sha1:ee427f308600a4a3a6f67a4a7835e1172605ba06</id>
<content type='text'>
If a repository is signed with multiple keys, apt 2.4.0 would
ignore the fallback result if some keys were still missing,
causing signature verification to fail.

Rework the logic such that when checking if fallback was "succesful",
missing keys are ignored - it only matters if we managed to verify
one key now, whether good or bad.

Likewise, simplify the logic when to do the fallback:

If there was a bad signature in trusted.gpg.d, do NOT fallback at all
- this is a minor security issue, as a key in trusted.gpg.d could
fail silently with a bad signature, and then a key in trusted.gpg
might allow the signature to succeed (as trusted.gpg.d key is then
missing).

Only fallback if we are missing a good signature, and there are
keys we have not yet checked.
</content>
</entry>
<entry>
<title>Warn if the legacy trusted.gpg keyring is used for verification</title>
<updated>2022-02-22T17:25:06Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-01-07T11:43:32Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=56adf743b02b80a9acc9a2e480bfd15acb94f755'/>
<id>urn:sha1:56adf743b02b80a9acc9a2e480bfd15acb94f755</id>
<content type='text'>
With apt-key going away, people need to manage key files, rather
than keys, so they need to know if any keys are in the legacy keyring.
</content>
</entry>
<entry>
<title>Spelling fixes</title>
<updated>2021-11-27T10:22:38Z</updated>
<author>
<name>Ville Skyttä</name>
<email>ville.skytta@iki.fi</email>
</author>
<published>2021-11-03T22:08:07Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=01eed4234440d82fc52c8186cf4268517bcd28bc'/>
<id>urn:sha1:01eed4234440d82fc52c8186cf4268517bcd28bc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>basehttp: Rename HaveContent's Tristate</title>
<updated>2021-11-23T19:19:23Z</updated>
<author>
<name>Cameron Katri</name>
<email>me@cameronkatri.com</email>
</author>
<published>2021-11-23T19:19:23Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=6f35750118a06e9d11e6aa7ab29f4ef01b75898b'/>
<id>urn:sha1:6f35750118a06e9d11e6aa7ab29f4ef01b75898b</id>
<content type='text'>
Darwin systems define TRUE and FALSE as preprocessor macros for use with
bool. This conflicts with the enum values causing the compilation to
fail.
</content>
</entry>
<entry>
<title>Add support for embedding PGP keys into Signed-By in deb822 sources</title>
<updated>2021-10-18T14:12:54Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>julian.klode@canonical.com</email>
</author>
<published>2021-06-09T11:22:38Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=3f07f5345ec79702c3c769047452041b2c12953f'/>
<id>urn:sha1:3f07f5345ec79702c3c769047452041b2c12953f</id>
<content type='text'>
Extend the Signed-By field to handle embedded public key blocks,
this allows shipping self-contained .sources files, making it
substantially easier to provide third party repositories.
</content>
</entry>
<entry>
<title>Merge branch 'pu/content-length-0' into 'main'</title>
<updated>2021-10-18T13:42:56Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2021-10-18T13:42:56Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ad7bae309a827592aa228af9470c1aa7abdd189e'/>
<id>urn:sha1:ad7bae309a827592aa228af9470c1aa7abdd189e</id>
<content type='text'>
basehttp: Turn HaveContent into a TriState

See merge request apt-team/apt!179</content>
</entry>
<entry>
<title>Merge branch 'pu/ifrange' into 'main'</title>
<updated>2021-10-18T13:37:47Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2021-10-18T13:37:47Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=efa3528de4277a3d5195c5ce875e7ee960726239'/>
<id>urn:sha1:efa3528de4277a3d5195c5ce875e7ee960726239</id>
<content type='text'>
Add AllowRange option to disable HTTP Range usage

See merge request apt-team/apt!188</content>
</entry>
<entry>
<title>Disable HTTP Range usage if varnish &lt; 6.4 is involved</title>
<updated>2021-09-16T20:40:00Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2021-09-16T17:48:33Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=d013f8957c0d464e0059cc107ca79d887cf9f8aa'/>
<id>urn:sha1:d013f8957c0d464e0059cc107ca79d887cf9f8aa</id>
<content type='text'>
Debian buster (oldstable) ships 6.1 while bullseye (stable) ships 6.5
and so the later is 'fixed'. Upstream declares 6.0 still as supported.
It might be still a while we encounter "bad" versions in the wild, so
if we can detect and work around the issue at runtime automatically we
can save some users from running into "persistent" partial files.

References: https://varnish-cache.org/docs/6.4/whats-new/changes-6.4.html#changes-in-behavior
</content>
</entry>
<entry>
<title>Add AllowRange option to disable HTTP Range usage</title>
<updated>2021-09-16T20:38:46Z</updated>
<author>
<name>David Kalnischkies</name>
<email>david@kalnischkies.de</email>
</author>
<published>2021-09-16T17:33:24Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=61c1d7d3658fdcd4b32f8b071cef7941120f8abc'/>
<id>urn:sha1:61c1d7d3658fdcd4b32f8b071cef7941120f8abc</id>
<content type='text'>
apt makes heavy usage of HTTP1.1 features including Range and If-Range.
Sadly it is not obvious if the involved server(s) (and proxies) actually
support them all. The Acquire::http::AllowRange option defaults to true
as before, but now a user can disable Range usage if it is known that
the involved server is not dealing with such requests correctly.
</content>
</entry>
</feed>
