<feed xmlns='http://www.w3.org/2005/Atom'>
<title>apt/test/integration/test-method-gpgv-legacy-keyring, branch 2.7.4</title>
<subtitle>Debians commandline package manager</subtitle>
<id>https://git.kalnischkies.de/apt/atom?h=2.7.4</id>
<link rel='self' href='https://git.kalnischkies.de/apt/atom?h=2.7.4'/>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/'/>
<updated>2022-03-07T10:53:27Z</updated>
<entry>
<title>gpgv: Fix legacy fallback on unavailable keys</title>
<updated>2022-03-07T10:53:27Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-03-07T10:53:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=ee427f308600a4a3a6f67a4a7835e1172605ba06'/>
<id>urn:sha1:ee427f308600a4a3a6f67a4a7835e1172605ba06</id>
<content type='text'>
If a repository is signed with multiple keys, apt 2.4.0 would
ignore the fallback result if some keys were still missing,
causing signature verification to fail.

Rework the logic such that when checking if fallback was "succesful",
missing keys are ignored - it only matters if we managed to verify
one key now, whether good or bad.

Likewise, simplify the logic when to do the fallback:

If there was a bad signature in trusted.gpg.d, do NOT fallback at all
- this is a minor security issue, as a key in trusted.gpg.d could
fail silently with a bad signature, and then a key in trusted.gpg
might allow the signature to succeed (as trusted.gpg.d key is then
missing).

Only fallback if we are missing a good signature, and there are
keys we have not yet checked.
</content>
</entry>
<entry>
<title>Warn if the legacy trusted.gpg keyring is used for verification</title>
<updated>2022-02-22T17:25:06Z</updated>
<author>
<name>Julian Andres Klode</name>
<email>jak@debian.org</email>
</author>
<published>2022-01-07T11:43:32Z</published>
<link rel='alternate' type='text/html' href='https://git.kalnischkies.de/apt/commit/?id=56adf743b02b80a9acc9a2e480bfd15acb94f755'/>
<id>urn:sha1:56adf743b02b80a9acc9a2e480bfd15acb94f755</id>
<content type='text'>
With apt-key going away, people need to manage key files, rather
than keys, so they need to know if any keys are in the legacy keyring.
</content>
</entry>
</feed>
