Open Fabian-Gruenbichler opened 6 hours ago
For more context, see https://github.com/rust-lang/rustup/issues/3185 and its fixes https://blog.rust-lang.org/2023/02/01/Rustup-1.25.2.html, https://github.com/rust-lang/rustup/pull/3186
thanks for the context - maybe it is time to tackle this 1,5 years later, without the time pressure of needing to rollout a fix for failing validation in rustup? more and more software doing the validation will reject SHA-1 (at least by default, I know the policy is overridable)..
Hi!
Debian is currently evaluating switching apt/gpgv over to a gpgv implementation backed by Sequoia instead of gnupg. While test-driving that on my machine, while working on preparing the rustc 1.83 update, which entails downloading and verifying the upstream rustc-src tarball, I noticed that the rustc release signing key fails the default policy of Sequoia, which doesn't accept current signatures derived directly or transitively from SHA-1.
While it's easy enough to work around locally, I thought I'd report it anyway in case you want to update those signatures to a better cryptographic hash algorithm.
Here's the output of
sq cert lint <public key>
(there also is a--fix
parameter, which should regenerate those signatures with better algorithms, but that of course requires access to the corresponding private key material which I lack):note the lines ending with
(BAD)
that all point to the same underlying issue - the subkeys being bound via SHA-1 signatures.apologies if this is the wrong channel to report such issues, feel free to forward it or redirect me to a more appropriate venue!