Closed Genesys05 closed 3 years ago
Devil's advocate: should we not also actively distrust (and remove from the bundle) the current key, where Hashicorp says that all of the existing binaries have been resigned? We know the old key can now be used to sign releases, and while they say there's no sign that this was done, it might be a defense-in-depth strategy to no longer validate said key.
Devil's advocate: should we not also actively distrust (and remove from the bundle) the current key, where Hashicorp says that all of the existing binaries have been resigned? We know the old key can now be used to sign releases, and while they say there's no sign that this was done, it might be a defense-in-depth strategy to no longer validate said key.
I'm totally agree with you.
Hashicorp have resign only last release of each branch:
I have add this key and not remove old key to avoid breaking change on "tfenv" usage but i can change that.
In security bulletin we have this section:
What was the timeline?
HashiCorp rotated and revoked the exposed GPG key, re-signed the majority of existing product releases with the new GPG key, and published a public security bulletin on April 22, 2021.
HashiCorp released updated Terraform binaries with updated GPG keys on April 26, 2021.
I think that we have two solutions:
I can drop old certificate and replace it by new certificate (Better mechanism)
I can add old and new certificate (Actual mechanism)
Hashicorp has changed pgp key because old key has been compromised.
Link: https://discuss.hashicorp.com/t/hcsec-2021-12-codecov-security-event-and-hashicorp-gpg-key-exposure/23512
This PR is important because tfenv does not work with "gpgv verification" activation on terraform release since 26/04/21.
No breaking change: New "hashicorp-keys.pgp " file contain old key (Old releases are sign with this key) and new key (New releases since 26/04/21 are sign with this key).
Commands used:
Old hashicorp-keys.pgp file:
New hashicorp-keys.pgp file:
Issues Reference fix by this PR
259