Dropping Joel as I don't want to spam him.

On Mon, 2025-03-17 at 18:05 +0530, Ritesh Raj Sarraf wrote:
> > 
> > You might be workaround this by using an older dupload/dput, which 
> > still uses gpg, or maybe by changing the crypto policy [1].
> > 
> > There might also be a possibility to update your key to use a 
> > stronger hash (using sqv). However I don't know what effect this
> > has 
> > on your key in the Debian ecosystem.
> 
> `dput` has not been kind to me at all. Neither dput nor dput-ng,
> given
> that the issue has something to do with the ftp-mode.
> 
> 
> Thankfully I've been able to unblock myself with dupload.
> 
> @ dupload --skip-hooks openpgp-check bpfcc_0.31.0+ds-5_source.changes
> dupload note: no announcement will be sent.
> dupload: warning: skipping pre-upload changes hook
> /usr/share/dupload/openpgp-check %1
> Checking Debian transitions for bpfcc...
>   Ok, not found in any.
> Uploading (scpb) to
> ssh.upload.debian.org:/srv/upload.debian.org/UploadQueue/
> [ Preparing job bpfcc_0.31.0+ds-5_source from bpfcc_0.31.0+ds-
> 5_source.changes
>  bpfcc_0.31.0+ds-5.debian.tar.xz, size ok, md5sum ok, sha1sum ok,
> sha256sum ok
>  bpfcc_0.31.0+ds-5.dsc, size ok, md5sum ok, sha1sum ok, sha256sum ok
>  bpfcc_0.31.0+ds-5_source.buildinfo, size ok, md5sum ok, sha1sum ok,
> sha256sum ok
>  bpfcc_0.31.0+ds-5_source.changes ok ]
> Uploading (scpb) to debian-ssh (ssh.upload.debian.org)
> [ Uploading job bpfcc_0.31.0+ds-5_source
>  bpfcc_0.31.0+ds-5.debian.tar.xz 22.5 kB, uploading
>  bpfcc_0.31.0+ds-5.dsc 2.8 kB, uploading
>  bpfcc_0.31.0+ds-5_source.buildinfo 9.3 kB, uploading
>  bpfcc_0.31.0+ds-5_source.changes 2.2 kB, uploading
>  ]
> 
> 
> And this upload was signed after the cleansing of the keys from the
> SHA1 algo signatures. So it should be a good test validation if it
> passes the ftpmaster's checks.


Hello,

Back again with my current status. So as I mentioned I was able to
manage to upload to ftp-master. But I'm getting no usual email
response, whether the package is accepted or rejected, like we all
usually do.

My guess is that my keys in the debian-keyring might still be using the
old outdated sha1 keys. I'm going to wait for some more time before I
file an email request with the Debian RT team.

I did fix my keys and validated them. And uploaded them but possibly
the debian-keyring in use for ftp-master package clearance, may not be
having it yet.


@ gpg --export-secret-key F00A2BE6 | sq cert lint --fix
Waiting for OpenPGP certificates on stdin...
Examined 1 certificate.
  0 certificates are invalid and were not linted. (GOOD)
  1 certificate was linted.
  0 of the 1 certificates (0%) have at least one issue. (GOOD)
0 of the linted certificates were revoked.
  0 of the 0 certificates has revocation certificates that are weaker than the 
certificate and should be recreated. (GOOD)
0 of the linted certificates were expired.
1 of the non-revoked linted certificate has at least one non-revoked User ID:
  0 have at least one User ID protected by SHA-1. (GOOD)
  0 have all User IDs protected by SHA-1. (GOOD)
1 of the non-revoked linted certificates has at least one non-revoked, live 
subkey:
  0 have at least one non-revoked, live subkey with a binding signature that 
uses SHA-1. (GOOD)
1 of the non-revoked linted certificates has at least one non-revoked, live, 
signing-capable subkey:
  0 certificates have at least one non-revoked, live, signing-capable subkey 
with a strong binding signature, but a backsig that uses SHA-1. (GOOD)

@ gpg --export F00A2BE6 | sq cert lint --fix
Examined 1 certificate.
  0 certificates are invalid and were not linted. (GOOD)
  1 certificate was linted.
  0 of the 1 certificates (0%) have at least one issue. (GOOD)
0 of the linted certificates were revoked.
  0 of the 0 certificates has revocation certificates that are weaker than the 
certificate and should be recreated. (GOOD)
0 of the linted certificates were expired.
1 of the non-revoked linted certificate has at least one non-revoked User ID:
  0 have at least one User ID protected by SHA-1. (GOOD)
  0 have all User IDs protected by SHA-1. (GOOD)
1 of the non-revoked linted certificates has at least one non-revoked, live 
subkey:
  0 have at least one non-revoked, live subkey with a binding signature that 
uses SHA-1. (GOOD)
1 of the non-revoked linted certificates has at least one non-revoked, live, 
signing-capable subkey:
  0 certificates have at least one non-revoked, live, signing-capable subkey 
with a strong binding signature, but a backsig that uses SHA-1. (GOOD)
-- 
Ritesh Raj Sarraf | http://people.debian.org/~rrs
Debian - The Universal Operating System

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to