On Tue, Feb 10, 2026 at 02:59:17PM +0100, kpcyrd wrote:
> On 2/10/26 12:21 PM, David Kalnischkies wrote:
> > > This is Sequoia's expected behavior provided the signature was created 
> > > before
> > > the key expiration. I don't think it's the most sensible notion but it's
> > > outside of our control, as long as we don't want to patch that in Debian
> > > to behave differently.
> > 
> > As can be seen by the debug output of our gpgv method gpgv actually has
> > similar behaviour (exit code 0) – it is the special handling in our gpgv
> > method that detects that gpgv produced a VALIDSIG, but not a GOODSIG (and
> > instead a EXPKEYSIG).
> > 
> > 
> > IF that is a desired property to be similar in this regard to gpgv is
> > something to be decided by upstream, but a feature request to enable
> > a mode that considers them bad enough to fail might be in order.
> > 
> > The idea here is that a repo with an expired key (think e.g. buster)
> > should not be used even if that repo was correctly signed back in the
> > day as the data the key signed is sort of expired by now, too.
> > 
> > (similar to our Valid-Until field… but that is not universally used)
> 
> 
> Does this really matter in praxis though?
> 
> The expiration date on PGP keys is often confused with the expiration on
> x509 certificates, which is a proper security control enforced through a 3rd
> party.
> 
> With OpenPGP keys the expiration date is quite literally a self-signed
> certificate, if the secret key is compromised you can arbitrarily issue new
> Type 9 Key Expiration Time Subpackets, including "0 (Unlimited)".

Yes but you cannot update the keys on existing APT clients; APT's key
store does not have facilities to update it over the network.

-- 
debian developer - deb.li/jak | jak-linux.org - free software dev
ubuntu core developer                              i speak de, en

Reply via email to