[ dropping the gnupg bug and d-rele...@l.d.o from To:/CC: since this
  mail does not seem to be relevant there ]

* Philipp Kern [2010-08-22 11:24 +0200]:
> On 08/22/2010 12:46 AM, Carsten Hey wrote:
> >By removing the (currently indirect) apt dependencies on gnupg and
> >libusb-0.1-4 and making apt depend on gpgv (or gpgv | gpgv-tiny)
> >instead, 5272 kB could be saved.  There are ways to accomplish this for
> >Squeeze+1, how it could be done seems to be nothing that needs to be
> >discussed before Squeeze is released.
>
> Please note that, due to how apt currently handles keyrings, you do
> need a full gnupg available to run apt-key.  The use of gpgv is only
> implemented in the installer, as it uses only one keyring file.  An
> alternative might be looping over several keyrings using gpgv, to
> verify the signature, instead of using a large one.  But this wasn't
> implemented yet, of course.

This seems to be a good approach :)


Just for the record, a few thoughts that might be relevant to fix this
bug post-squeeze and summarising part of what already had been said:

 * apt itself uses gpgv, but apt-key needs a full gnupg to be available.
   In Squeeze apt and debian-archive-keyring will (presumably) depend on
   gnupg which makes dropping both dependencies on gnupg in Squeeze+1
   easier.

 * One can pass multiple keyrings to gpgv on commandline.

 * apt 0.7.25.1 adds /etc/apt/trusted.gpg.d and all keyrings found there
   are passed to gpgv.  This directory is used by apt-key and apt itself
   (see SigVerify::RunGPGV in indexcopy.cc).

   apt-key(1) says:

   | /etc/apt/trusted.gpg.d/
   |
   |   File fragments for the trusted keys, additional keyrings can be
   |   stored here (by other packages or the administrator).
   |   Configuration Item Dir::Etc::TrustedParts.

   Instead of calling apt-key in postinst one could place packaged
   keyrings in such a directory.

 * Placing packaged keyrings in, e.g., /var/lib/apt/trusted.gpg.d/ might
   be preferable to using /etc/; on the other side, above-mentioned
   description sounds like /etc/ is intended to be used for this.

 * apt-key uses /var/lib/apt/keyrings/ to read master keys in its
   net-update subcommand.

 * Ubuntu's upgrade path also could be ensured to be clean, maybe one
   could ask their stable release managers to add proper dependencies to
   their stable releases.


This is unrelated, but filing a bug for something that is probably by
intention (to make apt's ability to be able to verify signatures less
fragile) did not sound useful.  debian-archive-keyring does not remove
the key in its prerm, unlike debian-backports-keyring:

| case "$1" in
|     remove|purge)
|         if [ -x /usr/bin/apt-key ]; then
|                 /usr/bin/apt-key del 12345678
|         fi
|         ;;
| esac


Regards
Carsten



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to