Hi Matt,

sorry about the long delay in this thread. I'd also like to apologize in
advance for being a nuisance, but apparently there are no other volunteers :).

Matt Zimmerman wrote on 18.01.2004 [Re: Release.gpg files gone?]:
> On Sun, Jan 18, 2004 at 06:30:11AM +0100, [EMAIL PROTECTED] wrote:
> 
> > If you use apt-secure, this will make 'apt-get update' fail to download
> > the Packages files (correctly, because the authenticity of the contents
> > cannot be verified), meaning you (well, I :-|) could not download packages
> > from woody.
> 
> This may have been the case with apt-secure, but this functionality is now
> merged into apt 0.6 (currently in experimental) in a different way which
> does not prevent downloads of unauthenticated packages altogether.  Instead,
> it requires confirmation.

While this may solve the problem you quoted, this was actually not my point
of interest, and I'm a bit surprised that obviously nobody shares my worries.

To reiterate:

I wrote on 18.01.2004 [Re: Release.gpg files gone?]:
> curiously, http://ftp-master.debian.org/ziyi_key_2004.asc contains key
> 0x1DB114E0 whereas the key-servers seem to contain key 0x63EFD949

Point 1:
There seems to be an incorrect key for [EMAIL PROTECTED] on the key
servers. Am I misinterpreting something? Is this not alarming? At the least:
where do I find the authoritative information on what key is the correct one?
I doubt many of us have met [EMAIL PROTECTED] personally, so how is the
web of trust supposed to work, supposing noone signs that key?

I remember reading something about the keyservers not being able to
correctly handle subkeys, but I believe this is not the source of this
confusion, though I would be relieved to find out that I am wrong :).

I am using gnupg 1.2.1-2 btw., which seems to be a sarge or sid download
which installed under woody without dependency problems.

Point 2:
> If ziyi_key_2003 (0x38C6029A) was replaced by ziyi_key_2003v2 (0x30B34DD5)
> after the server compromise, this indicates some concern that the private key
> may have been exposed. Would it then not be MANDATORY to re-sign all Release
> files with 2003v2 (or 2004 now)? After all, a signature with v1 provides NO
> security - either that or the replacement of the key was unnecessary.

With other words: woody's Release files are currently signed with a
potentially compromised key that has in any case expired. There is therefore
currently no way to verify the integrity of woody packages. I'm not looking
for a way to install unverified packages, I'm asking that the packages be
re-signed, or at least for an explanation why that is not deemed necessary.

Is that too much to ask? Is it that complicated? Am I asking in the wrong
place?

Regards,

Holger

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to