The update inadvertently disabled DSA signatures. We believed DSA
signatures (1) could not use SHA2 hashes and (2) were not trusted
anyway, but it seems that xenial, which is dual-signed with a DSA1024
bit key has a SHA512 DSA1024 signature and that is still considered
trusted.

This is causing the update-manager test suite to fail, which we missed
in oracular because the release pocket regressed at some point earlier,
so we never noticed it regressed when the apt changes landed there.

We can add >=dsa1024 back to the list of warning-only algorithms or
proceed with the update as is (and fix update-manager's test suite to
use the rsa key to verify xenial) which would be better from the
security posture stance.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073126

Title:
  More nuanced public key algorithm revocation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/2073126/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to