Re: Questioning debian/upstream/signing-key.asc

2021-04-07 Thread Guillem Jover
Hi! On Fri, 2021-04-02 at 13:38:51 +0200, Guillem Jover wrote: > On Fri, 2021-03-26 at 10:13:25 +0100, Christoph Biedl wrote: > > However, I uncertain whether is really worth the efforts to maintain > > d/u/s-k, or more precisely, ping maintainers to do so. Personally, I > > really like it when us

Re: Questioning debian/upstream/signing-key.asc

2021-04-02 Thread Guillem Jover
[ CCing Daniel. ] On Fri, 2021-03-26 at 17:31:16 +0100, Ansgar wrote: > On Fri, 2021-03-26 at 09:06 -0700, Russ Allbery wrote: > > I'm not all that familiar with the intended semantics of OpenPGP key > > expirations, but intuitively I think a signature made before the > > expiration should be cons

Re: Questioning debian/upstream/signing-key.asc

2021-04-02 Thread Guillem Jover
Hi! [ Ccing Daniel, as he proposed the shipping of upstream signatures, so leaving full context. ] On Fri, 2021-03-26 at 10:13:25 +0100, Christoph Biedl wrote: > a few days ago, I ran uscan on a package where I knew there was a new > upstream version - just to encounter an validation error sinc

Re: Questioning debian/upstream/signing-key.asc

2021-03-27 Thread Paul Wise
On Fri, Mar 26, 2021 at 9:15 PM Timo Röhling wrote: > It's the same for me: the only package I maintain where upstream signs their > releases is the package where I am also the author. And I really don't think > that it provides any additional value for Debian in this particular > constellation; I

Re: Questioning debian/upstream/signing-key.asc

2021-03-27 Thread Andreas Metzler
On 2021-03-26 Christoph Biedl wrote: > a few days ago, I ran uscan on a package where I knew there was a new > upstream version - just to encounter an validation error since the > keys in debian/upstream/signing-key.asc had expired. [...] > Another about 40 distinct keys will expire within the nex

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Christoph Biedl
Russ Allbery wrote... > I think there's a bit of subtlety here in that if upstream uses a key with > an expiration that they periodically extend (to provide a time-based > cut-off if they lose control of the key for whatever reason, for > instance), and that package is rarely updated because it's

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Russ Allbery
Timo Röhling writes: > * Russ Allbery [2021-03-26 13:01]: >> If this were the case, it would be fine to re-sign *.dsc files, but >> there has been quite a lot of opposition to that in the past. The >> upstream signing key is at least as useful as the signature on the >> *.dsc file, for exactly

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Timo Röhling
* Russ Allbery [2021-03-26 13:01]: Personally, I'd be happy to drop the upstream signing keys from all of my packages and save a bit of work. I never use them as the package maintainer because I'm the only upstream of my packaging that signs packages, and therefore I already know the tarballs a

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Timo Röhling
* Russ Allbery [2021-03-26 13:01]: If this were the case, it would be fine to re-sign *.dsc files, but there has been quite a lot of opposition to that in the past. The upstream signing key is at least as useful as the signature on the *.dsc file, for exactly the same reasons. I do not underst

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Russ Allbery
Timo Röhling writes: > Once the package has been uploaded, it does no longer make a difference > whether or not the upstream package was signed in the first place: any > package will be protected by the Debian archive keys anyway. If this were the case, it would be fine to re-sign *.dsc files, b

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Jeremy Stanley
On 2021-03-26 09:35:31 -0700 (-0700), Russ Allbery wrote: [...] > We do have a trusted timestamp for the point at which the upstream > tarball and signature were uploaded to the Debian archive, though, > so if the key had not yet expired at that point, I think we can > infer it wasn't expired when

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Timo Röhling
* Russ Allbery [2021-03-26 09:35]: We do have a trusted timestamp for the point at which the upstream tarball and signature were uploaded to the Debian archive, though, so if the key had not yet expired at that point, I think we can infer it wasn't expired when the signature was made. Once the

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Russ Allbery
Ansgar writes: > On Fri, 2021-03-26 at 09:06 -0700, Russ Allbery wrote: >> I'm not all that familiar with the intended semantics of OpenPGP key >> expirations, but intuitively I think a signature made before the >> expiration should be considered valid, even if the key has now expired >> and thus

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Ansgar
On Fri, 2021-03-26 at 09:06 -0700, Russ Allbery wrote: > I'm not all that familiar with the intended semantics of OpenPGP key > expirations, but intuitively I think a signature made before the > expiration should be considered valid, even if the key has now > expired and thus shouldn't be used to m

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Russ Allbery
Christoph Biedl writes: > Of course I understand there are various reasons why this happens, and > several are not the maintainer's fault. But at least in some cases it's > obvious the maintainers didn't care: When there has been an upload with > a new upstream version released after the expirati

Re: Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Christoph Biedl
Christoph Biedl wrote... > PS: Those who want to argue lintian should for check for such expired > key, I couldn't agree more. Please read the discussion in #985793 first. Sorry, that should have been #964971. signature.asc Description: PGP signature

Questioning debian/upstream/signing-key.asc

2021-03-26 Thread Christoph Biedl
Hello, a few days ago, I ran uscan on a package where I knew there was a new upstream version - just to encounter an validation error since the keys in debian/upstream/signing-key.asc had expired. After that, things escalated a little, and eventually I wrote a script that downloads d/u/s-k for ea