Re: [Rpm-maint] [rpm-software-management/rpm] Duplicate __debug_package causes problems for spec files directly using %debug_package (Issue #3290)

2024-09-10 Thread Panu Matilainen
Oh no, not another debuginfo issue... :see_no_evil: But okay, that new escaped global assumes that %debug_package is always invoked from the specpart thing. I didn't expect anything to manually invoke %debug_package except to override it, but of course something does - of course it does. So

[Rpm-maint] [rpm-software-management/rpm] The test cases of "rpm -e and verify colored files removed 2.{1, 2}" seem meaningless (Issue #3295)

2024-09-10 Thread xujing
Why are the following two test cases expected to fail? I see that the test case is introduced because of https://github.com/rpm-software-management/rpm/issues/1800. I think people expect to see that the test case is successfully executed (that is, "missing /usr/bin/hello" is displayed in the co

Re: [Rpm-maint] [rpm-software-management/rpm] rpm should not use short gpg key ids in messages (Issue #2403)

2024-09-10 Thread Panu Matilainen
Hashing by keyid is not an issue, assuming it to be an unique identifier is. We can teach the keyring to expect multiple keys per keyid instead, nothing in the API deals with keyids so this should be largely an internal matter. The gpg-pubkey entries are a bigger and more visible issue. -- Rep

Re: [Rpm-maint] [rpm-software-management/rpm] Update translations (c62a1f4)

2024-09-10 Thread Piotr Drąg
It looks like https://translate.fedoraproject.org/projects/rpm/rpm-l10n/en/ is using an up to date .pot file, but, for example, https://translate.fedoraproject.org/projects/rpm/rpm-l10n/pl/ is not. I guess something is not quite right with RPM’s Weblate configuration? -- Reply to this email di

[Rpm-maint] [rpm-software-management/rpm] RPM 4.20.0 RC2 released! (Discussion #3294)

2024-09-10 Thread Michal Domonkos
While RC1 just barely cooled off, a number of QoL fixes have landed upstream, some of which are too useful to miss the 4.20.0 window, so here goes RC2. This is the final planned RC so if no significant issues are found, we'll declare it final in the coming weeks. Most notably in this release,

[Rpm-maint] RPM 4.20.0 RC2 released!

2024-09-10 Thread Michal Domonkos
While RC1 just barely cooled off, a number of QoL fixes have landed upstream, some of which are too useful to miss the 4.20.0 window, so here goes RC2. This is the final planned RC so if no significant issues are found, we'll declare it final in the coming weeks. Most notably in this release, "%a

Re: [Rpm-maint] [rpm-software-management/rpm] Use long PGP Key IDs for all outputs (PR #3292)

2024-09-10 Thread Panu Matilainen
It's a different kind of invasive if the output keeps changing. One important thing here is that there needs to be a clear and easy mapping from the message(s) to what we import to the database, and vice versa. -- Reply to this email directly or view it on GitHub: https://github.com/rpm-softwa

Re: [Rpm-maint] [rpm-software-management/rpm] Use long PGP Key IDs for all outputs (PR #3292)

2024-09-10 Thread Neal H. Walfield
There's another option: we use fingerprints when available and long key IDs otherwise. I think this would be a less invasive change. What do you think? -- Reply to this email directly or view it on GitHub: https://github.com/rpm-software-management/rpm/pull/3292#issuecomment-2340504380 You are

Re: [Rpm-maint] [rpm-software-management/rpm] Use long PGP Key IDs for all outputs (PR #3292)

2024-09-10 Thread Panu Matilainen
We want to move to full fingerprint sure, but since it appears we can't do that without changes to rpm-sequoia (and the legacy parser) we might as well do this as an interim step to find out what exactly (if anything) breaks. It'll be a good while before the change (in either shape) hits the end

Re: [Rpm-maint] [rpm-software-management/rpm] RPM 4.20.0 RC2 (PR #3289)

2024-09-10 Thread Michal Domonkos
Merged #3289 into rpm-4.20.x. -- Reply to this email directly or view it on GitHub: https://github.com/rpm-software-management/rpm/pull/3289#event-14197455309 You are receiving this because you are subscribed to this thread. Message ID: ___ Rpm-maint

Re: [Rpm-maint] [rpm-software-management/rpm] Signing can leave an invalid digest behind if not verifying it (Issue #3291)

2024-09-10 Thread Panu Matilainen
That still prevents signing v4 content in FIPS mode, which seems somehow backwards. I don't think this is an urgent issue by any means, just an ugly wart that we'll want to deal with somehow going forward. Being explicit about it would be a start anyhow, the current silent behavior is nasty. -

Re: [Rpm-maint] [rpm-software-management/rpm] RPM 4.20.0 RC2 (PR #3289)

2024-09-10 Thread Panu Matilainen
#3280 is good to have in there to make signing with Sequoia nicer - that works fine in 4.20 already if you just configure it just so. -- Reply to this email directly or view it on GitHub: https://github.com/rpm-software-management/rpm/pull/3289#issuecomment-2340363632 You are receiving this beca

Re: [Rpm-maint] [rpm-software-management/rpm] rpm should not use short gpg key ids in messages (Issue #2403)

2024-09-10 Thread Florian Festi
Internally it looks like most places are just using the Key ID. Especially the rpmkeyring is using it as a key in the hash of all Pubkeys. If we don't have any hope to move that to Fingerprints as the v3 signatures won't offer them anyway, we might need to go down another route and just verify s

[Rpm-maint] [rpm-software-management/rpm] Don't consider MD5 and SHA1 when verifying packages (PR #3293)

2024-09-10 Thread Panu Matilainen
This is only a one-liner config change but with rather huge consequences. Details in the commits but this will render rpm content built with older than v4.14 unverifiable by digest only, and thus uninstallable, *by default*. Such content can still be verified by signatures though, so once we fli

Re: [Rpm-maint] [rpm-software-management/rpm] rpm should not use short gpg key ids in messages (Issue #2403)

2024-09-10 Thread Neal H. Walfield
> I am currently still digging through the backends to see what would be needed > to get them. The relevant function is `pgpDigParamsSignID`. Unfortunately, v3 signature packets don't include the fingerprint, but only the (long) key ID. In practice, this is only a hint: we only know that the

Re: [Rpm-maint] [rpm-software-management/rpm] Signing can leave an invalid digest behind if not verifying it (Issue #3291)

2024-09-10 Thread Neal H. Walfield
Thanks for the detailed explanation, @pmatilai. > If MD5 verification is disabled, then we'll merrily verify and sign a package > with corrupt MD5 hash, because that hash just isn't interesting to us What about refusing to sign if a disabled element is present? That is, if the package has an M

Re: [Rpm-maint] [rpm-software-management/rpm] Use long PGP Key IDs for all outputs (PR #3292)

2024-09-10 Thread Neal H. Walfield
If you are considering breaking the output format, then I would strongly encourage you to just use the full fingerprint. A key ID is only 64-bits. Happily, the security of key IDs does not depend on collision resistance, [which has already been demonstrated to be broken](https://nullprogram.co

Re: [Rpm-maint] [rpm-software-management/rpm] rpm should not use short gpg key ids in messages (Issue #2403)

2024-09-10 Thread Florian Festi
OK, sketched a patch for moving from short to long Key IDs in the messages: #3292. This is trivial to do but may be not trivial to deal with. Moving to Fingerprints is not quite as trivial. We do have the means to get Fingerprints from PGP keys but so far we lack that for signatures. I am curre

Re: [Rpm-maint] [rpm-software-management/rpm] RPM 4.20.0 RC2 (PR #3289)

2024-09-10 Thread Michal Domonkos
Yeah, there were many test & docs commits which aren't strictly necessary but then, won't hurt either. Except maybe #3280 isn't something we need in 4.20 right now, it also refactors stuff a bit, but it'll make backporting easier in this space, I guess. -- Reply to this email directly or view

[Rpm-maint] [rpm-software-management/rpm] Use long PGP Key IDs for all outputs (PR #3292)

2024-09-10 Thread Florian Festi
Here how dropping the Short PGP KEy IDs in favor of long ones would look like. We still need to discuss if this really is a change we want in this magnitue or if we need to keep the old behavior at some places. You can view, comment on, or merge this pull request online at: https://github.com/

Re: [Rpm-maint] [rpm-software-management/rpm] Add yet more file trigger tests (Issue #3272)

2024-09-10 Thread Panu Matilainen
Closed #3272 as completed via #3287. -- Reply to this email directly or view it on GitHub: https://github.com/rpm-software-management/rpm/issues/3272#event-14196505993 You are receiving this because you are subscribed to this thread. Message ID: ___ R

Re: [Rpm-maint] [rpm-software-management/rpm] Add test for spurious %transfiletriggerpostun runs (PR #3287)

2024-09-10 Thread Panu Matilainen
Merged #3287 into master. -- Reply to this email directly or view it on GitHub: https://github.com/rpm-software-management/rpm/pull/3287#event-14196505677 You are receiving this because you are subscribed to this thread. Message ID: ___ Rpm-maint mail

Re: [Rpm-maint] [rpm-software-management/rpm] RPM 4.20.0 RC2 (PR #3289)

2024-09-10 Thread Panu Matilainen
@pmatilai approved this pull request. That was a few more commits than I thought it would be, but some of the otherwise smallish fixes were multiple commits and then pulling these (like the CI update) does make sense. So, looks fine to me. -- Reply to this email directly or view it on GitHub

Re: [Rpm-maint] [rpm-software-management/rpm] Signing can leave an invalid digest behind if not verifying it (Issue #3291)

2024-09-10 Thread Panu Matilainen
That's basically what it does (refuse to sign if verification fails), but things get weird when you start disabling elements. I ran into this when disabling the verification of MD5 digests, related to #1292. If MD5 verification is disabled, then we'll merrily verify and sign a package with cor

Re: [Rpm-maint] [rpm-software-management/rpm] Signing can leave an invalid digest behind if not verifying it (Issue #3291)

2024-09-10 Thread Neal H. Walfield
If a signature header element is corrupted, otherwise invalid, or violates a policy, then the signer probably shouldn't be signing it. How about the following: if there are any signature header elements that can't be verified, `rpmsign` should complain and refuse to generate a sign. -- Reply

[Rpm-maint] [rpm-software-management/rpm] Signing can leave an invalid digest behind if not verifying it (Issue #3291)

2024-09-10 Thread Panu Matilainen
Signing can leave an invalid digest in the package if we're not verifying it, this seems broken: Steps to reproduce: 1. take hello-2.0-1.x86_64.rpm from the test-suite and corrupt its md5 hash in the signature header with `dd if=/dev/zero of=hello-2.0-1.x86_64.rpm conv=notrunc bs=1 seek=333 cou