[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-05-28 Thread Launchpad Bug Tracker
This bug was fixed in the package apt - 2.8.3 --- apt (2.8.3) noble; urgency=medium * Revert increased key size requirements from 2.8.0-2.8.2 (LP: #2073126) - Revert "Only install 00-temporary-rsa1024 for >=2.7.6 and improve comment" - Revert "Only warn about =2.7.6 and impr

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-05-28 Thread Julian Andres Klode
Removing block-proposed-noble as update-manager and apt are both ready to release now, having just verified update-manager/oracular. ** Tags removed: block-proposed-noble -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.la

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-04-25 Thread Julian Andres Klode
I first upgraded apt, libapt-pkg6.0t64 to 2.8.3. Validation for RSA1024 remaining weak: root@noble:~# gpg --quick-gen-key j...@debian.org rsa1024 gpg: directory '/root/.gnupg' created gpg: keybox '/root/.gnupg/pubring.kbx' created We need to generate a lot of random bytes. It is a good idea to

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-04-23 Thread Seth Arnold
Already in 2015 the nice folks at https://weakdh.org/ were hypothesizing that 1024 bit DSA was unsafe against very well resourced attackers. We have to draw a line somewhere, and we might as well draw it here, today. Affected parties can modify their APT configuration, right? I'm fine regressing d

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-04-23 Thread Julian Andres Klode
The update inadvertently disabled DSA signatures. We believed DSA signatures (1) could not use SHA2 hashes and (2) were not trusted anyway, but it seems that xenial, which is dual-signed with a DSA1024 bit key has a SHA512 DSA1024 signature and that is still considered trusted. This is causing the

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-04-05 Thread Julian Andres Klode
The level has changed: Algorithms missing in "APT::Key::Assert-Pubkey-Algo" cause errors now, whereas algorithms in "APT::Key::Assert-Pubkey-Algo::Next" cause warnings. Accordingly, the values were moved around such that "APT::Key::Assert-Pubkey-Algo::Next" matches the old APT::Key::Assert-Pubke

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-27 Thread Seth Arnold
Ah, sorry about neglecting the other curves here. I'm much less concerned about the curve changes. Someone who chooses these curves has thought about it and made their choice. Someone who is on RSA1024 might not know that they're on the "very best of y2k" playlist. The NSA may have suggested every

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-27 Thread Andreas Hasenack
So to summarize, and please confirm or deny my understanding below, comparing to 2.7.14build2 which is current noble release+updates: - Assert-Pubkey-Algo reintroduces >= rsa1024 (was rsa2048), and allows more nist curves[1]. It's downgrading the RSA key size to 1024. - there is no error whatsoev

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-26 Thread Andreas Hasenack
Thanks @Seth! Your comment #18 seems to have focused mostly on the RSA keys, did you get a chance to also look at the new NIST, brainpoolP, and secp algorithms that were added/swapped around? From the table in comment #22 (also comment #20), looks like another change is that NIST P-{256,384,512} in

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-26 Thread Andreas Hasenack
Here is a screenshot of the document from comment #20 ** Attachment added: "apt-security-levels.png" https://bugs.launchpad.net/ubuntu/+source/apt/+bug/2073126/+attachment/5867457/+files/apt-security-levels.png -- You received this bug notification because you are a member of Ubuntu Bugs, wh

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-25 Thread Andreas Hasenack
I tested with (only changed rsa from the defaults): APT::Key::Assert-Pubkey-Algo ">=rsa2048,ed25519,ed448,nistp256,nistp384,nistp512,brainpoolP256r1,brainpoolP320r1,brainpoolP384r1,brainpoolP512r1,secp256k1"; APT::Key::Assert-Pubkey-Algo::Next ">=rsa5120,ed25519,ed448,nistp256,nistp384,nistp512";

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-25 Thread Seth Arnold
Ah, thank you both Andreas and Julian for working with me to understand these changes better. If we're already supporting rsa1024 in noble, that would explain why we haven't seen a deluge of support requests around it. Fair. Tightening it in an update a year later, absent impressive news, would be

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-25 Thread Julian Andres Klode
Put the security levels (noble release vs unapproved vs oracular) into a table in https://docs.google.com/document/d/1rIREl1ebAoJXyqjig5MlV1-Jae9EREcApuVMlKT1whQ/edit?tab=t.0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bug

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-25 Thread Andreas Hasenack
> I don't understand why today is the right day to allow weaker RSA keys. I don't think that changed. To recap (and these changes are confusing, yes, but this is my understanding of the final result): # Noble release - there is only one list of crypto algorithms: Assert-Pubkey-Algo - anything NOT

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-24 Thread Seth Arnold
Thanks for your summary, Andreas, I found it very helpful. This guide appeared to be the newest from NIST that I could find on the topic of key lengths https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar3.ipd.pdf -- page 21 (marked 11 on the page) appears to say n=1024 is still

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-21 Thread Andreas Hasenack
@ubuntu-security, could I please get your take on the changes introduced by this SRU? I believe I summarized them in comment #16 (unless @juliank chimes in with a correction!). It's basically the list of crypto algorithms that need checking. RSA1024 still triggers a "weak key" warning. https://

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-21 Thread Andreas Hasenack
So from my understanding, these are the big changes in this SRU, regarding the crypto config. a) Algorithms MISSING from Assert-Pubkey-Algo are now treated as an ERROR, whereas before (noble release) they were WARNINGS; b) The list of algorithms in Assert-Pubkey-Algo changed: ">=rsa2048,ed2551

[Bug 2073126] Re: More nuanced public key algorithm revocation

2025-03-21 Thread Andreas Hasenack
> Algorithms missing in "APT::Key::Assert-Pubkey-Algo" cause errors now, > whereas algorithms in > "APT::Key::Assert-Pubkey-Algo::Next" cause warnings. The word "missing" is, er, missing, in the second part of that sentence, right? The full correct sentence is (diff capitalized by me): Algori

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-10-23 Thread Julian Andres Klode
** Description changed: - (This is uploaded to noble as 2.8.1 per - https://wiki.ubuntu.com/AptUpdates) + (Please see https://wiki.ubuntu.com/AptUpdates for the versioning) [Impact] - We have received feedback from users that use NIST-P256 keys for their repositories that are upset about rec

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-19 Thread Julian Andres Klode
** Changed in: apt (Ubuntu Noble) Milestone: ubuntu-24.04.1 => None -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073126 Title: More nuanced public key algorithm revocation To manage notificat

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-15 Thread Julian Andres Klode
** Description changed: (This is uploaded to noble as 2.8.1 per https://wiki.ubuntu.com/AptUpdates) [Impact] We have received feedback from users that use NIST-P256 keys for their repositories that are upset about receiving a warning. APT 2.8.0 in noble-proposed would bump the warning

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-06 Thread Launchpad Bug Tracker
This bug was fixed in the package apt - 2.9.7 --- apt (2.9.7) unstable; urgency=medium [ sid ] * Show installed version (not candidate version) while removing a package [ David Kalnischkies ] * Parse snapshot option for apt show/list (Closes: #1075819) [ Frans Spiesschaert

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-06 Thread Timo Aaltonen
** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073126 Title: More nuanced public key algorithm revocation To manage notifications about this bug go to: https://bugs.

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-02 Thread Andreas Hasenack
** Tags added: block-proposed-noble -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073126 Title: More nuanced public key algorithm revocation To manage notifications about this bug go to: https://b

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-02 Thread Timo Aaltonen
this upload is not to be accepted to -updates before the discussion on ubuntu-release@ is concluded ** Tags added: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073126 Title: More n

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-02 Thread Timo Aaltonen
Hello Julian, or anyone else affected, Accepted apt into noble-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/apt/2.8.1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Tes

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-08-02 Thread Julian Andres Klode
** Description changed: + (This is uploaded to noble as 2.8.1 per + https://wiki.ubuntu.com/AptUpdates) + [Impact] We have received feedback from users that use NIST-P256 keys for their repositories that are upset about receiving a warning. APT 2.8.0 in noble-proposed would bump the warning

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-07-30 Thread Julian Andres Klode
** Description changed: [Impact] We have received feedback from users that use NIST-P256 keys for their repositories that are upset about receiving a warning. APT 2.8.0 in noble-proposed would bump the warning to an error, breaking them. We also revoked additional ECC curves, which may

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-07-30 Thread Julian Andres Klode
** Changed in: apt (Ubuntu Oracular) Status: New => Fix Committed ** Tags added: regression-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073126 Title: More nuanced public key algo

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-07-15 Thread Julian Andres Klode
** Description changed: [Impact] We have received feedback from users that use NIST-P256 keys for their repositories that are upset about receiving a warning. APT 2.8.0 in noble-proposed would bump the warning to an error, breaking them. We also revoked additional ECC curves, which may

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-07-15 Thread Julian Andres Klode
** Description changed: [Impact] We have received feedback from users that use NIST-P256 keys for their repositories that are upset about receiving a warning. APT 2.8.0 in noble-proposed would bump the warning to an error, breaking them. + + We also revoked additional ECC curves, which may

[Bug 2073126] Re: More nuanced public key algorithm revocation

2024-07-15 Thread Julian Andres Klode
** Description changed: - APT 2.9.x and 2.8.0 revoke any of the non-asserted algorithms, we should - modify the mechanism such that only RSA1024 is raised to an error to - avoid unwanted regressions while still keeping the set of fully - supported algorithms small. + [Impact] + We have received fe