[Rpm-maint] [rpm-software-management/rpm] Ignore most unhashed subpackets in OpenPGP signatures (Issue #1886)

Justus Winter notifications at github.com
Mon Jan 17 14:31:43 UTC 2022


> Agreed. I would go further and reject a signature that has a subpacket which cannot validly be in the unhashed section.

I think that is too far.  At the very least, allow unknown and private subpackets there, as they may be self-authenticating.

> Is there ever a reason to have an embedded signature in a type 0 or type 1 signature? The only use-case I can think of is timestamping.

The predominant use case are primary key binding signatures, but RPM doesn't want to even attempt to canonicalize certificates.  Timestamping is a great use case though :) But, for timestamping purposes, we'd want the signature to end up in the hashed subpacket area.

> At the very least, an embedded signature must not also have an embedded signature to avoid recursion.

That is only interesting if you actually attempt to verify the embedded signature.  I don't see RPM doing that anytime soon.  First, they don't want to canonicalize certs.  Second, for timestamping purposes you'd need the certificate of the timestamping entity.  That requires non-local reasoning, and I don't see that on the horizon either, given the state of RPM's OpenPGP implementation.

-- 
Reply to this email directly or view it on GitHub:
https://github.com/rpm-software-management/rpm/issues/1886#issuecomment-1014606583
You are receiving this because you are subscribed to this thread.

Message ID: <rpm-software-management/rpm/issues/1886/1014606583 at github.com>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.rpm.org/pipermail/rpm-maint/attachments/20220117/ad5082ef/attachment.html>


More information about the Rpm-maint mailing list