LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Slackware (https://www.linuxquestions.org/questions/slackware-14/)
-   -   Slackware 14.0 GPG-KEY (https://www.linuxquestions.org/questions/slackware-14/slackware-14-0-gpg-key-4175424073/)

aaarnt 08-26-2012 11:50 AM

Slackware 14.0 GPG-KEY
 
I´m happy we are almost there for a new version, but...

Wouldn't it be better if we had a renewed/new GPG-KEY to sign Slackware 14.0 packages?

** The current GPG-KEY is from 2003 and will expire on 21st december 2012 **

I know that many people thinks the world is gonna end around this time, but... I'm pretty sure Slackware is going to survive this impending doom, so...

H_TeXMeX_H 08-26-2012 12:35 PM

Of course Slackware will survive the apocalypse, as will all slackers. Bob will protect us, and we will party on.

Alien Bob 08-26-2012 12:40 PM

Quote:

Originally Posted by aaarnt (Post 4764638)
I´m happy we are almost there for a new version, but...

Wouldn't it be nicer if we had a renewed/new GPG-KEY to sign Slackware 14.0 packages?

** The current GPG-KEY is from 2003 and will expire at 21st december 2012 **

I know that many people thinks the world is gonna end around this time, but... I'm pretty sure Slackware is going to survive this impending doom, so...

Somewhat related to that end-of-the-world thing... Slackware 14 will have an easter egg which only becomes visible if you install Slackware 14 on 21 december, 2012...

Eric

brianL 08-26-2012 12:48 PM

Quote:

Originally Posted by Alien Bob (Post 4764675)
Somewhat related to that end-of-the-world thing... Slackware 14 will have an easter egg which only becomes visible if you install Slackware 14 on 21 december, 2012...

Eric

What? Sends a signal via the intertubeswebnet thingy to detonate the entire world's nuclear arsenal? That will be worth seeing. Can't wait. :D

yenn 08-26-2012 01:07 PM

Quote:

Originally Posted by Alien Bob (Post 4764675)
Somewhat related to that end-of-the-world thing... Slackware 14 will have an easter egg which only becomes visible if you install Slackware 14 on 21 december, 2012...

Eric

Updated my journal, I'll definitely try that.

It reminds me one fortune cookie: "The world will end in 5 minutes. Please log out." It would be nice to hack fortunes to schedule that one for December 21 :)

H_TeXMeX_H 08-27-2012 08:14 AM

I have to remember to try it.

zerouno 08-28-2012 04:53 AM

from man slackpkg
Quote:

If you need to update Slackware's GPG key, run

# slackpkg update gpg

The GPG key doesn't change. This should be a "one time" command - run it once and forget it...
So, is that true? or in december we must re-run slackpkg update gpg?

aaarnt 08-28-2012 07:41 PM

Quote:

Originally Posted by zerouno (Post 4766254)
from man slackpkg


So, is that true? or in december we must re-run slackpkg update gpg?

Zerouno,
All digital certificates expire after a certain date. This is because the technology to pose security risks to them can improve a lot between "computer generations".
The current GPG-KEY used by Slackware was issued on february, 2003. That one will expire on 21 december this year. This can be verified using the following command in a bash prompt: gpg --list-keys.

I made a "time change" test in a virtual machine with slack 13.37 and tried to verify a patch signature. It was ok, with return code
0 but also displayed a note saying "This key has expired!".

The question is: will Slackware-14 release a new GPG-KEY, so that all packages are signed with that "future-proof" certificate or will we stick with the current one?
Sticking with a 9 year old key a few months from expiration is at least strange for such a traditional secure distro, IMHO.

But I'm pretty sure Pat will answer us very soon :-)

zerouno 08-29-2012 03:12 AM

The patches released in 2013 for slackware 13.37, which gpg-key will use?

aaarnt 08-29-2012 09:11 AM

Quote:

Originally Posted by zerouno (Post 4767145)
The patches released in 2013 for slackware 13.37, which gpg-key will use?

Good question!

If the GPG-KEY remains the same, after december 21st, it'll be impossible to sign anything with it. But it will be still possible to verify the old signatures.
I'm not a gpg especialist, but I'm sure there's a decent solution to that problem, maybe using subkeys.

zerouno 08-29-2012 01:15 PM

Quote:

Originally Posted by aaarnt (Post 4767390)
but I'm sure there's a decent solution to that problem.

re-sign all old-packages with a new gpg-key :-)




Slackware 8.1 packages are marked in the year 2002. The key presents on the repository is marked 2003.
Which key was used to sign, and when?

Some patch are marked in 2002 and some patch 2012. Are they signed with the same key?

Fortunately slackware 8.1 is End-Of-Life, so it will not soffer the Maya-bug :-)



Edit:
On the original cd of slackware 8.1 (that is downloadable) there is no gpg-key, and packages was not signed.
This means that the original packages was signed in future.

Well. This means that the 13.37 and all not EOL slackware will must be re-signed with a new key.

Alien Bob 08-29-2012 02:52 PM

If a GPG key's expiry date is updated, then files which were signed with the old version of the GPG key will still validate OK.
I'll let you in on a secret:
Code:

$ gpg --refresh-keys
$ gpg --list-keys "Slackware Linux Project"
pub  1024D/40102233 2003-02-26 [expires: 2038-01-19]
uid                  Slackware Linux Project <security@slackware.com>
sub  1024g/4E523569 2003-02-26 [expires: 2038-01-19]
$ gpg --verify ~ftp/pub/Linux/Slackware/slackware-13.37/CHECKSUMS.md5.asc
gpg: Signature made Mon 25 Apr 2011 04:56:55 PM CEST using DSA key ID 40102233
gpg: Good signature from "Slackware Linux Project <security@slackware.com>"

Eric

aaarnt 08-31-2012 09:14 PM

Quote:

Originally Posted by Alien Bob (Post 4767679)
If a GPG key's expiry date is updated, then files which were signed with the old version of the GPG key will still validate OK.
I'll let you in on a secret:
Code:

$ gpg --refresh-keys
$ gpg --list-keys "Slackware Linux Project"
pub  1024D/40102233 2003-02-26 [expires: 2038-01-19]
uid                  Slackware Linux Project <security@slackware.com>
sub  1024g/4E523569 2003-02-26 [expires: 2038-01-19]
$ gpg --verify ~ftp/pub/Linux/Slackware/slackware-13.37/CHECKSUMS.md5.asc
gpg: Signature made Mon 25 Apr 2011 04:56:55 PM CEST using DSA key ID 40102233
gpg: Good signature from "Slackware Linux Project <security@slackware.com>"

Eric

Thank you Pat and Eric!
I´ve just noticed Slackware 14.0 RC4 included the updated GPG-KEY.

So...
Maya BUG: Bye, bye!
Year-2038 bug: We´ll squash you at the right moment ;-D

jaycee4 12-21-2012 07:16 AM

Quote:

Originally Posted by Alien Bob (Post 4764675)
Somewhat related to that end-of-the-world thing... Slackware 14 will have an easter egg which only becomes visible if you install Slackware 14 on 21 december, 2012...

Eric

Aak! I don't have access to my laptop today to reinstall Slackware 14.0! I won't see the Easter Egg! 'Tis the end of the world! :'(
I'm going to hazard a guess and say that the Easter Egg is a Mayan themed Lilo boot screen... even though I dreamt (can you believe it!) a while ago that the first boot would flash ASCII keys (yes, the ones that open doors) in place of the ASCII... things that appear during first boot. But I'm probably incorrect on both fronts. Has anyone seen the Easter Egg?

zerouno 12-21-2012 08:09 AM

Quote:

I'm going to hazard a guess and say that the Easter Egg is a Mayan themed Lilo boot screen...
mmm..

May be...
But may NOT :D


tomorrow change date to your computer and reinstall :D

ChrisAbela 12-21-2012 08:43 AM

Quote:

Slackware 14 will have an easter egg which only becomes visible if you install Slackware 14 on 21 december, 2012
I installed Slackware 14 today but I did not notice the Easter Egg.
OK what am I missing?

Alien Bob 12-21-2012 01:48 PM

The Easter egg is that the Mayan LILO bootsplash will be installed...
Code:

# Mayan calendar easter egg
 if [ "$(date "+%Y%m%d")" = "20121221" ]; then
  if [ -r $LILODOCDIR/sample/slack14.0.2012.bmp ]; then
  cp -a $LILODOCDIR/sample/slack14.0.2012.bmp /boot/slack.bmp
  fi
 fi

Eric

jaycee4 12-21-2012 11:53 PM

Quote:

Originally Posted by zerouno (Post 4854353)
mmm..

May be...
But may NOT :D


tomorrow change date to your computer and reinstall :D

Of course, I was right. As if I could ever be wrong... although my dreams seem prone to error... :D
Unfortunately I tried changing the date and installing, but to no avail. Looking at the code for liloconfig, I get the impression it's because I use Slackware64. Or maybe Bob got annoyed at me for trying to cheat. Anyway, I decided to track down the picture on the Slackware64 DVD and force the issue. 'Tis a pretty Lilo splash! :)

zerouno 01-04-2013 09:37 AM

Quote:

Originally Posted by Alien Bob (Post 4767679)
If a GPG key's expiry date is updated, then files which were signed with the old version of the GPG key will still validate OK.
I'll let you in on a secret:
Code:

$ gpg --refresh-keys
$ gpg --list-keys "Slackware Linux Project"
pub  1024D/40102233 2003-02-26 [expires: 2038-01-19]
uid                  Slackware Linux Project <security@slackware.com>
sub  1024g/4E523569 2003-02-26 [expires: 2038-01-19]
$ gpg --verify ~ftp/pub/Linux/Slackware/slackware-13.37/CHECKSUMS.md5.asc
gpg: Signature made Mon 25 Apr 2011 04:56:55 PM CEST using DSA key ID 40102233
gpg: Good signature from "Slackware Linux Project <security@slackware.com>"

Eric

But slackpkg automatically does not refresh the key:

Code:

# slackpkg update gpg

                        Downloading http://ftp.osuosl.org/.2/slackware/slackware64-13.37/GPG-KEY...
--2013-01-04 16:27:26--  http://ftp.osuosl.org/.2/slackware/slackware64-13.37/GPG-KEY
Resolving ftp.osuosl.org (ftp.osuosl.org)... 140.211.166.134
Connecting to ftp.osuosl.org (ftp.osuosl.org)|140.211.166.134|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1565 (1.5K) [text/plain]
Saving to: '/tmp/slackpkg.mi3WC6/gpgkey'

100%[========================================>] 1,565      --.-K/s  in 0s   

2013-01-04 16:27:27 (105 MB/s) - '/tmp/slackpkg.mi3WC6/gpgkey' saved [1565/1565]

                        Slackware Linux Project's GPG key added

root@matteo:~# gpg --list-keys "Slackware Linux Project"
pub  1024D/40102233 2003-02-26 [expired: 2012-12-21]
uid                  Slackware Linux Project <security@slackware.com>


Alien Bob 01-04-2013 01:57 PM

Quote:

Originally Posted by zerouno (Post 4862904)
But slackpkg automatically does not refresh the key:

Code:

# slackpkg update gpg

                        Downloading http://ftp.osuosl.org/.2/slackware/slackware64-13.37/GPG-KEY...
--2013-01-04 16:27:26--  http://ftp.osuosl.org/.2/slackware/slackware64-13.37/GPG-KEY
Resolving ftp.osuosl.org (ftp.osuosl.org)... 140.211.166.134
Connecting to ftp.osuosl.org (ftp.osuosl.org)|140.211.166.134|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1565 (1.5K) [text/plain]
Saving to: '/tmp/slackpkg.mi3WC6/gpgkey'

100%[========================================>] 1,565      --.-K/s  in 0s   

2013-01-04 16:27:27 (105 MB/s) - '/tmp/slackpkg.mi3WC6/gpgkey' saved [1565/1565]

                        Slackware Linux Project's GPG key added

root@matteo:~# gpg --list-keys "Slackware Linux Project"
pub  1024D/40102233 2003-02-26 [expired: 2012-12-21]
uid                  Slackware Linux Project <security@slackware.com>


Oh, but it does!
However, the Slackware GPG key has only been updated in the Slackware 14.0 tree. You pointed slackpkg to a Slackware 13.37 mirror which still has the old key.

Eric

zerouno 01-07-2013 06:14 AM

Quote:

You pointed slackpkg to a Slackware 13.37 mirror which still has the old key.
who have a slackware 13.37 server point to old key to install patches.


Quote:

Originally Posted by Alien Bob (Post 4863078)
Oh, but it does!

No, slackpkg does not update the key.

slackpkg verify succesfully the package integrity, it's true.
Seeing the code:
Code:

function checkgpg() {
        gpg --verify ${1}.asc ${1} 2>/dev/null && echo "1" || echo "0"
}

slackpkg does not show any warning becouse '2>/dev/null' is present.
Removing it slackpkg show the warning.
Code:

2013-01-08 12:09:48 (38.4 MB/s) - `/var/cache/packages/./patches/packages/file-5.09-x86_64-1_slack13.37.txz.asc' saved [198/198]

gpg: Signature made Tue Oct 11 11:33:35 2011 CEST using DSA key ID 40102233
gpg: Good signature from "Slackware Linux Project <security@slackware.com>"
gpg: Note: This key has expired!
Primary key fingerprint: EC56 49DA 401E 22AB FA67  36EF 6A44 63C0 4010 2233
        Upgrading file-5.09-x86_64-1_slack13.37...

It's not a fatal, but demonstrates that slackpkg does not refresh the key!


Also,

Some unofficial tool as slapt-get refuse to accept the expired key:
Code:

Verifying checksum signature [http://ftp.heanet.ie/mirrors/ftp.slackware.com/pub/slackware/slackware64-13.37/]...Not Verified
Yes, is *unofficial* tool, so it's not real problem.

Alien Bob 01-07-2013 07:37 AM

zerouno, let me explain again what I meant to say.

The command "slackpkg update gpg" will regresh the Slackware GPG key. It will download the GPG-KEY file from the mirror you have configured, for the Slackware release which you have configured. If that GPG-KEY file contains an expired key (which is the case with all Slackware releases before 14.0) then slackpkg will happily "refresh" the GPG key with that same expired key. Slackpkg does not check for expiration of the key!

Your (and mine) idea of "refreshing" is refreshing a key using a keyserver. This is not what "slackpkg update gpg" does.

I have asked Pat Volkerding to update the GPG-KEY file on all Slackware mirror releases for 13.37 and earlier, let's wait and see if he does that.

Code:

Seeing the code:
Code:

function checkgpg() {
        gpg --verify ${1}.asc ${1} 2>/dev/null && echo "1" || echo "0"
}

slackpkg does not show any warning becouse '2>/dev/null' is present.
Removing it slackpkg show the warning.

The need to remove that "2>/dev/null" is arguable. If the key verification fails, this function will return a "0" to the calling routine. This return code is checked and you will get a GPG verification error on your screen. I agree that you will not see the reason for the failure because the key expiration message is filtered out by that "2>/dev/null" redirection.

Eric

fgcl2k 01-08-2013 05:11 AM

Quote:

Originally Posted by Alien Bob (Post 4764675)
Somewhat related to that end-of-the-world thing... Slackware 14 will have an easter egg which only becomes visible if you install Slackware 14 on 21 december, 2012...
Eric

Has anyone installed on 21 december 2012? What was the easter egg?

zerouno 01-08-2013 05:47 AM

Quote:

Originally Posted by fgcl2k (Post 4865283)
Has anyone installed on 21 december 2012? What was the easter egg?

see post #17

fgcl2k 01-08-2013 08:08 AM

Thanks, I missed that post.


All times are GMT -5. The time now is 11:38 AM.