Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle GPG revocation signatures #263

Closed
lukpueh opened this issue Mar 15, 2019 · 2 comments
Closed

Handle GPG revocation signatures #263

lukpueh opened this issue Mar 15, 2019 · 2 comments
Labels
ITE and Spec compliance This relates to the 2019 efforts to match the spec and ITEs
Milestone

Comments

@lukpueh
Copy link
Member

lukpueh commented Mar 15, 2019

Description of issue or feature request:
#257 adds gpg self-signature verification support, for signatures types 0x10-0x13 (certifications) and 0x18 (subkey binding signature). The added infrastructure may be used to also consider other signature types such as,

  • 0x20: Key revocation signature
  • 0x28: Subkey revocation signature
  • 0x30: Certification revocation signature

See RFC4880 5.2.1. Signature Types and 12.1. Key Structures for details about the signatures types and where in the key bundle they occur.

Current behavior:
Revocation type gpg signatures are ignored.

Expected behavior:
Handle revocation type gpg signatures, e.g. ignore revoked keys or certificates and/or warn user about them.

@lukpueh
Copy link
Member Author

lukpueh commented Mar 15, 2019

Since we are in the process of moving our gpg implementation to securesystemslib, we might want to address the issue over there (see secure-systems-lab/securesystemslib#163).

@lukpueh
Copy link
Member Author

lukpueh commented Oct 29, 2019

Will be fixed with secure-systems-lab/securesystemslib#190 (also see #275)

@lukpueh lukpueh closed this as completed Oct 29, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ITE and Spec compliance This relates to the 2019 efforts to match the spec and ITEs
Projects
None yet
Development

No branches or pull requests

2 participants