-
-
Notifications
You must be signed in to change notification settings - Fork 302
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encrypt ppa signing key with non-deprecated algorithm #1169
Comments
I'm forwarding this to @fancycode, who is maintaining the PPA. |
Looks like it's not possible to manually recreate the PPA signing key: However, Ubuntu will update the keys of all PPAs over time: Unfortunately I don't know if this already started or how long it will take to reach our libde265 / libheif PPAs. |
This looks like Ubuntu started creating new keys (we have no way of controlling this), but they are still not used for signing the PPAs.
Reading the updated thread, the re-signing of PPAs still is not finished from what I understand. I know this is unfortunate but again, we (and the PPA creators in general) have no way of manually signing packages or updating keys. This is fully controlled by Canonical / Ubuntu. |
Okay. Thanks for the context, @fancycode. I appreciate it. |
Mentioning this here for lack of a better place (I can't seem to create a bug here).
Signing keys for strukturag PPAs are encrypted using rsa1024 (link), which is deprecated (link). This is preventing my organization from using these PPAs on FIPS compliant machines that have removed this cipher (specifically Ubuntu 22.04 pro w/ FIPS enabled - link).
Can your signing keys please be re-encrypted with something else, like rsa4096? My organization is specifically using
libde265
andlibheif
, if that's helpful.Thanks in advance! Please let me know if there's a more appropriate place for this issue!
The text was updated successfully, but these errors were encountered: