Bug#978990: "hokey lint" fails to identify cross-signature on ed25519 signing-capable subkey

Daniel Kahn Gillmor dkg at fifthhorseman.net
Fri Jan 1 18:50:02 GMT 2021


Package: hopenpgp-tools
Version: 0.23.1-1+b1

my ed25519/cv25519 OpenPGP certificate (attached) gets a complaint from
"hokey lint" that the signing-capable subkey does not have an embedded
cross cert.

In particular, the line is:

   embedded cross-cert: False

which shows up twice. (it should only show up once, for the
encryption-capable cv25519 subkey -- it should *not* show up for the
ed25519 signing-capable subkey)

however, the embedded cross cert is there, because gpg --list-packets
(on the same data) says:

	critical hashed subpkt 32 len 189 (signature: v4, class 0x19, algo 22, digest algo 10)


I note that GnuPG typically creates these cross-certs in the unhashed
subpacket section, and doesn't mark them as "critical".  Maybe "hokey
lint" doesn't recognize the cross-cert because of its
placement/positioning?

thanks for working on hopenpgp-tools!

       --dkg

PS here's a transcript with the relevant error message underlined with ^^^^s

```
0 dkg at alice:~$ gpg --export C29F8A0C01F35E34D816AA5CE092EB3A5CA10DBA | hokey lint
hokey (hopenpgp-tools) 0.23.1
Copyright (C) 2012-2019  Clint Adams
hokey comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions.

Key has potential validity: good
Key has fingerprint: C29F 8A0C 01F3 5E34 D816  AA5C E092 EB3A 5CA1 0DBA
Checking to see if key is OpenPGPv4: V4
Checking to see if key is RSA or DSA (>= 2048-bit): EdDSA 256
Checking user-ID- and user-attribute-related items:
  <dkg at debian.org>:
    Self-sig hash algorithms: [SHA-512]
    Preferred hash algorithms: [SHA-512, SHA-256]
    Key expiration times: [2y11m26d59400s = Sun Dec 24 16:22:55 UTC 2023]
    Key usage flags: [[certify-keys]]
  <dkg at fifthhorseman.net>:
    Self-sig hash algorithms: [SHA-512]
    Preferred hash algorithms: [SHA-512, SHA-256]
    Key expiration times: [2y11m26d59400s = Sun Dec 24 16:22:55 UTC 2023]
    Key usage flags: [[certify-keys]]
  Daniel Kahn Gillmor:
    Self-sig hash algorithms: [SHA-512]
    Preferred hash algorithms: [SHA-512, SHA-256]
    Key expiration times: [2y11m26d59400s = Sun Dec 24 16:22:55 UTC 2023]
    Key usage flags: [[certify-keys]]
Checking subkeys:
  one of the subkeys is encryption-capable: True
  fpr: 2DB5 491C 9DF0 DC8F 4328  63CF 3E9D 7173 71DE 565C
    version: v4
    timestamp: 20201227-162255
    algo/size: EdDSA 256
    binding sig hash algorithms: [SHA-512]
    usage flags: [[sign-data]]
    embedded cross-cert: False
    ^^^^^^^^^^^^^^^^^^^^^^^^^^
    cross-cert hash algorithms: [SHA-512]
  fpr: 61C1 E3C2 410D 201D DB6F  8168 4C39 437E A528 5697
    version: v4
    timestamp: 20201227-162255
    algo/size: ECDH 256
    binding sig hash algorithms: [SHA-512]
    usage flags: [[encrypt-storage, encrypt-communications]]
    embedded cross-cert: False
    cross-cert hash algorithms: [SHA-512]
0 dkg at alice:~$ 
```

-------------- next part --------------
A non-text attachment was scrubbed...
Name: dkg-openpgp-2021.pgp
Type: application/pgp-keys
Size: 2354 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-haskell-maintainers/attachments/20210101/7b55a39d/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 227 bytes
Desc: not available
URL: <http://alioth-lists.debian.net/pipermail/pkg-haskell-maintainers/attachments/20210101/7b55a39d/attachment.sig>


More information about the Pkg-haskell-maintainers mailing list