View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0009194 | Kali Linux | Kali Websites & Docs | public | 2025-05-22 17:09 | 2025-05-23 00:45 |
Reporter | maltfield | Assigned To | arnaudr | ||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | feedback | Resolution | reopened | ||
Summary | 0009194: Key Transition Statement (ED65462EC8D5E4C5) | ||||
Description | This ticket is a request for Kali to publish a cryptograhpically-signed Key Transition Statement. ProblemI went to download Kali today, but the signature was invalid. I checked the signature using the key that Kali had been previously using to sign their releases:
I searched the kali website for a Key Transition Statement -- a standard document that is published by someone (or some org) when they deprecate an old key and replace it with a new PGP key. I couldn't find any cryptographically-signed updates on the Kali website indicating that the key had been replaced, so I assumed that the signature was invalid. I did see the documentation was updated with a new key. But, again, since the documentation is not cryptographically signed with the old key indicating (with an authenticated chain of trust) that this change was official, I assume the documentation/publishing infrastructure was compromised. SolutionIf the Kali team really did change their release signing key, then the Kali org should publish a Key Transition Statement As described in the article linked above, the Key Transition Statement should clearly state that the old key (listing the key fingerprint) has been replaced by a new key (listing the key fingerprint). The Key Transition Statement should then be cryptographically signed by the old key (and the new key) to indicate a chain of trust for the transition. This ticket has two actions required:
| ||||
See also: |
|
Related: |
|
Hello, we published a blog post: https://www.kali.org/blog/new-kali-archive-signing-key/ and we posted on all the communication channels that we have (twitter, infosec.exchange, discord, forums, etc etc). Also, I just checked, a google search for "kali gpg key" or "kali apt key", and the blog post comes first in the results. So the information about the new key is widely available, there's nothing else we can do. |
|
@arnaudr Please re-read this ticket. It is not resolved. What you have not done is publish a Key Transition Statement, which is cryptographically signed with the old key. This establishes a cryptographic chain of trust. You publishing any unsigned statement on any channel does not provide any cryptographic proof of the change. Be it your official blog, twitter, etc. All of this infrastructure could be compromised by an attacker. That's why we have PGP keys for signing statements. Please fix this ticket by publishing a singed Key Transition Statement, as described in the OP. |
|
Please read the blog post. We don't have the old key anymore, so we can't sign anything with it. Please, don't open bugs if you don't even bother to know what you're talking about. It's not helpful. |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2025-05-22 17:09 | maltfield | New Issue | |
2025-05-22 17:10 | maltfield | Note Added: 0020614 | |
2025-05-22 18:25 | kali-bugreport | Note Added: 0020616 | |
2025-05-23 00:34 | arnaudr | Note Added: 0020618 | |
2025-05-23 00:35 | arnaudr | Assigned To | => arnaudr |
2025-05-23 00:35 | arnaudr | Status | new => closed |
2025-05-23 00:35 | arnaudr | Resolution | open => fixed |
2025-05-23 00:43 | maltfield | Status | closed => feedback |
2025-05-23 00:43 | maltfield | Resolution | fixed => reopened |
2025-05-23 00:43 | maltfield | Note Added: 0020620 | |
2025-05-23 00:45 | arnaudr | Note Added: 0020621 |