diff options
author | Werner Koch <[email protected]> | 2025-02-21 11:16:17 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2025-02-21 11:17:46 +0000 |
commit | 48978ccb4e20866472ef18436a32744350a65158 (patch) | |
tree | 701624318831614937ebf91ff1685ef97749b429 /g10/keydb.h | |
parent | gpg: Remove a signature check function wrapper. (diff) | |
download | gnupg-48978ccb4e20866472ef18436a32744350a65158.tar.gz gnupg-48978ccb4e20866472ef18436a32744350a65158.zip |
gpg: Fix a verification DoS due to a malicious subkey in the keyring.
* g10/getkey.c (get_pubkey): Factor code out to ...
(get_pubkey_bykid): new. Add feature to return the keyblock.
(get_pubkey_for_sig): Add arg r_keyblock to return the used keyblock.
Request a signing usage.
(get_pubkeyblock_for_sig): Remove.
(finish_lookup): Improve debug output.
* g10/sig-check.c (check_signature): Add arg r_keyblock and pass it
down.
* g10/mainproc.c (do_check_sig): Ditto.
(check_sig_and_print): Use the keyblock returned by do_check_sig to
show further information instead of looking it up again with
get_pubkeyblock_for_sig. Also re-check the signature after the import
of an included keyblock.
--
The problem here is that it is possible to import a key from someone
who added a signature subkey from another public key and thus inhibits
that a good signature good be verified.
Such a malicious key signature subkey must have been created w/o the
mandatory backsig which bind a signature subkey to its primary key.
For encryption subkeys this is not an issue because the existence of a
decryption private key is all you need to decrypt something and then
it does not matter if the public subkey or its binding signature has
been put below another primary key; in fact we do the latter for
ADSKs.
GnuPG-bug-id: 7527
Diffstat (limited to 'g10/keydb.h')
-rw-r--r-- | g10/keydb.h | 10 |
1 files changed, 8 insertions, 2 deletions
diff --git a/g10/keydb.h b/g10/keydb.h index 36ade7930..68bc81840 100644 --- a/g10/keydb.h +++ b/g10/keydb.h @@ -332,9 +332,15 @@ void getkey_disable_caches(void); /* Return the public key used for signature SIG and store it at PK. */ gpg_error_t get_pubkey_for_sig (ctrl_t ctrl, PKT_public_key *pk, PKT_signature *sig, - PKT_public_key *forced_pk); + PKT_public_key *forced_pk, + kbnode_t *r_keyblock); -/* Return the public key with the key id KEYID and store it at PK. */ +/* Return the public key with the key id KEYID and store it at PK. + * Optionally return the entire keyblock. */ +gpg_error_t get_pubkey_bykid (ctrl_t ctrl, PKT_public_key *pk, + kbnode_t *r_keyblock, u32 *keyid); + +/* Same as get_pubkey_bykid but w/o r_keyblock. */ int get_pubkey (ctrl_t ctrl, PKT_public_key *pk, u32 *keyid); /* Same as get_pubkey but with auto LDAP fetch. */ |