From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A591C433EF for ; Fri, 18 Mar 2022 17:01:13 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238857AbiCRRCa (ORCPT ); Fri, 18 Mar 2022 13:02:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236102AbiCRRCa (ORCPT ); Fri, 18 Mar 2022 13:02:30 -0400 Received: from mail36c50.megamailservers.eu (mail227c50.megamailservers.eu [91.136.10.237]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 05B412F24EF for ; Fri, 18 Mar 2022 10:01:05 -0700 (PDT) X-Authenticated-User: ralf.mardorf@o2mail.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=megamailservers.eu; s=maildub; t=1647622857; bh=HmriSkz/lHh3Fi08bGCT0Pn20+cD/A3/dfz3mni/NY0=; h=Date:From:To:Subject:In-Reply-To:References:From; b=AcMkfRboemITlcAwBbD2/yhtpFvM9x1aB4cst6r2E2HSFxszSlyeqJ0KLT3QGGDnk ygEML77NE/rR0940OKN0TG99CnCKmU/xouzqIUBsm5RzST5lL//XNY/KyqFs4BUKYg xQ9yy8XczlZTw0kaqObsGzNr/WmrbaojOdAgGTfQ= Feedback-ID: ralf.mardorf@al Received: from archlinux (dynamic-002-243-188-167.2.243.pool.telefonica.de [2.243.188.167]) (authenticated bits=0) by mail36c50.megamailservers.eu (8.14.9/8.13.1) with ESMTP id 22IH0te2001293 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 18 Mar 2022 17:00:56 +0000 Date: Fri, 18 Mar 2022 18:00:57 +0100 From: Ralf Mardorf To: Daniel Wagner , linux-rt-users Subject: Re: [ANNOUNCE] 4.19.233-rt105 Message-ID: <20220318180057.7a223148@archlinux> In-Reply-To: <20220318094535.azlclmxubdbmusss@carbon.lan> References: <164698646082.13723.1987519373498826881@beryllium.lan> <20220318060151.411f6789@archlinux> <20220318084800.6f5xs4rnp5kw6lxo@carbon.lan> <20220318102051.483333f2@archlinux> <20220318102718.1347247d@archlinux> <20220318094535.azlclmxubdbmusss@carbon.lan> X-Mailer: Claws Mail (linux) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-CTCH-RefID: str=0001.0A742F18.6234BAC9.002A,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0 X-CTCH-VOD: Unknown X-CTCH-Spam: Unknown X-CTCH-Score: 0.000 X-CTCH-Rules: X-CTCH-Flags: 0 X-CTCH-ScoreCust: 0.000 X-Origin-Country: DE Precedence: bulk List-ID: X-Mailing-List: linux-rt-users@vger.kernel.org On Fri, 18 Mar 2022 10:45:35 +0100, Daniel Wagner wrote: >$ gpg pgpkeys/keys/587C5ECA5D0A306C.asc Hi, that's the wrong key: [rocketmouse@archlinux linux-rt]$ gzip -cd patch-4.19.233-rt105.patch.gz | gpg2 --verify patch-4.19.233-rt105.patch.sign - gpg: Signature made Fri 11 Mar 2022 09:10:11 CET gpg: using EDDSA key 1B45744BE36280CA7D6BD460E072D068B1F5703E ^^^^^^^^^^^^^^^^ 587C5ECA5D0A306C.asc Importing your key from a keyserver (e.g. from hkp://keyserver.ubuntu.com) isn't an issue at all. The rt-patch was either signed with another key (E072D068B1F5703E instead of 587C5ECA5D0A306C) or the uploaded patch is malicious. The patch was downloaded from https://www.kernel.org/pub/linux/kernel/projects/rt/ : [rocketmouse@archlinux ~]$ head -24 /usr/src/linux-rt-rm/PKGBUILD [snip] _pkgver=4.19.233 _rtpatchver=105 pkgver="${_pkgver}_rt${_rtpatchver}" [snip] source=( "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.gz" "https://www.kernel.org/pub/linux/kernel/v${_pkgver%%.*}.x/linux-${_pkgver}.tar.sign" "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.gz" "https://www.kernel.org/pub/linux/kernel/projects/rt/${_pkgver%.*}/older/patch-${_pkgver}-rt${_rtpatchver}.patch.sign" Regards, Ralf