-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Description
Description:
Installing Lynis on RHEL 10/Rocky Linux 10 fails during GPG key import:
error: Certificate 824612E20ACF951B:
Policy rejects 824612E20ACF951B: No binding signature at time 2025‑06‑13T16:28:45Z
error: https://packages.cisofy.com/keys/cisofy-software-rpms-public.key: key 1 import failed.
Running transaction test
RPM: error: Verifying a signature using certificate 9146CE61DD174FB302C990A9824612E20ACF951B (CISOfy Software RPMs (signed software packages) <[email protected]>):
RPM: 1. Certificate 824612E20ACF951B invalid: policy violation
RPM: because: No binding signature at time 2025-01-28T12:06:42Z
RPM: because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance
RPM: because: SHA1 is not considered secure
RPM: 2. Certificate 824612E20ACF951B invalid: policy violation
RPM: because: No binding signature at time 2025-06-13T16:39:13Z
RPM: because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance
RPM: because: SHA1 is not considered secure
The downloaded packages were saved in cache until the next successful transaction.
You can remove cached packages by executing 'dnf clean packages'.
Error: Transaction test error:
package lynis-3.1.4-100.noarch does not verify: Header V4 RSA/SHA256 Signature, key ID 0acf951b: NOTTRUSTED
This happens because modern rpm‑sequoia enforces stricter OpenPGP policies (rejecting SHA‑1 or missing binding signatures)
Steps to reproduce:
On RHEL 10/Rocky Linux 10 with default DEFAULT crypto policy, run:
rpm --import https://packages.cisofy.com/keys/cisofy-software-rpms-public.key
Observe the failure above.
Expected behavior:
The key should import normally so that Lynis can be installed securely without error.
Environment:
OS: RHEL 10/Rocky Linux 10
RPM backend: rpm‑sequoia with default crypto policy
Crypto policy: DEFAULT (disallows SHA‑1)
Workarounds (not ideal):
- Temporarily set crypto policy to LEGACY to import the key, then revert to DEFAULT with update-crypto-policies --set and install the lynis package.
Proposed solutions:
Please re-sign or issue a new CISOfy RPM key that:
Uses a valid binding signature.
Employs a strong algorithm (e.g., SHA‑256).
This would ensure compatibility with rpm‑sequoia and maintain secure package installs without weakening system crypto policies.
Additional context:
RHEL’s rpm‑sequoia migration enforces binding signatures and rejects keys signed with SHA‑1 or missing time-bound signatures, to prevent ambiguous trust model risks