Skip to content

rpm-sequoia rejects CISOfy GPG key due to “No binding signature” policy error #1638

@root-sector

Description

@root-sector

Description:
Installing Lynis on RHEL 10/Rocky Linux 10 fails during GPG key import:

error: Certificate 824612E20ACF951B:
  Policy rejects 824612E20ACF951B: No binding signature at time 2025‑06‑13T16:28:45Z
error: https://packages.cisofy.com/keys/cisofy-software-rpms-public.key: key 1 import failed.

Running transaction test
RPM: error: Verifying a signature using certificate 9146CE61DD174FB302C990A9824612E20ACF951B (CISOfy Software RPMs (signed software packages) <[email protected]>):
RPM:   1. Certificate 824612E20ACF951B invalid: policy violation
RPM:       because: No binding signature at time 2025-01-28T12:06:42Z
RPM:       because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance
RPM:       because: SHA1 is not considered secure
RPM:   2. Certificate 824612E20ACF951B invalid: policy violation
RPM:       because: No binding signature at time 2025-06-13T16:39:13Z
RPM:       because: Policy rejected non-revocation signature (PositiveCertification) requiring second pre-image resistance
RPM:       because: SHA1 is not considered secure
The downloaded packages were saved in cache until the next successful transaction.
You can remove cached packages by executing 'dnf clean packages'.
Error: Transaction test error:
  package lynis-3.1.4-100.noarch does not verify: Header V4 RSA/SHA256 Signature, key ID 0acf951b: NOTTRUSTED

This happens because modern rpm‑sequoia enforces stricter OpenPGP policies (rejecting SHA‑1 or missing binding signatures)

Steps to reproduce:
On RHEL 10/Rocky Linux 10 with default DEFAULT crypto policy, run:

rpm --import https://packages.cisofy.com/keys/cisofy-software-rpms-public.key

Observe the failure above.

Expected behavior:
The key should import normally so that Lynis can be installed securely without error.

Environment:
OS: RHEL 10/Rocky Linux 10

RPM backend: rpm‑sequoia with default crypto policy

Crypto policy: DEFAULT (disallows SHA‑1)

Workarounds (not ideal):

  • Temporarily set crypto policy to LEGACY to import the key, then revert to DEFAULT with update-crypto-policies --set and install the lynis package.

Proposed solutions:
Please re-sign or issue a new CISOfy RPM key that:
Uses a valid binding signature.
Employs a strong algorithm (e.g., SHA‑256).

This would ensure compatibility with rpm‑sequoia and maintain secure package installs without weakening system crypto policies.

Additional context:
RHEL’s rpm‑sequoia migration enforces binding signatures and rejects keys signed with SHA‑1 or missing time-bound signatures, to prevent ambiguous trust model risks

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions