Running an update today I was greeted with a signature failure for chrome. Looking at my keyrings I have the keys installed, and taking a look at a public keyserver the key seems to have a valid binding signature Search results for '0x32ee5355a6bc6e42'
But the update is failing with no valid binding signature.
Is anyone else seeing this?
error: Subkey 32ee5355a6bc6e42 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
warning: /var/cache/zypp/packages/google-chrome/google-chrome-stable-133.0.6943.53-1.x86_64.rpm: Header V4 RSA/SHA512 Signature, key ID a6bc6e42: NOTTRUSTED
error: Subkey e88979fb9b30acf2 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
error: Subkey e88979fb9b30acf2 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
error: Subkey 32ee5355a6bc6e42 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
error: Subkey 32ee5355a6bc6e42 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
package google-chrome-stable-133.0.6943.53-1.x86_64 does not verify: Header V4 RSA/SHA512 Signature, key ID a6bc6e42: NOTTRUSTED
(2/2) Installing: google-chrome-stable-133.0.6943.53-1.x86_64 ......................................................................................[error]
Installation of google-chrome-stable-133.0.6943.53-1.x86_64 failed:
Error: Subprocess failed. Error: RPM failed: Command exited with status 2.
It looks like for some reason that was using an old key, and deleting and reloading from that would not include all the new subkeys. Though after explictly downloading the new key and making sure its the one installed I am still getting an error.
Note I downloaded the standalone RPM to make testing easier.
I cleaned out the old keys, downloaded the key from the google link from above and you can see the A6BC6E42 key is part of the sub keys
#:~/Downloads> gpg --show-keys linux_signing_key.pub
pub dsa1024 2007-03-08 [SC]
4CCA1EAF950CEE4AB83976DCA040830F7FAC5991
uid Google, Inc. Linux Package Signing Key <linux-packages-keymaster@google.com>
sub elg2048 2007-03-08 [E]
9534C9C4130B4DC9927992BF4F30B6B4C07CB649
pub rsa4096 2016-04-12 [SC]
EB4C1BFD4F042F6DDDCCEC917721F63BD38B4796
uid Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>
sub rsa4096 2016-04-12 [S] [expired: 2019-04-12]
3B068FB4789ABE4AEFA3BB491397BC53640DB551
sub rsa4096 2017-01-24 [S] [expired: 2020-01-24]
3E50F6D3EC278FDEB655C8CA6494C6D6997C215E
sub rsa4096 2019-07-22 [S] [expired: 2022-07-21]
2F528D36D67B69EDF998D85778BD65473CB3BD13
sub rsa4096 2021-10-26 [S] [expired: 2024-10-25]
8461EFA0E74ABAE010DE66994EB27DB2A3B88B8B
sub rsa4096 2023-02-15 [S] [expires: 2026-02-14]
A5F483CD733A4EBAEA378B2AE88979FB9B30ACF2
sub rsa4096 2024-01-30 [S] [expires: 2027-01-29]
0F06FF86BEEAF4E71866EE5232EE5355A6BC6E42
sub rsa4096 2025-01-07 [S] [expires: 2028-01-07]
0E225917414670F4442C250DFD533C07C264648F
Following their command for diffing showing that is the key thats installed it looks like its good.
However validating the RPM I am still showing that the key listed is not trusted.
key ID a6bc6e42: NOTTRUSTED
#:~/Downloads> rpm --verbose --checksig -v google-chrome-stable_current_x86_64.rpm D: loading keyring from rpmdb
D: opening db index /usr/lib/sysimage/rpm/Packages.db mode=0x0
D: opening db index /usr/lib/sysimage/rpm/Index.db mode=0x0
D: opening db index Name tag=1000
D: opening db index Basenames tag=1117
D: opening db index Group tag=1016
D: opening db index Requirename tag=1049
D: opening db index Providename tag=1047
D: opening db index Conflictname tag=1054
D: opening db index Obsoletename tag=1090
D: opening db index Triggername tag=1066
D: opening db index Dirnames tag=1118
D: opening db index Installtid tag=1128
D: opening db index Sigmd5 tag=261
D: opening db index Sha1header tag=269
D: opening db index Filetriggername tag=5069
D: opening db index Transfiletriggername tag=5079
D: opening db index Recommendname tag=5046
D: opening db index Suggestname tag=5049
D: opening db index Supplementname tag=5052
D: opening db index Enhancename tag=5055
D: read h# 1
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-39db7c82-5f68629b to keyring
D: read h# 2
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-3dbdc284-53674dd4 to keyring
D: read h# 2119
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-c66b6eae-4491871e to keyring
D: read h# 2280
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-222d23d0-5910b0f0 to keyring
D: read h# 5265
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-df7587c3-576a5c23 to keyring
D: added subkey 0 of main key gpg-pubkey-df7587c3-576a5c23 to keyring
D: read h# 5331
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-29b700a4-62b07e22 to keyring
D: read h# 45872
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-c8da93d2-457aded7 to keyring
D: read h# 68160
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-db27fd5a-62589a51 to keyring
D: read h# 75520
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-1abd1afb-450ef738 to keyring
D: read h# 76391
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-5104960e-5bbc7d64 to keyring
D: read h# 84094
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-3fa1d6ce-63c9481c to keyring
D: read h# 84095
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-09d9ea69-645b99ce to keyring
D: read h# 89279
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-7fac5991-45f06f46 to keyring
D: read h# 89280
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 0 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 1 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 2 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 3 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 4 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 5 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 6 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
google-chrome-stable_current_x86_64.rpm:
error: Subkey 32ee5355a6bc6e42 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
error: Subkey 32ee5355a6bc6e42 of key 7721f63bd38b4796 (Google Inc. (Linux Packages Signing Authority) <linux-packages-keymaster@google.com>) has no valid binding signature
Header V4 RSA/SHA512 Signature, key ID a6bc6e42: NOTTRUSTED
Header SHA256 digest: OK
Header SHA1 digest: OK
Payload SHA256 digest: OK
V4 RSA/SHA512 Signature, key ID a6bc6e42: NOTTRUSTED
MD5 digest: OK
D: closed db index Enhancename
D: closed db index Supplementname
D: closed db index Suggestname
D: closed db index Recommendname
D: closed db index Transfiletriggername
D: closed db index Filetriggername
D: closed db index Sha1header
D: closed db index Sigmd5
D: closed db index Installtid
D: closed db index Dirnames
D: closed db index Triggername
D: closed db index Obsoletename
D: closed db index Conflictname
D: closed db index Providename
D: closed db index Requirename
D: closed db index Group
D: closed db index Basenames
D: closed db index Name
D: closed db index /usr/lib/sysimage/rpm/Index.db
D: closed db index /usr/lib/sysimage/rpm/Packages.db
Yeah I know how to bypass the signature, but I dont want to. It should validate that the package is what is expected and hasnt been tampered with. Im at a loss for why when I see the specific subkey in the chain that its still saying its not trusted.
Thank you. Ran a dup that pulled in the update for rpm. Signature is now verifying as expected.
#:~/Downloads> rpm --verbose --checksig -v google-chrome-stable_current_x86_64.rpm
D: loading keyring from rpmdb
D: opening db index /usr/lib/sysimage/rpm/Packages.db mode=0x0
D: opening db index /usr/lib/sysimage/rpm/Index.db mode=0x0
D: opening db index Name tag=1000
D: opening db index Basenames tag=1117
D: opening db index Group tag=1016
D: opening db index Requirename tag=1049
D: opening db index Providename tag=1047
D: opening db index Conflictname tag=1054
D: opening db index Obsoletename tag=1090
D: opening db index Triggername tag=1066
D: opening db index Dirnames tag=1118
D: opening db index Installtid tag=1128
D: opening db index Sigmd5 tag=261
D: opening db index Sha1header tag=269
D: opening db index Filetriggername tag=5069
D: opening db index Transfiletriggername tag=5079
D: opening db index Recommendname tag=5046
D: opening db index Suggestname tag=5049
D: opening db index Supplementname tag=5052
D: opening db index Enhancename tag=5055
D: read h# 1
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-39db7c82-5f68629b to keyring
D: read h# 2
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-3dbdc284-53674dd4 to keyring
D: read h# 2119
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-c66b6eae-4491871e to keyring
D: read h# 2280
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-222d23d0-5910b0f0 to keyring
D: read h# 5265
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-df7587c3-576a5c23 to keyring
D: added subkey 0 of main key gpg-pubkey-df7587c3-576a5c23 to keyring
D: read h# 5331
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-29b700a4-62b07e22 to keyring
D: read h# 45872
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-c8da93d2-457aded7 to keyring
D: read h# 68160
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-db27fd5a-62589a51 to keyring
D: read h# 75520
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-1abd1afb-450ef738 to keyring
D: read h# 76391
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-5104960e-5bbc7d64 to keyring
D: read h# 84094
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-3fa1d6ce-63c9481c to keyring
D: read h# 84095
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-09d9ea69-645b99ce to keyring
D: read h# 89279
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-7fac5991-45f06f46 to keyring
D: read h# 89280
Header SHA256 digest: OK
Header SHA1 digest: OK
D: added key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 0 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 1 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 2 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 3 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 4 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 5 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
D: added subkey 6 of main key gpg-pubkey-d38b4796-570c8cd3 to keyring
google-chrome-stable_current_x86_64.rpm:
Header V4 RSA/SHA512 Signature, key ID a6bc6e42: OK
Header SHA256 digest: OK
Header SHA1 digest: OK
Payload SHA256 digest: OK
V4 RSA/SHA512 Signature, key ID a6bc6e42: OK
MD5 digest: OK
D: closed db index Enhancename
D: closed db index Supplementname
D: closed db index Suggestname
D: closed db index Recommendname
D: closed db index Transfiletriggername
D: closed db index Filetriggername
D: closed db index Sha1header
D: closed db index Sigmd5
D: closed db index Installtid
D: closed db index Dirnames
D: closed db index Triggername
D: closed db index Obsoletename
D: closed db index Conflictname
D: closed db index Providename
D: closed db index Requirename
D: closed db index Group
D: closed db index Basenames
D: closed db index Name
D: closed db index /usr/lib/sysimage/rpm/Index.db
D: closed db index /usr/lib/sysimage/rpm/Packages.db