Update: Mostly resolved. Main security page lists both updated and rotated key fingerprints, PRs in place to update remaining docs. Just pull the new keys, as per the regular installation docs for your specific tool.
I was running my apt update this morning (as one does on Mondays) and got a complete failure due to the the Debian GPG signing key rotation for Hashicorp. When I pulled the latest key from Hashicorp servers, I could not find any reference to the fingerprint in the docs. Here is what I got
798A EC65 4E5C 1542 8C8E 42EE AA16 FCBC A621 E701
Here is where I looked for key fingerprints.
I assume that those docs are being updated rapidly, but this requires urgent attention. Users cannot run apt update until resolved. User path is:
apt update
fails due to GPG mismatch
one of the following:
A. user deletes/disables repo
B. user finds non-specific guide to use apt-key
C. user finds Hashicorp docs
Hashicorp docs do not show new fingerprint yet, alarming
Just want to start a public thread, since I am probably not the only one with this issue.
I’m seeing a similar issue with the AmazonLinux yum repos.
Public key for terraform-1.3.7-1.x86_64.rpm is not installed
(3/3): terraform-1.3.7-1.x86_64.rpm | 13 MB 00:00:01
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Total 2.9 MB/s | 14 MB 00:00:04
Retrieving key from https://rpm.releases.hashicorp.com/gpg
Invalid GPG Key from https://rpm.releases.hashicorp.com/gpg: No key found in given key data
A similar issue happens if I try to import the GPG key manually:
bash-4.2# rpm --import https://rpm.releases.hashicorp.com/gpg
error: https://rpm.releases.hashicorp.com/gpg: key 1 not an armored public key.
The fingerprint must match 798A EC65 4E5C 1542 8C8E 42EE AA16 FCBC A621 E701 , which can also be verified at Security at HashiCorp under “Linux Package Checksum Verification”. Please note that there was a previous signing key used prior to January 23, 2022, which had the fingerprint E8A0 32E0 94D8 EB4E A189 D270 DA41 8C88 A321 9F7B . Details about this change are available at HashiCorp Services Status - Scheduled Maintenance | APT Repository.
Still showing the old fingerprint in the docs - I guess there’s more updates needed:
The fingerprint must match E8A0 32E0 94D8 EB4E A189 D270 DA41 8C88 A321 9F7B, which can also be verified at Security at HashiCorp under “Linux Package Checksum Verification”.
(This is at Install Vault | Vault | HashiCorp Developer which is where the vault documentation took me when I clicked ‘Installation’ and then the ‘tutorial’ link under ‘Linux package manager’)
Hey- Thanks for the report. This has been updated at Official Packaging Guide and is reflected on the security page. Let us know if you see any other lingering references to the old fingerprint. Thanks!