hko, to random
@hko@fosstodon.org avatar

30 years ago today, 2.6 was released via MIT.

Up to this point, two major issues had been unresolved: The legal status of the use of RSA in PGP, and export of the software from the US to the rest of the world.

With the release of PGP 2.6, the first of these two issues was resolved.

The pre-history of , , is hard to imagine, today. Even though variations of the https://en.m.wikipedia.org/wiki/Crypto_Wars remain a (tiringly) recurring political battle ground, three decades later.

hko,
@hko@fosstodon.org avatar

Much of the early history of PGP is recounted in "PGP: pretty good privacy" by Simson Garfinkel

https://archive.org/details/pgpprettygoodpri0000garf/mode/1up

hko,
@hko@fosstodon.org avatar

A release announcement for PGP 2.6: https://diswww.mit.edu/menelaus.mit.edu/cpunks/14056 as a V2 cleartext signed message, no less.

(This mail seems to suggest that the original release was in fact two days ago, today 🤷)

hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

hko,
@hko@fosstodon.org avatar

oct-git is joint work with the always excellent @wiktor

Thanks to NLNet and @NGIZero for funding work on this project!

dvzrv,
@dvzrv@chaos.social avatar
hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.3.1 of https://crates.io/crates/rsop, a stateless ("sop") card tool based on .
rsop natively supports OpenPGP card (hardware cryptography) devices

SOP is a standardized, vendor agnostic, CLI interface for the most common OpenPGP operations.
See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

rsop is featured in the "OpenPGP interoperability test suite" at https://tests.sequoia-pgp.org/ (under "rpgpie", which is rsop's high level OpenPGP library).

hko,
@hko@fosstodon.org avatar

Much credit and thanks to @wiktor for foundational work on OpenPGP card support in .

Wiktor's work constitutes the core of the new https://crates.io/crates/openpgp-card-rpgp crate (used in rsop).

chris_spackman, to linux
@chris_spackman@twit.social avatar

I spent a lot of time today trying to figure out / to encrypt and sign backups. I've used it occasionally for literally decades, but still struggle with it. I know if I used it more, I would get used to it and feel more comfortable, but I don't have the time or the need to use it more.

Is there another good open source program to symmetrically encrypt a file? But, for signing, you would still need to use key pairs, right?

Any good how-tos out there?

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.10.1 of https://crates.io/crates/openpgp-card-tools, the general purpose "oct" card tool.

This release adds the "oct admin signing-pin-validity" subcommand, to configure if a card requires User PIN presentation for each signature operation, or if User PIN presentation is valid for the full duration of a connection to the card.

( calls this flag "forcesig")

hko, (edited )
@hko@fosstodon.org avatar

FWIW, I am skeptical of the usefulness of "per-signature PIN presentation" on modern OpenPGP card devices.

This mode made sense with actual Smart Cards, when used in a reader with a physical pin pad.

However, with modern USB devices, I'd say that "touch confirmation" serves a similar goal, but is more fit for purpose.

Mechanisms that move authorization for signing operations outside the host computer add some defense in depth. Repeated PIN presentation from the host computer, less so.

blueghost, to email
@blueghost@mastodon.online avatar

Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.

Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.

Instructions: https://proton.me/support/how-to-use-pgp
GnuPG: https://mastodon.online/@blueghost/111974048270035570

Website: https://proton.me
Mastodon: @protonprivacy

iuvi,
@iuvi@mastodon.social avatar

@protonprivacy @blueghost (can be) true, buuut, theres one thing wich mess people up - many takes writing from/to proton mail users as something wich will be encrypted "by default" without any knowledge of how pgp keys works + it just about trust that proton does not read messages when storing secret key themselves...

protonprivacy,
@protonprivacy@mastodon.social avatar

@iuvi @blueghost Note that Proton Mail servers don't hold your private master key directly — it is always stored encrypted with your account password. And we don't have access to your account password.

stafwag, to debian
@stafwag@mastodon.social avatar

Use a GPG smartcard with Thunderbird. Part 1: setup GnuPG

https://stafwag.github.io/blog/blog/2024/04/21/use-a-gpg-smartcard-with-thunderbird-part_1-setup-gpg/

I moved to a Thinkpad w541 with coreboot so I needed to set up my email encryption on Thunderbird again.

It took me more time to reconfigure it again - as usual - so I decided to take notes this time and create a blog post about it. As this might be useful for somebody else … or me in the future :-)

@stafwag

stafwag,
@stafwag@mastodon.social avatar

@adamsdesk For the fsf europe fellowship card I don't know. I got my card 8 year ago from floss-shop.de. (I live in Europe/Belgium BTW ) You can check with them if they ship to Canada.

But the setup should work with any GPG compatible smartcard. I'm also looking at Not sure if nitrokey is available on your side of the ocean 🙂

is also a option:
https://stafwag.github.io/blog/blog/2015/06/16/using-yubikey-neo-as-gpg-smartcard-for-ssh-authentication/

But I lean more to nitrokey as I have the impression that they're more active in the opensource community

adamsdesk,
@adamsdesk@fosstodon.org avatar

@stafwag Thanks for the info. I'll do some more research and see.

blueghost, to infosec
@blueghost@mastodon.online avatar

LibreOffice supports digital signatures via GnuPG for OpenDocument Format (ODF) files.

Digital Signature: https://en.wikipedia.org/wiki/Digital_signature
GnuPG: https://mastodon.online/@blueghost/111974048270035570
ODF: https://mastodon.online/@blueghost/111936020896554127

Select: File > Digital Signatures > Digital Signatures > Sign Document > Select Certificate > Sign > Enter Password > OK > Close

A banner will appear stating the document is digitally signed.

Website: https://www.libreoffice.org
Mastodon: @libreoffice

blueghost, to KDE
@blueghost@mastodon.online avatar

KGpg is a frontend for GnuPG.

GnuPG: https://mastodon.online/@blueghost/111974048270035570

The default configuration in Plasma is to open in the system tray with the icon hidden.

Open: Application Launcher > KGpg > Show Hidden Icons (located next to the digital clock) > KGpg.

Close: File > Quit.
Selecting Close (the X icon in the title bar) does not close KGpg, it closes the window.

Open/Close options: https://discuss.kde.org/t/kgpg-open-close/13894

Website: https://apps.kde.org/kgpg
Mastodon: @kde

villares, to random
@villares@ciberlandia.pt avatar

Looks like I can't just keep my keys on (seahorse) and use them on :((
https://forum.manjaro.org/t/using-gnupg-with-thunderbird/156800/1

hko, to linux
@hko@fosstodon.org avatar

The new "Simple standalone Agent for cards" (https://crates.io/crates/openpgp-card-ssh-agent) is now available as a package for Linux, by the way :arch: 😏

This agent offers a frictionless UX when using ssh with keys that are stored on OpenPGP card devices: No more ongoing PIN entry required! 🚀

@dvzrv has once again done amazing packaging and documentation work! 🥳 Thank you 😃

See https://wiki.archlinux.org/title/SSH_keys#OpenPGP_card_ssh-agent for details.

hko, to linux
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.3.0, a new agent for card users.

This agent makes ssh with OpenPGP card devices friction-less: No more ongoing PIN entry!

This release adds full support for Windows, based on amazing work by @wiktor 🥳

This version supports , and equally.

If anyone with a background in MacOS or Windows packaging is interested in packaging this, we'd love to hear from you!

heaths,
@heaths@fosstodon.org avatar

@hko @wiktor I could help with the Windows installer. I've almost 25 years experience with Windows Installer and was previously the Visual Studio architect on the new installer, and worked on WiX (the original) for many years. I also wrote and maintain installers for PowerShell, OpenSSH for Windows, etc. al. I've also helped publish those to winget, chocolatey, and scoop.

Does the agent run as a service using the Service Control Manager on Windows, or just a loose exe with no recovery? Systray?

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.4, a new agent for card users.

This version comes with substantial updates to the openpgp-card-state dependency (which handles User PIN storage for OpenPGP card devices, see https://codeberg.org/openpgp-card/state).
It now supports selecting different PIN storage backends, including one to store the User PIN directly in the config file.

PIN verification error cases are now handled more defensively

hko,
@hko@fosstodon.org avatar

A card can be configured to use "direct" PIN storage in the config file by editing its configuration (in ~/.config/openpgp-card-state/config.toml on a typical linux setup) to read like this:

[[cards]]
ident = "0000:01234567"

[cards.pin_storage]
Direct = "123456"

(... if the card's identity is "0000:01234567" and the User PIN is "123456")

scy, to random German
@scy@chaos.social avatar

Ich hab vorhin mal unter https://pgp.governikus.de/ meinen -Schlüssel "vom Staat™" signieren lassen.

Sie rufen von deinem e-Perso den Namen ab, du lädst deinen Public Key hoch, wählst eine der User-IDs des Keys aus (wenn du mehrere hast), und wenn der Name der UID mit dem Namen auf dem Perso übereinstimmt, bekommst du an die Mailadresse in der UID eine Signatur von 0xA4BF43D7 "Governikus OpenPGP Signaturservice (Neuer Personalausweis)".

Ging schnell und einfach.

[1/2]

blausand,
@blausand@chaos.social avatar

@scy @deraffe Ob das Feld "eingetragener Künstler- oder Ordensname" auch zur Vergleich hinreicht, wär noch interessant.

scy,
@scy@chaos.social avatar

@blausand @deraffe Unwahrscheinlich, würde ich sagen. Du bekommst vor dem Zugriff auf den Ausweis angezeigt, welche Felder gelesen werden, und da stand bei mir nur Vorname, Nachname und akademischer Grad.

orhun, to rust
@orhun@fosstodon.org avatar

Released the new version of one of my TUI projects! 🚀

🔐 gpg-tui: Manage your GnuPG keys with ease!

🚀 View, edit, export, sign your GPG keys with an easy-to-use interface.

🦀 Written in Rust & built with @ratatui_rs

⭐ GitHub: https://github.com/orhun/gpg-tui

video/mp4

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • khanakhh
  • kavyap
  • thenastyranch
  • everett
  • tacticalgear
  • rosin
  • Durango
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • InstantRegret
  • Youngstown
  • slotface
  • anitta
  • ethstaker
  • ngwrru68w68
  • cisconetworking
  • modclub
  • normalnudes
  • osvaldo12
  • cubers
  • GTA5RPClips
  • Leos
  • tester
  • megavids
  • provamag3
  • lostlight
  • All magazines