hko, (edited ) to random
@hko@fosstodon.org avatar

I just released version 0.9.5 of the opgpcard CLI tool (https://crates.io/crates/openpgp-card-tools), now with manpage generation and generation of shell completions (work by @dvzrv, thanks! 🥳)

hko, to rust
@hko@fosstodon.org avatar

The oct tool for inspecting, configuring and using OpenPGP card devices (https://crates.io/crates/openpgp-card-tools) is on "This Week in Rust":

https://this-week-in-rust.org/blog/2024/02/21/this-week-in-rust-535/#projecttooling-updates

Yay! 🎉 Thanks again, @dvzrv 😀

#rust #rustlang #OpenPGP #nitrokey #yubikey #SmartCard

inpector, to random German
@inpector@social.saarland avatar

unterstützt nicht das standardmäßige Signieren von Mails, weil's von fraglicher Nutzung ist !? Da bleibt wohl nur für mich jetzt wo ich mal die Nerven hatte meinen PGP-Key wieder sauber zu gestalten.

https://github.com/thunderbird/thunderbird-android/issues/2734

LiveByReason, to random

Does anyone know if there is any sort of plugin you can enable for mastodon that will attempt to automatically verify signed fediverse posts?

Or if not something right in mastodon server. . . maybe a browser plugin that runs locally? That might even be more secure.

hko, to random
@hko@fosstodon.org avatar

We just released version 0.10.0 of https://crates.io/crates/openpgp-card-tools, a tool for inspecting, configuring and using cards.

This release renames the CLI tool "opgpcard" to the much shorter "oct". New features include:

  • Support for signature generation in detached, inline and cleartext forms
  • Support for PIN presentation with cards in KDF mode
  • Support for file-based private key unlocking (thanks @jcgruenhage)

Thanks to @NGIZero for financial support and @dvzrv for another great collaboration.

kushal, to programming
@kushal@toots.dgplug.org avatar
scy, to random German
@scy@chaos.social avatar

Ich hab vorhin mal unter https://pgp.governikus.de/ meinen -Schlüssel "vom Staat™" signieren lassen.

Sie rufen von deinem e-Perso den Namen ab, du lädst deinen Public Key hoch, wählst eine der User-IDs des Keys aus (wenn du mehrere hast), und wenn der Name der UID mit dem Namen auf dem Perso übereinstimmt, bekommst du an die Mailadresse in der UID eine Signatur von 0xA4BF43D7 "Governikus OpenPGP Signaturservice (Neuer Personalausweis)".

Ging schnell und einfach.

[1/2]

cjerrington, to security
@cjerrington@mstdn.social avatar

After getting my laptop reinstalled, I needed to Migrate my GPG keys to a new machine. Only done this once and thought I should write it down for myself and others.

https://claytonerrington.com/blog/migrating-gpg-keys-to-new-a-machine

hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

hko, to random
@hko@fosstodon.org avatar

Just took a first stab at running the (https://github.com/canokeys/canokey-core/) secure key implementation, containerized - and talked to the applet.

Next to the usual suspects, its OpenPGP applet also supports the Chinese national cryptography standard SM2 algorithm (see https://en.wikipedia.org/wiki/SM9_(cryptography_standard)), and I'm increasingly intrigued where and how OpenPGP is used in Chinese contexts.

dvzrv, to archlinux
@dvzrv@chaos.social avatar

Packager and upstream work that could have been avoided by a reasonable phasing out of signatures for tarballs on : https://archlinux.org/todo/fix-reproducibility-of-packages-broken-by-pypi-removing-signature-files/

kushal, to privacy
@kushal@toots.dgplug.org avatar
protonmail, to random
@protonmail@mastodon.social avatar

Standardized, interoperable is key for a better internet.

Proton and the @ietf OpenPGP Working Group are pleased to announce a crypto refresh of the standard. Standardization today ensures interoperability tomorrow.

More here ➡️ https://proton.me/blog/openpgp-crypto-refresh.

kubikpixel, to rust
@kubikpixel@chaos.social avatar

Do any of you developers know what the Server @stalwartlabs uses for an solution – Is it or even Sequoia--PGP? 🤔

I would like to use @sequoiapgp on the basis of personal arguments and this E-Mail 🔐📧

hko, to security
@hko@fosstodon.org avatar

1/ 🎉 Big news in the world! Our team's labor of love, "OpenPGP for Application Developers," is now live! Check it out: https://openpgp.dev/. 🚀📚 Our mission? Make OpenPGP accessible, enjoyable, and a go-to tool for devs!

blueghost, to email
@blueghost@mastodon.online avatar

Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.

Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.

Instructions: https://proton.me/support/how-to-use-pgp
GnuPG: https://mastodon.online/@blueghost/111974048270035570

Website: https://proton.me
Mastodon: @protonprivacy

kikobar, to random
@kikobar@acc4e.com avatar

@jwildeboer I have been using S/MIME with since at least 2015.

Many of the reasons described in the forum are true, which does not mean S/MIME is impossible to fix or use.

There is native support for S/MIME in many email clients both desktop and mobile/tablet, including most of the 'stock' clients installed by default in most of the devices, so this is not an issue.

I think the big problems are basically 2:

1.- Having a throwaway key and certificate every 30 days (as we do with Letsencrypt SSL/TLS) is very inconvenient because we would need to keep a long collection of them in order access old messages.

2.- People access their email from multiple devices, so syncing the private key securely across all of them becomes a challenge.

For the tech savvy, both problems are manageable:

1.- You can get a free S/MIME certificate from valid for 1 year here:

https://www.actalis.com/s-mime-certificates.aspx


Please read a very important reply to this post by @duxsco pointing out to the insecurity of the Actalis certificate, and providing a secure but not free alternative.


2.- You can manually add this certificate to all your devices and keep an encrypted/secure repository with all your old keys and certificates in case you need to access your archived email.

I've been doing exactly that for years and it is just fine for signing my email.

IMHO for 'fixing' the whole signing and encryption of emails, is conceptually closer to be a more consistent solution, and I use it with everyone who understands it, but I have to admit that the ecosystems is far less ready than for S/MIME (you will need to use specialised apps or installed plugins, etc.), Thunderbird being a shining exception.

PGP has several very powerful advantages:

1.- You don't need a CA for the sole purpose of generating your keys.

2.- You can use the same keys for many years.

3.- People who really trust each other can sign each other's keys creating a web-of-trust.

4.- There is a free network of keyservers where you can upload your public keys and make them available to everyone.

5.- Most people these days have their own website, blog or social media account where they can publish their public keys for cases when they distrust the public servers. They can manually exchange them too.

In the long run I believe we should promote the adoption of OpenPGP instead of S/MIME, with more people using it, native support should follow.

I am not an expert though, so I'd love to hear from others too. 😊

todd_a_jacobs, to iOS
@todd_a_jacobs@ruby.social avatar

This is more of a security question, but I currently know way more people on ruby.social than infosec.exchange. I want to use a #Yubikey for #SMIME or #GPG signing on #iOS & #iPadOS, but can't find:

  1. Any documentation about how to integrate it with Apple Mail.

  2. Anyplace that offers #x509 certificates for S/MIME at zero or minimal cost the way @letsencrypt offers free #SSL certs.

Self-signed S/MIME certs are a non-starter, and there are no full-featured #OpenPGP apps on iOS. Suggestions?

hko, (edited ) to random
@hko@fosstodon.org avatar

I've just released new versions of the openpgp-card family of libraries (https://gitlab.com/openpgp-card/openpgp-card/).

These releases bring a number of breaking changes, but come with many improvements, including a cleaned up and better documented high-level API in openpgp-card-sequoia (https://docs.rs/openpgp-card-sequoia/0.2.0/openpgp_card_sequoia/struct.Card.html).

The releases fix some issues, and build on a new, more generalized card-backend, crate.

Thanks to @NGIZero for supporting this work!

hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.0.1 of the new crate https://crates.io/crates/openpgp-card-state

This crate paves the way for convenient handling of card User PINs, for users whose threat model allows persisting the PIN locally on the host computer.

If a User PIN is stored, applications can obtain it via this crate, and perform cryptographic operations without prompting the user for PIN entry.

Currently org.freedesktop.Secret is supported for storage.

Thoughts are welcome!

hko, to random
@hko@fosstodon.org avatar

Over the last half year, I've spent time with PKCS and PIV hardware security devices. In particular, using such devices in the context.

Entry points for results of this work:

One particular focus was building CI testing infrastructure (including https://gitlab.com/hkos/virtual-piv/), to make future work on these codebases easier (and hopefully fun).

@sovtechfund]

scy, to github
@scy@chaos.social avatar

I think it's telling that , , and even all don't have a workflow for "renew an key", i.e. extend its validity before (or after) expiry. On all of them, you have to delete and re-add the key. It's as if nobody is following OpenPGP best practices and everyone is using keys without an expiry date.

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.2, a new agent for card users.

This release shows more output for error cases, both in the log output, and with GUI notifications.

I also published an updated version 0.0.3 of https://crates.io/crates/openpgp-card-state, which contains a low-level CLI tool to help with debugging/development. This version gives more debugging output for error cases.

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.2.0 of https://crates.io/crates/rsop

is a "Stateless OpenPGP" CLI tool based on .

This new version adds more support for handling passphrase-protected private key material, as well as handling of un-armored OpenPGP data.

See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

hko, to random
@hko@fosstodon.org avatar

30 years ago today, 2.6 was released via MIT.

Up to this point, two major issues had been unresolved: The legal status of the use of RSA in PGP, and export of the software from the US to the rest of the world.

With the release of PGP 2.6, the first of these two issues was resolved.

The pre-history of , , is hard to imagine, today. Even though variations of the https://en.m.wikipedia.org/wiki/Crypto_Wars remain a (tiringly) recurring political battle ground, three decades later.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • cubers
  • DreamBathrooms
  • InstantRegret
  • tacticalgear
  • magazineikmin
  • Youngstown
  • thenastyranch
  • mdbf
  • slotface
  • rosin
  • modclub
  • kavyap
  • ethstaker
  • provamag3
  • osvaldo12
  • khanakhh
  • cisconetworking
  • Durango
  • everett
  • ngwrru68w68
  • Leos
  • normalnudes
  • GTA5RPClips
  • tester
  • megavids
  • anitta
  • lostlight
  • All magazines