stv0g, to random German
@stv0g@chaos.social avatar

I updated my crowd-sourced list of , , and , security tokens:

https://l.0l.de/tokens

Feel free to have a look if you are in the market for a new security token :-) Contributions and feedback are highly welcome :)

kubikpixel, to rust
@kubikpixel@chaos.social avatar

Do any of you developers know what the Server @stalwartlabs uses for an solution – Is it or even Sequoia--PGP? 🤔

I would like to use @sequoiapgp on the basis of personal arguments and this E-Mail 🔐📧

wiktor,
@wiktor@metacode.biz avatar

Based on their Cargo.toml (https://github.com/stalwartlabs/mail-server/blob/e10083651b4bf58d4a78c49f285efac9c5bad4e2/crates/jmap/Cargo.toml#L48) it seems they’re using experimental cryptographic backend which is not "considered mature enough for general consumption": https://gitlab.com/sequoia-pgp/sequoia/-/tree/main/openpgp?ref_type=heads#experimental-and-variable-time-cryptographic-backends

Additionally it looks like they’re not using the recommended way of importing Sequoia: https://gitlab.com/sequoia-pgp/sequoia/-/tree/main/openpgp?ref_type=heads#how-to-select-crypto-backends-in-crates

I don’t have any personal association with Stalwart but maybe it'd be a good idea to report that at https://github.com/stalwartlabs/mail-server/issues ?

👋

kubikpixel,
@kubikpixel@chaos.social avatar

@wiktor thanks! 👍

purism, to linuxphones
adamsandy,

@purism

Will this work with pgp email?

hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new #OpenPGP signing and verification tool for use with the #Git distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

#RustLang #PGP #GnuPG #gpg #Nitrokey #YubiKey

hko,
@hko@fosstodon.org avatar

oct-git is joint work with the always excellent @wiktor

Thanks to NLNet and @NGIZero for funding work on this project!

dvzrv,
@dvzrv@chaos.social avatar
kubikpixel, to email
@kubikpixel@chaos.social avatar

»8 Ways Your Account Is Vulnerable to 'ers«

It would help a little to use signatures, but this alone irritates many because they "can't read" the attached file. Why do they call themselves -conscious professionals and users? Implementing something like this in a company is really not too much effort. In my opinion, this alone would increase the sender's confidence considerably.

📧 https://www.howtogeek.com/email-account-vulnerable-to-hackers/

Cyb3rrunn3r,
@Cyb3rrunn3r@chaos.social avatar

@kubikpixel Ooooooh ja. Auch immer wieder. „Ich kann den Anhang nicht öffnen“ 🤦‍♂️
Typische DAUs eben. Klicken auf jeden Anhang, der nicht bei 3 auffm Baum ist und dann wundern sich Firmen, wenn se Malware haben?? 😂

janvlug, to linuxphones
@janvlug@mastodon.social avatar
hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.3.1 of https://crates.io/crates/rsop, a stateless ("sop") card tool based on .
rsop natively supports OpenPGP card (hardware cryptography) devices

SOP is a standardized, vendor agnostic, CLI interface for the most common OpenPGP operations.
See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

rsop is featured in the "OpenPGP interoperability test suite" at https://tests.sequoia-pgp.org/ (under "rpgpie", which is rsop's high level OpenPGP library).

hko,
@hko@fosstodon.org avatar

Much credit and thanks to @wiktor for foundational work on OpenPGP card support in .

Wiktor's work constitutes the core of the new https://crates.io/crates/openpgp-card-rpgp crate (used in rsop).

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.10.1 of https://crates.io/crates/openpgp-card-tools, the general purpose "oct" #OpenPGP card tool.

This release adds the "oct admin signing-pin-validity" subcommand, to configure if a card requires User PIN presentation for each signature operation, or if User PIN presentation is valid for the full duration of a connection to the card.

(#GnuPG calls this flag "forcesig")

#rustlang #PGP #gpg

hko, (edited )
@hko@fosstodon.org avatar

FWIW, I am skeptical of the usefulness of "per-signature PIN presentation" on modern OpenPGP card devices.

This mode made sense with actual Smart Cards, when used in a reader with a physical pin pad.

However, with modern USB devices, I'd say that "touch confirmation" serves a similar goal, but is more fit for purpose.

Mechanisms that move authorization for signing operations outside the host computer add some defense in depth. Repeated PIN presentation from the host computer, less so.

blueghost, to email
@blueghost@mastodon.online avatar

Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.

Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.

Instructions: https://proton.me/support/how-to-use-pgp
GnuPG: https://mastodon.online/@blueghost/111974048270035570

Website: https://proton.me
Mastodon: @protonprivacy

#Proton #ProtonMail #ProtonPrivacy #OpenPGP #PGP #GnuPG #GPG #Email #Encryption #E2EE #InfoSec #Privacy

iuvi,
@iuvi@mastodon.social avatar

@protonprivacy @blueghost (can be) true, buuut, theres one thing wich mess people up - many takes writing from/to proton mail users as something wich will be encrypted "by default" without any knowledge of how pgp keys works + it just about trust that proton does not read messages when storing secret key themselves...

protonprivacy,
@protonprivacy@mastodon.social avatar

@iuvi @blueghost Note that Proton Mail servers don't hold your private master key directly — it is always stored encrypted with your account password. And we don't have access to your account password.

183231bcb, to random

Can anymany tell me how I'm "supposed" to use end-to-end encryption with XMPP?

As far as I can tell there are three totally different ways to do E2EE:

a)OTR : "[https://xmpp.org/extensions/xep-0364.html](Not intended to be a current standard), or technical specification, as better (albeit, newer and less well tested) methods of end-to-end encryption exist for XMPP. "

b)OpenPGP: There are at least two different XEPs about it. XEP-0027 is obsolete, while XEP-0373 is "experimental" but hasn't been updated in almost three years.

c)OMEMO: "Experimental" and hasn't been updated in over two years.

Is there a way to do E2EE in XMPP which is neither deprecated nor experimental? What's the "Current stable" way to do it?

hko, to linux
@hko@fosstodon.org avatar

The new "Simple standalone #SSH Agent for #OpenPGP cards" (https://crates.io/crates/openpgp-card-ssh-agent) is now available as a package for #Arch Linux, by the way :arch: 😏

This agent offers a frictionless UX when using ssh with keys that are stored on OpenPGP card devices: No more ongoing PIN entry required! 🚀

@dvzrv has once again done amazing packaging and documentation work! 🥳 Thank you 😃

See https://wiki.archlinux.org/title/SSH_keys#OpenPGP_card_ssh-agent for details.

#rustlang #rust #openssh #hsm #pgp #gpg #gnupg #archlinux #linux

hko, to linux
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.3.0, a new #SSH agent for #OpenPGP card users.

This agent makes ssh with OpenPGP card devices friction-less: No more ongoing PIN entry!

This release adds full support for Windows, based on amazing work by @wiktor 🥳

This version supports #Linux, #MacOS and #Windows equally.

If anyone with a background in MacOS or Windows packaging is interested in packaging this, we'd love to hear from you!

#rustlang #rust #openssh #hsm #pgp #gpg #gnupg

heaths,
@heaths@fosstodon.org avatar

@hko @wiktor I could help with the Windows installer. I've almost 25 years experience with Windows Installer and was previously the Visual Studio architect on the new installer, and worked on WiX (the original) for many years. I also wrote and maintain installers for PowerShell, OpenSSH for Windows, etc. al. I've also helped publish those to winget, chocolatey, and scoop.

Does the agent run as a service using the Service Control Manager on Windows, or just a loose exe with no recovery? Systray?

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.4, a new #SSH agent for #OpenPGP card users.

This version comes with substantial updates to the openpgp-card-state dependency (which handles User PIN storage for OpenPGP card devices, see https://codeberg.org/openpgp-card/state).
It now supports selecting different PIN storage backends, including one to store the User PIN directly in the config file.

PIN verification error cases are now handled more defensively

#rustlang #rust #openssh #hsm #pgp #gpg #gnupg

hko,
@hko@fosstodon.org avatar

A card can be configured to use "direct" PIN storage in the config file by editing its configuration (in ~/.config/openpgp-card-state/config.toml on a typical linux setup) to read like this:

[[cards]]
ident = "0000:01234567"

[cards.pin_storage]
Direct = "123456"

(... if the card's identity is "0000:01234567" and the User PIN is "123456")

scy, to random German
@scy@chaos.social avatar

Ich hab vorhin mal unter https://pgp.governikus.de/ meinen -Schlüssel "vom Staat™" signieren lassen.

Sie rufen von deinem e-Perso den Namen ab, du lädst deinen Public Key hoch, wählst eine der User-IDs des Keys aus (wenn du mehrere hast), und wenn der Name der UID mit dem Namen auf dem Perso übereinstimmt, bekommst du an die Mailadresse in der UID eine Signatur von 0xA4BF43D7 "Governikus OpenPGP Signaturservice (Neuer Personalausweis)".

Ging schnell und einfach.

[1/2]

blausand,
@blausand@chaos.social avatar

@scy @deraffe Ob das Feld "eingetragener Künstler- oder Ordensname" auch zur Vergleich hinreicht, wär noch interessant.

scy,
@scy@chaos.social avatar

@blausand @deraffe Unwahrscheinlich, würde ich sagen. Du bekommst vor dem Zugriff auf den Ausweis angezeigt, welche Felder gelesen werden, und da stand bei mir nur Vorname, Nachname und akademischer Grad.

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.2.0 of https://crates.io/crates/rsop

is a "Stateless OpenPGP" CLI tool based on .

This new version adds more support for handling passphrase-protected private key material, as well as handling of un-armored OpenPGP data.

See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

vanitasvitae,
@vanitasvitae@fosstodon.org avatar

@hko what revision of the SOP spec do you implement?
Might be worth stating that somewhere on the project page :)

hko,
@hko@fosstodon.org avatar

@vanitasvitae good point/question.

Since rsop's CLI is generated from https://crates.io/crates/sop, the supported SOP version is more or less what that crate implements.

Independently, rsop currently still misses some bits (e.g. setting a new passphrase for secret key packets).

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • osvaldo12
  • khanakhh
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • everett
  • ngwrru68w68
  • Durango
  • anitta
  • InstantRegret
  • GTA5RPClips
  • cubers
  • ethstaker
  • normalnudes
  • tacticalgear
  • cisconetworking
  • tester
  • Leos
  • modclub
  • megavids
  • provamag3
  • lostlight
  • All magazines