@hko@fosstodon.org
@hko@fosstodon.org avatar

hko

@hko@fosstodon.org

Assorted OpenPGP-related activities, mostly Rust-based. Including:

This profile is from a federated server and may be incomplete. Browse more on the original instance.

orhun, to random
@orhun@fosstodon.org avatar

POV: running away from my problems

hko,
@hko@fosstodon.org avatar

@orhun i would like to file a complaint: this does not look like a tui!

evacide, to random
@evacide@hachyderm.io avatar

When I talk about digital privacy, there is always some smug genius who shrugs and tells me, "Who cares? We all know we don't have any privacy anyway." Nothing could be more wrong. Convincing you that the fight is already over to the way people in power get you to stop resisting.

hko,
@hko@fosstodon.org avatar

@evacide @meshe also, no more bathroom doors!

It's not like anyone is unsure what's going on, there. Why even try to have privacy, then?

nitrokey, to random
@nitrokey@nitrokey.com avatar

🥳 Celebrate the Nitrokey 3 milestone with us and get Nitrokeys at a reduced price: For one week you will receive a 5% discount on all Nitrokeys!
➡️ Details about the Nitrokey 3 milestone can be found here:
https://www.nitrokey.com/.../nitrokey-3-milestone-se050...

🤓 This is the opportunity to purchase our high-quality security solutions at a reduced price to protect your digital world.
https://shop.nitrokey.com/shop/category/nitrokeys-7

hko,
@hko@fosstodon.org avatar

@nitrokey the first link seems broken, it returns a 403 for me

hko,
@hko@fosstodon.org avatar
hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

hko,
@hko@fosstodon.org avatar

oct-git is joint work with the always excellent @wiktor

Thanks to NLNet and @NGIZero for funding work on this project!

hko, (edited )
@hko@fosstodon.org avatar

oct-git and its sibling project https://crates.io/crates/openpgp-card-ssh-agent are concrete options for OpenPGP card users to explore OpenPGP use without GnuPG, today.

In addition, the #rsop "Stateless OpenPGP" tool (https://crates.io/crates/rsop) also supports using OpenPGP card devices (see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more).

hko,
@hko@fosstodon.org avatar
nirik, to random
@nirik@fosstodon.org avatar

gpg is the worst.

Generating a new set of keys on the new nitrokey3... saved my pin/admin pin in pass. Generates for a long while, then needs the pin to make the signing key... but I can't get the pin from pass while there is a gpg prompt up for the nitrokey. :( While trynig to figure out what arcane gpg command line will not use the same pinentry, it times out and I have to start again.

hko,
@hko@fosstodon.org avatar

@nirik you might consider taking a look at https://crates.io/crates/openpgp-card-tools :)

hko,
@hko@fosstodon.org avatar

@decathorpe @nirik card setup is probably not in scope for such a backend.

but there is a CLI tool for cards that aspires to be much less confusing than GnuPG: https://fosstodon.org/@hko/112462934474941259 :o)

(please yell at me if any of it is confusing :))

hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.3.1 of https://crates.io/crates/rsop, a stateless #OpenPGP ("sop") card tool based on #rPGP.
rsop natively supports OpenPGP card (hardware cryptography) devices

SOP is a standardized, vendor agnostic, CLI interface for the most common OpenPGP operations.
See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

rsop is featured in the "OpenPGP interoperability test suite" at https://tests.sequoia-pgp.org/ (under "rpgpie", which is rsop's high level OpenPGP library).

#PGP #GPG #GnuPG #rustlang

hko,
@hko@fosstodon.org avatar

Much credit and thanks to @wiktor for foundational work on OpenPGP card support in #rPGP.

Wiktor's work constitutes the core of the new https://crates.io/crates/openpgp-card-rpgp crate (used in rsop).

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.10.1 of https://crates.io/crates/openpgp-card-tools, the general purpose "oct" #OpenPGP card tool.

This release adds the "oct admin signing-pin-validity" subcommand, to configure if a card requires User PIN presentation for each signature operation, or if User PIN presentation is valid for the full duration of a connection to the card.

(#GnuPG calls this flag "forcesig")

#rustlang #PGP #gpg

hko, (edited )
@hko@fosstodon.org avatar

FWIW, I am skeptical of the usefulness of "per-signature PIN presentation" on modern OpenPGP card devices.

This mode made sense with actual Smart Cards, when used in a reader with a physical pin pad.

However, with modern USB devices, I'd say that "touch confirmation" serves a similar goal, but is more fit for purpose.

Mechanisms that move authorization for signing operations outside the host computer add some defense in depth. Repeated PIN presentation from the host computer, less so.

orhun, to rust
@orhun@fosstodon.org avatar

You can run TUIs in the browser with Rust! 🦀

🐭 ratframe : egui widget + @ratatui_rs backend.

🔥 Ratatui integrates with egui, enabling compilation to WASM!

🚀 Demo: https://gold-silver-copper.github.io/

⭐ GitHub: https://github.com/gold-silver-copper/ratatui_egui_wasm

video/mp4

hko,
@hko@fosstodon.org avatar

@orhun infinite browser -> TUI -> browser recursion, when? 😄

hko, to random
@hko@fosstodon.org avatar

Two days ago I switched my OpenPGP card-based #git signing setup away from gpg to an experimental new Rust alternative.

I did not realize how much of a quality of life improvement that would be. Very excited that pin entry popups are (almost entirely) a thing of the past for me, now.

hko,
@hko@fosstodon.org avatar

@brokenix Hey, thanks for the interest! ... watch this space :) A release is coming soon.

blinry, to random
@blinry@chaos.social avatar

Proud to present my entry for the "wild" compo at :

"scrolll" – a demo for 32 HTML scrollbars! With music from @winniehell.

https://www.youtube.com/watch?v=i-aqB9Ii38Y

hko,
@hko@fosstodon.org avatar

@blinry that is amazing :D

hko, (edited ) to rust
@hko@fosstodon.org avatar

The ecosystem gets a number of things right. Among the ones I appreciate a lot is strong encouragement of canonical formatting with .

Canonical formatting, enforced by CI, makes it much harder to e.g. strategically hide a stray dot in source code in a way that is easy to overlook - and to miss its semantical impact.

hko,
@hko@fosstodon.org avatar

@wiktor Holy cow. I hadn't read about that detail yet. That is even wilder.

hko, to linux
@hko@fosstodon.org avatar

The new "Simple standalone Agent for cards" (https://crates.io/crates/openpgp-card-ssh-agent) is now available as a package for Linux, by the way :arch: 😏

This agent offers a frictionless UX when using ssh with keys that are stored on OpenPGP card devices: No more ongoing PIN entry required! 🚀

@dvzrv has once again done amazing packaging and documentation work! 🥳 Thank you 😃

See https://wiki.archlinux.org/title/SSH_keys#OpenPGP_card_ssh-agent for details.

hko, to linux
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.3.0, a new agent for card users.

This agent makes ssh with OpenPGP card devices friction-less: No more ongoing PIN entry!

This release adds full support for Windows, based on amazing work by @wiktor 🥳

This version supports , and equally.

If anyone with a background in MacOS or Windows packaging is interested in packaging this, we'd love to hear from you!

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.4, a new agent for card users.

This version comes with substantial updates to the openpgp-card-state dependency (which handles User PIN storage for OpenPGP card devices, see https://codeberg.org/openpgp-card/state).
It now supports selecting different PIN storage backends, including one to store the User PIN directly in the config file.

PIN verification error cases are now handled more defensively

hko,
@hko@fosstodon.org avatar

A card can be configured to use "direct" PIN storage in the config file by editing its configuration (in ~/.config/openpgp-card-state/config.toml on a typical linux setup) to read like this:

[[cards]]
ident = "0000:01234567"

[cards.pin_storage]
Direct = "123456"

(... if the card's identity is "0000:01234567" and the User PIN is "123456")

marc, to random German
@marc@pub.solar avatar

Ihr sucht noch schöne Postkarten für Eure Ostergrüße?
We've got you covered!

👉️ https://www.forumzfd.de/shop

hko,
@hko@fosstodon.org avatar

@marc desktop/firefox funktioniert jetzt für mich auch

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • khanakhh
  • mdbf
  • InstantRegret
  • Durango
  • Youngstown
  • rosin
  • slotface
  • thenastyranch
  • osvaldo12
  • ngwrru68w68
  • kavyap
  • cisconetworking
  • DreamBathrooms
  • megavids
  • magazineikmin
  • cubers
  • vwfavf
  • modclub
  • everett
  • ethstaker
  • normalnudes
  • tacticalgear
  • tester
  • provamag3
  • GTA5RPClips
  • Leos
  • JUstTest
  • All magazines