This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
blug-canary-1 [2019/11/30 15:50] Tom Li |
blug-canary-1 [2023/10/31 07:51] BLUG Admin |
||
---|---|---|---|
Line 15: | Line 15: | ||
==================================== | ==================================== | ||
- | Issued for November 2019. | + | Issued for October 2023. |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 25: | Line 25: | ||
* biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | ||
* persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | ||
- | * wnereiz | + | * vimacs |
THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
Line 70: | Line 70: | ||
10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
- | weeks of December | + | weeks of December |
by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
+ | |||
+ | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
+ | verification an issue and somewhat a challenge. For completeness, | ||
+ | procedures for canary verification is included here. | ||
Special Announcements | Special Announcements | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | 1. Since mid-October, | + | 1. We've found a workaround for importing keys on https:// |
- | expired. A new key, 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60, | + | without User-ID. The instructions for verifying |
- | created and uploaded to https://keys.openpgp.org/, it can be obtained from | + | been added. |
- | this keyserver. | + | |
+ | Canary Verification Procedures | ||
+ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
+ | |||
+ | 1. To verify biergaizi' | ||
+ | |||
+ | a. Obtain the public | ||
+ | https://keyserver.ubuntu.com, and import the public key. The fingerprint | ||
+ | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
+ | |||
+ | 2. To verify persmule' | ||
- | 2. The new key will be used by persmule | + | a. Due to the previous attacks on OpenPGP keyservers, persmule has published |
- | documents. You can verify | + | the OpenPGP public key to https:// |
- | documents signed by biergaizi and wnereiz for consistency. | + | |
+ | User-ID. But since April 2013, we have developed a workaround, described | ||
+ | below. | ||
- | 3. Due to this key rollover, the October message was not signed by persmule. | + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, |
- | This did/does not indicate | + | such as https:// |
- | were valid, and are still valid. | + | fingerprint is 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60. Note that, to |
+ | import | ||
+ | | ||
+ | | ||
+ | work. | ||
- | 4. Recent attacks on OpenPGP keyservers have raised great security concerns | + | c. This is a special dummy public key with its User-IDs and subkeys stripped |
- | within the community, as a countermeasure, | + | that we specifically created, leaving |
- | not published to the https:// | + | E-mail address, " |
- | cryptographic information can be obtained from the keyserver, without any | + | |
- | User-ID. Currently, it's impossible to import a OpenPGP public key without | + | |
- | User-ID to a standard GnuPG installation, as a result, it's not possible | + | |
- | for a 3rd-party to verify | + | |
- | 5. We are looking for a solution. But for now, we decided that the best | + | d. Next, with the stub key already imported, obtain the public key from |
- | option is starting publishing new canary documents | + | |
- | As a temporary measure, you can check the canary documents signed by | + | |
- | biergaizi and wnereiz | + | now possible |
- | their own copies, it indicates that the new key has been verified privately | + | |
- | by them as valid. | + | |
- | 6. This effectively reduced | + | e. Use the latest GnuPG in most operating system, the signatures made by |
- | the level of confidence, but currently there is no alternative option yet. | + | persmule' |
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a " | ||
+ | error. | ||
- | 7. Once the technical problem of OpenPGP public key without User-ID is | + | 3. To verify vimacs' signature... |
- | resolved, you can check the previous signatures retroactively, | + | |
- | would effectively restore the level of confidence. You can archive | + | |
- | persmule's signature | + | |
- | ensure no data tampering has occured. | + | |
- | 8. Unlike persmule, biergaizi and wnereiz' | + | a. Obtain the public key from any traditional OpenPGP Keyserver, such as |
- | but the Key-IDs have been changed to its full fingerprint | + | |
- | canary document for clarity. | + | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. |
- | 9. When new information is available, it will be published in the " | + | b. Use the latest GnuPG in any operating system. |
- | Announcements" | + | |
Proof of Freshness | Proof of Freshness | ||
Line 124: | Line 140: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | London Bridge attack: Usman Khan was studentand personal friend | + | NHS patients waiting longer than nine months to be offered chance to switch hospital |
- | 'A beautiful spirit who always took the side of the underdog' | + | UK weather: Amber warnings issued ahead of Storm Ciaran |
- | | + | Monday evening news briefing: Israeli tanks cut key road out of Gaza City |
- | Europe becomes cocaine exporter as countries overflow with drug | + | Boris Johnson ' |
- | Crossbow killer, 51, who shot his heavily pregnant ex-wife | + | Pictured: Police round up runaway swan in bizarre Hot Fuzz moment |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Students Fainting From Hunger | + | Israel-Hamas War: Israel Will Press On in Gaza, Netanyahu Says, as Troops Advance |
- | For Filipino Seafarers, a Lonely Life Celebrated in Song | + | Near an Acapulco Beach: Food, Water and Prayer After Hurricane Otis |
- | How an Anti-Brexit London District Could Help Boris Johnson Triumph | + | Riot in Dagestan as Mob Storms Airport Looking for Israeli Passengers |
- | Spains Leftist Outsiders Are on the Verge of Getting Inside | + | A Very Slow Game: Why the Pace of Israels Ground Operation Counts |
- | Stabbings Around London Bridge Kill 2 in Terrorist Incident | + | A Leaning Tower in Italy (Not Pisa) Becomes a Worry |
$ date -R -u | $ date -R -u | ||
- | Sat, 30 Nov 2019 15:48:22 +0000 | + | Tue, 31 Oct 2023 07:48:30 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | Version: GnuPG v2 | ||
- | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAl3ij1UACgkQ+tPrBeiO | + | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAmVAsYUACgkQ+tPrBeiO |
- | jW1ePA/7B0KjWXQU6bMlzrh9HggghVmRMju6d0Ox43UYa2jAKkG/XfxWk6h33kH1 | + | jW1DDxAAhhS2KOKHchZ0uQci0sO38iQAiGfw0t4uSzNO+Wk+GGxx+rJwj81/l6YS |
- | EZQu6HCTvUTJ3sygxWzJDapTM/8+lOhJ+SE1qCWYheeDuY9auvJaqXLDHMJ3ey7X | + | g7kE6Hm3IHf8FJQSGzCT1HaURtABX279vS5MIxrbPnI+hPTi22py5140qyiSRpVh |
- | ABPWJFWgEnJK42E/BTqHPirOPOaD1XOcbsqw8NCrKmqt4ijR8SD3JsTJRZS6EtKw | + | mSNDfa+R7xAwu5872v6cF8TbJNkDEg1q3vVgF6ubp0ibEzI79y/7IYAtgMU87o29 |
- | sYjSvwdFOv3SBza0nrCiOxisb2Pq48S5jk0LVCcod8i1hvVG1v9kSupzQJGMuswp | + | nQ1VMLxfENQTJa1eUijugc0rcGju9MajtAUqGCYGVjnJ31I5awGwa7v53vltjfzm |
- | SItYWz9JogO7s1V3GTn2rTp8kNtzo3QBINXU0dMv8o++rz1dwP1K9jh3E1LP3kNX | + | 0TY3FIprFsznLyWz9gcX/vSv4kDioY7JUkrPQIHDcyUtGAxCFaush6kmV54klWgH |
- | dbEMC8FRUFbKi9psL+LVHkchrdWJ9lIOUJy/6mUKc9+xlNkqyBLQHZI930qF4hYZ | + | ii6/ |
- | nY6KF0UsBlEan8BJEF2CjJ8pM9JkuQH33Ek9jtNDZoC1OAH0YUJSDyhkCthW6NDT | + | 6khZZZ/2LTv031Xl4rJX4sIR4ns98J/ |
- | o1DcFPZ/BaaBOooGtg9i/Hb81o0Rsft8atzPOyJH8DaNp2MD2dA7Sz2yWJG6yDAL | + | nodBhkjghs9pyYtxmyv1e66r3DNlEY1baBxUwKArqFmQIj3CgytGKyiEjsl4Khkv |
- | kAi7ZOMSndxthpvvNbBobCKU9brCQzkNeL/0ZJS+nBkhqWwNilnp/WsxKcrwwF7s | + | ttO8Rz+Ez9PyA5zKNmuKE3/ |
- | 7SFkXX7ZBY8qhQsDr7QHx0IWJitpwABFqfVZ1Wy8RCz9LGaEa1U84bu3cdaUVNjC | + | 8vf8hWlRyulEZlRtUHp2ryPuxWz+yBpCdMhOmJKtmximc0/eU+8j5uNUlCH1W9lN |
- | qmc89M6GblgJXSQOeTCaspcuWR+x4VGuOX8mOzBs65tmmsm4YY0= | + | 4hJcaYy7HG9OQ/c+Cqy1GyflivDBO/ChgV/gjpW9rny/5TyIsg8= |
- | =7+YM | + | =x3A5 |
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ |