This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
blug-canary-3 [2019/11/23 08:57] Wu Delin |
blug-canary-3 [2025/09/30 02:09] (current) vimacs |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Beijing GNU/Linux User Group Canary (3/3) ====== | ====== Beijing GNU/Linux User Group Canary (3/3) ====== | ||
| - | < | + | < |
| - | -----BEGIN PGP SIGNED MESSAGE----- | + | |
| Hash: SHA512 | Hash: SHA512 | ||
| Line 8: | Line 7: | ||
| ==================================== | ==================================== | ||
| - | Issued for November 2019. | + | Issued for September 2025. |
| Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
| Line 17: | Line 16: | ||
| * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | ||
| - | * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | + | * persmule : 0x7636112A33805777A0646B1BFA7C50B699AC61D2 |
| - | * wnereiz | + | * vimacs |
| THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
| Line 63: | Line 62: | ||
| 10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
| - | weeks of December 2019. Special note should be taken if no new canary is published | + | weeks of October 2025. Special note should be taken if no new canary is published |
| by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
| + | |||
| + | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
| + | verification an issue and somewhat a challenge. For completeness, | ||
| + | procedures for canary verification is included here. | ||
| Special Announcements | Special Announcements | ||
| ~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
| - | 1. Since mid-October, | + | None. |
| - | expired. A new key, 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60, | + | |
| - | created and uploaded to https:// | + | |
| - | this keyserver. | + | |
| - | 2. The new key will be used by persmule to sign future warrant canary | + | Canary Verification Procedures |
| - | documents. You can verify the signature by crosschecking the other two | + | ~~~~~~~~~~~~~~~~~~~~~~~~ |
| - | documents signed by biergaizi and wnereiz for consistency. | + | |
| - | 3. Due to this key rollover, the October message was not signed by persmule. | + | 1. To verify biergaizi' |
| - | This did/does not indicate a security incident, all of the statements above | + | |
| - | were valid, and are still valid. | + | |
| - | 4. Recent attacks on OpenPGP | + | a. Obtain the public key from any traditional |
| - | within the community, as a countermeasure, | + | https:// |
| - | not published to the https:// | + | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. |
| - | cryptographic information can be obtained from the keyserver, without any | + | |
| - | User-ID. Currently, it's impossible to import | + | |
| - | User-ID to a standard GnuPG installation, | + | |
| - | for a 3rd-party to verify the canary document signed by persmule. | + | |
| - | 5. We are looking for a solution. But for now, we decided that the best | + | b. Use the latest GnuPG in any operating system. |
| - | option is starting publishing new canary documents using the new key. | + | |
| - | As a temporary measure, you can check the canary documents signed by | + | |
| - | biergaizi and wnereiz to decide the validity of the Statements. By signing | + | |
| - | their own copies, it indicates that the new key has been verified privately | + | |
| - | by them as valid. | + | |
| - | 6. This effectively reduced the number of signers to two people. It reduces | + | 2. To verify persmule' |
| - | the level of confidence, but currently there is no alternative option yet. | + | |
| - | 7. Once the technical problem of OpenPGP public key without User-ID | + | a. Due to the previous attacks on OpenPGP keyservers, persmule has published |
| - | resolved, you can check the previous signatures retroactively, and this | + | |
| - | would effectively restore the level of confidence. You can archive | + | the standard method, it' |
| - | persmule' | + | |
| - | ensure no data tampering has occured. | + | below. |
| - | 8. Unlike persmule, biergaizi | + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, |
| - | but the Key-IDs have been changed to its full fingerprint format | + | such as https:// |
| - | canary document for clarity. | + | fingerprint is 0x7636112A33805777A0646B1BFA7C50B699AC61D2. Note that, to |
| + | | ||
| + | website to a file or console and use the command "gpg --import" | ||
| + | technical problem, Using "gpg --recv-key" | ||
| + | work. | ||
| - | 9. When new information | + | c. This is a special dummy public key with its User-IDs and subkeys stripped |
| - | Announcements" | + | that we specifically created, leaving only a " |
| + | E-mail address, "Kikek < | ||
| + | allowing the subsequent import of additional subkeys. | ||
| + | |||
| + | d. Next, with the stub key already imported, obtain the public key from | ||
| + | https:// | ||
| + | Because the dummy key with its stub User-ID is already in presence, it's | ||
| + | now possible to import the https:// | ||
| + | |||
| + | e. Use the latest GnuPG in most operating system, | ||
| + | | ||
| + | |||
| + | 3. To verify vimacs' | ||
| + | |||
| + | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
| + | https:// | ||
| + | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. | ||
| + | |||
| + | b. Use the latest GnuPG in any operating system. | ||
| Proof of Freshness | Proof of Freshness | ||
| Line 117: | Line 126: | ||
| $ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
| - | Iran's internet blackout: What is happening, and why did the government turn it off? | + | BBC Breakfast boss cleared of bullying allegations |
| - | Pictures of the Day: 23 November 2019 | + | |
| - | | + | GCSE results day 2025: What time will grades be released today? |
| - | | + | Ucas Clearing 2025: How to get a last-minute university place |
| - | Sacha Baron Cohen hits out at social media ' | + | Britain braces for heatwave temperatures to soar |
| $ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
| - | The Jungle Prince | + | Middle East Updates: Trump Releases Gaza Plan and Says Hamas Must Accept It |
| - | The Broken Promise | + | |
| - | Would-Be Chinese Defector Details Covert Campaigns | + | Moldova Moves Toward Europe, but Russian Tug of War Persists |
| - | Israelis Call Netanyahu Indictment an Earthquake, but Agree on Little Else | + | Octopuses Invade English Coast, Eating Anything |
| - | The World Burns All Year. Are There Enough Planes to Douse the Flames? | + | Colombias President Reinforces Common Stereotype, Sparking Widespread Backlash |
| $ date -R -u | $ date -R -u | ||
| - | Sat, 23 Nov 2019 08:55:34 +0000 | + | Tue, 30 Sep 2025 02:08:03 +0000 |
| -----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
| - | iQIzBAEBCgAdFiEE3n2KYOSW/ | + | iHUEARYKAB0WIQRlsdhNDMVQSujfnGCovW2B2flWVAUCaNs7pAAKCRCovW2B2flW |
| - | QYSCUBAAkNAoyik1JwUhiqWHZppGfXjK381EJS8xFvxPGn+UN+wsHKfq/ | + | VHzsAQDVhKSjIX5CPgkbnajXRB5RkbRHyIgalSno48EqI+PFzgEA+1TlCHf8Z7r4 |
| - | IQ3eoYp6n5/ | + | 4brzkUjNPFO+JMQLnazU9SDsgO6VHw8= |
| - | zkz5wTVe1kuwm3dsusoatsPli9c2XhOaGmD0zDA6sfL5jNN+Zhf91m9RQs79nSy7 | + | =k12e |
| - | GsX+8qylhuYuEmJTkBW070tL2njNIcpjt4VA5rlxvz2fvjaIiyG03UVJ3NIAfecV | + | |
| - | NFIuEXEi0IdogQ3SqmEFwSa8cK/ | + | |
| - | / | + | |
| - | 64LMglIcsk58V9s6b4H3EFojafBWCf6mJP8tvU3HVsVzN1CeRXTOgEBR9mrCFCy3 | + | |
| - | XuQkvtsBGAMhyXd7aez2n5MEgWg0fn67hwauhVFxbmIJxW6gwtaqQP5SyfjUscoN | + | |
| - | E8/ | + | |
| - | a1tsBy9skLR3ALVq618zVY0dCBANrsjN4id0u1dRZNFvBBOy/ | + | |
| - | aDXGBklgZC4akOpbqGg9qO14Jer0c3jCcUtkDaTidCjNHdsQN8k= | + | |
| - | =Myog | + | |
| -----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
| </ | </ | ||