This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
blug-canary-1 [2018/11/20 23:27] Tom Li |
blug-canary-1 [2024/02/29 07:33] BLUG Admin |
||
---|---|---|---|
Line 15: | Line 15: | ||
==================================== | ==================================== | ||
- | Issued for November 2018. | + | Issued for February 2024. |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 23: | Line 23: | ||
~~~~~~~~~~~~~ | ~~~~~~~~~~~~~ | ||
- | * biergaizi: | + | * biergaizi: |
- | * persmule : 0x2987A25DAC8454A5 | + | * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 |
- | * wnereiz | + | * vimacs |
THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
Line 62: | Line 62: | ||
8. Our personal safety and security is not threatened. | 8. Our personal safety and security is not threatened. | ||
- | 9. We plan to publish the next of these canary statements in the first three | + | 9. To avoid security breaches and emphasize the clarity of the warrant canary |
- | weeks of December 2018. Special note should be taken if no new canary is | + | documents, if a signer is temporarily unavailable, |
- | published by that time or if the list of statements changes without plausible explanation. | + | " |
+ | NOT be considered a valid canary document) until the signer becomes available | ||
+ | again and signs the missed documents. A new signer SHOULD NOT sign a warrant | ||
+ | canary document only due to the temporary unavailability of a existing signer. | ||
+ | |||
+ | 10. We plan to publish the next of these canary statements in the first three | ||
+ | weeks of March 2024. Special note should be taken if no new canary is published | ||
+ | by that time or if the list of statements changes without plausible explanation. | ||
+ | |||
+ | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
+ | verification an issue and somewhat a challenge. For completeness, | ||
+ | procedures for canary verification is included here. | ||
Special Announcements | Special Announcements | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | None. | + | 1. We've found a workaround for importing keys on https:// |
+ | without User-ID. The instructions for verifying persmule' | ||
+ | been added. | ||
+ | |||
+ | Canary Verification Procedures | ||
+ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
+ | |||
+ | 1. To verify biergaizi' | ||
+ | |||
+ | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
+ | https:// | ||
+ | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
+ | |||
+ | 2. To verify persmule' | ||
+ | |||
+ | a. Due to the previous attacks on OpenPGP keyservers, persmule has published | ||
+ | the OpenPGP public key to https:// | ||
+ | the standard method, it's impossible to import a OpenPGP public key without | ||
+ | User-ID. But since April 2013, we have developed a workaround, described | ||
+ | below. | ||
+ | |||
+ | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, | ||
+ | such as https:// | ||
+ | fingerprint is 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60. Note that, to | ||
+ | import this key, one must copy and paste the key in ASCII from the Keyserver | ||
+ | website to a file or console and use the command "gpg --import" | ||
+ | technical problem, Using "gpg --recv-key" | ||
+ | work. | ||
+ | |||
+ | c. This is a special dummy public key with its User-IDs and subkeys stripped | ||
+ | that we specifically created, leaving only a " | ||
+ | E-mail address, " | ||
+ | allowing the subsequent import of additional subkeys. | ||
+ | |||
+ | d. Next, with the stub key already imported, obtain the public key from | ||
+ | https:// | ||
+ | Because the dummy key with its stub User-ID is already in presence, it's | ||
+ | now possible to import the https:// | ||
+ | |||
+ | e. Use the latest GnuPG in most operating system, the signatures made by | ||
+ | persmule' | ||
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a " | ||
+ | error. | ||
+ | |||
+ | 3. To verify vimacs' | ||
+ | |||
+ | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
+ | https:// | ||
+ | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
Proof of Freshness | Proof of Freshness | ||
Line 75: | Line 140: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Sinaloa Cartel leader shocks Chapo' | + | Wednesday evening news briefing: Christian Horner cleared of allegations of inappropriate behaviour |
- | Mother of teenager who took her own life after rape trial ' | + | Secondary National Offer Day 2024: What to do if your child misses |
- | | + | Post Office scandal: I was victim of smear campaign, Henry Staunton tells MPs |
- | | + | |
- | Grenfell inquiry ' | + | Three men charged with Right-wing terrorism planned to attack Islamic centre |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | U.S. and Brazil Chose Similar Leaders. It May Lead to Smoother Relations. | + | Middle East Crisis: Parties |
- | Russia, Which Has Tried to Manipulate Interpol, Is Poised to Lead It | + | Bosnia Was Once Emptied by War and Now Faces Peacetime Emigration |
- | U.K. Coup Against Theresa May Falters. For Now. | + | Back From War, Reserve Soldiers Set Their Sights on Israels Politics as Usual |
- | Xi Visits Philippines to Celebrate Rainbow After the Rain With Duterte | + | A K-Pop Stars Lonely Downward Spiral |
- | A Tulip Planned | + | Navalnys Funeral Is Planned |
$ date -R -u | $ date -R -u | ||
- | Tue, 20 Nov 2018 23:26:45 +0000 | + | Thu, 29 Feb 2024 07:31:51 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | Version: GnuPG v2 | ||
- | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAlv0mDoACgkQ+tPrBeiO | + | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAmXgMyIACgkQ+tPrBeiO |
- | jW03sA//URvbc4BSlDk7pZ+7SUed22BYEgu5hoGNUhtCU6HT/pCkTwuoZTE9bmpr | + | jW3MDQ//TMoEfx4iU8Q7utf/zI3eId37WA5ZHmEIH/ |
- | f41+SyQaHa5VZBFcYPS6zaSHEQY/rO/u7Sr4e1z3dVjnG53XFtlyH09ewhWO9oFj | + | nRIuvb8rucDJ/ |
- | TEFR6lmy7mQBR3VD6oRWVoccufXHGLscz1cKQ1zptjinhAbphdOYxEEYyRBEUCEA | + | 6t3UEv8WUSrsYB5mf/P6sbEP/Uyp7tUBhDMsQfxk9ipV+nXd7OaDhj+W+sSIaWRy |
- | Fn+IFvqAyKR18nST5h4yoh5D4Le3hLGwxFSlPPOEMsfRrONuDUCb+8gJUzEzSHfL | + | do0Kg7lJ8w4FPcIKwwxqV89QBHOC9ooUmflOBEcaisu9NKaXKZ6Bh75UCs31ymAl |
- | cGM8oWVCaAM52rSKfMnYZYfndCn8BTnAnyey9zSdV6wf7pjBwe4mKuf9RxCw/ | + | yHqpcN6Uth3KaYgQbLar0KH4cnwrLytGe9nWSyPS+rxjMNv3xkxGGbOodo3vomX1 |
- | 0gE63vFq7RHmftparLqYcMqF6QGpl7fAX3nT5v0n9Eop8o0Weillm4IXDZgDy+/w | + | pDmHEs3P5oCvFPTiUKUPVbJjMTGjq31lt3W6e0SGpzwQHrwpNRqmNERdK0NIlT1W |
- | p9gDCYHocIvb+wwGOSLMldg7cSbKVsQmNSRTdhujcrdYGJzZjG2pF398N5F+rt75 | + | WszscUI7/cF95G/ |
- | y846xueXI429ELmdkPLiNST9YTubq0TkHr/UA2tNExWcQ9BSGhnzyPc+LziYA+ZD | + | vkqXnJO4tDyiLoj4k4f0wfnUjVyi/nkj0bKTEHuopZQhFR8AY4MmCeFB+Z9AG265 |
- | qtj5Mjy4Oya4TRkmIm/E+TspI6tTt/YA8laNhmiorRWI27MQOsqUeLPvmsHLjPH+ | + | qsoCiD2oXN/BON68bkQ4PoGidWZIsgJPeZig6y+FEN3WTr6RTnMC3GW/fdxxBybP |
- | siWFmkogMFt4xSayquDoNMAHL/Yled5W22/0okXB5xKtUdGG8NNQ/ml7sIi0aDfu | + | 2DlFHRn7E/MKVhXfoQO/6tUl63p7tIe4nbHDgIaTbh/62cGnYgHvlTCz4NmwUkU9 |
- | i/ | + | wjdLzP2w7Vd9EnL971gj6grz5lLPV4PTiUcb3mA+ezrQXtuK3NM= |
- | =n0d2 | + | =HhpS |
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ |