This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
blug-canary-1 [2023/02/27 15:09] BLUG Admin |
blug-canary-1 [2024/03/30 20:52] BLUG Admin |
||
---|---|---|---|
Line 15: | Line 15: | ||
==================================== | ==================================== | ||
- | Issued for February 2023. | + | Issued for March 2024. |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 70: | Line 70: | ||
10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
- | weeks of March 2023. Special note should be taken if no new canary is published | + | weeks of April 2024. Special note should be taken if no new canary is published |
by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
Line 80: | Line 80: | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | None. | + | 1. We've found a workaround for importing keys on https:// |
+ | without User-ID. The instructions for verifying persmule' | ||
+ | been added. | ||
Canary Verification Procedures | Canary Verification Procedures | ||
Line 95: | Line 97: | ||
2. To verify persmule' | 2. To verify persmule' | ||
- | a. Unfortunately, | + | a. Due to the previous |
- | | + | the OpenPGP |
- | countermeasure, | + | |
- | | + | |
- | it's impossible to import a OpenPGP public key without User-ID | + | |
- | | + | |
- | b. We are looking for a solution. But for now, you should check the | + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, |
- | | + | such as https:// |
- | | + | |
- | to two people. It reduces | + | |
- | | + | |
+ | technical problem, Using "gpg --recv-key" | ||
+ | | ||
- | c. Once the technical problem of using a public key without | + | c. This is a special dummy public key with its User-IDs and subkeys stripped |
- | | + | that we specifically created, leaving only a " |
- | | + | E-mail address, " |
- | | + | |
- | | + | |
+ | d. Next, with the stub key already imported, obtain the public key from | ||
+ | https:// | ||
+ | | ||
+ | now possible to import the https:// | ||
+ | |||
+ | e. Use the latest GnuPG in most operating system, the signatures made by | ||
+ | | ||
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a " | ||
+ | | ||
3. To verify vimacs' | 3. To verify vimacs' | ||
Line 126: | Line 140: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Brexit: What is the Northern Ireland Protocol? | + | Thursday evening news briefing: Michael Goves no-fault evictions ban thrown into doubt |
- | Matt Hancock seen wearing Newcastle United shirt he auctioned off for NHS workers | + | Wednesday evening news briefing: Landlords could be banned from raising rent under radical SNP crackdown |
- | Nandos cleaner demanded 20k after he saw staff member drop burger on floor then serve it to customer | + | Tuesday evening news briefing: Biden vows to move heaven |
- | | + | Monday evening news briefing: |
- | Spectacular Northern Lights seen across | + | |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Live Updates: Russia Targets Ukraine With Overnight Drone Strikes | + | How African Immigrants Have Revived a Remote Corner |
- | | + | A Stork, a Fisherman |
- | Dying Children | + | Kings College Chapel, 438 Solar Panels |
- | Live Updates: Britain | + | |
- | What Is the Northern Ireland Protocol? | + | Dispute in Israel Over Drafting Ultra-Orthodox Jews Threatens Netanyahu |
$ date -R -u | $ date -R -u | ||
- | Mon, 27 Feb 2023 15:08:21 +0000 | + | Sat, 30 Mar 2024 20:51:12 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAmP8x4MACgkQ+tPrBeiO | + | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAmYIe28ACgkQ+tPrBeiO |
- | jW3mhg//Xsv6z8mczjY6o5WSTMKGCtVDcOuw8MLNatjdqJ9ttSUEN1jULkc1nYpt | + | jW1yghAAkUYMlYuGg3ihG1uBw417y2oNvBGvCk4HYtIElrbd2DNL/JV/+/LkQW/Z |
- | 39xCUte5FhZHl905Zt1L/2hsID2L/9QpkiS7we0SGL6fPKjJo6kOeL0xT2OvSXyu | + | rKMBgGtYHk/ |
- | ZkMiZ+xV7e6pRu0m9yPd3zBYbKgWF1n+MiMHhcLSupr530voyV3sFUdGbyRJkKmo | + | obl/ |
- | JMSLyfxMyfCDuJp3849rp6cCpMtDctom2PuPhk4cQXX620xC+1hFGssM1LJ8+ewE | + | JH7EsqEUBpCdrzyv7uYWLNOru2t6IvSXNcjB1Ay5CpwO3Bchu8EIhp433Wd5x/yb |
- | 1m/M3gvJloXuoRtAUTRTGPqvJyQ6pU6NvyHI1ztF8+2Hbo7aHaxeFO4s23BMMGRb | + | xTPKkdC8yuusZCR/zLIUX7cJWYH7VH+chWf1RxAlkNQ5CCd51I741wY7/rYB5ZSU |
- | MiT8YleiVujopVyMY8XTjPiikrqECGfTVW9tdTZ53MaQDGviv7/vlHTL9EtiSLrR | + | r4wib3+hnWYIktr4GC7QSeRhxocJcMHuKHWz6SgOQWqQDf8dYRiPGr72xtiZD2w9 |
- | 3Xd9o1SLFmUwt1pbtbJhHrQzFnzPGYBUwYwWLHFtq2Vj4yR1Li12e9joJqM/yIRS | + | 9W13osDpdkZkULD3lKxp/dwpklOlciComr1xGOk0wQoC7QpRlY+2wpUyIfAKxjaM |
- | ss2LKvWvoR6FNxnCU1n7GG11A2xXxw5e5XITg6WI0eZlg1PCjhzbCHLLnlh2W8+z | + | oWsUYeIw8nWnxXljk8jNgSJ0XOnB4Po85xtWLk3MpAViy+s/ |
- | 1m0S9hb3K2GWamwgfmukL6DawYR/3w72+qkUOkAHrbVrCPy88jPJOSmDh+XPfZRq | + | dcUjL3ZZquPGUzhDCD/ |
- | tkHi1Pfyh6cT2WUMmVCGhux4h8yaulkXPXT1g8ymLaaTdNVIa1MlyBotGAqnoJR3 | + | J7XHj8bGfbwmvBJoFO9jUFt+o2M7g+G00GsqPhQ7eIIKzFcuqMlR41ajWYUUHmD9 |
- | mRZ+MDJbOlWbrrRRzHtllnbOk2Ynn+lV2YEIgALvYInlvx00ocw= | + | Jq6fwrZZ+zgyKnjZ75E94uQqd7e54DF8wcpYoV/ |
- | =dMlX | + | =5M8V |
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ |