This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
blug-canary-1 [2019/05/09 18:10] Tom Li |
blug-canary-1 [2024/04/30 16:36] (current) BLUG Admin |
||
---|---|---|---|
Line 15: | Line 15: | ||
==================================== | ==================================== | ||
- | Issued for April 2019. | + | Issued for April 2024. |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 23: | Line 23: | ||
~~~~~~~~~~~~~ | ~~~~~~~~~~~~~ | ||
- | * biergaizi: | + | * biergaizi: |
- | * persmule : 0x2987A25DAC8454A5 | + | * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 |
- | * wnereiz | + | * vimacs |
THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
Line 62: | Line 62: | ||
8. Our personal safety and security is not threatened. | 8. Our personal safety and security is not threatened. | ||
- | 9. We plan to publish the next of these canary statements in the first three | + | 9. To avoid security breaches and emphasize the clarity of the warrant canary |
- | weeks of May 2019. Special note should be taken if no new canary is | + | documents, if a signer is temporarily unavailable, |
- | published by that time or if the list of statements changes without plausible explanation. | + | " |
+ | NOT be considered a valid canary document) until the signer becomes available | ||
+ | again and signs the missed documents. A new signer SHOULD NOT sign a warrant | ||
+ | canary document only due to the temporary unavailability of a existing signer. | ||
+ | |||
+ | 10. We plan to publish the next of these canary statements in the first three | ||
+ | weeks of May 2024. Special note should be taken if no new canary is published | ||
+ | by that time or if the list of statements changes without plausible explanation. | ||
+ | |||
+ | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
+ | verification an issue and somewhat a challenge. For completeness, | ||
+ | procedures for canary verification is included here. | ||
Special Announcements | Special Announcements | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | None. | + | 1. We've found a workaround for importing keys on https:// |
+ | without User-ID. The instructions for verifying persmule' | ||
+ | been added. | ||
+ | |||
+ | Canary Verification Procedures | ||
+ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
+ | |||
+ | 1. To verify biergaizi' | ||
+ | |||
+ | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
+ | https:// | ||
+ | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
+ | |||
+ | 2. To verify persmule' | ||
+ | |||
+ | a. Due to the previous attacks on OpenPGP keyservers, persmule has published | ||
+ | the OpenPGP public key to https:// | ||
+ | the standard method, it's impossible to import a OpenPGP public key without | ||
+ | User-ID. But since April 2013, we have developed a workaround, described | ||
+ | below. | ||
+ | |||
+ | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, | ||
+ | such as https:// | ||
+ | fingerprint is 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60. Note that, to | ||
+ | import this key, one must copy and paste the key in ASCII from the Keyserver | ||
+ | website to a file or console and use the command "gpg --import" | ||
+ | technical problem, Using "gpg --recv-key" | ||
+ | work. | ||
+ | |||
+ | c. This is a special dummy public key with its User-IDs and subkeys stripped | ||
+ | that we specifically created, leaving only a " | ||
+ | E-mail address, " | ||
+ | allowing the subsequent import of additional subkeys. | ||
+ | |||
+ | d. Next, with the stub key already imported, obtain the public key from | ||
+ | https:// | ||
+ | Because the dummy key with its stub User-ID is already in presence, it's | ||
+ | now possible to import the https:// | ||
+ | |||
+ | e. Use the latest GnuPG in most operating system, the signatures made by | ||
+ | persmule' | ||
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a " | ||
+ | error. | ||
+ | |||
+ | 3. To verify vimacs' | ||
+ | |||
+ | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
+ | https:// | ||
+ | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
Proof of Freshness | Proof of Freshness | ||
Line 75: | Line 140: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Pictures | + | Introducing Latest |
- | Dog owners are no longer allowing pets to die as figures show rise in 'Super Vet' procedures, ABI figures show | + | |
- | Londonderry riots: Woman killed in ' | + | Friday evening news: King to resume public duties |
- | US couple | + | Thursday evening news briefing: Yousafs political future |
- | Dingo attack: Father saves toddler | + | Wednesday evening news briefing: Teenage girl arrested |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Dueling Popes? Maybe. Dueling Views in a Divided Church? Definitely. | + | Middle East Crisis: Netanyahu Again Vows to Invade Rafah With or Without Cease-Fire Deal |
- | North Koreas State-Run Economy Falters Under Sanctions, Testing Elite Loyalty | + | Georgia Bill Targeting Foreign Interests Draws Protests |
- | Battle for .amazon Domain Pits Retailer Against South American Nations | + | Surrounded by Fighters |
- | France Debates How to Rebuild Notre-Dame, Weighing History | + | How Capitalists in Communist Cuba Are an Economic Lifeline |
- | U.S. Scholar | + | Mali Claims Death of Abu Huzeifa, Terrorist |
$ date -R -u | $ date -R -u | ||
- | Fri, 19 Apr 2019 21:57:42 +0000 | + | Tue, 30 Apr 2024 16:34:02 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | Version: GnuPG v2 | ||
- | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAly6RGAACgkQ+tPrBeiO | + | iQIzBAEBCgAdFiEEJVIRsjlaWj4OSKDx+tPrBeiOjW0FAmYxHZQACgkQ+tPrBeiO |
- | jW01MxAAkyAEr2Ah28lKluGC5JPkC0KgpFaXq3mosA16IqImOAci0ZZ0UvcRVsfO | + | jW1i1Q/ |
- | HDcVemKQxS6bvSKl5+hblJu+Mueiq1NaK0M7brfpni5gsojWFEXIneZVrVnnPAII | + | uz2NuDmIk5ygnxjhy1leGb8XRRimbMKgKL/ |
- | NBq9zwOwiUQY1kSO/qR5ENB4hwpc+DdUHUTwkXgKiBimFKMzFcjZsIT+kk5FcT2p | + | 8GY/GYPCl52VtG7kwLYw9HzvlwGZrTFWeOuSBqvETZhesxWmXWxEJH4is9vXHLIv |
- | 7KkJOWvATE4Sm5eqGODHc0TInwaS04tA7u0oNp2d0RCEctZcMTOQF2p2Tl/wuzGc | + | 4PPmBZIqscJStKHlo52xJWEb1zd/JGrE1XcPlIoWz4xDGc1c5qC6pcYV5SBADPd5 |
- | P9Cnyu2DqPM40C2RysDx+x8m2yWI80TUucBu8et89aEiT4X3W8KzP056edzf7wWp | + | OT60xdVqvuTKShlyENwQqIR2oCjTBBXIdyMZyrXKxHqPKk4UKyrcQI2L5S4CX9xk |
- | u7/ukOWaEXBQf4Jr1a4g/c2q/BCZEaT76ncUOSYX46h+subBq5QsMTNh9TiPcCId | + | pnLqn3vrr7RMLkwo7wFLQQfKfKmp5Z83BdXdcagS9miLOXFi82OOxGKLSzq+KZ/t |
- | /uAKIJ+AqWza4aqOhUpD5Iz37xH4KvrrIIf33ynJa+rNHNMr+1AbvqSpaSo7Yej0 | + | YWQzYozCFC6uvXNc8WY5EV46Z0E/vUsY5oqZC90aLhS1TDwl/7Bh2u/jVtlsdpSQ |
- | sX0uFB8Nl9edPvX92dDsXnVz8Fn/o7ghowUXtMif08vgTmbKzTbJHLhuTMQ5PEib | + | rBtZPyHkywguwFfL/+Cb4XGN7OapdyBscrC6VmyPXb37txEZpqYFMz6duwukJXO4 |
- | Aqe4Zp4PV71Cag79BI7KR2g6FmgT3evm7ViWheRO1FOlDiYmNa4WcnABArgzIF7C | + | s9WTgX/61DWCusrZLo9RuIIiyGprfGfzb0MOrAU78ePDOZng2CCnXnwT4ErN6pw1 |
- | 3xBPseBKlxLk1SqMVZyM2YlfmYFJ9v9Ju5wAjKo63PEhZl/ | + | 4xiALByAwvYFPLzuJRlhSxzZPILXSmFrG4zQ6MgbmFX8lcRc1M9dMT23IeO4ZpIg |
- | gVOtr3a29yZpStS2Fh6kTlLLjfTB0cCPXtVTVl9URrUqZvfXtjk= | + | FHsfe3tRW87N8PkjJ4hAjbmf9V4206HIEzWPPrpniAxgzAkrp+c= |
- | =9wre | + | =YG7W |
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ |