User Tools

Site Tools


blug-canary-2

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
blug-canary-2 [2019/11/21 16:06]
persmule
blug-canary-2 [2020/09/17 15:46]
persmule
Line 1: Line 1:
-====== Beijing GNU/Linux User Group Canary (2/3) ====== 
- 
-<code> 
 -----BEGIN PGP SIGNED MESSAGE----- -----BEGIN PGP SIGNED MESSAGE-----
 Hash: SHA512 Hash: SHA512
Line 8: Line 5:
 ==================================== ====================================
  
-Issued for November 2019.+Issued for September 2020.
  
 Don't just trust the contents of this file blindly! Verify the Don't just trust the contents of this file blindly! Verify the
Line 18: Line 15:
 * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D
 * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60
-wnereiz  0x0A6A91990AC98712274AA18DFDFF2E13AA25BE72+vimacs   0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403
  
 THREE DOCUMENTS IN TOTAL. THREE DOCUMENTS IN TOTAL.
Line 63: Line 60:
  
 10. We plan to publish the next of these canary statements in the first three 10. We plan to publish the next of these canary statements in the first three
-weeks of December 2019. Special note should be taken if no new canary is published+weeks of October 2020. Special note should be taken if no new canary is published
 by that time or if the list of statements changes without plausible explanation. by that time or if the list of statements changes without plausible explanation.
  
Line 69: Line 66:
 ~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~
  
-1. Since mid-Octoberpersmule'old signing key 0x2987A25DAC8454A5 has +1. Due to personal reasonswnereiz (0xFDFF2E13AA25BE72) voluntarily decided 
-expired. A new key0xEDFFE248ECFACDE3C805906804A40D21DBB89B60, has been +to quit from the warrant canary team and he is no longer a signer of the 
-created and uploaded to https://keys.openpgp.org/, it can be obtained from +warrant canary documents since April 15th, 2020. All statements from the 
-this keyserver.+warrant canary documents before this date are still valid. This is an official 
 +decision that can be verified by checking the warrant canary document in April, 
 +signed by wneriez. 
 + 
 +2. In the previously mentioned document designed by wneriez in April 2020, 
 +the date in its statements was mistakenly written as "April 15th, 2019", 
 +which was a typo, but cannot be changed due to the nature of digital signature. 
 +We declare that it'hereby corrected to "April 15th, 2020"
 + 
 +3. A new membervimacs (0xEA2DB82FE04A9403) has became a new signer since this 
 +month. You can validate the new keys by cross-checking the other two copies of 
 +this documentsigned by biergaizi and persmule. 
 + 
 +4. Due to the ongoing security issues of OpenPGP keyservers, it makes signature 
 +verification an issue and somewhat a challenge. For completeness, complete 
 +procedures for canary verification has been added. 
 + 
 +Canary Verification Procedures 
 +~~~~~~~~~~~~~~~~~~~~~~~~ 
 + 
 +1. To verify biergaizi's signature... 
 + 
 +    a. Obtain the public key from any traditional OpenPGP Keyserver, such as 
 +    https://keyserver.ubuntu.com, and import the public key. The fingerprint 
 +    is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. 
 + 
 +    b. Use the latest GnuPG in any operating system. 
 + 
 +2. To verify persmule's signature... 
 + 
 +    a. Unfortunately, it's not possible yet. Recent attacks on OpenPGP key- 
 +    servers have raised great security concerns within the community, as a 
 +    countermeasure, persmule's new public key has been published to the 
 +    https://keys.openpgp.org/ keyserverbut without a User-ID. Currently, 
 +    it's impossible to import a OpenPGP public key without User-ID for a 
 +    3rd-party to verify the canary document signed by persmule. 
 + 
 +    b. We are looking for a solution. But for now, you should check the 
 +    canary documents signed by biergaizi and vimacs to decide the validity 
 +    of the canary documents. This effectively reduced the number of signers 
 +    to two people. It reduces the level of confidence, but currently there is 
 +    no alternative option yet. 
 + 
 +    c. Once the technical problem of using a public key without User-ID is 
 +    resolved, you can check the previous signatures retroactively, and this 
 +    would effectively restore the level of confidence. You can archive the 
 +    documents to your own machine as soon as it's published to ensure no data 
 +    tampering has occurred.
  
-2The new key will be used by persmule to sign future warrant canary +3To verify vimacs' signature...
-documents. You can verify the signature by crosschecking the other two +
-documents signed by biergaizi and wnereiz for consistency.+
  
-3. Due to this key rollover, the October message was not signed by persmule+    a. Due to the recent attacks on OpenPGP keyserversvimacs has published 
-This did/does not indicate security incident, all of the statements above +    the OpenPGP public key to https://keys.openpgp.org, again, without a User- 
-were valid, and are still valid.+    ID. But it's possible for 3rd-party to verify the signatures by following 
 +    these steps.
  
-4Recent attacks on OpenPGP keyservers have raised great security concerns +    bUse Debian GNU/Linux operating system and install GnuPGOther operating 
-within the community, as a countermeasure, persmule's personal User-ID has +    systems may lack the necessary out-of-tree GnuPG patches requiredDebian 
-not published to the https://keys.openpgp.org/ keyserver. Instead, only +    must be used.
-cryptographic information can be obtained from the keyserver, without any +
-User-ID. Currently, it's impossible to import a OpenPGP public key without +
-User-ID to a standard GnuPG installationas a result, it's not possible +
-for a 3rd-party to verify the canary document signed by persmule.+
  
-5We are looking for solution. But for nowwe decided that the best +    cFetch vimacs' old public key from traditional OpenPGP Keyserversuch 
-option is starting publishing new canary documents using the new key. +    as https://keyserver.ubuntu.com, and import the public keyThe fingerprint 
-As a temporary measureyou can check the canary documents signed by +    is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. You should see an expired 
-biergaizi and wnereiz to decide the validity of the StatementsBy signing +    public key.
-their own copies, it indicates that the new key has been verified privately +
-by them as valid.+
  
-6This effectively reduced the number of signers to two peopleIt reduces +    dFetch vimacs' new public key from https://keys.openpgp.org, using the same 
-the level of confidencebut currently there is no alternative option yet.+    fingerprintand import the public key. You should see that the public 
 +    key has been updated.
  
-7Once the technical problem of OpenPGP public key without User-ID is +    ePlease note that the key is still shown as "expired" because the new key 
-resolved, you can check the previous signatures retroactivelyand this +    has no UID associated. But you should be able to see a newvalid (not 
-would effectively restore the level of confidenceYou can archive +    expired) subkey by...
-persmule's signature as soon as it's published to your own machine to +
-ensure no data tampering has occured.+
  
-8. Unlike persmule, biergaizi and wnereiz's signing keys are unchanged, +        $ gpg --list-options show-unusable-subkeys --list-keys 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403
-but the Key-IDs have been changed to its full fingerprint format in the +
-canary document for clarity.+
  
-9When new information is available, it will be published in the "Special +    fNow, it's possible to verify the signature by following the standard 
-Announcementssection in future warrant canary documents.+    procedures. Ignore the "key expired" warning (because the latest UID is 
 +    not published, only the expired UIDs are available).
  
 Proof of Freshness Proof of Freshness
Line 117: Line 152:
  
 $ rsstail -1 -n5 -N -u https://www.telegraph.co.uk/news/rss.xml $ rsstail -1 -n5 -N -u https://www.telegraph.co.uk/news/rss.xml
- 'Designer babies' may not be as smart or tall as parents expectstudy warns + Are we heading for a second lockdownand what are the new UK rules? 
- Cambridge University students cry fowl over 17th century painting that upsets vegetarians + Belarus protest leader Maria Kolesnikova charged with incitement to undermine national security 
- Indian businessman wore pilot disguise to get upgrades and special treatment + North East local lockdown rules announced - and the current restrictions across UK 
- Russia 'ruined' Ukrainian naval vessels before handing them back, says Ukrainian navy + Donald Trump vs Joe Biden: How do the Republican and Democratic policies compare in the US election race? 
- Killer of Helen McCourt to be released despite refusing to reveal location of her body+ US election debates schedule: When will Donald Trump and Joe Biden go head-to-head in 2020?
  
 $ rsstail -1 -n5 -N -u https://rss.nytimes.com/services/xml/rss/nyt/World.xml $ rsstail -1 -n5 -N -u https://rss.nytimes.com/services/xml/rss/nyt/World.xml
- At Odds With LabourBritains Jews Are Feeling Politically Homeless + Aleksei NavalnyPutin Critic, Was Poisoned at Hotel, His Team Says 
- Prince Andrews Friendship With Epstein Joins a List of Royal Scandals + Keith Krach, U.S. Official, Visits Taiwan Amid Rising Tensions With China 
- Afghanistans Curse: A Bomb From 2 Wars Ago Crushes a Family Today + On This Island, Everyone Knows Your Name (if You Have Covid-19) 
- Arab Thinkers Call to Abandon Boycotts and Engage With Israel + Why Politicians in France Cant Stop Talking About Crime 
- Rodrigo Duterte Calls for Ban on Public Vaping in the Philippines+ Covid-19 News: Live Updates
  
 $ date -R -u $ date -R -u
-Thu, 21 Nov 2019 16:03:28 +0000+Thu, 17 Sep 2020 15:31:59 +0000
  
 -----BEGIN PGP SIGNATURE----- -----BEGIN PGP SIGNATURE-----
  
-iQEzBAEBCgAdFiEEwonfPqgFyacM7J3iwYAPuUJ74CEFAl3WtYsACgkQwYAPuUJ7 +iQEzBAEBCgAdFiEEwonfPqgFyacM7J3iwYAPuUJ74CEFAl9jgXsACgkQwYAPuUJ7 
-4CFi3ggA3x0ZIMF9pLOSagf+9JVbk7zTAzUK3BMKZTGR8CZ/TebkaSX72/SSLGEQ +4CGYSggAvautohIFXU2OamnZnSwfCYTBYdnxMIJuYBCWKittqPuA6JC/rF86rxNw 
-g9KNf7ZxhdjKXUlU93Ori6C90yfLfGQ/mOGNjj/pcWx/s3kR9q6r/fLjG3D2UpAF +XAeXPa85hLzkaRd7oGWxIMkjNKITlQriYZZFWdVXg/QFDu5VyTZ3ip621od5fd9p 
-izX1t76YSBoAoDQ2PJbRNmpZpsGTz51CLIgEdkH+javtqqcIfhJUF+71XKdU8BNv +d89ntqFd0S/i/VAm4ihawAOFME0SMtzfySwQFHoovwCnMVOLjPFUbOnY9swbMo43 
-IEtHvO9j0pD3m9mbiXW768B+R8LEQc6UKrxUc7u8aX/rXSRjcHg+F5iK8ED91fSy +cE4lu1NVtMTYuw6nSK3M9j+NWN19TNyS0prp7M/fq+99o3uUTXyW0zoaoWV1vXwr 
-7zs2ls4VYs2m2S8slyMm8YlKWiFZUEcVGwCvhyqNTlTvg9MVIh8ol4yFuAZ+PTfK +8zwtWsCSU7jnIKYJu8Q7MyDflDfNUBXJjaTPd7TzJ/2ZeTSziBHtL3dKcQMhbF/O 
-tXPOvb75y1ghdqYAE7xROoMvc2jQqA== +ttJm3pzn9ZPhnp/weNH2Z4bgKCAugA== 
-=yM0h+=oufT
 -----END PGP SIGNATURE----- -----END PGP SIGNATURE-----
-</code> 
blug-canary-2.txt · Last modified: 2024/04/29 15:13 by persmule