This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
blug-canary-3 [2019/11/23 08:57] Wu Delin |
blug-canary-3 [2024/01/22 01:44] vimacs |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Beijing GNU/Linux User Group Canary (3/3) ====== | ====== Beijing GNU/Linux User Group Canary (3/3) ====== | ||
- | < | + | < |
- | -----BEGIN PGP SIGNED MESSAGE----- | + | |
Hash: SHA512 | Hash: SHA512 | ||
Line 8: | Line 7: | ||
==================================== | ==================================== | ||
- | Issued for November 2019. | + | Issued for January 2024. |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 18: | Line 17: | ||
* biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | ||
* persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | ||
- | * wnereiz | + | * vimacs |
THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
Line 63: | Line 62: | ||
10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
- | weeks of December 2019. Special note should be taken if no new canary is published | + | weeks of February 2024. Special note should be taken if no new canary is published |
by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
+ | |||
+ | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
+ | verification an issue and somewhat a challenge. For completeness, | ||
+ | procedures for canary verification is included here. | ||
Special Announcements | Special Announcements | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | 1. Since mid-October, | + | 1. We've found a workaround for importing keys on https:// |
- | expired. A new key, 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60, | + | without User-ID. The instructions for verifying |
- | created and uploaded to https://keys.openpgp.org/, it can be obtained from | + | been added. |
- | this keyserver. | + | |
+ | Canary Verification Procedures | ||
+ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
+ | |||
+ | 1. To verify biergaizi' | ||
+ | |||
+ | a. Obtain the public | ||
+ | https://keyserver.ubuntu.com, and import the public key. The fingerprint | ||
+ | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
+ | |||
+ | 2. To verify persmule' | ||
- | 2. The new key will be used by persmule | + | a. Due to the previous attacks on OpenPGP keyservers, persmule has published |
- | documents. You can verify | + | the OpenPGP public key to https:// |
- | documents signed by biergaizi and wnereiz for consistency. | + | |
+ | User-ID. But since April 2013, we have developed a workaround, described | ||
+ | below. | ||
- | 3. Due to this key rollover, the October message was not signed by persmule. | + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, |
- | This did/does not indicate | + | such as https:// |
- | were valid, and are still valid. | + | fingerprint is 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60. Note that, to |
+ | import | ||
+ | | ||
+ | | ||
+ | work. | ||
- | 4. Recent attacks on OpenPGP keyservers have raised great security concerns | + | c. This is a special dummy public key with its User-IDs and subkeys stripped |
- | within the community, as a countermeasure, | + | that we specifically created, leaving |
- | not published to the https:// | + | E-mail address, " |
- | cryptographic information can be obtained from the keyserver, without any | + | |
- | User-ID. Currently, it's impossible to import a OpenPGP public key without | + | |
- | User-ID to a standard GnuPG installation, as a result, it's not possible | + | |
- | for a 3rd-party to verify | + | |
- | 5. We are looking for a solution. But for now, we decided that the best | + | d. Next, with the stub key already imported, obtain the public key from |
- | option is starting publishing new canary documents | + | |
- | As a temporary measure, you can check the canary documents signed by | + | |
- | biergaizi and wnereiz | + | now possible |
- | their own copies, it indicates that the new key has been verified privately | + | |
- | by them as valid. | + | |
- | 6. This effectively reduced | + | e. Use the latest GnuPG in most operating system, the signatures made by |
- | the level of confidence, but currently there is no alternative option yet. | + | persmule' |
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a " | ||
+ | error. | ||
- | 7. Once the technical problem of OpenPGP public key without User-ID is | + | 3. To verify vimacs' signature... |
- | resolved, you can check the previous signatures retroactively, | + | |
- | would effectively restore the level of confidence. You can archive | + | |
- | persmule's signature | + | |
- | ensure no data tampering has occured. | + | |
- | 8. Unlike persmule, biergaizi and wnereiz' | + | a. Obtain the public key from any traditional OpenPGP Keyserver, such as |
- | but the Key-IDs have been changed to its full fingerprint | + | |
- | canary document for clarity. | + | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. |
- | 9. When new information is available, it will be published in the " | + | b. Use the latest GnuPG in any operating system. |
- | Announcements" | + | |
Proof of Freshness | Proof of Freshness | ||
Line 117: | Line 132: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | Iran's internet blackout: What is happening, and why did the government turn it off? | + | BBC to get tougher scrutiny amid bias concerns |
- | Pictures | + | Storm Isha latest: Tornado warning as 90mph winds batter Britain |
- | Colombia protests: President Duque imposes curfew | + | ' |
- | | + | Polish engineer named as one of four people found dead in house near Norwich |
- | Sacha Baron Cohen hits out at social media ' | + | Friday evening news briefing: Putin could declare war on Nato in five to eight years |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | The Jungle Prince of Delhi | + | Deep Under Gaza, Israel Shows Evidence Hostages Were Held in Tunnels |
- | The Broken Promise | + | As Switzerlands Glaciers Shrink, a Way of Life May Melt Away |
- | Would-Be Chinese Defector Details Covert Campaigns | + | Is North Korea Planning |
- | Israelis Call Netanyahu Indictment an Earthquake, but Agree on Little | + | Presidential Favorite |
- | The World Burns All Year. Are There Enough Planes to Douse the Flames? | + | In France, a Conviction for Police Brutality, but Little |
$ date -R -u | $ date -R -u | ||
- | Sat, 23 Nov 2019 08:55:34 +0000 | + | Mon, 22 Jan 2024 01:42:54 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | iQIzBAEBCgAdFiEE3n2KYOSW/ | + | iHUEARYKAB0WIQRlsdhNDMVQSujfnGCovW2B2flWVAUCZa3ITwAKCRCovW2B2flW |
- | QYSCUBAAkNAoyik1JwUhiqWHZppGfXjK381EJS8xFvxPGn+UN+wsHKfq/jw8yO6i | + | VF/SAQDnRwiiKfE6QLEWfnumFLdd57eKreRcSlAad7i4v2aVygEA63MMbqil0n6G |
- | IQ3eoYp6n5/L1mEXYgnAs8YlCxOd4ofaNZi0pfw9HSgSee1zbOUPNjraKS9oZrDC | + | mqfZuesrSaVGez8/CsvMM3ouoIqFMwQ= |
- | zkz5wTVe1kuwm3dsusoatsPli9c2XhOaGmD0zDA6sfL5jNN+Zhf91m9RQs79nSy7 | + | =wsPz |
- | GsX+8qylhuYuEmJTkBW070tL2njNIcpjt4VA5rlxvz2fvjaIiyG03UVJ3NIAfecV | + | |
- | NFIuEXEi0IdogQ3SqmEFwSa8cK/ | + | |
- | / | + | |
- | 64LMglIcsk58V9s6b4H3EFojafBWCf6mJP8tvU3HVsVzN1CeRXTOgEBR9mrCFCy3 | + | |
- | XuQkvtsBGAMhyXd7aez2n5MEgWg0fn67hwauhVFxbmIJxW6gwtaqQP5SyfjUscoN | + | |
- | E8/ | + | |
- | a1tsBy9skLR3ALVq618zVY0dCBANrsjN4id0u1dRZNFvBBOy/ | + | |
- | aDXGBklgZC4akOpbqGg9qO14Jer0c3jCcUtkDaTidCjNHdsQN8k= | + | |
- | =Myog | + | |
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ | ||