kubikpixel, to rust
@kubikpixel@chaos.social avatar

Do any of you developers know what the Server @stalwartlabs uses for an solution – Is it or even Sequoia--PGP? 🤔

I would like to use @sequoiapgp on the basis of personal arguments and this E-Mail 🔐📧

purism, to linuxphones
hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

dvzrv,
@dvzrv@chaos.social avatar
kubikpixel, to email
@kubikpixel@chaos.social avatar

»8 Ways Your Account Is Vulnerable to 'ers«

It would help a little to use signatures, but this alone irritates many because they "can't read" the attached file. Why do they call themselves -conscious professionals and users? Implementing something like this in a company is really not too much effort. In my opinion, this alone would increase the sender's confidence considerably.

📧 https://www.howtogeek.com/email-account-vulnerable-to-hackers/

janvlug, to linuxphones
@janvlug@mastodon.social avatar
hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.3.1 of https://crates.io/crates/rsop, a stateless ("sop") card tool based on .
rsop natively supports OpenPGP card (hardware cryptography) devices

SOP is a standardized, vendor agnostic, CLI interface for the most common OpenPGP operations.
See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

rsop is featured in the "OpenPGP interoperability test suite" at https://tests.sequoia-pgp.org/ (under "rpgpie", which is rsop's high level OpenPGP library).

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.10.1 of https://crates.io/crates/openpgp-card-tools, the general purpose "oct" card tool.

This release adds the "oct admin signing-pin-validity" subcommand, to configure if a card requires User PIN presentation for each signature operation, or if User PIN presentation is valid for the full duration of a connection to the card.

( calls this flag "forcesig")

blueghost, to email
@blueghost@mastodon.online avatar

Proton Mail automatically encrypts/decrypts messages between Proton Mail accounts via OpenPGP/PGP.

Proton Mail supports automatically encrypting/decrypting messages between Proton Mail accounts and external email accounts that support OpenPGP/PGP or GnuPG/GPG.

Instructions: https://proton.me/support/how-to-use-pgp
GnuPG: https://mastodon.online/@blueghost/111974048270035570

Website: https://proton.me
Mastodon: @protonprivacy

183231bcb, to random

Can anymany tell me how I'm "supposed" to use end-to-end encryption with XMPP?

As far as I can tell there are three totally different ways to do E2EE:

a)OTR : "[https://xmpp.org/extensions/xep-0364.html](Not intended to be a current standard), or technical specification, as better (albeit, newer and less well tested) methods of end-to-end encryption exist for XMPP. "

b)OpenPGP: There are at least two different XEPs about it. XEP-0027 is obsolete, while XEP-0373 is "experimental" but hasn't been updated in almost three years.

c)OMEMO: "Experimental" and hasn't been updated in over two years.

Is there a way to do E2EE in XMPP which is neither deprecated nor experimental? What's the "Current stable" way to do it?

#XMPP #E2EE #EndToEndEncryption #OMEMO #OpenPGP #OTR

hko, to linux
@hko@fosstodon.org avatar

The new "Simple standalone Agent for cards" (https://crates.io/crates/openpgp-card-ssh-agent) is now available as a package for Linux, by the way :arch: 😏

This agent offers a frictionless UX when using ssh with keys that are stored on OpenPGP card devices: No more ongoing PIN entry required! 🚀

@dvzrv has once again done amazing packaging and documentation work! 🥳 Thank you 😃

See https://wiki.archlinux.org/title/SSH_keys#OpenPGP_card_ssh-agent for details.

hko, to linux
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.3.0, a new agent for card users.

This agent makes ssh with OpenPGP card devices friction-less: No more ongoing PIN entry!

This release adds full support for Windows, based on amazing work by @wiktor 🥳

This version supports , and equally.

If anyone with a background in MacOS or Windows packaging is interested in packaging this, we'd love to hear from you!

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.4, a new agent for card users.

This version comes with substantial updates to the openpgp-card-state dependency (which handles User PIN storage for OpenPGP card devices, see https://codeberg.org/openpgp-card/state).
It now supports selecting different PIN storage backends, including one to store the User PIN directly in the config file.

PIN verification error cases are now handled more defensively

scy, to random German
@scy@chaos.social avatar

Ich hab vorhin mal unter https://pgp.governikus.de/ meinen #OpenPGP-Schlüssel "vom Staat™" signieren lassen.

Sie rufen von deinem e-Perso den Namen ab, du lädst deinen Public Key hoch, wählst eine der User-IDs des Keys aus (wenn du mehrere hast), und wenn der Name der UID mit dem Namen auf dem Perso übereinstimmt, bekommst du an die Mailadresse in der UID eine Signatur von 0xA4BF43D7 "Governikus OpenPGP Signaturservice (Neuer Personalausweis)".

Ging schnell und einfach.

[1/2]

#GnuPG #GPG

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.2.0 of https://crates.io/crates/rsop

is a "Stateless OpenPGP" CLI tool based on .

This new version adds more support for handling passphrase-protected private key material, as well as handling of un-armored OpenPGP data.

See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.3, a new #SSH agent for #OpenPGP card users.

This version fixes some bugs in the handling of RSA keys.

#rustlang #rust #openssh #hsm

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.2, a new #SSH agent for #OpenPGP card users.

This release shows more output for error cases, both in the log output, and with GUI notifications.

I also published an updated version 0.0.3 of https://crates.io/crates/openpgp-card-state, which contains a low-level CLI tool to help with debugging/development. This version gives more debugging output for error cases.

#rustlang #rust #openssh #hsm

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.1, a new agent for card users.

This release should fix build issues (the previous version didn't build on mac).

However, we're still exploring how secret storage works on non-Linux platforms. Expect a bumpy ride if you try it.
(If you do delve into debugging on mac or windows, we'd love to hear from you!)

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.0, an #SSH agent for #OpenPGP card users.

It contains exciting UX changes: after one-time initial setup, no user interaction is required.

The User PIN for cards is persisted in platform-specific secret storage. For all users whose threat model allows persisting PINs on the host (presumably most), this removes pin entry.

Required touch confirmation on the card (if enabled) is signaled with desktop notifications.

#OpenSSH #Rust #rustlang #HSM

delta, to rust
@delta@chaos.social avatar

News from the machine room: the pure end-to-end encryption engine, "rpgp", saw quite some work and a new release in recent weeks and now @hko released a higher level "rpgpie" interface for application developers ( see https://fosstodon.org/@hko/111997998005869515 ) which also powers running the IETF test suite quite successfully .... Delta Chat's security-audited encryption engine is in fact used from several other projects and in other contexts these days and we are happy about it!

hko, (edited ) to rust
@hko@fosstodon.org avatar

In the past few weeks, I spent a bit of time on a set of hobby projects around (https://github.com/rpgp/rpgp/). Today I'm happy to announce:

rsop v0.1.0 (https://crates.io/crates/rsop), an early stage "stateless OpenPGP" tool based on rpgp.

Relatedly, I also released rpgpie 🦀️🔐🥧 v0.0.1 (https://crates.io/crates/rpgpie), an experimental high level OpenPGP API based on rpgp (rsop is built on top of rpgpie).

scy, to github
@scy@chaos.social avatar

I think it's telling that , , and even all don't have a workflow for "renew an key", i.e. extend its validity before (or after) expiry. On all of them, you have to delete and re-add the key. It's as if nobody is following OpenPGP best practices and everyone is using keys without an expiry date.

hko, to rust
@hko@fosstodon.org avatar

The oct tool for inspecting, configuring and using OpenPGP card devices (https://crates.io/crates/openpgp-card-tools) is on "This Week in Rust":

https://this-week-in-rust.org/blog/2024/02/21/this-week-in-rust-535/#projecttooling-updates

Yay! 🎉 Thanks again, @dvzrv 😀

hko, (edited ) to rust
@hko@fosstodon.org avatar

I just released version 0.0.1 of the new crate https://crates.io/crates/openpgp-card-state

This crate paves the way for convenient handling of card User PINs, for users whose threat model allows persisting the PIN locally on the host computer.

If a User PIN is stored, applications can obtain it via this crate, and perform cryptographic operations without prompting the user for PIN entry.

Currently org.freedesktop.Secret is supported for storage.

Thoughts are welcome!

hko,
@hko@fosstodon.org avatar

To illustrate the use of openpgp-card-state, here's an early version of an ssh-agent implementation that uses it:

https://codeberg.org/openpgp-card/ssh-agent/src/branch/state

This SSH agent explores an absolutely streamlined UX for doing ssh backed by OpenPGP card-based key material.

After persisting the User PIN once, like this: "$ openpgp-card-state put --user-pin 123456 0000:01234567", the ssh agent can be used without any user interaction.

#OpenSSH #SSH #OpenPGP #SmartCard #rust #rustlang

hko, to rust
@hko@fosstodon.org avatar

I just released version 0.4.2 of the https://crates.io/crates/openpgp-card low level library, and version 0.2.1 of the https://crates.io/crates/openpgp-card-sequoia wrapper.

These releases add support for cards that are configured to use "KDF mode" for PIN presentation.

Thanks to the reporters in: https://codeberg.org/openpgp-card/openpgp-card-tools/issues/43 (and to Gniibe for providing me some insights into KDF-use in Gnuk).

mpjgregoire,
@mpjgregoire@cosocial.ca avatar

@hko Out of curiosity, what's the relationship between the openpgp-card project and the #SequoiaPGP project?

#OpenPGP

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • tsrsr
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • hgfsjryuu7
  • Youngstown
  • InstantRegret
  • slotface
  • khanakhh
  • rosin
  • ngwrru68w68
  • kavyap
  • PowerRangers
  • normalnudes
  • tacticalgear
  • cisconetworking
  • everett
  • vwfavf
  • GTA5RPClips
  • osvaldo12
  • Durango
  • mdbf
  • modclub
  • tester
  • cubers
  • ethstaker
  • anitta
  • All magazines