Gunnar Wolf: DebConf17 Key Signing Party: You are here

- A list of all the people that will take part of the KSP
- Your key's situation relative to the KSP keyring
there are currently at least 3 ways to refer to a gpg key: short key ID (last 8 hex digits of fingerprint), long key ID (last 16 hex digits) and full fingerprint. The short key ID used to be popular, and since 5 years it is known that it is computationally easy to generate a gnupg key with an arbitrary short key id. A mitigation to this is using "keyid-format long" in gpg.conf, and a better thing to do, especially in scripts, is to use the full fingerprint to refer to a key, or just ship the public key for verification and skip the key servers. Note that in case of keyid collision, gpg will download and import all the matching keys, and will use all the matching keys for verifying signatures.So... What is this about? We humans are quite bad at recognizing and remembering randomly-generated strings with no inherent patterns in them. Every GPG key can be uniquely identified by its fingerprint, a 128-bit string, usually encoded as ten blocks of four hexadecimal characters (this allows for 160 bits; I guess there's space for a checksum in it). That is, my (full) key's signature is:
AB41 C1C6 8AFD 668C A045 EBF8 673A 03E4 C1DB 921FHowever, it's quite hard to recognize such a long string, let alone memorize it! So, we often do what humans do: Given that strong cryptography implies a homogenous probability distribution, people compromised on using just a portion of the key the last portion. The short key ID. Mine is then the last two blocks (shown in boldface): C1DB921F. We can also use what's known as the long key ID, that's twice as long: 64 bits. However, while I can speak my short key ID on a single breath (and maybe even expect you to remember and note it down), try doing so with the long one (shown in italics above): 673A03E4C1DB921F. Nah. Too much for our little, analog brains. This short and almost-rememberable number has then 32 bits of entropy I have less than one in 4,000,000,000 chance of generating a new key with this same short key ID. Besides, key generation is a CPU-intensive operation, so it's quite unlikely we will have a collision, right? Well, wrong. Previous successful attacks on short key IDs Already five years ago, Asheesh Laroia migrated his 1024D key to a 4096R. And, as he describes in his always-entertaining fashion, he made his computer sweat until he was able to create a new key for which the short key ID collided with the old one. It might not seem like a big deal, as he did this non-maliciously, but this easily should have spelt game over for the usage of short key IDs. After all, being able to generate a collision is usually the end for cryptographic systems. Asheesh specifically mentioned in his posting how this could be abused. But we didn't listen. Short key IDs are just too convenient! Besides, they allow us to have fun, can be a means of expression! I know of at least two keys that would qualify as vanity: Obey Arthur Liu's 0x29C0FFEE (created in 2009) and Keith Packard's 0x00000011 (created in 2012). Then we got the Evil 32 project. They developed Scallion, started (AFAICT) in 2012. Scallion automates the search for a 32-bit collision using GPUs; they claim that it takes only four seconds to find a collision. So, they went through the strong set of the public PGP Web of Trust, and created a (32-bit-)colliding key for each of the existing keys. And what happened now? What happened today? We still don't really know, but it seems we found a first potentially malicious collision that is, the first "nonacademic" case. Enrico found two keys sharing the 9F6C6333 short ID, apparently belonging to the same person (as would be the case of Asheesh, mentioned above). After contacting Gustavo, though, he does not know about the second That is, it can be clearly regarded as an impersonation attempt. Besides, what gave away this attempt are the signatures it has: Both keys are signed by what appears to be the same three keys: B29B232A, F2C850CA and 789038F2. Those three keys are not (yet?) uploaded to the keyservers, though... But we can expect them to appear at any point in the future. We don't know who is behind this, or what his purpose is. We just know this looks very evil. Now, don't panic: Gustavo's key is safe. Same for his certifiers, Marga, Agust n and Maxy. It's just a 32-bit collision. So, in principle, the only parties that could be cheated to trust the attacker are humans, right? Nope. Enrico tested on the PGP pathfinder & key statistics service, a keyserver that finds trust paths between any two arbitrary keys in the strong set. Surprise: The pathfinder works on the short key IDs, even when supplied full fingerprints. So, it turns out I have three faked trust paths into our impostor. What next? There are several things this should urge us to do.
asciidoc
.C
locale to format the changelog date.C
locale to format the build date.SOURCE_DATE_EPOCH
..deb
files in the same parent directory. Alongside more bug fixes, support for ICC profiles has been added, and libarchive is now also used to read metadata for ar
archives.
.mo
files.
ccache
, skip disorderfs
hook if device nodes cannot be created, compatibility with grsec trusted path execution (Reiner Herrmann), code cleanup (Esa Peuha).
data.tar
are reproducible, with the patches, dpkg-deb
uses the --clamp-mtime
option added in tar/1.28-1 when available. An updated package has been uploaded to the experimental repository. This removed the need for a modified debhelper as all required changes for reproducibility have been merged or are now covered by dpkg
.
armhf
build system, allowing to run 6 more armhf
builder jobs, right there. (h01ger)
Stop requiring a modified debhelper and adapt to the latest dpkg experimental version by providing a predetermined identifier for the .buildinfo
filename. (Mattia Rizzolo, h01ger)
New X.509 certificates were set up for jenkins.debian.net and reproducible.debian.net using Let's Encrypt!. Thanks to GlobalSign for providing certificates for the last year free of charge. (h01ger)
ocamldoc
to build reproducible manpages using a patch by Valentin Lorentz.DEBIANDOC_DATE
environment variable to override the content of the <date>
tag.PODDATE
to the date of the latest debian/changelog
entry.pod2man
to use the date of the latest debian/changelog
entry.SOURCE_DATE_EPOCH
as source for the manpage date instead of the currentdate.TZ
to UTC
when using zip
.grep
to cope with non-UTF8 files.SOURCE_DATE_EPOCH
as source for the manpage date instead of the currentdate.TZ=UTC
in debian/rules
.\documentclass[a5paper] article
\usepackage fontspec
\usepackage[left=1cm,right=1cm,top=0.8cm,bottom=1cm,foot=0.2cm] geometry
\usepackage listings
\lstset %
basicstyle=\ttfamily\scriptsize,
frame=none,
keepspaces=true,
\begin document
\lstinputlisting ksp-dc15.txt
\end document
$ xelatex partecipants.tex
$ pdfbook partecipants.pdf
pub 1024D/F144A319 2008-10-18
pub 4096R/EE2BBBC7 2011-05-03
hg clone http://hg.openjdk.java.net/jdk8/jdk8 jdk8
cd jdk8 && sh get_sources.sh
hg clone http://hg.openjdk.java.net/jigsaw/jigsaw jigsaw
cd jigsaw && sh get_sources.sh
cd jigsaw
. jigbuild
. jdk/make/jdk_generic_profile.sh
export ALLOW_DOWNLOADS=true
make sanity
make all
make modules-sanity
make modules
ALLOW_DOWNLOADS=true
. module test.hello @ 1
requires jdk.base @ 7-ea;
class test.hello.Main;
@rubx "The day I was born it was a " << Time.local(1984, "aug", 8).strftime("%A")And @rubx will reply:
@damog "The day I was born it was a Wednesday"Go see more about her (examples, FAQ, etc) on axiombox.com/rubx or on her Twitter profile. As we tested the hack, a bunch of people started interacting with Rubx too, some people calling her Twitter Line Interface Ruby Interpreter! :). See what other people has tried with her here.
xscreensaver
and the new hacks but I just forgot to actually install them so now they're installed and thanks to my new co-maintainer Tormod Volden the packaging of xscreensaver is easier ans smooth, yet no in CDBS but easier at least, so the new release is 5.04-2 and right now I'm just waiting for damog to upload it (he's very fast BTW).
I updated gkrellm
with the new upstream version 2.3.1 fixing some bugs, I cleaned up all the patches and let only one for the gkrellmd.conf
file, besides a made a clean up of the BTS of gkrellm, now there're less bugs remaining, the new release is 3.2.1-1 and is waiting for anibal to review it and upload it.
Finally but not less important is pgpdump
, a package that since a lot of time ago didn't get me any work, new upstream release 0.26 and the release 0.26-1 is waiting for anibal to review it and upload it.
This last two were migrated to CDBS, so it's definitely easier to maintain, at least for me!
Next.