Conversation

twitter.com/mjg59/status/1 GPG's entire keyring and trust model is awful, far beyond this issue. As a whole, the software is overly complex with far too much attack surface and poor usability. Even using it for something as simple as verifying a file with a specific key is arcane.
Quote Tweet
This (from gist.github.com/rjhansen/67ab9) is just genuinely awful. There is nothing new about this attack. It demonstrated nothing unexpected. The time to tell people to stop using infrastructure is the moment you know it's vulnerable, not after someone's taken advantage of it.
Text reading "At present I (speaking only for myself) do not believe the global keyserver network is salvageable. High-risk users should stop using the keyserver network immediately."
1
8
Replying to and
OpenPGP is currently standard and that's a major reactive force. If Git was to support signify/minisign, that could very well allow people to switch. And for people who want secure asynchronous messaging, well, there is puncturable encryption (youtube.com/watch?v=DjGxYw).
1
I'm inclined to stop signing tags because it's increasingly becoming security theatre. There's also the issue of Git exposing substantial attack surface before the signature is verified. Compare verifying an external signature on an archive to handling all these objects first.
1
It's definitely far more secure to verify the signature on a source archive, including one with a Git repository inside it. It might be advisable to switch to providing those. I could definitely provide at least as much security as Git by signing a manifest with signify though.
1
Show replies