Conversation

twitter.com/mjg59/status/1 GPG's entire keyring and trust model is awful, far beyond this issue. As a whole, the software is overly complex with far too much attack surface and poor usability. Even using it for something as simple as verifying a file with a specific key is arcane.
Quote Tweet
This (from gist.github.com/rjhansen/67ab9) is just genuinely awful. There is nothing new about this attack. It demonstrated nothing unexpected. The time to tell people to stop using infrastructure is the moment you know it's vulnerable, not after someone's taken advantage of it.
Text reading "At present I (speaking only for myself) do not believe the global keyserver network is salvageable. High-risk users should stop using the keyserver network immediately."
1
8
Replying to and
OpenPGP is currently standard and that's a major reactive force. If Git was to support signify/minisign, that could very well allow people to switch. And for people who want secure asynchronous messaging, well, there is puncturable encryption (youtube.com/watch?v=DjGxYw).
1
Git signed objects are insecure, regardless of which mechanism is used for signing. It only provides verification of a node in isolation (commit or tag), not everything it references. It ends up depending entirely on the sha1 hash chains which can't be considered secure anymore.
1
It's definitely far more secure to verify the signature on a source archive, including one with a Git repository inside it. It might be advisable to switch to providing those. I could definitely provide at least as much security as Git by signing a manifest with signify though.
1
The stable release manifests could be changed to reference commits by hash instead of by tags, which would then be able to provide at least as much security as verifying signed tags. Either way, it depends entirely on sha1, which isn't comforting at all. I want a proper approach.
1
Show replies