urbanists.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a server for people who like bikes, transit, and walkable cities. Let's get to know each other!

Server stats:

589
active users

#gnupg

5 posts5 participants0 posts today

Do I know somebody who can tell me how to solve the error #GnuPG is giving me upon creating an encryption key on a #Yubikey 5C (NFC or nano -- no difference, but same yubi versions)

gist.github.com/jpmens/3fff91a

I've tried almost all algorithms, also rsa2048 thinking that's the issue, but. no -- irrespective of algo.

Edit: brian explains it mastodon.social/@bk2204/114246

yubikey 5C NFC. GitHub Gist: instantly share code, notes, and snippets.
Gistyubikey 5C NFCyubikey 5C NFC. GitHub Gist: instantly share code, notes, and snippets.

Warum noch mal war unsere kritische Infrastruktur im Netz, wie #letsencrypt oder #OpenVPN, von der US-Regierung abhängig?

Irgendwann braucht man nach #Heartbleed und #GnuPG-Krise auch nicht mehr Snowden zitieren, wenn die einzige Konsequenz, die man da nicht gezogen hat, die ist, dass Open Source-Entwicklung auch Geld kostet.

Und dass man das am besten auch nicht allein einer alle vier Jahre wechselnden Regierung überlässt.

Continued thread

Has anyone here on #fedi figured out the correct recipe for dealing with #OpenPGP, #DMARC and #mailman ?

The problem, by default mailman will modify messages and this will break the dkim signature.
gitlab.com/mailman/mailman/-/i

Mailman provides two DMARC mitigation options (other option is reject or discard which is not useful in this case).

1. Replace the from address with list address
2. Wrap original message in an envelope

thunderbird flags 1 and fails 2.
#askfedi #gnupg #gpg #thunderbird

GitLabAdd DMARC conformity mode (do not modify DKIM signed headers and body) (#1079) · Issues · GNU Mailman / Mailman Core · GitLabCRITICAL I deployed mm3 to my e-mail server working with the large Linux developer community and we are facing DMARC issues [1]. It seems that...

I just released versions 0.6.2 of rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:

crates.io/crates/rsop/

Changes since rsop 0.6.0:

- decryption based on session keys is now supported,
- generation of man pages and shell tab completion has been added,
- some subtle semantics fixes for component key validity were implemented.

For more on #SOP, see datatracker.ietf.org/doc/draft

crates.iocrates.io: Rust Package Registry

rPGP has recently received an audit by @ros

The audit uncovered a number of issues, in particular: Multiple cases in which malformed input data can lead to Rust "panic"s. Triggering these typically leads to termination of applications that use #rPGP. This can act as a vector for denial of service attacks, but does not impact confidentiality or integrity security properties.

These issues were resolved in #rPGP release 0.14.2. Updating is recommended for all users.