[git] gnupg-doc - branch, master, updated. d9b142369758e759470218433b742c8cad3660b5
by Werner Koch
cvs at cvs.gnupg.org
Tue Nov 3 15:22:19 CET 2015
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GnuPG website and other docs".
The branch, master has been updated
via d9b142369758e759470218433b742c8cad3660b5 (commit)
from 8ce8b1d31e9f4f3f8f7e88ba90f035a8427784e2 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit d9b142369758e759470218433b742c8cad3660b5
Author: Werner Koch <wk at gnupg.org>
Date: Tue Nov 3 14:55:34 2015 +0100
blog: Fix formatting and a name spelling error.
diff --git a/misc/blog.gnupg.org/20151103-gnupg-in-october.org b/misc/blog.gnupg.org/20151103-gnupg-in-october.org
index 39b18ae..7888c64 100644
--- a/misc/blog.gnupg.org/20151103-gnupg-in-october.org
+++ b/misc/blog.gnupg.org/20151103-gnupg-in-october.org
@@ -6,12 +6,13 @@
** GnuPG News for September and October 2015
-*** Keynote at FSCONs
+*** Talk at FSCONS
If you'll be in Sweden next week for the FSCONS, you'll have the
opportunity to hear Werner Koch's talk on Saturday afternoon: [[https://frab.fscons.org/en/fscons2015/public/events/243][The
state of everyday cryptography]]:
+#+begin_quote
After Snowden explained to the world that even the crypto geeks had
been too optimistic about the state of global surveillance, a new
interest in developing and promoting systems to provide encryption
@@ -24,6 +25,7 @@ state of everyday cryptography]]:
future. Will some of these encryption systems survive and thus
force the NSA/CGHQ/BND to spend a lot more money on mass
surveillance?
+#+end_quote
*** Development
@@ -41,7 +43,7 @@ deprecate algorithms in addition to those that GnuPG has marked as
deprecated. Andre Heinecke has been working on GpgOL, a GnuPG plug-in
for Outlook, and Kai has continued to work on Enigmail.
-**** Noteworthy Bugs
+*** Noteworthy Bugs
Niibe fixed a bug effecting the use of ed25519 keys with GnuPG's ssh
agent code. When using an ed25519 authentication key imported with
@@ -64,6 +66,7 @@ actually examine the value pointed to by the address.) See this
Jonas Magazinius [[http://www.metzdowd.com/pipermail/cryptography/2015-October/026685.html][identified a downgrade attack]] on the OpenPGP message
format:
+#+begin_quote
[He] found that [OpenPGP] is vulnerable to a chosen-ciphertext
attack to downgrade [a Symmetrically Encrypted Integrity Protected
Data Packet (SEIP)] to a plain [Symmetrically Encrypted Data Packet
@@ -74,6 +77,7 @@ format:
encrypted and signed message can be stripped of its signature and
modified arbitrarily, with certain restrictions, by an attacker
without knowing the key.
+#+end_quote
Since symmetrically encrypted data packets have been deprecated since
RFC 4880, which was release in 2007, GnuPG mitigates this attack by
@@ -83,7 +87,7 @@ than 64-bits as well as twofish). Since (hopefully) no one is using
the old ciphers, an attacker will only be able to downgrade old
messages.
-**** OpenPGP DANE
+*** OpenPGP DANE
[[https://datatracker.ietf.org/doc/draft-ietf-dane-openpgpkey/?include_text%3D1][OpenPGP DANE]] ist a new mechanism for OpenPGP key discovery. The basic
idea is that users publish their key in the Secure DNS. Then, when
@@ -110,7 +114,7 @@ To search for a key using DANE, use:
$ gpg2 --auto-key-locate dane --search-keys email at example.org
#+END_EXAMPLE
-**** TOFU
+*** TOFU
Neal finally committed TOFU support to the git repository. Special
thanks go to Andre Heinecke, who helped debug the code. It will be
@@ -159,7 +163,7 @@ advantage of TOFU. See [[https://lists.gnupg.org/pipermail/gnupg-users/2015-Oct
implementation-focused discussion, see [[https://lists.gnupg.org/pipermail/gnupg-devel/2015-October/030341.html][this mail]].) Also consult the
manual (search for tofu to find the relevant options).
-**** Tor Support
+*** Tor Support
Werner has committed basic support for Tor to the GnuPG git
repository. It can be enabled by passing the --use-tor flag to
@@ -175,16 +179,16 @@ system resolver. (ADNS has been used by GnuPG on Windows since 2008.)
Werner has modified it to support Tor and is currently in the process
of getting the patches integrated upstream.
-Kristian Fiskers, the manager of the SKS Keyserver pool, began looking
+Kristian Fiskerstrand, the manager of the SKS Keyserver pool, began looking
into making keyservers accessible as Tor hidden services. Information
about which keyservers support Tor and their respective .onion
addresses can be found on [[https://sks-keyservers.net/status/][the SKS status page]]. However, just as you
don't typically want to configure GnuPG to use a single key server
rather than the fault-tolerant pool, Kristian has set up an Onion
-Balancer, [[hkp://jirk5u4osbsr34t5.onion][hkp://jirk5u4osbsr34t5.onion]], to redirect requests to the
+Balancer, [[hkp://jirk5u4osbsr34t5.onion]], to redirect requests to the
various Tor-enabled keyservers. Support is still experimental.
-**** g13
+*** g13
Werner has been working on g13. g13 is part of the GnuPG suite of
tools. It provides support for working with DM-Crypt devices with
@@ -199,7 +203,7 @@ stored on a smart card. Further, it should be possible to use
existing keys. GnuPG, of course, has long had good support for
interacting with smartcards and working with OpenPGP keys.
-**** Deprecating Specific Algorithms
+*** Deprecating Specific Algorithms
Daniel Kahn Gillmor (dkg) contributed a patch to provide an option to
explicitly deprecate algorithms in addition to those that GnuPG has
@@ -208,12 +212,14 @@ instance. GnuPG can't do this by default because SHA-1 is a
mandatory-to-implement algorithm and is widely used in the OpenPGP
ecosystem. Nevertheless, as dkg says:
+#+begin_quote
Some operators of high-value targets that depend on OpenPGP
signatures may wish to require their signers to use a stronger
digest algorithm than SHA1, even if the OpenPGP ecosystem at large
cannot deprecate SHA1 entirely today.
+#+end_quote
-**** GpgOL
+*** GpgOL
Andre Heinecke has been evaluating the feasibility of supporting
PGP/MIME and S/MIME in Outlook 2007 and later. So far he has
@@ -225,21 +231,21 @@ filed in the [[bugs.gnupg.org][bugs.gnupg.org bug tracker]].
For a draft of the release plan please refer to the [[https://wiki.gnupg.org/Gpg4win/Roadmap][Gpg4win Roadmap]].
-**** Enigmail
+*** Enigmail
Kai has continued to work on Enigmail. He added support for the
Keybase protocol and for importing public keys from URLs. He also
work on ensuring that warnings about sending unsigned emails.
-*** Furture Work
+*** Future Work
-Intevation and and g10code have been awarded a 2 year contract by the
+Intevation and g10^code have been awarded a 2 year contract by the
[[https://en.wikipedia.org/wiki/Federal_Office_for_Information_Security][BSI]] (the German office for information security) to start work on the
[[http://ted.europa.eu/udl?uri=TED:NOTICE:344537-2015:TEXT:EN:HTML][Gpg4all]] project ([[http://lists.wald.intevation.org/pipermail/gpg4win-devel/2015-October/001528.html][announcement]]). The main objectives of Gpg4all are to
maintain Gpg4win and to research end-to-end encryption for webmail and
Android phones.
-The BSI also accepted a bid by Intevation and g10code to work on the
+The BSI also accepted a bid by Intevation and g10^code to work on the
[[http://www.evergabe-online.de/home?0&id=96898][Gpg4VS-NfD]] project. The goal of this project is to prepare Gpg4win
and GnuPG for approval for use with classified documents at the VS-Nfd
(restricted) level in Germany. The main task is to improve the
@@ -259,9 +265,9 @@ with a good user interface and that this is the reason that GnuPG
doesn't support this type of secret sharing yet.
Werner [[https://lists.gnupg.org/pipermail/gnupg-devel/2015-October/030483.html][announced]] that the GnuPG would start to use some C99 features.
-In particular, we'll start using variadic macros (__VA_ARGS__), the
-predefined macro __func__ and variable declarations inside a for loop
-(for (int i = 0; i < 5; i ++) {}).
+In particular, we'll start using variadic macros (=__VA_ARGS__=), the
+predefined macro =__func__= and variable declarations inside a for loop
+(=for (int i = 0; i < 5; i ++) {}=).
On gnupg-users, Nix asked about using [[https://lists.gnupg.org/pipermail/gnupg-users/2015-September/054334.html][GnuPG 2.1 with NFS]]. Werner
provided [[https://lists.gnupg.org/pipermail/gnupg-users/2015-September/054337.html][a workaround to use a non-standard socket name for gpg-agent]].
@@ -278,7 +284,7 @@ other members of the community to get involved this way.
*** New Employee
-g10code has hired another developer, Justus Winter, to work on GnuPG
+g10^code has hired another developer, Justus Winter, to work on GnuPG
and related projects. Justus has been hacking on Free Software, in
particular, the Hurd, since 2013. His major contributions include
porting Debian/Hurd to sysvinit, and improving the performance along
-----------------------------------------------------------------------
Summary of changes:
misc/blog.gnupg.org/20151103-gnupg-in-october.org | 42 +++++++++++++----------
1 file changed, 24 insertions(+), 18 deletions(-)
hooks/post-receive
--
The GnuPG website and other docs
http://git.gnupg.org
More information about the Gnupg-commits
mailing list