[git] gnupg-doc - branch, master, updated. d9b142369758e759470218433b742c8cad3660b5

by Werner Koch cvs at cvs.gnupg.org
Tue Nov 3 15:22:19 CET 2015


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "The GnuPG website and other docs".

The branch, master has been updated
       via  d9b142369758e759470218433b742c8cad3660b5 (commit)
      from  8ce8b1d31e9f4f3f8f7e88ba90f035a8427784e2 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit d9b142369758e759470218433b742c8cad3660b5
Author: Werner Koch <wk at gnupg.org>
Date:   Tue Nov 3 14:55:34 2015 +0100

    blog: Fix formatting and a name spelling error.

diff --git a/misc/blog.gnupg.org/20151103-gnupg-in-october.org b/misc/blog.gnupg.org/20151103-gnupg-in-october.org
index 39b18ae..7888c64 100644
--- a/misc/blog.gnupg.org/20151103-gnupg-in-october.org
+++ b/misc/blog.gnupg.org/20151103-gnupg-in-october.org
@@ -6,12 +6,13 @@
 
 ** GnuPG News for September and October 2015
 
-*** Keynote at FSCONs
+*** Talk at FSCONS
 
 If you'll be in Sweden next week for the FSCONS, you'll have the
 opportunity to hear Werner Koch's talk on Saturday afternoon: [[https://frab.fscons.org/en/fscons2015/public/events/243][The
 state of everyday cryptography]]:
 
+#+begin_quote
   After Snowden explained to the world that even the crypto geeks had
   been too optimistic about the state of global surveillance, a new
   interest in developing and promoting systems to provide encryption
@@ -24,6 +25,7 @@ state of everyday cryptography]]:
   future.  Will some of these encryption systems survive and thus
   force the NSA/CGHQ/BND to spend a lot more money on mass
   surveillance?
+#+end_quote
 
 *** Development
 
@@ -41,7 +43,7 @@ deprecate algorithms in addition to those that GnuPG has marked as
 deprecated.  Andre Heinecke has been working on GpgOL, a GnuPG plug-in
 for Outlook, and Kai has continued to work on Enigmail.
 
-**** Noteworthy Bugs
+*** Noteworthy Bugs
 
 Niibe fixed a bug effecting the use of ed25519 keys with GnuPG's ssh
 agent code.  When using an ed25519 authentication key imported with
@@ -64,6 +66,7 @@ actually examine the value pointed to by the address.)  See this
 Jonas Magazinius [[http://www.metzdowd.com/pipermail/cryptography/2015-October/026685.html][identified a downgrade attack]] on the OpenPGP message
 format:
 
+#+begin_quote
   [He] found that [OpenPGP] is vulnerable to a chosen-ciphertext
   attack to downgrade [a Symmetrically Encrypted Integrity Protected
   Data Packet (SEIP)] to a plain [Symmetrically Encrypted Data Packet
@@ -74,6 +77,7 @@ format:
   encrypted and signed message can be stripped of its signature and
   modified arbitrarily, with certain restrictions, by an attacker
   without knowing the key.
+#+end_quote
 
 Since symmetrically encrypted data packets have been deprecated since
 RFC 4880, which was release in 2007, GnuPG mitigates this attack by
@@ -83,7 +87,7 @@ than 64-bits as well as twofish).  Since (hopefully) no one is using
 the old ciphers, an attacker will only be able to downgrade old
 messages.
 
-**** OpenPGP DANE
+*** OpenPGP DANE
 
 [[https://datatracker.ietf.org/doc/draft-ietf-dane-openpgpkey/?include_text%3D1][OpenPGP DANE]] ist a new mechanism for OpenPGP key discovery.  The basic
 idea is that users publish their key in the Secure DNS.  Then, when
@@ -110,7 +114,7 @@ To search for a key using DANE, use:
 $ gpg2 --auto-key-locate dane --search-keys email at example.org
 #+END_EXAMPLE
 
-**** TOFU
+*** TOFU
 
 Neal finally committed TOFU support to the git repository.  Special
 thanks go to Andre Heinecke, who helped debug the code.  It will be
@@ -159,7 +163,7 @@ advantage of TOFU.  See [[https://lists.gnupg.org/pipermail/gnupg-users/2015-Oct
 implementation-focused discussion, see [[https://lists.gnupg.org/pipermail/gnupg-devel/2015-October/030341.html][this mail]].)  Also consult the
 manual (search for tofu to find the relevant options).
 
-**** Tor Support
+*** Tor Support
 
 Werner has committed basic support for Tor to the GnuPG git
 repository.  It can be enabled by passing the --use-tor flag to
@@ -175,16 +179,16 @@ system resolver.  (ADNS has been used by GnuPG on Windows since 2008.)
 Werner has modified it to support Tor and is currently in the process
 of getting the patches integrated upstream.
 
-Kristian Fiskers, the manager of the SKS Keyserver pool, began looking
+Kristian Fiskerstrand, the manager of the SKS Keyserver pool, began looking
 into making keyservers accessible as Tor hidden services.  Information
 about which keyservers support Tor and their respective .onion
 addresses can be found on [[https://sks-keyservers.net/status/][the SKS status page]].  However, just as you
 don't typically want to configure GnuPG to use a single key server
 rather than the fault-tolerant pool, Kristian has set up an Onion
-Balancer, [[hkp://jirk5u4osbsr34t5.onion][hkp://jirk5u4osbsr34t5.onion]], to redirect requests to the
+Balancer, [[hkp://jirk5u4osbsr34t5.onion]], to redirect requests to the
 various Tor-enabled keyservers.  Support is still experimental.
 
-**** g13
+*** g13
 
 Werner has been working on g13.  g13 is part of the GnuPG suite of
 tools.  It provides support for working with DM-Crypt devices with
@@ -199,7 +203,7 @@ stored on a smart card.  Further, it should be possible to use
 existing keys.  GnuPG, of course, has long had good support for
 interacting with smartcards and working with OpenPGP keys.
 
-**** Deprecating Specific Algorithms
+*** Deprecating Specific Algorithms
 
 Daniel Kahn Gillmor (dkg) contributed a patch to provide an option to
 explicitly deprecate algorithms in addition to those that GnuPG has
@@ -208,12 +212,14 @@ instance.  GnuPG can't do this by default because SHA-1 is a
 mandatory-to-implement algorithm and is widely used in the OpenPGP
 ecosystem.  Nevertheless, as dkg says:
 
+#+begin_quote
   Some operators of high-value targets that depend on OpenPGP
   signatures may wish to require their signers to use a stronger
   digest algorithm than SHA1, even if the OpenPGP ecosystem at large
   cannot deprecate SHA1 entirely today.
+#+end_quote
 
-**** GpgOL
+*** GpgOL
 
 Andre Heinecke has been evaluating the feasibility of supporting
 PGP/MIME and S/MIME in Outlook 2007 and later.  So far he has
@@ -225,21 +231,21 @@ filed in the [[bugs.gnupg.org][bugs.gnupg.org bug tracker]].
 
 For a draft of the release plan please refer to the [[https://wiki.gnupg.org/Gpg4win/Roadmap][Gpg4win Roadmap]].
 
-**** Enigmail
+*** Enigmail
 
 Kai has continued to work on Enigmail.  He added support for the
 Keybase protocol and for importing public keys from URLs.  He also
 work on ensuring that warnings about sending unsigned emails.
 
-*** Furture Work
+*** Future Work
 
-Intevation and and g10code have been awarded a 2 year contract by the
+Intevation and g10^code have been awarded a 2 year contract by the
 [[https://en.wikipedia.org/wiki/Federal_Office_for_Information_Security][BSI]] (the German office for information security) to start work on the
 [[http://ted.europa.eu/udl?uri=TED:NOTICE:344537-2015:TEXT:EN:HTML][Gpg4all]] project ([[http://lists.wald.intevation.org/pipermail/gpg4win-devel/2015-October/001528.html][announcement]]).  The main objectives of Gpg4all are to
 maintain Gpg4win and to research end-to-end encryption for webmail and
 Android phones.
 
-The BSI also accepted a bid by Intevation and g10code to work on the
+The BSI also accepted a bid by Intevation and g10^code to work on the
 [[http://www.evergabe-online.de/home?0&id=96898][Gpg4VS-NfD]] project.  The goal of this project is to prepare Gpg4win
 and GnuPG for approval for use with classified documents at the VS-Nfd
 (restricted) level in Germany.  The main task is to improve the
@@ -259,9 +265,9 @@ with a good user interface and that this is the reason that GnuPG
 doesn't support this type of secret sharing yet.
 
 Werner [[https://lists.gnupg.org/pipermail/gnupg-devel/2015-October/030483.html][announced]] that the GnuPG would start to use some C99 features.
-In particular, we'll start using variadic macros (__VA_ARGS__), the
-predefined macro __func__ and variable declarations inside a for loop
-(for (int i = 0; i < 5; i ++) {}).
+In particular, we'll start using variadic macros (=__VA_ARGS__=), the
+predefined macro =__func__= and variable declarations inside a for loop
+(=for (int i = 0; i < 5; i ++) {}=).
 
 On gnupg-users, Nix asked about using [[https://lists.gnupg.org/pipermail/gnupg-users/2015-September/054334.html][GnuPG 2.1 with NFS]].  Werner
 provided [[https://lists.gnupg.org/pipermail/gnupg-users/2015-September/054337.html][a workaround to use a non-standard socket name for gpg-agent]].
@@ -278,7 +284,7 @@ other members of the community to get involved this way.
 
 *** New Employee
 
-g10code has hired another developer, Justus Winter, to work on GnuPG
+g10^code has hired another developer, Justus Winter, to work on GnuPG
 and related projects.  Justus has been hacking on Free Software, in
 particular, the Hurd, since 2013.  His major contributions include
 porting Debian/Hurd to sysvinit, and improving the performance along

-----------------------------------------------------------------------

Summary of changes:
 misc/blog.gnupg.org/20151103-gnupg-in-october.org | 42 +++++++++++++----------
 1 file changed, 24 insertions(+), 18 deletions(-)


hooks/post-receive
-- 
The GnuPG website and other docs
http://git.gnupg.org




More information about the Gnupg-commits mailing list