-
I just released versions 0.6.2 of rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/
Changes since rsop 0.6.0:
- decryption based on session keys is now supported,
- generation of man pages and shell tab completion has been added,
- some subtle semantics fixes for component key validity were implemented.For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
There's a lot of interest in #pass -like tools, but without being bound to #gnupg
One exciting early stage exploration by @kushal uses the standard #SOP mechanism (https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/).
Kushal's experimental fork of pass can already directly use #OpenPGP card devices via the rsop-oct implementation:
-
I just released version 0.6.0 of rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/
This release updates its rPGP dependency to version 0.15.0. This should fix issues where rsop previously failed to correctly read input data in some situations, and errored with messages such as e.g. "failed reading: armor header: not enough bytes"
For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
I just released version 0.5.0 of rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/
The major change in this release is that OpenPGP card support is removed from rsop, it is now available separately in rsop-oct (see https://fosstodon.org/@hko/113699545218931267)
For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
I just released version 0.1.0 of rsop-oct, a new stateless #OpenPGP ("SOP") CLI tool that focuses exclusively on use with OpenPGP card hardware devices:
https://crates.io/crates/rsop-oct/0.1.0
Like its sibling project #rsop, rsop-oct is based on @rpgp
In the next release of rsop, OpenPGP card functionality will be removed from it.
The goal is to offer clear UX in two distinct simple CLI tools, as opposed to one combined and confusing CLI tool.For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
I just released version 0.4.3 of #rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/0.4.3
This release fixes a bug in the 'inline-verify' command:
In versions 0.4.0 - 0.4.2, 'rsop inline-verify' erroneously printed the message body to stdout even if no valid signatures were found (except for CSF messages, which were handled correctly).
For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
I just released version 0.4.2 of #rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/0.4.2
This release adds support for the 'inline-detach' command.
For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
I just released version 0.4.1 of #rsop, a stateless #OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/0.4.1
This release adds support for the 'revoke-key' command.
For more on #SOP, see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/
-
I just released version 0.4.0 of rsop, a stateless OpenPGP ("SOP") CLI tool based on @rpgp:
https://crates.io/crates/rsop/0.4.0
This release brings support for the updated formats in the new OpenPGP RFC 9580 (including "v6" keys and signatures).
For more on SOP, see https://www.ietf.org/archive/id/draft-dkg-openpgp-stateless-cli-09.html
-
New release today: #rPGP version 0.14.0 ✨
(#OpenPGP implemented in pure #Rust, permissively licensed)
https://github.com/rpgp/rpgp/releases/tag/v0.14.0
This release brings rather complete support for the excellent new OpenPGP RFC 9580 (also known as "crypto refresh", or "v6")
RFC 9580 standardizes modern cryptographic mechanisms for OpenPGP: AEAD-based encryption, Argon2, and SHA2 fingerprints for the new OpenPGP v6 key format (v4 keys use SHA1).
Thanks @NGIZero for supporting this work!
-
I'm excited to announce the release of oct v0.11.0 🚀️
oct is a tool for inspecting, configuring and using #OpenPGP cards 🔒 (https://crates.io/crates/openpgp-card-tools)
oct can now set up cards in #KDF mode, the text output format was improved for readability, and some minor bugs were fixed.
Finally, version 0.11.0 uses #rPGP, a pure #Rust OpenPGP library 🦀.
As a result, the binary on #Linux links to four fewer dynamic libraries, while at the same time being 10% smaller. -
oct-git and its sibling project https://crates.io/crates/openpgp-card-ssh-agent are concrete options for OpenPGP card users to explore OpenPGP use without GnuPG, today.
In addition, the #rsop "Stateless OpenPGP" tool (https://crates.io/crates/rsop) also supports using OpenPGP card devices (see https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more).
-
Much credit and thanks to @wiktor for foundational work on OpenPGP card support in #rPGP.
Wiktor's work constitutes the core of the new https://crates.io/crates/openpgp-card-rpgp crate (used in rsop).
-
I just released version 0.3.1 of https://crates.io/crates/rsop, a stateless #OpenPGP ("sop") card tool based on #rPGP.
rsop natively supports OpenPGP card (hardware cryptography) devicesSOP is a standardized, vendor agnostic, CLI interface for the most common OpenPGP operations.
See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.rsop is featured in the "OpenPGP interoperability test suite" at https://tests.sequoia-pgp.org/ (under "rpgpie", which is rsop's high level OpenPGP library).
-
I just released version 0.2.0 of https://crates.io/crates/rsop
#rsop is a "Stateless OpenPGP" CLI tool based on #rPGP.
This new version adds more support for handling passphrase-protected private key material, as well as handling of un-armored OpenPGP data.
See https://datatracker.ietf.org/doc/draft-dkg-openpgp-stateless-cli/ for more on SOP.
-
In the past few weeks, I spent a bit of time on a set of #OpenPGP hobby projects around #rpgp (https://github.com/rpgp/rpgp/). Today I'm happy to announce:
rsop v0.1.0 (https://crates.io/crates/rsop), an early stage "stateless OpenPGP" tool based on rpgp.
Relatedly, I also released rpgpie 🦀️🔐🥧 v0.0.1 (https://crates.io/crates/rpgpie), an experimental high level OpenPGP API based on rpgp (rsop is built on top of rpgpie).
-
While exploring use of PKCS #11 devices in #OpenPGP contexts, I stumbled over a bug (and potential security issue) in the yubihsm_pkcs11.so driver for #YubiHSM devices.
Long form text by Christian Reitter (who walked me through the coordinated disclosure process with #Yubico, and did amazing work analyzing and writing up the issue):
https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/Yubico advisory: https://www.yubico.com/support/security-advisories/ysa-2023-01/
#CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39908
(Thanks again to @sovtechfund for funding my #PKCS11 work)
-
Over the last half year, I've spent time with PKCS #11 and PIV hardware security devices. In particular, using such devices in the #OpenPGP context.
Entry points for results of this work:
- https://codeberg.org/heiko/openpgp-pkcs11
- https://codeberg.org/heiko/openpgp-piv
- https://codeberg.org/heiko/pkcs11-openpgp-notesOne particular focus was building CI testing infrastructure (including https://gitlab.com/hkos/virtual-piv/), to make future work on these codebases easier (and hopefully fun).
[This work was funded by @sovtechfund]
-
Today I spent a bit of time with the #YubiHSM and its #PKCS11 driver (the yubihsm_pkcs11.so driver had exhibited some confusing-to-me behavior, during occasional experiments over the past few weeks).
After a closer look, I believe that "yubihsm_pkcs11.so" version 2.4.0 has introduced a number of rather confusing regressions around object IDs (see https://github.com/Yubico/yubihsm-shell/issues/345 #Yubico).
This investigation was a side-quest of my @sovtechfund financed project "PKCS#11 support for @sequoiapgp".
-
I just released version 0.1.5 of the simple experimental standalone SSH agent for #OpenPGP cards (https://crates.io/crates/openpgp-card-ssh-agent/).
This is a minor update in terms of functionality.
However, it marks a move of the crate to the @Codeberg platform (including an integration test in Codeberg's Woodpecker CI, testing the agent against a virtual OpenPGP card: https://ci.codeberg.org/openpgp-card/ssh-agent/pipeline/31)
-
The #SequoiaPGP team has released version 1.5.0 of https://crates.io/crates/sequoia-octopus-librnp, the Sequoia-based alternative #OpenPGP backend for #Thunderbird.
This release fixes support for Thunderbird 102.7, and contains a big overhaul for Web of Trust calculations, which automatically set Thunderbird's "acceptance" of OpenPGP certificates based on published certifications and the trust roots the user configured in their GnuPG subsystem.