TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Refusing to verify myself: I am liz on Keybase.io

201 pointsby achernyaabout 11 years ago

20 comments

kylecabout 11 years ago
I like the idea of Keybase.io, but I would prefer to use it in a way in which I don't have to trust them at all. As it stands, you need to install their command-line tool and have it directly manage your GPG keychain. For that, I'd prefer to have a platform-neutral tool that's been independently audited and managed by my OS's package manager rather than their keybase-installer tool which seems to want to update very frequently with who-knows-what changes.
评论 #7503353 未加载
评论 #7503160 未加载
评论 #7503162 未加载
评论 #7506044 未加载
评论 #7503142 未加载
rdlabout 11 years ago
In reality, the biggest risk for routine comsec with pgp is that no one uses it because it&#x27;s difficult, but the very specific app of code signing is something where keys need a lot of protection IMO. (I am mostly fine with START TLS for email security 99.99% of the time)<p>The thing which terrifies me is that the npm keybase app asks for my GPG key directly in the same window, and it&#x27;s impossible for me to (easily) tell when the password prompt is from my GPG binary (which I pretty much trust) vs. the npm binary.<p>I&#x27;m using keybase now (rdl), mostly because I trust Chris Coyne personally, and because my key is old. I&#x27;m creating a new 4096 RSA key soon, and will be a lot more paranoid about protecting it -- it will only ever exist on read&#x2F;use only smartcards after initial generation on a secure machine. (sadly, openpgp card doesn&#x27;t support export and replication, so to be durable, I have to generate it externally and load onto a bunch of cards and then delete the external key; I&#x27;m not willing to trust my keys to a single smartcard I carry with me.)<p>Using keybase with gpg agent is maybe a bit safer. I don&#x27;t <i>really</i> mind being forced to do bad stuff by keybase, due to the risks to them if they&#x27;re caught, as long as it doesn&#x27;t expose my keying material. gpg agent plus a hardware smartcard should mostly protect me. The pure-software alternative would be a bunch of text-file messages which I can manually cut and paste and move around between clearly-distinct processes running in separate shells&#x2F;windows (or machines!).<p>I&#x27;ve been thinking about something a lot better than openpgp card, though, as a secure end-user key management device, with more than just key protections. Unfortunately that means making custom hardware, and that makes little sense in the volumes PGP achieves; maybe if there are other client-side security credentials like ssh or bitcoin, I&#x27;d do it.
评论 #7503239 未加载
评论 #7503493 未加载
sp332about 11 years ago
You can build a newer version from an official Ubuntu source package. Start by adding a line to a file in &#x2F;etc&#x2F;apt&#x2F;apt.conf.d&#x2F; that pins all your packages to 12.04, &quot;precise&quot;:<p><pre><code> APT::Default-Release &quot;precise&quot;; </code></pre> Then add a line to your &#x2F;etc&#x2F;apt&#x2F;sources.list to include saucy (or trusty), which has the right version of node.<p><pre><code> deb http:&#x2F;&#x2F;archive.ubuntu.com&#x2F;ubuntu saucy main restricted universe deb-src http:&#x2F;&#x2F;archive.ubuntu.com&#x2F;ubuntu saucy main restricted universe </code></pre> Saucy won&#x27;t be supported after this year. You can either use Trusty now, or wait for Trusty to be officially released next month and then switch.<p>Next, run these:<p><pre><code> sudo apt-get update sudo apt-get build-dep -t saucy nodejs sudo apt-get -b source -t saucy nodejs </code></pre> This puts the packages in the current directory. Now just install the one(s) you want:<p><pre><code> dpkg -i nodejs_0.10.15~dfsg1-4_amd64.deb </code></pre> Edit: wow, I just noticed how many packages that build-dep step pulls in. I hope that doesn&#x27;t step on anything important :( At that point, you might as well just add a file &#x2F;etc&#x2F;apt&#x2F;preferences.d&#x2F;01node with these lines:<p><pre><code> Package: nodejs Pin: release n=saucy Pin-Priority: 1000 </code></pre> Then &quot;apt-get install nodejs&quot; will get the right version and all dependencies, no need to build from source.
rsyncabout 11 years ago
I&#x27;ve only been glacing here and there, but I keep seeing discussion of uploading ones private key to keybase being an actual mechanism that is supported &#x2F; encouraged &#x2F; extant ?<p>Surely not...
评论 #7503080 未加载
评论 #7502917 未加载
shazowabout 11 years ago
I had a similar issue with the verifying process. I opened an issue requesting better documentation on the signing command so that people can write their own clients: <a href="https://github.com/keybase/keybase-issues/issues/174" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;keybase&#x2F;keybase-issues&#x2F;issues&#x2F;174</a>
评论 #7503124 未加载
exeliusabout 11 years ago
Ok, well, keybase is less than a month old. You are refusing to use bleeding-edge software because it&#x27;s not supported by your Linux distro. That means you&#x27;re probably not the target user for what is described on the website as alpha software. Doesn&#x27;t mean you won&#x27;t be at some point when they&#x27;ve added functionality and extended the APIs, but for now you don&#x27;t feel comfortable using it.<p>I think that&#x27;s a fair stance to take on early-alpha software.
eik3_deabout 11 years ago
Curious: Why do people choose JavaScript&#x2F;node.js to write command line apps over traditional languages for that task like python or ruby?
评论 #7503184 未加载
评论 #7502930 未加载
评论 #7502963 未加载
评论 #7502995 未加载
评论 #7502991 未加载
jrochkind1about 11 years ago
You just have to know that you&#x27;re placing all your trust in keybase. If keybase says they have verified that `liz` is a certain facebook account, and you are acting based on that in encyrpting something to `liz`, you are trusting that:<p>* keybase acted honestly<p>* nobody compromised keybases software when it was doing the verification<p>* _after_ it did the verification, nobody managed to get keybase to switch out `liz`s key for some other key that wasn&#x27;t really liz&#x27;s (either because keybase was compromised, or keybase was untrustworthy... maybe because the government made them be?)<p>That last one is the kicker for me. If keybase catches on, surely they are going to get government orders to swap our one key for another key at some point.<p>The traditional web of trust does not require trusting any of those things, or at least not in those simple forms.<p>On the other hand, yes, there are reasons traditional PGP hasn&#x27;t caught on, and usability is a big one. But, still, to compromise security for usability... if you go all the way there, you just wind up where we are now, not secure at all, right?<p>So, okay, is there value in going some of the way there, and getting some improved security but not as much as you could, for a more usable experience? Maybe. The danger is that people will think they are getting a lot more security than they are getting, and that situation can be worse than no security at all.<p>One thing Snowden taught us is that if you have to trust a third party to be honest... it&#x27;s not that the people running keybase aren&#x27;t honest, it&#x27;s that the government will _compel_ them to be dishonest if it ever matters to them.
评论 #7503212 未加载
评论 #7503303 未加载
评论 #7503197 未加载
raverbashingabout 11 years ago
So to verify a key I need to install npm?<p>No thanks.<p>&quot; It doesn&#x27;t seem particularly safe for me to trust my valuable PGP keys to this system.&quot;<p>I agree
phelmigabout 11 years ago
Couldn&#x27;t they create a challenge&#x2F;response type authentication that proofs that liz has the private key for her public key?<p>Liz wants to authenticate. Keybase sends her a challenge, which she encrypts using her private key. Keybase uses her public key to verify that liz owns the private key for her public PGP key. Easy peasy.
评论 #7504233 未加载
riffraffabout 11 years ago
I just signed up on keybase.io.<p>It seems that I can authenticate, get a few people to track me, than revoke my key and upload a new one. I can also, obviously, recover my password via email.<p>And at the end of the process, people who were &quot;tracking&quot; me will still be tracking me. I am not sure this is supposed to happen.
评论 #7504499 未加载
thebossabout 11 years ago
There was a keybase security vulnerability reported last week as well. I&#x27;m not sure if it is 100% relevant because it had nothing to do with js crypto, but it could have allowed someone to impersonate &#x27;liz&#x27; as &#x27;iiz&#x27;<p>github report: <a href="https://github.com/keybase/keybase-issues/issues/397" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;keybase&#x2F;keybase-issues&#x2F;issues&#x2F;397</a> blog: <a href="http://ejj.io/keybase-io-vulnerability/" rel="nofollow">http:&#x2F;&#x2F;ejj.io&#x2F;keybase-io-vulnerability&#x2F;</a>
zobzuabout 11 years ago
This talks much more to me, tho: <a href="http://gpg.mozilla.org/pks/lookup?search=0x4E8EA664&amp;op=vindex" rel="nofollow">http:&#x2F;&#x2F;gpg.mozilla.org&#x2F;pks&#x2F;lookup?search=0x4E8EA664&amp;op=vinde...</a><p>And of course, I like that it&#x27;s distributed and not a business. I don&#x27;t want people to do business on my identity.
kbar13about 11 years ago
ok, the distro has an outdated version of x software. This is a pretty common issue with older distributions. The great thing about debuntu is that you can pin packages to newer versions!<p><a href="http://packages.ubuntu.com/saucy/nodejs" rel="nofollow">http:&#x2F;&#x2F;packages.ubuntu.com&#x2F;saucy&#x2F;nodejs</a>
mhandleyabout 11 years ago
I don&#x27;t even get as far as being able to verify myself. When I follow their instructions to upload my public key, I get &quot;Whoa: Error: Unknown public key version: 3&quot;. Which doesn&#x27;t really help me know what&#x27;s actually wrong.
cyphunkabout 11 years ago
&gt; &#x27;Prerequisites: Node.js&#x27;<p>No thanks. Not going to install a slew of node packages all from untrusted sources so that i can &quot;claim&quot; my name in some PGP key DB. Key DB&#x27;s are not the way to go. Name associations are worse. As someone illustrated by pumping snowden@&lt;somedomain&gt; or glengreenwald@&lt;somedomain&gt; keys into gpg servers. The adverse effect of this names system has a heavier weight than the positive.<p>If people want to improve usability they first should start with authentication. That is, authenticating keys. Second they should develop systems that permit for predictable imperfections in a manner that the user can understand.
评论 #7510739 未加载
chris123about 11 years ago
Bitcoin blockchain is looking to take market share for &quot;trust&quot; and &quot;verification&quot; type things. The new web of trust.
maxtacoabout 11 years ago
Install-less, hosted-private-key-less Github, Twitter and Web site verifications are now live on keybase.io. Enjoy!
rhomlabout 11 years ago
Yet another project that will end up at the bottom of the lake like all other digital identity claiming sites.
dreamdu5tabout 11 years ago
If I connect to a computer which uses some public key, and I verify that key with keybase.io. I could connect again and the public key could change but still be valid.<p>Ultimately you&#x27;re trusting keybase.io not to mess with the verification process, correct?