TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Impact of SKS Keyserver Poisoning on Gentoo

11 点作者 zach43将近 6 年前

2 条评论

dngray将近 6 年前
One of the things that surprises me is the TorProject still uses SKS in their documentation. They don&#x27;t make their keys available any other way or have their own key server <a href="https:&#x2F;&#x2F;support.torproject.org&#x2F;tbb&#x2F;how-to-verify-signature&#x2F;" rel="nofollow">https:&#x2F;&#x2F;support.torproject.org&#x2F;tbb&#x2F;how-to-verify-signature&#x2F;</a><p>&gt; <i>If you are looking for them, you may try keys.openpgp.org keyserver that is not vulnerable to the attack, at the cost of stripping all signatures and unverified UIDs.</i><p>I have also been unable to get keys.openpgp.org to work For example:<p><pre><code> gpg --keyserver hkp:&#x2F;&#x2F;zkaan2xfbuxia2wpf7ofnkbz6r5zdbbvxbunvp5g2iebopbfc4iqmbad.onion --recv-keys 0x4E2C6E8793298290 gpg: key 0x4E2C6E8793298290: no user ID gpg: Total number processed: 1 </code></pre> They talk about that here:<p><a href="https:&#x2F;&#x2F;keys.openpgp.org&#x2F;about&#x2F;faq#older-gnupg" rel="nofollow">https:&#x2F;&#x2F;keys.openpgp.org&#x2F;about&#x2F;faq#older-gnupg</a><p>I&#x27;m on Archlinux, my gnupg is 2.2.16, libgcrypt 1.8.4 which are currently the the latest <a href="https:&#x2F;&#x2F;gnupg.org&#x2F;download&#x2F;index.html" rel="nofollow">https:&#x2F;&#x2F;gnupg.org&#x2F;download&#x2F;index.html</a>
exabrial将近 6 年前
I discovered a similar bug awhile back in an important piece of software and sent it on to get fixed. Essentially the gpg implementation always assumed the signatures on the key would be rsa, so merely signing someone else&#x27;s key with an ecdsa key would block them from using said thing. I had discovered it by accidently doing it to myself