Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

My two cents on OpenPGP

$
0
0

TL;DRAs of today, March 10, 2017 , all my git commits will be cryptographically signed. I've also configured GitHub to verify them . You can access them either from Keybase or on the blog'sKeys page.

If you want to know why I started to do so, read on.

OpenPGP

OpenPGP is a non-proprietary protocol for encrypting email communication using public key cryptography . It is based on the original PGP (Pretty Good Privacy) software. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.

As an IETF Proposed Standard RFC 4880 , OpenPGP can be implemented by any company without paying any licensing fees to anyone. One of the most common implementations is GnuPG .

GnuPG

GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

Keybase

A public directory of publicly auditable public keys. All paired, for convenience, with unique usernames. Keybase is built upon the venerable and battle-hardened GNU Privacy Guard .

Keybase allows users to easily encrypt, decrypt and share messages within a tried-and-tested encryption standard. Furthermore, all public keys are tied to user accounts on the Keybase websites, in addition to Twitter and Github accounts.

!If you've never heard about Keybase , go ahead and read Playing with Keybase.io .

Why sign my git commits?

A person with enough privileges can alter any git commit, including my own.

Also, It’s entirely possible that someone could compromised my account and commit malicious code on my behalf. I want to verify my work to avoid such incidents.

If you think that's an exaggeration, you should definitely read Mike Gerwitz 's Git Horror Story . For the impatient, here's the summary:

Be careful of who you trust . Is your repository safe from harm/exploitation on your PC? What about the PCs of those whom you trust? Your host is not necessarily secure . Be wary of using remotely hosted repositories as your primary hub.

Using GPG to sign your commits can help to assert your identity, helping to protect your reputation from impostors.

For large merges, you must develop a security practice that works best for your particular project. Specifically, you may choose to sign each individual commit introduced by the merge, sign only the merge commit , or squash all commits and sign the resulting commit.

If you have an existing repository, there is little need to go rewriting history to mass-sign commits .

Once you have determined the security policy best for your project, you may automate signature verification to ensure that no unauthorized commits sneak into your repository.

How do I start?

Once you decide to sign your commits, go through the following:

Generating a new GPG key Signing Git Commits with a GPG Key . Submitting your GPG key to a keyserver On Keybase.io & Encrypted Private Key Uploading

!Please don't upload your private key to Keybase , ok?

!Don 't forget to submit your key to a public key server: OpenPGP , MIT , SKS , etc.

If you really want to go the extra mile, consider buying a YubiKey (I'm not there yet)


Viewing all articles
Browse latest Browse all 12749

Trending Articles