Arrase

No worries, I'm long winded when I've a subject sufficiently researched. Read 
at your leisure. Good to know we where on the same page with some of the client 
to server interactions.

Feature suggestions for browser plugin

Perhaps consider color coding mixed page content within the browser plugin 
and/or allow users to block unsigned/signed with unknown keys kinda like 
NoScript on Firefox

Future issues for browsers

One issue I for see on client side validating is whether the whole page is 
signed, source and all, or if there's mixed signed page content, or if there's 
content signed by some trusted keys along with data that is signed with unknown 
keys.

These types of pages will happen, especially for forums, and depending on the 
clients' plugin it may crash the browser or only validate the first signature 
check. If you check my projects helper scripts you'll find that I've begun to 
work around this last issue of only the first gpg block in a file being 
recognized and handled when in a list of gpg encoded blocks. Required some 
loops and even then it's not purity or cost effective.

Well met and sleep well.

Mirimir

It depends on the server but my dirty hack for Apache would be a vhost redirect 
to the keybase file system mount point,

    /keybase/public/s0ands0

...instead of...

    /var/www

...but permissions would likely need modifying to prevent client writes. 
Another option would be to "share" the web host files to a specific keybase 
account only set up to read/serve shared files. This second option is what I 
would try first if I couldn't figure out what ports where being used for kbfs, 
if those ports can be Tor'ified then I'd try serving up the shared directory as 
a hidden service for the web hosting keybase account and not even bother with 
third party web server options.

A client side verification alternative maybe supplied via a Java plugin that 
uses the following as a library/backend

https://github.com/guardianproject/gnupg-for-java

I'll have to check the link out in a few days, got some kennel hacking to 
finish and post about before crawling domains for more material. But in the 
interest in sharing notes here's a link to resources I've used to build my own 
GnuPG related project. It's designed for sysadmins that wanted "one way" 
encryption of their logs, hint find my postings on stackoverflow related 
domains for my necromancy on related questions.

https://github.com/S0AndS0/Perinoid_Pipes/blob/master/Documentation/Education_resources.md

Warnings for above linked project

- the above linked project as a whole is unrelated to the goals of this email 
chain but the 'Gnupg_' prefixed titled documents in the above are general 
enough for any projects use. You'll also want to check the '.travis-ci/' 
directory for easy automation tricks with GnuPG.

- it's functional and maybe used for bulk signing or decryption via one or two 
command line option changes. However, is only a prof of concept because it's 
all written in Bash scripting language.

- it maybe very insecure or very secure, no live stress tests have been 
completed as of yet.

- So enjoy'em but let's not derail what's happening here within the current 
chain topic.

On the subject of further hackery of previously mentioned tools the mnfst 
GitHub Repo has client, server and API options so I'd have to dig deeper into 
build setup to recommend it further as an alternative. However, it does look to 
be a tool that is complimentary to the one proposed here. So consider it as a 
way of "closing the loop" by allowing clients to send signed post data where as 
this project kinda aims the reverse. Combined and we'd have pgp signing on both 
sides of communication.

Stay safe y'all

On October 25, 2016 6:46:54 PM PDT, Mirimir <[email protected]> wrote:
>On 10/25/2016 07:17 PM, Michael wrote:
>
><SNIP>
>
>> # Alternative options
>> 
>> Have you heard of https://keybase.io yet, or their file system? 
>> I've a few invites reserved for developers so let me know if 
>> it's interesting enough to warrant testing. It maybe possible 
>> to run with all web pages being signed and verified with a 
>> little hackery to how it connects clients.
>
>That would be very cool! My blog <http://dbshmc5frbchaum2.onion/> is
>all
>GnuPG signed, and the key is at <https://keybase.io/sireliah>.
>
>So what sort of hackery would be needed? There are some GnuPG add-ons
>for Firefox etc, but I haven't found one that works. I just tell users
>to download pages, and verify manually. One issue might be that Keybase
>doesn't seem to resolve onions, so I used a tor2web link in the
>profile.
>
>Another issue is that I'm using an ancient app (pgphtml) to sign HTML.
>And I haven't found anything newer that works.
>
><SNIP>
>-- 
>tor-talk mailing list - [email protected]
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - [email protected]
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to