commit: 7b796e32557e86cb6dd463ac221d54463bd03020
parent 4f0a5fd78b3ddb726ee0d1c7341eb991ab91a111
Author: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
Date: Sun, 4 Feb 2018 22:30:40 +0100
canary.asc: Update
I know I’m late again… but hey, nobody pinged me on that anyway so I took my time
Diffstat:
1 file changed, 17 insertions(+), 18 deletions(-)
diff --git a/canary.asc b/canary.asc
@@ -1,7 +1,7 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
-This is an OpenPGP[why?] signed canary. The first attempt to do one failed… (I’m bad at having habits)
+This is an OpenPGP signed canary. The first attempt to do one failed… (I’m bad at having habits)
I choosed OpenPGP because it allows to:
• verify my identity (web of trust, meeting me, …)
• have a crypto-signed: text, date, expiration date
@@ -9,7 +9,7 @@ I choosed OpenPGP because it allows to:
This canary will be updated as often as possible and cryptographicaly expires after 6 months.
-== Statements ==
+## Statements
• anything that can harm and/or have harmed data, received or send to me and or my machines:
• SSID=orange, modifies few paquets, got fixed few hours later, no harmful data sent.
• DNS gave a weird answer, fixed directly.[1]
@@ -21,12 +21,20 @@ This canary will be updated as often as possible and cryptographicaly expires af
• my keys are all safe and protected and old ones are revoked and few old ones unuseable(shred)
• On 2016-12-17 I made myself a new keyring, the old one was a huge mess… sorry for the mess of revoked keys
• On 2017-05-03 04:19:00 I made new (ECC) keys, after hardware failure and no backups or old keys, and so broke HPKP
+ • On 2018-01-11 I changed my default GPG key set to DDC9237C14CF6F4DD847F6B390D93ACCFEFF61AE and it’s now store only on a Nitrokey Start and a paperkey backup
-== TL;DR ==
+### Certificates Log (for hacktivis.me)
+Begin on/Not Before; Expire on/Not After; Organisation; Serial
+2018-01-22T00:24:54; 2018-04-22T00:24:54; Let's Encrypt; 03:56:2e:f8:c5:5f:24:08:4b:52:15:71:03:cf:7d:64:4b:23
+2017-10-23T23:02:20; 2018-01-21T23:02:20; Let's Encrypt; 03:2E:23:BF:A9:31:5C:25:5F:12:00:70:44:12:3E:DB:77:BD
+2017-07-25T23:56:00; 2017-10-23T23:56:00; Let's Encrypt; 03:BC:D9:81:CF:CA:53:90:2E:90:B4:D0:81:26:6A:4B:C6:34
+
+### TL;DR
• I’m safe but you should not have a blind trust on me.
-== Commands used ==
-• vim canary
+## Commands used
+• cp canary.asc canary
+• vis canary
• gpg --default-sig-expire 6m --clearsign canary
• shred -u canary
@@ -35,17 +43,8 @@ Inspired by: https://fyb.patternsinthevoid.net/canary.asc and https://github.com
1: https://hacktivis.me/articles/La%20neutralit%C3%A9e%20du%20Net%20sur%20un%20wifi%20Orange%E2%84%A2,%20deuxi%C3%A8me%20mensonge
-----BEGIN PGP SIGNATURE-----
-iQI5BAEBCgAjFiEEnKAFlDsjdFOiSBlNAZaWk6MMhzIFAlkMzd0FgwDtTgAACgkQ
-AZaWk6MMhzIOrg/+LwFW3Kap7cPTIwcILDBc4Qywax5oTZPcviTMt2JDB7B7ep6z
-5zq/HIncRod6yPkrZUThRZUaPkspBJvy/MqMnulQBcU9CIAmxqExfL6PaIR6srqq
-Pd21+Icr2iXpMAZK/o0EGBHXTjx1iI9P50HMpcWH/op4C189+Zg4Yh72muyU5lEo
-CsxHIeg7JeSPpHTtBMc0TX/smYosw4SWuHqJpjlvlk/JmsAopCdWnJsOq3LTqUEd
-Q0wjPwCAW+zG4ZAddLMKt5bl34t/EydHkwufy/Wv8vJDRPkweUt7T8cEIhLC0VAE
-xhOgU7dprjWsshQ5DmyPMIShHMzdB/ObAMf71nbAA8OPCF5d29GzVBBKjnKSi5U4
-PUuQ85fdfuZu7yC9ZlNJLvx8tcJ23cT9GQclbix6XzX4ZrITuQ7YKq6kv3IOq/DZ
-OTasNZLq0UALkZrS6GVvlpohPHnK4FSInQBJBJvWAz82dmSACG46eBO3Zw3p7f4D
-gBuA+jgghvVHR4Hk54R0lwZy6ms+NsfpWadYOrJQuNDrcxdvcz9S0ZPBinolZga3
-dzdmbqvLj2UIiNW4aODJAb6vPdQgY37c7YyRu+JHwmwLAAgowFnsJHfi3Nq+dnfk
-xFJxScSUjuX80T+RHbL1jrWhZAxewLHuertHyFosHIsNqYHX7tzcNVseVjY=
-=dQGy
+iHsEARYKACMWIQT4W9xj/ZtK9Ev2uBLVt6jkPJl97gUCWnd7RgWDAO1OAAAKCRDV
+t6jkPJl97nh6AQC8y8FTbNJU0Y8OF98n9gMHU1iPvZdbCRUkyCqPYclcwwEAqpno
+MUDnteh0Yfjfw3ZVOdPRgLrKAz6tgj5EO5AfZw0=
+=8nx9
-----END PGP SIGNATURE-----