7 comments

  • alexjurkiewicz 1 day ago
    (2024)

    My favourite part of these tools is the zany use of numbered file descriptors. `keypair` outputs the public key on fd 5 and secret key on fd 9. But signing reads the secret key on fd 8, while verification reads the public key on fd 4! Why aren't they the same?? I have to read the manpage every time.

    • gnull 19 hours ago
      That's such a user-hostile design decision. I can't fathom what justifies it (other than kinky taste).

      Makes your commands unreadable without a manual, leaves a lot of room for errors that are quietly ignored. And forces you into using a shell that comes with its own set of gotchas, bash is not known to be a particularly good tool for security.

      And to those who stay this adds flexibility: it doesn't. Those file descriptors are available under/dev/fd on linux, with named options you can do --pk /dev/fd/5. Or make a named pipe.

      • PunchyHamster 17 hours ago
        it being option can be nice if you don't want your keys touching disk and need to pass it over to other apps.

        it being default is insanity

      • minitech 17 hours ago
        > Those file descriptors are available under/dev/fd on linux, with named options you can do --pk /dev/fd/5.

        If you have a procfs mounted at /proc and the open syscall to use on it, sure (and even then, it’s wasteful and adds unnecessary failure paths). Even argument parsing is yet more code to audit.

        I think the design is pretty good as-is.

    • Retr0id 1 day ago
      I'm curious, what do you actually use it for?

      I'd have otherwise guessed that this tool mainly exists just to test lib25519. Personally I'd only ever want a library, or some higher-level tool. A CLI tool that just does raw signing feels like a weird (and footgun-shaped) middle ground.

      • tptacek 1 day ago
        This mostly exists to test lib25519 and ostensibly to build systems with shell scripts (though: few people would do that). It is a weird and footgun-shaped middle ground.
      • Fnoord 1 day ago
        > I'm curious, what do you actually use it for?

        FTA:

        > These tools allow lib25519 to be easily used from shell scripts.

        I've never used ed25519-cli, but not having to use a library is nice for someone who isn't a programmer.

        • tptacek 1 day ago
          The Venn diagram of "not a programmer" and "can safely use Ed25519" is two non-overlapping circles.
          • PunchyHamster 17 hours ago
            "this app needs me to generate a key and point to it in config" is plenty of overlap
            • Retr0id 13 hours ago
              If you just want a raw ed25519 private key then `head -c32 /dev/urandom` does the job. But usually you want a DER/PEM wrapper or similar, which the openssl cli tools handle nicely.
          • kfreds 20 hours ago
            I don't consider myself a programmer and I can use Ed25519 safely. I do however understand computing fairly well.
            • Retr0id 14 hours ago
              I consider myself a programmer and ed25519-understander, but the idea of using it directly within a shell script terrifies me.
          • alexjurkiewicz 21 hours ago
            Simply combine this tool with `openssl enc` and your shell script is as secure as any shell script could be
        • loeg 1 day ago
          Someone writing shell scripts is a programmer, for better or worse.
      • XorNot 1 day ago
        It's why no one has succeeded in replacing GPG: you need a lot of systems to work in order to have an actual viable one, the ability to spit out signatures from keys is required but not sufficient.
        • adastra22 21 hours ago
          GPG is pervasive for the same reason git is pervasive: network effects. There are plenty of better alternatives.
          • XorNot 21 hours ago
            Such as? I need an alternative which supports commutative trust relationships of some sort which are revocable.
            • C4K3 19 hours ago
              Keybase or any of the tools inspired by keybase (foks.pub etc)
    • jedahan 1 day ago
      I was wondering the same thing. My best guess is that is to guard against operator misuse. Like usb-a only plugging in one way. Anything that is secret will never accidentally print to stdout. String interpolation in bash with `—option $empty` might be safer than `8<$empty`. Have to explore more but yeah, this is a new pattern for me as well.
      • yellowapple 19 hours ago
        Another possible factor driving the decision to use numbered file descriptors: the logic to validate that a file exists (or can exist) at a given path, is readable/writable, etc. gets punted to the shell instead of being something the program itself has to worry about.
      • gnull 19 hours ago
        Those descriptors like 5 could be mapped to anything, including descriptor 1, stdout.
    • chuckadams 1 day ago
      What a strange convention. I'm partial to minisign, which works on plain old files.
    • alfiedotwtf 17 hours ago
      I’m guessing it’s to support the test framework it’s built with?
      • PunchyHamster 17 hours ago
        support is fine. Being default is crazy
    • pamcake 1 day ago
      [dead]
    • pseudohadamard 18 hours ago
      It's djb's web site so it's a djb design. With great genius comes great different thinking.
  • PunchyHamster 17 hours ago
    > It writes the public key to file descriptor 5, and then writes the secret key to file descriptor 9.

    Is the project trying to compete with GPG for worst interface ? Magic numbers BAD, especially in something that will mostly be used in scripts

  • why-o-why 1 day ago
    Why not zoidbe... I mean, why not open ssh? It's literally a CLI that does every crypto operation with every primitive (except some PQC)?
    • tptacek 1 day ago
      If you mean the OpenSSL CLI, it's hard to think of a more footgun-y cryptographic tool than the one that:

      * defaults to unauthenticated encryption

      * buries its one authenticated mode

      * requires explicit command-line nonces

      * defaults to an MD5 KDF

      You could probably keep going for another 10 bullets. Never use the OpenSSL CLI for anything other than TLS stuff.

      • coppsilgold 22 hours ago
        You can use ssh-keygen for signing and verifying signatures.

        You can also use age[1] to encrypt payloads targeting ssh public keys. And decrypt using ssh private keys.

        [1] <https://github.com/FiloSottile/age>

      • quotemstr 1 day ago
        Yeah, the OpenSSL CLI sucks. So what's to be done?

        Sure, we can build a 25519-specific tool with a less footgun-y interface. Fine, whatever, for that one use case.

        Or we can build an alternative OpenSSL CLI that explodes OpenSSL and its numerous useful features in a general way and helps fix lots of use cases.

        • tptacek 1 day ago
          Nothing is to be done. Just don't use the OpenSSL CLI. It's a deeply cursed concept for a tool!
          • quotemstr 23 hours ago
            A command like cryptography swiss army knife useful though. If not openssl, then what?
            • tptacek 23 hours ago
              It's useful as a toy and a learning tool, but for nothing else. For those two things, OpenSSL is fine as it is.
          • pamcake 23 hours ago
            [dead]
      • why-o-why 21 hours ago
        Are you confusing the open openSSL library with the CLI? Absolutely none of this is true when used as a signing tool on the CLI. Seems like you just needed to rant, rather than answer my question. Which is fine: I do it to, but I was legit asking a question that you ignored and you seem to know about openSSL?
  • WiSaGaN 21 hours ago
    I can't find the source. Anyone can point to it?
  • mrbluecoat 23 hours ago
    Sounds like the perfect place to embed credential stealing malware. Good thing they publish their code on an independent third-party public code sharing platform. Oh wait...
    • perching_aix 20 hours ago
      Short of suspecting a malicious tarball, I really can't think of a reason why "publish[ing] their code on an independent third-party public code sharing platform" would be a selling point. You're getting the source code straight from the horse's mouth this way.
  • esseph 1 day ago
    > feels like a weird (and footgun-shaped) middle ground.

    hmm

    > It is a weird and footgun-shaped middle ground.

    Oh? HMMMMM :|