Skip to content

Instantly share code, notes, and snippets.

View philpennock's full-sized avatar

Phil Pennock philpennock

View GitHub Profile
@philpennock
philpennock / SKS Privacy
Created July 13, 2018 18:26
sks.spodhuis.org Privacy text, pre-termination
Privacy
There are three categories of data relevant to privacy here: the public keys stored; the HTTP/HKP requests made to access/upload/retrieve those keys; what I as a keyserver operator might do with those requests (logs).
For the public keys: the SKS keyserver pool, run globally by disparate individuals with no formal affiliation, is currently an append-only store, designed to protect against attempts to remove data. Once a key has been uploaded, that data is part of the public record, designed to allow anyone to attempt to verify the name binding within the key, using the public attestations by others about the identity of the key (key signatures). Keys not intended for public disclosure should not be uploaded, nor shared to people who might upload the keys of others. Note that there's no protection against fraudulent keys, with bindings of any name to any email address, and there is no basis to believe any such pairing without first proceeding through evaluation of the public attestations.
The reques
@philpennock
philpennock / aws-vault__login.py
Last active February 28, 2018 00:57
aws-vault only runs subcommands, there's no API for other languages to use, short of running them _under_ aws-vault. Here's a workaround for Python (3.6+)
def login():
if not shutil.which('aws-vault'):
return boto3.Session()
if 'AWS_SESSION_TOKEN' in os.environ:
return boto3.Session()
if 'AWS_ACCESS_KEY_ID' in os.environ and 'AWS_SECRET_ACCESS_KEY' in os.environ:
return boto3.Session()
profile=os.environ.get('AWS_PROFILE', 'default')
rc = subprocess.run(['aws-vault', 'exec', profile, '--', 'python', '-c',
'import json,os; print(json.dumps({k:os.environ[k] for k in os.environ if k.startswith("AWS_")}))'],
@philpennock
philpennock / aws
Created February 27, 2018 00:55
shim script for aws to use aws-vault as needed
#!/bin/sh -eu
aws=/usr/local/bin/aws
die() { printf >&2 '%s: %s\n' "$0" "$*"; exit 1; }
if ! [ -x "$aws" ]; then
case $0 in
/*) ;;
*) die "missing '${aws}' and not invoked with absolute path to skip self" ;;
@philpennock
philpennock / go-bindata.txt.asc
Created February 8, 2018 21:17
Public attestation of state witnessing regarding a Go repository ownership change
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I am Phil Pennock, I program in Go. I am writing this text on 2018-02-08.
It should be found PGP-signed from a key in the strong-set, so that this
public attestation can be verified by others.
To the best of my knowledge, I am in no way affiliated with whomever has
registered the new "jteeuwen" GitHub account.
@philpennock
philpennock / admin.py
Created January 28, 2018 00:28
Passwords/admin to manage the passwords repo. You'll need to update `DEFAULT_IDENTITY` at the very least.
#!/usr/bin/env python3
"""
admin: Passwords repo admin tool
Passwords repo has a bunch of actions which are common; copy/paste is
annoying. So manage the common actions.
"""
__author__ = 'phil.pennock@spodhuis.org (Phil Pennock)'
@philpennock
philpennock / freebsd-whois.patch
Created August 17, 2017 18:10
Fix FreeBSD's whois to handle Verisign whois referral change
--- usr.bin/whois/whois.c.orig 2017-08-17 14:00:08.917506928 -0400
+++ usr.bin/whois/whois.c 2017-08-17 14:00:28.975792449 -0400
@@ -76,7 +76,7 @@
#define GERMNICHOST "de.whois-servers.net"
#define FNICHOST "whois.afrinic.net"
#define DEFAULT_PORT "whois"
-#define WHOIS_SERVER_ID "Whois Server: "
+#define WHOIS_SERVER_ID "Registrar WHOIS Server: "
#define WHOIS_ORG_SERVER_ID "Registrant Street1:Whois Server:"
@philpennock
philpennock / ps_byjail
Last active November 11, 2021 00:06
ps_byjail: ps(1) wrapper for FreeBSD, showing which jail each process is in
#!/usr/bin/env perl
use strict;
use warnings;
#ps axdro user,pid,ppid,pgid,jid,stat,time,%cpu,%mem,vsz,rss,command ::
# $F[2] is PPID
# 0 means in-kernel process, all "real" processes (except init) have a positive integer as PPID
# Skip those where parent is this script
# $F[1] is PID
# Skip this script
@philpennock
philpennock / S
Created July 3, 2017 19:05
screen/tmux wrapper script
#!/bin/zsh -f
# TODO: systemd support
# systemd is transitioning to terminating processes when a user session ends,
# so we'll need to start a new scope.
#
# Launching the initial screen/tmux should be prefixed with:
# systemd-run --scope --user [$CMD...]
#
# This should go into plexer_new() as a contextual prefix.
#!/bin/sh -eu
set -eu
clean_here() {
find . -type f -execdir sh -c \
'f="{}";
t=$(file -hb "$f");
[ "$t" = "SQLite 3.x database" ] || exit 1;
printf "%s/%s\n" "$(pwd)" "$f";
ls -ld 2>/dev/null "$f" "${f}-journal";

GnuPG Packaging

A few items here assume zsh as shell (globs and expansion modifiers, print -l).

Required installation order:

Previously recorded:
gmp nettle gnutls npth libgpg-error libgcrypt libksba libassuan  ( pinentry , gnupg )