(no title)
alexjurkiewicz | 1 month ago
My favourite part of these tools is the zany use of numbered file descriptors. `keypair` outputs the public key on fd 5 and secret key on fd 9. But signing reads the secret key on fd 8, while verification reads the public key on fd 4! Why aren't they the same?? I have to read the manpage every time.
Retr0id|1 month ago
I'd have otherwise guessed that this tool mainly exists just to test lib25519. Personally I'd only ever want a library, or some higher-level tool. A CLI tool that just does raw signing feels like a weird (and footgun-shaped) middle ground.
tptacek|1 month ago
XorNot|1 month ago
Fnoord|1 month ago
FTA:
> These tools allow lib25519 to be easily used from shell scripts.
I've never used ed25519-cli, but not having to use a library is nice for someone who isn't a programmer.
gnull|1 month ago
Makes your commands unreadable without a manual, leaves a lot of room for errors that are quietly ignored. And forces you into using a shell that comes with its own set of gotchas, bash is not known to be a particularly good tool for security.
And to those who stay this adds flexibility: it doesn't. Those file descriptors are available under/dev/fd on linux, with named options you can do --pk /dev/fd/5. Or make a named pipe.
minitech|1 month ago
If you have a procfs mounted at /proc and the open syscall to use on it, sure (and even then, it’s wasteful and adds unnecessary failure paths). Even argument parsing is yet more code to audit.
I think the design is pretty good as-is.
PunchyHamster|1 month ago
it being default is insanity
jedahan|1 month ago
yellowapple|1 month ago
gnull|1 month ago
unknown|1 month ago
[deleted]
chuckadams|1 month ago
tptacek|1 month ago
https://www.openbsd.org/papers/bsdcan-signify.html
alfiedotwtf|1 month ago
PunchyHamster|1 month ago
pamcake|1 month ago
[deleted]
pseudohadamard|1 month ago