From owner-freebsd-current@freebsd.org Sat Jan 2 00:37:26 2021 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 599C14B9783 for ; Sat, 2 Jan 2021 00:37:26 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4D72zB1v6Nz4Zqg for ; Sat, 2 Jan 2021 00:37:26 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from mail-yb1-f181.google.com (mail-yb1-f181.google.com [209.85.219.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: lwhsu/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 2DC502FCB3 for ; Sat, 2 Jan 2021 00:37:26 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: by mail-yb1-f181.google.com with SMTP id d37so20640168ybi.4 for ; Fri, 01 Jan 2021 16:37:26 -0800 (PST) X-Gm-Message-State: AOAM532rJAye+kpHEnhP5RXopwg54X8pCKIbaSX1TYxAl8ZfqII5zWlF 5J9mpTNRJVXuu4CzT5KIr53fHp9Zok/hEou7/zc= X-Google-Smtp-Source: ABdhPJw4To38qqbtMbWsu2GVi6Gw9ocAspw9oF440RulDevoGciHimaO1rOe2hGhXc80iN8V0eX0ywtWOIKX0AP94G0= X-Received: by 2002:a25:5106:: with SMTP id f6mr23191237ybb.176.1609547845684; Fri, 01 Jan 2021 16:37:25 -0800 (PST) MIME-Version: 1.0 References: <20201218175241.GA72552@spindle.one-eyed-alien.net> <20201218182820.1P0tK%steffen@sdaoden.eu> <20201223023242.GG31099@funkthat.com> <20201223162417.v7Ce6%steffen@sdaoden.eu> <20201229011939.GU31099@funkthat.com> <20201229210454.Lh4y_%steffen@sdaoden.eu> <20201230004620.GB31099@funkthat.com> <20201231193908.GC31099@funkthat.com> <20210101140857.x3hbci6c4nwi7gl7@mutt-hbsd> In-Reply-To: From: Li-Wen Hsu Date: Sat, 2 Jan 2021 08:37:14 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: HEADS UP: FreeBSD src repo transitioning to git this weekend To: Christian Weisgerber Cc: freebsd-current Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 02 Jan 2021 00:37:26 -0000 On Sat, Jan 2, 2021 at 4:25 AM Christian Weisgerber wrote: > > On 2021-01-01, Shawn Webb wrote: > > > This is why I asked FreeBSD to provide anonymous read-only ssh:// > > support for git. I'm very grateful they support it. > > > > One thing that I need to do with the HardenedBSD infrastructure is > > publish on our site the ssh pubkeys of the server (both RSA and > > ed25519). I plan to do that sometime this coming week. I wonder if it > > would be a good idea for FreeBSD to do the same > > The draft FreeBSD Git docs have the SSH fingerprints of the Git > servers. > https://github.com/bsdimp/freebsd-git-docs/blob/main/URLs.md > > Here's one from my own ~/.ssh/known_hosts: > SHA256:y1ljKrKMD3lDObRUG3xJ9gXwEIuqnh306tSyFd1tuZE git.freebsd.org (ED25519) And the ssh-keys file is available on the project site, signed with security-officer's key: https://www.freebsd.org/internal/ssh-keys.asc And in that file's header: """ Note that all machines listed below also have signed SSHFP records in DNS. If you have a DNSSEC-aware resolver and set VerifyHostKeyDNS to "ask" or "yes" in ~/.ssh/config, OpenSSH will verify host keys against these SSHFP records. """ Best, Li-Wen