-
Update tkeyclient version because of a vulnerability leaving some
USSs unused. Keys might have changed since earlier versions! Read
more here:The error is only triggered if you use
tkey-sign-cliwith the
--ussor--uss-fileflags and use an affected USS. An affected
USS hashes to a digest with a 0 (zero) in the first byte.Follow these steps to identify if you are affected:
- Run
tkey-sign -G -p key.pub --uss - Type in your USS.
- Remove and reinsert the TKey.
- Run
tkey-sign -G -p key2.pub - Compare the
key.pubandkey2.pubfiles. If they have the same
contents your USS is vulnerable.
If your USS are affected, you have three options:
- Not using a USS and keep your signing keys.
- Keep using the USS and get new signing keys.
- Use another USS and get new signing keys.
- Run
-
Add a new option flag:
--force-full-ussto force full use of the
32 byte USS digest. -
Changed license to BSD-2-Clause
Full changelog.
Reproducible builds:
We're currently building releases with goreleaser using Go 1.23.1.
You should be able to build a binary that is an exact copy of our release binaries if you use the same Go compiler, at least for the statically linked Linux and Windows binaries. On macOS tkey-sign is unfortunately not statically linked.