Announce: Release of Entangle v0.3.1 – An app for tethered camera control & capture

Posted: February 13th, 2012 | Filed under: Entangle, Fedora, Photography | Tags: , , , , | 1 Comment »

I am pleased to announce a new release 0.3.1 of Entangle, a GTK3 desktop application for tethered camera control & capture, is available for download from the usual location. This release has focused exclusively on bug fixing following the major refactoring that went into the previous release. If you were having trouble with the previous release crashing, then I hope this new one should improve things significantly.

  • Fix crash in handling camera control combo list
  • Add notice about need to set XDG_DATA_DIRS when installing into unusual directories
  • Add workaround to avoid immediate crash if schemas were not found in XDG_DATA_DIRS
  • Compile schema files after installation
  • Fix crash updating widget sensitivity
  • Fix crashes & race conditions during capture of images
  • Fix infinite preview error message popups which can hang the window manager
  • Fix crash when retrying a failed connection attempt
  • Fix thread locking when hiding status display
  • Avoid running multiple threads for monitoring status
  • Fix initial sensitivity of camera control panels
  • Update README with new URLs for bugs/mailing lists

Since the latest release I have also registered Entangle with GNA!, to get support for mailing lists and bug tracking.

GPG keysigning made easy with Pius

Posted: February 10th, 2012 | Filed under: Fedora, Security, Virt Tools | 2 Comments »

A few months back the Red Hat KVM team held a mass keysigning party to setup a web of trust between each others keys. IIRC, there were approximately 20 people participating in this, which potentially meant alot of tedious typing of GPG commands, with the potential for error such tedium implies. Fortunately we had Jim Meyering on hand to give us some tips for facilitating/optimizing the process, the most important of which was to introduce us to the ‘Pius‘ tool.  To quote from its website

pius (PGP Individual UID Signer) helps attendees of PGP keysigning parties. It is the main utility and allows you to quickly and easily sign each UID on a set of PGP keys. It is designed to take the pain out of the sign-all-the-keys part of PGP Keysigning Party while adding security to the process.

That can already be time consuming, but preferrably, you want to verify the identity in each UID, which means verifying the email addresses. There are a few ways to do this, but one of them is to sign each UID on the key individually (which requires import-sign-export-delete for each UID), encrypt-emailing that key to the email address in the UID. This can be incredibly time consuming.

That’s where pius comes in. Pius will do all the work for you – all you have to do is confirm the fingerprint for each key. It will then take care of signing each UID cleanly, minimizing the key, and using PGP/Mime email to send it, encrypted, to the email address in the UID.

The steps Jim defined for us to follow using Pius were as follows

  1. Collate a list of everyone’s key IDs. Our list looked like this (cut down to save space)
     # cat > keyids.txt <<EOF
     4096R/000BEEEE 2010-06-14 Jim Meyering
     4096R/E1B768A0 2011-10-11 Richard W.M. Jones
     4096R/15104FDF 2011-10-11 Daniel P. Berrange
  2. Download all the keys from a key server (it is assumed everyone has already uploaded their own key to a server)
     # id_list=$(perl -nle 'm!^\d{4}R/(\S{8}) ! and print $1' keyids.txt)
     # gpg --recv-keys  $(echo $id_list)
  3. Generate a list of fingerprints for all keys that are to be signed
     # gpg --fingerprint $(echo $id_list)
  4. Verify all the fingerprints and their owners’ identities.
    This is the security critical part. You generally want to meet the person face-to-face, verify their identity via some trusted means (passport, driving license, etc). They should read their key fingerprint out to you, and you should verify that it matches the fingerprint of that downloaded from the key server.
  5. Use Pius to sign all the keys whose fingerprints were verified.   (eg
    my_id=XXXXXXXXXXX  (Your GPG Key ID eg  15104FDF)
    # pius --mail-host=MAIL_HOST --no-pgp-mime --mail=$me --signer=$my_id $(echo $id_list)

What Pius does here is that for each key ID it is given, it will sign each individual identity (email address). The signature will be ascii-armoured and then sent to the email address associated with that identity. If a user has multiple email addresses on their key, they will receive one signature email per address. The email contains instructions for what the receipient should do. The email will look something like this

Subject: Your signed PGP key

[-- Attachment #1 --]
[-- Type: text/plain, Encoding: 7bit, Size: 0.7K --]


Attached is a copy of your PGP key (0x15104fdf) signed by my key

If your key has more than one UID, than this key only has the UID associated
with this email address ( signed and you will receive
additional emails containing signatures of the other UIDs at the respective
email addresses.

Please take the attached message and decrypt it and then import it.
Something like this should work:

   gpg -d  | gpg --import

Then, don't forget to send it to a keyserver:

   gpg --keyserver --send-key 15104fdf

If you have any questions, let me know.

Generated by PIUS (

[-- Attachment #2: 15104fdf__berrange_at_redhat.com_ENCRYPTED.asc --]
[-- Type: application/octet-stream, Encoding: 7bit, Size: 4.6K --]

The final thing, once everyone has dealt with the emails they received, is to refresh your local key database to pull down all the new signatures

# gpg --recv-keys  $(echo $id_list)

I should point out that Pius isn’t just for mass key signing parties. Even if you only have 1 single key you want to sign, it is still a very convenient tool to use. The simplified set of steps to go through would be

# gpg --recv-key XXXXXXXX
# gpg --fingerprint XXXXXXXX
# ...verify person's identity & fingerprint
# pius --mail-host=MAIL_HOST --no-pgp-mime --mail=$me --signer=$my_id XXXXXXX
# ....some time later...
# gpg --recv-key XXXXXXXX

Thanks again to Jim Meyering for pointing out Pius and doing the organization for our key signing party & defining the steps I describe above. BTW, Pius is available in Fedora from F16 onwards.

Libvirt sandbox at FOSDEM 2012

Posted: February 5th, 2012 | Filed under: Fedora, libvirt, Security, Virt Tools | Tags: | 7 Comments »

As mentioned previously, today I presented a talk at FOSDEM 2012, titled “Building application sandboxes on top of LXC and KVM with libvirt”.  As promised I have now uploaded the PDF slides for public access.  For further information about libvirt-sandbox, consult this previous blog post on the subject. Also keep an eye on this site for further blog posts in the future. Thanks to everyone who attended the talk. I look forward to returning again in a year’s time for another update.