Language Selection

English French German Italian Portuguese Spanish

Gentoo News

Syndicate content
News and information from Gentoo Linux
Updated: 18 hours 8 min ago

Nitrokey partners with Gentoo Foundation to equip developers with USB keys

Tuesday 16th of April 2019 12:00:00 AM

The Gentoo Foundation has partnered with Nitrokey to equip all Gentoo developers with free Nitrokey Pro 2 devices. Gentoo developers will use the Nitrokey devices to store cryptographic keys for signing of git commits and software packages, GnuPG keys, and SSH accounts.

Thanks to the Gentoo Foundation and Nitrokey’s discount, each Gentoo developer is eligible to receive one free Nitrokey Pro 2. To receive their Nitrokey, developers will need to register with their @gentoo.org email address at the dedicated order form.

A Nitrokey Pro 2 Guide is available on the Gentoo Wiki with FAQ & instructions for integrating Nitrokeys into developer workflow.

ABOUT NITROKEY PRO 2

Nitrokey Pro 2 has strong reliable hardware encryption, thanks to open source. It can help you to: sign Git commits; encrypt emails and files; secure server access; and protect accounts against identity theft via two-factor authentication (one-time passwords).

ABOUT GENTOO

Gentoo Linux is a free, source-based, rolling release meta distribution that features a high degree of flexibility and high performance. It empowers you to make your computer work for you, and offers a variety of choices at all levels of system configuration.

As a community, Gentoo consists of approximately two hundred developers and over fifty thousand users globally.

The Gentoo Foundation supports the development of Gentoo, protects Gentoo’s intellectual property, and oversees adherence to Gentoo’s Social Contract.

ABOUT NITROKEY

Nitrokey is a German IT security startup committed to open source hardware and software. Nitrokey develops and produces USB keys for data encryption, email encryption (PGP/GPG, S/MIME), and secure account logins (SSH, two-factor authentication via OTP and FIDO).

Nitrokey is proud to support the Gentoo Foundation in further securing the Gentoo infrastructure and contributing to a secure open source Linux ecosystem.

Gentoo GNOME 3.30 for all init systems

Wednesday 27th of March 2019 12:00:00 AM

GNOME 3.30 is now available in Gentoo Linux testing branch. Starting with this release, GNOME on Gentoo once again works with OpenRC, in addition to the usual systemd option. This is achieved through the elogind project, a standalone logind implementation based on systemd code, which is currently maintained by a fellow Gentoo user. Gentoo would like to thank Mart Raudsepp (leio), Gavin Ferris, and all others working on this for their contributions. More information can be found in Mart’s blog post.

FOSDEM 2019

Wednesday 9th of January 2019 12:00:00 AM

It’s FOSDEM time again! Join us at Université libre de Bruxelles, Campus du Solbosch, in Brussels, Belgium. This year’s FOSDEM 2019 will be held on February 2nd and 3rd.

Our developers will be happy to greet all open source enthusiasts at our Gentoo stand in building K. Visit this year’s wiki page to see who’s coming. So far eight developers have specified their attendance, with most likely many more on the way!

More in Tux Machines

Security: Curl, Two Factor Authentication (2FA) and Hacking With Kali Linux

  • Daniel Stenberg: curl + hackerone = TRUE
    There seems to be no end to updated posts about bug bounties in the curl project these days. Not long ago I mentioned the then new program that sadly enough was cancelled only a few months after its birth. Now we are back with a new and refreshed bug bounty program! The curl bug bounty program reborn.
  • Liz Fong-Jones on how to secure SSH with Two Factor Authentication (2FA)
    Liz mentions that by adding passphrase encryption, the private keys become resistant to theft when at rest. However, when they are in use, the usability challenges of re-entering the passphrase on every connection means that “engineers began caching keys unencrypted in memory of their workstations, and worse yet, forwarding the agent to allow remote hosts to use the cached keys without further confirmation”. The Matrix breach, which took place on April 11 showcases an example of what happens when authenticated sessions are allowed to propagate without a middle-man. The intruder in the Matrix breach had access to the production databases, potentially giving them access to unencrypted message data, password hashes, and access tokens.
  • Hacking With Kali Linux
    Before I talk about the series that I am going to start, let us briefly talk about who should follow this series. I know there are so many people out there who are very curious to learn hacking just to hack their partner's social media account. Well, if you are such a person, please listen to me. Hacking is not about getting into somebody's personal life and steal their information. It is illegal. Somebody well said - “We need to have a talk on the subject of what's yours and what's mine.” So you should not hack information that is not yours. ​But if you are a tech enthusiast who wants to make a career as a penetration tester or white hat hacker, this series can be really a good way to start. So for such enthusiasts, I am creating a page where you can follow the series. You can also follow our social media pages so you get a notification when a new informative article comes out.

Mozilla: VoxelJS, AiC and Mozilla B-Team

  • Mozilla VR Blog: VoxelJS: Chunking Magic
    A couple of weeks ago I relaunched VoxelJS with modern ThreeJS and modules support. Today I'm going to talk a little bit about how VoxelJS works internally, specifically how voxels are represented and drawn. This is the key magic part of a voxel engine and I owe a tremendous debt to Max Ogden, James Halliday and Mikola Lysenko Voxels are represented by numbers in a large three dimensional array. Each number says what type of block goes in that block slot, with 0 representing empty. The challenge is how to represent a potentially infinite set of voxels without slowing the computer to a crawl. The only way to do this is to load just a portion of the world at a time.
  • AiC: Collaborative summary documents
    One of my goals was that we could, at least for a moment, disconnect people from their particular position and turn their attention towards the goal of achieving a shared and complete summary. I didn’t feel that we were very succesful in this goal. For one thing, most participants simply left comments on parts they disagreed with; they didn’t themselves suggest alternate wording. That meant that I personally had to take their complaint and try to find some “middle ground” that accommodated the concern but preserved the original point. This was stressful for me and a lot of work. More importantly, it meant that most people continued to interact with the document as advocates for their point-of-view, rather than trying to step back and advocate for the completeness of the summary. In other words: when you see a sentence you disagree with, it is easy to say that you disagree with it. It is much harder to rephrase it in a way that you do agree with – but which still preserves (what you believe to be) the original intent. Doing so requires you to think about what the other person likely meant, and how you can preserve that. However, one possible reason that people may have been reluctant to offer suggestions is that, often, it was hard to make “small edits” that addressed people’s concerns. Especially early on, I found that, in order to address some comment, I would have to make larger restructurings. For example, taking a small sentence and expanding it to a bullet point of its own. Finally, some people who were active on the thread didn’t participate in the doc. Or, if they did, they did so by leaving comments on the original GitHub thread. This is not surprising: I was asking people to do something new and unfamiliar. Also, this whole process played out relatively quickly, and I suspect some people just didn’t even see the document before it was done. If I were to do this again, I would want to start it earlier in the process. I would also want to consider synchronous meetings, where we could go try to process edits as a group (but I think it would take some thought to figure out how to run such a meeting). In terms of functioning asynchronously, I would probably change to use a Google Doc instead of a Dropbox Paper. Google Docs have a better workflow for suggesting edits, I believe, as well, as a richer permissions model. Finally, I would try to draw a harder line in trying to get people to “own” the document and suggest edits of their own. I think the challenge of trying to neutrally represent someone else’s point of view is pretty powerful.
  • Mozilla B-Team: happy bmo push day!
    Bugfixes + enabling the new security feature for API keys.

Programming Leftovers

Devices: Radiant Software, ASRock and Microsoft

  • Radiant 1.1 Lattice FPGA Design Tools Release Accelerates Design Reuse
    In addition to supporting Windows, Radiant Software 1.1 adds support for the popular Ubuntu LTS 16.4 distribution of Linux. Radiant Software 1.1 is now available for download from Lattices website and currently can be used with a free license.
  • ASRock spins Whiskey Lake-U in thin Mini-ITX, 3.5-inch, and NUC formats
    ASRock announced four products based on Intel’s 8th Gen Whiskey Lake-U: a thin Mini-ITX “IMB-1216” board, a 3.5-inch “SBC-350,” and a NUC 4×4 form-factor “iBox-8365U” mini-PC and NUC-8365U mainboard. ASRock Industrial has been busy lately tapping the latest embedded-oriented x86 chips in products such as the Intel 8th Gen Whiskey Lake-U based iBox-8265U mini-PC, as well as the iBox-R1000 industrial PC and NUC-R1000 mainboard built around the AMD Ryzen Embedded R1000. Now it has announced four more Whiskey Lake-U products aimed at the embedded market.
  • Making Sense of Microsoft’s Acquisition of Express Logic [Ed: Windows is worthless, so Microsoft is buying the competition. Microsoft also bought Danger, Sidekick etc. and it never ended well. Anything Microsoft touches turns to dust. When it bought Skype it was (back then) near-monopoly, but not anymore. Microsoft sometimes announces financial losses.]
    Even the Linux Foundation, home of the Linux kernel, hosts a project called Zephyr, which is an RTOS designed for use-cases, beyond the reach of Linux.