New project idea: signing #openbsd packages using a Yubikey, rather than with a key file. Apparently the newest firmware supports ED25519 keys, so in theory I can put something together that does it the same way as the signify tool...
yksignify dev log 1

Tinder profile: I like going for walks and deep diving hardware specifications

kat5.dev

So far we're cruising, but I know the next part is going to be hard because we actually have to perform a signing operation.

https://kat5.dev/blog/2026/yksignify-2

#openbsd #rustlang

yksignify dev log 2

that was simultaneously harder and easier than I expected.

kat5.dev

In which some esoteric crypto code appears, and we make some more progress:

https://kat5.dev/blog/2026/yksignify-3

Spoiler, I lied, we don't really need to sign anything until next time (which will be the actual YubiKey part).

yksignify dev log 3

I swear I knew C at one point, honest.

kat5.dev

I didn't think I would get this far, but I can actually sign stuff with my YubiKey now:

https://kat5.dev/blog/2026/yk-pkg-sign-4

#cryptography #security #rustlang

yk-pkg-sign dev log 4

yubikeys and PKCS and Rust and clap!

kat5.dev

Also talked to @nickv (who made Flora, the SSG that powers my blog) over coffee about how to do syntax highlighting, so hopefully my posts about Rust will be prettier soon.

Obligatory plug for Flora: https://code.kat5.dev/nick/flora

#indieweb

flora

A static site generator.

Forgejo

I used SoftHSM to test Ed25519 keys with my tool, and learned a little about elliptic curve #cryptography in the process:

https://kat5.dev/blog/2026/yk-pkg-sign-5

#security #rustlang

yk-pkg-sign dev log 5

mmm... yes... elliptic curves... I understand completely...

kat5.dev