Re: Proof of email ownership

2005-08-07 Thread Werner Koch
Hi!

Let me note that I am currently working on a simplified key validation
scheme.  The basic idea is to connect a signature to an DNS entry.

Our assumption is that DNS is secure and unforgeable - as of now it is
not but eventually DNSSEC will get deployed to solve this and many other
problems.

Here is how it works:

To create a signature on an email (or any other data) you would use:

  gpg -s [EMAIL PROTECTED]@example.org foo

(add other options as you see fit). Now when someone wants to verify
the signature he does it using the usual

  gpg --verify foo.gpg

gpg detects that foo.gpg has the notation key [EMAIL PROTECTED]
and takes its value ([EMAIL PROTECTED]) to run a DNS query like:

  $ host -t txt werner._pka.example.org
  werner._pka.example.org text "v=pka1\;fpr=A4D94E92B0986AB5EE9DC\
  D755DE249965B0358A2\;uri=finger:[EMAIL PROTECTED]"
 
Now it compares the fingerprint given in that Text record against the
one of the public key used to verify the signature.  If they match, it
has been proved that the mail address [EMAIL PROTECTED] is a
legitimate address in the domain example.org.  If not, someone tried
to use a faked key. As of now we use the outcome of this test to
change the validity status of the key either to FULL or to NEVER (if
they don't match).

A MUA - or an MTA - may now display the verified address
[EMAIL PROTECTED] to the user and compare it to the From address.
Will will likely add ptions to gpg to make this easier.

As a bonus we also put the URI part into the TXT record to allow the
specification of a keyserver or whatever to retrieve the public key.
gpg uses this during signature verification as well when collecting
the recipients of a message; i.e. if you use "-r [EMAIL PROTECTED]" it
would try to locate a PKA record for joe (joe._pka.example.org) and
use this for key validation as well as to retrieve the key for joe.

If you want to play with this feature, you need to build the latest
Subversion of gpg and put

  keyserver-options auto-pka-retrieve

into your gpg.conf.  For real PKA records, replace example.org by
fsfe.org.  If this all works out well, we might want to apply for a
dedicated DNS record type instead of using TXT. The scheme may also be
used for S/MIME.


Shalom-Salam,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Save signature in mail headers

2005-08-07 Thread Werner Koch
On Fri, 05 Aug 2005 23:43:00 +0200, David Srbecky said:

> I would like to sign all my mail, but I do not want to annoy people that
> have incompatible e-mail clients with extra attachment file or signature
> in the text of the message.

There are at least three reasons against this:

1. It is hard to get these header signatures right.  That newly
   prposed DKIM has almost immediatly been broken due to design
   problems in white space processing.

2. You can't stream the data.  The header of a mail is comes before
   the signature has been calculated.  One of the things OpenPGP fixed
   (compared to PGP 2) is that it allows to stream data of arbitary
   length.  No need for temporary files.

3. It is not needed MIME (S/MIME or PGP/MIME) are established and well
   matured protocols.  IF you want to sign the actual headers of a
   message, simply encapsulate the entire message into an rfc822
   container and you are done.


Salam-Shalom,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Proof of email ownership

2005-08-07 Thread S K
How would this work out for people who do not have
control over the DNS record of domains? Best examples
are free email services like hotmail and gmail?

-SK 

--- Werner Koch <[EMAIL PROTECTED]> wrote:

> Hi!
> 
> Let me note that I am currently working on a
> simplified key validation
> scheme.  The basic idea is to connect a signature to
> an DNS entry.
> 
> Our assumption is that DNS is secure and unforgeable
> - as of now it is
> not but eventually DNSSEC will get deployed to solve
> this and many other
> problems.
> 
> Here is how it works:
> 
> To create a signature on an email (or any other
> data) you would use:
> 
>   gpg -s [EMAIL PROTECTED]@example.org
> foo
> 
> (add other options as you see fit). Now when someone
> wants to verify
> the signature he does it using the usual
> 
>   gpg --verify foo.gpg
> 
> gpg detects that foo.gpg has the notation key
> [EMAIL PROTECTED]
> and takes its value ([EMAIL PROTECTED]) to run a
> DNS query like:
> 
>   $ host -t txt werner._pka.example.org
>   werner._pka.example.org text
> "v=pka1\;fpr=A4D94E92B0986AB5EE9DC\
>   D755DE249965B0358A2\;uri=finger:[EMAIL PROTECTED]"
>  
> Now it compares the fingerprint given in that Text
> record against the
> one of the public key used to verify the signature. 
> If they match, it
> has been proved that the mail address
> [EMAIL PROTECTED] is a
> legitimate address in the domain example.org.  If
> not, someone tried
> to use a faked key. As of now we use the outcome of
> this test to
> change the validity status of the key either to FULL
> or to NEVER (if
> they don't match).
> 
> A MUA - or an MTA - may now display the verified
> address
> [EMAIL PROTECTED] to the user and compare it to the
> From address.
> Will will likely add ptions to gpg to make this
> easier.
> 
> As a bonus we also put the URI part into the TXT
> record to allow the
> specification of a keyserver or whatever to retrieve
> the public key.
> gpg uses this during signature verification as well
> when collecting
> the recipients of a message; i.e. if you use "-r
> [EMAIL PROTECTED]" it
> would try to locate a PKA record for joe
> (joe._pka.example.org) and
> use this for key validation as well as to retrieve
> the key for joe.
> 
> If you want to play with this feature, you need to
> build the latest
> Subversion of gpg and put
> 
>   keyserver-options auto-pka-retrieve
> 
> into your gpg.conf.  For real PKA records, replace
> example.org by
> fsfe.org.  If this all works out well, we might want
> to apply for a
> dedicated DNS record type instead of using TXT. The
> scheme may also be
> used for S/MIME.
> 
> 
> Shalom-Salam,
> 
>Werner
> 
> 
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Proof of email ownership

2005-08-07 Thread Alphax
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Werner Koch wrote:
> Hi!
> 
> Let me note that I am currently working on a simplified key validation
> scheme.  The basic idea is to connect a signature to an DNS entry.
> 
> Our assumption is that DNS is secure and unforgeable - as of now it is
> not but eventually DNSSEC will get deployed to solve this and many other
> problems.
> 


Your other assumption is that everyone has continuous and unrestricted
(no proxies, firewalls) internet access. I can't even get GPG to work
with an authenticating proxy. Will GPG work with a localhost-based proxy
even?

- --
Alphax  |   /"\
Encrypted Email Preferred   |   \ / ASCII Ribbon Campaign
OpenPGP key ID: 0xF874C613  |X   Against HTML email & vCards
http://tinyurl.com/cc9up|   / \
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFC9h2W/RxM5Ph0xhMRA54oAJsH9RZ5GQ+U6M9I5rP5fryco3UojACdG07g
ASZ2F7v3cCJ9A3V7n0MVmhA=
=aBnl
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Feature request: Detect whether recipient has a public key

2005-08-07 Thread David Srbecky

Related to: Save signature in mail headers

Is it possible to send the signature in mail headers?



Ok, I got other solution:
I think it is safe to assume that if user has public key than he has
compatible MUA or at least he will not mind being send signatures.

What I want is option to try import recipients public key and sign the
message only if one is found.

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Feature request: Show Photo ID

2005-08-07 Thread David Srbecky

Hello,

How difficult is it to show Photo ID if available?

See http://tecwizards.de/mozilla/messagefaces/header-example.png

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Feature request: Automatically import public keys

2005-08-07 Thread David Srbecky

Hello,

Enigmail is great, but I find that public key import is very repetitive
and unnecessary action. Could Enigmail just try to import public keys
automatically for incoming mail?

David



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Feature request: Import public keys for all contacts in the address book

2005-08-07 Thread David Srbecky

This could be especially useful for new users. (Like me :-) )

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Feature request: Show whether e-mail of user is verified

2005-08-07 Thread David Srbecky

Related to: Proof of email ownership

There are a few robots that verify that user owns the e-mail.
There are a many more UNTRUSTED IDs than TRUSTED in my list. If enigmail
could specify whether the ID has been signed by robot, it would provide
significantly more information.

PS: A configurable list of trusted robots in the options panel may be
needed.

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Feature requests: SORRY!!! - WRONG maillist

2005-08-07 Thread David Srbecky

I very sorry!!

I had a very creative moment, but I did not realize that I am sending 
mails to the wrong maillist - I should stop using "Edit As New..." :-(


Sorry!!!

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


more than one message digest per signed message?

2005-08-07 Thread Thomas Kuehne
Is it possible to use more than one message digest when signing a
message with GnuPG?

gpg --digest MD5 --digest SHA512 --clearsign test.txt
-> used digest SHA512

gpg --digest MD5,SHA512 --clearsign test.txt
-> gpg: selected digest algorithm is invalid

gpg --digest "MD5 SHA512" --clearsign test.txt
-> gpg: selected digest algorithm is invalid

Thomas


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Proof of email ownership

2005-08-07 Thread Jeroen Massar
Werner Koch wrote:

>   gpg -s [EMAIL PROTECTED]@example.org foo

This parts looks good...

> gpg detects that foo.gpg has the notation key pka-address at gnupg.org
> and takes its value (werner at example.org) to run a DNS query like:
> 
>   $ host -t txt werner._pka.example.org
>   werner._pka.example.org text "v=pka1\;fpr=A4D94E92B0986AB5EE9DC\
>   D755DE249965B0358A2\;uri=finger:[EMAIL PROTECTED]"

This will never be accepted by the IETF because:
 - DNS is not a directory for random information
 - Don't overload TXT records (though you can go the SPF
   way and just make a record called SPF which is a TXT)

I've been thinking about the above quite a bit and I would actually want
to solve it somewhat similar but a bit different.

What about a DNS RR that looks like;

example.org
PGPSRV https keyserver.example.net /pks/
PGPSRV hkp keyserver.example.net

These two records basically are the same as specifying:
keyserver https://keyserver.example.net/pks/
keyserver hkp://keyserver.example.net
in the gpg.conf

This thus allows one to specify the keyserver location for that domain,
which one could point to pgp.mit.edu too if wanted.

Another approach would be DNS-SD, but they don't allow multiple
protocols at the moment. Which is why I brought up:
http://www.ietf.org/internet-drafts/draft-massar-dnsop-service-00.txt
but the folks tripped heavily over the word anycast there, I should have
avoided that part. A simple:
_pka.example.org TXT "https://keyserver.example.net/pks/";
also does the trick, but we need a standard for this.

Btw I specified https above, which is something I would really like to
see implemented and usable in gpg. This allows everybody, who has access
to their DNS that is, to specify a keyserver of their choice for that
domain. The HTTPS, which implies SSL, makes it able for gnupg to have a
secure transfer of this data and verification of the SSL certificate to
know that you are really talking to the correct host in the first place.
(DNSSEC might then also be nice to have, but we'll have to wait a bit
for that to be deployed everywhere...)

$ dig _pgpkey._service.unfix.org any
_pgpkey._service.unfix.org. 3600 IN PTR _pgpkey-http._tcp.unfix.org.
_pgpkey._service.unfix.org. 3600 IN PTR
_pgpkey-https._tcp.unfix.org.

$ dig _pgpkey-https._tcp.unfix.org. any
_pgpkey-https._tcp.unfix.org. 3600 IN   TXT "path=/pks/"
_pgpkey-https._tcp.unfix.org. 3600 IN   SRV 13 100 443
purgatory.unfix.org.

As to a note from somebody else "what about domains that people don't
have access to and thus can't configure the above". One might make an
extra uid, to a domain that does support the above trick, the key can
then also be automatically fetched. eg:

gpg -s [EMAIL PROTECTED]@example.org foo

while you send the mail from [EMAIL PROTECTED] example.com doesn't
have a keyserver, example.org has. [EMAIL PROTECTED] is a (sub)key, but
both keys are in the same set.

Another note is that this all indeed still does not imply any trust,
that needs to come from a lot of users signing your key, one way to
solve it would be to have the domain admin have a trusted key, thus
someone who has been verified, and have this key sign the keys in that
domain, could even been done semi-automatically, this way the user key
becomes quite trusted too. This might be good for larger installation.

Greets,
 Jeroen



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


new (2005-08-07) keyanalyze results (+sigcheck)

2005-08-07 Thread Jason Harris

New keyanalyze results are available at:

  http://keyserver.kjsl.com/~jharris/ka/2005-08-07/

Signatures are now being checked using keyanalyze+sigcheck:

  http://dtype.org/~aaronl/

Earlier reports are also available, for comparison:

  http://keyserver.kjsl.com/~jharris/ka/

Even earlier monthly reports are at:

  http://dtype.org/keyanalyze/

SHA-1 hashes and sizes for all the "permanent" files:

c9db9fb5ae2a12b51117f88f336e84328d416ec712780540preprocess.keys
a814d9123939d8ce0af57042f2eb1cdfb2c0d3787853497 othersets.txt
458bf5044e7fbb9c04d77438f2cf7be547d114cf3166352 msd-sorted.txt

a751f9d5477744a4f5e5ce6ebad6a60908e317ee1372index.html
e20d68915125e87089e903e63b721b0ef489c5cf2291keyring_stats
bb00cce3adb3f8095ae520594e025610f215a4d91244821 msd-sorted.txt.bz2
d976cf98445763f7005cc5f2b325bf0be076b2a926  other.txt
90b51068bd02c52e4d838c6c3848674663800a161691008 othersets.txt.bz2
0d1785606c37bba7fdc9e936b277bd0b11cbccda5170981 preprocess.keys.bz2
2c52fded2c8f638632de37b8b496e4f1c38594f912880   status.txt
4c91c78209189374e972be114cff9e20f78cf978210266  top1000table.html
8d4bffb3742a167614fb6086a36c366e73ec5fdd30261   top1000table.html.gz
56eef4a6a68dcd62cb6735d11f186d60f509b42a10846   top50table.html
b352fe275772434c4750d54719d29ff8e3535f7c2534D3/D39DA0E3

-- 
Jason Harris   |  NIC:  JH329, PGP:  This _is_ PGP-signed, isn't it?
[EMAIL PROTECTED] _|_ web:  http://keyserver.kjsl.com/~jharris/
  Got photons?   (TM), (C) 2004


pgp5JLsurTL74.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users