Re: Delete key from keyserver

2005-10-23 Thread zvrba
On Sat, Oct 22, 2005 at 10:14:58PM +0100, Neil Williams wrote:
> 
> ? That key has NO signatures other than yourself! There's no way anyone can 
> trust it. There are NO paths.
> 
It does, look at:
http://pks.aaiedu.hr:11371/pks/lookup?op=vindex&search=0x16DA1F1690887E13
http://pks.aaiedu.hr:11371/pks/lookup?op=vindex&search=0x5081D08A1DC7E994

Both are signed by my master key which in turn is signed by a friend. My
scheme is having one "master key" and then I get people to sign that
master key, which I in turn use to sign my other ad-hoc keys.

To avoid further confusion, the key is signed by zeljko.vrba at gmail.com

> 
> Sorry to hear that but how hard have you tried? Have you travelled to 
>
Now I'm going to hide.. in fact, not. I tried finding someone while
writing the previous mail and.. well, I've succeeded.

> 
> Keysigning is testifying to the world that you have verified the person, the 
> fingerprint and the email.
> 
I'm aware of that.

> 
> If you want a formalised external method of identity verification, consider 
> using x.509 and people like Thawte will provide an alternative to GnuPG's 
> personal (face-to-face) methods.
> 
Actually, at one point in time I did think about getting myself a "real"
X.509 certificate and use it as "my own CA" certificate by which I sign
my other ad-hoce keys as I see fit. The thing I don't like about commercial
X.509 certificates is their short lifetime. It's a pure ripoff and no-work
money generator for the CA, after you get your 1st certificate.

I have yet to play a bit with gpgsm and see how well can you mix PGP and
X.509 keys. I.e. can I use my X.509 cert to sign other people OpenPGP keys?
Can I at least re-use the X.509 private key for my own OpenPGP key?


pgpi0KhNJeJV0.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread zvrba
On Sat, Oct 22, 2005 at 11:12:01PM +0200, markus reichelt wrote:
> 
> http://bitfalle.org/keys/gpg-key-signing-policy.php
> 
I don't feel like reading the GNU documentation license, so a short
question: may I reuse and adapt this text to my own needs? [I'll give
you a proper credit]

> 
> imagine you would find two telephone numbers listed in a directory
> under the very same name. how are you to decide which one of these
> numbers is the correct one? the number of ppl also listing one number
> in a commercial directory, e.g. "having conducted successfull
> business with" is equal. again, what would you do?
> 
heh, nice analogy.



pgpSxG1hHe4eV.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GFDL (was: delete key from server)

2005-10-23 Thread Alphax
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

[EMAIL PROTECTED] wrote:
> On Sat, Oct 22, 2005 at 11:12:01PM +0200, markus reichelt wrote:
> 
>>http://bitfalle.org/keys/gpg-key-signing-policy.php
>>
> 
> I don't feel like reading the GNU documentation license, so a short
> question: may I reuse and adapt this text to my own needs? [I'll give
> you a proper credit]
> 
> 

The GFDL says you can modify it so long as the work you produce is also
under the GFDL, and gives attribution to the original authors. In
practical terms online, it's best to link back to the original source
when doing so.

Basically you just need to say "this keysigning policy is derived from
the keysigning policy of markus reichelt (link), and is licensed under
the GNU Free Documentation License (link)". It might also be good to
state (and link) the sources that his policy was derived from.

Oh, one other thing: You need to make the source of the document (a
"transparent copy" in legalese) available. Plain HTML is pretty OK for that.

HTH,
- --
Alphax  |   /"\
Encrypted Email Preferred   |   \ / ASCII Ribbon Campaign
OpenPGP key ID: 0xF874C613  |X   Against HTML email & vCards
http://tinyurl.com/cc9up|   / \
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iQEVAwUBQ1tRWLMAAH8MeUlWAQhQjAf9GSvlGM5fgzrpHbfuKQNt2vGUcZPcC9Zi
PCzRMM7EzT7qs+kOQMizftq2eNgHkH6Uwp8eNhl5Y77PWoW0abvNncaS1jeCDD1n
h7qqsbWK+brgg+IVv/sOP8Emn38IbTY5bG9pvcMZumlR0UWWULTwkUcF/sCx3E+g
zrgKAQYCQ0xDimHhiVVi4RQa1vlefmGBvRYHyD2cZrFxOw0OBpwcNKrXrgoB8i9G
cmK0fqI2GdaBz0dFpOVr4z6wHQy5wITKpns9Bs/5QjCx3AfTVIheEn/R0qwXxAJ3
nWpm7y3Ka0axxgunZUxfjC4U9RDV0jCBy8usH1K/pmUqSe2xNyJTPA==
=CZEf
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread Bob Henson

[EMAIL PROTECTED] wrote:

>> If you want a formalised external method of identity verification, consider 
>> using x.509 and people like Thawte will provide an alternative to GnuPG's 
>> personal (face-to-face) methods.
>> 
> Actually, at one point in time I did think about getting myself a "real"
> X.509 certificate and use it as "my own CA" certificate by which I sign
> my other ad-hoce keys as I see fit. The thing I don't like about commercial
> X.509 certificates is their short lifetime. It's a pure ripoff and no-work
> money generator for the CA, after you get your 1st certificate.


You don't have to pay for X.509 certificates, not for personal use any way.
Thawtes issue free personal certificates, and so do CAcert.

http://www.cacert.org/

The latter publish their Root Authority PGP key on their website, which you
can import to your keyring and use as a partial "bridge" across the two
types of verification. For example, with their PGP key on my keyring, if I
sign (locally, I cannot credit it with sufficient trust to sign with an
exportable signature, since I cannot meet with them and fully verify it)
their key it assigns a degree of trust to John W Moore III's key, since his
key has been signed by their key already. One of my keys has been signed by
Thawtes (they don't do this any more - I guess for commercial reasons) so
there is a partial bridge there to another system. However, the only key on
my keyring which is fully trusted is Neil's, since we have met up and
correctly verified our keys.


> I have yet to play a bit with gpgsm and see how well can you mix PGP and
> X.509 keys. I.e. can I use my X.509 cert to sign other people OpenPGP keys?
> Can I at least re-use the X.509 private key for my own OpenPGP key?


I haven't used gpgsm, but I have fully functional X.509 key pairs on my key
ring and can sign OpenPGP keys with them. If you have a running copy of PGP
on your system you can import X.509 certificates to PGP and then export them
as armoured ASCII  files, which you can then import straight into OpenPGP.

BTW, do you live anywhere near Pula? If so, and you can wait for another
year till I make my annual visit to my friends there, we might be able to
solve part of your problem with not being able to meet people to countersign
any keys. The downside is, I haven't got many signatures on mine either, so
it's no big deal :-(


Regards,


Bob


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread Neil Williams
On Sunday 23 October 2005 8:15 am, [EMAIL PROTECTED] wrote:
> On Sat, Oct 22, 2005 at 10:14:58PM +0100, Neil Williams wrote:
> > ? That key has NO signatures other than yourself! There's no way anyone
> > can trust it. There are NO paths.
>
> It does, look at:
> http://pks.aaiedu.hr:11371/pks/lookup?op=vindex&search=0x16DA1F1690887E13
> http://pks.aaiedu.hr:11371/pks/lookup?op=vindex&search=0x5081D08A1DC7E994

That path is circular - it leads to your "master" key, to one signature and 
then back to you. It doesn't lead to any keys in the strong set.

> Both are signed by my master key which in turn is signed by a friend. My
> scheme is having one "master key" and then I get people to sign that
> master key, which I in turn use to sign my other ad-hoc keys.

There is still no way the web of trust can help your key become trusted 
without a signature that links you into the main key sets - preferably the 
strong set.

Compare with some of the paths from my key (including the path (v.short path) 
from me to Bob Henson who also replied to your query). (Hi Bob!).
:-)

Bob wrote:
> The downside is, I haven't got many signatures on mine either, so
> it's no big deal :-(

You have enough for your key to be in the strong set:
http://www.cs.uu.nl/people/henkp/henkp/pgp/pathfinder/stats/31C737BD.html

The most useful thing to do for anyone seeking signatures is to join 
biglumber.com - it's linked into the keyserver at kjsl.com 
(http://keyserver.kjsl.com:11371/) which makes it very useful for following 
paths and working out who could be available for keysigning if you are 
travelling.

With a biglumber listing, Bob wouldn't have had to ask on the list, he could 
have simply looked up the details from the keyserver output.

-- 

Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/



pgpuzpZNvlqJH.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread cdr

Albert Reiner wrote:


P.S.:  A slightly less inflammatory tone would not have harmed either.


The tone of "How come King's bum is bare!?" was, no doubt,
considered inflammatory by the Court.

cdr

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread David Shaw
On Sat, Oct 22, 2005 at 06:26:51PM +0200, B. Kuestner wrote:

> all: Joe Smith has no way of fixing the situation, even if he is  
> legitimate owner of the [EMAIL PROTECTED] e-mail address.
> 
> It strikes me, that GNU-supporters would bash MS (or for that reason  
> any vendor of proprietary software) for dishing out once more a  
> thoughtless, immature and insecure software design.
> 
> I understand it must not be simple to revoke or disable keys. But it  
> shouldn't be impossible either, especially in the light of anybody's  
> capability to put public keys under my name on the server.
> 
> Am I missing something?
> 
> >It's an inherent scaling problem of the keyserver net.  I've
> >seen estimates that the majority of the keys on the keyserver net are
> >not used for one reason or another, but can't be deleted.  Even with
> >the garbage keys, the keyserver database isn't too large to be served
> >though.
> 
> Well, my issue is not so much with the keyservers. I guess with  
> faster and more hardware this scheme could be maintained for decades.
> 
> But if the keyservers are not directories to look up public keys,  
> then what are they? And if they are meant as directories, how good  
> are they if they are flooded with garbage keys.
> 
> >The PGP company is running a different sort of keyserver at
> >http://keyserver.pgp.com.  This type of keyserver allows you to remove
> >keys if you can prove (by answering an email challenge) that you have
> >access to the email address on the key.  This keyserver obviously does
> >not synchronize with the others, however.
> 
> Can gpg use this keyserver? It is listed in the settings of my MacPG.  

GPG can use this keyserver.  Just set:

  keyserver ldap://keyserver.pgp.com

in your gpg.conf file (or whatever GUI you happen to be using).

> Is using this server recommendable for everybody?

This is a harder question.  I would unhesitatingly recommend it for
beginning users.  It's also useful for any level user who wants to
simplify the whole key selection process - it guarantees there is only
one key per email address.  If you want to mail to a particular
address, there is no question which is the "right" key, as there is
only the one key there.

I believe it is also the default keyserver for PGP users.

Some people do not like this server as it does email address
verification (via sending a mail to the email address on the key, if
any), and then signs the key.  These signatures are reissued every 2
weeks or so if people keep requesting the key.  The list of signatures
can get long.  Both PGP and GPG have features to delete the expired
ones.

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread Neil Williams
On Sunday 23 October 2005 5:49 am, Alphax wrote:
> Neil Williams wrote:
> > The only solution to that is to get more 
> > keysigning done.
>
> And to get more people using OpenPGP. Does anyone have a document called
> (eg.) "Why you should use OpenPGP" or similar? I've read the GNU Privacy
> Handbook and it's more of a HOWTO than a WHYTO.

I've got a v.v.brief one:
http://gnupg.neil.williamsleesmill.me.uk/#attachments

It's just why I use gnupg rather than a treatise on why someone else should 
use it. It is GFDL.

There's also general stuff here:
http://www.dclug.org.uk/linux_adm/gnupg.html

Elements of each could be combined - the FAQ isn't expressly GFDL but if it's 
used for GFDL material I would have no objection.

If that work is sent back to me, I would also be v.happy to publish it as part 
of the first site, under the GFDL.
:-)

Don't worry about the HTML, a plain text version crafted from these and other 
sources would be fine - as long as it can go under the GFDL.

> Do you have to be a Linux user to join a LUG?

No, you just have to be interested in GNU type stuff - and in most LUG's GnuPG 
qualifies as relevant.

> Several people who I've tried to get using OpenPGP just "don't get it"
> because it's "too hard to integrate with (email client, usually
> Mail.app)" and have gone for Thawte X.509 certificates instead. And then
> they never use them.

Bad choice of email client!

:-)

There are plenty of email clients that integrate gpg/pgp very easily. The 
resistance is not against gnupg itself but against the change of email 
client / problems with the existing client.

-- 

Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/



pgpNTriNRAhk8.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread Bob Henson


David Shaw wrote:
> On Sat, Oct 22, 2005 at 06:26:51PM +0200, B. Kuestner wrote:
> 
>> all: Joe Smith has no way of fixing the situation, even if he is  
>> legitimate owner of the [EMAIL PROTECTED] e-mail address.
>> 
>> It strikes me, that GNU-supporters would bash MS (or for that reason  
>> any vendor of proprietary software) for dishing out once more a  
>> thoughtless, immature and insecure software design.
>> 
>> I understand it must not be simple to revoke or disable keys. But it  
>> shouldn't be impossible either, especially in the light of anybody's  
>> capability to put public keys under my name on the server.
>> 
>> Am I missing something?
>> 
>> >It's an inherent scaling problem of the keyserver net.  I've
>> >seen estimates that the majority of the keys on the keyserver net are
>> >not used for one reason or another, but can't be deleted.  Even with
>> >the garbage keys, the keyserver database isn't too large to be served
>> >though.
>> 
>> Well, my issue is not so much with the keyservers. I guess with  
>> faster and more hardware this scheme could be maintained for decades.
>> 
>> But if the keyservers are not directories to look up public keys,  
>> then what are they? And if they are meant as directories, how good  
>> are they if they are flooded with garbage keys.
>> 
>> >The PGP company is running a different sort of keyserver at
>> >http://keyserver.pgp.com.  This type of keyserver allows you to remove
>> >keys if you can prove (by answering an email challenge) that you have
>> >access to the email address on the key.  This keyserver obviously does
>> >not synchronize with the others, however.
>> 
>> Can gpg use this keyserver? It is listed in the settings of my MacPG.  
> 
> GPG can use this keyserver.  Just set:
> 
>   keyserver ldap://keyserver.pgp.com
> 
> in your gpg.conf file (or whatever GUI you happen to be using).
> 
>> Is using this server recommendable for everybody?
> 
> This is a harder question.  I would unhesitatingly recommend it for
> beginning users.  It's also useful for any level user who wants to
> simplify the whole key selection process - it guarantees there is only
> one key per email address.  If you want to mail to a particular
> address, there is no question which is the "right" key, as there is
> only the one key there.
> 
> I believe it is also the default keyserver for PGP users.
> 
> Some people do not like this server as it does email address
> verification (via sending a mail to the email address on the key, if
> any), and then signs the key.  These signatures are reissued every 2
> weeks or so if people keep requesting the key.  The list of signatures
> can get long.  Both PGP and GPG have features to delete the expired
> ones.
> 
> David

That's not the only reason though. The PGP Global Keyserver is dangerous, as
well as a nuisance, for a number of reasons. As it only shows one key on a
search for a users name, it might cause people to miss a revoked key and
continue using it. Similarly, because it doesn't synchronise with other
servers, such a key could be missed. My key was on there because I tried PGP
9.x and it puts it there without asking - most undesirable in itself - but
at least by ignoring the requests to repeat the e-mail verification it
should have been removed by now. The "verification" is dangerous in itself,
since people may rely on the server signature for trust - which is not a
good idea for obvious reasons - anyone could upload a key from a particular
address, and e-mail verification *alone* is of little value. If anyone
*does* use it, whatever you do *don't* sign the PGP verification key, as it
will impart an unwarranted trust to other keys signed with the same key. My
advice (shared by many more knowledgeable than I) would be to steer clear of
it at all costs.


Regards,

Bob



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


The never-ending GD discussion, part 74 (was Re: Delete key from keyserver)

2005-10-23 Thread David Shaw
On Sun, Oct 23, 2005 at 05:16:43PM +0100, Bob Henson wrote:

> > Some people do not like this server as it does email address
> > verification (via sending a mail to the email address on the key, if
> > any), and then signs the key.  These signatures are reissued every 2
> > weeks or so if people keep requesting the key.  The list of signatures
> > can get long.  Both PGP and GPG have features to delete the expired
> > ones.

> That's not the only reason though. The PGP Global Keyserver is dangerous, as
> well as a nuisance, for a number of reasons. As it only shows one key on a
> search for a users name, it might cause people to miss a revoked key and
> continue using it.

This is a misunderstanding about the Global Directory.  It does not,
is not designed to, and should not give more than one key for a given
email address.  The GD says "This is the key.  Period.  There is no
other key.  Take this key and use it.  Have A Nice Day.".  The goal of
the GD is specifically NOT to say, "This is the key.  Here are a few
more keys.  Well, here's another one that the person may or may not
have lost the passphrase for.  Oops, found another one.  And this one
too.  Now figure out which one, if any, you should use!"

It always amuses me that people complain bitterly about the GD storing
one key per email address, but don't complain, for example, about
people putting their key up on a web page.  After all, they may
contain only one key, and might cause people to miss a revoked key. ;)

> The "verification" is dangerous in itself, since people may rely on
> the server signature for trust - which is not a good idea for
> obvious reasons - anyone could upload a key from a particular
> address, and e-mail verification *alone* is of little value.

Completely untrue.  For the huge majority of users, email verification
is sufficient.  The GD is one-stop shopping for them: they get a
single key that points to an email address that has been checked.
Sure beats 3-4 keys on the keyserver and having to parse out the web
of trust to see which one to use... only to find that more than one
was in the web of trust, pick one anyway, and then hope the key owner
didn't lose the passphrase or just stopped using encryption.

Remember that the people who subscribe to this mailing list and have
any knowledge of the web of trust are not in any way the huge majority
of users.  We're a miniscule blip on top of a near nothingness.

You assert that e-mail verification alone is of little value.  I
disagree.  I challenge you to make a key with my email address and get
the GD to accept it.  Let me know when you succeed.

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: The never-ending GD discussion, part 74 (was Re: Delete key from keyserver)

2005-10-23 Thread Doug Barton
David Shaw wrote:
> On Sun, Oct 23, 2005 at 05:16:43PM +0100, Bob Henson wrote:

>>That's not the only reason though. The PGP Global Keyserver is dangerous, as
>>well as a nuisance, for a number of reasons. As it only shows one key on a
>>search for a users name, it might cause people to miss a revoked key and
>>continue using it.
> 
> 
> This is a misunderstanding about the Global Directory.  It does not,
> is not designed to, and should not give more than one key for a given
> email address. 

He didn't say e-mail address, he said name. :) I just checked this for
myself, and if I type in "Doug Barton" I get the key that is tied to this
e-mail address, but not the other key that I have uploaded to that server.
This actually explains a common complaint that I hear from PGP users about
not being able to find that other key. So, this turns out to be very useful
information, as I now know to tell them to search for my other key by e-mail
address (which works, btw).

I can see a lot of value in the model you described David, and I agree that
at least having a key where the e-mail address has been verified, on a
server where users actually have the ability to remove keys, is a good
thing. On the other hand, I can see that every other "Doug Barton" in the
world is at a significant disadvantage here, since I got there first. :)

hth,

Doug


-- 

If you're never wrong, you're not trying hard enough

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: The never-ending GD discussion,part 74

2005-10-23 Thread Mica Mijatovic
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Was Sun, 23 Oct 2005, at 13:27:05 -0400,
when David wrote:

> It always amuses me that people complain bitterly about the GD storing
> one key per email address, but don't complain, for example, about
> people putting their key up on a web page.  After all, they may
> contain only one key, and might cause people to miss a revoked key. ;)

Well, obviously there is no a "perfect" "key carrier" around. (-;

If the key could be uploaded (it's as for the "key servers") in an
_authorized_ fashion (which is an elementary thing for a server dealing
with security/privacy), we wouldn't have to face all these problems and
annoyances around.

If someone wants a _public_ key serv{er|ice}, then such a service should
provide a decent standards first.

GD cannot store more than one key per e-mail address (which is a sort of
authorization) and this is in the same time a weakness and a good thing.

What if I use several keys with the same address (and the name of mine
of course) but with different "info" parts denoting the various purposes
of the keys?

As for the keeping a key on a web page, there is no chance that we could
miss a revoked key, if we are into reasons why someone is keeping them
this way: the very first thing will be that we'll go to this web page to
check for any updates, and not to the public key servers.

It turns out that this way is even the best one (so far; and in the
"category" of the worldwide scattering of the keys): you can't upload
any key without authorization, and you can upload as much of them as you
want/need.

No reason to complain. As to the other key serv{er|ant}s.

Aside from this, though, you can't know who has your key(s).

Different categories of keys I suppose have different methods of
de|livery.

- --
Mica
PGP keys nestled at: http://blueness.port5.com/pgpkeys/
~~~ For personal mail please use my address as it is *exactly* given
 in my "From|Reply To" field(s). ~~~
Never eat more than you can lift. (Miss Piggy)
-BEGIN PGP SIGNATURE-

iQEVAwUBQ1voxbSpHvHEUtv8AQOdRgf9EN8AaVe0n1DGPIuRZiki/0O6AGA7lsiU
RAiPqJb9DDteDAXF+Sf9OSJTKEn5iF56eipQAACuHm+L2jwWznirnXWNNhSTptz/
a7+q037hw/sk5tvn6O+tquecM/VSIHvntnaux9TUaEpwk1bfedir3IlWvIK4JB55
DmfHD13NbrQfhd4Q2nXKU7Rt72iE+bKnv18ncrG4i4c8Ou//PzBR7+dOJqTXt16C
sAFJsyoPUumgsYx8gcfUTAI20UwvRDV2eOz6Wt/9mt9RwPZneVHcY9ryfqr1OrKh
QsirZfBEZBSA8DsS7XYyhOEpNqFnH4eoArJ/euozTAFRgK5SsRstmQ==
=IRyM
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: The never-ending GD discussion, part 74 (was Re: Delete key from keyserver)

2005-10-23 Thread David Shaw
On Sun, Oct 23, 2005 at 12:41:45PM -0700, Doug Barton wrote:
> David Shaw wrote:
> > On Sun, Oct 23, 2005 at 05:16:43PM +0100, Bob Henson wrote:
> 
> >>That's not the only reason though. The PGP Global Keyserver is dangerous, as
> >>well as a nuisance, for a number of reasons. As it only shows one key on a
> >>search for a users name, it might cause people to miss a revoked key and
> >>continue using it.
> > 
> > 
> > This is a misunderstanding about the Global Directory.  It does not,
> > is not designed to, and should not give more than one key for a given
> > email address. 
> 
> He didn't say e-mail address, he said name. :) I just checked this
> for myself, and if I type in "Doug Barton" I get the key that is
> tied to this e-mail address, but not the other key that I have
> uploaded to that server.  This actually explains a common complaint
> that I hear from PGP users about not being able to find that other
> key. So, this turns out to be very useful information, as I now know
> to tell them to search for my other key by e-mail address (which
> works, btw).

You always need to search the GD by email address.  Name searches
don't make sense there, as the GD only verifies the email address.
The name on the key is essentially a comment, with no more meaning
than any other comment.  It's a consequence of the design to handle
automated encryption - in that case, an email address may be all you
have to work with.

In any event, name or email address, the concern with missing a
revoked key is sort of a non sequitur as the GD doesn't store revoked
keys in the first place.

> I can see a lot of value in the model you described David, and I agree that
> at least having a key where the e-mail address has been verified, on a
> server where users actually have the ability to remove keys, is a good
> thing. On the other hand, I can see that every other "Doug Barton" in the
> world is at a significant disadvantage here, since I got there first. :)

Not necessarily.  If another Doug Barton comes along, he could just as
easily bump you out.

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread B. Kuestner




Am I missing something?



The web of trust.  (And the documentation, apparently.)



Okay. I got that by now. I think the problem was that MacGPG makes it  
really easy to get started with GPG:


There's a plug-in that integrates nicely with Apple's Mail. And the  
Keychain Assistant let's you do all the key creation and uploading  
things easily. That's great. That's a start to get people actually  
using GPG.


But then unlike the command line tools the software does not  
recommend to make a backup copy of your private key. It does not  
recommend to make a hard copy of your key. It does not recommend to  
create a revocation certificate. It also does not explain that  
downloading a public server means that this key can be trusted. That  
of course is a not so good start to get people actually using GPG.


In my case, there was also a bug: When I tried to delete a key I  
didn't want, up came a cryptic error message. So after a while since  
I had just been playing around after all, I thought I just delete my  
keychain and start from scratch. Did that twice actually for the same  
reason. And that's how I lost those private keys.


Anyway, regarding MacGPG, it's a great software even at 0.3.x. I can  
only commend the creators for the effort they have put into it so  
far. Now to prevent that others get bitten like I was I will suggest  
to the authors that they will build recommended practices into the  
software. So after creating a key it could prompt the user to export  
a copy, print a hard copy and create a revocation certificate. The  
deletion error could be fixed, and before deleting a key, the  
software could warn of the implications and advice to create a backup  
copy first somewhere else. Before uploading to a server it could  
explain the implications of that. And before downloading a key it  
could again explain some more of the meaning.




P.S.:  A slightly less inflammatory tone would not have harmed either.



You're absolutely right. It wasn't meant to be inflammatory, nor was  
I in an angry mood or something. I was trying to be straight-forward  
with my reasoning. But after rereading my post when it came back I  
bit my lip and felt offended by my own words. Ouch!


So, please, if somebody took offense at my post, it really was not  
meant like that. My apologies.


Björn





___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread B. Kuestner





Am I missing something?




The web of trust.  (And the documentation, apparently.)




Okay. I got that by now. I think the problem was that MacGPG makes it  
really easy to get started with GPG:


There's a plug-in that integrates nicely with Apple's Mail. And the  
Keychain Assistant let's you do all the key creation and uploading  
things easily. That's great. That's a start to get people actually  
using GPG.


But then unlike the command line tools the software does not  
recommend to make a backup copy of your private key. It does not  
recommend to make a hard copy of your key. It does not recommend to  
create a revocation certificate. It also does not explain that  
downloading a public server means that this key can be trusted. That  
of course is a not so good start to get people actually using GPG.


In my case, there was also a bug: When I tried to delete a key I  
didn't want, up came a cryptic error message. So after a while since  
I had just been playing around after all, I thought I just delete my  
keychain and start from scratch. Did that twice actually for the same  
reason. And that's how I lost those private keys.


Anyway, regarding MacGPG, it's a great software even at 0.3.x. I can  
only commend the creators for the effort they have put into it so  
far. Now to prevent that others get bitten like I was I will suggest  
to the authors that they will build recommended practices into the  
software. So after creating a key it could prompt the user to export  
a copy, print a hard copy and create a revocation certificate. The  
deletion error could be fixed, and before deleting a key, the  
software could warn of the implications and advice to create a backup  
copy first somewhere else. Before uploading to a server it could  
explain the implications of that. And before downloading a key it  
could again explain some more of the meaning.





P.S.:  A slightly less inflammatory tone would not have harmed either.




You're absolutely right. It wasn't meant to be inflammatory, nor was  
I in an angry mood or something. I was trying to be straight-forward  
with my reasoning. But after rereading my post when it came back I  
bit my lip and felt offended by my own words. Ouch!


So, please, if somebody took offense at my post, it really was not  
meant like that. My apologies.


Björn






___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Delete key from keyserver

2005-10-23 Thread B. Kuestner

I suggest that you seriously check our Big Lumber at www.biglumber.com



Thanks John. I will.

Regarding my personal web of trust: I get a clearer picture now and  
for starter I'll exchange keys directly with my friends.


As for the "unwanted keys" for my e-mail address. At least for now I  
know that I was the one who put them there. So if somebody uses them  
to encrypt messages (because he or she thinks like I did that any  
public key with the right e-mail address assigned to it is good  
enough), it's not like someone unauthorized would be able to read  
these messages. Nobody can read them. That's only semi-bad, not  
really bad, if you know what I mean. (c:


Coming as a newbie to all of this, I'd say there's a long way to go  
until this whole thing is ready for my Mom to use it. And I think  
that's what we eventually want to do, right? That encrypted messaging  
becomes the norm, not the exception.


Björn



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users