Re: Signing a key (meaning)

2011-04-08 Thread Mark H. Wood
Sounds like some people could use a signature type which means:  "I
disclaim all signatures made by ".

-- 
Mark H. Wood, Lead System Programmer   mw...@iupui.edu
Asking whether markets are efficient is like asking whether people are smart.


pgpp2yNFuADwp.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


keys not available for signed messages in this maillist

2011-04-08 Thread Bernhard Kleine
Hi,

i wonder whether the keys from several members of this maillist should
be available from the keyserver. e.g. Grant Olson signs all his messages
here. evolution and gpg on ubuntu, however, fail to retrieve the public
key from the server:

the message always reads: signature exists, however, the public key is
required. I have already tried to use the key ID to look for the public
key, but, not too surprisingly, could not retrieve it. I have then seen,
that the key used for signing is one of grants subkey.

My question now is, why are those subkeys not retrieved?

I do not at all want to blame Grant, John Clizbe's key and that of
others can equally not be retrieved.

Cheers

bernhard


signature.asc
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Robert J. Hansen
On 4/8/11 10:25 AM, Bernhard Kleine wrote:
> i wonder whether the keys from several members of this maillist should
> be available from the keyserver. e.g. Grant Olson signs all his messages
> here. evolution and gpg on ubuntu, however, fail to retrieve the public
> key from the server:

"Should" is maybe the wrong word to use.  I've never seen "should" mean
anything other than, "I want" or "I expect."  The universe doesn't much
care about what we want or expect, though.  Justice should prevail and
the sun should rise in the east: but I don't think for a second either
of those "shoulds" means much.  :)

Still, let's try this instead: "why are so many certificates not
available on the keyserver network?"

One answer is, the certificate owners might not want their certificates
on the keyserver network.  Some people much prefer to give their
certificates via biglumber, or person to person, or... etc.

We may agree or disagree with their reasons, but the decision is theirs
to make: we just have to respect it.  :)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Set key to be default to sign/encrypt

2011-04-08 Thread Kevin

On Thu, Apr 07, 2011 at 09:10:45PM +0200 Also sprach Csabi:

Hi!

Thx your reply.
I tried the following:
gpg -u 4096R/626D791C --detach-sign t.txt
The error is the same:  
gpg: skipped "4096R/626D791C": secret key not available
gpg: signing failed: secret key not available
I tried it with the public key's key ID too but the result was the same.

What am i doing wrong?


I think you may just have a problem with your command line syntax.
"gpg -u" expects only the Key ID or fingerprint, NOT the key type
(i.e. drop the 4096R/).

Try the following command line and see if you get better results:

gpg -u 626D791C --detach-sign t.txt

--
"Le hasard favorise l'esprit préparé."
  --Louis Pasteur

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread John Clizbe
Bernhard Kleine wrote:
> Hi,
> 
> i wonder whether the keys from several members of this maillist should
> be available from the keyserver. e.g. Grant Olson signs all his messages
> here. evolution and gpg on ubuntu, however, fail to retrieve the public
> key from the server:
> 
> the message always reads: signature exists, however, the public key is
> required. I have already tried to use the key ID to look for the public
> key, but, not too surprisingly, could not retrieve it. I have then seen,
> that the key used for signing is one of Grant's subkey.
> 
> My question now is, why are those subkeys not retrieved?

Client configuration issue? The keys are out there on the servers. Which
server(s) are you searching? Is that server online?
Does gpg --search-keys work from the command line? Does gpg --recv-keys?

http://pool.sks-keyservers.net:11371/pks/lookup?search=kgo%40grant-olson.net&fingerprint=on&op=index

> I do not at all want to blame Grant, John Clizbe's key and that of
> others can equally not be retrieved.

Which keys of mine can you not retrieve? I normally sign with two. Currently
they are 0xD6569825 and 0x435BD034.

_ALL_ of the keys I use publicly are available on the SKS keyservers. I also
know those of Grant's are also available as I recently updated them with gpg
--refresh-key.

http://pool.sks-keyservers.net:11371/pks/lookup?search=clizbe&fingerprint=on

http://pool.sks-keyservers.net:11371/pks/lookup?op=get&search=0xEB5E19F3D6569825

http://pool.sks-keyservers.net:11371/pks/lookup?op=get&search=0x2313315C435BD034

You may wish^W^W need to check your keyserver configuration. It obviously has a
problem.

-- 
John P. Clizbe  Inet:   John (a) Enigmail DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"
A:"An odd melody / island voices on the winds / surplus of vowels"



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Andrew Long
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256


On 8 Apr 2011, at 16:23, Robert J. Hansen wrote:

> On 4/8/11 10:25 AM, Bernhard Kleine wrote:
>>  
> "Should" is maybe the wrong word to use.  I've never seen "should" mean
> anything other than, "I want" or "I expect."  


'Should' and 'Must' have specific meanings within most RFC's (I've been 
OD'ing on RFCs, recently) So, as many of us here are from a technical 
background, I think we might be ready to believe such a formalism may apply?

Regards, Andy
- -- 
Andrew Long
andrew dot long at mac dot com





-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAk2fO0gACgkQRL8D6wymVNYDZgD+OqBcWPsLxnRiTOF2hH/nHWqS
OVRedrbj5jB95IpiSxABALwTna/K4jlmdkLCg2L2hhfieYnmbZvdh5XWrElQWHtg
=G+N0
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Robert J. Hansen
On 4/8/11 12:43 PM, Andrew Long wrote:
> 'Should' and 'Must' have specific meanings within most RFC's.

SHOULD and MUST do.  They're presented in all-caps in RFCs to make sure
people know they're being used in a formal context as opposed to a
conversational English context.

If you want to say certificates SHOULD be uploaded to keyservers, we can
have a good, healthy debate on that subject.  If you want to say
certificates should be uploaded to keyservers, my response to that is I
should have a pony, too.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Do not conflate key+userID certification with "vouching" [was: Re: How to verify the e-mail address when certifying OpenPGP User IDs]

2011-04-08 Thread Daniel Kahn Gillmor
On 04/07/2011 09:37 PM, Grant Olson wrote:
> Keep in mind that the web-of-trust isn't the mafia.  If you 'vouch' for
> someone and they turn out to be a rat, nobody's going to two bullets in
> your chest, and one in your head.

"Vouching" for someone usually means that you think you can rely on the
person, and that you think they're somehow "good", "on our side",
"trustworthy", etc.

Making an OpenPGP certification ("keysigning") is *not* the same as
"vouching" for them.  An OpenPGP certification is a simple assertion of
two things: {identity (which may include an address), and ownership of a
key}.

An OpenPGP certification says nothing about whether you think the
keyholder is a good person, whether you would trust them with your
children, whether they are a good software engineer, whether you would
vote them into public office if you happen to live in a democracy, or
even whether you are willing to rely on the OpenPGP certifications they
produce. [0]

You are free to assert these other qualities in many other ways, of
course.  For example, I could write, sign, and publish a document that
says "Alice  has strong moral fiber".  This sort of
"vouching" would be distinct from my certification of Alice's OpenPGP
key.  Note that I am *not* saying that Alice's key has strong moral
fiber.  My statement is vouching for *Alice*, not her key.

Keeping the semantics of keysigning restricted to a simple assertion of
identity and key ownership makes it possible to do reasoned inference
over a set of certifications, to establish (via intermediate parties,
such as "mutual acquaintances") a level of reliable identity and
key-ownership between people (and other entities!) who have never
physically met.  It also makes OpenPGP certification less fraught with
doubt or confusion, and it reduces the amount deep social relationships
published on the public keyservers.  This is good.

If you mix non-identity, non-key-ownership notions into your OpenPGP
certifications, making a certification becomes radically harder (because
the other notions are significantly less objective), and your ability to
do effective reasoned inference about identity and key-ownership drops
away as certifications themselves become rarer and more entangled with
subjective measurements of "vouch-worthiness".

Ironically, this means that mixing concepts of "vouching" into standard
OpenPGP certification makes it *harder* to effectively "vouch" for
someone, because it is harder for them to establish their identity in
the first place.

Vouching for people is great, and useful in many contexts.  But it
should not be conflated with identity certification.

--dkg

[0] Yes, you can actually assert your willingness to rely on the
keyholders' own OpenPGP certifications, using so-called "trust
signatures".  Currently, very few people issue trust signatures, and
those who use them responsibly issue them very rarely.  If you aren't
confident on standard OpenPGP certifications, you should probably avoid
issuing trustsigs entirely.  They are public declarations of social
relationships that most people prefer to keep private.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread John Clizbe
John Clizbe wrote:
> Bernhard Kleine wrote:
>> Hi,
>> 
>> i wonder whether the keys from several members of this maillist should
>> be available from the keyserver. e.g. Grant Olson signs all his messages
>> here. evolution and gpg on ubuntu, however, fail to retrieve the public
>> key from the server:

>> 
>> My question now is, why are those subkeys not retrieved?

> You may wish^W^W need to check your keyserver configuration. It obviously has 
> a
> problem.

You most likely need to configure gpg to automatically retrieve needed keys.
It's not handled directly by Evolution. From
http://live.gnome.org/Evolution/FAQ#How_can_import_GPG_keys_automatically_from_within_Evolution.3F
> 
> How can import GPG keys automatically from within Evolution?
> 
> If you receive a signed GPG/PGP message from someone and you do not yet
> have his public key in your GPG/PGP keyring. You can make GPG automatically
> download and add unknown GPG/PGP keys of received messages by adding the
> following two lines to the file $HOME/.gnupg/gpg.conf:
> 
> keyserver hkp://subkeys.pgp.net
> 
> keyserver-options auto-key-retrieve
> 
> The actual link (URI) to the keyserver is only one example and may be
> different - you can also choose other servers.

Many recommend pool.sks-keyservers.net. It's regularly updated to reflect
up-to-date online servers and distributes the load of serving keys over more of
the SKS network. There are several pools you may choose.
See http://www.sks-keyservers.net/overview-of-pools.php for more information.

There are additional options for the keyserver-options line. I recommend adding
' include-subkeys include-revoked import-clean'. See the gpg man page.

-- 
John P. Clizbe  Inet:   John (a) Enigmail DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"

A:"An odd melody / island voices on the winds / surplus of vowels"



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Do not conflate key+userID certification with "vouching" [was: Re: How to verify the e-mail address when certifying OpenPGP User IDs]

2011-04-08 Thread Grant Olson
On 4/8/11 2:00 PM, Daniel Kahn Gillmor wrote:
> On 04/07/2011 09:37 PM, Grant Olson wrote:
>> Keep in mind that the web-of-trust isn't the mafia.  If you 'vouch' for
>> someone and they turn out to be a rat, nobody's going to two bullets in
>> your chest, and one in your head.
> 
> "Vouching" for someone usually means that you think you can rely on the
> person, and that you think they're somehow "good", "on our side",
> "trustworthy", etc.
> 
> Making an OpenPGP certification ("keysigning") is *not* the same as
> "vouching" for them.  An OpenPGP certification is a simple assertion of
> two things: {identity (which may include an address), and ownership of a
> key}.
> 
> An OpenPGP certification says nothing about whether you think the
> keyholder is a good person, whether you would trust them with your
> children, whether they are a good software engineer, whether you would
> vote them into public office if you happen to live in a democracy, or
> even whether you are willing to rely on the OpenPGP certifications they
> produce. [0]
> 

We're on the same page here, although I probably made my point sloppily.
 Two definitions of vouch:

1. Assert or confirm as a result of one's own experience that something
is true or accurately so described.
2. Confirm that someone is who they say they are or that they are of
good character: "someone could vouch for him".

A sig is the first definition.  Organized crime is the second.

Jan seems to be worried that if he signs a key, and Eve is somehow
illegally using an email or whatever, that his signature would add some
sort of credibility or trust measurement to Eve when she initiates her
Nigerian 411 scam.  I was (sloppily) saying that the signature implies
no such thing.

> You are free to assert these other qualities in many other ways, of
> course.  For example, I could write, sign, and publish a document that
> says "Alice  has strong moral fiber".  This sort of
> "vouching" would be distinct from my certification of Alice's OpenPGP
> key.  Note that I am *not* saying that Alice's key has strong moral
> fiber.  My statement is vouching for *Alice*, not her key.
> 

Like I said, if you want to do this, using certification levels and a
signing policy might be a less ad-hoc way of accomplishing this.  (Not
that any clients currently do anything with that info.)  And yes,
there's still a distinction between the acutal person and their key.

Like you say below, attaching various certification levels may actually
be undesirable and leak more personal info than some people want out there.

> Keeping the semantics of keysigning restricted to a simple assertion of
> identity and key ownership makes it possible to do reasoned inference
> over a set of certifications, to establish (via intermediate parties,
> such as "mutual acquaintances") a level of reliable identity and
> key-ownership between people (and other entities!) who have never
> physically met.  It also makes OpenPGP certification less fraught with
> doubt or confusion, and it reduces the amount deep social relationships
> published on the public keyservers.  This is good.
> 



--
Grant

"I am gravely disappointed. Again you have made me unleash my dogs of war."



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Bernhard Kleine
Am Freitag, den 08.04.2011, 11:29 -0500 schrieb John Clizbe:
> Bernhard Kleine wrote:
> > Hi,
> > 
> > i wonder whether the keys from several members of this maillist should
> > be available from the keyserver. e.g. Grant Olson signs all his messages
> > here. evolution and gpg on ubuntu, however, fail to retrieve the public
> > key from the server:
> > 
> > the message always reads: signature exists, however, the public key is
> > required. I have already tried to use the key ID to look for the public
> > key, but, not too surprisingly, could not retrieve it. I have then seen,
> > that the key used for signing is one of Grant's subkey.
> > 
> > My question now is, why are those subkeys not retrieved?
> 
> Client configuration issue? The keys are out there on the servers. Which
> server(s) are you searching? Is that server online?
> Does gpg --search-keys work from the command line? Does gpg --recv-keys?
> 
> http://pool.sks-keyservers.net:11371/pks/lookup?search=kgo%40grant-olson.net&fingerprint=on&op=index
> 
> > I do not at all want to blame Grant, John Clizbe's key and that of
> > others can equally not be retrieved.
> 
> Which keys of mine can you not retrieve? I normally sign with two. Currently
> they are 0xD6569825 and 0x435BD034.
> 
> _ALL_ of the keys I use publicly are available on the SKS keyservers. I also
> know those of Grant's are also available as I recently updated them with gpg
> --refresh-key.
> 
> http://pool.sks-keyservers.net:11371/pks/lookup?search=clizbe&fingerprint=on
> 
> http://pool.sks-keyservers.net:11371/pks/lookup?op=get&search=0xEB5E19F3D6569825
> 
> http://pool.sks-keyservers.net:11371/pks/lookup?op=get&search=0x2313315C435BD034
> 
> You may wish^W^W need to check your keyserver configuration. It obviously has 
> a
> problem.
Sorry for ambiguous wording with the "should".

I am quite sure that Grant Olson's key is on the keyserver, thus there
is no matter of hiding it, as robert j.hansen suggested. however, i
wonder why i can't retrieve it. 

gpg --search-keys A18A54D
gpg: Suche nach "A18A54D" von hkp Server pool.sks-keyservers.net
gpg: Schlüssel "A18A54D" am Schlüsselserver nicht gefunden

i.d. search for A18A54D on hkp server ..
key A18A54D not found at the keyserver.

on the command line!

on the interaction page of sks-keyservers.net the key cannot found
either.

Any help appreciated.

Bernhard


signature.asc
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Bernhard Kleine
Am Freitag, den 08.04.2011, 13:19 -0500 schrieb John Clizbe:
> John Clizbe wrote:
> > Bernhard Kleine wrote:
> >> Hi,
> >> 
> >> i wonder whether the keys from several members of this maillist should
> >> be available from the keyserver. e.g. Grant Olson signs all his messages
> >> here. evolution and gpg on ubuntu, however, fail to retrieve the public
> >> key from the server:
> 
> >> 
> >> My question now is, why are those subkeys not retrieved?
> 
> > You may wish^W^W need to check your keyserver configuration. It obviously 
> > has a
> > problem.
> 
> You most likely need to configure gpg to automatically retrieve needed keys.
> It's not handled directly by Evolution. From
> http://live.gnome.org/Evolution/FAQ#How_can_import_GPG_keys_automatically_from_within_Evolution.3F
> > 
> > How can import GPG keys automatically from within Evolution?
> > 
> > If you receive a signed GPG/PGP message from someone and you do not yet
> > have his public key in your GPG/PGP keyring. You can make GPG automatically
> > download and add unknown GPG/PGP keys of received messages by adding the
> > following two lines to the file $HOME/.gnupg/gpg.conf:
> > 
> > keyserver hkp://subkeys.pgp.net
> > 
> > keyserver-options auto-key-retrieve
> > 
> > The actual link (URI) to the keyserver is only one example and may be
> > different - you can also choose other servers.
> 
> Many recommend pool.sks-keyservers.net. It's regularly updated to reflect
> up-to-date online servers and distributes the load of serving keys over more 
> of
> the SKS network. There are several pools you may choose.
> See http://www.sks-keyservers.net/overview-of-pools.php for more information.
> 
> There are additional options for the keyserver-options line. I recommend 
> adding
> ' include-subkeys include-revoked import-clean'. See the gpg man page.
> 
sorry for the noice: I happen to notice a typing error: sks-keyserver
instead of keyservers. after that keys could be retrieved. thanks a lot
for your patience.

Greetings from the Black Forest

Bernhard


signature.asc
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread John Clizbe
Bernhard Kleine wrote:
> 
> I am quite sure that Grant Olson's key is on the keyserver, thus there
> is no matter of hiding it, as robert j.hansen suggested. however, i
> wonder why i can't retrieve it. 
> 
> gpg --search-keys A18A54D
> gpg: Suche nach "A18A54D" von hkp Server pool.sks-keyservers.net
> gpg: Schlüssel "A18A54D" am Schlüsselserver nicht gefunden
> 
> i.d. search for A18A54D on hkp server ..
> key A18A54D not found at the keyserver.
> 

Key IDs are 8 hex digits. You have typed 7. Add the '6' at the end :-)

sks@yogi:~$ gpg --keyserver yogi --search-keys 0xA18A54D6
gpg: searching for "0xA18A54D6" from hkp server yogi
(1) Grant T. Olson (pikimal) 
Grant T. Olson (Personal email) 
Grant T. Olson (Grant - home email) 
  2048 bit RSA key E3B5806F, created: 2010-01-11
Keys 1-1 of 1 for "0xA18A54D6".  Enter number(s), N)ext, or Q)uit >



-- 
John P. Clizbe  Inet:   John (a) Enigmail DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"
A:"An odd melody / island voices on the winds / surplus of vowels"



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Bernhard Kleine
Am Freitag, den 08.04.2011, 14:09 -0500 schrieb John Clizbe:

> Key IDs are 8 hex digits. You have typed 7. Add the '6' at the end :-)
> 
> sks@yogi:~$ gpg --keyserver yogi --search-keys 0xA18A54D6
> gpg: searching for "0xA18A54D6" from hkp server yogi
> (1) Grant T. Olson (pikimal) 
> Grant T. Olson (Personal email) 
> Grant T. Olson (Grant - home email) 
>   2048 bit RSA key E3B5806F, created: 2010-01-11
> Keys 1-1 of 1 for "0xA18A54D6".  Enter number(s), N)ext, or Q)uit >
> 
> 

see also the other mail: this actually worked here, too. on the
interactionpage of sks-keyservers.net 8 digits are not sufficient you
have to prefix 0xA18AA54D6. 

Thus all the problems are solved. your other suggestion were already
active here: sks-keyserver pool and the auto-retrieve-key option.

Thanks again!

bernhard



signature.asc
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keys not available for signed messages in this maillist

2011-04-08 Thread Grant Olson
On 4/8/11 2:50 PM, Bernhard Kleine wrote:
> 
> I am quite sure that Grant Olson's key is on the keyserver, thus there
> is no matter of hiding it, as robert j.hansen suggested. however, i
> wonder why i can't retrieve it. 
> 
> gpg --search-keys A18A54D
> gpg: Suche nach "A18A54D" von hkp Server pool.sks-keyservers.net
> gpg: Schlüssel "A18A54D" am Schlüsselserver nicht gefunden
> 
> i.d. search for A18A54D on hkp server ..
> key A18A54D not found at the keyserver.
> 
> on the command line!
> 
> on the interaction page of sks-keyservers.net the key cannot found
> either.
> 
> Any help appreciated.
> 
> Bernhard

You missed the last digit of the key id:

A18A54D6

You also need start that with 0x so it knows it's a hexadecimal key id.
And you probably want to use my primary key.  but either:

gpg --search-keys 0xA18A54D6

or

gpg --search-keys 0xE3B5806F

Should work.

-- 
Grant

"I am gravely disappointed. Again you have made me unleash my dogs of war."



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Do not conflate key+userID certification with "vouching"

2011-04-08 Thread Daniel Kahn Gillmor
On 04/08/2011 02:38 PM, Grant Olson wrote:
>  Two definitions of vouch:
> 
> 1. Assert or confirm as a result of one's own experience that something
> is true or accurately so described.
> 2. Confirm that someone is who they say they are or that they are of
> good character: "someone could vouch for him".
> 
> A sig is the first definition.  Organized crime is the second.

Or, more simply, An OpenPGP certification is "vouching for someone's
identity"; it is not "vouching for someone".

But given the easy confusion and the level of nuance required to tease
the concepts apart, i think we're better off avoiding the term "vouch"
entirely, and talking about "assertions of identity and key ownership"
instead.  Why use a term likely to sow more confusion in an already
confused topic?

> Like I said, if you want to do this, using certification levels and a
> signing policy might be a less ad-hoc way of accomplishing this.

Actually, i think using a signing policy and certification levels to
refer to non-identity,non-key-ownership characteristics is *also* a mistake.

Here are the descriptions of the conventionally-defined "certification
levels" (from https://tools.ietf.org/html/rfc4880#page-20) :

>>0x10: Generic certification of a User ID and Public-Key packet.
>>The issuer of this certification does not make any particular
>>assertion as to how well the certifier has checked that the owner
>>of the key is in fact the person described by the User ID.
>> 
>>0x11: Persona certification of a User ID and Public-Key packet.
>>The issuer of this certification has not done any verification of
>>the claim that the owner of this key is the User ID specified.
>> 
>>0x12: Casual certification of a User ID and Public-Key packet.
>>The issuer of this certification has done some casual
>>verification of the claim of identity.
>> 
>>0x13: Positive certification of a User ID and Public-Key packet.
>>The issuer of this certification has done substantial
>>verification of the claim of identity.
>> 
>>Most OpenPGP implementations make their "key signatures" as 0x10
>>certifications.  Some implementations can issue 0x11-0x13
>>certifications, but few differentiate between the types.
> 

Note that none of these levels make any reference to anything other than
identity and key ownership.  They refer to levels of certainty (of the
issuer) of identity and key ownership (of the subject).  But not to any
other statements like "has strong moral fiber" or "has been my best
friend since birth" or "is trustworthy around dogs" or "loves sauerkraut
as much as i do".  [0]

Again, if you want to assert these things publicly, you're free to do
so.  But regular public OpenPGP certifications are probably the wrong
place to do it.

OpenPGP certifications should be about identity and key-ownership.

Regards,

--dkg

[0] Note that i *could* give a "positive" certification to my best
friend since birth, since i certainly have done substantial verification
of his identity, but that doesn't work bi-directionally: every
"positive" certification doesn't have to mean "best friend since birth".
 Moreover, making that kind of assertion would leak some additional
information about my perception of our relationship, and  (since our
tools don't make use of this information) it would not provide any
additional benefit to either of us.  So why would anyone make such a
public certification?

If someone can describe an actual benefit, i can decide whether it's
worth the tradeoff that comes from the extra data in the social graph
implied by the WoT.  But as it stands, i don't think there's even a
tradeoff to be made.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Do not conflate key+userID certification with "vouching"

2011-04-08 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Friday 8 April 2011 at 8:35:56 PM, in
, Daniel Kahn Gillmor wrote:


> Or, more simply, An OpenPGP certification is "vouching
> for someone's identity"; it is not "vouching for
> someone".

The meaning and implications of "vouching for" somebody are massively
dependent on context and circumstances. In the context of a discussion
about openPGP certifications, in the abstract without any specific use
for those certifications lurking in the shadows, I see no difference
between "vouching for someone's identity" and "vouching for someone."



> But given the easy confusion and the level of nuance
> required to tease the concepts apart, i think we're
> better off avoiding the term "vouch" entirely, and
> talking about "assertions of identity and key
> ownership" instead.  Why use a term likely to sow more
> confusion in an already confused topic?

Whilst "vouch" is yet another term with the potential to confuse, is
it really any more confusing than "certification" or "assertion of
identity?"



> OpenPGP certifications should be about identity and
> key-ownership.

As an aside, I've always found "control" to be more helpful than
"ownership" in my thought processes about openPGP keys. Who "controls"
the private key has an obvious meaning to me, who "owns" a key seems a
little more abstract.

- --
Best regards

MFPAmailto:expires2...@ymail.com

Never interrupt me when I'm trying to interrupt you.
-BEGIN PGP SIGNATURE-

iQE7BAEBCgClBQJNn3jWnhSAAEAAVXNpZ25pbmdfa2V5X0lEIHNpZ25pbmdf
a2V5X0ZpbmdlcnByaW50IEAgIE1hc3Rlcl9rZXlfRmluZ2VycHJpbnQgQThBOTBC
OEVBRDBDNkU2OSBCQTIzOUI0NjgxRjFFRjk1MThFNkJENDY0NDdFQ0EwMyBAIEJB
MjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0N0VDQTAzAAoJEKipC46tDG5pdiAD+gMv
jNDoqqqZ9cYUf39hBs2w3e8QoyjMIBVmk8Ghg/4F/L7yaXQCGR9OXrKAFl45zPAz
B9Y2Cz8VLjBa7CjpeluZe0kkzF+0De4vd+BaNFBGF0jY13KXPfbWezC22SH4A16w
jlOFLFWiEPk1mJaNjA7GHB1JVxM9nrHRYXT1iPX2
=WqbR
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing a key (meaning)

2011-04-08 Thread Jan Janka
>> I wonder how I can check whether the email
>>address in the ID realy belongs to the keyowner.

>You can only check whether the key owner "has access"
>to the email address. You cannot check whether this
>access is in any way exclusive, legit or whatever.

I think so, but WHAT benefit (concerning the identity) do you have from knowing 
that the person who owns the private key *has access* to the email address 
mentioned in that key ID? Remember that we do the whole fingerprint checking, 
because we believe it might very well be there's a man in the middle or that an 
attacker has access to the email address.

I think there's no benefit, because everybody who issueses a key (even an 
attacker) wants to receive information encrypted with that key, - otherwise he 
wouldn't issue it. Thus he will place an email address in the ID he has access 
to. So I think we can take this for granted.

The reason why the email address is in the user ID is for convenience (so 
everybody knows where to send emails) and makes sure keys can be easily found 
on the keyserver. Apart from that it enables user to distinguished between keys 
of persons with the same name.

Thanks for answers, 
Jan

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing a key (meaning)

2011-04-08 Thread Daniel Kahn Gillmor
On 04/08/2011 06:02 PM, Jan Janka wrote:
> I think there's no benefit, because everybody who issueses a key (even an 
> attacker) wants to receive information encrypted with that key, - otherwise 
> he wouldn't issue it. Thus he will place an email address in the ID he has 
> access to. So I think we can take this for granted.

But if an attacker puts his e-mail address on a key he claims to be
mine, he won't get my mail sent to (or encrypted to) him.

Many people already know Bob's e-mail address; if they're sending mail
do b...@example.net, they're not going to encrypt that mail to a key that
has "Bob " as the only User ID.

OTOH, if Eve suspects she might at some point get access to a message
that was sent to Bob, it's in her interest to put *Bob's* e-mail address
on a key and try to get people to accept it as Bob's (rather than
putting her own address on it).

You're right that if Eve *already* has access to Bob's inbox, then the
e-mail access check won't be a terribly useful test (though as soon as
people start encrypting mail to Eve's key and mailing it to Bob, Bob
ought to notice).  But the e-mail access control check *does* protect
against the attack scenario where at the time of keysigning, Eve does
*not* have access to Bob's inbox.  It protects the contents of the inbox
(because people send messages encrypted to the correct key) when some of
Bob's mail accidentally leaks to Eve later.

> The reason why the email address is in the user ID is for convenience (so 
> everybody knows where to send emails) and makes sure keys can be easily found 
> on the keyserver. Apart from that it enables user to distinguished between 
> keys of persons with the same name.

This is pretty critical in some contexts.  E-mail is a (mostly) unique,
global identifier.  "John Smith" is not.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


default keyserver-options [was: Re: keys not available for signed messages in this maillist]

2011-04-08 Thread Daniel Kahn Gillmor
On 04/08/2011 02:19 PM, John Clizbe wrote:
> There are additional options for the keyserver-options line. I recommend 
> adding
> ' include-subkeys include-revoked import-clean'. See the gpg man page.

Thanks for these pointers, John.  If you think these are good options,
maybe we should advocate for changing the defaults to include them?

I support setting include-subkeys and include-revoked to on by default.
 The only reason these aren't more seriously problematic right now is
that SKS (the dominant HKP implementation today) automatically searches
subkeys and includes revoked keys.  That is, these options have no
effect when querying SKS keyservers.

As a keyserver client, i think gpg should make it clear that it wants
these options by default, in case any keyservers attempt to honor them.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing a key (meaning)

2011-04-08 Thread Jan Janka
> But if an attacker puts his e-mail address on a key he claims to be
> mine, he won't get my mail sent to (or encrypted to) him.

If someone somehow gets that key, reads your name in the ID and relies on that 
name he might sent mail intented for you to the attacker's email address, that 
might even pretty much look like yours email address. 


>But the e-mail access control check *does* protect
>against the attack scenario where at the time of keysigning, Eve does
>*not* have access to Bob's inbox.

Yes, but the fingerprint check already protects against that, so why do we need 
another check?

>> The reason why the email address is in the user ID is for convenience >>(so 
>> everybody knows where to send emails) and makes sure keys can be >>easily 
>> found on the keyserver. Apart from that it enables user to >>distinguished 
>> between keys of persons with the same name.

>This is pretty critical in some contexts.  E-mail is a (mostly) unique,
>global identifier.  "John Smith" is not.

What do you mean with critical? 

"John Smith " is quite global and quite unique, although I don't 
check the email address before signing. 
1. John tells me j...@hot.com. 
2. I believe him he has access to j...@hot.com (see former email).
3. I find keys on the server by looking for j...@hot.com.
4. I choose "John Smith ", because I know his name. 
5. I make a fingerprint check on the phone (I know his voice). 
6. I sign the key. 
7. I upload the signed key to the keyserver.

If there is a clever attacker he might issue a key with the very same ID. 
People then looking for John's key will be presented the following list:

"John Smith " (signed by me)
"John Smith " 

If they don't know me they can simply do their own fingerprintcheck with John, 
otherwise they will take the signed key.

Thanks for your answers, I know I'm asking unorthodox questions, but I pretty 
much feel I'm right and the conventional procedure is partly unnecessary and 
thus hard to understand and difficult to use. 

Best regards, 
Jan

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users