MUA "automatically signs keys"? (was: Re: Non email addresses in UID)

2014-01-29 Thread Gregor Zattler
Hi Steve, gnupg users,
* Steve Jones  [24. Jan. 2014]:
> Which reminds me that I'd really like an email client that
> automatically signs keys at level 1 (persona) of anyone who replies
> with a signed email that quotes a significant portion of the text I
> sent, as this effectively counts as a challenge response protocol in my
> book.

That's an interesting idea.  But there is still the possibility
of a man in the middle attac...  The web of trust is supposed to
counter MITM attacks by signing keys only if the verification was
done directly (no middle person).


Ciao, Gregor
-- 
 -... --- .-. . -.. ..--.. ...-.-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: default (secret) key for gpg

2014-01-29 Thread Uwe Brauer
>> "Werner" == Werner Koch  writes:


   > (setq mml2015-signer "0x65AD077A")

The correct setting is 

 (setq mml2015-signers (list "0x65AD077A"))

Just in case


smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread nb.linux
Gregor Zattler:
> Hi Steve, gnupg users,
> * Steve Jones  [24. Jan. 2014]:
>> Which reminds me that I'd really like an email client that
>> automatically signs keys at level 1 (persona) of anyone who replies
>> with a signed email that quotes a significant portion of the text I
>> sent, as this effectively counts as a challenge response protocol in my
>> book.
> 
> That's an interesting idea.  But there is still the possibility
> of a man in the middle attac...  The web of trust is supposed to
> counter MITM attacks by signing keys only if the verification was
> done directly (no middle person).

maybe you already discussed that, but what about sending someone an
encrypted email (with the challenge) and wait for an encrypted reply
with the signed challenge? (as you seem to talk only about sending a
clear text challenge)

Personally, I don't want such behaviour. When I'm making a
certification, then it's me doing it manually as I have the
responsibility. I don't want some program to be able to make automatized
certifications with my key.

Here's a quote from an email on a very similar topic:

From: Robert J. Hansen 
Subject: Re: trust your corporation for keyowner identification?
Date: 2013-10-17 13:54 -0700
>> In my proposed scenario, the corporation [e.g. HR] is doing nothing more than
>> providing a means for the participants to know that Bob is actually Bob
>> because the company has checked his id and said he is and providing an
>> authenticated means (again, IT being a black-hat aside) to communicate
>> with Bob and verify fingerprints, etc.
> 
> Under this scenario, the entire thing is dangerously bogus.
> 
> When I sign a certificate, I am sending a message: "I am vouching for the 
> identity of X."  Under your scenario, I'm no longer vouching for the identity 
> of X.  I would instead be saying, "Someone else who is not listed on this 
> signature has vouched for the identity of X.  I am signing this without any 
> direct personal knowledge of X's identity."
> 
> If you're vouching for X's identity, you need to take positive steps to 
> verify X's identity.  If someone else is vouching for X's identity, then let 
> them sign X's certificate.  Why should you get involved without doing your 
> own positive verification?

Two replies later in the thread there was Stan Tobias
 who clarified:
> [That] you vouch that the person told you "This is my key".  Making a 
> certification is *not* a confirmation of an identity.

I like the term "vouch" here, because it highlights the responsibility
in the Web of Trust of the person doing the certification.

Cheers,
-- nb.linux

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


[Announce] Libgcrypt 1.6.1 released

2014-01-29 Thread Werner Koch
Hello!

The GNU project is pleased to announce the availability of Libgcrypt
version 1.6.1.  This is a maintenance release to fix problems found in
the recently released 1.6.0 version.

Libgcrypt is a general purpose library of cryptographic building blocks.
It does not provide any implementation of OpenPGP or other protocols.
Thorough understanding of applied cryptography is required for proper
use Libgcrypt.


Noteworthy changes in version 1.6.1 (2014-01-29)


 * Added emulation for broken Whirlpool code prior to 1.6.0.

 * Improved performance of KDF functions.

 * Improved ECDSA compliance.

 * Fixed locking for Windows and non-ELF Pthread systems (regression
   in 1.6.0)

 * Fixed message digest lookup by OID (regression in 1.6.0).

 * Fixed a build problem on NetBSD.

 * Fixed memory leaks in ECC code.

 * Fixed some asm build problems and feature detection bugs.

 * Interface changes relative to the 1.6.0 release:
 
 GCRY_MD_FLAG_BUGEMU1NEW (minor API change).


Download


Source code is hosted at the GnuPG FTP server and its mirrors as listed
at http://www.gnupg.org/download/mirrors.html .  On the primary server
the source tarball and its digital signature are:

 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.1.tar.bz2 (2413k)
 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.1.tar.bz2.sig

That file is bzip2 compressed.  A gzip compressed version is here:

 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.1.tar.gz (2872k)
 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.1.tar.gz.sig

Alternativley you may upgrade using this patch file:

 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.0-1.6.1.diff.bz2 (244k)

In order to check that the version of Libgcrypt you are going to build
is an original and unmodified one, you can do it in one of the following
ways:

 * Check the supplied OpenPGP signature.  For example to check the
   signature of the file libgcrypt-1.6.1.tar.bz2 you would use this
   command:

 gpg --verify libgcrypt-1.6.1.tar.bz2.sig

   This checks whether the signature file matches the source file.  You
   should see a message indicating that the signature is good and made
   by the release signing key 4F25E3B6 which is certified by my well
   known key 1E42B367.  To retrieve the keys you may use the command
   "gpg --fetch-key finger:w...@g10code.com".

 * If you are not able to use GnuPG, you have to verify the SHA-1
   checksum:

 sha1sum libgcrypt-1.6.1.tar.bz2

   and check that the output matches the first line from the
   following list:

f03d9b63ac3b17a6972fc11150d136925b702f02  libgcrypt-1.6.1.tar.bz2
fe6d442881a28a37d16348cdbf96b41b8ef38ced  libgcrypt-1.6.1.tar.gz
35d002247186884ba3730c91f196a5de48c3fcf8  libgcrypt-1.6.0-1.6.1.diff.bz2


Copying
===

Libgcrypt is distributed under the terms of the GNU Lesser General
Public License (LGPLv2.1+).  The helper programs as well as the
documentation are distributed under the terms of the GNU General Public
License (GPLv2+).  The file LICENSES has notices about contributions
that require these additional notices are distributed.


Support
===

For help on developing with Libgcrypt you should read the included
manual and optional ask on the gcrypt-devel mailing list [1].  A
listing with commercial support offers for Libgcrypt and related
software is available at the GnuPG web site [2].

The driving force behind the development of Libgcrypt is my company
g10 Code.  Maintenance and improvement of Libgcrypt and related
software takes up most of our resources.  To allow us to continue our
work on free software, we ask to either purchase a support contract,
engage us for custom enhancements, or to donate money:

  http://g10code.com/gnupg-donation.html


Thanks
==

Many thanks to all who contributed to Libgcrypt development, be it bug
fixes, code, documentation, testing or helping users.


Happy hacking,

  Werner


[1] http://lists.gnupg.org/mailman/listinfo/gcrypt-devel
[2] http://www.gnupg.org/service.html

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


pgp50xpu5Bq1I.pgp
Description: PGP signature
___
Gnupg-announce mailing list
gnupg-annou...@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-announce___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread Steve Jones
On Wed, 29 Jan 2014 11:14:11 +
"nb.linux"  wrote:

> Gregor Zattler:
> > Hi Steve, gnupg users,
> > * Steve Jones  [24. Jan. 2014]:
> > That's an interesting idea.  But there is still the possibility
> > of a man in the middle attac...  The web of trust is supposed to
> > counter MITM attacks by signing keys only if the verification was
> > done directly (no middle person).
> 
> maybe you already discussed that, but what about sending someone an
> encrypted email (with the challenge) and wait for an encrypted reply
> with the signed challenge? (as you seem to talk only about sending a
> clear text challenge)

Yes, the message being sent would have to be encrypted for the
procedure to be valid, otherwise an attacker could read the mail and
spoof a response (after having already spoofed your communication with
the key server).

> Personally, I don't want such behaviour. When I'm making a
> certification, then it's me doing it manually as I have the
> responsibility. I don't want some program to be able to make
> automatized certifications with my key.

Well, it could be semi-automatic. I'm only talking about persona
certifications, which appear to be understood as verifying that the key
and the email address are under the control of the same person. Having
your mail client being able to determine that the key and the email
address seem to match and offering you a one click (plus passphrase)
option to verify that fact would be nice.

-- 
Steve Jones 
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC  4272 2AC8 A680 7167 C896


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


OpenPGP key statistics

2014-01-29 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

I got curious about the current distribution of keys available on the
keyservers and wrote up a quick tool to dump some of this
information[a] from SKS yesterday. Since this might be of interest for
others as well I'll include some of the findings here. The full post
with main results including some charts are posted in a blog entry on
[0]. I hope to get around to digging a bit deeper into more
information going forwards, in particular taking into consideration
subkeys and expiration/revocations (I just have to figure some good
metrics to look at for this), so please let me know if there are
specific things that might be interesting.

A snippet from the post:
The overall majority (94.74%) were Version 4 keys c.f. RFC4880 with V3
keys representing 4.73% and V2 keys representing 0.53%. DSA keys
represented 74.4%, while 25.6% were RSA keys and a minority ElGamal
(0.03%), Elliptic Curve keys (35 keys) and keys in the experimental
range (32 keys) .

The key lengths spans from 3 keys in the experimental range key with
algo id 103 of 224 bits to 32,768 bits (3 keys, two of which are RSA
and one DSA). Due to the low occurrence of ECC keys (that have an
expectation of lower key lenghts for similar expected security levels
- -  normally in the 256-521 bit range, although there is a strong
possibility that the aforementioned 224 bits keys should also fit in
this category) I have not done any adjustment for these. A full 77.4%
of the keys are included when looking at the aggregate figures up to
and including 1024 bits, roughly 2.7 million of the keys, and the
corresponding number when looking at a 2048 and 4096 bits respectively
are 95.3% and 99.95% of all keys included.

Endnotes:
[a] sksstats is available as a patch to the current SKS tip in my
mercurial queue at
https://bitbucket.org/kristianf/sks-keyserver-patches/src/tip/SKSStats?at=default

References:
[0] http://blog.sumptuouscapital.com/2014/01/openpgp-key-statistics/
- -- 
- 
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- 
Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- 
Acta est fabula
So ends the story
-BEGIN PGP SIGNATURE-
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=XRAs
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread Robert J. Hansen

Well, it could be semi-automatic. I'm only talking about persona
certifications, which appear to be understood as verifying that the key
and the email address are under the control of the same person.


I suspect the majority of GnuPG and PGP users could not tell you what  
a persona-level verification means.  Saying they appear to be  
understood as X appears to me to be a dangerous bit of conjecture.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread Johannes Zarl
On Wednesday 29 January 2014 10:52:26 Robert J. Hansen wrote:
> > Well, it could be semi-automatic. I'm only talking about persona
> > certifications, which appear to be understood as verifying that the key
> > and the email address are under the control of the same person.
> 
> I suspect the majority of GnuPG and PGP users could not tell you what
> a persona-level verification means.  Saying they appear to be
> understood as X appears to me to be a dangerous bit of conjecture.

Since gnupg does equate trust level 1/persona certification to an untrusted 
one, that should not be a problem IMO.

I like how this idea could mirror a "natural" web of trust - given proper MUA 
support.
Under the assumption that an attacker can't reliably do a MITM attack on every 
message that is sent over an extended time period, you would place almost no 
trust in a fresh persona-certified key, but high trust in an old and 
frequently encountered key. The trust would grow with time (just like the 
trust into someone you know in real life).


Cheers,
  Johannes

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: BoF at FOSDEM ?

2014-01-29 Thread Bernard Tyers - ei8fdb
Hello all,

I’ll be attending FOSDEM, and would be very interested in that.

My interest in general is usability of PETs in general, mainly GPG and OTR 
enabled IM. I am interested in talking about a redesign of the HKP web 
interface presented to users. 

From reading the RFC it seems relatively straight forward in terms of 
interactions and so I’d like to make is slightly more informative to the lay 
GPG user.

Saturday seems like a good day.

All the best,
Bernard

--
Bernard / bluboxthief / ei8fdb

If you’d like to get in touch, please do: http://me.ei8fdb.org/






signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread Gregor Zattler
Hi nb.linux,
* nb.linux  [29. Jan. 2014]:
> Gregor Zattler:
>> * Steve Jones  [24. Jan. 2014]:
>>> Which reminds me that I'd really like an email client that
>>> automatically signs keys at level 1 (persona) of anyone who replies
>>> with a signed email that quotes a significant portion of the text I
>>> sent, as this effectively counts as a challenge response protocol in my
>>> book.
>> 
>> That's an interesting idea.  But there is still the possibility
>> of a man in the middle attac...  The web of trust is supposed to
>> counter MITM attacks by signing keys only if the verification was
>> done directly (no middle person).
> 
> maybe you already discussed that, but what about sending someone an
> encrypted email (with the challenge) and wait for an encrypted reply
> with the signed challenge? (as you seem to talk only about sending a
> clear text challenge)

This would not help against a MITM -Attack.  I want to send you
an email, email program fetches a key with uid nb.li...@xandea.de
from the server, evil organisation intercepts this, sends me key
with uid nb.li...@xandea.de, I send a challenge encrypted to this
key, evil organisation decrypts it rencryts it to you key, sends
it to you, you sign-reply to my encrypted challenge, evil
organisation intercepts it...

> Personally, I don't want such behaviour. When I'm making a
> certification, then it's me doing it manually as I have the
> responsibility. I don't want some program to be able to make automatized
> certifications with my key.

me too.


Ciao; Gregor

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Wednesday 29 January 2014 at 7:57:12 PM, in
, Johannes Zarl wrote:


> Under the assumption
> that an attacker can't reliably do a MITM attack on
> every message that is sent over an extended time
> period

Why would that be assumed? In a corporate setting the MITM could be
placed within the company's network, for a home user their ISP or
email provider could be used, and for mobiles, the phone network.



> , you would place almost no trust in a fresh
> persona-certified key, but high trust in an old and
> frequently encountered key.

The older the key, the greater the opportunity for compromise.



> The trust would grow with
> time (just like the trust into someone you know in real
> life).

If a person I knew well in real life were "compromised" they are
likely a poor enough actor for it to be easily-noticed.




- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

The second mouse gets the cheese
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlLplxVXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5p/PAEAMLzMDuW9+rogvLcrYKTKPZOZDyfj3CwaG+l
h5IjlkH1I+wsYooLti/c8hBklE1RxHXlbDjnmjph88IAK2+hHvBtC+HUra+2BZbp
KxDeYvthnSeeZ7R1Ry3yX9c7OUO4J2xAZPCVTFmmBoX06jf/nBBHQGAelmnrTF5L
dXkfQPTu
=8zBv
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Wednesday 29 January 2014 at 5:24:36 PM, in
, Steve Jones wrote:



> Well, it could be semi-automatic. I'm only talking
> about persona certifications, which appear to be
> understood as verifying that the key and the email
> address are under the control of the same person.
> Having your mail client being able to determine that
> the key and the email address seem to match and
> offering you a one click (plus passphrase) option to
> verify that fact would be nice.

So long as the certification applied were only a local signature, I
see a niche for this functionality (and the individual user can invest
the resulting local signatures with any meaning they wish). As soon as
those signatures are exported, it dumps more "noise" to the web of
trust for no obvious gain.


- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Don't talk unless you can improve on the silence
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlLpmmxXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pz1QD/1VQrX52KpK/kNfsZl4A3QZJWYN2CznnaZo+
d1D4y8OZ4zcQOh2fCsraR8sXHU5/U6ctgpX7sBT9BbTYFCI1zAkkpRGR3iTpXDFy
RpzJ3B9LamYlS5GYR8EjK+n/wKVbPn44WcwCx17mampyk2QLq5j+g4W+xynvPc5G
6OESu2eg
=8u5b
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Non email addresses in UID

2014-01-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Tuesday 28 January 2014 at 11:37:25 PM, in
, Steve Jones wrote:


> A more sophisticated approach
> would be for OpenPGP to include a new signature type
> for this purpose.

There are already more than enough signature types. Wouldn't this lend
itself quite well to using a signature notation?



- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

The greater the power, the more dangerous the abuse.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlLpmzZXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pOPoD/jfjg+2GAHzjy9XPrU7b5LR+HZuCNpP2nzcC
EImp/7oEuWTEV1l/9nuUcK9mXzt0JSOsDvALilC9HEvhW82y3vj0kPWh3oz0BCo1
uo2W+n5Q8GDRsIBDXYKkHyBIwJKac2Z++QURPcADdYtf+IJchEJP2KUcbbk5UOtq
nw75NoVs
=nY4e
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Non email addresses in UID

2014-01-29 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Friday 24 January 2014 at 11:08:16 PM, in
, Steve Jones wrote:


> I'd really like an email client
> that automatically signs keys at level 1 (persona) of
> anyone who replies with a signed email that quotes a
> significant portion of the text I sent

I'm guessing you would want the automation to skip keys that signed
messages messages that were replies to your mailing-list postings.


- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Live your life as though every day it was your last.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlLpnC5XFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pSAgD/3eJUrZAsUf3C7geT9RhaHNkSyAf9gUvkCMg
zymBKAfLuYmuACEdKsRgrgOQfkfE53dNBEHvRb2FAs+TCexut3y+qTxsA8/3dbMp
pxaFnKuwubc9bUAXfAgzK1BsjMiq6zo7zjD0+1sKXDvgyuGMfL/YxqpH03VPXyyR
9JkWdZDr
=RuXo
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MUA "automatically signs keys"?

2014-01-29 Thread Steve Jones
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, 30 Jan 2014 00:04:17 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> 
> Hi
> 
> 
> On Wednesday 29 January 2014 at 7:57:12 PM, in
> , Johannes Zarl wrote:
> 
> 
> > Under the assumption
> > that an attacker can't reliably do a MITM attack on
> > every message that is sent over an extended time
> > period
> 
> Why would that be assumed? In a corporate setting the MITM could be
> placed within the company's network, for a home user their ISP or
> email provider could be used, and for mobiles, the phone network.

The advantage you have here though is the web of trust. 1 level 1
signature would probably be not enough, but 5, 10, 100..? There comes a
point where you have to decide that a certain level of security is good
enough. An attacker that can MITM not only your communications with the
key server and your emails but that of all your friends can probably do
a lot more than just MITM communications - like insert custom hardware
into the supply chain rendering software based security useless.

> > , you would place almost no trust in a fresh
> > persona-certified key, but high trust in an old and
> > frequently encountered key.
> 
> The older the key, the greater the opportunity for compromise.

Yes, I'd say it's the number of signatures rather than their age which
would lend trust.

> > The trust would grow with
> > time (just like the trust into someone you know in real
> > life).
> 
> If a person I knew well in real life were "compromised" they are
> likely a poor enough actor for it to be easily-noticed.

Maybe, a lot of compromised actors have gotten away with it for a long
time. But that's a different story, all the trust in a person's key and
identity is useless if they're secretly working against you.

- -- 
Steve Jones 
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC  4272 2AC8 A680 7167 C896
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJS6aPEAAoJEEgVHtdrBwIA3cMIAOR684K06OPgZP30NeK7qu3u
fdP9tq8TkwsIBRdZBFEgR6wkp9YfCu4+qGVqutn4txC+4qyVzbfhMDDFGb17DNHL
PVZ3LS0w2jjjpYxU6GUbU6icn4otzqU7GUqsWjQxkjUvDeKW4vuuiz75+dLiXi5B
8SttzmogWzAazVtTVMk4h0PE3dDb8mfWuv02h/BhemfMeN10VT6YJfBhSqmevTiw
4An+GEmvMbtH0lPPRQHtTNvsz632Szp/6I3LObnDKrQWUtPVITqx8cPL3HXC0ozz
BwMCaPLDlKO69qnhuzoaqkHBfJ4UuXTKBwfiI9+cmxiFUvyphYm6LBaw7ZmSnNQ=
=WDKc
-END PGP SIGNATURE-
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Non email addresses in UID

2014-01-29 Thread Steve Jones
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, 30 Jan 2014 00:22:08 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:

> On Tuesday 28 January 2014 at 11:37:25 PM, in
> , Steve Jones wrote:
> 
> 
> > A more sophisticated approach
> > would be for OpenPGP to include a new signature type
> > for this purpose.
> 
> There are already more than enough signature types. Wouldn't this lend
> itself quite well to using a signature notation?

Yes, in fact a policy url may be even more appropriate.

- -- 
Steve Jones 
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC  4272 2AC8 A680 7167 C896
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJS6aWPAAoJEEgVHtdrBwIARAsH/18vWhC4H+9HZlf+t8/ITrkr
gqs4nV9M30M3k3o6d/Zj0eCn15Wj0cuaAem5o3oW/owXmvaM1GBkkoqDcnNlfN8S
SQwKqNW01KuFYYel9fa37ahgM6I6LrgeRj6R24MehNN1tzPas8RTCJb+WcGgaROY
9niJF0LlgqhHEptvvBgrzMRV5LY6/gXOkLULohyhG7Md4tud98TAPD68hUo/A+in
wVWBnIu/Gjjva29Je5l68l40AhCRclCA6Jg2qV7pSqexkQMXHS6aJcTKuj64TKc6
u2UdUtQq+XdeP6/k3jGhTuMkxcZtq0p41RK4KTqLYF1F09e9EOq7bUK1Mtd02Ps=
=Zaxx
-END PGP SIGNATURE-
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Setting up shared access to gpg on a UNIX server

2014-01-29 Thread DUELL, BOB
Hi,

I'm looking for advice and comments about how I have set up a "shared" 
environment on our UNIX server for gpg operations.  What I have certainly works 
but I thought I'd ask for any comments, suggestions, or criticism.

I have gpg version 1.4.14 installed on my server.

I have a large number of users who exchange encrypted files with external 
vendors.  Users in my group come and go all the time.  On my server, I created 
a directory named /opt/app/apps/dbmprod/gpg and set the permissions to global 
access (777).  In that directory, I created a gpg instance and created a 
"group" key without a passphrase (DBMktg).  The public key is sent to each 
vendor as an email attachment when we establish the file exchange procedure.

I also added the public keys from all our vendors.  I set the permission on all 
the files in this directory to allow global "read" access (744). 

Set up this way, any use on the system can decrypt a file intended for use 
using a command like this:

gpg --homedir /opt/app/apps/dbmprod/gpg --batch --no-tty --quiet 
--local-user "DBMktg"
--output 
--decrypt 

And to encrypt a file to a particular vendor, we use this:

gpg --homedir /opt/app/apps/dbmprod/gpg --batch 
--recipient 
--encrypt 

As I said, this has worked well for use for several years. The main advantage 
is that I don't need to teach any of the other users about gpg and have a 
central point to contain all the keys from the many vendors we support.  I only 
need to show users the above two command sequences and they can go on about 
their business.

I suppose that my use of a private key without a passphrase might be of some 
concern, but I never figured out a better way to do this.  In other words, if 
the single key required a passphrase, I'd have to give out that passphrase to 
everyone, so what would be the point?

I will appreciate any and all comments.  If there is a "better way" to do this, 
I'd love to learn.

Bob


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Setting up shared access to gpg on a UNIX server

2014-01-29 Thread NdK
Il 30/01/2014 02:14, DUELL, BOB ha scritto:

> I will appreciate any and all comments.  If there is a "better way" to do 
> this, I'd love to learn.
Every user in the group could "leak" the secret key. At least put it
into a smartcard/token connected to the server: they'll just be able to
*use* it.

BYtE,
 Diego.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Setting up shared access to gpg on a UNIX server

2014-01-29 Thread Daniel Kahn Gillmor
On 01/30/2014 01:59 AM, NdK wrote:
> Il 30/01/2014 02:14, DUELL, BOB ha scritto:
> 
>> I will appreciate any and all comments.  If there is a "better way" to do 
>> this, I'd love to learn.
> Every user in the group could "leak" the secret key. At least put it
> into a smartcard/token connected to the server: they'll just be able to
> *use* it.

Every user in the group could also destroy the secret key, if the
directory itself is still mode 777 -- write access on a directory means
you can unlink files from that directory, even if you don't have write
access to those files in particular.

A user just has to do:

 rm /opt/app/apps/dbmprod/gpg/secring.gpg

and it seems likely that you will be unable to decrypt any further
messages (unless someone has already leaked the secret key as NdK
suggests, in which case maybe you could ask them for a copy :P)

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users