keyserver queries over TLS [was: Re: auto refresh-keys]

2010-06-20 Thread Jameson Rollins
On Sun, 20 Jun 2010 02:50:41 +0100, MFPA wrote: > > So in order to be safe you need additional CPU load > > either for TLS or for signing. Signing is superior IMHO > > because it allows reuse of the data (one crypto action > > (covering less data) for several users vs. one for each > > user with T

Re: auto refresh-keys

2010-06-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Sunday 20 June 2010 at 1:14:59 AM, in , Hauke Laging wrote: > So in order to be safe you need additional CPU load > either for TLS or for signing. Signing is superior IMHO > because it allows reuse of the data (one crypto action > (covering

Re: auto refresh-keys

2010-06-19 Thread Hauke Laging
Am Samstag 19 Juni 2010 13:36:15 schrieb MFPA: > > Sending to several keyservers does not help if the MitM > > attack point is on your side. > > Even if you send the key over an encrypted connection to a server? For > example https://pgp.webtru.st/ No. Thus I wrote: "If your keyservers don't sup

Re: auto refresh-keys

2010-06-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Saturday 19 June 2010 at 12:36:15 PM, in , I wrote: > Hi > On Friday 18 June 2010 at 8:13:52 AM, in > , > Hauke Laging wrote: >> but this is about the share of file URLs in the >> keyring not the number of file URLs against the number >

Re: auto refresh-keys

2010-06-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Friday 18 June 2010 at 8:42:31 PM, in , David Shaw wrote: > When I wrote the new keyserver stuff, I thought about > this sort of thing, but the lack of a good way to store > metadata was a problem (the keybox fixes this), as well > as the co

Re: auto refresh-keys

2010-06-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Friday 18 June 2010 at 8:42:39 PM, in , David Shaw wrote: > The danger here is that it might take a long time > (minutes+) to realize that the keyserver and/or network > wasn't going to cooperate. This could seriously slow > down many GPG op

Re: auto refresh-keys

2010-06-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Friday 18 June 2010 at 8:13:52 AM, in , Hauke Laging wrote: > but this is about the share of file URLs in the keyring > not the number of file URLs against the number of > alternative key servers. My guess would be maybe 1-2% of my keyring.

Re: auto refresh-keys

2010-06-18 Thread Doug Barton
On 06/18/10 12:42, David Shaw wrote: The danger here is that it might take a long time (minutes+) to realize that the keyserver and/or network wasn't going to cooperate. This could seriously slow down many GPG operations. I've been following this discussion with interest as I've seen proble

Re: auto refresh-keys

2010-06-18 Thread David Shaw
On Jun 14, 2010, at 7:58 PM, MFPA wrote: > On Monday 14 June 2010 at 5:50:32 PM, in > , Daniel Kahn Gillmor wrote: > > >> Network or keyserver failures during an auto-refresh >> should be accepted and the rest of the operation should >> continue (though the last-refreshed time shouldn't be >> up

Re: auto refresh-keys

2010-06-18 Thread David Shaw
On Jun 14, 2010, at 12:50 PM, Daniel Kahn Gillmor wrote: > On 06/04/2010 01:35 PM, Micah Anderson wrote: >> It seems like the best solution would be to build into gnupg the >> functionality >> that is similar to the automatic trust database operation: have gpg >> auto-refresh >> from the configu

Re: auto refresh-keys

2010-06-18 Thread Hauke Laging
Hello, Am Freitag 18 Juni 2010 02:10:22 schrieb MFPA: > I don't know how common or uncommon it might be. I just know that, of > the keys in my keyring of about 400 keys, I have noticed more > deviations away from my default keyserver to key.asc files than to > alternate keyservers. but this is a

Re: auto refresh-keys

2010-06-17 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 17 June 2010 at 9:14:55 PM, in , Hauke Laging wrote: >> A key may be sitting on a non-synchronising server >> that has not been modified at all recently but >> contains certifications not on my local copy. The key >> has not change

Re: auto refresh-keys

2010-06-17 Thread Hauke Laging
Am Donnerstag 17 Juni 2010 21:23:40 schrieb MFPA: > > A different approach might save even more bandwidth: > > Most keys do now change often. It is useless to > > download a key that has not changed. > > A key may be sitting on a non-synchronising server that has not been > modified at all recent

Re: auto refresh-keys

2010-06-17 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 16 June 2010 at 8:26:11 PM, in , Hauke Laging wrote: > Am Mittwoch 16 Juni 2010 19:10:17 schrieb Daniel Kahn > Gillmor: >> Do you have other suggestions? We should consider >> bringing a prioritized form of these to the sks-deve

Re: auto refresh-keys

2010-06-16 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 16 June 2010 at 6:10:17 PM, in , Daniel Kahn Gillmor wrote: > On 06/16/2010 01:03 PM, MFPA wrote: >> What sort of alternate fetch requests do you envision? >> Fetch-minimal? Fetch-no-photos? > I was considering the same heuristic

Re: auto refresh-keys

2010-06-16 Thread Hauke Laging
Am Mittwoch 16 Juni 2010 19:10:17 schrieb Daniel Kahn Gillmor: > Do you have other suggestions? We should consider bringing a > prioritized form of these to the sks-devel list. A different approach might save even more bandwidth: Most keys do now change often. It is useless to download a key tha

Re: auto refresh-keys

2010-06-16 Thread Daniel Kahn Gillmor
On 06/16/2010 01:03 PM, MFPA wrote: >> Plus, if we can demonstrate that GnuPG cares about >> minimizing costs to the user in terms of disk space, we >> also stand in a better rhetorical position to encourage >> development (or adoption) of alternate keyserver fetch >> requests that could apply simi

Re: auto refresh-keys

2010-06-16 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 15 June 2010 at 1:46:30 AM, in , Daniel Kahn Gillmor wrote: > On 06/14/2010 07:54 PM, MFPA wrote: >> On Monday 14 June 2010 at 6:19:58 PM, in >> , Daniel Kahn Gillmor wrote: >>> The goal, again, is to avoid auto-refresh from chewing

Re: auto refresh-keys

2010-06-15 Thread Werner Koch
On Mon, 14 Jun 2010 18:50, d...@fifthhorseman.net said: > here's a proposal: gpg could keep track of the last time it refreshed > any given key from a public keyserver. when the user tries to use that That is one of the reasons why we should move away from the pubring.gpg format. The new keybox

Re: auto refresh-keys

2010-06-14 Thread Daniel Kahn Gillmor
On 06/14/2010 07:54 PM, MFPA wrote: > On Monday 14 June 2010 at 6:19:58 PM, in > , Daniel Kahn Gillmor wrote: >> The goal, again, is to avoid auto-refresh from chewing >> up too much space on the local disk. > > Although, of course, the certifications are all part of OxDECAFDAD.asc > and therefore

Re: auto refresh-keys

2010-06-14 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Monday 14 June 2010 at 5:50:32 PM, in , Daniel Kahn Gillmor wrote: > Network or keyserver failures during an auto-refresh > should be accepted and the rest of the operation should > continue (though the last-refreshed time shouldn't be > up

Re: auto refresh-keys

2010-06-14 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Monday 14 June 2010 at 6:19:58 PM, in , Daniel Kahn Gillmor wrote: > On 06/14/2010 12:50 PM, Daniel Kahn Gillmor wrote: >> * discard all certifications which are larger than some > sorry, this thought didn't get finished. it should > hav

Re: auto refresh-keys

2010-06-14 Thread Daniel Kahn Gillmor
On 06/14/2010 12:50 PM, Daniel Kahn Gillmor wrote: > * discard all certifications which are larger than some sorry, this thought didn't get finished. it should have said: * discard all certifications which are larger than some pre-defined value (e.g. do no not bother processing certifications t

Re: auto refresh-keys

2010-06-14 Thread Daniel Kahn Gillmor
the rest of the operation should continue (though the last-refreshed time shouldn't be updated). What if the network and keyserver are both available, but the keyserver has never heard of the key in question? > Users should have the capability to configure in > their gpg.conf a 'no-aut

Re: auto refresh-keys

2010-06-08 Thread micah anderson
On Fri, 4 Jun 2010 19:55:37 +0200, Benjamin Marwell wrote: > Sounds good to me. Another consideration would be to pass this task to > gui frontends, like kleopatra or seahorse. A warning printed out by > gpg would be a good idea, too. Also, there should be a severe warning > if you sign a key, w

Re: auto refresh-keys

2010-06-08 Thread Benjamin Marwell
such as no network at all, keyserver down, or slow? There should > probably be a low timeout to not cause user annoyance, but also some sort of > indication/warning that when a keyserver update could not be performed that > the > key is potentially out of date. Users should have the ca

RE: auto refresh-keys

2010-06-04 Thread Sonja Michelle L. Thomas
icah Anderson Sent: Friday, June 04, 2010 12:35 To: gnupg-users@gnupg.org Subject: auto refresh-keys I filed this today at https://bugs.g10code.com/gnupg/issue1235 but I wanted to send it to the list to get wider discussion about the idea. If you do not regularly refresh your public keys from ke

auto refresh-keys

2010-06-04 Thread Micah Anderson
ld not be performed that the key is potentially out of date. Users should have the capability to configure in their gpg.conf a 'no-auto-refresh-keys' variable if they do not want this functionality. Perhaps even some sanity checking on the data that is coming in would be good to guard