-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 10/06/12 14:59, Sam Smith wrote: > > Okay. So please let me know if I understand correctly what I am supposed to > do (or what you guys are recommending be done) with key signing: > > I downloaded the GnuPG program and ran gpg --verify. I am told the keyID that > signed the program. I download that KeyID from a keyserver. I now ask people > on this list to verify the fingerprint of the key I got from the keyserver as > a legit key. (So far this behavior is okay, right)? Since people on this list > verified the fingerprint, I have enough confidence to verify the GnuPG > program with the key. BUT I do not have enough confidence to mark the key > (the one I got from the keyserver) as Trusted or to Sign the key because I > have not met with Werner Koch in person and seen credentials. > > Summation of Proper Key Signing Behavior: > > 1.) I should NOT sign a key as trusted unless I have actually met with the > person and seen his/her credentials. I can sign if I KNOW the person and > verify the fingerprint with that person. But even these situations run the > risk of dealing with a "secret agent." > > Applying this rule, since I have not met Werner Koch, I should not sign his > key. Verifying the fingerprint on a downloaded key is enough to use the key > to verify software, but it's not enough to actually trust and sign the key. > Hence using it to verify runs some risk because the key is not totally > trustworthy. > > Every time I use Werner Koch's key to verify a GnuPG program, I will get the > warning that I am verifying with an untrusted key. You guys all get this > warning because all of you are also not signing keys (even if you've verified > the fingerprint with others) because you have not met with all the people > needed in order to sign all the keys you have. Right? You guys all get this > warning whenever you "gpg --verify", right? > > In short, I should always be seeing the notice that I have verified using an > untrusted key when using Werner Koch's key unless/until I actually meet him > and see credentials. The only time you guys don't see this notice when > verifying a key is when you use a key that you have actually met the signer > of face to face, right? > > > Do I understand correctly. Is this all accurate? With this behavior, would I > be doing Best Practices and what you guys all do? > > > Thanks for the instruction, guys. I appreciate the time and energy you guys > spent writing the emails to me. means a lot to me. > > >> Date: Sat, 9 Jun 2012 06:09:54 +0100 >> From: da...@gbenet.com >> To: smick...@hotmail.com >> CC: gnupg-users@gnupg.org >> Subject: Re: can someone verify the gnupg Fingerprint for pubkey? >> > On 08/06/12 22:41, Sam Smith wrote: >>>> >>>> Another thing is that downloading the key from that link you provided is >>>> no guarantee of safety in and of itself either because the page is not >>>> being hosted over SSL with confirmed identity information. So technically >>>> there's no guarantee I'm actually interacting with teh GnuPG.org website. >>>> >>>> >>>> >>>>> Date: Thu, 7 Jun 2012 05:23:43 +0100 >>>>> From: da...@gbenet.com >>>>> To: gnupg-users@gnupg.org >>>>> Subject: Re: can someone verify the gnupg Fingerprint for pubkey? >>>>> >>>> On 07/06/12 00:15, Sam Smith wrote: >>>>>>> yes, impersonation of the UID [Werner Koch (dist sig)] is what I'm >>>>>>> trying to guard against. >>>>>>> >>>>>>> My efforts to verify the fingerprint are the best way to do this, >>>>>>> correct? >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>>> Date: Wed, 6 Jun 2012 21:54:01 +0200 >>>>>>>> From: pe...@digitalbrains.com >>>>>>>> To: gnupg-users@gnupg.org >>>>>>>> Subject: Re: can someone verify the gnupg Fingerprint for pubkey? >>>>>>>> >>>>>>>> On 06/06/12 17:58, Mika Suomalainen wrote: >>>>>>>>>> D869 2123 C406 5DEA 5E0F 3AB5 249B 39D2 4F25 E3B6 >>>>>>>>> Looks correct. >>>>>>>>> >>>>>>>>> ``` % gpg --recv-keys D8692123C4065DEA5E0F3AB5249B39D24F25E3B6 gpg: >>>>>>>>> requesting key 4F25E3B6 from hkp server pool.sks-keyservers.net gpg: >>>>>>>>> key >>>>>>>>> 4F25E3B6: public key "Werner Koch (dist sig)" imported >>>>>>>> >>>>>>>> I agree it appears he has the correct key. I did a local sig on it >>>>>>>> after what >>>>>>>> checking I seemed to be able to do without meeting people in person. >>>>>>>> >>>>>>>> But it's a bit unclear to me on what basis you decided it looked >>>>>>>> correct? Your >>>>>>>> mail suggests to me that you decided that based on the fact that the >>>>>>>> UID on >>>>>>>> that key is "Werner Koch (dist sig)". But that would be the very first >>>>>>>> thing a >>>>>>>> potential attacker would duplicate in his effort to fool our OP. Even >>>>>>>> if he's >>>>>>>> using MITM tricks to subvert his system, he can still post his >>>>>>>> personally >>>>>>>> generated key to the keyserver with this UID. >>>>>>>> >>>>>>>> Peter. >>>>>>>> >>>>>>>> PS: I briefly considered signing this message, because the attacker >>>>>>>> might MITM >>>>>>>> my message to the OP. Then I realised what good that signature would >>>>>>>> do :). >>>>>>>> >>>>>>>> -- >>>>>>>> I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. >>>>>>>> You can send me encrypted mail if you want some privacy. >>>>>>>> My key is available at http://wwwhome.cs.utwente.nl/~lebbing/pubkey.txt >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> Gnupg-users mailing list >>>>>>>> Gnupg-users@gnupg.org >>>>>>>> http://lists.gnupg.org/mailman/listinfo/gnupg-users >>>>>>> >>>>>>> >>>>>>> _______________________________________________ >>>>>>> Gnupg-users mailing list >>>>>>> Gnupg-users@gnupg.org >>>>>>> http://lists.gnupg.org/mailman/listinfo/gnupg-users >>>> >>>> Sam, >>>> >>>> You are a little confused - you ask ask "can some one verify the gnupg >>>> fingerprint for >>>> pubkey" and you use Verners key to verify gnupg. Then you worry about >>>> impersonation - now >>>> clearly Verner and gnupg have different keys. Or don't you know that? >>>> >>>> Clearly you failed to follow my link and clearly you failed to check the >>>> public key for >>>> gnupg. Now being a little confused try and get a clear question in your >>>> mind - is it >>>> Verner's key that you have such a passion to verify or gnupg? >>>> >>>> Verner's had about three keys two of which have expired - to the best of >>>> my knowledge he's >>>> a real person - he even maintains this list. You could always try >>>> encrypting an e-mail to >>>> his public key asking him if he's a real person. I'd suggest you not do >>>> the same for the >>>> public key of gnupg. >>>> >>>> People generate a private and a public key imaginary people don't do this >>>> - granted some one >>>> can set up a false ID and create a set of keys - but though they have >>>> created a false ID to >>>> do so they are nevertheless real people. >>>> >>>> If you are so concerned about Verner's key why not take a trip to Germany >>>> and arrange to >>>> meet him? You can't meet the gnupg (as its a bit of software) but you can >>>> verify it's >>>> running on your computer. >>>> >>>> All your keys are "untrusted." Everyone of them - apart from your own >>>> public key. They all >>>> remain so until you actually meet that person and verify that they are who >>>> they say they >>>> are. You carefully check their passport their driving licence. >>>> >>>> But gnupg has not got a passport or a driving license. The only way you >>>> can check if gnupg >>>> is real is to check if it's running on your computer gpg --version - this >>>> will tell you if >>>> you have the software installed. If it's installed and working correctly >>>> it must be real. >>>> >>>> What if that fails? Well you do the same thing gpg2 --version and hope >>>> that Verner does not >>>> pop up and say "Hello." >>>> >>>> David >>>> >>>> >>>>> >>>>> _______________________________________________ >>>>> Gnupg-users mailing list >>>>> Gnupg-users@gnupg.org >>>>> http://lists.gnupg.org/mailman/listinfo/gnupg-users >>>> > Sam, > > You have to apply some logic - and some common sense. I have about 180 public > keys - all > apart from about 5 or 6 are untrusted. Now a lot of people have my public key > say 175 and > all those people have my public key marked as untrusted. > > The whole idea behind the web of trust is that you have met "real" people. On > the whole most > people are who they say they are - but with all systems you get people using > fake IDs. > > Now Werner Koch has a reality - he writes GPG4Win GNUpg and maintains this > list - but > because I've not met him (though I have exchanged e-mails with him) I have > not signed his key. > > Why? > > The whole principle underlining the web of trust is that you have met that > person in the > real world and to the best of your knowledge - they are who they say they are > and their > public key belongs to them. > > It is a principle of the whole system that you only sign people's keys. The > person comes > first - not the key. > > It's not the validity of keys but the validity of people. So in your every > day life you > accept that the train driver the bus driver the person behind the bar - your > wife and kids > are all living real and normal lives. Now, your wife and kids aare somewhat > different. You > married your wife and thus can trust she presented to you a real ID. You had > sexual > intercourse with this real person (your wife) and she as a result of that > intercourse > produced your kids. > > Your relationship to your wife and kids is special - you trust that they are > really real and > you believe it to be true. And why not? You wake up in the morning beside her > - you watch > your kids grow up. Now 20 years into your marriage you discover that your > wife's a secret > agent - Jane Brown - not the Mary Smith you thought you married - and that > were you thought > believed your kids sprung from your seed they were in fact from the milkman. > The reality - > the belief is she's still your wife and they are your kids - they have > behaved as such. > > > Most people are bound up with beliefs and behaviours. They interact with > others on a daily > basis sharing common values beliefs and behaviours. Under normal conditions > we don't ask > every one we meet for their passport driving license or DNA sequence. We > accept it as the > norm that people are real and valid - its the IDs they use which may or maybe > questionable. > > A spy may have say 6 IDs - the IDs are fictitious but the person is real. You > have lots of > family and friends - who they are - what they are changes overtime and > changes because of > the conditions under which you meet them - they could be a Father a > Professor - an Olympic > Javelin thrower - then Retired - then dead. All these are IDs - which govern > your > behavioural interaction with that person. What do you trust? That you hear > them speak? You > have shaken them by the hand? Gone down the pub with them? > > In truth we can not say that all these IDs are "real" neither can we say they > are "false." > But we interact with them and so build a reality of behaviours - sharing > common interests > and values and beliefs. Just like all these people on this mailing list. > People are real. > Though they may have many identities. > > It is common practice to accept people at "face value" - even if you only > "know" them from > being on a mailing list. It is by common interaction "communication" that one > reinforces > one's own belief systems and we accept the commonly held belief that we are > interacting with > a real person - we through our own perception then make judgements about that > person - we > like them or we don't - we admire and respect them or we don't we trust what > they have to > say or we don't. > > We make value judgements about real people - no matter what ID they present > to us. It's the > "face value" which is the key. Have we met the person? We affirm the reality > of people via > our social networking. Mary knows Bob - Bob knows Harry and Harry knows Mary. > You can ask > Bob and Harry to confirm that it is really is Mary that you are talking too. > We all can > confirm to some degree the reality of Werner Koch - by what he does. But I > have not met him > in any social network other than this and other mailing lists. > > So people on this mailing list "know" that Werner Koch is "real." You can > send him an > encrypted e-mail and if he has your public key reply to you. The "reality" is > we make people > "personal" to ourselves by interacting with them. If we don't interact we > don't build any > models in our minds. If say 5 people said that they had actually met Werner > in the flesh - > at face value - you would accept that Werner Koch was who he said he was. > > We assign material documents to give validity to real people. People come > first not the > documentation. A public key is such a document. A person may generate many > public keys - the > person is the real validity. You do not affirm a level of trust in the public > key. You > affirm a level of trust in the person. So all your public keys are > untrustworthy except for > those people that you have met. So even though I and many others have > exchanged e-mails with > Werner Koch his public key remains untrusted. > > Likewise you can not meet face to face with a bit of software though you may > affirm its on > your computer and you may affirm by interacting with it - the fact remains > the public key > remains untrustworthy. > > I have lots of keys - 98 per cent are "untrustworthy." It's normal. It is not > the same as > having the perception of an untrustworthy person - which is based on our > perception oof the > value system we place on their behaviours. A public key is a static document > - whereas > people - those that are alive have values belief systems and behaviours that > interact with > other human beings out of common interests and goals. Some people have a mind > set that says > "that person is real therefore their documents are real." Then they form > value judgements on > that documentation - to trust or not to trust - as though they were > interacting with real > people. > > In reality we can not judge the value of documents. In reality we can judge > the value of > people. We make value judgements about people all the time - based on their > interaction with > us - our mood - how we feel at any given time. We interpretate according to > our reality and > perceptions. > > What is our "reality" about public key encryption? The validation of public > keys? The > validation of real people? We almost forget why we want public key encryption > - so that only > the recipient can read our e-mails. The "recipient" is a person - their > public key is merely > a tool to which software on your computer can encrypt to their public key. > That's the only > reality a public key has. It is not a seal of authenticity - not a rubber > stamp. It has no > power vested in it as to give "authority." It is merely a means for secure > communications > over an insecure network. > > The web of trust - signing people's keys is based on people meeting face to > face and > interacting in a social network - it is not about the level of trust one has > in the public > key. A keys "validity" is it works. The validity is the recipient of an > encrypted message > can decrypt it. All keys are valid in this respect. They are in a sense all > trustworthy. All > keys do what they say they can do. Without any failure. So you need not set > any level of > trust on keys because they work perfectly. > > The "trust" is in the person - not the public key. So some would argue that > signing Werner's > key is crazy - has no logic and a miss-placed value system. I'd have to agree. > > David > > > Hello Sam,
First off - it's normal to have most of your keys as "untrusted." It does not matter how many other people have signed that public key - you have not met that person have not verified them vis some photo id and not met them in a social context. Most people are normal users of pgp - I suspect there are few secret government agents - not that they are likely to say so :) though some believe them to be everywhere. Gnupg works perfectly signing and setting a level of trust is to do with building the web of trust - and that is all about people. It is about holding key-signing parties - developing your social network of pgp users - through family friends work colleagues club members - and the wider world. To find out more visit http://gbenet.com/blog David - -- “See the sanity of the man! No gods, no angels, no demons, no body. Nothing of the kind.Stern, sane,every brain-cell perfect and complete even at the moment of death. No delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com/blog -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJP1Tw7AAoJEOJpqm7flRExupgH/0VfmtF6CBW6HVbz5nCSrVZA yEhzcSJquJkkEVlZN30poFQA2L6d7krJl5LYY9t5zpYBvN6v0kl/0aaU3aVjxxL7 OIL1OpH3GktUKashbtXPqEpb1N3VtoTeYJaSaguBuQHV3o6g/o+g+7kdauKlQWoq n9fbbdl61mDICn3RrELKVOrPYKz0W22NGHVjEbU8zq/Kvhz1vPD+ZyiwHj4xHx8D 1A7LqRA+yXQ07J5mNQbZt2//Vs7Q8INOXs1sGkbwkHUtQ0V68KpM//FaPaaMfhZz L1WVUMsDdM+c619cKPMNsD+14DhIVNi4hiCvasDRFv+QMclzEYNO9O4mx+lBqsk= =QF1U -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users