-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

All, please forgive the cross-posting, I haven't been following any of 
these lists recently, but have a vested interest in this conversation 
and would like to be CC'd on this thread in the future.

First, can somebody please send me a reference for this alleged "Robot 
CA" article so I can read it.

Second, since there appears to be some interest in addressing "informal 
key exchange," I'd like to propose a simple and effective solution - The 
Semiautomatic Web of Trust (SWOT).

SWOT extends the existing PGP Web of Trust by making keysigning far more 
promiscuous.  Based on the tenet that we build trust in keys by using 
them, SWOT calls for PGP implementations to track the usage of a key, 
and at some user-defined threshold, sign the key (with an attribute that 
indicates it was signed in this manner).  At some other user-defined 
threshold, my client can upload this signed key to the keyservers.  In 
this way, the web of trust will be expanded extensively without 
requiring much if any user intervention.  The existing key-exchange 
protocols (reading fingerprints) are always available to those who need 
them.

I also look forward to redeployment of Stuart Stubblebine's PGP 
Pathfinder or equivalent.  A graphical representation of the degrees of 
separation in PGP goes a long way toward increasing usability of this 
lossy web of trust.

I support the standardization of a X-My-PGP-Key type mail header, though 
clients should be able to go find keys based on signatures anyway.

On Fri, Dec 07, 2001 at 11:42:26PM -0800, Seth David Schoen wrote:
> (1) What's the best design for an "informal key exchange" scheme in
> which active MITM attacks may be permitted, but privacy against
> passive wiretapping (as well as trivial impersonation attacks) is
> maintained?  How can this be implemented with the smaller amount of
> user interface, while maintaining the largest amount of compatibility
> in both directions with existing e-mail privacy systems for
> sophisticated users?

The Semiautomatic Web of Trust is the solution you seek!  If you don't 
agree, please tell me why.

> (2) What's the best way to get such a system designed and deployed to
> the general public?  How can an organization like EFF best help
> accomplish this?  Whose help do we need?

My goal is to produce a best practices RFP that defines an attribute in 
OpenPGP for this purpose, and then seek support from the various 
implementers of OpenPGP.  I think the EFF is well situated to garner 
support from these developers by supporting SWOT as a means of improving 
PGP usability.

Let the flames begin, but don't forget to CC me directly.

Thanks, pablos.
- --
Paul Holman
Kadrevian Nonlinear Accelerator
[EMAIL PROTECTED]
415.420.3806
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (Darwin)
Comment: For info see http://www.gnupg.org

iD8DBQE8GbqeiOayAT9atWkRArn5AJ48+/hNYUfdIwTDqEEpy40WPYhI3wCdEym9
ez63byZ6ELj21PzODuwCusg=
=aK3S
-----END PGP SIGNATURE-----

Reply via email to