On Nov 30, 2008, at 11:40 PM, Robert J. Hansen wrote:

Myckel Habets wrote:
The person who said to me that the key validates as bad uses the PGPkeys
program from the PGP corporation software (version 6.58, last version
that was released when Phil Zimmerman worked there, he doesn't trust
later versions) to do the validation.

This is factually untrue.

Phil Z. left PGP Security, a branch of Network Associates, in early
2001. This would've been just after the PGP 7.1 release. Phil himself
has sworn to the solidness of the PGP 7.0 and 7.1 releases.  Despite
there being no source release, most people -- myself included --
consider Phil's word to be good.

Network Associates shut down PGP Security in early 2001.  PGP
Corporation was formed as a completely separate business entity which
purchased the desktop PGP products from Network Associates. Most of the key players from PGP Security came on board at the new PGP Corporation.

Phil Z. has officially left PGP Corporation to pursue other interests,
if memory serves.  This doesn't surprise me in the least.  After a
decade and a half at the same job, he's entitled to do other things. As
of late, secure internet telephony has been his object of interest.
That said, Phil is still in close contact with many of the principal
people at PGP Corporation.

1) What is causing this problem? Is my key really bad or is this an
incompatibility between PGPkeys version 6.58 and GPG?

Toyota has a philosophy that when investigating failures, one should ask
"why?" multiple times.

Q.  Why is this failure occurring?
A.  Your friend is using an antique version of PGP.

Q.  Why is your friend using an antique version of PGP?
A.  Your friend doesn't trust versions Phil hasn't worked on.

Q.  Why does your friend mistakenly think Phil hasn't worked on
   7.0 and later versions?
A.  ... I don't know.  You may want to look into this.


As far as engineering maxims go, the Toyota school of thought is pretty
good.  Find the deepest level of failure and fix that, rather than
fixing superficial problems.

I think that last question is irrelevant, as it follows from the "doesn't trust versions that Phil hasn't worked on", which makes it derived from a false premise. It does not matter whether Phil has worked on 7.0 and later, or indeed any version of PGP, because Phil being involved does not ipso facto cause PGP to be good (for whatever value of "good" you like). If the equation is "Phil involved == good PGP", and "Phil not involved == bad PGP" then the battle for making intelligent decisions about PGP has been lost from the start. Phil is a good guy, and he did start something huge, but his involvement is not magic pixie dust that causes crypto goodness to spring into being.

Other people have suggested convincing your friend to use a more recent version of PGP, or a recent version of GnuPG. It's good advice, as far
as it goes.  I think the problem goes deeper than that, however.

I think it does as well. Once upon a time, I spent a lot of hours coding various workarounds in GnuPG for old versions of PGP. This is where the --pgp2, --pgp6, --pgp7, etc, flags in GnuPG came from. Now, years later, I sometimes wonder if I made a mistake. Perhaps it would have been wiser to bite the bullet and let these things break.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to