On Monday 27 July 2015 21:05:26 Ludwig Hügelschäfer wrote:
> Hi Ingo,
> 
> On 27.07.15 16:31, Ingo Klöcker wrote:
> > This whole concept of a whitelist of "trusted validation servers"
> > included in the email clients sounds a lot like the CA certificate
> > bundles included in browsers and/or OSes. Who is going to maintain
> > this whitelist?
> 
> Whilelists: The OpenPGP-aware clients. There aren't so many of them,
> so that's manageable.

Speaking for KMail how can I be sure that somebody who claims that his 
validation server can be trusted can actually be trusted and should therefore 
be added to the whitelist? KDE avoids this problem for the CA certificate 
bundle by relying on the certificate bundles provided by the Linux 
distributors or by Mozilla.


> > The email client developers? The OS manufactures? Who is going to
> > certify "trusted validation servers", i.e. who is going to tell
> > benign validation servers apart from malignant validation servers?
> 
> There is a community providing keyservers (such as
> pool.sks-keyservers.net). My impression is that this network is well
> maintained and has worked reliably the last years.
> 
> Why should there not be a similar community approach for setting up a
> (smaller) network of validating key server proxies.

Well, the keyservers do not make any claims with regard to the authenticity or 
the integrity of the keys. Those checks are left to the clients. I do not have 
to trust any of the keyservers.

The validating key server proxies claim validity of the UIDs (to a certain 
degree). I can see myself marking such a proxy as trusted by adding it to my 
gnupg.conf (or to KMail's configuration). But I cannot see myself adding such 
a proxy to the whitelist that's shipped with KMail.

Another problem I see with whitelist management is revocation in case the 
validation key of a validating proxy is compromised. Again, for the CA 
certificate bundles that's handled by the distributors and not by individual 
application developers.


> > I'd rather put my bets on a DANE-based approach like
> > https://datatracker.ietf.org/doc/draft-ietf-dane-openpgpkey/
> 
> DANE requires write access to DNS. I don't see that the average
> OpenPGP user has facilities and knowledge to achieve setting up the
> required DNS records. If you can't convince the big mail providers
> (e.g. Google, GMX here in Germany, ...) to provide a reasonable
> interface for their users, I'm afraid that this will not be a success,

I'm confident that the smaller mail providers who focus on security would be 
willing to add such an interface. Frankly, I do not care that much for the big 
mail providers. People who really value privacy should use mail providers that 
value privacy.


Regards,
Ingo

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to