Re: GPG fingerprints

2001-09-18 Thread Martin F Krafft
also sprach Tim Haynes (on Mon, 17 Sep 2001 05:05:27PM +0100):
 Unless I'm well mistaken, of course... But I'd never trust a key whose
 fingerprint had turned up in public before.

that's a little ridiculous, isn't it, given that i can use my gpg to
view the fingerprint of your public key, which is, uh, public. you can
safely post your fingerprint everywhere, but you have to do
fingerprint verification - i have to read you mine - over the phone

martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; [EMAIL PROTECTED]
-- 
because light travels faster than sound,
some people appear to be intelligent,
until you hear them speak.


pgpmlvSR4PScN.pgp
Description: PGP signature


Re: GPG fingerprints

2001-09-18 Thread Alberto Cortés
El lun, 17 de sep de 2001, a las 20:25 +0200,
 Martin decía que:

 also sprach Tim Haynes (on Mon, 17 Sep 2001 05:05:27PM +0100):
  Unless I'm well mistaken, of course... But I'd never trust a key whose
  fingerprint had turned up in public before.
 
 that's a little ridiculous, isn't it, given that i can use my gpg to
 view the fingerprint of your public key, which is, uh, public. you can
 safely post your fingerprint everywhere, but you have to do
 fingerprint verification - i have to read you mine - over the phone

  That's right, i use to show my fingerprint on my emails, of course
if anyone want to trust my public key, he have to contact me in
a more secure way than looking the signature of a single email.

  Looking lots of emails from me, some new, some old, could be a good way,
a telephone call can be OK if you know my voice, and a mix of these things
would be OK if you don't know me at all.

  Key-sharing in public events (like Linux conventions) it's also a
good way of verifying public keys, you will meet the person, even you
can ask him for his ID (car driving license or something like this),
and also is a good way of making new friends, and talk a lot about
linux ;-).

  Personal contact is (hopefully) the only real way to verify public
keys, but the cost of been a man in the meddle fooling all the
Internet, changing web logs of mail lists and database of every web
crawler is so high that for the most common cases it's is sufficient
with publishing your fingerprint on every email and your telephone
number.

Also use the common sense for this things, it is the best way
of been real sure of the integrity of someone's public key.
  
-- 
Yoda use the source, Luke!

Alberto Cortés Martín | Ing. de Telecomunicaciones
email: [EMAIL PROTECTED]  | Universidad Carlos III
tel: +34 91 450 09 85 | Madrid
cel: 600 42 77 57 | Spain
  1A8B 0FE6 2094 8E48 38A2  7785 03CD 07CD 6CA4 E242



pgpoVno2mBCdJ.pgp
Description: PGP signature


Re: GPG fingerprints

2001-09-17 Thread Steve

 Then, get in touch with me by some secure means and confirm that
snip

I think rather that secure it might be better to say using some
other means of authentication.  Authentication can mean a lot of
things, with the method depending on the level of security required (a
phone call to quote the fingerprint may be sufficient where you would
recognise the persons voice and the data being transferred is not
critical), but it definitely means through a different channel.

I mention this because a friend/colleague use to send his GPG public
key to people via email, and then placed his key fingerprint in his
.sig, in the belief that this would enhance security (not to mention
his geek-cred).  A five minute explanation of the principle of a
man-in-the-middle attack, followed by a swift bat upside the head with
a copy of Applied Cryptography seemed to do the trick, and he
sheepishly removed it.

This same person is now contracting out his services as, among other
things, a security expert.

Caveat Emptor,
Steve


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: GPG fingerprints

2001-09-17 Thread Wade Richards

Hi,

On Mon, 17 Sep 2001 19:42:05 +1000, Steve writes:
I mention this because a friend/colleague use to send his GPG public
key to people via email, and then placed his key fingerprint in his
.sig, in the belief that this would enhance security (not to mention
his geek-cred).  A five minute explanation of the principle of a
man-in-the-middle attack, followed by a swift bat upside the head with
a copy of Applied Cryptography seemed to do the trick, and he
sheepishly removed it.

I think that many people put their fingerprint in their e-mail signature 
to exploit the Internet's archiving capability.  If I e-mail you my public 
key, you should not pay attention to the fingerprint in the signature of 
that e-mail.  However, you can go to dejanews.com, or the debian mailing 
list archives, or your own saved mail folder, and notice that every 
single message from me has the same GPG fingerprint, even the messages 
that are months or years old.  From that, you can develop a degree of 
trust.

--- Wade

PS: Don't bother looking for the GPG fingerprint, I don't bother with GPG 
yet.

-- 
 /\  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
 \ /   ASCII Ribbon Campaign| Wade Richards --- [EMAIL PROTECTED] 
  X   - NO HTML/RTF in e-mail   | Fight SPAM!  Join CAUCE.
 / \  - NO Word docs in e-mail  | See http://www.cauce.org/ for details.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: GPG fingerprints

2001-09-17 Thread Hubert Chan

 Wade == Wade Richards [EMAIL PROTECTED] writes:

Wade I think that many people put their fingerprint in their e-mail
Wade signature to exploit the Internet's archiving capability.  If I
Wade e-mail you my public key, you should not pay attention to the
Wade fingerprint in the signature of that e-mail.  However, you can go
Wade to dejanews.com, or the debian mailing list archives, or your own
Wade saved mail folder, and notice that every single message from me
Wade has the same GPG fingerprint, even the messages that are months or
Wade years old.  From that, you can develop a degree of trust.

I think the key (no pun intended) is to use multiple channels.  My
public key is available on a public keyserver.  My fingerprints are
pasted to all my mails which go to almost all mailing lists, and to all
my newsgroup postings (and these, as you mentioned are available via
http).

So if someone wants to spoof my key, they would have to either
- compromise groups.google.com, wwwkeys.pgp.net, lists.debian.org,
  various e-mail servers, etc
- be very close to the person trying to get my key, so that they would
  be able to spoof traffic from these
or
- be very close to me and modify my outgoing messages and spoof network
  traffic when I try to verify that the keys/fingerprints have been sent
  correctly (which is probably pretty hard, since I have multiple
  network access points)

On the other hand, if you send both fingerprint and gpg key via e-mail,
there's just one service that needs to be attacked.

Mind you, the best policy is to only fully trust keys that you can
verify *in person*, or that can be verified via the web of trust, if you
need to send/sign anything critical.

(Speaking of which, is there anyone in the Waterloo (Canada) region who
wants to sign my key?  My key currently has 0 signatures (other than my
self-sig).)

-- 
Hubert Chan [EMAIL PROTECTED] - http://www.geocities.com/hubertchan/
PGP/GnuPG key: 1024D/71FDA37F
Fingerprint: 6CC5 822D 2E55 494C 81DD  6F2C 6518 54DF 71FD A37F
Key available at wwwkeys.pgp.net.   Please encrypt *all* e-mail to me.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: GPG fingerprints

2001-09-17 Thread Tim Haynes

Wade Richards [EMAIL PROTECTED] writes:

 A five minute explanation of the principle of a
 man-in-the-middle attack, followed by a swift bat upside the head with a
 copy of Applied Cryptography seemed to do the trick, and he sheepishly
 removed it.
 
 I think that many people put their fingerprint in their e-mail signature
 to exploit the Internet's archiving capability. If I e-mail you my public
 key, you should not pay attention to the fingerprint in the signature of
 that e-mail. However, you can go to dejanews.com, or the debian mailing
 list archives, or your own saved mail folder, and notice that every
 single message from me has the same GPG fingerprint, even the messages
 that are months or years old. From that, you can develop a degree of
 trust.

Yes. A zero-trust sense of trust.

The whole point of having a fingerprint is to be able to compare it out of
band - eg you send me your public key, I phone you back and you have to dig
out the fingerprint which I compare from the public key, which is totally
defeated if someone else can dig it out of deja/google!

If you want to develop a sense of trust, then the most trust you can have
is that `this poster' is the same as `that poster', because their messages
both validate against the same key ID (*not* fingerprint).

Unless I'm well mistaken, of course... But I'd never trust a key whose
fingerprint had turned up in public before.

~Tim
-- 
It's enough that I can see the morning  |[EMAIL PROTECTED]
In miracles much more than I can say|http://spodzone.org.uk/
It's enough to keep me still believing  |
In drifting hearts so far away  |


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: GPG fingerprints

2001-09-17 Thread Janusz A . Urbanowicz

Tim Haynes wrote/napisa[a]/schrieb:
 Wade Richards [EMAIL PROTECTED] writes:
 
  A five minute explanation of the principle of a
  man-in-the-middle attack, followed by a swift bat upside the head with a
  copy of "Applied Cryptography" seemed to do the trick, and he sheepishly
  removed it.
  
  I think that many people put their fingerprint in their e-mail signature
  to exploit the Internet's archiving capability. If I e-mail you my public
  key, you should not pay attention to the fingerprint in the signature of
  that e-mail. However, you can go to dejanews.com, or the debian mailing
  list archives, or your own "saved mail" folder, and notice that every
  single message from me has the same GPG fingerprint, even the messages
  that are months or years old. From that, you can develop a degree of
  trust.
 
 Yes. A zero-trust sense of trust.
 
 The whole point of having a fingerprint is to be able to compare it out of
 band - eg you send me your public key, I phone you back and you have to dig
 out the fingerprint which I compare from the public key, which is totally
 defeated if someone else can dig it out of deja/google!

WHAT!?

Anyone who gets hold of a public key can check what fingerprint it has.
There are public keyservers. There are public keys on the w3. Key
fingerprint never was meant to be a secret.

 If you want to develop a sense of trust, then the most trust you can have
 is that `this poster' is the same as `that poster', because their messages
 both validate against the same key ID (*not* fingerprint).
 
 Unless I'm well mistaken, of course... But I'd never trust a key whose
 fingerprint had turned up in public before.

I believe you are mistaken. Publishing fingerprint is a (weak) way to defeat
MITM attacks. If someone constattly uses a key with a known fingerprint
sudden change of fingerprint may may suggest MITM. Note: your method of
comparing a fingerprint is weak. Fingerprint comaprition is a two way
protocol. If Bob is to sign Alice's key he should read first group of
fingerprint, then Alice should read the second, then Bob the third, etc.
This ensures at least that Bob and Alice are talking about the same public
key.

Alex
-- 
C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | |   *
 ; (_O : +-+ --+~|  
 ! ~) ? | Pyn chc na Wschd, za Suez, gdzie jest dobrem kade zo | l_|/   
A ~-=-~ O| Gdzie przykaza brak dziesiciu, a pi mona a po dno; |   |   


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: GPG fingerprints

2001-09-17 Thread Martin F Krafft

also sprach Tim Haynes (on Mon, 17 Sep 2001 05:05:27PM +0100):
 Unless I'm well mistaken, of course... But I'd never trust a key whose
 fingerprint had turned up in public before.

that's a little ridiculous, isn't it, given that i can use my gpg to
view the fingerprint of your public key, which is, uh, public. you can
safely post your fingerprint everywhere, but you have to do
fingerprint verification - i have to read you mine - over the phone

martin;  (greetings from the heart of the sun.)
  \ echo mailto: !#^.*|tr * mailto:; net@madduck
-- 
because light travels faster than sound,
some people appear to be intelligent,
until you hear them speak.

 PGP signature


Re: GPG fingerprints

2001-09-17 Thread Steve
 Then, get in touch with me by some secure means and confirm that
snip

I think rather that secure it might be better to say using some
other means of authentication.  Authentication can mean a lot of
things, with the method depending on the level of security required (a
phone call to quote the fingerprint may be sufficient where you would
recognise the persons voice and the data being transferred is not
critical), but it definitely means through a different channel.

I mention this because a friend/colleague use to send his GPG public
key to people via email, and then placed his key fingerprint in his
.sig, in the belief that this would enhance security (not to mention
his geek-cred).  A five minute explanation of the principle of a
man-in-the-middle attack, followed by a swift bat upside the head with
a copy of Applied Cryptography seemed to do the trick, and he
sheepishly removed it.

This same person is now contracting out his services as, among other
things, a security expert.

Caveat Emptor,
Steve



Re: GPG fingerprints

2001-09-17 Thread Wade Richards
Hi,

On Mon, 17 Sep 2001 19:42:05 +1000, Steve writes:
I mention this because a friend/colleague use to send his GPG public
key to people via email, and then placed his key fingerprint in his
.sig, in the belief that this would enhance security (not to mention
his geek-cred).  A five minute explanation of the principle of a
man-in-the-middle attack, followed by a swift bat upside the head with
a copy of Applied Cryptography seemed to do the trick, and he
sheepishly removed it.

I think that many people put their fingerprint in their e-mail signature 
to exploit the Internet's archiving capability.  If I e-mail you my public 
key, you should not pay attention to the fingerprint in the signature of 
that e-mail.  However, you can go to dejanews.com, or the debian mailing 
list archives, or your own saved mail folder, and notice that every 
single message from me has the same GPG fingerprint, even the messages 
that are months or years old.  From that, you can develop a degree of 
trust.

--- Wade

PS: Don't bother looking for the GPG fingerprint, I don't bother with GPG 
yet.

-- 
 /\  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
 \ /   ASCII Ribbon Campaign| Wade Richards --- [EMAIL PROTECTED] 
  X   - NO HTML/RTF in e-mail   | Fight SPAM!  Join CAUCE.
 / \  - NO Word docs in e-mail  | See http://www.cauce.org/ for details.




Re: GPG fingerprints

2001-09-17 Thread Hubert Chan
 Wade == Wade Richards [EMAIL PROTECTED] writes:

Wade I think that many people put their fingerprint in their e-mail
Wade signature to exploit the Internet's archiving capability.  If I
Wade e-mail you my public key, you should not pay attention to the
Wade fingerprint in the signature of that e-mail.  However, you can go
Wade to dejanews.com, or the debian mailing list archives, or your own
Wade saved mail folder, and notice that every single message from me
Wade has the same GPG fingerprint, even the messages that are months or
Wade years old.  From that, you can develop a degree of trust.

I think the key (no pun intended) is to use multiple channels.  My
public key is available on a public keyserver.  My fingerprints are
pasted to all my mails which go to almost all mailing lists, and to all
my newsgroup postings (and these, as you mentioned are available via
http).

So if someone wants to spoof my key, they would have to either
- compromise groups.google.com, wwwkeys.pgp.net, lists.debian.org,
  various e-mail servers, etc
- be very close to the person trying to get my key, so that they would
  be able to spoof traffic from these
or
- be very close to me and modify my outgoing messages and spoof network
  traffic when I try to verify that the keys/fingerprints have been sent
  correctly (which is probably pretty hard, since I have multiple
  network access points)

On the other hand, if you send both fingerprint and gpg key via e-mail,
there's just one service that needs to be attacked.

Mind you, the best policy is to only fully trust keys that you can
verify *in person*, or that can be verified via the web of trust, if you
need to send/sign anything critical.

(Speaking of which, is there anyone in the Waterloo (Canada) region who
wants to sign my key?  My key currently has 0 signatures (other than my
self-sig).)

-- 
Hubert Chan [EMAIL PROTECTED] - http://www.geocities.com/hubertchan/
PGP/GnuPG key: 1024D/71FDA37F
Fingerprint: 6CC5 822D 2E55 494C 81DD  6F2C 6518 54DF 71FD A37F
Key available at wwwkeys.pgp.net.   Please encrypt *all* e-mail to me.



Re: GPG fingerprints

2001-09-17 Thread Tim Haynes
Wade Richards [EMAIL PROTECTED] writes:

 A five minute explanation of the principle of a
 man-in-the-middle attack, followed by a swift bat upside the head with a
 copy of Applied Cryptography seemed to do the trick, and he sheepishly
 removed it.
 
 I think that many people put their fingerprint in their e-mail signature
 to exploit the Internet's archiving capability. If I e-mail you my public
 key, you should not pay attention to the fingerprint in the signature of
 that e-mail. However, you can go to dejanews.com, or the debian mailing
 list archives, or your own saved mail folder, and notice that every
 single message from me has the same GPG fingerprint, even the messages
 that are months or years old. From that, you can develop a degree of
 trust.

Yes. A zero-trust sense of trust.

The whole point of having a fingerprint is to be able to compare it out of
band - eg you send me your public key, I phone you back and you have to dig
out the fingerprint which I compare from the public key, which is totally
defeated if someone else can dig it out of deja/google!

If you want to develop a sense of trust, then the most trust you can have
is that `this poster' is the same as `that poster', because their messages
both validate against the same key ID (*not* fingerprint).

Unless I'm well mistaken, of course... But I'd never trust a key whose
fingerprint had turned up in public before.

~Tim
-- 
It's enough that I can see the morning  |[EMAIL PROTECTED]
In miracles much more than I can say|http://spodzone.org.uk/
It's enough to keep me still believing  |
In drifting hearts so far away  |



Re: GPG fingerprints

2001-09-17 Thread Janusz A . Urbanowicz
Tim Haynes wrote/napisał[a]/schrieb:
 Wade Richards [EMAIL PROTECTED] writes:
 
  A five minute explanation of the principle of a
  man-in-the-middle attack, followed by a swift bat upside the head with a
  copy of Applied Cryptography seemed to do the trick, and he sheepishly
  removed it.
  
  I think that many people put their fingerprint in their e-mail signature
  to exploit the Internet's archiving capability. If I e-mail you my public
  key, you should not pay attention to the fingerprint in the signature of
  that e-mail. However, you can go to dejanews.com, or the debian mailing
  list archives, or your own saved mail folder, and notice that every
  single message from me has the same GPG fingerprint, even the messages
  that are months or years old. From that, you can develop a degree of
  trust.
 
 Yes. A zero-trust sense of trust.
 
 The whole point of having a fingerprint is to be able to compare it out of
 band - eg you send me your public key, I phone you back and you have to dig
 out the fingerprint which I compare from the public key, which is totally
 defeated if someone else can dig it out of deja/google!

WHAT!?

Anyone who gets hold of a public key can check what fingerprint it has.
There are public keyservers. There are public keys on the w3. Key
fingerprint never was meant to be a secret.

 If you want to develop a sense of trust, then the most trust you can have
 is that `this poster' is the same as `that poster', because their messages
 both validate against the same key ID (*not* fingerprint).
 
 Unless I'm well mistaken, of course... But I'd never trust a key whose
 fingerprint had turned up in public before.

I believe you are mistaken. Publishing fingerprint is a (weak) way to defeat
MITM attacks. If someone constattly uses a key with a known fingerprint
sudden change of fingerprint may may suggest MITM. Note: your method of
comparing a fingerprint is weak. Fingerprint comaprition is a two way
protocol. If Bob is to sign Alice's key he should read first group of
fingerprint, then Alice should read the second, then Bob the third, etc.
This ensures at least that Bob and Alice are talking about the same public
key.

Alex
-- 
C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | |   *
 ; (_O : +-+ --+~|  
 ! ~) ? | Płynąć chcę na Wschód, za Suez, gdzie jest dobrem każde zło | l_|/   
A ~-=-~ O| Gdzie przykazań brak dziesięciu, a pić można aż po dno; |   |   



Re: GPG fingerprints

2001-09-14 Thread Noah L. Meyerhans

On Fri, Sep 14, 2001 at 09:02:53PM -0500, Warren Turkal wrote:
 Is it ok to have your GPG fingerprint publicly available?
 

It is not only OK, but encouraged.  If one can confirm that your
fingerprint is valid (i.e. by calling you and saying is foo really
your fingerprint?), then it's a safe bet that they have the right key,
instead of a spoofed key.

The GPG key fingerprint can be obtained from any public key by running
'gpg --fingerprint key_id', so you could run 'gpg --fingerprint
[EMAIL PROTECTED]' and see the fingerprint for my key (assuming it's in
your keyring).  Then, get in touch with me by some secure means and
confirm that it's D896 D80A C030 7F05 701E  D535 62B5 4B8C 1140 4EC3 and
you know that you have the right key.

noah

-- 
 ___
| Web: http://web.morgul.net/~frodo/
| PGP Public Key: http://web.morgul.net/~frodo/mail.html 

 PGP signature


Re: GPG fingerprints

2001-09-14 Thread Alex Pennace

On Fri, Sep 14, 2001 at 09:02:31PM -0500, Warren Turkal wrote:
 Is it ok to have your GPG fingerprint publicly available?

Yes.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: GPG fingerprints

2001-09-14 Thread Alex Pennace
On Fri, Sep 14, 2001 at 09:02:31PM -0500, Warren Turkal wrote:
 Is it ok to have your GPG fingerprint publicly available?

Yes.