Re: Web of Trust (a revolution)

2009-04-01 Thread Simon Slater
On Wed, 2009-04-01 at 12:08 -0400, m wrote:
> I asked at the DMV once, 
> naturally the response was  a somewhat less than spectacular "proves
> you 
> were born." So the fact that I live and breathe is not proof enough
> that 
> someone gave birth to me? 
At our local DMV you'll grow old & grey waiting to ask.
-- 
Hooroo,
Simon
Registered Linux User #463789. Be counted at: http://counter.li.org/

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread David
On 4/1/2009 12:08 PM, m wrote:
> David wrote:
>> On 4/1/2009 10:13 AM, Craig White wrote:
>>> On Wed, 2009-04-01 at 14:49 +0100, Alan Cox wrote:
> I use a state issued picture driver license, a birth certificate,
> and a US
> Passport.
 Which doesn't prove you are not one of identical twins ;)
>>> 
>>> which is an important distinction if you happen to be the paranoid
>>> schizophrenic twin...

>>> http://www.amazon.com/Know-This-Much-True-Novel/dp/0061469084/ref=pd_bbs_sr_1


>>> Great book

>>> Craig

>>> ps - then again, the fingerprints would likely be identical


>> True. But I also have concealed carry permits in four different states
>> and
>> they take fingerprints and run background checks.  :-P

>> Maybe I should have said that my mother assured me that I am me?

>> Only the paranoid I guess.

> Yes its a paranoid world. My question though, after reading this thread,
> is of what real use is birth certificate? I asked at the DMV once,
> naturally the response was  a somewhat less than spectacular "proves you
> were born." So the fact that I live and breathe is not proof enough that
> someone gave birth to me? Perhaps it should be called an identity
> certificate instead. Anyone want to join my support group for the
> insanely pedantic.


In the US of A you need one to be President? To get a passport. And, in
Florida, today, and all other states eventually, to get a drivers license.

I have ID badges that let me work on certain schools in certain counties.
You need a drivers license to get it. And a background check. And
fingerprints taken.

Big Brother is watching? Or maybe? Welcome to City Seventeen?

Yeah. It's getting bad.

-- 


  David

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread m

Tim wrote:

Bill Crawford:
Ought to be possible for people to visit companies' offices and sign their keys, 
and add them to the "web of trust" as per PGP / GPG keys. No idea if / how that 
should be done, in practice, though.
 


m:
Difficult at best, who wants to trust a faceless corporation? Not to be 
cynical but you might trust the receptionist but what about the IT dept? 
Are they competent?...


I wonder if we were to contact our bank's tech support and ask if we
could confirm their SSL certificate with them (e.g. read the fingerprint
info over the phone), how many of them could actually do it?  Or even
understand.

Your going to tempt me to try that and I have no doubt I'd have to start 
keeping my money under the matress after I got off the phone. ignorance 
is bliss,  ignorance is bliss, ignorance is bliss.


r...@max's_brain#rm -rf /var/log/messages
r...@max's_brain#shutdown -r now

huh? did you say something?

--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Tim
Bill Crawford:
>> Ought to be possible for people to visit companies' offices and sign their 
>> keys, 
>> and add them to the "web of trust" as per PGP / GPG keys. No idea if / how 
>> that 
>> should be done, in practice, though.
 

m:
> Difficult at best, who wants to trust a faceless corporation? Not to be 
> cynical but you might trust the receptionist but what about the IT dept? 
> Are they competent?...

I wonder if we were to contact our bank's tech support and ask if we
could confirm their SSL certificate with them (e.g. read the fingerprint
info over the phone), how many of them could actually do it?  Or even
understand.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Steve Lindemann

David wrote:

On 4/1/2009 10:13 AM, Craig White wrote:

On Wed, 2009-04-01 at 14:49 +0100, Alan Cox wrote:

I use a state issued picture driver license, a birth certificate, and a US
Passport.

Which doesn't prove you are not one of identical twins ;)


which is an important distinction if you happen to be the paranoid
schizophrenic twin...


True. But I also have concealed carry permits in four different states and
they take fingerprints and run background checks.  :-P

Maybe I should have said that my mother assured me that I am me?

Only the paranoid I guess.



When I was in the military I held a fairly high security clearance.  The 
kind of thing where they check your background back before you were 
born.  I worked with folks with the same clearance levels or even 
higher.  Curiously enough, despite having such deep background checks we 
still had people stealing from the coffee fund.


There is *no* check that can certify you are a truly honest, ethical and 
reliable person... only time and observation will tell others if you can 
really be trusted, everything else is a wild ass guess.  I know I'm a 
trustworthy person, but no one who doesn't know me well can ever be sure 
of that... no matter who else says so (hell *they* could be lying) 8^\


...who ya gonna trust?
--
Steve Lindemann __
Network Administrator  //\\  ASCII Ribbon Campaign
Marmot Library Network, Inc.   \\//  against HTML/RTF email,
http://www.marmot.org  //\\  vCards & M$ attachments
+1.970.242.3331 x116



--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Bill Crawford
On Wednesday 01 April 2009 17:08:46 m wrote:

> Anyone want to join my support group for the
> insanely pedantic.

*Does* anyone want to ... ?

Count me in ;o)

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread m

David wrote:

On 4/1/2009 10:13 AM, Craig White wrote:

On Wed, 2009-04-01 at 14:49 +0100, Alan Cox wrote:

I use a state issued picture driver license, a birth certificate, and a US
Passport.

Which doesn't prove you are not one of identical twins ;)


which is an important distinction if you happen to be the paranoid
schizophrenic twin...



http://www.amazon.com/Know-This-Much-True-Novel/dp/0061469084/ref=pd_bbs_sr_1



Great book



Craig



ps - then again, the fingerprints would likely be identical



True. But I also have concealed carry permits in four different states and
they take fingerprints and run background checks.  :-P

Maybe I should have said that my mother assured me that I am me?

Only the paranoid I guess.

Yes its a paranoid world. My question though, after reading this thread, 
is of what real use is birth certificate? I asked at the DMV once, 
naturally the response was  a somewhat less than spectacular "proves you 
were born." So the fact that I live and breathe is not proof enough that 
someone gave birth to me? Perhaps it should be called an identity 
certificate instead. Anyone want to join my support group for the 
insanely pedantic.


--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread David
On 4/1/2009 10:13 AM, Craig White wrote:
> On Wed, 2009-04-01 at 14:49 +0100, Alan Cox wrote:
>>> I use a state issued picture driver license, a birth certificate, and a US
>>> Passport.
>> Which doesn't prove you are not one of identical twins ;)
> 
> which is an important distinction if you happen to be the paranoid
> schizophrenic twin...

> http://www.amazon.com/Know-This-Much-True-Novel/dp/0061469084/ref=pd_bbs_sr_1

> Great book

> Craig

> ps - then again, the fingerprints would likely be identical


True. But I also have concealed carry permits in four different states and
they take fingerprints and run background checks.  :-P

Maybe I should have said that my mother assured me that I am me?

Only the paranoid I guess.

-- 


  David

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Tim
On Wed, 2009-04-01 at 10:37 -0400, m wrote:
> According to the info I have found, twins of any sort will not have 
> identical fingerprints, though their DNA might be virtually 
> indistinguishable if they are identical twins.

Many many years ago I remember finding out that identical twins are
rarely ever *identical*, but it was possible.  I'm sure I've read of at
least one instance where fingerprints were, too.

Which identity documents have your finger prints on?  It's years since
I've seen someone's passport, but they only had photos on them.
Likewise with our driver's licences.

I wonder if they'll start fingerprinting babies, in the modern terrorist
paranoid era?  (Still, though, such people don't seem to care if you
know who they are.)

Apparently we used to have DNA records of every baby in Australia,
thanks to Guthrie test cards (pin-prick to the heel, with the blood drop
pressed against a card) just being casually filed away in the back of
some cupboard.  Then there was a flap on as someone realised this, and
the potential for using them for something more than they were ever
intended for, and I recall reading that they were going to be destroyed.

Ultimately, identifying someone doesn't really prove a great deal,
unless you can also find out whether they're trustworthy or a con
artist, as well as who they are.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Tim
Tim:
>> You need to know them more than just having met them before, you need
>> to know what their attitude is to signing keys.  Will they only sign
>> keys with users that have credible ID?  And could they spot fake ID?
> 
David:
> I use a state issued picture driver license, a birth certificate, and
> a US Passport.

Do you mean to identify yourself, and/or you insist on that before
you'll sign someone else's key?

But to be brutal, a birth certificate proves nothing, any thief could
have stolen one.  And which of us could pick a good faked driver's
license or passport from a real one?  Or would know whether someone's
fraudulently obtained real ones?

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread m

Craig White wrote:

On Wed, 2009-04-01 at 10:37 -0400, m wrote:

ps - then again, the fingerprints would likely be identical


According to the info I have found, twins of any sort will not have 
identical fingerprints, though their DNA might be virtually 
indistinguishable if they are identical twins.


I appreciate the opportunity to demonstrate how little I know about
identical twins... ;-)

Craig


I appreciate your subtlety in reminding me to look that up because that 
particular mental post-it had been covered up long ago. Maybe I should 
write down on physical paper the things I need to look up...nah mental 
post-it notes are more fun, which reminds me...


--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Craig White
On Wed, 2009-04-01 at 10:37 -0400, m wrote:
> > ps - then again, the fingerprints would likely be identical
> > 
> > 
> According to the info I have found, twins of any sort will not have 
> identical fingerprints, though their DNA might be virtually 
> indistinguishable if they are identical twins.

I appreciate the opportunity to demonstrate how little I know about
identical twins... ;-)

Craig


-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Anne Wilson
On Wednesday 01 April 2009 14:18:11 David wrote:
> On 4/1/2009 8:56 AM, Tim wrote:
> > On Wed, 2009-04-01 at 13:42 +0200, "Stanisław T. Findeisen" wrote:
> >> Sure, you might not be sure how honest a particular person
> >> is, or how accurate she is when it comes to key signing. But it
> >> *might* be helpful to know that a key of someone else that you haven't
> >> met in person has been signed by, say, 10 different people that you
> >> did meet before
> >
> > You need to know them more than just having met them before, you need to
> > know what their attitude is to signing keys.  Will they only sign keys
> > with users that have credible ID?  And could they spot fake ID?
>
> I use a state issued picture driver license, a birth certificate, and a US
> Passport.
>
It is generally accepted that meeing someone, alone, is not sufficient 
identification.  Before you sign anyone's key, or let them sign yours, you 
should always see this kind of official documentation.  Anyone considering 
getting keys signed should read 
http://cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html

Anne
-- 
New to KDE4? - get help from http://userbase.kde.org
Just found a cool new feature?  Add it to UserBase


signature.asc
Description: This is a digitally signed message part.
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-04-01 Thread m

Craig White wrote:

On Wed, 2009-04-01 at 14:49 +0100, Alan Cox wrote:

I use a state issued picture driver license, a birth certificate, and a US
Passport.

Which doesn't prove you are not one of identical twins ;)


which is an important distinction if you happen to be the paranoid
schizophrenic twin...

http://www.amazon.com/Know-This-Much-True-Novel/dp/0061469084/ref=pd_bbs_sr_1

Great book

Craig

ps - then again, the fingerprints would likely be identical


According to the info I have found, twins of any sort will not have 
identical fingerprints, though their DNA might be virtually 
indistinguishable if they are identical twins.


--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Craig White
On Wed, 2009-04-01 at 14:49 +0100, Alan Cox wrote:
> > I use a state issued picture driver license, a birth certificate, and a US
> > Passport.
> 
> Which doesn't prove you are not one of identical twins ;)

which is an important distinction if you happen to be the paranoid
schizophrenic twin...

http://www.amazon.com/Know-This-Much-True-Novel/dp/0061469084/ref=pd_bbs_sr_1

Great book

Craig

ps - then again, the fingerprints would likely be identical


-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Alan Cox
> I use a state issued picture driver license, a birth certificate, and a US
> Passport.

Which doesn't prove you are not one of identical twins ;)

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread David
On 4/1/2009 8:56 AM, Tim wrote:
> On Wed, 2009-04-01 at 13:42 +0200, "Stanisław T. Findeisen" wrote:
>> Sure, you might not be sure how honest a particular person 
>> is, or how accurate she is when it comes to key signing. But it
>> *might* be helpful to know that a key of someone else that you haven't
>> met in person has been signed by, say, 10 different people that you
>> did meet before

> You need to know them more than just having met them before, you need to
> know what their attitude is to signing keys.  Will they only sign keys
> with users that have credible ID?  And could they spot fake ID?


I use a state issued picture driver license, a birth certificate, and a US
Passport.

-- 


  David

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Tim
On Wed, 2009-04-01 at 13:42 +0200, "Stanisław T. Findeisen" wrote:
> Sure, you might not be sure how honest a particular person 
> is, or how accurate she is when it comes to key signing. But it
> *might* be helpful to know that a key of someone else that you haven't
> met in person has been signed by, say, 10 different people that you
> did meet before

You need to know them more than just having met them before, you need to
know what their attitude is to signing keys.  Will they only sign keys
with users that have credible ID?  And could they spot fake ID?

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-04-01 Thread Stanisław T. Findeisen

Todd Zullinger wrote:

$ gpg --list-options 'show-policy-urls' --list-sigs silfreed
pub   1024D/ED00D312 2000-06-21
uid  Douglas E. Warner 
sig 3ED00D312 2005-11-02  Douglas E. Warner 
sig 2   PBEAF0CE3 2006-08-07  Todd M. Zullinger 
   Signature policy: http://www.pobox.com/~tmz/pgp/cert-policy.asc
[...]

I don't intend for that to make anyone trust my signatures unless they
know a bit about me, of course.  But I do try to be a good example and
let those who may trust me know just what I mean when they see a
signature from me on a key.

Both notations and cert policy URLS may contain some data that is
unique to a particular signature.  Strings such as %k, %K, and %f will
be expanded to the short key id, long key id, and fingerprint of the
key being signed, respectively.  That way, you could make the notation
or policy URL point to a page for each signature.  There you could
include such details as where you met, what information you exchanged,
etc.


Great done, I am impressed, I wasn't even aware that such things exist!

So, summarizing all this (see my the previous post from today) I'd say 
that what we need is:


* an OpenPGP web of trust "CA" (operated by RedHat/Fedora/whatever, 
sorry I'm not really aware of who is who here) with its public/private 
keypair (CAK)
* an official and strictly-followed policy for signing people keys with 
CAK (trust level 0 sigs)
* an official and strictly-followed policy for signing people keys with 
CAK (trust level 1 sigs)
* a "marketing strategy" or something to tell people to trust CAK with 
the level of 2
* some "goodies" like list of keys signed by CAK published on the web, 
or maybe photos of all such meetings in person (depending on the 
policy); surely photos, names and bios of all trust-level-1 sigs 
holders. :-)


This way we achieve the goals of the revolution; we promote:
* GNU
* free software
* security and authenticity
* bazaar model
* Fedora
* OpenPGP web of trust, which is better than PKI.

STF

===
http://eisenbits.homelinux.net/~stf/
OpenPGP: 9D25 3D89 75F1 DF1D F434  25D7 E87F A1B9 B80F 8062
===



signature.asc
Description: OpenPGP digital signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-04-01 Thread Stanisław T. Findeisen

m wrote:
Difficult at best, who wants to trust a faceless corporation? Not to be 
cynical but you might trust the receptionist but what about the IT dept? 
Are they competent? Money is no guarantee of anything, in fact the 
larger the company the more likely they will let something slip through 
the cracks. Companies all say they are secure and trustworthy, but who 
is hiring these people? Are their background checks? Should there be? 
Probably they outsource that and then you have to see if you can trust 
that company too. The main problem is that so much gets outsourced so 
dept head A doesn't have to worry about it but who is checking that this 
other company is doing it right? Its an endless cycle of paranoia.


Exactly. Trusting "a corporation" boils down to trusting its owners, and 
owners are those who hold the shares. In case you don't know how 
ownership of a public company work, google for "stock exchange" or so. 
:-) And understand that companies can hold the shares of other 
companies, too. :-)


Anyway. Show me one positive thing PKI has that OpenPGP Web of Trust is 
missing. From this thread it looks to me that few of us are aware of 
"trust signature level" notion. See GnuPG manual ("tsign") or here: 
http://www.google.com/search?hl=pl&q=gpg+tsign+site%3Awww.gnupg.org&btnG=Szukaj&lr= 
.


It looks to me that using trust signature levels (not just 2 or 3, like 
in X.509, but 10+) one can build his own key hierarchy. Here is an 
example: http://www.gswot.org/ .


Also Wikipedia (http://en.wikipedia.org/wiki/Web_of_trust) states that 
there are sites allowing you to find OpenPGP Web of Trust members near 
you (geographically), so that you could meet in person and sign each 
other's key. Sure, you might not be sure how honest a particular person 
is, or how accurate she is when it comes to key signing. But it *might* 
be helpful to know that a key of someone else that you haven't met in 
person has been signed by, say, 10 different people that you did meet 
before (see http://www.gnupg.org/gph/en/manual.html#AEN385).


So. Summarizing all this I would say that OpenPGP Web of Trust is (much) 
more flexible than PKI, and when it comes to implementation, it looks 
that with OpenPGP you are the one to decide whom to trust 
(http://www.gnupg.org/gph/en/manual.html#AEN385) (which is not the case 
with PKI, where a single certificate chain is sufficient for the trust 
to be assigned locally).


The revolution strategy will follow in my reply to Todd Zullinger's post 
(03/31/2009 01:10 AM).


STF

===
http://eisenbits.homelinux.net/~stf/
OpenPGP: 9D25 3D89 75F1 DF1D F434  25D7 E87F A1B9 B80F 8062
===



signature.asc
Description: OpenPGP digital signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-31 Thread Craig White
On Tue, 2009-03-31 at 10:42 -0500, Bruno Wolff III wrote:
> On Tue, Mar 31, 2009 at 12:27:08 +0100,
>   Bill Crawford  wrote:
> > On Monday 30 March 2009 20:12:45 Bruno Wolff III wrote:
> > 
> > > CAs that charge extra in order to sign certs that have flag set to
> > > indicate that they can sign other certs in subdomains should be boycotted.
> > 
> > This is actually a rotten idea. If you need internal testing systems, or to 
> > dynamically create them as needed, or you want to run shared hosting using 
> > SSL 
> > (as we do for internal testing, since our application requires SSL enabled) 
> > then being able to sign your own sub-domains and / or have a wildcard are 
> > pretty much essential.
> 
> I was complaining about ripping people off by charging exhorbitant amounts
> for signing keys, not that people / orgs shouldn't be able to get them.
> Verisign does that to protect revenue, not for security reasons.

why does a dog lick themselves between the legs?

because they can. Everyone is free to choose to purchase certificates
from any well known certificate authority and it doesn't have to be
Verisign.

I don't know that they are exorbitant, I know that unless I am selling
something to the public and don't want to scare the bejeebus out of them
by offering a self-signed certificate, I'm not buying.

Craig


-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread m

Kevin Kofler wrote:

m wrote:

I would point you to Firefox for instance, which by some(not I) is
reported to be a very insecure browser. There was an article, a while
back, that pointed out that it had more software vulnerabilities than
other browsers in I think it was 06 or 07. On the surface the article
seemed legit but proprietary browsers do not disclose all insecurities
found, only the publicly reported ones, where as Firefox, this is my
understanding please correct if wrong, reports all security issues
including the ones found in internal audits. So yes Firefox had more
reported problems but only because they disclose all of them. So who can
I trust? Just me it seems and the few friends that I have, signed keys
,as pointed out by others, is no guarantee that things were or are done
properly. That for me anyway is what the issue of trust comes down too,
consistency, its based on that, that I decide whether I can trust them
or just trust them to be themselves.


Konqueror is not a proprietary browser, and I trust KDE to disclose all the
vulnerabilities they fix, yet it has a lot fewer security issues than
Firefox.

Kevin Kofler

Wasn't trying to slight Konqueror , i should have been more clear, the 
comparison in the article was of course trying to paint IE as the poster 
boy for security(Safari was mentioned also and I think Opera but I can't 
stumble across the article again for the life of me) and implied that 
using FF was dangerous in the extreme. A notion I found laughable but if 
your completely uninformed you just might get taken in by the hype. As 
for Konqueror vs FF, well I haven't used Konqueror in quite some time 
now so I can't make an honest comparison. Might be time to fix that...


--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Anne Wilson
On Tuesday 31 March 2009 16:03:14 Ed Greshko wrote:
> Bill Crawford wrote:
> > On Tuesday 31 March 2009 15:01:42 Anne Wilson wrote:
> > ...
> >
> >> Anne
> >
> > By the way, your mails are showing up as having BAD signature in kmail
> > here (the key is available). Is your mailer munging things, or is it the
> > list servers?
>
> It only shows up bad when the emails are sent as multipart/alternative
> and the html gets wrapped after signing.

Dammit you're right.  Something has switched html on again.  I've lost count 
of the times this has happened.  Yesterday's was fine, today's isn't 
(hopefully sorted now) and I can't see anything on the update list for the 
last 24 hours to explain it.

Sorry folks

Anne
-- 
New to KDE4? - get help from http://userbase.kde.org
Just found a cool new feature?  Add it to UserBase


signature.asc
Description: This is a digitally signed message part.
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-31 Thread Kevin Kofler
m wrote:
> I would point you to Firefox for instance, which by some(not I) is
> reported to be a very insecure browser. There was an article, a while
> back, that pointed out that it had more software vulnerabilities than
> other browsers in I think it was 06 or 07. On the surface the article
> seemed legit but proprietary browsers do not disclose all insecurities
> found, only the publicly reported ones, where as Firefox, this is my
> understanding please correct if wrong, reports all security issues
> including the ones found in internal audits. So yes Firefox had more
> reported problems but only because they disclose all of them. So who can
> I trust? Just me it seems and the few friends that I have, signed keys
> ,as pointed out by others, is no guarantee that things were or are done
> properly. That for me anyway is what the issue of trust comes down too,
> consistency, its based on that, that I decide whether I can trust them
> or just trust them to be themselves.

Konqueror is not a proprietary browser, and I trust KDE to disclose all the
vulnerabilities they fix, yet it has a lot fewer security issues than
Firefox.

Kevin Kofler

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread m

Bruno Wolff III wrote:

On Tue, Mar 31, 2009 at 11:00:34 -0400,
  m  wrote:
Difficult at best, who wants to trust a faceless corporation? Not to be  
cynical but you might trust the receptionist but what about the IT dept?  
Are they competent? Money is no guarantee of anything, in fact the  
larger the company the more likely they will let something slip through  
the cracks. Companies all say they are secure and trustworthy, but who  
is hiring these people? Are their background checks? Should there be?  
Probably they outsource that and then you have to see if you can trust  
that company too. The main problem is that so much gets outsourced so  
dept head A doesn't have to worry about it but who is checking that this  
other company is doing it right? Its an endless cycle of paranoia.


You are only trusting them to provide with the key for their domain and
possibly subdomains.


I was referring to the issue of trust in general.


You aren't making them a CA for any and all domains.



Yes I understand that but you could apply the same to Versign, which 
others have pointed out gave out a Microsoft cert to someone who wasn't. 
So then what? They should at least be hiring less gullible people or 
have a better process for issuing certs, i am under no illusions that 
just because its the only time i heard about it that its the only time 
it happened.


I would point you to Firefox for instance, which by some(not I) is 
reported to be a very insecure browser. There was an article, a while 
back, that pointed out that it had more software vulnerabilities than 
other browsers in I think it was 06 or 07. On the surface the article 
seemed legit but proprietary browsers do not disclose all insecurities 
found, only the publicly reported ones, where as Firefox, this is my 
understanding please correct if wrong, reports all security issues 
including the ones found in internal audits. So yes Firefox had more 
reported problems but only because they disclose all of them. So who can 
I trust? Just me it seems and the few friends that I have, signed keys 
,as pointed out by others, is no guarantee that things were or are done 
properly. That for me anyway is what the issue of trust comes down too, 
consistency, its based on that, that I decide whether I can trust them 
or just trust them to be themselves.





--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Bruno Wolff III
On Tue, Mar 31, 2009 at 11:00:34 -0400,
  m  wrote:
> Difficult at best, who wants to trust a faceless corporation? Not to be  
> cynical but you might trust the receptionist but what about the IT dept?  
> Are they competent? Money is no guarantee of anything, in fact the  
> larger the company the more likely they will let something slip through  
> the cracks. Companies all say they are secure and trustworthy, but who  
> is hiring these people? Are their background checks? Should there be?  
> Probably they outsource that and then you have to see if you can trust  
> that company too. The main problem is that so much gets outsourced so  
> dept head A doesn't have to worry about it but who is checking that this  
> other company is doing it right? Its an endless cycle of paranoia.

You are only trusting them to provide with the key for their domain and
possibly subdomains. You aren't making them a CA for any and all domains.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Bruno Wolff III
On Tue, Mar 31, 2009 at 12:27:08 +0100,
  Bill Crawford  wrote:
> On Monday 30 March 2009 20:12:45 Bruno Wolff III wrote:
> 
> > CAs that charge extra in order to sign certs that have flag set to
> > indicate that they can sign other certs in subdomains should be boycotted.
> 
> This is actually a rotten idea. If you need internal testing systems, or to 
> dynamically create them as needed, or you want to run shared hosting using 
> SSL 
> (as we do for internal testing, since our application requires SSL enabled) 
> then being able to sign your own sub-domains and / or have a wildcard are 
> pretty much essential.

I was complaining about ripping people off by charging exhorbitant amounts
for signing keys, not that people / orgs shouldn't be able to get them.
Verisign does that to protect revenue, not for security reasons.

> > Sites with self signed certs that prevent passive snooping get treated as
> > the same as going to a site without ssl and not triggering all sorts of
> > inappropriate warnings that look scary and make people jump through hoops
> > to bypass them.
> 
> That's a separate issue; it's a pain, but if a "root" CA updates their keys 
> at 
> any point, older browsers / operating systems may well experience a period 
> of "messages popping up telling me they can't verify the certificate" ...

The procedure would be (in a web of trust model) to sign the the new key
with the old key before it expired so that people would normally see the
new key and save it while the old key is still valid.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Ed Greshko
Bill Crawford wrote:
> On Tuesday 31 March 2009 15:01:42 Anne Wilson wrote:
> ...
>   
>> Anne
>> 
>
> By the way, your mails are showing up as having BAD signature in kmail here 
> (the 
> key is available). Is your mailer munging things, or is it the list servers?
>
>   
It only shows up bad when the emails are sent as multipart/alternative
and the html gets wrapped after signing. 


-- 
Are you mentally here at Pizza Hut?? mei-mei.gres...@greshko.com
http://tw.youtube.com/watch?v=cCSz_koUhSg



signature.asc
Description: OpenPGP digital signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-31 Thread m

Bill Crawford wrote:

On Monday 30 March 2009 20:12:45 Bruno Wolff III wrote:

On Mon, Mar 30, 2009 at 13:46:02 -0400,

  Todd Denniston  wrote:

i.e., sure all the root CA's that the browser producers want to include
can come in, but they should have trust DBs that allow each user to tick:
* Never trust this key. (and by extension anything it has signed. Perhaps
with a pop up indicating 'the sig is ok, according to bla, but bla is a
known idiot.')
* Marginal trust. (pop up something saying 'the sig is ok, according to
bla, but you are uncomfortable with bla.')
* Fully trust. (operate as CA's in web browsers since they started
getting CA's.)

And by default (as released by the browser producers) the keys should be
set to either Never or Marginal.

I'd rather see more of a web of trust type model. Right now you can only
have one chain of certificates. So you can't have a cert signed by multiple
roots.


Ought to be possible for people to visit companies' offices and sign their keys, 
and add them to the "web of trust" as per PGP / GPG keys. No idea if / how that 
should be done, in practice, though.


Difficult at best, who wants to trust a faceless corporation? Not to be 
cynical but you might trust the receptionist but what about the IT dept? 
Are they competent? Money is no guarantee of anything, in fact the 
larger the company the more likely they will let something slip through 
the cracks. Companies all say they are secure and trustworthy, but who 
is hiring these people? Are their background checks? Should there be? 
Probably they outsource that and then you have to see if you can trust 
that company too. The main problem is that so much gets outsourced so 
dept head A doesn't have to worry about it but who is checking that this 
other company is doing it right? Its an endless cycle of paranoia.




--
"Any fool can know. The point is to understand" --Albert Einstein

Bored??
http://fiction.wikia.com/wiki/Fuqwit1.0

http://fiction.wikia.com/wiki/Coding_the_Magic_into_the_Eight_Ball

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Bill Crawford
On Tuesday 31 March 2009 15:01:42 Anne Wilson wrote:
...
> Anne

By the way, your mails are showing up as having BAD signature in kmail here 
(the 
key is available). Is your mailer munging things, or is it the list servers?

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Bill Crawford
On Tuesday 31 March 2009 15:01:42 Anne Wilson wrote:
> On Tuesday 31 March 2009 13:16:42 Tim wrote:
> > On Tue, 2009-03-31 at 12:27 +0100, Bill Crawford wrote:
> > > Ought to be possible for people to visit companies' offices and sign
> > > their keys, and add them to the "web of trust" as per PGP / GPG keys.
> > > No idea if / how that should be done, in practice, though.
> >
> > Actually, I'd like to be able to do something like with banking (go into
> > the branch, and physically confirm keys used for banking).  For the one
> > or two people that I've used encrypted mail with, I exchanged keys in
> > person.
>
> Bear in mind that the Public Key is intended to be just that - public.  It
> is useless to anyone else as only you have the Private Key that forms the
> pair, so there is no problem at all about the public key being accessible. 
> It can *only* be used to compare against your signature.  It cannot be used
> in any attempt to pretend to be you.

Yes, but the point is, without taking that verification step, you've no way of 
being confident that the key you see with name "X" on it actually belongs to 
the person you communicate with named "X". The steps he's outlining go a long 
way towards avoiding "man in the middle" attacks, because he won't be fooled by 
a key with the same name "X" on it, but different. Well, not if he checks the 
key fingerprint anyway :o)

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Anne Wilson
On Tuesday 31 March 2009 13:16:42 Tim wrote:
> On Tue, 2009-03-31 at 12:27 +0100, Bill Crawford wrote:
> > Ought to be possible for people to visit companies' offices and sign
> > their keys, and add them to the "web of trust" as per PGP / GPG keys.
> > No idea if / how that should be done, in practice, though.
>
> Actually, I'd like to be able to do something like with banking (go into
> the branch, and physically confirm keys used for banking).  For the one
> or two people that I've used encrypted mail with, I exchanged keys in
> person.
>
Bear in mind that the Public Key is intended to be just that - public.  It is 
useless to anyone else as only you have the Private Key that forms the pair, 
so there is no problem at all about the public key being accessible.  It can 
*only* be used to compare against your signature.  It cannot be used in any 
attempt to pretend to be you.

Anne
-- 
New to KDE4? - get help from http://userbase.kde.org
Just found a cool new feature?  Add it to UserBase


signature.asc
Description: This is a digitally signed message part.
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-31 Thread Tim
On Tue, 2009-03-31 at 12:27 +0100, Bill Crawford wrote:
> Ought to be possible for people to visit companies' offices and sign
> their keys, and add them to the "web of trust" as per PGP / GPG keys.
> No idea if / how that should be done, in practice, though.

Actually, I'd like to be able to do something like with banking (go into
the branch, and physically confirm keys used for banking).  For the one
or two people that I've used encrypted mail with, I exchanged keys in
person.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-31 Thread Bill Crawford
On Monday 30 March 2009 20:12:45 Bruno Wolff III wrote:
> On Mon, Mar 30, 2009 at 13:46:02 -0400,
>
>   Todd Denniston  wrote:
> > i.e., sure all the root CA's that the browser producers want to include
> > can come in, but they should have trust DBs that allow each user to tick:
> > * Never trust this key. (and by extension anything it has signed. Perhaps
> > with a pop up indicating 'the sig is ok, according to bla, but bla is a
> > known idiot.')
> > * Marginal trust. (pop up something saying 'the sig is ok, according to
> > bla, but you are uncomfortable with bla.')
> > * Fully trust. (operate as CA's in web browsers since they started
> > getting CA's.)
> >
> > And by default (as released by the browser producers) the keys should be
> > set to either Never or Marginal.
>
> I'd rather see more of a web of trust type model. Right now you can only
> have one chain of certificates. So you can't have a cert signed by multiple
> roots.

Ought to be possible for people to visit companies' offices and sign their 
keys, 
and add them to the "web of trust" as per PGP / GPG keys. No idea if / how that 
should be done, in practice, though.

> There is nothing keeping track of the cert you previously saw for a site
> (unless you remove all of the CA certs) so that you get warned when it
> changes. (At least if the new cert isn't signed by the old one.)

That could, perhaps should, be done by the browser. Ultimately, DNSSEC needs to 
used everywhere, and the keys for a domain stored in the DNS alongside the host 
records (A, , CNAME). SSL keys, I mean, for services. That's the only way 
to do it (although it still doesn't prevent a domain being "hijacked" due to 
inattentive registrars allowing spurious transfers). 

> CAs that charge extra in order to sign certs that have flag set to
> indicate that they can sign other certs in subdomains should be boycotted.

This is actually a rotten idea. If you need internal testing systems, or to 
dynamically create them as needed, or you want to run shared hosting using SSL 
(as we do for internal testing, since our application requires SSL enabled) 
then being able to sign your own sub-domains and / or have a wildcard are 
pretty much essential.

> Sites with self signed certs that prevent passive snooping get treated as
> the same as going to a site without ssl and not triggering all sorts of
> inappropriate warnings that look scary and make people jump through hoops
> to bypass them.

That's a separate issue; it's a pain, but if a "root" CA updates their keys at 
any point, older browsers / operating systems may well experience a period 
of "messages popping up telling me they can't verify the certificate" ...

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Tim
On Mon, 2009-03-30 at 23:04 +0200, Kevin Kofler wrote:
> HTTPS should displace HTTP the same way SSH displaced telnet. Most
> people think people still using telnet as a remote shell are crazy
> (and they're probably right), yet they'll happily use the just as
> insecure unencrypted HTTP.

Likewise for mail logons.  Just about everything sends username and
password in the clear.  That's really bad news for security on some
networks, e.g. cable broadband.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Tim
On Mon, 2009-03-30 at 20:14 -0500, Mikkel L. Ellertson wrote:
> I guess I have a problem - I only meat people online, so nobody is
> going to be able to sign my key. All they have to go by is my signed
> messages.

I have a related sort of problem:  If I were to meet someone in person,
I have no real identification that I could offer to prove who I am.
I've never had a driver's license, passport, or anything else that gets
a proper vetting before being issued to me.

Other things that could be used to sort of identify me aren't really
valid.  I browbeat the bank into letting me open an account, because I
had nothing that categorically proved who I am.  They gave in, as I'm
sure plenty of other places that do crap vetting will do.

During the process I gave them a bit of a berating about other things
they said they'll accept to identify me (a handful of bills addressed to
the same address, a birth certificate, etc.), all of which anybody could
steal from almost any house.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Mikkel L. Ellertson
Todd Zullinger wrote:
> Anne Wilson wrote:
>> Exactly.  In this case there were all the appropriate checks, but
>> all you can see is a list of names, and I suppose you can check that
>> those names are ones you have reason to trust, but that's all, and
>> it's a bit vague.
> 
> Doesn't it go without saying that each person should only trust people
> that they, well, trust? :)
> 
Well, I guess I have a problem - I only meat people online, so
nobody is going to be able to sign my key. All they have to go by is
my signed messages.

Mikkel
-- 

  Do not meddle in the affairs of dragons,
for thou art crunchy and taste good with Ketchup!



signature.asc
Description: OpenPGP digital signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-30 Thread Todd Zullinger
Anne Wilson wrote:
> Exactly.  In this case there were all the appropriate checks, but
> all you can see is a list of names, and I suppose you can check that
> those names are ones you have reason to trust, but that's all, and
> it's a bit vague.

Doesn't it go without saying that each person should only trust people
that they, well, trust? :)

> Absolutely.  It would help if the action of signing included some
> information about the act, such as whether it was carried out at a
> LUG, Conference, or some other organisation, so you could come to
> some decision about its reliability, but there is no such thing.

Actually, there is a way to make such notes (though that still won't
mean much to anyone that doesn't already trust you to make decent
signatures).

You can include notations when you sign/certify a key.  You can also
include a certification policy URL.  These can be displayed in gpg
with the show-notations and show-policy-urls list options.

For example, on keys I've signed in the past few years, I added a
policy URL.  The results look a bit like this:

$ gpg --list-options 'show-policy-urls' --list-sigs silfreed
pub   1024D/ED00D312 2000-06-21
uid  Douglas E. Warner 
sig 3ED00D312 2005-11-02  Douglas E. Warner 
sig 2   PBEAF0CE3 2006-08-07  Todd M. Zullinger 
   Signature policy: http://www.pobox.com/~tmz/pgp/cert-policy.asc
[...]

I don't intend for that to make anyone trust my signatures unless they
know a bit about me, of course.  But I do try to be a good example and
let those who may trust me know just what I mean when they see a
signature from me on a key.

Both notations and cert policy URLS may contain some data that is
unique to a particular signature.  Strings such as %k, %K, and %f will
be expanded to the short key id, long key id, and fingerprint of the
key being signed, respectively.  That way, you could make the notation
or policy URL point to a page for each signature.  There you could
include such details as where you met, what information you exchanged,
etc.

-- 
ToddOpenPGP -> KeyID: 0xBEAF0CE3 | URL: www.pobox.com/~tmz/pgp
~~
Hard work never killed anybody, but why take a chance?
-- Charlie McCarthy



pgpw7bkVBsBzG.pgp
Description: PGP signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-30 Thread Kevin Kofler
Bruno Wolff III wrote:
> Sites with self signed certs that prevent passive snooping get treated as
> the same as going to a site without ssl and not triggering all sorts of
> inappropriate warnings that look scary and make people jump through hoops
> to bypass them.

+1, this really needs fixing. It leads to several sites actually downgrading
security (not using encryption at all) just to prevent those warnings.

We'd see much wider adoption of HTTPS if self-signed certificates weren't
treated any worse than plain unencrypted (and totally insecure) HTTP.

HTTPS should displace HTTP the same way SSH displaced telnet. Most people
think people still using telnet as a remote shell are crazy (and they're
probably right), yet they'll happily use the just as insecure unencrypted
HTTP.

Kevin Kofler

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Bruno Wolff III
On Mon, Mar 30, 2009 at 13:46:02 -0400,
  Todd Denniston  wrote:
>
> i.e., sure all the root CA's that the browser producers want to include 
> can come in, but they should have trust DBs that allow each user to tick:
> * Never trust this key. (and by extension anything it has signed. Perhaps 
> with a pop up indicating 'the sig is ok, according to bla, but bla is a 
> known idiot.')
> * Marginal trust. (pop up something saying 'the sig is ok, according to 
> bla, but you are uncomfortable with bla.')
> * Fully trust. (operate as CA's in web browsers since they started getting 
> CA's.)
>
> And by default (as released by the browser producers) the keys should be 
> set to either Never or Marginal.

I'd rather see more of a web of trust type model. Right now you can only have
one chain of certificates. So you can't have a cert signed by multiple
roots.

There is nothing keeping track of the cert you previously saw for a site
(unless you remove all of the CA certs) so that you get warned when it
changes. (At least if the new cert isn't signed by the old one.)

CAs that charge extra in order to sign certs that have flag set to
indicate that they can sign other certs in subdomains should be boycotted.

Sites with self signed certs that prevent passive snooping get treated as the 
same
as going to a site without ssl and not triggering all sorts of inappropriate
warnings that look scary and make people jump through hoops to bypass them.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Todd Denniston

Tim wrote, On 03/30/2009 12:51 PM:

That sort of decision would be based on popularity (a problem you'd like
to see overcome, and could be overcome, given enough of a push, but
whether we have the numbers is another matter), and whether the
certificate authority is effective enough to support (i.e. why add any
root certificate that proves very little).

Then there's trying to convince organisations to use less trust worthy
root certificates.  Who wants their service to be flagged by web
browsers as "encrypted but a bit risky"?

It's perceptual, and ignoring the fact that existing, apparently better
certificates, are currently used by some services that don't prove who
they are any better than the lesser known root certificates.  But that's
the point of certificates - how things *look* to the casual observer.



It is too bad we can't (as currently implemented) take a slightly less brutal 
tact than Mr. Wolff has suggested.


i.e., sure all the root CA's that the browser producers want to include can 
come in, but they should have trust DBs that allow each user to tick:
* Never trust this key. (and by extension anything it has signed. Perhaps with 
a pop up indicating 'the sig is ok, according to bla, but bla is a known idiot.')
* Marginal trust. (pop up something saying 'the sig is ok, according to bla, 
but you are uncomfortable with bla.')

* Fully trust. (operate as CA's in web browsers since they started getting 
CA's.)

And by default (as released by the browser producers) the keys should be set 
to either Never or Marginal.


--
Todd Denniston
Crane Division, Naval Surface Warfare Center (NSWC Crane)
Harnessing the Power of Technology for the Warfighter

--
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Bruno Wolff III
On Tue, Mar 31, 2009 at 03:21:12 +1030,
  Tim  wrote:
> 
> Just how many root certificates are software builders willing to add?

As many as contribute funding.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Bruno Wolff III
On Mon, Mar 30, 2009 at 09:50:20 -0700,
  Craig White  wrote:
> I'm not sure that I agree with you at all but your being vague. If I
> assume that you are talking about the way Firefox handles untrusted
> certificates with their alert and requires you to 'get the certificate'
> and accept & store or merely temporarily accept, then I disagree...I
> very much like the way they are handling untrusted certificates. By
> contrast, the way most portable devices such as iPhones, Blackberries,
> etc. handle untrusted certificates glosses over these details to the
> point of scary.

Because you have to jump through hoops if all you want is protection from
passiv eavesdropping and not assurance that I am connected to the correct
web site. (And even the roots CAs don't provide that. They provide assurance
about the connection matching the domain name, which isn't really the
same thing.)

> I'm not sure at all what you are accomplishing by removing the normally
> trusted root certificates.

If I return to a site I notice whether or not the certificate has changed.
The UI still sucks for this, since it wasn't designed to be used this way.

I have no special trust relationship with any of the organizations that
have their certs included in firefox, and they don't certify what I really
want to know, so they just get in the way.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Craig White
On Mon, 2009-03-30 at 11:42 -0500, Bruno Wolff III wrote:
> On Mon, Mar 30, 2009 at 09:18:45 -0700,
>   Craig White  wrote:
> > 
> > I agree that you are discussing the present day practical limitations
> > but the concept of an open certificate authority would seem to defeat
> > most, if not all of the problems of a corporate certificate authority
> > such as Verisign or Thawte, etc. It would seem that those who harbor
> > those concerns should join openca.org, help it reach critical mass, help
> > it get root certificates installed in browsers by default, etc.
> 
> That isn't the real issue. I am not going to trust OpenCA any more than I
> trust Versign or Thawte now. (i.e. if they have their certs in by default,
> it just makes more certs for me to remove.)
> What really needs to happen is a more sensible way of handling ssl 
> connections.
> What Firefox currently does is rediculous.

I'm not sure that I agree with you at all but your being vague. If I
assume that you are talking about the way Firefox handles untrusted
certificates with their alert and requires you to 'get the certificate'
and accept & store or merely temporarily accept, then I disagree...I
very much like the way they are handling untrusted certificates. By
contrast, the way most portable devices such as iPhones, Blackberries,
etc. handle untrusted certificates glosses over these details to the
point of scary.

I'm not sure at all what you are accomplishing by removing the normally
trusted root certificates.

Craig

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Tim
Craig White:
>>> http://www.openca.org/

Tim:
>> Though that leaves you with a few problems:  
>> 
>> Few clients recognise them as an authority  ... (and) ...  not so
>> trustworthy trusting

Craig White:
> I agree that you are discussing the present day practical limitations
> but the concept of an open certificate authority would seem to defeat
> most, if not all of the problems of a corporate certificate authority
> such as Verisign or Thawte, etc. It would seem that those who harbor
> those concerns should join openca.org, help it reach critical mass, help
> it get root certificates installed in browsers by default, etc.

I agree it would be nice to bring in something better than some of the
existing systems, but I see two big problems in getting yet another root
certificate adopted:  

Just how many root certificates are software builders willing to add?
If they feel the list is getting too big (I'm sure there must be lots of
small certificate authorities, or organisations that want to be one),
they may settle for the *just* ones they feel are most important.

That sort of decision would be based on popularity (a problem you'd like
to see overcome, and could be overcome, given enough of a push, but
whether we have the numbers is another matter), and whether the
certificate authority is effective enough to support (i.e. why add any
root certificate that proves very little).

Then there's trying to convince organisations to use less trust worthy
root certificates.  Who wants their service to be flagged by web
browsers as "encrypted but a bit risky"?

It's perceptual, and ignoring the fact that existing, apparently better
certificates, are currently used by some services that don't prove who
they are any better than the lesser known root certificates.  But that's
the point of certificates - how things *look* to the casual observer.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Bruno Wolff III
On Mon, Mar 30, 2009 at 09:18:45 -0700,
  Craig White  wrote:
> 
> I agree that you are discussing the present day practical limitations
> but the concept of an open certificate authority would seem to defeat
> most, if not all of the problems of a corporate certificate authority
> such as Verisign or Thawte, etc. It would seem that those who harbor
> those concerns should join openca.org, help it reach critical mass, help
> it get root certificates installed in browsers by default, etc.

That isn't the real issue. I am not going to trust OpenCA any more than I
trust Versign or Thawte now. (i.e. if they have their certs in by default,
it just makes more certs for me to remove.)
What really needs to happen is a more sensible way of handling ssl connections.
What Firefox currently does is rediculous.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Craig White
On Tue, 2009-03-31 at 02:22 +1030, Tim wrote:
> On Mon, 2009-03-30 at 08:24 -0700, Craig White wrote:
> > http://www.openca.org/
> 
> Though that leaves you with a few problems:  
> 
> Few clients recognise them as an authority.  If they want to use them,
> users have to figure out how to add their root certificate (if they
> can).  And that's not just *you*, but the person you want to converse
> with.
> 
> And even then, that leaves ordinary users with not so trustworthy
> trusting (certificates issued without much vetting, and there's users
> who have no way to prove who they really are to get a really good
> certificate), and users just unthinkingly okaying not so trustable
> certificates.

I agree that you are discussing the present day practical limitations
but the concept of an open certificate authority would seem to defeat
most, if not all of the problems of a corporate certificate authority
such as Verisign or Thawte, etc. It would seem that those who harbor
those concerns should join openca.org, help it reach critical mass, help
it get root certificates installed in browsers by default, etc.

Craig

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Tim
On Mon, 2009-03-30 at 08:24 -0700, Craig White wrote:
> http://www.openca.org/

Though that leaves you with a few problems:  

Few clients recognise them as an authority.  If they want to use them,
users have to figure out how to add their root certificate (if they
can).  And that's not just *you*, but the person you want to converse
with.

And even then, that leaves ordinary users with not so trustworthy
trusting (certificates issued without much vetting, and there's users
who have no way to prove who they really are to get a really good
certificate), and users just unthinkingly okaying not so trustable
certificates.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Bruno Wolff III
On Mon, Mar 30, 2009 at 08:55:52 -0500,
  Aaron Konstam  wrote:
> What is wrong with Verisign?

Lot's of things. They did spin off some of their evil when they made Network
Solutions a separate entity again, but I am sure there is still plenty of
evil left behind.

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Craig White
On Tue, 2009-03-31 at 00:48 +1030, Tim wrote:
> On Mon, 2009-03-30 at 08:55 -0500, Aaron Konstam wrote:
> > What is wrong with Verisign?
> 
> Is that a loaded question, or what?
> 
> Some have no kind words for the company.  Here's a short bit about that:
> http://en.wikipedia.org/wiki/VeriSign#Controversies
> 
> Leaving that aside, there's the issues of:  
> 
> Cost of getting a genuinely vetted certificate (there's cheap badly
> tested certification that just sees if you respond to an email address,
> and expensive better vetting that requires more sane checks to see if
> you're who you claim to be before being certified).
> 
> Technical support for using certificates in whatever clients are
> involved (your client, plus whomever you communicate with).  Of course,
> PGP has that issue, too.

http://www.openca.org/

Craig

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Frank Cox
On Tue, 31 Mar 2009 00:48:01 +1030
Tim wrote:

> On Mon, 2009-03-30 at 08:55 -0500, Aaron Konstam wrote:
> > What is wrong with Verisign?
> 
> Is that a loaded question, or what?

Directly on point, someone persuaded Verisign to issue genuine Microsoft
Corporation keys to them in 2001.

-- 
MELVILLE THEATRE ~ Melville Sask ~ http://www.melvilletheatre.com

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Tim
On Mon, 2009-03-30 at 08:55 -0500, Aaron Konstam wrote:
> What is wrong with Verisign?

Is that a loaded question, or what?

Some have no kind words for the company.  Here's a short bit about that:
http://en.wikipedia.org/wiki/VeriSign#Controversies

Leaving that aside, there's the issues of:  

Cost of getting a genuinely vetted certificate (there's cheap badly
tested certification that just sees if you respond to an email address,
and expensive better vetting that requires more sane checks to see if
you're who you claim to be before being certified).

Technical support for using certificates in whatever clients are
involved (your client, plus whomever you communicate with).  Of course,
PGP has that issue, too.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Aaron Konstam
On Mon, 2009-03-30 at 22:17 +1030, Tim wrote:
> On Mon, 2009-03-30 at 11:23 +0100, Anne Wilson wrote:
> > If you examine my key you will see that it is signed by a number of
> > people who have properly verified that I am who I say I am.  This is
> > essential for the web of trust to work, but frankly it is not
> > understood by many people, and I've seen conversations where people
> > will sign anyone's key.  The whole web of trust falls apart when this
> > happens.
> 
> Looking at your key, using the seahorse program, I can see nothing that
> gives me any indication that the signers have checked anything, only a
> list of names of who the signers are.  Not very helpful...  You'd have
> to use something else to see certification levels, e.g. command line
> tools.  Of course the indicator will only be that person X *says*
> they've checked you out.  There's nothing to enforce them being
> truthful.
> 
> As you say, some will sign anything willy nilly.  The web of trust is
> really only useful with people that you actually know.  You can't make
> any assumptions just because a key is counter-signed.  A third party's
> referral is useless.  The only third party that you could trust would be
> some service that you know refuses to sign keys without adequate
> verification, assuming that there is one, and that you know of their
> reputation.
What is wrong with Verisign?

--
===
Freedom begins when you tell Mrs. Grundy to go fly a kite.
===
Aaron Konstam telephone: (210) 656-0355 e-mail: akons...@sbcglobal.net

-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Anne Wilson
On Monday 30 March 2009 12:47:49 Tim wrote:
> On Mon, 2009-03-30 at 11:23 +0100, Anne Wilson wrote:
> > If you examine my key you will see that it is signed by a number of
> > people who have properly verified that I am who I say I am.  This is
> > essential for the web of trust to work, but frankly it is not
> > understood by many people, and I've seen conversations where people
> > will sign anyone's key.  The whole web of trust falls apart when this
> > happens.
>
> Looking at your key, using the seahorse program, I can see nothing that
> gives me any indication that the signers have checked anything, only a
> list of names of who the signers are.  Not very helpful...  You'd have
> to use something else to see certification levels, e.g. command line
> tools.  Of course the indicator will only be that person X *says*
> they've checked you out.  There's nothing to enforce them being
> truthful.
>
Exactly.  In this case there were all the appropriate checks, but all you can 
see is a list of names, and I suppose you can check that those names are ones 
you have reason to trust, but that's all, and it's a bit vague.  The person 
who signed the key had to produce their own key to sign it, and that key will 
also have signatures of people that have checked his identity, but it does 
depend entirely on the web of trust being respected, carried out to the 
letter.  Which was my point.

> As you say, some will sign anything willy nilly.  The web of trust is
> really only useful with people that you actually know.  You can't make
> any assumptions just because a key is counter-signed.  A third party's
> referral is useless.  The only third party that you could trust would be
> some service that you know refuses to sign keys without adequate
> verification, assuming that there is one, and that you know of their
> reputation.
>
Absolutely.  It would help if the action of signing included some information 
about the act, such as whether it was carried out at a LUG, Conference, or 
some other organisation, so you could come to some decision about its 
reliability, but there is no such thing.  Consequently I am advocating, as you 
are, careful thought about how much credence to put on gpg- (or pgp-) signing.

Anne
-- 
New to KDE4? - get help from http://userbase.kde.org
Just found a cool new feature?  Add it to UserBase


signature.asc
Description: This is a digitally signed message part.
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-30 Thread Tim
On Mon, 2009-03-30 at 11:23 +0100, Anne Wilson wrote:
> If you examine my key you will see that it is signed by a number of
> people who have properly verified that I am who I say I am.  This is
> essential for the web of trust to work, but frankly it is not
> understood by many people, and I've seen conversations where people
> will sign anyone's key.  The whole web of trust falls apart when this
> happens.

Looking at your key, using the seahorse program, I can see nothing that
gives me any indication that the signers have checked anything, only a
list of names of who the signers are.  Not very helpful...  You'd have
to use something else to see certification levels, e.g. command line
tools.  Of course the indicator will only be that person X *says*
they've checked you out.  There's nothing to enforce them being
truthful.

As you say, some will sign anything willy nilly.  The web of trust is
really only useful with people that you actually know.  You can't make
any assumptions just because a key is counter-signed.  A third party's
referral is useless.  The only third party that you could trust would be
some service that you know refuses to sign keys without adequate
verification, assuming that there is one, and that you know of their
reputation.

-- 
[...@localhost ~]$ uname -r
2.6.27.19-78.2.30.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines


Re: Web of Trust (a revolution)

2009-03-30 Thread Anne Wilson
On Monday 30 March 2009 08:28:12 Stanisław T. Findeisen wrote:
> Mikkel L. Ellertson wrote:
> > Let me see - The Gnupg package is included with Fedora. RPMs are
> > signed with a GPG key - each version has its own key. The extra
> > repositories have their own keys. When their was a possibility that
> > the keys had been compromised, new keys were issued. It is not like
> > Fedora isn't already using gpg...
> >
> > About the only change I can see would be signing the files needed to
> > do a network install...
>
> I was talking about the community more, than about the repos. Is GnuPG
> widely used in the community? How about the people from M$ world?
>
> Again: promoting GnuPG would promote:
> * GNU
> * free software
> * security and authenticity
> * bazaar model
> * mutual trust
> all at the same time.
>
> Maybe that would be better than to sit and wait for Microsoft/whatever
> to sell everybody his X.509 Wide use of encryption/digital
> signatures will come sooner or later, I guess.
>
If you examine my key you will see that it is signed by a number of people who 
have properly verified that I am who I say I am.  This is essential for the 
web of trust to work, but frankly it is not understood by many people, and 
I've seen conversations where people will sign anyone's key.  The whole web of 
trust falls apart when this happens.

Since the criteria for correct verification is very precise, I can't see most 
people getting their keys signed, and without that, the point of using a key 
is very limited.

Anne
-- 
New to KDE4? - get help from http://userbase.kde.org
Just found a cool new feature?  Add it to UserBase


signature.asc
Description: This is a digitally signed message part.
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-30 Thread Stanisław T. Findeisen

Mikkel L. Ellertson wrote:

Let me see - The Gnupg package is included with Fedora. RPMs are
signed with a GPG key - each version has its own key. The extra
repositories have their own keys. When their was a possibility that
the keys had been compromised, new keys were issued. It is not like
Fedora isn't already using gpg...

About the only change I can see would be signing the files needed to
do a network install...


I was talking about the community more, than about the repos. Is GnuPG 
widely used in the community? How about the people from M$ world?


Again: promoting GnuPG would promote:
* GNU
* free software
* security and authenticity
* bazaar model
* mutual trust
all at the same time.

Maybe that would be better than to sit and wait for Microsoft/whatever 
to sell everybody his X.509 Wide use of encryption/digital 
signatures will come sooner or later, I guess.


STF

===
http://eisenbits.homelinux.net/~stf/
OpenPGP: 9D25 3D89 75F1 DF1D F434  25D7 E87F A1B9 B80F 8062
===



signature.asc
Description: OpenPGP digital signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Re: Web of Trust (a revolution)

2009-03-27 Thread Mikkel L. Ellertson
Stanisław T. Findeisen wrote:
> Friends,
> 
> Inspired by the recent problems with checksums for various installation
> files of Fedora 10, may I be allowed to say, that I think that broader
> adoption of OpenPGP standard (gpg) among Fedora (and Free Software)
> developers and users could be a desirable and advertising-worth goal.
> It could be a Strategy.
> 
Let me see - The Gnupg package is included with Fedora. RPMs are
signed with a GPG key - each version has its own key. The extra
repositories have their own keys. When their was a possibility that
the keys had been compromised, new keys were issued. It is not like
Fedora isn't already using gpg...

About the only change I can see would be signing the files needed to
do a network install...

Mikkel
-- 

  Do not meddle in the affairs of dragons,
for thou art crunchy and taste good with Ketchup!



signature.asc
Description: OpenPGP digital signature
-- 
fedora-list mailing list
fedora-list@redhat.com
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines