Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-12 Thread Ed Gerck
lcs Mixmaster Remailer wrote: > This is in contrast to the practice in the X.509 PKI, where a root CA > has the ability to delegate trust as far as it wishes. This is not correct. In X.509 it is the verifier that defines how that is accepted and to how many levels, irrespective of what was sig

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-11 Thread lcs Mixmaster Remailer
A common misconception about the PGP web of trust is that trust flows through the web along the signatures. Actually, PGP's trust model is founded on the principle that "trust isn't transitive". A signature is never trusted in PGP unless the user has explicitly indicated that he personally trust

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-07 Thread Bodo Moeller
On Wed, Sep 06, 2000 at 11:50:17AM -0400, Derek Atkins wrote: > Ray Dillinger <[EMAIL PROTECTED]> writes: >> I have long felt that PGP missed a trick when it didn't have >> automatic expiry for keys -- It should be possible to build >> into each key an expiration date, fixed at the time of its

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-07 Thread Bill Stewart
At 08:45 AM 9/4/00 +0200, Jaap-Henk Hoepman wrote: >What's wrong with the PGP wrappers for Outlook or Eudora? They looked quite >usable and user friendly to me - as far as any secure email product could ever >be completely be user friendly... The user has to do more stuff than usual, and >has to h

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-07 Thread Bill Frantz
At 9:01 AM -0700 9/3/00, David Honig wrote: >I didn't make myself clear. I meant that PGP is perfectly useful >*without any keyservers*. I am in *favor* of people not publishing >their keys, except maybe if you were a business and *wanted* cold-calls >[1]. Sort of like a front-office line and a

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Arnold G. Reinhold
At 4:38 PM -0700 9/5/2000, David Honig wrote: >At 05:33 PM 9/3/00 -0400, Dan Geer wrote: >> >>> How do they exchange public keys? Via email I'll bet. >> > > >Note that it is trivial(*) to construct a self-decrypting > >archive and mail it in the form of an attachment. The >>recipient will mere

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Ted Lemon
> So I would prefer to work with a CA where it is not a *necessary* > condition for a revocation. Why would someone grabbing your red and blue disks compromise your key? You have it encrypted, right? The encryption key is only present in wetware, right? :'} I generally don't think of "som

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Derek Atkins
Ray Dillinger <[EMAIL PROTECTED]> writes: > I have long felt that PGP missed a trick when it didn't have > automatic expiry for keys -- It should be possible to build > into each key an expiration date, fixed at the time of its > creation. For shorter keys, it ought to default to expiring >

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Derek Atkins
RFC2440 (OpenPGP) provides for referral revocations -- you can let other people revoke your key on your behalf. -derek Ray Dillinger <[EMAIL PROTECTED]> writes: > On Tue, 5 Sep 2000, Ted Lemon wrote: > > > > >If you sign the revocation certificate in the compromised key, then > >the only way i

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread David Honig
At 10:47 PM 9/5/00 -0400, Dan Geer wrote: > I can tell people never to accept >an executable mailed to them from anywhere, which will get >laughed at by all the people in the business world who... [...who are digging their own graves if they routinely run programs mailed to them, whether or not

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Ray Dillinger
On Tue, 5 Sep 2000, Ted Lemon wrote: > >If you sign the revocation certificate in the compromised key, then >the only way it can get revoked is if the owner of the key revokes it >or it's been compromised... > > _MelloN_ This is true, and that's a *sufficient* condi

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Paul Crowley
I'm still far from convinced that the Web of Trust achieves what it's supposed to achieve, even when used correctly. Consider this question: what do you need to know about a person in order to feel confident that they are the intended recipient of your secure communication? Because I bet the a

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Ben Laurie
Ray Dillinger wrote: > > On Tue, 5 Sep 2000, David Honig wrote: > > > The more hard-core distribute keys to previously known > >parties on physical media, only. > > > > I have long felt that PGP missed a trick when it didn't have > automatic expiry for keys -- It should be possible to build >

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-06 Thread Ted Lemon
If you sign the revocation certificate in the compromised key, then the only way it can get revoked is if the owner of the key revokes it or it's been compromised... _MelloN_

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Ray Dillinger
On Tue, 5 Sep 2000, David Honig wrote: > The more hard-core distribute keys to previously known >parties on physical media, only. > I have long felt that PGP missed a trick when it didn't have automatic expiry for keys -- It should be possible to build into each key an expiration date, f

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread David Honig
At 10:17 PM 9/5/00 -0400, P.J. Ponder wrote: > > >On Tue, 5 Sep 2000, David Honig wrote: >> >> If you have a secure channel to exchange a passphrase in, >> you have no need for PK. >> > >Public key allows digital signatures, A digsig does indeed rely on PK, but you needn't use digsigs to use P

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Dan Geer
I said, >Note that it is trivial(*) to construct a self-decrypting >archive and mail it in the form of an attachment. The >recipient will merely have to know the passphrase. If >transit confidentiality is your aim and old versions >of documents are irrelevant once the ink

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Ed Gerck
Ed Gerck wrote: > Even though the web-of-trust seems to be a pretty good part of PGP, > IMO it is actually it's Achilles heel. I agree with most comments but they seem to deal more with symptons. Let me just clarify/justify the above and why I think this is IMO actually the root cause of problems

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread P.J. Ponder
On Tue, 5 Sep 2000, David Honig wrote: > > If you have a secure channel to exchange a passphrase in, > you have no need for PK. > Public key allows digital signatures, which a secure channel for key exchange doesn't provide. Two parties may choose to use symmetric encryption for exchanging m

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread David Honig
At 05:33 PM 9/3/00 -0400, Dan Geer wrote: > >> How do they exchange public keys? Via email I'll bet. > >Note that it is trivial(*) to construct a self-decrypting >archive and mail it in the form of an attachment. The >recipient will merely have to know the passphrase. If If you have a secure

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Dan Geer writes: > >> How do they exchange public keys? Via email I'll bet. > >Note that it is trivial(*) to construct a self-decrypting >archive and mail it in the form of an attachment. The >recipient will merely have to know the passphrase. If >transit confi

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Ben Laurie
Dave Del Torto wrote: > > At 11:14 pm -0400 2000-09-01, Russell Nelson wrote: > >Ed Gerck writes: > >>Even though the web-of-trust seems to be a pretty good part of PGP, > >>IMO it is actually it's Achilles heel. > > > >Nope. Usability is its Achilles heel. PGP needs to be wrapped in > >somethi

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Jaap-Henk Hoepman
On Fri, 1 Sep 2000 23:14:06 -0400 (EDT) Russell Nelson <[EMAIL PROTECTED]> writes: > Ed Gerck writes: > > Even though the web-of-trust seems to be a pretty good part of PGP, > > IMO it is actually it's Achilles heel. > > Nope. Usability is its Achilles heel. PGP needs to be wrapped in > some

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Dan Geer
> How do they exchange public keys? Via email I'll bet. Note that it is trivial(*) to construct a self-decrypting archive and mail it in the form of an attachment. The recipient will merely have to know the passphrase. If transit confidentiality is your aim and old versions of documents ar

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Dan Geer
Well put, Greg. I do think that a small circle of trusted friends is a tautology -- if it is not small, it cannot be trusted. Was it not ever thus? --dan

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread David Honig
At 09:56 PM 9/2/00 -0400, Arnold G. Reinhold wrote: >At 3:48 PM -0700 9/1/2000, David Honig wrote: >>At 09:34 AM 8/30/00 -0700, Ed Gerck wrote: >>> >>>BTW, many lawyers like to use PGP and it is a good usage niche. Here, in the >>>North Bay Area of SF, PGP is not uncommon in such small-group busi

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Arnold G. Reinhold
At 3:48 PM -0700 9/1/2000, David Honig wrote: >At 09:34 AM 8/30/00 -0700, Ed Gerck wrote: >> >>BTW, many lawyers like to use PGP and it is a good usage niche. Here, in the >>North Bay Area of SF, PGP is not uncommon in such small-group business users. > >How do they exchange public keys? Via ema

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-05 Thread Dave Del Torto
At 11:14 pm -0400 2000-09-01, Russell Nelson wrote: >Ed Gerck writes: >>Even though the web-of-trust seems to be a pretty good part of PGP, >>IMO it is actually it's Achilles heel. > >Nope. Usability is its Achilles heel. PGP needs to be wrapped in >something, and yet it's not really designed to

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-01 Thread Russell Nelson
Ed Gerck writes: > Even though the web-of-trust seems to be a pretty good part of PGP, > IMO it is actually it's Achilles heel. Nope. Usability is its Achilles heel. PGP needs to be wrapped in something, and yet it's not really designed to be wrapped. Even if it were, PGP, Inc. changed the i

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-01 Thread David Honig
At 09:34 AM 8/30/00 -0700, Ed Gerck wrote: > >BTW, many lawyers like to use PGP and it is a good usage niche. Here, in the >North Bay Area of SF, PGP is not uncommon in such small-group business users. How do they exchange public keys? Via email I'll bet. Bitpushing MDs should be another 'good

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-01 Thread Ed Gerck
Greg Rose wrote: > I was an early adopter of PGP, and put a lot of effort into advancing the > Web of Trust. I use PGP actively on a daily basis. Nevertheless, I have > been disillusioned for some time, and today's fun prodded me into writing > this. Here is a list of things which I consider to

Re: reflecting on PGP, keyservers, and the Web of Trust

2000-09-01 Thread Nelson Minar
Nice note, Greg, thank you. I remember the call to arms of PGP, get the whole world encrypting email. And who can forget Gilmore's Free S/WAN goal, to secure 5% of Internet traffic by the end of 1996? These proclamations were hugely inspirational for me. These efforts helped advance practical c

reflecting on PGP, keyservers, and the Web of Trust

2000-09-01 Thread Greg Rose
I've just had an interesting experience which has set me to thinking about the usefulness of tools like PGP, including implicitly the Web of Trust, Keyservers, and so on. The situation that brought this to mind was a simple one. I wanted to rejoin an association that I'd somehow lapsed from, m