Re: Key poisoning

2019-08-14 Thread Robert J. Hansen
> If the keyserver implemented a signer blacklist, (which would scrub the > blacklisted signature from any current or incoming public keys), what > consequences am I missing? Someone already chimed in about how this is "enumerating badness", which runs counter to best practices in security. Addit

Re: Key poisoning

2019-08-14 Thread Andrew Gallagher
> On 14 Aug 2019, at 23:38, Daniel Clery wrote: > > If the keyserver implemented a signer blacklist, (which would scrub the > blacklisted signature from any current or incoming public keys), what > consequences am I missing? This is known as “enumerating badness” and it doesn’t scale. You wou

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Jason Harris via Gnupg-users
> On Aug 14, 2019, at 6:32 PM, MFPA via Gnupg-users > wrote: > On Wednesday 14 August 2019 at 10:39:56 AM, in > , Alessandro Vesely > via Gnupg-users wrote:- > >> I'm no expert, but it seems to me that 3rd party >> signatures should not >> be allowed. > > Perhaps a "keyserver no-third-party-s

Re: looking for assistance tracking down why i don't have the ability to run gpg from the command line

2019-08-14 Thread David
On 14/08/2019 16:30, charlie derr wrote: > I'm running debian 10 buster (upgraded recently from stretch if that > matters) and i use KDE. I haven't yet tried to logout of my desktop > environment completely (and just use a native console), but I thought > I would see if any of you had any ideas. He

Key poisoning

2019-08-14 Thread Daniel Clery
If the keyserver implemented a signer blacklist, (which would scrub the blacklisted signature from any current or incoming public keys), what consequences am I missing? In essence, shadowbanning a signing key. Keyservers without blacklist support would still pass around the toxic keys, but only un

Re: Difficulty of fixing reconciliation

2019-08-14 Thread MFPA via Gnupg-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 14 August 2019 at 10:39:56 AM, in , Alessandro Vesely via Gnupg-users wrote:- > I'm no expert, but it seems to me that 3rd party > signatures should not > be allowed. Perhaps a "keyserver no-third-party-signatures" option would re

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Werner Koch via Gnupg-users
On Wed, 14 Aug 2019 15:45, r...@sixdemonbag.org said: > developed *more than twenty years ago* it was decided to support > arbitrary numbers of third-party signatures. GnuPG faithfully At least OpenPGP has this: 5.2.3.17. Key Server Preferences (N octets of flags) This is a list of o

Re: was Re: PGP Key Poisoner // now "Binding one person's subkey to another person's primary key"

2019-08-14 Thread Robert J. Hansen
> I've often wondered why the sks software didn't require > cross-certification. It seems like that would solve the key poisoning > issue. Not enough OCaml programmers, mostly. Strange but true: SKS has no crypto code in it anywhere. So the moment you say "I wonder why SKS doesn't do this thing

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Robert J. Hansen
> Can you give me a valid reason why anyone would want their key signed by > 150,000 people or more?? How can you meet 150,000 people? Sure, if you can give me a valid reason why I *should* give you a valid reason. Seriously. I'm not a GnuPG developer. I don't run an SKS keyserver. I know a go

Re: PGP Key Poisoner

2019-08-14 Thread Johan Wevers
On 14-08-2019 11:38, Alessandro Vesely via Gnupg-users wrote: > Of course, anonymous key poisoning is a kind of gratuitous vandalism. > Yet, crypto is supposed to work in a hostile environment. But this is only an extreme form of what an old keyserver already did: it issued (I believe every 6 mo

Re: was Re: PGP Key Poisoner // now "Binding one person's subkey to another person's primary key"

2019-08-14 Thread Brian Minton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I've often wondered why the sks software didn't require cross-certification. It seems like that would solve the key poisoning issue. It would mean that when signing someone's key, you'd have to have a way to exchange the signatures first, before su

looking for assistance tracking down why i don't have the ability to run gpg from the command line

2019-08-14 Thread charlie derr
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I'm running debian 10 buster (upgraded recently from stretch if that matters) and i use KDE. I haven't yet tried to logout of my desktop environment completely (and just use a native console), but I thought I would see if any of you had any ideas. He

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Peter Lebbing
On 14/08/2019 12:29, Vincent Breitmoser wrote: >> The algorithm is designed to withstand very well funded actors, >> oppressive regimes were what the designers were thinking of. > > We are talking about a sand castle here that was kicked down by a kid. It's > a bit bizarre to claim that it was bui

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Peter Lebbing
On 14/08/2019 12:09, Andrew Gallagher wrote: > Indeed, but that condition is fundamentally incompatible with > decentralised reconciliation - because deletion without permissions > management is an open door, and permissions have to be enforced by an > authority. H the authority could just

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Peter Lebbing
On 14/08/2019 11:39, Alessandro Vesely via Gnupg-users wrote: > Absolute monotonicity is wrong. It must be possible to delete errors. In that case we need a different algorithm. Which I had already been advocating, so you are preaching to the choir. You can keep reiterating that you do not like

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Peter Lebbing
Hello David, > Can you give me a valid reason why anyone would want their key signed by > 150,000 people or more?? I don't see anybody claiming that this is a valid use case. There are several issues preventing actually limiting this in the current keyserver network, but this has already been ex

Re: Difficulty of fixing reconciliation

2019-08-14 Thread David
On 13/08/2019 15:54, Robert J. Hansen wrote: >> Good write-up. Now I have a question, in hope that SKS operators are >> reading this too. I have learned from Robert's gist that the max. is >> 150.000 sigs per key the servers can handle, if I am not mistaken. > > I didn't say this. > > I said they

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Vincent Breitmoser via Gnupg-users
> The algorithm is designed to withstand very well funded actors, > oppressive regimes were what the designers were thinking of. We are talking about a sand castle here that was kicked down by a kid. It's a bit bizarre to claim that it was built to withstand rockets. Given that the recon algori

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Andrew Gallagher
On 14/08/2019 10:39, Alessandro Vesely via Gnupg-users wrote: > Absolute monotonicity is wrong. It must be possible to delete errors. Indeed, but that condition is fundamentally incompatible with decentralised reconciliation - because deletion without permissions management is an open door, and p

Re: Difficulty of fixing reconciliation

2019-08-14 Thread Alessandro Vesely via Gnupg-users
On Tue 13/Aug/2019 13:07:07 +0200 Peter Lebbing wrote: > On 13/08/2019 09:54, Alessandro Vesely via Gnupg-users wrote: >> More than a reasonable number of signatures makes no sense in >> practice, so I agree lists should somehow be "fixed" so as not to >> accept an unreasonable number of signatures

Re: PGP Key Poisoner

2019-08-14 Thread Alessandro Vesely via Gnupg-users
On Tue 13/Aug/2019 12:08:31 +0200 Werner Koch Via Gnupg-users wrote: > On Tue, 13 Aug 2019 09:54, gnupg-users@gnupg.org said: > >> The bug, however, is in the program that chokes on poisoned keys! > > Nope. This is a long standing DoS protection by limiting the total > length of a keyblock. The