Re: Difficulty of fixing reconciliation

2019-08-15 Thread Jason Harris via Gnupg-users
> On Aug 15, 2019, at 3:33 PM, Werner Koch wrote: > > On Thu, 15 Aug 2019 00:02, gnupg-users@gnupg.org said: > >> But at least then we will want to add cryptography to see which >> selfsigs are truly legitimate, right? > > That would be the first and most important step to get the keyservers >

Re: Key poisoning

2019-08-15 Thread MFPA via Gnupg-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 15 August 2019 at 7:07:34 AM, in , Andrew Gallagher wrote:- > Also, if thousands of > separate keys have > signed another key, making it unusable, how do we > decide which of > those thousands of keys are legit and which the bad > a

Re: Key poisoning

2019-08-15 Thread MFPA via Gnupg-users
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 15 August 2019 at 10:26:31 AM, in , Peter Lebbing wrote:- > Plus, the attacker could just create a signature that > looks likely to be > real (self-sig or existing third-party sig seems a > good candidate). Would the attack work

Re: Difficulty of fixing reconciliation

2019-08-15 Thread Werner Koch via Gnupg-users
On Thu, 15 Aug 2019 00:02, gnupg-users@gnupg.org said: > But at least then we will want to add cryptography to see which > selfsigs are truly legitimate, right? That would be the first and most important step to get the keyservers back for the WoT Shalom-Salam, Werner -- Die Gedanken sind

Re: looking for assistance tracking down why i don't have the ability to run gpg from the command line

2019-08-15 Thread Peter Lebbing
Hello, > ni@quark:~/.ssh$ ps aux | grep 22009 > ni7740 0.0 0.0 6076 892 pts/6S+ 11:21 0:00 grep > 22009 > ni 22009 2.0 0.2 89404 78536 ?RL 02:51 10:30 gpg > --batch --no-sk-comments --status-fd 104 --no-tty --charset utf8 > --enable-progress-filter --exit-

My mails to rjh bounce

2019-08-15 Thread Peter Lebbing
By the way, I keep intending to put this as a PS on a proper mail, but I always forget. All my mails to Rob keep bouncing. The first bounce was June 30th. I'm not including the bounce message here on the off chance that there is something non-public about Robs mail infrastructure :-). So Rob can f

Re: Key poisoning

2019-08-15 Thread Peter Lebbing
On 15/08/2019 08:50, Robert J. Hansen wrote: > Additionally, the bad guys can create new malicious certificates faster > than the keyserver network can blacklist. Plus, the attacker could just create a signature that looks likely to be real (self-sig or existing third-party sig seems a good candid