Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Matthew A. Miller
Note that the following assumes that one favors security with identity, not anonymity (-: From the perspective of the average user (like my father, siblings, and most of my coworkers and customers), obtaining a PGP key is just about as complex as obtaining an x.509 certificate (CA- or

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Looking at JEP-0116 again, I see that public keys are used to verify the identity of the parties, but that the stanzas themselves are signed and encrypted with session keys. So identity is asserted and preserved in the initial negotiation, but not

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Justin Karneges
On Tuesday 07 March 2006 09:13, Peter Saint-Andre wrote: Looking at JEP-0116 again, I see that public keys are used to verify the identity of the parties, but that the stanzas themselves are signed and encrypted with session keys. So identity is asserted and preserved in the initial

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Justin Karneges wrote: On Tuesday 07 March 2006 09:13, Peter Saint-Andre wrote: Looking at JEP-0116 again, I see that public keys are used to verify the identity of the parties, but that the stanzas themselves are signed and encrypted with session

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Justin Karneges
On Tuesday 07 March 2006 14:12, Peter Saint-Andre wrote: So the repudiability and perfect forward security aspects of OTR don't give me much comfort in the real world. Exactly. Interesting of you to bring up forward secrecy here. I believe that's where if your public key is compromised, your

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Juan Antonio Gómez Moriano
El dom, 05-03-2006 a las 14:38 +0200, Norman Rasmussen escribió: Have you read 'JEP-0116: Encrypted Sessions' (http://www.jabber.org/jeps/jep-0116.html) JEP-0027 is only a Historical JEP, so it's not a standards-track spec, JEP-0116 is a standards-track spec. True, the thing is that

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-07 Thread Juan Antonio Gómez Moriano
El mar, 07-03-2006 a las 14:49 -0800, Justin Karneges escribió: On Tuesday 07 March 2006 14:12, Peter Saint-Andre wrote: So the repudiability and perfect forward security aspects of OTR don't give me much comfort in the real world. The thing is that in the real world the cryptography will

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-06 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michal Vaner (Vorner) wrote: In fact anyone wanting to implement encrypted communications in their clients should be implementing JEP-0116, and _not_ JEP-0027 - is backwards compatability with older clients a good enough reason to implement

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-06 Thread Trejkaz
Peter Saint-Andre wrote: Now, neither OpenPGP or S/MIME enable you to repudiate what you said, and if people find that important then they would need to do JEP-0116 (or something very much like it, such as Gaim's OTR plugin). So in part the differences here come down to requirements and

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-06 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Trejkaz wrote: Peter Saint-Andre wrote: Now, neither OpenPGP or S/MIME enable you to repudiate what you said, and if people find that important then they would need to do JEP-0116 (or something very much like it, such as Gaim's OTR plugin). So in

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Juan Antonio Gómez Moriano
Thanks to all for the answer/suggestions... What i have think now is to automatize the process of exchanging keys using OpenPGP key servers, after all they are suppossed to be synchronized, aren't they? Also i will develop something to create the OpenPGP keypair (just in case the user has not used

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Trejkaz
On Sunday 05 March 2006 22:05, Juan Antonio Gómez Moriano wrote: Finally and considering that i will use OpenPGP to handle the encryption, should i use GnuPG? I have been looking at the BouncyCastle cryptography extension (a set of librearies to perform cryptographic functions), by using that

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Norman Rasmussen
Have you read 'JEP-0116: Encrypted Sessions' (http://www.jabber.org/jeps/jep-0116.html) JEP-0027 is only a Historical JEP, so it's not a standards-track spec, JEP-0116 is a standards-track spec. On 3/5/06, Juan Antonio Gómez Moriano [EMAIL PROTECTED] wrote: Thanks to all for the

[jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Remko Troncon
On 05 Mar 2006, at 13:38, Norman Rasmussen wrote: yea, I've considered adding a button to Psi to do this many times. A solution which doesn't require a button would be to use PEP to publish your key. cheers, Remko

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Norman Rasmussen
On 3/5/06, Remko Troncon [EMAIL PROTECTED] wrote: On 05 Mar 2006, at 13:38, Norman Rasmussen wrote: yea, I've considered adding a button to Psi to do this many times. A solution which doesn't require a button would be to use PEP to publish your key. No, as I said: as Michal pointed out any

[jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Remko Troncon
On 05 Mar 2006, at 18:26, Norman Rasmussen wrote: No, as I said: as Michal pointed out any exchange of pgp/gpg keys in-band will be insecure. (e.g. using the same tcp connection). The keyservers are the 'right' place to store and get this information. Retrieving keys from a keyserver is

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Norman Rasmussen
On 3/5/06, Remko Troncon [EMAIL PROTECTED] wrote: On 05 Mar 2006, at 18:26, Norman Rasmussen wrote: No, as I said: as Michal pointed out any exchange of pgp/gpg keys in-band will be insecure. (e.g. using the same tcp connection). The keyservers are the 'right' place to store and get this

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Michal Vaner (Vorner)
Dne neděle 05 březen 2006 21:04 Norman Rasmussen napsal(a): On 3/5/06, Remko Troncon [EMAIL PROTECTED] wrote: On 05 Mar 2006, at 18:26, Norman Rasmussen wrote: No, as I said: as Michal pointed out any exchange of pgp/gpg keys in-band will be insecure. (e.g. using the same tcp connection).

Re: [jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-05 Thread Trejkaz
On Monday 06 March 2006 07:04, Norman Rasmussen wrote: Agreed, gpg/pgp keys are 'supposed' to be inheriently strong, and therefore no automatic retrieval/exchange should even/ever be done, ever. People are getting confused here. There is *nothing* wrong with automatically retrieving the PGP

[jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-04 Thread Remko Troncon
The thing is : how do i know in which server is the key of the person i am chatting with?? You can't. You have to assume that the user uploads his key to a 'sensible' server, which synchronizes with other major keyservers. If he didn't, there's no way of retrieving the other person's

[jdev] Re: JEP-0027 (OpenPGP) implementation question

2006-03-04 Thread Remko Troncon
On 04 Mar 2006, at 23:19, Michal Vaner (Vorner) wrote: the point with PGP is that user checks and signs the key (if he trusts it). Therefore, key exchange can not happen automatically, since it would break one of the main idea of PGP, that user knows who he is encrypting to. Key exchange