On Jul 6, 2009, at 3:06 PM, Daniel Kahn Gillmor wrote:

On 07/06/2009 12:04 PM, David Shaw wrote:
On the subject of the various "pool" keyserver addresses, I'm working on
(re) adding SRV support to GPG using DNS service discovery.

Excellent news, thank you David!

Are you thinking about using simple SRV records [0], or (as your use of
the term "service discovery" suggests) the more-complex DNS-SD [1]?
DNS-SD (in conjunction with the rest of the zeroconf suite, and a
well-implemented pubring-via-HKP daemon) could make it possible to
quickly and easily share public keys and certifications between neighbors.

DNS-SD can work with the zeroconf and mDNS stuff, but it is its own beast. What I am doing should lay some groundwork if someone wants to take things a step further (find your keyserver automatically on a LAN, for example), but that's not what I'm shooting for today.

I'm aiming for two basic features:

1) A simple "keyserver sks-keyservers.net" (or whatever pool you like) should be able to balance across keyservers based on some useful criteria. 2) Port numbers should be provided automatically, so users never need to know if a keyserver is running on 11371 or 80 (and that applies to SSL as well)

And a third, somewhat more obscure feature, is:

3) The ability to ask a domain for its keyserver, so if you are mailing al...@example.com, your GPG instance can ask example.com for its keyserver(s), and then contact that keyserver. This is similar to the convention for storing keys in a LDAP server, where "ldap://keys. $domainname" contains the keys for $domainname.

The utility of #1 and #2 are clear. The utility of #3 is less so, so it likely won't be in the first cut of this.

It could also open up concerns about the ease of spoofing keyservers,
but i think those concerns already exist on the 'net today -- using
explicitly decentralized protocols like mDNS/DNS-SD is just taking the
decentralized and unauthenticated gossiping keyservers model one step
further.

I think it is essentially as secure as things are now. We find keyservers via DNS today, and this wouldn't change that. It's potentially two lookups vs one, but it's still dependent on the DNS not being spoofed.

 We rely on client-side crypto to evaluate the legitimacy of
returned signatures anyway, and that certainly wouldn't change.

Yes.

David



_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
http://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to