-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 2012-05-27 11:50, Giovanni Mascellani wrote:
> Ciao.
> 
> Il 27/05/2012 11:23, Kristian Fiskerstrand ha scritto:
>> I too, agree, that this is something that should be considered.
>> 
>> GnuPG is already doing its own cleaning up of the code for
>> similar reasons, something which was discussed back in April 2011
>> as well[0] (and reminded me about [1], I had nearly forgotten
>> about that) :)
> 
> I'm just a newbie here, but actually I'd like to see the same
> concept applied in a more general way: I think there is much
> garbage in the keyservers, even behind the PGP robo-signer. For
> example, I think that many keys are not used anymore, were created
> some times ago by some random people that then lost interest in PGP
> and just left it, maybe without even revoking it. I'm an example of
> that: lots of keys with my name date back to when I didn't really
> understand how keys worked (I managed to revoke most of them, but
> for some I really lost the private key).
> 
> The mechanism I thought to is that: each piece of information in
> SKS has associated an expiry date, which can be renewed simply by
> reuploading that thing. This expiry date is communicated between
> SKS together with the piece of information itself. When if expiry
> date is reached, the server is allowed to drop that information.
> 
> This way people can easily retain the things they're interested
> into (simply reuploading them regularly), while things not
> interesting to anyone anymore fade out.
> 
> I don't know what expiry time frame we could consider acceptable: 
> probably anything between one month and one year would make sense.
> 
> Did you ever think at something like that?

That has been discussed previously, and I am, at least personally very
much against it. There are good reasons to keep historical data on the
keyservers in order to increase security.

Especially in the case of revoked keys (consider the example where
user A generate a key, the key gets compromised by B, so A send out a
revocation certificate. If this is then later deleted, user B can
upload a non-revoked key and the messages are compromised)

The reason this differ from the e.g the PGP Corp auto-signature, is that
        (i) It add a lot of bloat
        (ii) removing the expired old signatures, in my mind, doesn't reduce
the security of the overall system
        (iii) I question the usefulness of the auto-signing itself.


- -- 
- ----------------------------
Kristian Fiskerstrand
http://www.sumptuouscapital.com
Twitter: @krifisk
- ----------------------------
Corruptissima re publica plurimæ leges
The greater the degeneration of the republic, the more of its laws
- ----------------------------
This email was digitally signed using the OpenPGP
standard. If you want to read more about this
The book: Sending Emails - The Safe Way: An
introduction to OpenPGP security is now
available in both Amazon Kindle and Paperback
format at
http://www.amazon.com/dp/B006RSG1S4/
- ----------------------------
Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=7mMy
-----END PGP SIGNATURE-----


_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to