-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

> I don't understand your point here, can you please elaborate? For 
> clients accessing the pool the results are simply a DNS round
> robin and the client connects to a given SKS server. If there is 
> fragmentation in the network we'd have to split the servers
> (probably exclude servers with deleted keys).

Some days/weeks(?) ago i posted a share on Google+ according to this
issue:

Data Protection and PGP/GnuPG ?!?!?!

Inspired by the  +OHM Observe Hack Make-Talk about "Trolling the
PGP/GnuPG-Web of Trust" by +Micah Lee I installed an "own"
PGP/GnuPG-keyserver on two of my servers.

One of these servers is available using the worldwide server-pool, the
other server is an experimental one and not connected to the pool.

While experimenting and having severals talks to a german lawyer and
+Jochim Selzer (wo takes care about data protection issues) I detected
a major issue, which may have a bigger impact to german (and maybe
european) keyservers.

The issue is the storage of personal data in worldwide databases
without the possibility to get them deleted. German law enables
everybody to get their data removed from databases. No matter if the
data is in databases accessible via internet or in closed databases
accessible for employees of a company.

You may now note, that everybody should take care about uploading the
public key to a public keyserver. But there is absolutely no notice
telling the user, that the key is published and can never be deleted,
no matter if the key is uploaded by PGP/GnuPGP or via a website of a
keyserver.

Furthermore anybody can send a public key to the keyserver-pool. There
is no need to have the private key for the upload. As soon as I
publish my public key on my website or send it via email etc. it's out
of my focus. Together with my name, my email-adress and (depending of
the data) the company I work at.

Now expect the following case:

An underaged wants to exchange protected emails with friends. When
contacting a Certificate Authority, the permission of the parents is
needed for storing the data and signing a "contract". If the
permission is not granted, the company can be forced to revoke the
contract and delete all data.

For the PGP/GnuPG-keyservers nobody asks for the permission when
publishing the key data like name or email-adress. Therefore anybody
can send and publish the personal data on the keyservers.

Let's now come back to the talk at OHM I mentioned some at the
beginning of this share
(https://www.eff.org/event/ohm2013-trolling-web-trust) :

If there is no private key needed and no verification done everybody
can generate keys with every combination of name and email-adress,
generated at random dates and upload them to the keyservers. And if
everybody is able to generate and publish fake keys everybody can
build up fake web of trust.

You my now argue that it's possible to revoke a key.

This is absolutely correct, but a revocation will not be possible if
you don't have the private key. And revocation will not remove the key
from the keyserver-pool.

This means:

If a keyserver-maintainer isn't able to delete the key from the server
database, a shutdown of the server can be forced.

Thanks for reading ...

- -----> Read the follow-up mail for a possible solution i have in my
mind ...
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlJwKmUACgkQVuf/iihAxwh/gwCfQ3Gzm4U5su3m9OCnObpWCHgm
2sUAoK1Y7bPPC0wvv6HQPjE6wz+cV4o1
=0Snp
-----END PGP SIGNATURE-----

_______________________________________________
Sks-devel mailing list
Sks-devel@nongnu.org
https://lists.nongnu.org/mailman/listinfo/sks-devel

Reply via email to