lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <m3ehynzdwo.fsf@intrepid.localdomain>
Date:	Sat, 08 Oct 2011 17:44:23 +0200
From:	Krzysztof Halasa <khc@...waw.pl>
To:	Jon Masters <jonathan@...masters.org>
Cc:	Valdis.Kletnieks@...edu, Adrian Bunk <bunk@...sta.de>,
	"Frank Ch. Eigler" <fche@...hat.com>,
	"H. Peter Anvin" <hpa@...or.com>,
	"Rafael J. Wysocki" <rjw@...k.pl>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Greg KH <gregkh@...e.de>
Subject: Re: kernel.org status: establishing a PGP web of trust

Jon Masters <jonathan@...masters.org> writes:

> What I'm saying is that unless you sign something (random text, my
> actual key(s)) in my presence, I can't actually know it was you I was
> dealing with or someone else claiming to be you (or your identity).

Ahh, that's when the key is already signed, and when you can't see the
person in question. Sure. That's a normal ID check using the asymmetric
key pair.

> I see all these keysigning parties where people dutifully check IDs they
> don't really know how to recognize and am always struck by how the
> offline post-event nature effectively never proves the person you met in
> real life is the person whose key you just signed, just that some ID
> seemed to reasonably match the name on the fingerprint at the time.

There is nothing post-event in it. You are to collect (or check) the
fingerprint and check the ID. Post-event you only check the fingerprint
(against the authenticated fingerprint you collected at the party).
Assuming the fingerprint algorithm is secure (i.e. it's reasonably hard
to produce a collision) this process is safe.

> I
> bet it someone turned up at one of these events with a $100 fake ID made
> in China of the kind I hear about on the radio these days, a large
> majority of those present would happily sign a key claiming to match
> that ID after the event, even if the real owner was never there.

Yes. The signing party only proves a connection between a
reasonably-looking ID (and/or person) and a private key. It's very hard
to go any further, what would you use? A full genome check versus one's
parents? :-)

Of course it's much harder to impersonate someone who is well known.
That's also why a big international key signing party isn't the best
idea.
-- 
Krzysztof Halasa
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ