Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Encryption Security Privacy

New Global Directory of OpenPGP Keys 234

Gemini writes "The PGP company just announced a new type of keyserver for all your OpenPGP keys. This server verifies (via mailback verification, like mailing lists) that the email address on the key actually reaches someone. Dead keys age off the server, and you can even remove keys if you forget the passphrase. In a classy move, they've included support for those parts of the OpenPGP standard that PGP doesn't use, but GnuPG does."
This discussion has been archived. No new comments can be posted.

New Global Directory of OpenPGP Keys

Comments Filter:
  • by c0dedude ( 587568 ) on Thursday December 09, 2004 @11:53AM (#11042501)
    With the minor computational cost of crpto and the avalability of public keys, will all network traffic move toward crypography?
  • FPCP (Score:5, Interesting)

    by nahdude812 ( 88157 ) on Thursday December 09, 2004 @11:55AM (#11042514) Homepage
    FPCP (First Privacy Complaint Post):

    Won't a database of verified emails be, y'know, abusable? What about spammers who want to harvest from this? If they can't directly harvest, they could certainly validate email addresses they know about, and know they were getting people on email addresses that they care about.
  • by Albanach ( 527650 ) on Thursday December 09, 2004 @11:56AM (#11042523) Homepage
    Like lots of people, I've used PGP for years, but it has never taken off like it should have. I wonder if it really has a future.

    Companies can secure their internal email by deploying SSL on their mailservers and enforcing its use. For email outside the company surely S/MIME has captured the market. It's built into most email software, and companies are offering free certificates.

    With PGP seeming more complex and requiring a seperate install, what role does it have for today's SMEs?

  • Re:FPCP (Score:3, Interesting)

    by I confirm I'm not a ( 720413 ) on Thursday December 09, 2004 @12:02PM (#11042576) Journal

    Won't a database of verified emails be, y'know, abusable?

    I've wondered about this in the past, but - and naturally I don't have a link to hand ;) - apparently key-lists haven't - to date - been abused by spammers. My guess would be that spammers see users of PGP/GPG as (a) technically advanced, and hence more likely to have spam-filters/spam-retaliation protocols in place, and (b) likely to only use published emails for encryption. Either that or PGP/GPG whooshed passed spammers' heads with no comprehension occuring: "Can I make money off this JeepyGee thingee? No? Forget it, then."

  • Encrypted Spam? (Score:4, Interesting)

    by 4of12 ( 97621 ) on Thursday December 09, 2004 @12:06PM (#11042613) Homepage Journal

    So if I'm willing to post my public key and verify every 6 months that I'm the same live email responder at the other end, then what assurance do I have that encrypted email sent to me isn't spam?

    Since the MTA's can't read my mail for spamminess if it is encrypted, the spam filter responsibility will be for my local email client with a set of my cached private key so it can decrypt and trash those herbal viagara offers.

  • by StrawberryFrog ( 67065 ) on Thursday December 09, 2004 @12:07PM (#11042625) Homepage Journal
    PGP's been around for years, and hasn't taken over. Layness is a powerfull force - self-preservation has to work hard to overcome it.
  • by jdludlow ( 316515 ) on Thursday December 09, 2004 @12:07PM (#11042630)
    ...what are the chances that it's going to hold up to millions of email clients all trying to access keys at once?

  • Re:Backdoors? (Score:2, Interesting)

    by essreenim ( 647659 ) on Thursday December 09, 2004 @12:08PM (#11042638)
    I think more the latter:

    ..one of the few ways of having as close to true privacy as we can realistically get

    And please dont call it "homeland security". It's more "civil rights management" or "civil restrictions management" depending on your opinion. One thing for sure is that something which is such a popular catch phrase for counter-terrorism has no real association with the comfort of a "home" - the place you come from. In fact I find that it is those people who are most cynical and paranoid (homeless like in other words) that are throwing that slogan around like a contraceptive. At least thats how I feel in my "home" land - Ireland.

    Sorry if you think Im trying to flame you, I am not. Im trying to encourage you not to use that word - which has false interpretation, muck like the infamous DRM acronym...

  • Centralization (Score:3, Interesting)

    by hey ( 83763 ) on Thursday December 09, 2004 @12:10PM (#11042652) Journal
    The nice thing about PGP/GPG is that it is decentralized! You don't need to obtain a "certificate" from any big-bad central authority.
    But now this move centralizes things - yuck.
    If you want to send PGP mail to/from a friend,
    just mail public keys to each other.
  • by spellicer ( 146331 ) on Thursday December 09, 2004 @12:13PM (#11042678) Homepage
    S/MIME and PGP certainly address many similar issues such as email encryption and sender authenticity (which SSL does not necessarily do by the way), they approach some of the problems in different ways. The key difference I see between the two (and why PGP still has a role in this area) is how trust of signing keys is built.

    S/MIME and x.509 certificates use a central authority to enforce certificate holder identity. PGP and its variants use a "web of trust" system which allows ad hoc trust networks to build up by acquaintences sign each others keys. As an analogy, x.509 is client/server while PGP is peer-to-peer. PGP's approach serves a role for those who do not have a central authority (i.e. certificate authority) in common, do not trust CA's, cost of a certificate from a reliable CA is too high, or other factors usually centering around CA's.

    The above is a general idea and there are many variations on it that make the area more fuzzy. For example, S/MIME could potentially be implemented using PGP keys instead of x.509 or PGP could be implemented to require a particular signature (i.e. a CA) in order to use a key.
  • by jdludlow ( 316515 ) on Thursday December 09, 2004 @12:20PM (#11042768)

    Is there any way to acutally prove that a message is encrypted, as opposed to being just random garbage data that two people happened to mail to each other?

    I realize that the chances of a judge buying this is going to be small, but is there a defense there? Wouldn't someone have to be able to produce the plaintext first, before they could claim that you were trying to send encrypted messages?

  • Re:FPCP (Score:2, Interesting)

    by farnz ( 625056 ) <slashdot&farnz,org,uk> on Thursday December 09, 2004 @12:25PM (#11042822) Homepage Journal
    After getting hit by a spammer using my work address as his From address, then getting deluged (a few thousand) by C-R challenges, I started just replying to challenges whether or not I sent you an e-mail.

    By and large, whenever I send e-mail out of the company, I'm authorised to spend money. If you blacklist me for replying to your challenges, and later I can't get hold of you to offer you money, that's not my problem, it's yours.

  • by I confirm I'm not a ( 720413 ) on Thursday December 09, 2004 @12:27PM (#11042834) Journal

    I realize that the chances of a judge buying this [suspected encrypted data is "really" random garbage] is going to be small

    Not if you can prove that you frequently send out random, garbage, data. It'll have the nice side-effect of making traffic analysis harder, too.

    ...but you didn't hear that from me, right?!

  • Re:FPCP (Score:3, Interesting)

    by YetAnotherDave ( 159442 ) on Thursday December 09, 2004 @12:57PM (#11043170)
    whatever.

    Since I upgraded my mailserver to SpamAssassin 3.x I don't even bother with dummy mail accounts anymore. Spam just don't bother me anymore :)

  • by B'Trey ( 111263 ) on Thursday December 09, 2004 @01:09PM (#11043297)
    Defeats the purpose, as the whole point is to say that you're NOT sending encrypted information.

    Random garbage wouldn't compress well anyway, for the same reason that encrypted data doesn't compress well - a lack of repeated senquences. It would be trivial to write a program that produces pseudo- or near-random garbage that will not compress.

    However, it isn't at all certain that this would be beneficial to GPs purpose. There are ways to measure the amount of entropy in a string, and I'm not at all certain that it would be similar in an encrypted message and a random string. (I'm not an expert in this field, so I'm talking at the peripherals of my knowledge.)
  • by molo ( 94384 ) on Thursday December 09, 2004 @02:09PM (#11043998) Journal
    Dropping keys from the keyring presents problems with the trust path. For example, A signs B's key. B signs C's key. A now has a trust path to C. If B is dropped from the keyring, no new users can authenticate that trust path. With the current scheme, if N signs A's key, N would now have a trust path to C. With the new scheme, the link to B and C is broken because he can't retrieve B's key.

    Having an email address expire is not a reason to no longer trust a key.

    -molo
  • by Ramses0 ( 63476 ) on Thursday December 09, 2004 @02:28PM (#11044259)
    PGP will come, but will meet strong resistance from "important people" along the way. It's really not that hard, get AOL, Yahoo! Mail, and GMail to automatically create public/private keys, publish, store, archive, sign, etc. all your email when using their web interface.

    *YOU* don't ever need to know that the email has been encrypted, or that you even have a public/private key. You could even do something ridiculously small, like a 24 bit key or something to keep "gub'ment" happy.

    The next step is adding a button in "mail options" to upload YOUR OWN PUBLIC KEY. Yahoo! (eg) receives it, sends you a challenge, and says: "decrypt this message, type in the 8-letter token that's in there, and we'll accept and advertise your new public key as yours, and expire the old auto-generated one". If you wanted to trust yahoo with your private key, that's your own business. But even neglecting the use of personal public keys and sticking with auto-generated ones, by hitting the major's you'd have 20-30% market saturation of encrypted emails, and the infrastructure to support future uses of public/private key stuff.

    Eventually one of the majors will realize that "all identity problems go away" when there is a broadly available public/private key infrastructure.

    Imagine typing your email address into slashdot, slashdot fetches your public key [in background], issues your browser a challenge, browser decrypts challenge with private key and responds. Viola. Passwordless logins everywhere. Who out there is listening? 80% of the infrastructure is in place already. (moz-plugin: gpg-challenge-response)?

    --Robert

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...