New Global Directory of OpenPGP Keys 234
Gemini writes "The PGP company just announced a new type of keyserver for all your OpenPGP keys. This server verifies (via mailback verification, like mailing lists) that the email address on the key actually reaches someone. Dead keys age off the server, and you can even remove keys if you forget the passphrase. In a classy move, they've included support for those parts of the OpenPGP standard that PGP doesn't use, but GnuPG does."
Widespread Crypto Revolution? (Score:4, Interesting)
Re:Widespread Crypto Revolution? (Score:4, Insightful)
Re:Widespread Crypto Revolution? (Score:4, Interesting)
Is there any way to acutally prove that a message is encrypted, as opposed to being just random garbage data that two people happened to mail to each other?
I realize that the chances of a judge buying this is going to be small, but is there a defense there? Wouldn't someone have to be able to produce the plaintext first, before they could claim that you were trying to send encrypted messages?
Re:Widespread Crypto Revolution? (Score:3, Interesting)
I realize that the chances of a judge buying this [suspected encrypted data is "really" random garbage] is going to be small
Not if you can prove that you frequently send out random, garbage, data. It'll have the nice side-effect of making traffic analysis harder, too.
...but you didn't hear that from me, right?!
Re:Widespread Crypto Revolution? (Score:2)
Not if you can prove that you frequently send out random, garbage, data.
Well, we know the RIAA and MPAA members should be safe then. ;)
Re:Widespread Crypto Revolution? (Score:2)
Re:Widespread Crypto Revolution? (Score:2)
Re:Widespread Crypto Revolution? (Score:2)
However you could take your encrypted data and hide it in non-encrypted data (steganography). After all, they will first have to find out that all your holiday pictures are not really sent for sharing them, but actually in order to hide some encrypted messages inside.
Re:Widespread Crypto Revolution? (Score:3, Funny)
Then how will anyone post?
Re:Widespread Crypto Revolution? (Score:2)
For a places like that, we'll need steganography so that people can securely transmit data while pretending to do nothing out of the ordinary.
LK
Your PC (Score:2)
The suspicious traffic will be enough to get the warrant...
Once it becomes illegal, we are screwed...
Re:Your PC (Score:2)
The government will soon realize that we are smarter, faster, and more adaptable that it can every hope to be. Then it will have us hunted down and shot.
Re:Your PC (Score:2)
One word (Score:3, Insightful)
> as opposed to being just random garbage data that two people
> happened to mail to each other?
Torture.
Re:Widespread Crypto Revolution? (Score:2)
Re:Widespread Crypto Revolution? (Score:4, Funny)
Re:Widespread Crypto Revolution? (Score:3, Interesting)
Random garbage wouldn't compress well anyway, for the same reason that encrypted data doesn't compress well - a lack of repeated senquences. It would be trivial to write a program that produces pseudo- or near-random garbage that will not compress.
However, it isn't at all certain that this would be beneficial to GPs purpose. There are ways to measure the amount of entropy in a string, and I'm not at all certa
Re:Widespread Crypto Revolution? (Score:3, Informative)
First overcome lazyness. (Score:4, Interesting)
Re:First overcome lazyness. (Score:2)
Re:Widespread Crypto Revolution? (Score:5, Funny)
Re:Widespread Crypto Revolution? (Score:2)
Ok, so I realise that at least 70% of the /. users will figure this out... so this is in part for the other 30%, and in part because I'm just being stupid. Using a bit of cut&paste with the tr command, I un-rot13'd this:
Stupid me ... I thought that tr was telling me something - took a second glance to realise that it was the un-rot13'd message...
Re:Widespread Crypto Revolution? (Score:2)
FPCP (Score:5, Interesting)
Won't a database of verified emails be, y'know, abusable? What about spammers who want to harvest from this? If they can't directly harvest, they could certainly validate email addresses they know about, and know they were getting people on email addresses that they care about.
Re:FPCP (Score:2)
Re:FPCP (Score:4, Informative)
The combination of this and (nigerian) spammers that actually respond to my challenge-response authentication is getting me very pissed off about spammers.
Re:FPCP (Score:2, Interesting)
By and large, whenever I send e-mail out of the company, I'm authorised to spend money. If you blacklist me for replying to your challenges, and later I can't get hold of you to offer you money, that's not my problem, it's yours.
Re:FPCP (Score:3, Interesting)
Won't a database of verified emails be, y'know, abusable?
I've wondered about this in the past, but - and naturally I don't have a link to hand ;) - apparently key-lists haven't - to date - been abused by spammers. My guess would be that spammers see users of PGP/GPG as (a) technically advanced, and hence more likely to have spam-filters/spam-retaliation protocols in place, and (b) likely to only use published emails for encryption. Either that or PGP/GPG whooshed passed spammers' heads with no comprehe
Re:FPCP (Score:2)
It's not a good harvesting target. You can only get *one* email address per search. If I were a spammer, I'd go somewhere that gives me more for less effort.
Still, even the old keyservers where you can get many addresses per search seem to be ignored by spammers. Even they are not rich enough of a target.
Re:FPCP (Score:5, Informative)
Will I get spam if I use the PGP Global Directory?
No. Searches of the PGP Global Directory are limited to one (1) response, thus making gathering email addresses from the PGP Global Directory one of the least-effective ways of harvesting email addresses for spammers.
Re:FPCP (Score:3, Interesting)
Since I upgraded my mailserver to SpamAssassin 3.x I don't even bother with dummy mail accounts anymore. Spam just don't bother me anymore
Re:A new way to thwart spam filters! (Score:2)
Is there a future for PGP? (Score:5, Interesting)
Companies can secure their internal email by deploying SSL on their mailservers and enforcing its use. For email outside the company surely S/MIME has captured the market. It's built into most email software, and companies are offering free certificates.
With PGP seeming more complex and requiring a seperate install, what role does it have for today's SMEs?
Re:Is there a future for PGP? (Score:2, Insightful)
Nothing wrong with the standard itself, just a lack of support and clue by ISPs.
Re:Is there a future for PGP? (Score:2)
Re:Is there a future for PGP? (Score:5, Interesting)
S/MIME and x.509 certificates use a central authority to enforce certificate holder identity. PGP and its variants use a "web of trust" system which allows ad hoc trust networks to build up by acquaintences sign each others keys. As an analogy, x.509 is client/server while PGP is peer-to-peer. PGP's approach serves a role for those who do not have a central authority (i.e. certificate authority) in common, do not trust CA's, cost of a certificate from a reliable CA is too high, or other factors usually centering around CA's.
The above is a general idea and there are many variations on it that make the area more fuzzy. For example, S/MIME could potentially be implemented using PGP keys instead of x.509 or PGP could be implemented to require a particular signature (i.e. a CA) in order to use a key.
Re:Is there a future for PGP? (Score:3, Insightful)
Unfortunately I can't see a good way to make things more transparent and i
Re:Is there a future for PGP? (Score:2)
They sign all messages by default and then via enigmail we set up some rules and they always encrypt to me and the parts of the family that have been converted. They didn't even know they were doing it at
Re:Is there a future for PGP? (Score:3, Interesting)
*YOU* don't ever need to know that the email has been encrypted, or that you even have a public/private key. You could even do something ridiculously small, like a 24 bit key or something to keep "gub'ment" happy.
The next step is adding
Re:..future for PGP? YES! Here's moreResources!?!? (Score:4, Informative)
(Sent this a few days ago to my ISP and family members - thought it might be useful to some
=Cy [xdi.org]
Do consider Thunderbird
http://www.mozilla.com/products/thunderbird/
http://www.mozilla.com/products/thunderbird/why/
for both yourself and your clients. It's really a wonderful product
and has spam handling built right in. Unlike Outlook(TM) it is open
about where it keeps your email (not hidden and difficult to export)
and is not so susceptible to worms and email nastiness such as scripts
that run without hindrance. Many a spyware app has been installed
further contributing to the spam problem due to people running just
that piece of software. Don't help the spammers. Reclaim your inbox.
It supports Enigmail: ( email envelopes you don't have to lick! )
http://enigmail.mozdev.org/
http://www.moztips.com/index.php?id=87
http://dudu.dyn.2-h.org/nist/gpg-enigmail-howto.ph p
I've attached my public key [ 0xYOUR_FINGERPRINT ]. I prefer to receive
secure mail. I've got nothing to hide, but I don't like using
postcards for all my USPS correspondence either. Regular email is
like using postcards on the internet. Any postal worker along the way
can take a look ( have a look at email "headers" sometime; every hop
you see is a place where your email is stored on a hard drive. )
Please use an envelope when communicating with me. Won't even cost
you a stamp. I value your privacy as much as I hope you value mine.
Privacy tool for Windows: (supports Eudora, Outlook, Clipboard)
http://winpt.sf.net
There's no need to keep my public key a secret. Feel free to give
it away or put it on a telephone pole; write it in the sky if you'd
like. It's available on the web. The more people that have it the
better. Use it to seal your envelopes when sending me mail. I've got
the only other matching key (my private key, opposite the public key
I've given to you) that allows me to unlock the envelope. You can
even lock an envelope so that multiple people can unlock it on their
own, but nobody else can read what you've sent them.
You can also find keys for me here:
http://www.biglumber.com
Please try it out. Be glad to help you get started.
If you haven't heard of the Firefox web browser yet
http://www.mozilla.org/products/firefox/
download it and check it out. Then look into the Extensions under
tools. Fast, far more secure than IE and extremely standards
compliant. Lots of tricks up it's sleeve in the way of Extensions,
themes, etc. Introducing this to your clients might be worthwhile as
well. The less spam and junk they've got clogging up their machines,
the less you'll pay for bandwidth, etc. Worth a look.
Thunderbird will import from Outlook. They just had a major release.
Even though this is version 1.0 it's not like a "typical" 1.0 release.
In the opensource world projects often start out with very low version
numbers. It's not uncommon to see something like v0.3.22 for very
usable and extremely bug free pieces of software.
Anyway it's really nice - though it doesn't have the calendar and palm
integration. That you'll need to weigh. Mom however doesn't need to
be on outlook....
=====[ http://www.mozilla.org/products/thunderbird/releas es/ ] =======
Comprehensive Mail Migration from other Mail Clients
Switching to Thunderbird has never been easier since Thunderbird can
now migrate all of your email data including settings, mail folders
Re:Is there a future for PGP? (Score:2)
In the couple years PGP/GnuPG have become much simpler to set up, especially on windows. Thunderbird/Enigmail works great on many platforms. On linux KMail and kgpg also just works.
Re:Is there a future for PGP? (Score:2)
Also, PGP is not just about encryption but about message authentication. S/MIME can't give you that.
Re:Is there a future for PGP? (Score:2)
Has it?
I've never seen an S/MIME message, or ever felt the need to make one, or get a key, or anything. In most of the (admittedly geeky) places where it's common to sign message, it's always been GPG. The company I work for uses GPG to communicate with customers, and the customers have never suggested using S/MIME instead. As far as I've seen, GPG (and PGP) rule.
Where is S/MIME actually used?
Re:Is there a future for PGP? (Score:3, Insightful)
PGP's defaults are the real problem. (Score:5, Insightful)
Had PGP's defaults been for a 1 year key instead of infinite this wouldn't be an issue.
I always create 1 year keys but I've got a couple of key out there over 10 years old that I FUBAR'd that'll never go away.
Re:PGP's defaults are the real problem. (Score:2)
IIRC (I read TFA, what, like, over 15 minutes ago!) this new key-server deprecates keys that haven't been updated in the past year.
Re:PGP's defaults are the real problem. (Score:2)
Re:PGP's defaults are the real problem. (Score:2)
Re:PGP's defaults are the real problem. (Score:2)
Even with a new keyserver design the client side program still after over 10 years defaults to no time limit keys and doesn't create a revoke certificate automaticly. Which means that fubar'd keys are still going to be generated far to easy. Things like this are why this program never gained popular use.
Oh great, spammer heaven (Score:2, Insightful)
We need a new key format, that doesn't have a live email address but instead has a hash of one. You'd send the address separately so it could be compared against the hash. There'd be salting to stop brute force searches. The database server could then still verify all the addresses (by sending emails out) but the actual email addresses would stay unpublished.
Re:Oh great, spammer heaven (Score:2)
Re:Oh great, spammer heaven (Score:2)
As others have pointed out, a keyserver isn't a directory of e-mail addresses and keys. You can't hop onto the site and somehow "browse" through the keys. The search function returns 1 positive match per search. IOW, you would need to know about the address before you could find it. "Brute searching" would be a fruitless waste of time and money for a spammer.
Encrypted Spam? (Score:4, Interesting)
So if I'm willing to post my public key and verify every 6 months that I'm the same live email responder at the other end, then what assurance do I have that encrypted email sent to me isn't spam?
Since the MTA's can't read my mail for spamminess if it is encrypted, the spam filter responsibility will be for my local email client with a set of my cached private key so it can decrypt and trash those herbal viagara offers.
Re:Encrypted Spam? (Score:5, Insightful)
So if I'm willing to post my public key and verify every 6 months that I'm the same live email responder at the other end, then what assurance do I have that encrypted email sent to me isn't spam?
Another way of looking at it is from the "cost" of spamming - encrypting a spam "costs" the spammer, hence recent suggestions for charging mail-senders in CPU-cycles. Additionally, you'd be able to verify whether you held the spammer's public key on your keyring, and very easily "process" (ie. delete with extreme prejudice) encrypted emails from unknown senders.
Re:Encrypted Spam? (Score:2)
But doesn't that kind of go against the whole point of a public keyserver (people not on your keyring can look up your key)????
Re:Encrypted Spam? (Score:2)
But doesn't that kind of go against the whole point of a public keyserver (people not on your keyring can look up your key)????
I think the rationale is that keys "go dead" (elsewhere in this thread someone mentioned that "everyone" creates a key when they're first getting into PGP, and then forgets the passphrase. Naturally, this leads to keys of limited or zero value published on the keyservers.
...and, of course, people will still be able to look up your key - if you keep it up-to-date.
Re:Encrypted Spam? (Score:2)
If spammers had to sign their mail with a key published in a directory, it would greatly diminish their ability to camoflage the sender.
Plus, the keyserver could only allow a limited number of key submissions per day from a given IP - so the spammer needs a bunch of IP addresses to send mail from more than a few addresses per day.
Plus the spammer has to do ex
Re:Encrypted Spam? (Score:3, Insightful)
It is way too computationally expensive.
Spam programs are designed to work extremely fast, using very little CPU to send a message.
That is why things like hashcash [hashcash.org] would work, they'd make it economically unfeasible for spammers.
Encryption takes quite a bit of work (just less than unauthorized decryption
Re:Encrypted Spam? (Score:3, Insightful)
The keys themselves can be signed by a master key, by o' say PGP's new website. (this does not require the PGP website to have a copy of the private key)
What this meens is they could give the signing service away for free to individuals, in order to create a defacto standard. But then charge legitimate bulk
Hell yeah... (Score:3)
Thank Jesus.
If this site can be Slashdotted... (Score:3, Interesting)
Re:If this site can be Slashdotted... (Score:2)
It's in beta. (Score:2)
Centralization (Score:3, Interesting)
But now this move centralizes things - yuck.
If you want to send PGP mail to/from a friend,
just mail public keys to each other.
Re:Centralization (Score:2)
The idea of a public key is that anyone can contact you securely, and out of the blue! There is no need for unencrypted traffic. For there to be an exchange of keys requires that you make yourself visible and to some extent, identifiable.
The "public" in "public key cryptography" is so-called because the idea is that keys are published, not merely privately exchanged.
Re:Centralization ?? (Score:2, Insightful)
OpenLDAP keyserver? (Score:2)
Re:OpenLDAP keyserver? (Score:2, Informative)
Can a central repository bring security? (Score:4, Insightful)
Re:Can a central repository bring security? (Score:2)
That's not how PGP works. Just because a key comes from a particular keyserver doesn't mean that it is the right one. A keyserver just provides a convenient place to stick keys. The web of trust (which is local to your
Re:Can a central repository bring security? (Score:5, Informative)
Not unless you're amazingly trusting of the repository. Read up on the "web of trust" and how to personally verify the keys you're using to send messages.
For example, my pubkey has been signed by several friends, and I have signed their pubkeys in kind. If I get a signed email from Charlie (whom I don't know), but his pubkey has been signed by Bob (whom I do know) using his key that I myself signed, then there is a direct path of trust between Charlie and me. If I believe that Bob is an honest guy who wouldn't have signed Charlie's key without personally verifying his identity, then I have cause to that key.
It's hard to explain the web of trust without making it sound more complicated than it really is. It's somewhat analogous to a friend introducing you to a person you've never met before. If your friend is very gullible, then you won't put much confidence in the ID of the person they're introducing. If your friend is, say, a loan officer who just spent the last month vetting the new person's identity, then you can be reasonably sure that they're giving you accurate information about that person.
Which brings us back to your question. If you're corresponding with a new contact with no trust pathway to that person, then you have exactly zero reason to believe in their identity simply because they were able to download GnuGP and create a new key. However, if that new person's key was signed by Alice, whose key was signed by Charlie, whose key was signed by Bob, whose key was signed by you, then you have at least some reason to think they're who they say they are.
There is no real concept of blindly trusting a new person in real life. GnuPG does not magically change this.
Re:Can a central repository bring security? (Score:4, Informative)
In Alice and Bob explanations, the C party is usually Carol.
Here's a wiki entry that discusses real life as it applies to cryptography. Its arguements parellel and support some of yours nicely, while also explaining Carol, Dave, and the others.
http://en.wikipedia.org/wiki/Alice_and_Bob/ [wikipedia.org]
Re:Can a central repository bring security? (Score:2)
Assuming the email address isn't spoofed...
My usual approach for trusting keys is to see if the same key gets used by the same address over a long period of time, with general acceptance by others (this works well on mailing lists at least). If so, then it is probably trustworthy.
I never trust a key the first time I see
Re:Can a central repository bring security? (Score:2)
> FBI want to do a man-in-the-middle attack?
This kind of abuse would eventually be proven when the two endpoints of the communication demonstrated that they were given different public keys for each other. Then the FBI _and_ the key service would have some 'splainin to do, not to mention that the key service would be out of business.
Same principle as Open Source code being secure: someone will eventually find out.
Re:Can a central repository bring security? (Score:2)
Getting your private key and reading your files is one thing.
Posting under your name and forging your signature is quite another.
OT: WOTSAP (Score:2)
A Big Step... (Score:3, Insightful)
Feeding that will be dirt simple encryption applications that make it so EASY to encrypt and decrypt that you might as well do it. (Like, for example, the application I'm finishing right now but refuse to plug until it's released)
The biggest problem now is that if a developer wants to include Public Key encryption abilities in has app he has to create an entire key management system and force users to gather the keys of all their contacts manually because there's just no other way. How many users are going to do that for a program that they only kinda think they need?
If you want the answer to that question, look at the percentage of users who currently encrypt any large part of their communication (SSL excluded?)
OpenPGP set to become global standard (Score:4, Informative)
http://www.itweek.co.uk/news/1118258
Good idea, but flawwed... (Score:2)
This presents problems with the trust path. (Score:5, Interesting)
Having an email address expire is not a reason to no longer trust a key.
-molo
Gmail and GPG (Score:2)
Perhaps a pay version of gmail in the future will include SSL and use something like gpg in their messages.
who needs keys... (Score:3, Funny)
whitelists? (Score:4, Insightful)
Allow incomming mail only from such valid e-mail accounts that are using the service. Could be useful for spam. Or will spam endure as it always has done...
Re:whitelists? (Score:3, Insightful)
Or only allow incoming mail that's signed. This won't prevent spam, but it will complicate the spammers' lives a bit, at least for a while.
Re:whitelists? (Score:3, Informative)
Thank god there aren't PCI cards that offload crypto.
Re:whitelists? (Score:4, Insightful)
It won't be any different from individuals creating their own whitelist, since you can't implement whitelists at the ISP level since most people do not use PGP and cannot be forced to use it.
It wouldn't stop spammers at all though, since spammers could still create legitimate keys, send out a billion spam then delete those email accounts and move on. It may slow it down a bit until some smart spammer creats a program to automate the process of creating, registering, and authenticating the key, but I doubt it will take too much time and effort.
Re:about time (Score:2)
Re:Backdoors? (Score:5, Insightful)
Re:Backdoors? (Score:2)
That's not strictly true. What if you don't care who is listening? E.g. Blacknet [privacyexchange.org].
Re:Backdoors? (Score:2)
Speaking tongue-in-cheek, you better make sure everyone is listening to the correct "you" when giving out calls for revolutionary action or otherwise your followers might be guided by the wrong person and end up torching err I mean protesting at some other building or they'll be directed into an amsbush or directly into jail, without collecting $200.
Re:Backdoors? (Score:2)
> listening to the right "wwest4" in your case, not someone imposturing you.
They do - the public key itself is the unique identifier, not the pseudonym. If the public key doesn't verify the sig, then the message is signed with a different private key - end of story.
Re:Backdoors? (Score:2)
> public key to you.
Yes, yes, the contemporary real-world paradigm is that we need to know which physical person belongs to a public key, but my original point is that there are cases where this is not true (hence the "strictly" qualifier), and the public key becomes the identity. In this case, you do not need to worry about the remailer, the DNS, the pseudonym, or anything else other than the signature and your list of public keys (
Re:Backdoors? (Score:2, Interesting)
And please dont call it "homeland security". It's more "civil rights management" or "civil restrictions management" depending on your opinion. One thing for sure is that something which is such a popular catch phrase for counter-terrorism has no real association with the comfort of a "home" - the place you come from. In fact I find that it is those people who are most cynical and paranoid (homeless
Re:Backdoors? (Score:5, Insightful)
It doesn't matter. Keyservers are merely a method of distributing keys, not establishing trust. You can establish trust by a number of methods, such as manually verifying the fingerprint with the person yourself using a trusted medium (e.g. face to face) or having somebody you trust sign the key (after verifying their key, of course).
The real danger to public key cryptography taking off is that it will become commonplace to simply trust keys without verifying them. Everyone will feel more secure, but the security will be an illusion.
Re:Backdoors? (Score:3, Insightful)
No, it doesn't matter in the slightest how you got the key. PGP operates under the assumption that it's not practical to always use a trusted medium to exchange keys. It doesn't trust keys by default.
PGP uses the concept of a "web of trust" to decide whether you should trust a key or not. If you can securely verify the legitimacy of a public key, then you can sign it,
Re:Backdoors? (Score:2)
Re:Load testing (Score:2)
Looks like they didn't pass the test.
Re:Free, for now? (Score:2)
Re:out the window (Score:3, Funny)
Now where is my tinfoil hat?
Re:What unshared features? (Score:3, Informative)
Little stuff that can be annoying if you suddenly are incompatible. OpenPGP allows multiple photo IDs per key, and PGP only allows one. OpenPGP allows subkeys that can make signatures or encrypt, and PGP only allows subkeys that can encrypt. Stuff like that.
These things are part of keys, and if the keyserver is written to assume PGP-generated keys, it might not support them.