Re: kernel.org status: establishing a PGP web of trust
| From: | Valdis.Kletnieks-AT-vt.edu | |
| To: | Adrian Bunk <bunk-AT-stusta.de> | |
| Subject: | Re: kernel.org status: establishing a PGP web of trust | |
| Date: | Tue, 04 Oct 2011 16:29:48 -0400 | |
| Message-ID: | <34045.1317760188@turing-police.cc.vt.edu> | |
| Cc: | "Frank Ch. Eigler" <fche-AT-redhat.com>, "H. Peter Anvin" <hpa-AT-zytor.com>, "Rafael J. Wysocki" <rjw-AT-sisk.pl>, Linux Kernel Mailing List <linux-kernel-AT-vger.kernel.org>, Greg KH <gregkh-AT-suse.de> | |
| Archive‑link: | Article |
On Mon, 03 Oct 2011 21:04:41 +0300, Adrian Bunk said: > On Mon, Oct 03, 2011 at 12:28:17PM -0400, Frank Ch. Eigler wrote: > > What is the threat that this passport checking is intended to cure? > > That someone else might have been impersonating Rafael for years, > > sending patches, chatting in email and over the phone, and attending > > conferences? > > Key signing is an identity check. That's dodging the issue. Somehow, I don't see Andrew Morton asking Linus to sign his key, and Linus saying "How do I know you're the *real* Andrew Morton?" And Andrew is a clever guy, if he was a fake Andrew, I'm sure he'd have gotten a fake ID that would be good enough to fool Linus, who is also a clever guy but I'm not aware of any special background he has in forgery detection. ;) The more important point is that as far as the linux-kernel community is concerned, the guy we've all seen show up at conferences and present stuff all these times *is* Andrew Morton, even if his real name is George Q. Smith and he's been on the run for the last 27 years for an embarassing incident involving an ostrich, the mayor's daughter, and 17 gallons of mineral oil in the atrium of the museum. ;) The ID check is to connect an actual person to the claimed key, and primarily intended for key signing parties and the like, where people *don't* know each other very well. I think there's something like 5 people on the linux-kernel list who actually know me in real life, because I don't travel much and I'm rather in the boonies. If I asked anybody *else* who I'd not met before to sign my key, yes, I'd expect them to check my ID, to ensure I wasn't somebody trying to pull a fast one at the keysigning party. > > If so, perhaps the impostor is of more value to the > > project than the Real Rafael. > > Pseudonymous contributions to the kernel are not allowed. See above - whoever Andrew Morton *really* is, his contributions are hardly pseudonymous.
Posted Oct 6, 2011 15:53 UTC (Thu)
by jcm (subscriber, #18262)
[Link] (7 responses)
What I'd like to see is "keysigning" parties where folks with well established (in use) keys turn up and *prove* they own the key by signing some information the other attendees provide. That way they can not only say "hey, I'm dude X, trust me this is my fingerprint, here's a photo ID" (which means nothing), but they can say "hey, I have access to this key, because I just signed that random message you gave me interactively". Who cares who the heck they really are beyond that?
Jon.
Posted Oct 7, 2011 6:20 UTC (Fri)
by paulj (subscriber, #341)
[Link] (6 responses)
Posted Oct 7, 2011 6:32 UTC (Fri)
by jcm (subscriber, #18262)
[Link] (5 responses)
Posted Oct 7, 2011 8:42 UTC (Fri)
by paulj (subscriber, #341)
[Link] (4 responses)
1. The person you met at the keysigning TOLD you that fingerprint is their key.
2. You can verify that that person is indeed the same person as the one controlling the corresponding key by exchanging encrypted data with it and verifying each side has decrypted the others.
However, there's no need for 2 to happen at the party itself. If you do it by exchanging email "We met at that signing party, and this was my fingerprint, remember?" and verify the other side can decrypt it and securely acknowledges that they met you, then you've achieved just the same thing as if you did something akin to step 2 before each other at the party.
Posted Oct 7, 2011 11:05 UTC (Fri)
by nix (subscriber, #2304)
[Link] (1 responses)
Boy, it's a good thing no kernel developers have had their machines compromised lately.
Posted Oct 7, 2011 12:12 UTC (Fri)
by nybble41 (subscriber, #55106)
[Link]
[1] E.g. <http://wiki.debian.org/subkeys>
Posted Oct 7, 2011 15:03 UTC (Fri)
by jcm (subscriber, #18262)
[Link] (1 responses)
Posted Oct 7, 2011 15:41 UTC (Fri)
by paulj (subscriber, #341)
[Link]
Basically, if this is what you're worried about, the problem is that key A is compromised (as far as person X is concerned at least). I don't see how doing the encrypted exchange in person helps mitigate the compromise in any way - it doesn't help unmask that Y also controls A, & it doesn't stop Y from decrypting material intended for X with A.
But perhaps I've misunderstood you.
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
Re: kernel.org status: establishing a PGP web of trust
