Re: pgp signing in van

Phillip Hallam-Baker <hallam@gmail.com> Sat, 07 September 2013 15:57 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D3CB11E8151 for <ietf@ietfa.amsl.com>; Sat, 7 Sep 2013 08:57:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.257
X-Spam-Level:
X-Spam-Status: No, score=-2.257 tagged_above=-999 required=5 tests=[AWL=-0.258, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_21=0.6, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 00HvJA6HxZhO for <ietf@ietfa.amsl.com>; Sat, 7 Sep 2013 08:57:18 -0700 (PDT)
Received: from mail-la0-x231.google.com (mail-la0-x231.google.com [IPv6:2a00:1450:4010:c03::231]) by ietfa.amsl.com (Postfix) with ESMTP id DF0DE11E814E for <ietf@ietf.org>; Sat, 7 Sep 2013 08:57:17 -0700 (PDT)
Received: by mail-la0-f49.google.com with SMTP id ev20so3679375lab.36 for <ietf@ietf.org>; Sat, 07 Sep 2013 08:57:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=Jgkcz74uCrC37YP8ttIt4iXpmnj1dw4hrSNH6RWgufg=; b=przjrVrhLbxDz/J4e7hIhFFViEQDQvZyPNtzwBPPcCgHMZurfa+1MebtmqIRmUGts8 TFLbqYdy6WKMsbEfgsdEoj4+bHs3uM+SJH822aU9cqZTr3/odlcFjBga70DMb6PoMOhR 0pqc0H1eG6iAfGqCg0gtC5+dh1ZudVpl3jso8PxrflAw/rVv54dK2UbiUS5RgEQ5zjjD joizRf6b1f/2rD+xQIeiW2e0IvLSnvW3H/h8ILy6HzhW+/8a5riKwebyoY2Bu86DPbOs wrt50uzjkIwXyTqMrtiId/E3WCwHVtM0lczvBV7j1cbiQPiTcK10CsOLJEQF0viUWbmr 1PIQ==
MIME-Version: 1.0
X-Received: by 10.152.37.41 with SMTP id v9mr7616681laj.9.1378569436817; Sat, 07 Sep 2013 08:57:16 -0700 (PDT)
Received: by 10.112.148.165 with HTTP; Sat, 7 Sep 2013 08:57:16 -0700 (PDT)
In-Reply-To: <20130907152940.GA19067@thunk.org>
References: <m2zjrq22wp.wl%randy@psg.com> <2309.1378487864@sandelman.ca> <522A5A45.7020208@isi.edu> <CA2A6416-7168-480A-8CE1-FB1EB6290C77@nominum.com> <522A71A5.6030808@gmail.com> <6DE840CA-2F3D-4AE5-B86A-90B39E07A35F@nominum.com> <CAMm+Lwj_+Ft0Wy6=wQeFxfkRSuyOZjLy_rKUz1PZRvJy-ixAuA@mail.gmail.com> <20130907152940.GA19067@thunk.org>
Date: Sat, 07 Sep 2013 11:57:16 -0400
Message-ID: <CAMm+LwijHgkWS8oNPAsn_30vj+4gLwNtfbUnks3gXct9s842zg@mail.gmail.com>
Subject: Re: pgp signing in van
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Theodore Ts'o <tytso@mit.edu>
Content-Type: multipart/alternative; boundary="089e0160b998946de504e5cd3569"
Cc: IETF Disgust <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Sep 2013 15:57:19 -0000

On Sat, Sep 7, 2013 at 11:29 AM, Theodore Ts'o <tytso@mit.edu> wrote:

> On Fri, Sep 06, 2013 at 11:39:59PM -0400, Phillip Hallam-Baker wrote:
> > For purposes of email security it is not about the keys at all. It is the
> > email addresses that are the real killer.
> >
> > I can be very sure that I have the right key for ted.lemon@nominum.combut
> > is that who I know as Ted Lemon?
>
> But if the I-D's that you are reviewing and the protocol suggestions
> are coming from ted.lemon@nominum.com, does it matter?
>
> And if you subsequently then meet a bag of protoplasm at a
> face-to-face meeting who can speak in great technical detail about his
> I-D's, and who hands you a business card which says
> ted.lemon@nominum.com, does it really matter what is on the
> government-issued I-D?


The difference is the ability to write a validation criteria that is
auditable. People used to get really freaked out about the fact that my
former employer accepted a CostCo membership card for ID purposes entering
the building.

The control here is accountability. If you claim to be Ted Lemon and I just
accept that then it is fairly hard to see a prosecution being viable. If on
the other hand you present a fraudulent ID then you have committed two
separate acts of fraud (one obtaining, second presenting). There are
criminal sanctions possible.




> > One value of IETF key signing parties is that we get a better assurance
> > that we know the email address we are sending to is the address of the
> Ted
> > Lemon that participates in IETF than we can possibly get through Web of
> > Trust where someone may be signing a key in all good faith but for the
> > wrong person.
>
> Exactly.  This is basically how we bootstrapped the GPG keyring used
> for Linux kernel submissions after the kernel.org security breech two
> years ago.  We required everyone to get new GPG keys, thus forcing a
> key rotation, and we did in-person key verification of people, most of
> whom we had met at other Linux conferences previously, so we knew who
> we were dealing with.
>

Which is exactly the type of community where PGP works well. The problem is
that you can't scale to populations of a billion or more by holding key
signing parties.



> We did look at each other's government-issued ID's, but honestly, that
> was much less important than my being able to say, something like,
> "Why yes, that's James Bottomley, the SCSI maintainer and someone with
> whom I've worked with for the past decade, on mailing lists and
> conference calls and at conferences all over the world."
>

Government issued IDs do have one big advantage and that is they allow new
people to introduce themselves into the group. They also provide a control
against long term undercover agents.

Police don't usually have access to forged documents when they go
undercover. Even intelligence agencies are forced to use them sparingly as
maintaining them is high cost.



> For this reason, it's actually better to do mini-key signings (or
> really, exchange of GPG key fingerprints) at the end of each working
> group session, rather than trying to do one big key signing one
> evening.  The latter is more time-efficient, but the former is what's
> actually important, since it will be the working group members who
> know each other the best.
>

You want me to give up my coffee and biscuits?


> The other thing which is useful for a community to maintain is a
> centralized keyring of all of the members, backed up on a time stamped
> WORM drive, where keys only get added to the keyring after it has been
> signed by a threshold number of trusted core signers.  (Initially, for
> kernel.org there were only four or five us that were core trusted
> signers, and we were people who knew each other and had been working
> on the Linux kernel for a long time.)
>

Oddly enough that is similar to the proposal I have been looking at and Ben
Laurie has. Only instead of hardware we are looking at catenate
certificates (Harber & Stornetta hash chains) now the patent is expired.



> Of course, all of this is not going to solve the problem of someone
> getting bribed by some state actor to introduce some vulnerability
> into a codebase, or into some IETF- or NIST- approved
> standards/protocol document.  After all, government ID's don't come
> with a stamp, "I am an NSA stooge."  :-)
>

And some folk may well have been unwitting stooges.

-- 
Website: http://hallambaker.com/