Re: [openpgp] Proposal for a separable ring signature scheme compatible with RSA, DSA, and ECDSA keys
Falcon Darkstar Momot <falcon@iridiumlinux.org> Sun, 16 March 2014 04:12 UTC
Return-Path: <falcon@iridiumlinux.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FCE11A02C1 for <openpgp@ietfa.amsl.com>; Sat, 15 Mar 2014 21:12:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.678
X-Spam-Level:
X-Spam-Status: No, score=-1.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_SORBS_WEB=0.77, RP_MATCHES_RCVD=-0.547, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MoILqDKnT2oe for <openpgp@ietfa.amsl.com>; Sat, 15 Mar 2014 21:12:24 -0700 (PDT)
Received: from smtp.iridiumlinux.org (akira.iridiumlinux.org [184.70.203.174]) by ietfa.amsl.com (Postfix) with ESMTP id C20F61A02C0 for <openpgp@ietf.org>; Sat, 15 Mar 2014 21:12:23 -0700 (PDT)
Received: by smtp.iridiumlinux.org (Postfix, from userid 65534) id F1D3813F4406; Sat, 15 Mar 2014 22:12:15 -0600 (MDT)
X-Spam-ASN:
Received: from [10.20.207.216] (unknown [204.239.250.1]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.iridiumlinux.org (Postfix) with ESMTPSA id 3136213F4257 for <openpgp@ietf.org>; Sat, 15 Mar 2014 22:12:13 -0600 (MDT)
Message-ID: <53252495.4090501@iridiumlinux.org>
Date: Sat, 15 Mar 2014 21:12:05 -0700
From: Falcon Darkstar Momot <falcon@iridiumlinux.org>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.3.0
MIME-Version: 1.0
To: openpgp@ietf.org
References: <80674820640dbeb5ae81f81c67d87541@smtp.hushmail.com> <8761nh1549.fsf@vigenere.g10code.de> <a6d56e791a2c878f34369abc6f09b71d@smtp.hushmail.com> <5323146D.4050006@fifthhorseman.net> <a9cf1a7b7e08e0d601fa5c7c5cf50e71@smtp.hushmail.com> <5323DF28.5070809@fifthhorseman.net> <F4D2857E-0D33-4B6E-8829-9026CE9398DF@callas.org> <20140316032951.E9E462038C@smtp.hushmail.com>
In-Reply-To: <20140316032951.E9E462038C@smtp.hushmail.com>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/openpgp/0U41b3EeaHzpuUGwWw2VYzz0S74
Subject: Re: [openpgp] Proposal for a separable ring signature scheme compatible with RSA, DSA, and ECDSA keys
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Mar 2014 04:12:27 -0000
On 3/15/2014 8:29 PM, vedaal@nym.hush.com wrote: > > But isn't it obvious that the key revocation is a scam, when the time of the revocation and the time of its receipt by a key-server, are too far apart? > (anything more than an hour should be suspicious.) > > The only plausibility Alice may have, is that she couldn't get online soon enough after she revoked her key, > and this is discoverable if she went online for any other reason. > > If there were some way to make the revocation process not be complete until received and verified by a keyserver, > and then listed as revoked as of the keyserver's receipt time, > then it might do away with the 'change the clock and revoke scam' and make revocation more workable. > > > vedaal > Even assuming there were protocol support for this (please correct me if in fact there is), you've also made a great leap in deciding to effectively trust keyservers as timestamping authorities. Keep in mind that this would require changes to the keyserver software; SKS does not have any mechanism I am aware of to make such an assertion. Bear also in mind when thinking about these two points that the lamentable policy of refusing to ever purge data (save once) including key vandalism, fraudulent keys, and similar abuse is traditionally justified by a lack of time to implement support (or by revocation persistence which is a separate issue) even for that. Moreover, most public keyservers are run by volunteers on an at-will basis, and synchronize with varying speeds. Virtually anyone may operate them and there is no standard or process for protecting their security either individually or as a network. Shall each of them keep their own different timestamp for each piece of data? Or shall they trust each other's assertions as to timestamping? Shall new keyservers trust existing timestamps and is this different from the synchronization process? How shall you decide to trust timestamp data, and which copy of it to trust, with respect to edge cases where a timestamp to be verified falls within the delta between any two keyservers' receipt of the timestamped information? What happens when conflicting timestamps are asserted between keyservers? When a timestamp on data from a timestamping keyserver differs from the timestamp in the signed packet (ie. revocation), what else will be trusted? Will the revocation be discarded as fraudulent? If it is, can you assume the key is compromised? If validation succeeds (drift within the threshold), will the timestamper's timestamp, or the timestamp in the data be used? Why is an hour the proper threshold for clock drift? Is it even appropriate to specify maximum drift in the standard? What about keys which are exchanged without a mediating keyserver? How will the protocol work when data is not available? How will existing data without associated timestamps be treated? What about offline verification? Does any problem arise if that data is arbitrarily timestamped with the current time as of a keyserver software update? What happens when timestamp-less data is received during inter-keyserver synchronization? There are other questions that need to be answered as well for such a proposal to work. However, in the signer-agnostic signatures draft this surprisingly complex new logic would be pollution (and totally eclipse the intent of the draft); perhaps you should consider making a proposal of your own if you can answer those questions well. The lack of a useful mechanism for this and other timestamping is indeed a deficiency and there would be some value in developing an appropriate scheme. This has of course been discussed before to some extent (at least https://www.ietf.org/mail-archive/web/openpgp/current/msg07136.html) --Falcon Darkstar Momot
- [openpgp] Proposal for a separable ring signature… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… Daniel Kahn Gillmor
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… Jon Callas
- [openpgp] Non-SHA-1 fingerprints in signatures [w… Vincent Yu
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Daniel Kahn Gillmor
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Vincent Yu
- Re: [openpgp] Non-SHA-1 fingerprints in signature… David Shaw
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Peter Pentchev
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Vincent Yu
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Daniel Kahn Gillmor
- Re: [openpgp] Proposal for a separable ring signa… Daniel Kahn Gillmor
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Peter Pentchev
- Re: [openpgp] Non-SHA-1 fingerprints in signature… Jon Callas
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Daniel Kahn Gillmor
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Daniel Kahn Gillmor
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… Daniel Kahn Gillmor
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… Ben Laurie
- Re: [openpgp] Proposal for a separable ring signa… Jon Callas
- Re: [openpgp] Proposal for a separable ring signa… Nicholas Cole
- Re: [openpgp] Proposal for a separable ring signa… Nicholas Cole
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… Nicholas Cole
- Re: [openpgp] Proposal for a separable ring signa… Vincent Yu
- Re: [openpgp] Proposal for a separable ring signa… vedaal
- Re: [openpgp] Proposal for a separable ring signa… Falcon Darkstar Momot
- Re: [openpgp] Proposal for a separable ring signa… Nicholas Cole
- Re: [openpgp] Proposal for a separable ring signa… ianG
- Re: [openpgp] Proposal for a separable ring signa… Jon Callas
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Ben Laurie
- Re: [openpgp] Proposal for a separable ring signa… Werner Koch
- Re: [openpgp] Proposal for a separable ring signa… Ben Laurie