Re: [openpgp] Keyserverless Use of OpenPGP in Email

Werner Koch <wk@gnupg.org> Tue, 12 April 2016 16:25 UTC

Return-Path: <wk@gnupg.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 857F512E3ED for <openpgp@ietfa.amsl.com>; Tue, 12 Apr 2016 09:25:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level:
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h3kk8V26JnuS for <openpgp@ietfa.amsl.com>; Tue, 12 Apr 2016 09:25:36 -0700 (PDT)
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [IPv6:2001:aa8:fff1:100::22]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E68012E40C for <openpgp@ietf.org>; Tue, 12 Apr 2016 09:25:27 -0700 (PDT)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.80 #2 (Debian)) id 1aq181-0003Pn-F6 for <openpgp@ietf.org>; Tue, 12 Apr 2016 18:25:25 +0200
Received: from wk by wheatstone.g10code.de with local (Exim 4.84 #3 (Debian)) id 1aq13V-0007NW-Im; Tue, 12 Apr 2016 18:20:45 +0200
From: Werner Koch <wk@gnupg.org>
To: Vincent Breitmoser <look@my.amazin.horse>
References: <20160412121549.GB16775@littlepip.fritz.box> <29B66C8D-BAD3-42C6-A8E7-8D243FF45A02@nohats.ca> <20160412134022.GB20078@littlepip.fritz.box>
Organisation: g10 Code GmbH
X-message-flag: Mails containing HTML will not be read! Please send only plain text.
OpenPGP: url=https://k.gnupg.net/80615870F5BAD690333686D0F2AD85AC1E42B367
Mail-Followup-To: Vincent Breitmoser <look@my.amazin.horse>, Paul Wouters <paul@nohats.ca>, IETF OpenPGP <openpgp@ietf.org>
Date: Tue, 12 Apr 2016 18:20:45 +0200
In-Reply-To: <20160412134022.GB20078@littlepip.fritz.box> (Vincent Breitmoser's message of "Tue, 12 Apr 2016 15:40:22 +0200")
Message-ID: <87d1puhk82.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/4fOAUhB7nMoAp0aeAUShnJi_3-U>
Cc: Paul Wouters <paul@nohats.ca>, IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Keyserverless Use of OpenPGP in Email
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Apr 2016 16:25:38 -0000

On Tue, 12 Apr 2016 15:40, look@my.amazin.horse said:
> I have, and it indeed solves the ddos-problem of keyservers. It still
> requires connectivity, introduces an arbitrary lookup delay, leaks
> metadata, and most importantly - it's not deployed. I would love to see

Running DNS over Tor heavily mitigates the leak of meta data.  If you
run a decent gpg version on Windows and Tor is running, gpg will do just
that w/o the need for further configuration.  On Unix it is currently
only possible with a patched ADNS version (because upstream is pretty
slow to accept a patch to torify ADNS).

There are privacy aware mail providers who offer OpenPGP DANE.  For
example try my callsign @ posteo.net [1].  We are currently talking to
other mail providers to get them to deploy this or a similar https based
key location mechanism.


Salam-Shalom,

   Werner


[1] For example by putting this into gpg.conf:
      auto-key-locate local,dane,pka,keyserver

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.