Re: [openpgp] Revocations of third-party certifications (TPK+"CRL") [was: draft-dkg-openpgp-abuse-resistant-keystore-04.txt]

Daniel Kahn Gillmor <dkg@fifthhorseman.net> Fri, 23 August 2019 20:41 UTC

Return-Path: <dkg@fifthhorseman.net>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BBBA1208AE for <openpgp@ietfa.amsl.com>; Fri, 23 Aug 2019 13:41:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (unsupported algorithm ed25519-sha256)" header.d=fifthhorseman.net header.b=iY5FlOCl; dkim=pass (2048-bit key) header.d=fifthhorseman.net header.b=jDaP9D40
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GXpmrqHNLpRj for <openpgp@ietfa.amsl.com>; Fri, 23 Aug 2019 13:41:54 -0700 (PDT)
Received: from che.mayfirst.org (che.mayfirst.org [IPv6:2001:470:1:116::7]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35526120831 for <openpgp@ietf.org>; Fri, 23 Aug 2019 13:41:52 -0700 (PDT)
DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019; t=1566592911; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=OWSeIArulvgHRB2CPh+toj2ZR/8GB/TXO3907thRfso=; b=iY5FlOClieTXeMyYXmMIgF7nbsEDCPIPoTGIfMp2tSWo0beGlF9rOGGP LGjoMmdYzPwtX/+l91ShwNIzQqMoCA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fifthhorseman.net; i=@fifthhorseman.net; q=dns/txt; s=2019rsa; t=1566592910; h=from : to : subject : in-reply-to : references : date : message-id : mime-version : content-type : from; bh=OWSeIArulvgHRB2CPh+toj2ZR/8GB/TXO3907thRfso=; b=jDaP9D40xPSZq1Wv/vOWs0+xO51/iQmNtLW3z8OyrEVrrpxGvKsMxZMJ RUdvAfG92T3OQ5c7C9JDLqa8t/oYukKOqZd+Jl8lf5YpAC7XoDTjLo7a9h MByhLa8rSioXOFh/8vNmNdjiDN2bwvvefEzmnOBmgq56rjJG8jEjP+QMhS gOz2Rg7Xy7hDp+U2b+ULaTICntpC4ZMvt9HZByTHhGbSzTdJBDesreMcOP /PVV5FDvPYeGtme3cwYK/RPpWkuV1u4ZrCopg+I7tHF8kogQE/SRY+G/6d y8m82tLb0p0XJL2VnOh1Vdde2G6gU9wEReAW/CNwl/fVCyDhCZpUJQ==
Received: from fifthhorseman.net (unknown [38.109.115.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by che.mayfirst.org (Postfix) with ESMTPSA id A87A7F99D; Fri, 23 Aug 2019 16:41:50 -0400 (EDT)
Received: by fifthhorseman.net (Postfix, from userid 1000) id 3764320303; Fri, 23 Aug 2019 16:41:47 -0400 (EDT)
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
To: vedaal@nym.hush.com, openpgp@ietf.org
In-Reply-To: <20190823154842.0F675A017C@smtp.hushmail.com>
References: <156650274021.14785.10325255315266801149.idtracker@ietfa.amsl.com> <875zmodi1v.fsf@fifthhorseman.net> <8736hsdfm4.fsf@fifthhorseman.net> <20190823154842.0F675A017C@smtp.hushmail.com>
Autocrypt: addr=dkg@fifthhorseman.net; prefer-encrypt=mutual; keydata= mDMEXEK/AhYJKwYBBAHaRw8BAQdAr/gSROcn+6m8ijTN0DV9AahoHGafy52RRkhCZVwxhEe0K0Rh bmllbCBLYWhuIEdpbGxtb3IgPGRrZ0BmaWZ0aGhvcnNlbWFuLm5ldD6ImQQTFggAQQIbAQUJA8Jn AAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgBYhBMS8Lds4zOlkhevpwvIGkReQOOXGBQJcQsbzAhkB AAoJEPIGkReQOOXG4fkBAO1joRxqAZY57PjdzGieXLpluk9RkWa3ufkt3YUVEpH/AP9c+pgIxtyW +FwMQRjlqljuj8amdN4zuEqaCy4hhz/1DbgzBFxCv4sWCSsGAQQB2kcPAQEHQERSZxSPmgtdw6nN u7uxY7bzb9TnPrGAOp9kClBLRwGfiPUEGBYIACYWIQTEvC3bOMzpZIXr6cLyBpEXkDjlxgUCXEK/ iwIbAgUJAeEzgACBCRDyBpEXkDjlxnYgBBkWCAAdFiEEyQ5tNiAKG5IqFQnndhgZZSmuX/gFAlxC v4sACgkQdhgZZSmuX/iVWgD/fCU4ONzgy8w8UCHGmrmIZfDvdhg512NIBfx+Mz9ls5kA/Rq97vz4 z48MFuBdCuu0W/fVqVjnY7LN5n+CQJwGC0MIA7QA/RyY7Sz2gFIOcrns0RpoHr+3WI+won3xCD8+ sVXSHZvCAP98HCjDnw/b0lGuCR7coTXKLIM44/LFWgXAdZjm1wjODbg4BFxCv50SCisGAQQBl1UB BQEBB0BG4iXnHX/fs35NWKMWQTQoRI7oiAUt0wJHFFJbomxXbAMBCAeIfgQYFggAJhYhBMS8Lds4 zOlkhevpwvIGkReQOOXGBQJcQr+dAhsMBQkB4TOAAAoJEPIGkReQOOXGe/cBAPlek5d9xzcXUn/D kY6jKmxe26CTws3ZkbK6Aa5Ey/qKAP0VuPQSCRxA7RKfcB/XrEphfUFkraL06Xn/xGwJ+D0hCw==
Date: Fri, 23 Aug 2019 16:41:46 -0400
Message-ID: <87v9unbomt.fsf@fifthhorseman.net>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/NeIhw018_UuGzwWUIJu0pk6m0Pg>
Subject: Re: [openpgp] Revocations of third-party certifications (TPK+"CRL") [was: draft-dkg-openpgp-abuse-resistant-keystore-04.txt]
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Aug 2019 20:42:03 -0000

On Fri 2019-08-23 11:48:41 -0400, vedaal@nym.hush.com wrote:
> What if the third party signature just had an 'expiration' option ?
>
> (e.g.    Signature validity:  0,  Forever;     1,  1 year;    n,  n years)

This is already possible!  Most third-party certifications i make have
such an expiration.  It works fine with most implementations afaict.

however, expirations are not the same as revocations.

> This allows for 'expiration' of validation in the event of possible compromise, 
> and if it is not compromised, then the signer can 're-sign'/'update' the certification, 
> send it to the key owner, who can then upload it to the server.

In the scenario i described, the "key owner" is non-responsive, but the
certifier still wants to make sure her certification is visibly revoked.
She can't rely on the key owner's responsiveness -- they could even be
dead!  Her obligations are to the people who rely on her certifications,
and she needs to make the revocation visible to them promptly,
regardless of how the first party behaves.

          --dkg