--
James A. Donald: (ranting on the user hostility of PGP)
> > > Presumably the theory underlying this brilliant design
> > > decision was that in the bad old days, a [signed clear
> > > text file signed] under unix would not verify under
> > > windows because of trivial differences such as the fact
> > > the whitespace is expressed slightly differently.
> > >
> > > Here is a better fix, one that I implemented in Kong:
> > > Define several signature types with the default signature
> > > type ignoring those aspects of the message that are
> > > difficult for the user to notice, so that if a message
> > > looks pretty much the same to the user, it has the same
> > > signature, by, for example, canonicalizing whitespace and
> > > single line breaks, and treating the hard space (0xA0)
> > > the same as the soft space. (0x20), and so on and so
> > > forth.

Joseph Ashwood:
> > So it's going to be broken by design. These are critical
> > errors that will eliminate any semblance of security in
> > your program.

James A. Donald:
>  I challenge you to fool my canonicalization algorithm by
>  modifying a message to as to  change the apparent meaning
>  while preserving the signature, or  by producing a message
>  that verifies as signed by me, while in fact a meaningfully
>  different message to any that was genuinely  signed by me.
>
> Let see you doing some work to back up your empty words.
> The source code for my canonicalization code is on the net. 
> If you say it is broken, break it!

To clarify, Kong works by checking a signature against the
message, and against other messages in its database.

Its job is not to identify the "true" James Donald, but to keep
the different people claiming to be James Donald clearly
separated.  Thus Kong would be broken if such separation could
be obfuscated or confused.

Any program attempting to determine whether "Bob" is someone's
true name is attempting to do something that computers cannot
do, hence the intolerable certificate management problems of
software that attempts to do that.

Three quarters of the user hostility of other programs comes
from their attempt to support "true" names, and the rest comes
from the cleartext signature problem.  Kong fixes both
problems.

 Joseph Ashwood must produce a message that is meaningfully
 different from any of the numerous messages that I have sent
 to cypherpunks, but which verifies as sent by the same person
 who sent past messages.

Thus for Kong to be "broken" one must store a past message from
that proflic poster supposed called James Donald, in the Kong
database, and bring up a new message hacked up by Joseph
Ashwood, and have Kong display in the signature verification
screen

        The signature in this document matches the signature on
        another document signed by James A. Donald.  Do you
        wish to view this document.

While Kong display a document meaningfully different from any
that was posted by James A.  Donald. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     gQcEhL/Zl68mNm0WaeG7zRK5M+/3qbaE0t84hURH
     4st/8mhjCyBBCy1Ganf3ud6SNdzLZtUChQQbTA6SO

Reply via email to