Re: protecting pub-keys from unwanted signatures

2015-08-18 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Monday 17 August 2015 at 12:27:10 AM, in
mid:55d11c4e.1010...@unseen.is, Administrador wrote:


 For me there is no trust in the fact that anyone can sign my key and put
 it on a keyserver, and because I do not know the person who did can not
 validate their signiture/identity.

For the time being, forget keys and think about people in the real
world. Do you know the name of everybody who knows your name? Do you
know the name of anybody who does not know your name?



 What trust does this offer the
 people who are real, trusted and known by me and whos keys have been
 validated by me and my key(s) by them?

None: if you know each other and have verified each other's keys, you
do not need a certification from anybody else. In that case all
signatures are just noise.

What about somebody who has not verified your key, but has verified
one or more of the keys that have signed your key? They can use the
presence of those signatures as a factor in deciding whether to trust
your key. In that case, signatures from keys that person has verified
are useful _to_that_person_ but any other signatures are noise
_to_that_person_. The signatures that have been found useful in this
case won't necessarily be signatures from keys that you have verified,
but their presence may have enabled somebody to decide to trust your
key.



 Give the owner the authority of his own public key and
 this issue would fixed.  For example: Only the owner of
 the public key has the right to put/remove/modify his
 own public key on a keyserver.

If such a server were implemented, anybody wanting to add a signature
without the key-owner's sanction could fetch the key, sign it, and
upload it to an ordinary server.


- --
Best regards

MFPA  mailto:2014-667rhzu3dc-lists-gro...@riseup.net

Free advice costs nothing until you act upon it
-BEGIN PGP SIGNATURE-
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=
=nWsm
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-17 Thread Administrador

For me there is no trust in the fact that anyone can sign my key and put
it on a keyserver, and because I do not know the person who did can not
validate their signiture/identity.  What trust does this offer the
people who are real, trusted and known by me and whos keys have been
validated by me and my key(s) by them?

Give the owner the authority of his own public key and this issue would
fixed.  For example: Only the owner of the public key has the right to
put/remove/modify his own public key on a keyserver.


Schlacta, Christ:
 On Aug 16, 2015 2:27 PM, Robert J. Hansen r...@sixdemonbag.org wrote:

 What other people do says nothing about me, and everything about
 them.

 Except that 99% of people who see that signature will think you have an
 association with white supremacists.

 Should they?  No.

 Will they?  Yes.
 
 People are stupid. Not necessarily any individual person, but people at
 large are.
 

 The average person doesn't have a formal/mathematical model of trust and
 what it means.  They have a loose, poorly-specified understanding, like
 only sign certificates of people you know well.  This leads them to
 thinking, well, this white supremacist group must know Chris well.
 That's a false inference, but it's one a *large* number of people draw.

 On popular keys,  such as Facebook's, or any other public figure,
 there are going to accumulate signatures that aren't a part of
 anybody's Web of Trust. Until such time that these signatures can
 constitute a genuine threat to the Web of Trust, they're irrelevant.

 So you're now changing your statement: signatures *don't* always
 strengthen the WoT -- a large number of them are irrelevant.  This is
 much closer to reality.
 
 If you rounded up all the signatures on a key server,  and just started
 deleting them at random,  any given deletion is significantly more likely
 to weaken the Web of Trust than to make no change, therefore,
 mathematically, every signature strengthens the WoT on average.
 
 Let's assign a value if 0 to every irrelevant signature, and a value of 1
 to every relevant signature.  The total strength of the Web is the sum of
 the keys in the Web.   Then the expected value of any given key's deletion
 is in fact a negative value greater than 0, and if we rebuild the Web from
 those signatures,  the addition of any key has an expected value greater
 than 0, therefore, every key strengthens the Web

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 

-- 

administrador.

aut viam inveniam aut faciam

GPG KEY: 0CA6758D CA89F37F 49AE9799 D8D493A8 1CB8EEC8


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-17 Thread NdK
Il 16/08/2015 18:04, Einar Ryeng ha scritto:

 Is there any other problem arising from someone signing your key without
 permission?
The only problem I see is that you can easily get associated with the
wrong people. Like what happened here in Italy with Fidobust (about 25
years ago): some pirates' phone lines were being tapped, and since they
connected to Fidonet BBSs, those got tapped too... then their lines were
tapped and the other nodes they connected to became suspects and so
on. As a result, a lot of people have had their bedrooms (where they
kept the BBS PC) locked for the YEARS needed by justice to do its work.

That's why my skin crawls when Robert J Hansen says
 Except that 99% of people who see that signature will think you have
 an association with white supremacists.
 Should they?  No.
 Will they?  Yes.
Especially if one of those is a judge. When the average person have to
pay for a lawyer, (s)he has already lost.

BYtE,
 Diego

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


protecting pub-keys from unwanted signatures

2015-08-16 Thread Stefan Claas
Hello Werner and all,

after seeing Facebook's public key a couple of days ago,
i was wondering if it's possible to enhance GnuPG in a
future version, so that it no longer allows someone to
sign a public key without approval of the owner.

As an example: Bob likes to sign Alice's pub key and
issues the sign key command, but instead of signing
the key directly GnuPG would create a Signature
Reguest Certificate which Alice reads and verifies
in GnuPG, thus allowing her to add Bob's signature
to her key. This mechanism, or a similar one would 
protect Alice's key from unwanted signatures.

Best regards
Stefan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Sunday 16 August 2015 at 9:10:28 AM, in
mid:20150816081028.ga26...@zwiebelfreund.de, Stefan Claas wrote:



 after seeing Facebook's public key a couple of days
 ago, i was wondering if it's possible to enhance GnuPG
 in a future version, so that it no longer allows
 someone to sign a public key without approval of the
 owner.

If GnuPG were modified in this way the key could still be signed
using an old GnuPG version, or any other OpenPGP application.

I guess a modification would be possible that allowed a GnuPG user to
sign acceptance or rejection over a third-party signature, but I'm not
convinced there would be any point. Firstly, would such acceptance or
rejection be dropped by the keyservers? Secondly, any signature on a
key is only meaningful if you recognise (or have a trust path to) the
key that made that signature; the rest is meaningless background noise
that disappears if you use keyserver-options import-clean in your
gpg.conf or on your command line. (My local copy of Facebook's public
key has only self-signatures, and refreshing from a keyserver does not
change this).



 As an example: Bob likes to sign Alice's pub key and
 issues the sign key command, but instead of signing the
 key directly GnuPG would create a Signature Reguest
 Certificate which Alice reads and verifies in GnuPG,
 thus allowing her to add Bob's signature to her key.
 This mechanism, or a similar one would  protect Alice's
 key from unwanted signatures.

Or Alice could simply host a clean copy of her key without the
unwanted signatures on her website, Biglumber, an email
auto-responder, etc.


- --
Best regards

MFPA  mailto:2014-667rhzu3dc-lists-gro...@riseup.net

The One with The Answer is seldom asked The Question
-BEGIN PGP SIGNATURE-
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=
=LenD
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Stefan Claas
On Sun, Aug 16, 2015 at 12:15:03PM +0100, MFPA wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 Hi
 
 
 On Sunday 16 August 2015 at 9:10:28 AM, in
 mid:20150816081028.ga26...@zwiebelfreund.de, Stefan Claas wrote:
 
 
 
  after seeing Facebook's public key a couple of days
  ago, i was wondering if it's possible to enhance GnuPG
  in a future version, so that it no longer allows
  someone to sign a public key without approval of the
  owner.
 
 If GnuPG were modified in this way the key could still be signed
 using an old GnuPG version, or any other OpenPGP application.
 
 I guess a modification would be possible that allowed a GnuPG user to
 sign acceptance or rejection over a third-party signature, but I'm not
 convinced there would be any point. Firstly, would such acceptance or
 rejection be dropped by the keyservers? Secondly, any signature on a
 key is only meaningful if you recognise (or have a trust path to) the
 key that made that signature; the rest is meaningless background noise
 that disappears if you use keyserver-options import-clean in your
 gpg.conf or on your command line. (My local copy of Facebook's public
 key has only self-signatures, and refreshing from a keyserver does not
 change this).
 
 
 
  As an example: Bob likes to sign Alice's pub key and
  issues the sign key command, but instead of signing the
  key directly GnuPG would create a Signature Reguest
  Certificate which Alice reads and verifies in GnuPG,
  thus allowing her to add Bob's signature to her key.
  This mechanism, or a similar one would  protect Alice's
  key from unwanted signatures.
 
 Or Alice could simply host a clean copy of her key without the
 unwanted signatures on her website, Biglumber, an email
 auto-responder, etc.
 
 
 - --
 Best regards
 
 MFPA  mailto:2014-667rhzu3dc-lists-gro...@riseup.net
 
 The One with The Answer is seldom asked The Question
 -BEGIN PGP SIGNATURE-
 
 iQF8BAEBCgBmBQJV0HDFXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
 ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRCM0FFN0VDQTlBOEM4QjMwMjZBNUEwRjU2
 QjdDNzRDRUIzMUYyNUYwAAoJEGt8dM6zHyXwP50H/1rj+rZoRbM7EIFht89O+G8t
 4UdpvX3f8V73bJYW7CW288++QFqsLrJse2IsP6exK44ZUorR08MMSdn+5DSgiSGo
 J5W3HgMQxM/jQZ25bDp1jLExfEtgKfGpXWPONPLP/CVe+iZpu44cTbsjA5dfYXwx
 TSuyHD9t4auRzShHIDunPJWNqdt/WA5XGoGYZGIsICZG5lfHUBHUyrNXv3m/q/d0
 DjmelfMUpecNZ3coRhizP33tpet3mCSN1GEie9CPEWzk8aig1j5rhd/eBCVsvq0Y
 QVW7xJl+X7Esc0s8MeNnxbHshDco3TffRnSJFkSlKu992I61jg/O5e9d9IcS7FqI
 vgQBFgoAZgUCVdBwz18UgAAuAChpc3N1ZXItZnByQG5vdGF0aW9ucy5vcGVu
 cGdwLmZpZnRoaG9yc2VtYW4ubmV0MzNBQ0VENEVFOTEzNEVFQkRFNkE4NTA2MTcx
 MkJDNDYxQUY3NzhFNAAKCRAXErxGGvd45KBkAQDbT5Wo/zN+jhL5sNYRth+4QAm6
 D7gUb7mAdvkpUqlUuAEA6D6968t1Nm6iTWgVyxcVDaXO1sH4ZkWdPy2FhTI25Ak=
 =LenD
 -END PGP SIGNATURE-

Thanks for your reply, all valid points.
However if my proposal would result in an enhanced OpenPGP file
format older versions could not sign such keys, while a never version
could read older or leagcy file formats. Same as with other software
applications. Current key servers would not be able to read/store
such enhanced format and needed to be updated too.

Regards
Stefan
 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Daniel Roesler
On Sun, Aug 16, 2015 at 4:15 AM, MFPA
2014-667rhzu3dc-lists-gro...@riseup.net wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512

 Hi


 On Sunday 16 August 2015 at 9:10:28 AM, in
 mid:20150816081028.ga26...@zwiebelfreund.de, Stefan Claas wrote:



 after seeing Facebook's public key a couple of days
 ago, i was wondering if it's possible to enhance GnuPG
 in a future version, so that it no longer allows
 someone to sign a public key without approval of the
 owner.

 If GnuPG were modified in this way the key could still be signed
 using an old GnuPG version, or any other OpenPGP application.

 I guess a modification would be possible that allowed a GnuPG user to
 sign acceptance or rejection over a third-party signature, but I'm not
 convinced there would be any point. Firstly, would such acceptance or
 rejection be dropped by the keyservers? snip

No, the keyserver pool does not reject any signatures, even if the
signature itself is invalid. When you receive a public key from the
keyserver pool it's the job of the client to clean/reject invalid or
unknown signatures. I've argued a bit that keyservers should start to
play a role in policing the pool, but it's a controversial topic.

https://lists.gnu.org/archive/html/sks-devel/2015-05/msg00022.html

Unfortunately, that leads to trolls tagging notable public keys (such
as Facebook and Adrian Lamo) with unseemly material, but these will
just be ignored by gpg when you fetch that public key.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Stefan Claas
On Sun, Aug 16, 2015 at 05:31:10PM +0200, Viktor Dick wrote:
 On 16.08.2015 16:26, Stefan Claas wrote:
  if i understand you correctly it would not help me if someone
  would sign my key without my approval, so to speak.
 
 Sure it helps. If Alice signs my key and Bob wants to send me something
 and trusts Alice, he can derive some trust that my key is also genuine.
 One could argue that anyone who I do not know and who anyhow signs my
 key will probably not be (rightfully) trusted by anyone. However, some
 magazines (I'm thinking of c't) for example might put their fingerprint
 on each issue and someone who buys it might sign their key so that some
 friend of theirs who has not direct access to that can still be somehow
 sure that the key is correct.

Ok, i understand but it helps not to solve the issue of unwanted signatures,
which i'm talking about.
 
 I haven't looked at Facebook's public key, but let's assume that I want
 to send them an e-mail and tell my client 'get the key of
 i...@facebook.com'. It will download the key with a lot of signatures,
 some of which might be owned by someone in my web of trust. This person
 has probably just checked that the fingerprint given on their webpage
 matches the one of this particular key, but then that's something I do
 not need to check myself.
 
 (Not sure if that should be enough to sign a key, though...)
 
 Kind regards
 Viktor
 
Here's as an example the Facebook pub key:
https://pgp.mit.edu/pks/lookup?search=facebook+Incop=vindex

Should now GnuPG been enhaned, or the Key Server's been updated,
similar to the pgp.com one.in order to allow such things not in
the future?

Regards
Stefan



 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread vedaal
On 8/16/2015 at 12:34 PM, Stefan Claas ad...@zwiebelfreund.de wrote:
 
Should now GnuPG been enhaned, or the Key Server's been updated,
similar to the pgp.com one.in order to allow such things not in
the future?

=

It would be very helpful if such a protection against unwanted key signatures 
could be instituted.
Here is a possible suggestion on how it might be done:

[1] Have GnuPG require a 'cross-certification' of signatures, similar to the 
cross-certification of subkeys.

[2] Have GnuPG give a message upon importing a public key, that
 
Signatures from keyid's [...], [], and [...] have not been cross-certified 
by their owner,
Clean these signatures, y / n ? 

(Alternatively, the default could be:
These signatures will be removed. If you want to keep them, enter  'keep-sig' 
,

and then each new sig would be displayed, and if the importer
wants the sig, the importer would need to enter 'keep-sig' for each sig 
individually.)

This would require the owners of the keys to do periodic checking of their keys 
and cross-certify the signatures they want.

It would also be a bit of work for the owners to cross-certify all the 'good'  
signatures they were happy to get.


Just a suggestion.

The implementers can best decide how much extra work this would require, and if 
there is a simpler better way to accomplish the desired result.


vedaal



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Philipp Schafft
reflum,

On Sun, 2015-08-16 at 10:10 +0200, Stefan Claas wrote:
 Hello Werner and all,
 
 after seeing Facebook's public key a couple of days ago,
 i was wondering if it's possible to enhance GnuPG in a
 future version, so that it no longer allows someone to
 sign a public key without approval of the owner.

Maybe you can explain your use case a bit.
Think about this:
You can easily create a little document with the fingerprint of the key
you want to sign, timestamp, maybe other notions and sign that. Then you
can publish this document. In fact the signature on a key is very
similar to such a document. Just that it has a machine readable
structure.

-- 
Philipp.
 (Rah of PH2)


signature.asc
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Viktor Dick
On 16.08.2015 16:26, Stefan Claas wrote:
 if i understand you correctly it would not help me if someone
 would sign my key without my approval, so to speak.

Sure it helps. If Alice signs my key and Bob wants to send me something
and trusts Alice, he can derive some trust that my key is also genuine.
One could argue that anyone who I do not know and who anyhow signs my
key will probably not be (rightfully) trusted by anyone. However, some
magazines (I'm thinking of c't) for example might put their fingerprint
on each issue and someone who buys it might sign their key so that some
friend of theirs who has not direct access to that can still be somehow
sure that the key is correct.

I haven't looked at Facebook's public key, but let's assume that I want
to send them an e-mail and tell my client 'get the key of
i...@facebook.com'. It will download the key with a lot of signatures,
some of which might be owned by someone in my web of trust. This person
has probably just checked that the fingerprint given on their webpage
matches the one of this particular key, but then that's something I do
not need to check myself.

(Not sure if that should be enough to sign a key, though...)

Kind regards
Viktor



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Stefan Claas
On Sun, Aug 16, 2015 at 11:18:20AM +, Philipp Schafft wrote:
 reflum,
 
 On Sun, 2015-08-16 at 10:10 +0200, Stefan Claas wrote:
  Hello Werner and all,
  
  after seeing Facebook's public key a couple of days ago,
  i was wondering if it's possible to enhance GnuPG in a
  future version, so that it no longer allows someone to
  sign a public key without approval of the owner.
 
 Maybe you can explain your use case a bit.
 Think about this:
 You can easily create a little document with the fingerprint of the key
 you want to sign, timestamp, maybe other notions and sign that. Then you
 can publish this document. In fact the signature on a key is very
 similar to such a document. Just that it has a machine readable
 structure.
 
 -- 
 Philipp.
  (Rah of PH2)
if i understand you correctly it would not help me if someone
would sign my key without my approval, so to speak.

What i meaned whith my initial post was that it should in the
future not be possible to sign someones pub key directly, to
prevent unwanted signatures. Sure one can revoke his/her pub
key, but how often would you like to do that if a prankster
has lot's of energy?

I also forgot to mention in my first post that it would also
require that Alice has to enter her secrets key passphrase to
authorize Bob's Signature Request Certificate, after validating 
Bob's request cert.

I think it would be a welcome addition for  a future version of
GnuPG.

Regards
Stefan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Einar Ryeng
On Sun, Aug 16, 2015 at 04:26:16PM +0200, Stefan Claas wrote:
 
 What i meaned whith my initial post was that it should in the
 future not be possible to sign someones pub key directly, to
 prevent unwanted signatures. Sure one can revoke his/her pub
 key, but how often would you like to do that if a prankster
 has lot's of energy?

What harm do your see in fake signatures? There is a possibility of someone
making your key excessively large to download by adding tons of signatures to
it. If that happens, the correct place to fix it is probably the keyserver
code. Your signed signatures proposal would not inherently eliminate this
problem; Alice would still need to make a signature on Bob's key and upload it
to the server in order to allow Bob to download and sign the signature.

Is there any other problem arising from someone signing your key without
permission?

If you only want this for decluttering purposes, you will probably achieve
something similar by only looking at mutually signed keys. It won't be exactly
same, because the keys then have signed each other directly rather than each
other's signature packets, but depending on your problem it may do the job for
you.

-- 
Einar Ryeng


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Stefan Claas
On Sun, Aug 16, 2015 at 06:04:38PM +0200, Einar Ryeng wrote:
 On Sun, Aug 16, 2015 at 04:26:16PM +0200, Stefan Claas wrote:
  
  What i meaned whith my initial post was that it should in the
  future not be possible to sign someones pub key directly, to
  prevent unwanted signatures. Sure one can revoke his/her pub
  key, but how often would you like to do that if a prankster
  has lot's of energy?
 
 What harm do your see in fake signatures? There is a possibility of someone
 making your key excessively large to download by adding tons of signatures to
 it. If that happens, the correct place to fix it is probably the keyserver
 code. Your signed signatures proposal would not inherently eliminate this
 problem; Alice would still need to make a signature on Bob's key and upload it
 to the server in order to allow Bob to download and sign the signature.
 
 Is there any other problem arising from someone signing your key without
 permission?
 
 If you only want this for decluttering purposes, you will probably achieve
 something similar by only looking at mutually signed keys. It won't be exactly
 same, because the keys then have signed each other directly rather than each
 other's signature packets, but depending on your problem it may do the job for
 you.
 
 -- 
 Einar Ryeng

Hi,

what harm do i see with fake signatures or signatures without permission?

Well, i think everybody here or elsewere can imagine by themselves how
happy one would be to receive unwanted signatures, depending on the
content...

Regards
Stefan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Sunday 16 August 2015 at 6:15:16 PM, in
mid:20150816171516.9276343...@smtp.hushmail.com, ved...@nym.hush.com
wrote:


 This would require the owners of the keys to do
 periodic checking of their keys and cross-certify the
 signatures they want.

Why bother periodically checking? If somebody doesn't have the
courtesy to send the signature to the key owner rather than publishing
it themselves, they shouldn't expect the key owner to cross-certify
it.



 The implementers can best decide how much extra work
 this would require, and if there is a simpler better
 way to accomplish the desired result.

The keyserver no-modify flag was simple. But it didn't achieve the
desired result.

- --
Best regards

MFPA  mailto:2014-667rhzu3dc-lists-gro...@riseup.net

The second mouse gets the cheese
-BEGIN PGP SIGNATURE-
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=
=+DOC
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Robert J. Hansen
 People are stupid. Not necessarily any individual person, but people at
 large are.

https://xkcd.com/1386/

 If you rounded up all the signatures on a key server,  and just started
 deleting them at random,  any given deletion is significantly more
 likely to weaken the Web of Trust than to make no change, therefore,
 mathematically, every signature strengthens the WoT on average.

This is quickly becoming tendentious.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Schlacta, Christ
I'll reiterate that there's really no such thing as unwanted signatures.
The more signatures on a key,  the stronger the Web of Trust. End of story.
Please try to understand that no signature is inherently unwanted. Your
proposal, in any form,  would weaken gpg on the whole by increasing the
already high burden on users to maintain their keys.
On Aug 16, 2015 10:16 AM, ved...@nym.hush.com wrote:

 On 8/16/2015 at 12:34 PM, Stefan Claas ad...@zwiebelfreund.de wrote:

 Should now GnuPG been enhaned, or the Key Server's been updated,
 similar to the pgp.com one.in order to allow such things not in
 the future?

 =

 It would be very helpful if such a protection against unwanted key
 signatures could be instituted.
 Here is a possible suggestion on how it might be done:

 [1] Have GnuPG require a 'cross-certification' of signatures, similar to
 the cross-certification of subkeys.

 [2] Have GnuPG give a message upon importing a public key, that

 Signatures from keyid's [...], [], and [...] have not been
 cross-certified by their owner,
 Clean these signatures, y / n ? 

 (Alternatively, the default could be:
 These signatures will be removed. If you want to keep them, enter
 'keep-sig' ,

 and then each new sig would be displayed, and if the importer
 wants the sig, the importer would need to enter 'keep-sig' for each sig
 individually.)

 This would require the owners of the keys to do periodic checking of their
 keys and cross-certify the signatures they want.

 It would also be a bit of work for the owners to cross-certify all the
 'good'  signatures they were happy to get.


 Just a suggestion.

 The implementers can best decide how much extra work this would require,
 and if there is a simpler better way to accomplish the desired result.


 vedaal



 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Stefan Claas
On Sun, Aug 16, 2015 at 11:24:38AM -0700, Schlacta, Christ wrote:
 I'll reiterate that there's really no such thing as unwanted signatures.
 The more signatures on a key,  the stronger the Web of Trust. End of story.
 Please try to understand that no signature is inherently unwanted. Your
 proposal, in any form,  would weaken gpg on the whole by increasing the
 already high burden on users to maintain their keys.

With all due respect, but why should a GnuPG user not been allowed to decide
by him/herself which signatures he/she likes to have on his/her pub key? 
I don't get it, seriously. BTW. maybe a language barrier, but an unwanted 
signature for me is a signature which contains crap or false content which 
does not help the Web of Trust in any way and which i or others don't like
to see on our public keys.

P.S. last post for today, getting late here.

Regards
Stefan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Robert J. Hansen
 I'll reiterate that there's really no such thing as unwanted
 signatures.

No?  So you'd be fine if someone generated a fake certificate belonging
to White Power Action Network w...@stormfront.org and added a
signature to your certificate from it?

There are definitely such things as unwanted signatures.

 The more signatures on a key,  the stronger the Web of Trust. End of 
 story.

No.  This isn't even in the same postal code as reality.  More
signatures from *real people* may result in a better WoT; more
signatures, period, or signatures from fake identities, really don't add
anything.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Schlacta, Christ
On Aug 16, 2015 2:27 PM, Robert J. Hansen r...@sixdemonbag.org wrote:

  What other people do says nothing about me, and everything about
  them.

 Except that 99% of people who see that signature will think you have an
 association with white supremacists.

 Should they?  No.

 Will they?  Yes.

People are stupid. Not necessarily any individual person, but people at
large are.


 The average person doesn't have a formal/mathematical model of trust and
 what it means.  They have a loose, poorly-specified understanding, like
 only sign certificates of people you know well.  This leads them to
 thinking, well, this white supremacist group must know Chris well.
 That's a false inference, but it's one a *large* number of people draw.

  On popular keys,  such as Facebook's, or any other public figure,
  there are going to accumulate signatures that aren't a part of
  anybody's Web of Trust. Until such time that these signatures can
  constitute a genuine threat to the Web of Trust, they're irrelevant.

 So you're now changing your statement: signatures *don't* always
 strengthen the WoT -- a large number of them are irrelevant.  This is
 much closer to reality.

If you rounded up all the signatures on a key server,  and just started
deleting them at random,  any given deletion is significantly more likely
to weaken the Web of Trust than to make no change, therefore,
mathematically, every signature strengthens the WoT on average.

Let's assign a value if 0 to every irrelevant signature, and a value of 1
to every relevant signature.  The total strength of the Web is the sum of
the keys in the Web.   Then the expected value of any given key's deletion
is in fact a negative value greater than 0, and if we rebuild the Web from
those signatures,  the addition of any key has an expected value greater
than 0, therefore, every key strengthens the Web

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: protecting pub-keys from unwanted signatures

2015-08-16 Thread Robert J. Hansen
 What other people do says nothing about me, and everything about
 them.

Except that 99% of people who see that signature will think you have an
association with white supremacists.

Should they?  No.

Will they?  Yes.

The average person doesn't have a formal/mathematical model of trust and
what it means.  They have a loose, poorly-specified understanding, like
only sign certificates of people you know well.  This leads them to
thinking, well, this white supremacist group must know Chris well.
That's a false inference, but it's one a *large* number of people draw.

 On popular keys,  such as Facebook's, or any other public figure,
 there are going to accumulate signatures that aren't a part of
 anybody's Web of Trust. Until such time that these signatures can
 constitute a genuine threat to the Web of Trust, they're irrelevant.

So you're now changing your statement: signatures *don't* always
strengthen the WoT -- a large number of them are irrelevant.  This is
much closer to reality.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users