Re: [liberationtech] Interesting things in keyservers

2013-07-22 Thread Tom Ritter
On 21 July 2013 20:00, micah mi...@riseup.net wrote:
 Uh ok, that is weird? Eugen, care to explain what that is about?


I wouldn't give it too much thought.  John Young often archives emails
from mailing lists to cryptome.org.

It's basically a curated archive service. Take it as a badge of
selection - someone thought your email was good enough to call out and
display.

-tom
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Interesting things in keyservers

2013-07-21 Thread micah

Micah Lee micahf...@riseup.net writes:
 Finally, there seems to be some amazing misconceptions about keyservers,
 keys and the web of trust. In particular this
 http://cryptome.org/2013/07/mining-pgp-keyservers.htm circulated
 recently and it pained me to see because it suggested various wreckless
 conclusions that were dangerously off the mark[0] (and used pgp.mit.edu,

 If you follow that link now, it includes this email you just wrote :).

Uh ok, that is weird? Eugen, care to explain what that is about?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Interesting things in keyservers

2013-07-20 Thread micah

Hi Micah!

Micah Lee micahf...@riseup.net writes:

 I'm working on a talk for OHM2013 about PGP. Can anyone send me examples
 of interesting keys in key servers that you know of?

Since you are preparing a talk about the subject, I'm going to be
pedantic and correct your usage of PGP, because it is important to get
your terminology straight when giving a talk. I presume you aren't
giving a talk about the commercial software, but instead you are
actually giving a talk about OpenPGP which is the standard specified by
RFC4880 that different programs like GnuPG, Seahorse, MacGPG, and PGP
etc. all implement. If that is true, then you should refer to it as
OpenPGP, and not PGP.

I dont know what your talk will consist of, besides the funny enigmail
XSS and goatse.cx stuff (thanks for that! always good to have some
goatse early in the morning), but I would like to point out a few things
that might be useful to mention.

One is a wiki page that I created with some people:
https://we.riseup.net/riseuplabs+paow/openpgp-best-practices - it
contains some useful hints about using OpenPGP, maintaining a good key
and some general good practices that people often dont know about (such
as the importance of keeping your keys updated to get critical
revocation and expiration extension certifications!)

One thing mentioned on that page that I wanted to highlight, because you
used pgp.mit.edu links in your original email, is that the keyserver
pgp.mit.edu is not a good one to use/promote. Everyone uses it as their
'goto' keyserver, but it is a really bad idea! As a keyserver, it has
been broken for years. For a long time it was just dropping revocations,
subkey updates and expirations on the floor. That is *really*
bad. Eventually, they upgraded their keyserver software, but it is
*still* running an older version of SKS, a version that fails to handle
16-digit subkeyid lookups (among other failings).

So, please don't rely on pgp.mit.edu for your security, and please don't
include them in your slides! If you are looking for one to use, I highly
recommend using the SKS pool address (hkp://pool.sks-keyservers.net or
http://hkps.pool.sks-keyservers.net/ - or if you want a more close
geographical pool, have a look at
http://sks-keyservers.net/overview-of-pools.php). 

Finally, there seems to be some amazing misconceptions about keyservers,
keys and the web of trust. In particular this
http://cryptome.org/2013/07/mining-pgp-keyservers.htm circulated
recently and it pained me to see because it suggested various wreckless
conclusions that were dangerously off the mark[0] (and used pgp.mit.edu,
hah). While it is true that we've jokingly called the OpenPGP web of
trust the original social network because of the exposed social
relational graphing that can be done by querying keyservers, and it is
for this reason that many activists I know do not want to have
signatures uploaded to keyservers (and instead use the bulky local-only
signature work-around)...

... but for some reason people seem to think that if it is on a
keyserver, is true, or it means something that it doesn't. People don't
realize critical things, such as the fact that I can create a key with
the UID Nadim Kobeissi and upload it to the keyservers[1]. That doesn't
mean that is the real Nadim's key (this is what exchanging key
fingerprints and doing certifications is for, so you can know, with a
certain degree of certainty, that this person is the person who controls
that secret key material). 

Or people think that because I signed your key and that signature is on
the keyserver that indicates: I trust you; we met in person at that
date; we know each other; we are involved in a criminal conspiracy with
each other; or many other wrong assumptions about what that
certification means. I can sign Edward Snowden's key and send that to
the keyservers[1]. Hell, I can sign Snowden's key with my fake Nadim
Kobeissi key[1] and then send it to the keyservers. Does that mean that
Nadim and Snowden have met in person?! No, it does not at all.

Anyways, I can keep going... but I dont know what the focus of your OHM
talk is about, so going on like this isn't particularly useful to you
and your talk... however, I'd be happy to provide more feedback about
your talk if you would like![2]

After all, we Micahs need to stick together,
micah

0. the cryptome article just sounds like impenetrable bullshit from
someone with no interest in actually understandning what's happening -
I'm not saying who said this... 

1. no, I didn't do that, nor did I upload the edward snowden or bradly
manning keys.

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Interesting things in keyservers

2013-07-17 Thread Jason Gulledge
Micah,

There's uh, this one.
http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x25B37ACACC82107B 
(warning: ascii goatse)

They tried again w/ his other key, but.. mostly fail-ish.
http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x642AFAB27F6A5517

-Jason Gulledge
@ramdac


On 7/17/13 7:45 AM, Micah Lee wrote:
 I'm working on a talk for OHM2013 about PGP. Can anyone send me examples
 of interesting keys in key servers that you know of?

 For example, attempts at XSSing Enigmail (I think one of these is mine
 from long ago -- and BTW, Enigmail isn't vulnerable):

 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x6E5D912BBF74A1A6
 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0xBDE99D48C65A27EC
 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x06AB7A6AA7B3C04D
 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0xC1BBD7FB306E2139

 I remember seeing a key once that was full of ASCII art user IDs or
 maybe sigs, but I don't remember what to search for. Anything else
 interesting?



 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Interesting things in keyservers

2013-07-17 Thread Ben Laurie
On 17 July 2013 06:45, Micah Lee micahf...@riseup.net wrote:
 I'm working on a talk for OHM2013 about PGP. Can anyone send me examples
 of interesting keys in key servers that you know of?

http://shoestringfoundation.org/cgi-bin/blosxom.cgi/2004/07/01


 For example, attempts at XSSing Enigmail (I think one of these is mine
 from long ago -- and BTW, Enigmail isn't vulnerable):

 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x6E5D912BBF74A1A6
 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0xBDE99D48C65A27EC
 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0x06AB7A6AA7B3C04D
 http://pgp.mit.edu:11371/pks/lookup?op=vindexsearch=0xC1BBD7FB306E2139

 I remember seeing a key once that was full of ASCII art user IDs or
 maybe sigs, but I don't remember what to search for. Anything else
 interesting?

 --
 Micah Lee
 @micahflee


 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech