Re: ADK's

2023-05-02 Thread Michael Richardson

Andrew Gallagher  wrote:
> The only way that a company would end up archiving a password reset
> email encrypted to an ADK would be if an employee was using their work
> email address for password resets. If using their work email for this
> purpose is inadvisable, then it is inadvisable regardless of ADKs.

Like you mean, an employee was using a work email for a work thing, maybe?

> ADK introduces no new considerations that are not also an issue for key
> escrow, which happens anyway, and has several advantages over escrow,

I agree.

> If you don’t trust your correspondent’s employer, then the only
> effective course of action is to not use their employer’s email
> address. Technical measures cannot protect you from opsec problems.

I'm asking to be informed so that I can make the decision to do
something else.





signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-02 Thread Andrew Gallagher via Gnupg-users
On 2 May 2023, at 02:18, Michael Richardson  wrote:
> 
> It's the initial investigation of an irregularity where there could be a 
> problem.

These examples are becoming increasingly contrived. If you are investigating 
fraud by someone who can read all your company emails, don’t discuss it over 
company email. This is really basic stuff.

> There is also an issue with 2FA and password reset emails: it's something
> that may be a vulnerability to archive. Okay, few are encrypted today, but
> we can hope.

Password reset emails are supposed to be immune to replay attacks.

> Many companies with forced proxis are starting to realize that
> they become liable when they store banking login cookies.

The only way that a company would end up archiving a password reset email 
encrypted to an ADK would be if an employee was using their work email address 
for password resets. If using their work email for this purpose is inadvisable, 
then it is inadvisable regardless of ADKs. 

> Anyway, I think senders need to be made mildly aware that it's occuring, and
> I think they should be allowed to pick a specific ADK or suppress them all in
> certain circumstances best decided by them.

If I add an ADK notation to my key for legitimate reasons that I do not discuss 
with all my correspondents, on what basis do they decide to second guess it? 
How is this any different from where I store my private key, whether it is 
escrowed, whether it has a password etc, which are invisible to the sender and 
generally none of their business? If you don’t trust how I manage my key, the 
only reasonable recourse is to avoid using it.

ADK introduces no new considerations that are not also an issue for key escrow, 
which happens anyway, and has several advantages over escrow, particularly 
transparency. If however it became common for people to disable encrypting to 
the ADK, it would simply encourage companies to stop using it and keep using 
escrow, which doesn’t prevent any of the proposed abuses. 

If you don’t trust your correspondent’s employer, then the only effective 
course of action is to not use their employer’s email address. Technical 
measures cannot protect you from opsec problems.

A
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-02 Thread Werner Koch via Gnupg-users
On Sun, 30 Apr 2023 13:58, Andrew Gallagher said:

> The danger of an “ignore ADK” option is that it gives a false sense of

And not to forget the other important use case: Add an ADK for your own
second device so that you are able to decrypt also on that device -
without the need to keep the pimary key on that device.

BTW, OpenKeychain does something very similar for many years.


Shalom-Salam,

   Werner

-- 
The pioneers of a warless world are the youth that
refuse military service. - A. Einstein


openpgp-digital-signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-01 Thread Jacob Bachmeyer via Gnupg-users

Michael Richardson wrote:

Jacob Bachmeyer  wrote:
>> I'm unclear if this is a new feature (I think so), and if so what 
happens if
>> the sender hasn't upgraded yet?
>>

> My understanding:  ADKs are new and do not work without support on the
> sender's side.  The ADK is a request to also encrypt any message to the
> subkey to the ADK.  If the sender's software does not understand that
> request, it does not happen.  If the sender rejects that request, either
> by setting an option or by patching their software to ignore the request, 
it
> does not happen.

Does it still (by default) encrypt to the main key?
  


My understanding:  Yes, if ADKs are not supported, the message is 
encrypted only for the main key.



[...]

>> > I would also note that, for a work email system in an environment 
where there
>> > is a legal or quasi-legal requirement (not uncommon in finance) to 
archive
>> > messages, simply dropping any incoming message not decryptable with the
>> > archive ADK as spam would be reasonable.  Since the primary concern
>> > motivating message archival in this example is deterring insider 
trading,
>> > simply not allowing unreadable messages to be delivered accomplishes 
the same
>> > objective.
>>
>> Yes, reasonable.
>> OTH, the emails investigating the insider trading by the HR people might 
need
>> to avoid the ADK.

> If we are talking about investigating HR malfeasance, those messages would
> not be going to the traders' regular inboxes in the first place.  You are
> right that an HR ADK could be a very bad idea in this example, since it 
could
> allow HR to front-run their own employer.  The expected solution would be 
to
> give the trading archives only to the audit or legal departments, and only
> after some period of time has passed.  That still leaves potential 
auditor or
> lawyer malfeasance, but that is an existing risk such businesses already
> handle.

It's the initial investigation of an irregularity where there could be a 
problem.
There is also an issue with 2FA and password reset emails: it's something
that may be a vulnerability to archive.  Okay, few are encrypted today, but
we can hope.   Many companies with forced proxis are starting to realize that
they become liable when they store banking login cookies.
  


Really, the banks should be recognizing those networks and denying 
logins.  Perhaps corporate forced proxies should be required to insert 
an additional header reporting that the connection is not actually 
point-to-point encrypted, which banks and other sensitive services could 
use to reject sessions.


The main problem here seems to be a work-life balance issue.  People 
should not be conducting personal business on the company network, and, 
in turn, companies need to understand that personal time outside of work 
is /personal/ /time/ /outside/ /of/ /work/.  I am not sure in which 
direction this first broke down, but it is the root cause of a wide 
variety of problems.



Anyway, I think senders need to be made mildly aware that it's occuring, and
I think they should be allowed to pick a specific ADK or suppress them all in
certain circumstances best decided by them.
  


I believe that is substantially what I proposed, so at least two of us 
agree.



-- Jacob

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-01 Thread Michael Richardson

Jacob Bachmeyer  wrote:
>> I'm unclear if this is a new feature (I think so), and if so what 
happens if
>> the sender hasn't upgraded yet?
>>

> My understanding:  ADKs are new and do not work without support on the
> sender's side.  The ADK is a request to also encrypt any message to the
> subkey to the ADK.  If the sender's software does not understand that
> request, it does not happen.  If the sender rejects that request, either
> by setting an option or by patching their software to ignore the request, 
it
> does not happen.

Does it still (by default) encrypt to the main key?

> My primary reason for arguing to support some way to suppress the use of 
an
> ADK when encrypting is that, as Johan noted, this is an issue where 
feelings
> are strong enough to provoke forks, which are likely to simply rip out ADK
> support entirely, thus making its legitimate uses (group inboxes, multiple
> tokens, business-related) unreliable.

I agree with this view.

>> > I would also note that, for a work email system in an environment 
where there
>> > is a legal or quasi-legal requirement (not uncommon in finance) to 
archive
>> > messages, simply dropping any incoming message not decryptable with the
>> > archive ADK as spam would be reasonable.  Since the primary concern
>> > motivating message archival in this example is deterring insider 
trading,
>> > simply not allowing unreadable messages to be delivered accomplishes 
the same
>> > objective.
>>
>> Yes, reasonable.
>> OTH, the emails investigating the insider trading by the HR people might 
need
>> to avoid the ADK.

> If we are talking about investigating HR malfeasance, those messages would
> not be going to the traders' regular inboxes in the first place.  You are
> right that an HR ADK could be a very bad idea in this example, since it 
could
> allow HR to front-run their own employer.  The expected solution would be 
to
> give the trading archives only to the audit or legal departments, and only
> after some period of time has passed.  That still leaves potential 
auditor or
> lawyer malfeasance, but that is an existing risk such businesses already
> handle.

It's the initial investigation of an irregularity where there could be a 
problem.
There is also an issue with 2FA and password reset emails: it's something
that may be a vulnerability to archive.  Okay, few are encrypted today, but
we can hope.   Many companies with forced proxis are starting to realize that
they become liable when they store banking login cookies.

Anyway, I think senders need to be made mildly aware that it's occuring, and
I think they should be allowed to pick a specific ADK or suppress them all in
certain circumstances best decided by them.

--
]   Never tell me the odds! | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works|IoT architect   [
] m...@sandelman.ca  http://www.sandelman.ca/|   ruby on rails[




signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-01 Thread Andrew Gallagher via Gnupg-users
On 1 May 2023, at 12:40, Ineiev via Gnupg-users  wrote:
> now, I generate a key
> for y...@guan.edu locally and add 0123456789ABCDEF as an ADK (BTW,
> will GnuPG complain if the only encryption-capable subkey is ADK?

Or you could just use an alias…?

A
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-01 Thread Ineiev via Gnupg-users
On Sun, Apr 30, 2023 at 10:52:10PM -0500, Jacob Bachmeyer via Gnupg-users wrote:
> 
> That is an almost prototypical example.  In that case, the "archive" key
> would actually be the main subkey, and the list recipients' personal keys
> would be attached as ADKs.
> 
> Another example:  suppose I have multiple hardware tokens and wish to be
> able to use them interchangeably, but also want maximal security with this
> arrangement, so have generated an encryption keypair on each token.  I list
> all of the per-token subkeys as ADKs.  In this case, the ADKs really would
> all be /my/ keys.  Again, I would have to publish a new certificate every
> time my collection of live tokens changes, which may or may not leak useful
> information to an adversary.

It looks like the feature will allow for quite unexpected (if not
unintended) uses.

Another potential use is: I have reasons to believe that the holder
of the key 0123456789ABCDEF controls the email y...@guan.edu, but that
key has no user ID with such email, and I couldn't validate any other
emails in that key. when I'm writing to that email, my MUA will look
for keys with user IDs that match it. now, I generate a key
for y...@guan.edu locally and add 0123456789ABCDEF as an ADK (BTW,
will GnuPG complain if the only encryption-capable subkey is ADK?
can I make all self-signatures local in order to avoid sending
the key to keyservers?)


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-05-01 Thread mlnl via Gnupg-users
Hi Johan,

Johan Wevers via Gnupg-users  wrote:

>On 2023-04-30 21:01, Ineiev via Gnupg-users wrote:
>
>>> All I want is an option to ignore adk's - and it should not claim
>>> anything else than that.  
>> 
>> Can't you remove ADK subkeys from your keyring?  
>
>On someone else's key?
>

Yes.

1. identify ADK key: [R]/usage: R ("restricted encryption key") and
extract adk's fingerprint
2. gpg --batch --delete-keys adkfp!

after every key import or refresh.

-- 
mlnl

GPG:1FC05426F87FA623

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Jacob Bachmeyer via Gnupg-users

Michael Richardson wrote:

Jacob Bachmeyer via Gnupg-users  wrote:
> ADKs seem particularly valuable to me as a solution to the "group inbox"
> problem that avoids actually sharing private key material:  simply
> attach encryption subkeys for all recipients to the "group inbox"
> certificate.  This requires publishing new certificates when the
> recipient list changes and discloses the recipient list to some extent, 
but
> that is the trade-off for end-to-end security in this context.  Could a
> "--notify-ADK-encrypt" option that could be placed in the configuration 
file
> be appropriate to address user concerns about possible improper 
proliferation
> of ADKs?  Should a notification that an ADK was used actually be default?
> After all, there are legitimate uses for ADKs, but an ADK turning up where
> not expected could be a strong hint that you have a bogus certificate.

That would be really useful for secur...@example.com
  


That is an almost prototypical example.  In that case, the "archive" key 
would actually be the main subkey, and the list recipients' personal 
keys would be attached as ADKs.


Another example:  suppose I have multiple hardware tokens and wish to be 
able to use them interchangeably, but also want maximal security with 
this arrangement, so have generated an encryption keypair on each 
token.  I list all of the per-token subkeys as ADKs.  In this case, the 
ADKs really would all be /my/ keys.  Again, I would have to publish a 
new certificate every time my collection of live tokens changes, which 
may or may not leak useful information to an adversary.



I'm unclear if this is a new feature (I think so), and if so what happens if
the sender hasn't upgraded yet?
  


My understanding:  ADKs are new and do not work without support on the 
sender's side.  The ADK is a request to also encrypt any message to the 
subkey to the ADK.  If the sender's software does not understand that 
request, it does not happen.  If the sender rejects that request, either 
by setting an option or by patching their software to ignore the 
request, it does not happen.


My primary reason for arguing to support some way to suppress the use of 
an ADK when encrypting is that, as Johan noted, this is an issue where 
feelings are strong enough to provoke forks, which are likely to simply 
rip out ADK support entirely, thus making its legitimate uses (group 
inboxes, multiple tokens, business-related) unreliable.



> I would also note that, for a work email system in an environment where 
there
> is a legal or quasi-legal requirement (not uncommon in finance) to archive
> messages, simply dropping any incoming message not decryptable with the
> archive ADK as spam would be reasonable.  Since the primary concern
> motivating message archival in this example is deterring insider trading,
> simply not allowing unreadable messages to be delivered accomplishes the 
same
> objective.

Yes, reasonable.
OTH, the emails investigating the insider trading by the HR people might need
to avoid the ADK.


If we are talking about investigating HR malfeasance, those messages 
would not be going to the traders' regular inboxes in the first place.  
You are right that an HR ADK could be a very bad idea in this example, 
since it could allow HR to front-run their own employer.  The expected 
solution would be to give the trading archives only to the audit or 
legal departments, and only after some period of time has passed.  That 
still leaves potential auditor or lawyer malfeasance, but that is an 
existing risk such businesses already handle.



-- Jacob


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Michael Richardson

Jacob Bachmeyer via Gnupg-users  wrote:
> ADKs seem particularly valuable to me as a solution to the "group inbox"
> problem that avoids actually sharing private key material:  simply
> attach encryption subkeys for all recipients to the "group inbox"
> certificate.  This requires publishing new certificates when the
> recipient list changes and discloses the recipient list to some extent, 
but
> that is the trade-off for end-to-end security in this context.  Could a
> "--notify-ADK-encrypt" option that could be placed in the configuration 
file
> be appropriate to address user concerns about possible improper 
proliferation
> of ADKs?  Should a notification that an ADK was used actually be default?
> After all, there are legitimate uses for ADKs, but an ADK turning up where
> not expected could be a strong hint that you have a bogus certificate.

That would be really useful for secur...@example.com

I'm unclear if this is a new feature (I think so), and if so what happens if
the sender hasn't upgraded yet?

> I would also note that, for a work email system in an environment where 
there
> is a legal or quasi-legal requirement (not uncommon in finance) to archive
> messages, simply dropping any incoming message not decryptable with the
> archive ADK as spam would be reasonable.  Since the primary concern
> motivating message archival in this example is deterring insider trading,
> simply not allowing unreadable messages to be delivered accomplishes the 
same
> objective.

Yes, reasonable.
OTH, the emails investigating the insider trading by the HR people might need
to avoid the ADK.




signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Jacob Bachmeyer via Gnupg-users

Johan Wevers via Gnupg-users wrote:

On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote:

[...]
  

The danger of an “ignore ADK” option is that it gives a false sense of 
security. It is already possible for an employer to require escrow of the 
decryption subkeys of their employees - ADK actually makes this process more 
transparent.



That might be, but it is nowhere certain that this escrow will happen,
especially if they roll out adk's. Not providing such an option might be
a case where the perfect is the enemy of the good: it might not be a
perfect solution but it can be better than the alternative.

Besides, this is begging for GnuPG forks to arise, and if those forks
are well implemented remains to be seen.


Maybe the best option here is an "--override-encryption-target 
KEYGRIP/SUBKEYGRIP" option, repeatable to encrypt to multiple specific 
subkeys of the same or different PGP keys, which is why it requires both 
a keygrip and a subkeygrip.  This would also allow encrypting to some 
ADKs while ignoring others and resolve the demands for an "ignore ADK" 
option.


ADKs seem particularly valuable to me as a solution to the "group inbox" 
problem that avoids actually sharing private key material:  simply 
attach encryption subkeys for all recipients to the "group inbox" 
certificate.  This requires publishing new certificates when the 
recipient list changes and discloses the recipient list to some extent, 
but that is the trade-off for end-to-end security in this context.  
Could a "--notify-ADK-encrypt" option that could be placed in the 
configuration file be appropriate to address user concerns about 
possible improper proliferation of ADKs?  Should a notification that an 
ADK was used actually be default?  After all, there are legitimate uses 
for ADKs, but an ADK turning up where not expected could be a strong 
hint that you have a bogus certificate.


I would also note that, for a work email system in an environment where 
there is a legal or quasi-legal requirement (not uncommon in finance) to 
archive messages, simply dropping any incoming message not decryptable 
with the archive ADK as spam would be reasonable.  Since the primary 
concern motivating message archival in this example is deterring insider 
trading, simply not allowing unreadable messages to be delivered 
accomplishes the same objective.



-- Jacob

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread vedaal via Gnupg-users


There are 2 simple workarounds to employment ADK's  :
[ 1 ].  Send a symmetrically encrypted message to the key with the
ADK(This will require an agreed upon symmetric passphrase communicated
in person, phone, or another non-ADK manner)
[ 2 ].   Generate a non-ADK key, not uploaded to any server and send
and receive messages with a hidden-ID option, and keep this key on a
separated keyring. This can be communicated symmetrically as in [ 1 ].

vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Johan Wevers via Gnupg-users
On 2023-04-30 21:01, Ineiev via Gnupg-users wrote:

>> All I want is an option to ignore adk's - and it should not claim
>> anything else than that.
> 
> Can't you remove ADK subkeys from your keyring?

On someone else's key?

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Ineiev via Gnupg-users
On Sun, Apr 30, 2023 at 05:41:31PM +0200, Johan Wevers via Gnupg-users wrote:
> 
> All I want is an option to ignore adk's - and it should not claim
> anything else than that.

Can't you remove ADK subkeys from your keyring?


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Johan Wevers via Gnupg-users
On 2023-04-30 16:54, Andrew Gallagher via Gnupg-users wrote:

>> That might be, but it is nowhere certain that this escrow will happen,
>> especially if they roll out adk's.
> 
> You’re inverting the burden of proof here. The important consideration is 
> that E2E can’t prove that a key *wasn’t* escrowed - so it’s much better for 
> the software to make no claims about it than potentially misleading ones. 

There is also no strict proof that the employer doesn't have access to
the personal key of the receiver.

All I want is an option to ignore adk's - and it should not claim
anything else than that.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Andrew Gallagher via Gnupg-users
On 30 Apr 2023, at 14:42, Johan Wevers via Gnupg-users  
wrote:
> 
> On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote:
>> Whether this is done voluntarily or under duress from their employer is an 
>> opsec issue, not a comsec one.
> 
> If it is an ex-employer that might be more compicated.

Indeed. If this is in your threat model then don’t use work email addresses for 
personal communication, because encryption cannot protect you.

>> The danger of an “ignore ADK” option is that it gives a false sense of 
>> security. It is already possible for an employer to require escrow of the 
>> decryption subkeys of their employees - ADK actually makes this process more 
>> transparent.
> 
> That might be, but it is nowhere certain that this escrow will happen,
> especially if they roll out adk's.

You’re inverting the burden of proof here. The important consideration is that 
E2E can’t prove that a key *wasn’t* escrowed - so it’s much better for the 
software to make no claims about it than potentially misleading ones. 

A



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Johan Wevers via Gnupg-users
On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote:

> E2E encryption can’t protect you from your correspondent disclosing your 
> communication at the other end.

That is obvious.

> Whether this is done voluntarily or under duress from their employer is an 
> opsec issue, not a comsec one.

If it is an ex-employer that might be more compicated.

> The danger of an “ignore ADK” option is that it gives a false sense of 
> security. It is already possible for an employer to require escrow of the 
> decryption subkeys of their employees - ADK actually makes this process more 
> transparent.

That might be, but it is nowhere certain that this escrow will happen,
especially if they roll out adk's. Not providing such an option might be
a case where the perfect is the enemy of the good: it might not be a
perfect solution but it can be better than the alternative.

Besides, this is begging for GnuPG forks to arise, and if those forks
are well implemented remains to be seen.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Andrew Gallagher via Gnupg-users
On 30 Apr 2023, at 13:45, Johan Wevers via Gnupg-users  
wrote:
> 
> On 2023-04-30 14:10, Werner Koch via Gnupg-users wrote:
> 
>> It does not make any sense so have such an option.  If a user wants to
>> allow colleagues or an archive system to decrypt her mails that is her
>> decision.
> 
> What I've had in practice in one company: you got a company key with a
> personal key and an adk added. Nothing to want from my part there. If I
> want to mail someone at such a company I may just want to ignore the adk.

E2E encryption can’t protect you from your correspondent disclosing your 
communication at the other end. Whether this is done voluntarily or under 
duress from their employer is an opsec issue, not a comsec one. If you don’t 
want your correspondent’s employer reading your emails, don’t send messages to 
their work email address.

The danger of an “ignore ADK” option is that it gives a false sense of 
security. It is already possible for an employer to require escrow of the 
decryption subkeys of their employees - ADK actually makes this process more 
transparent. 

A
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Johan Wevers via Gnupg-users
On 2023-04-30 14:10, Werner Koch via Gnupg-users wrote:

> It does not make any sense so have such an option.  If a user wants to
> allow colleagues or an archive system to decrypt her mails that is her
> decision.

What I've had in practice in one company: you got a company key with a
personal key and an adk added. Nothing to want from my part there. If I
want to mail someone at such a company I may just want to ignore the adk.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's (was: [Announce] GnuPG 2.4.1 released)

2023-04-30 Thread Johan Wevers via Gnupg-users
On 2023-04-30 13:22, Andrew Gallagher via Gnupg-users wrote:

> Just curious, what’s the threat scenario here?

The HR department of the receiver.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread Werner Koch via Gnupg-users
On Fri, 28 Apr 2023 16:57, Johan Wevers said:

> So you finally caved in to the backdoor demands.

In business it is quite common to share subkeys with others.  Thus the
ADSK makes it only more explicit and flexible.  See the blog entry.

> What I'm missing (maybe I just didn't found it?) is an option in my
> config file to ignore adk requests and just don't encrypt to those keys

It does not make any sense so have such an option.  If a user wants to
allow colleagues or an archive system to decrypt her mails that is her
decision.


Salam-Shalom,

   Werner


-- 
The pioneers of a warless world are the youth that
refuse military service. - A. Einstein


openpgp-digital-signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's (was: [Announce] GnuPG 2.4.1 released)

2023-04-30 Thread Andrew Gallagher via Gnupg-users
On 30 Apr 2023, at 11:30, Johan Wevers via Gnupg-users  
wrote:
> 
> On 2023-04-30 1:15, ckeader via Gnupg-users wrote:
> 
>> Can't call it that as long as it's under user control (every long option of 
>> the software has an equivalent config file option. You don't add such a key 
>> via config or command line, no adsk will happen as it's not configured).
> 
> On my key, yes, I can choose to add an adk or not of course. But suppose
> I want to encrypt to a key that has an adk added, but I only want to
> encrypt to that key and not to the added adk? How do I do that?

Just curious, what’s the threat scenario here? If you suspect that your 
correspondent’s key preferences have been tampered with by a third party then 
surely the entire key is supect and shouldn’t be used at all? If on the other 
hand you believe that it has not been tampered with, but your correspondent has 
been negligent in configuring it, then maybe you shouldn’t trust your 
correspondent?

A



signature.asc
Description: Message signed with OpenPGP
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's (was: [Announce] GnuPG 2.4.1 released)

2023-04-30 Thread Johan Wevers via Gnupg-users
On 2023-04-30 1:15, ckeader via Gnupg-users wrote:

> Can't call it that as long as it's under user control (every long option of 
> the software has an equivalent config file option. You don't add such a key 
> via config or command line, no adsk will happen as it's not configured).

On my key, yes, I can choose to add an adk or not of course. But suppose
I want to encrypt to a key that has an adk added, but I only want to
encrypt to that key and not to the added adk? How do I do that?

> If you're using gpg built by your org, you have no trustworthy environment 
> anyway.

Probably, but when I answer a mail from home with my own GnuPG I want to
be able to ignore adk's.

> And the feature needs to be supported by the client.

You, currently I run gpg 2.2 so it's not of immediate concern. But when
I eventually upgrade I want to be able to ignore adk's.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's (was: [Announce] GnuPG 2.4.1 released)

2023-04-29 Thread ckeader via Gnupg-users
Johan Wevers via Gnupg-users writes:
> On 2023-04-28 15:47, Werner Koch via Gnupg-users wrote:
> 
> >   * gpg: New command --quick-add-adsk and other ADSK features.
> > [T6395, https://gnupg.org/blog/20230321-adsk.html]
> 
> So you finally caved in to the backdoor demands.
> 
> What I'm missing (maybe I just didn't found it?) is an option in my
> config file to ignore adk requests and just don't encrypt to those keys
> as well when I send or reply a message.

Can't call it that as long as it's under user control (every long option of the 
software has an equivalent config file option. You don't add such a key via 
config or command line, no adsk will happen as it's not configured). If you're 
using gpg built by your org, you have no trustworthy environment anyway.

And the feature needs to be supported by the client.

In the face of email having been hijacked by the corporates/Micros~t+Exchange 
and intrinsically broken S/MIME, practical relevance: close to zero.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's (was: [Announce] GnuPG 2.4.1 released)

2023-04-28 Thread Steffen Nurpmeso
gnupg-users@gnupg.org wrote in
 <20230428230349.429d3d3a@localhost>:
 |Johan Wevers via Gnupg-users  wrote:
 |>On 2023-04-28 15:47, Werner Koch via Gnupg-users wrote:
 |>
 |>>   * gpg: New command --quick-add-adsk and other ADSK features.
 |>> [T6395, https://gnupg.org/blog/20230321-adsk.html]  
 |>
 |>So you finally caved in to the backdoor demands.
 |
 |If there is no option as you say, i would say yes.
 |
 |>What I'm missing (maybe I just didn't found it?) is an option in my
 |>config file to ignore adk requests and just don't encrypt to those keys
 |>as well when I send or reply a message.
 |
 |ACK, absolutely necessary. Otherwise GnuPG would no longer be a
 |trustworthy encryption solution.

And Patrice Lumumba was thrown into a pit of slaked lime.
(After being beaten to death with rifle butts on the flight from
western to eastern Kongo, as far as i know.  But wild times still
under colonial money mighty.  (Afaik.))

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)
|~~
|..and in spring, hear David Leonard sing..
|
|The black bear,  The black bear,
|blithely holds his own   holds himself at leisure
|beating it, up and down  tossing over his ups and downs with pleasure
|~~
|Farewell, dear collar bear

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's (was: [Announce] GnuPG 2.4.1 released)

2023-04-28 Thread mlnl via Gnupg-users
Hi Johan,

Johan Wevers via Gnupg-users  wrote:

>On 2023-04-28 15:47, Werner Koch via Gnupg-users wrote:
>
>>   * gpg: New command --quick-add-adsk and other ADSK features.
>> [T6395, https://gnupg.org/blog/20230321-adsk.html]  
>
>So you finally caved in to the backdoor demands.

If there is no option as you say, i would say yes.

>What I'm missing (maybe I just didn't found it?) is an option in my
>config file to ignore adk requests and just don't encrypt to those keys
>as well when I send or reply a message.

ACK, absolutely necessary. Otherwise GnuPG would no longer be a
trustworthy encryption solution.

-- 
mlnl

GPG:1FC05426F87FA623

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users