-
Notifications
You must be signed in to change notification settings - Fork 4
second round of feedback #1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Neither replace nor augment actually since Web of Trust is worthless. More To the extent that WoT is a software feature rather than a social convention it |
Yes, this is the way revocation is implemented by default. Identity Certificates fall off I've also considered requiring a new email verification every N (ie N = 6) months. |
Distribute which keys from what domains and web servers? Does your suggestion |
The scope is really only Email right now, but the same call-back verification strategy |
There are two ways to think about this:
Currently, nobody does much of anything to validate email addresses in PGP keys. That includes the keeners who willingly show up at a 'party' where there is You want me to state a threat model? Ok. Your postman's name is Mallory and he I can't prevent this, but I can prevent Mallory from succeeding without However, If Mallory is a weaker attacker than the system administrator of your |
The due dilligence on certificates and MX records stops those attackers in as |
The email verification service could retrieve SMTP server certificates the first |
I can't make every (or any) mail provider implement DNSSEC + DANE but of course |
Because it will leak all user addresses and because it's redundant. If the CT needs to exist because any CA can silently issue a certificate for any domain CT prevents that silent creation of a malicious certificate because if a certificate |
Multiple UIDs exist as before, but for the verification protocol any extra UIDs are
More like you send an API message to the nyms service for example.com which says: "Hi, I'm user@example.com, here is my password for you to verify using the example.com
From the user point of view, they don't have to do anything. They enter their username and
Only thing that needs to be hand-rolled is integration between provider verification service |
Nope, you can use your existing gpg key with a dozen email addresses on it. The nyms client |
That's a good question, I was imagining a validly signed certificate chain changing to another validly Really though, any change at all needs to be investigated. |
Yes, you can even do it from the command line with GPG I think, but we're not using GPG we're using Notations are just key=value pairs that can be added to any signature.
Yes, this is in fact a key concept in the nyms system. It's very common to want pseudonymous --> pseudonyms --> nyms How did you decide you wanted to talk to them in the first place? They might be an IRC nick, and/or
This is what Key Segmentation is for. If somebody looks up nymsuser@gmail.com they get your email key but by default they don't find out about your IM account nymsuser@jabber.com. but if they already know nymsuser@gmail.com and nymsuser@jabber.com they can download records for both UIDs and verify that they belong to the same master signing key. If @nymsuser sends a DM to somebody else on twitter and tells them to send encrypted mail to nymsuser@gmail.com that person is now able to confirm that the email address is the correct one and that they have the right keys to encrypt mail. |
Similar to how Tor solves the same problem:
|
The clients automatically refresh keys and detect unexpected changes. This includes users
Yes, the only interpretation that make sense here. It's signatures that expire, not
Yes, but where to store it? One idea I've considered is escrow revocations on the directory but if mallory steals a revocation, he'll use it to cancel your keys and replace them. shrug |
It doesn't have the unrealistic expectation that email providers find a way to publish user Nyms has no expectations at all of email providers. |
|
Hi, I've reviewed your comments based on your review of my text and commented on your comments. In order to make this as confusing as possible, I've failed to include a reasonable amount of helpful context. |
directories should use HTTPS, but I would really like to avoid DNSSEC:
|
Postfix actually has some nice options for this. You can make postfix require actual DANE validation if the DNS records exist (and fail closed if validation fails), but fall back to normal StartTLS if there are no DANE records. This is what we are doing with LEAP. The next improvement we want to work on is to make the use of DANE a permanent requirement for a particular provider if they have ever published DANE records in the past. |
A public CT-style append only log published by the endorsers would be an addition with some benefit, one that can be added later. But not that much benefit. An append only log does not necessarily need to leak user addresses, as the log could consist of the hash of the address and not the address itself. An append only log is not redundant. Yes, your client will see the bogus key when it polls for your own key, but this has problems:
The problem, however, with an append only log is that it probably adds more complexity to the system than is worthwhile given the potential benefits. It would probably add more security with less effort to add a system of "endorser consensus" instead. |
If it turns out that DNSSEC has some value to Nyms then we'll take advantage of it but Nyms cannot generally depend on DANE or DNSSEC because then it becomes unusable by users of mail providers which don't publish certificates with DANE. I admit I may not be up to date on status of DNSSEC deployment, but as I understand it the number of email providers which haven't implemented DANE yet is all of them. |
I've reviewed the text and added a bunch of comments, etc.