OpenPGP data in the CERT RR
Werner Koch
wk at gnupg.org
Wed Aug 7 10:51:01 CEST 2002
On Wed, 07 Aug 2002 02:09:10 +0200, Simon Josefsson said:
> Actually, wouldn't it make more sense to include a "preferred
> keyserver" option in the OpenPGP message instead? That would solve
> the same problem, and even work in non-email situations.
Both are required. The preferred keyserver field is required to get
updates of a key and a mail header to get the key in the first
instance, say you know someone from a ML but at some point you want to
send a an encrypted mail.
OTOH, using the preferred keyserver for revocation checking has a
security risk: If Alice believes her secret key has been compromised,
she creates a recocation certificate and puts it on her DNS server.
Meanwhile Mallory has changed the preferred keyserver of Alice's key
and distributed the modified key to a lot of sites; there is now a
risk that someone verifiying a message or sending one to Alice uses
the modified key and checks the bogus preferred keyserver where he
does not find a revocation.
We need a distributed and replicated network of keyservers to look up
revocations. Something like:
01.rvc.pgp.net. NS rvc-a.pgp.net.
02.rvc.pgp.net. NS rvc-b.pgp.net.
..
ff.rvc.pgp.net. NS rvc-d.pgp.net.
where the 2 digits are the last digits of the fingerprint and the
rvc-?.pgp.net servers then serve the query. Have several of these
networks and replicate them so a user can choose the most trustworthy
network.
Salam-Shalom,
Werner
More information about the Gnupg-devel
mailing list