Automatic key verification / CERT in DNS / RFC4398
Werner Koch
wk at gnupg.org
Thu Apr 6 12:44:39 CEST 2006
On Wed, 5 Apr 2006 20:03:46 -0500, Brad Knowles said:
> Keep in mind that relatively few people use any kind of personal
> encryption at all, and most that do make use of S/MIME instead of PGP
> or GPG, because S/MIME is what is provided by default from Microsoft
The problem with S/MIME is that you can't create a usabable
certificate for yourself. You have to hand over a lot of money to
a more or less trustworthy CA with no real benefit. OpenPGP may be used
much easier in that respect.
Using PKA you may use self-signed certificates for S/MIME in the same
way as you use PGP keys. Yes, the security is limited by the DNS but
well, that is a problem another group needs so solve ;-)
> So long as you stick to just one key for the entire domain, it
> doesn't matter if it's DKIM or PGP. It still has some greatly
> increased CPU requirements (because every single message passing
> through the server will now have to be cryptographically signed,
> which will increase the CPU server load by many orders of magnitude
> per message), but at least it has the possibility of being scalable
I doubt that signing a message puts more load on a server than all the
spam filtering and virus scanning in use today.
DKIM and other methods are also quite computing intensive.
> We did try this technique before -- it was called pgpsendmail,
> and it cryptographically signed every message passing through the
> system. It didn't work very well, and few people ended up using it.
Because the key distribution and validation of the keys was not solved.
> Doing client-side signing and verification is definitely
> scalable, but is difficult to get jump-started.
Thus start with server-side signing using one key per domain.
> I don't think that's likely to happen any time soon. The
> solutions which are easy to implement are non-scalable, and the
> scalable solutions are much more difficult to implement.
DNSSEC does not scale? Okay, then DNS will eventually be useless.
DNS-CERT does not scale? The I* types will help to offload the keys.
PKA on a per user base does not scale? Well, this might be a problem
with millions of users per domain. I don't know for sure but I doubt
that, say, 64 extra bytes of user data makes any difference to these
providers.
Salam-Shalom,
Werner
More information about the Gnupg-devel
mailing list