Using signing in a group environment
Evan Prodromou
evan@prodromou.san-francisco.ca.us
Thu May 17 22:06:01 2001
>>>>> "MHW" == Mark H Wood <mwood@IUPUI.Edu> writes:
>> I would like to create a secret key for our group here at work
>> so that we can send out signed email. What would be the best
>> way of doing this so that when a group member leaves, they
>> would not be able to continue to send signed email?
MHW> Well, unless there is some compelling reason to share a
MHW> single key, the *best* way is to give each member a separate
MHW> key. If a member leaves, he can continue to send signed
MHW> email, but since you know it is from a nonmember (the
MHW> signature *proves* that) you can ignore it. If this is not
MHW> sufficient, explaining your need more thoroughly may elicit a
MHW> better answer.
One use for group-signed stuff is, say, for a technical support
team. If a number of people answer the email for support@your.company,
it'd be a good policy to have the same address on all their outgoing
mail.
One way to do this is to have each tech support person have their own
key. Like, Alice and Bob both have keys, like this:
Alice <alice@your.company>
Your Company Support Technician <support@your.company>
Bob <bob@your.company>
Your Company Support Technician <support@your.company>
Each key also has an extra ID for the support email. Note that
although the IDs are the same, the keys are still different.
Finally, there could be a master root key used to identify the
organization. It'd be used to sign each of the technician IDs:
Alice <alice@your.company>
Your Company Support Technician <support@your.company>
SIG: Your Company Tech Support Team <team@your.company>
Bob <bob@your.company>
Your Company Support Technician <support@your.company>
SIG: Your Company Tech Support Team <team@your.company>
This is a way of saying, "Our company certifies Bob as a technical
support rep. If you get email from support@your.company, and it's
signed with Bob's key, well, that's a real support email."
It's EXTREMELY important to protect this master root key, and keep it
in the hands of a very responsible person. [As a side note, while
there are a lot of docs on the Web on how to manage a personal key, I
haven't seen a lot on how to deal with a root key, especially for
sensitive stuff. Links, anyone?]
If Alice leaves the company, the company could revoke the signature on
her support@your.company ID:
Alice <alice@your.company>
Your Company Support Technician <support@your.company>
REV: Your Company Tech Support Team <team@your.company>
Revoked signatures mean, "Our company no longer certifies Alice as a
support rep. If you get mail from her, with that as her signature,
don't come running to us." The revokation would need to be published
to a number of key servers to be useful.
All that said, this is a pretty sophisticated set up. Unless you're
doing support for, say, PGP B-) or some other product with a fairly
fanatical cryptophreak clientele, I can't see it being much use. Most
people don't check email signatures, keep keyrings up to date, or,
frankly, even know that From: lines can be spoofed.
One more thing: this setup would preclude having customers SEND
encrypted email to the support@your.company address, since it would
be encrypted to any of a number of public keys with the same email
address. But if outbound signing is the important part, and not
inbound encryption, I think the above scheme would work.
~ESP
--
Evan Prodromou
evan@prodromou.san-francisco.ca.us