What can I expect at a Key Signing party?
Jean-David Beyer
jdbeyer@exit109.com
Sun Oct 14 20:56:01 2001
mike ledoux wrote (in part):
> On Sun, 14 Oct 2001, Jean-David Beyer wrote (in part):
>
> >If I want to get people to sign my public key, it seems that the best
> >way would be to go to a Key Signing party. What do I bring? What do I
> >get back.
>
[snip]
> What to bring:
>
> Photo-ID (passport, drivers licence, etc.). Too much ID is better
> than too little, especially if your ID pictures are bad like mine.
>
> Several copies of the output of 'gpg --fingerprint your_key_id'.
> One copy for each person expected at the party, plus a few extras.
>
> Information on how to get your public key. Usually the best
> way is to put it on one of the public keyservers (pgp.mit.edu
> is a good one), and let people know where they can get it.
> Floppy disks are bad--do you know what type of computer each
> person at the party uses? Are they likely to trust you to not
> have some sort of virus on the floppy?
>
> *NO COMPUTER*. It is always a bad idea to use your private key
> on someone elses hardware (can you sure they don't have key/disk
> loggers?), so having a computer at the party gains you nothing,
> and loses quite a bit.
I could not imagine bringing a floppy with my private key anywhere
(other than to my safe deposit box) unless it were someone that I REALLY
TRUSTED; i.e., perhaps one of my sisters. (But since she runs Windows,
while I trust her, I might not trust her machine.)
>
> The procedure I've used in the past is something like:
>
> Everyone receives a copy of everyone elses 'gpg --fingerprint'
> output, then verifies that the name on the paper matches the
> provided identification, and that the identification is sufficient
> to identify the person. After everyone has verified
> identification, each individual reads off their name, keyid,
> and fingerprint, to catch any errors.
If you examine a person's ID and compare it with his printed 'gpg
--fingerprint' and perhaps sign that with a pen, why is it necessary to
read off names, keyids, and fingerprints? What errors would be caught?
>
> Everyone leaves the party with a bunch of keyid/fingerprint
> combos that they've verified the names on.
>
> After the party, everyone goes home and signs keys according to
> their personal signing policy (everyone has one, but few think about
> it that way). It is very much a matter of personal preference which
> keys you sign.
What does signing (as contrasted to trusting) mean? It seemed to me that
signing implies that you are convinced the public key whose fingerprint
you have really and truely belongs to the person whose ID you have
checked. I do see a problem here that I do not know how to solve: I know
the person who handed me the slip of paper with the gpg fingerprint on
it is the one whose name is on the passport (or whatever it was) because
the pictures match, say. It is likely, but not certain that the
<ABUser@isp.com> is truely that of the guy on the passport because it
says
Anthony Brian User on the passport. So it might really be his. But it
might just as well belong to Albert Barnaby User and Anthony Brian is
trying to hijack his signature. Perhaps nothing can be done about this.
Now if I personally knew Anthony, perhaps I could be sure that he would
not be creating a signing key to impersonate someone else, but at a Key
Signing, it is quite likely that I know none of the other people.
>
> If you want *my* signature on your key, we will have to exchange
> encrypted mail using each email address you want signed, so I can
> verify that the Jean-David Beyer I met actually receives mail at the
> address jdbeyer@exit109.com.
So let us say I meet you at a Key Signing and hand you a slip of paper
that says:
GnuPG and PGP key information for Jean-David Beyer.
pub 1024D/9A2FC99A 2001-09-22 Jean-David Beyer (Institute for
Regimented Whimsey) <jdbeyer@jdbeyer.exit109.com>
Fingerprint: CC3C 3A4D D593 3491 DA41 8FE9 3EDB B65E 9A2F
C99A
The public key for this can be obtained at the following sites,
among others:
http://www.keyserver.net/en/
http://pgpkeys.mit.edu:11371/
http://www.isternet.sk/pgp/
http://certserver.pgp.com/index.html
and perhaps you hand me a similar slip of paper.
Now if I send you an encrypted e-mail using the public I got for you by
looking up mwl+gnupg@alumni.unh.edu on a keyserver, someone will get it;
presumably you, and only you should be able to read it. Is what protects
you from erroneously signing my public key the fact that the email came
to you from jdbeyer@jdbeyer.exit109.com? Certainly the fact that I have
your public key gives you no assurance. Can you really trust the From:
or Return Path: headers? I guess a man in the middle would not be
expected to do this on the off-chance of catching this exchange. Is the
unlikelyhood of this sufficient to induce you to sign my key?
And symmetricly if you want me to sign yours, of course.
>
> Once you've signed someone's public key, it is good form to email them
> an ASCII-armored copy with your signature so they can distribute it
> as they wish. It is considered bad form to push someone else's key to
> the keyservers.
It would seem the polite thing to do. I thought it was not possible to
update someone's public key other than your own. I am new at this and
could be wrong about this.
>
> >So how are these issues usually handled?
>
> Every group does it differently, but the procedure describe above has
> worked well for me in the past.
>
Thanks.
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ Registered Machine 73926.
/( )\ Shrewsbury, New Jersey http://counter.li.org
^^-^^ 2:20pm up 24 days, 21:15, 3 users, load average: 3.08, 3.06, 3.00