What can I expect at a Key Signing party?

Ingo Klöcker ingo.kloecker@epost.de
Mon Oct 15 01:05:02 2001


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Sunday 14 October 2001 20:54, Jean-David Beyer wrote:

> Now if I send you an encrypted e-mail using the public I got for you
> by looking up mwl+gnupg@alumni.unh.edu on a keyserver, someone will
> get it; presumably you, and only you should be able to read it. Is
> what protects you from erroneously signing my public key the fact
> that the email came to you from jdbeyer@jdbeyer.exit109.com?
> Certainly the fact that I have your public key gives you no
> assurance. Can you really trust the From: or Return Path: headers? I
> guess a man in the middle would not be expected to do this on the
> off-chance of catching this exchange. Is the unlikelyhood of this
> sufficient to induce you to sign my key?
You don't have to trust From: and/or Return Path: headers. What you do is you send an encrypted message which contains some random text (the challenge) to each of the email addresses on the public key. Of course for each address you have to choose a different random text. Whoever receives those messages will only be able to decrypt the random text if he is in possession of the private key which corresponds to the public key you used to encrypt the messages. The key owner will now send back the random text(s) (of course signed with his key) to you. Then you compare the random text(s) you sent the person and the random text(s) in the replies. If they all match then you know that the person who's key you are about to sign has access to all the email addresses you sent a challenging message to. Of course he could have intercepted the messages somehow between you and the intended recipient. But that's very unlikely. Regards, Ingo -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE7yhopGnR+RTDgudgRAlp5AKDIL7/9vFRVkvN4dHpMF6Fa/x+7owCdHPuq K9MnQS4JzVoMP11Qcb+VErM= =0uMn -----END PGP SIGNATURE-----