Robot CA at toehold.com
Per Tunedal
pt@radvis.nu
Fri Dec 6 12:55:10 2002
At 16:03 2002-12-05 -0600, you wrote:
>This mail was signed (Inlined PGP-Message).
>
>,-----GnuPG output follows (current time: Fri, Dec 06 2002 - 09:09:51)--
>|
>| Signerades 12/05/02 23:03:00 med hj=F5lp av DSA-nyckeln med ID=
2A94C484
>| Korrekt signatur fr=D5n "Kyle Hasselbacher <kyle@toehold.com>"
>|
>`----------------------------------------------------BEGIN PGP SIGNED
>MESSAGE-----
>Hash: SHA1
>
>On Thu, Dec 05, 2002 at 09:52:39PM +0100, Volker Gaibler wrote:
>>On Thu, Dec 05, 2002 at 11:43:12AM -0600, Kyle Hasselbacher wrote:
>>> bogus-but-signed key. Challenge/response systems have the same=
problem,
>>> however. In a sense, if the attacker can intercept the victim's=20
email, the
>>> verification is working--the attacker DOES have access to that email
>>> address, and that's all the robot is trying to find out. From the=
robot's
>>> point of view, there's no difference between this and two (or more)=
people
>>> who legitimately and knowingly share an email address.
>>
>>But why use encryption at all in that case? Slightly simplified:
>>If someone can read your unencrypted mail (sysadmin or somebody sniffing
>>network traffic) - and that's what you want to prevent - also can create
>>bogus-but-signed keys.
>
>That situation is made no worse by having non-working encryption.
>Hopefully the user gets a key working BEFORE people start sniffing. When=
a
>doppleganger shows up, hopefully people will notice. There's some=
optimism
>there, I know.
>
>Do you not bother to lock your bicycle when you know there are people with
>bolt cutters? Envelopes can be steamed open, but I still use them. What
>I'm proposing is "better than nothing". It is NOT absolute security. =
It's
>merely better than the (terrible) security that's there now. Knowing=
this,
>you're welcome not to use it. People who are none-the-wiser will get some
>benefit, perhaps without knowing it. If not, they're no worse off.
>
>I don't think I can prevent unsophisticated users from falling victim to
>sophisticated attackers. It's just a given. The determined attacker will
>get through this simple security.
>
>What I can do is stop the more casual attackers. If it's harder to get=
the
>opportunity to violate someone's privacy, it won't happen as often.
>- --
>Kyle Hasselbacher
I believe this would be a great improvement.
Per Tunedal