Certs by a revoked key
David Shaw
dshaw@jabberwocky.com
Tue Feb 25 18:21:01 2003
--9jxsPFA5p3P2qPhR
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
On Tue, Feb 25, 2003 at 10:46:54AM +0100, Adrian 'Dagurashibanipal' von Bidder wrote:
> I imagined the situation where the victim already has a soft-revoked
> key, which is then compromised. For an attacker, it could be easier to
> just not let the victim get at the additional 'compromised' revocation
> cert than to modify her local key ring and remove the soft revocation -
> and it does the job, which is to lead the victim into trusting too many
> signatures. (Yes, I didn't spell this out too clearly in my original
> mail).
Ah, I understand now. Yes, this is true, but is it different from the
current problem where an attacker can prevent the victim from getting
at any revocation? That is, use the same example as you gave, but
just remove the soft revocation from the equation.
> Interesting debate you and Richard have going!
Indeed. For me, discussions are half the fun in working on GnuPG.
The fact that Richard and I mostly agree doesn't hurt either..
David
--9jxsPFA5p3P2qPhR
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2rc1 (GNU/Linux)
Comment: http://www.jabberwocky.com/key.asc
iD8DBQE+W6Yw4mZch0nhy8kRApnXAKCKglZU9CcIIEvQ+on7+5RWlEquMgCgiNdD
RFYZ3RZ+nuBEywAIllX+lXQ=
=GXrz
-----END PGP SIGNATURE-----
--9jxsPFA5p3P2qPhR--