searching for keys

kardan kardan at riseup.net
Sun Jul 14 09:46:31 CEST 2013


Hi,

On Sat, 13 Jul 2013 20:20:16 -0500 Larry Brower
<ivangrunt09 at gmail.com> wrote:

> http://keyserver.stack.nl also uses SSL. Is your main t that someone
> will see the keys you are looking for or retrieving?
> If this is the case then why not have them send them to you encrypted
> via email?

I worry about the general possibility to search keys without revealing
any metadata to the public. I think this is legitimate. If one sends
them to me encryptedly via email even better, but I need to have the
possibility to update them frequently to observe revocations and other
changes (best with low frequency via parcimonie). Or did you mean there
is a possibility to request keys via email from the key server? I never
heard of.

Am Sun, 14 Jul 2013 02:33:43 +0000
schrieb Henry Hertz Hobbit <hhhobbit at securemecca.net>:

> > [1] https://hkps.pool.sks-keyservers.net/
> > [2] http://keyserver.stack.nl  

> I question the legitimacy of the first in the first place since
> it doesn't even have a WHOIS record for either sks-keyservers.net
> or hkps.pool.sks-keyservers.net 

Thanks for the inspection! From my limited view I can not say what
makes a keyserver legitmate. This is what whois says for me

   Domain Name: SKS-KEYSERVERS.NET
   Registrar: PDR LTD. D/B/A PUBLICDOMAINREGISTRY.COM
   Whois Server: whois.PublicDomainRegistry.com
   Referral URL: http://www.PublicDomainRegistry.com
   Name Server: NS1.KFWEBS.NET
   Name Server: NS10.SKS-KEYSERVERS.NET
   Name Server: NS11.SKS-KEYSERVERS.NET
   Name Server: NS12.SKS-KEYSERVERS.NET
   Name Server: NS13.SKS-KEYSERVERS.NET
   Name Server: NS6.SKS-KEYSERVERS.NET
   Status: clientTransferProhibited
   Updated Date: 17-feb-2013
   Creation Date: 01-dec-2006
   Expiration Date: 01-dec-2015


Searching for the owner via gpg brings different results without
success. I assume the pool is not that well mantained?

$ gpg --search
kf at kfwebs.net gpg: suche nach "kf at kfwebs.net" auf hkps-Server
pool.sks-keyservers.net gpgkeys: HTTP search error 51:
gnutls_handshake() warning: The server name sent was not recognized

$ gpg --verbose --keyserver-options=debug --search kf at kfwebs.net
gpg: searching for "kf at kfwebs.net" from hkps server
pool.sks-keyservers.net gpgkeys: curl version = libcurl/7.31.0
GnuTLS/2.12.23 zlib/1.2.8 libidn/1.25 libssh2/1.4.3 librtmp/2.3
gpgkeys: search type is 0, and key is "kf at kfwebs.net"
* About to connect() to pool.sks-keyservers.net port 443 (#0)
*   Trying 192.0.224.138...
* Adding handle: conn: 0x984de90
* Adding handle: send: 0
* Adding handle: recv: 0
* Curl_addHandleToPipeline: length: 1
* - Conn 0 (0x984de90) send_pipe: 1, recv_pipe: 0
* Connection refused
*   Trying 192.95.24.133...
* Connection refused
*   Trying 198.82.169.69...
* Connected to pool.sks-keyservers.net (198.82.169.69) port 443 (#0)
* found 1 certificates
in /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem
* server certificate verification failed.
CAfile: /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem CRLfile: none
* Closing connection 0
gpgkeys: HTTP search error 60: server certificate verification failed.
CAfile: /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem CRLfile: none
gpg: key "kf at kfwebs.net" not found on keyserver gpg: keyserver internal
error gpg: keyserver search failed: keyserver error

$ gpg --verbose --keyserver-options=debug --search kf at kfwebs.net
* About to connect() to pool.sks-keyservers.net port 443 (#0)
*   Trying 173.175.198.28...
...
gpg: keyserver timed out
gpg: keyserver search failed: keyserver error

*   Trying 91.121.176.163...
...
* server certificate verification failed.
  CAfile: /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem CRLfile: none

*   Trying 88.198.24.12...
...
* server certificate verification failed.
  CAfile: /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem CRLfile: none

*   Trying 87.106.189.5...
...
* server certificate verification failed.
  CAfile: /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem CRLfile: none

*   Trying 80.90.43.162...
* server certificate verification failed.
  CAfile: /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem CRLfile: none

*   Trying 80.241.60.3...
* Adding handle: conn: 0x89cee90
* Adding handle: send: 0
* Adding handle: recv: 0
* Curl_addHandleToPipeline: length: 1
* - Conn 0 (0x89cee90) send_pipe: 1, recv_pipe: 0
* Connected to pool.sks-keyservers.net (80.241.60.3) port 443 (#0)
* found 1 certificates
  in /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem
* gnutls_handshake() warning: The server name sent was not recognized

*   Trying 66.114.139.158...
* Adding handle: conn: 0x90efe90
* Adding handle: send: 0
* Adding handle: recv: 0
* Curl_addHandleToPipeline: length: 1
* - Conn 0 (0x90efe90) send_pipe: 1, recv_pipe: 0
* Connected to pool.sks-keyservers.net (66.114.139.158) port 443 (#0)
* found 1 certificates
  in /etc/ssl/certs/hkps.pool.sks-keyservers.net.pem
* gnutls_handshake() failed: An unexpected TLS packet was received.


> and the browser warns that the
> certificate may not be legitimate.  Since I worked with lots of
> malware, this would lead me to believe I was well into the red
> zone.

Interesting, what are scenarios for a "bad" keyservers beneath
sending me wrong keys? The pool is maintained by Kristian Fiskerstrand
(kfwebs.net) who publishes about PGP/gpg quite a while and see no
reason to not trust him. I took the link from the mentioned gpg howto
by Daniel Kahn Gilmore:

https://we.riseup.net/riseuplabs+paow/openpgp-best-practices
> Don’t use pgp.mit.edu
> 
> pgp.mit.edu as a keyserver has been broken for years, especially with
> certain types of key updates. For a long time subkey updates, key
> expiration changes, revocations and other important information that
> you may wish to communicate to others, they were dropping on the
> floor.
> 
> They changed their software somewhat recently to a better supported
> keyserver, but it is still broken in ways that make it so it isn’t
> getting updates.
> 
> [...]
> 
> consider making your default keyserver use a
> keyserver that provides HKPS transport
> 
> Instead of the default, unencrypted hkp, you can use hkps! This
> obscures your social relationship map from anyone who may be snooping
> on your traffic. If you do a gpg —refresh-keys on a keyserver that is
> hkp only, then someone snooping your traffic will see every single
> key you have in your key ring as you request any updates to them.
> That is pretty interesting information.
> 
> Note that, for debian/ubuntu users, you will need to install the
> gnupg-curl package to use hkps.
> 
> You can use hkps.pool.sks-keyservers.net as your default keyserver,
> this is a pool containing only servers available using hkps. This
> pool only include servers that have been certified by the
> sks-keyservers.net CA.

<snip>

> On the other hand if you
> live in the FSA, er, the USA and are searching for the keys
> of the human rights advocates sitting next to Edward Snowden
> recently I can understand the concern.  I am not trying to
> contact those human rights activists so I am not worrying
> about that. 

That is not my concern either, but data retention is quite aggressive
in europe as well. I just think it is a bad idea the reveal when I
search whose gpg first and when they are updated (see above). Speaking
of Snowden allow me one noteworthy quote from his yesterday's statement:

"This willingness by powerful states to act extra-legally represents a
threat to all of us, and must not be allowed to succeed."

Have a good day remembering those who don't!
Kardan



More information about the Gnupg-users mailing list