SKS Keyserver Network Under Attack
Konstantin Ryabitsev
konstantin at linuxfoundation.org
Sun Jun 30 18:54:57 CEST 2019
On Sun, Jun 30, 2019 at 03:49:55AM -0700, Mirimir via Gnupg-users wrote:
>> c) what happens when they go after more certificates?
>>
>> If you're willing to blackhole two certs, great. Where does it stop?
>> How many certs can the strong set stand to lose?
>
>Your third point is actually why I suggested this. Maybe I'm just
>twisted, but what if some dickhead goes after certs that would break
>stuff for millions of people? One might, for example, block Linux kernel
>maintenance and development. Maybe just before using some 0-day.
I highly doubt this would be effective, mainly because I don't think
anyone on the kernel development side of things runs keyring refreshes
in any routine fashion -- if ever. For those relying on PGP to verify
downloaded releases, we provide WKD lookups
(https://www.kernel.org/signature.html).
This whole thing *will* probably push me towards setting up a Hagrid
instance, especially if we can teach it to compare submissions against
an allow-list. Not sure what I'm going to do about the whole "web of
trust" side of things, though. I *really* don't like the idea of setting
up any kind of certification/trust authority.
-K
More information about the Gnupg-users
mailing list