<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link xmlns:atom="http://www.w3.org/2005/Atom" rel="self" type="application/rss+xml" href="https://tanguy.ortolo.eu/blog/feed/rss/commentaires/" />
	<link>https://tanguy.ortolo.eu/blog/article9/pgp-signature-infos</link>
	<language>en</language>
	<description>a blog about Debian and self-hosting</description>
	<lastBuildDate>Fri, 14 Dec 2012 14:27:00 +0000</lastBuildDate>
	<generator>PluXml</generator>
	<item>
		<title>PGP signatures with trust and verification level - Written by derp @ friday 14 december 2012, 14:27</title> 
		<link>https://tanguy.ortolo.eu/blog/article9/pgp-signature-infos/#c1355495233-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article9/pgp-signature-infos/#c1355495233-1</guid>
		<description>additional info + domain explained: 
http://web.monkeysphere.info/doc/trust-models/</description>
		<pubDate>Fri, 14 Dec 2012 14:27:00 +0000</pubDate>
		<dc:creator>derp</dc:creator>
	</item>
	<item>
		<title>PGP signatures with trust and verification level - Written by Daniel Kahn Gillmor @ friday 27 may 2011, 05:23</title> 
		<link>https://tanguy.ortolo.eu/blog/article9/pgp-signature-infos/#c1306473831-1</link>
		<guid>https://tanguy.ortolo.eu/blog/article9/pgp-signature-infos/#c1306473831-1</guid>
		<description>I&amp;#039;m not convinced that adding more detail to your OpenPGP certifications is necessarily positive.  I tend to think that we should use the public WoT to establish a baseline of *identity*, and that making it more complex than that actually causes the public certifications to leak more information about personal relationships than we need it to.

I&amp;#039;ve never seen any tool make use of &amp;quot;Certification level&amp;quot; (and WoT inference is certainly confusing/complex enough without them) -- so adding that information is really only likely to give extra hints to people interested in mining your social relationships for data (they can focus more on your &amp;quot;extensive verification&amp;quot; certifications).

&amp;quot;Trust signatures&amp;quot; in certifications are potentially quite dangerous in several ways.  Indicating Trust level exposes you to some risk: An attacker who wants to convince you of a bogus key+identity needs to get that key certified by someone that you trust.  If you publish your entire trust set in your certifications) (ownertrust in gpg is by default a privately-held preference), you&amp;#039;re making that attacker&amp;#039;s job much easier.

Trust depth is troublesome because it extends that same risk to everyone who depends on you for certification; if you publish a trust depth of &amp;gt; 1, then everyone who is willing to accept certifications made by you is now vulnerable to an attack on any of the keys in question.  This is like an X.509 Certificate Authority granting blanket Certficate Authority status to a child CA.  They actually do this in the X.509 world, and it&amp;#039;s one of the many reasons that X.509 is problematic:

 https://www.eff.org/observatory

Domain-scoping of trust signatures are a mitigating factor -- you can say &amp;quot;i trust this Maria Sanchez to reliably certify any key with an associated e-mail address within the foo.example domain (i.e. ending with @foo.example)&amp;quot;.  This is useful because it means that you&amp;#039;re willing to accept Maria Sanchez has control over that domain, and can legitimately introduce you to anyone within it; but you don&amp;#039;t need to automatically believe her when she tries to introduce you to &amp;quot;Barack Obama &amp;lt;president@whitehouse.gov&amp;gt;&amp;quot;.  That said, almost no one uses domain-scoping, and the way it&amp;#039;s implemented (regex-filtering within a trust-sig) has some potentially dubious aspects.  Using a trust-sig within a non-exportable signature as a way to avoid setting blanket ownertrust is probably reasonable; that way you get the benefit of scoping without leaking the relationship info to the outside world.  But i don&amp;#039;t know many people who operate this way.

Here is a related post i made to gnupg-users recently pushing back against storing more relationship data in OpenPGP certifications:

http://lists.gnupg.org/pipermail/gnupg-users/2011-April/041523.html</description>
		<pubDate>Fri, 27 May 2011 05:23:00 +0000</pubDate>
		<dc:creator>Daniel Kahn Gillmor</dc:creator>
	</item>
		<title>Tanguy Ortolo - PGP signatures with trust and verification level - Comments</title> 
</channel>
</rss>