Re: Web of Trust (a revolution)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Monday 30 March 2009 12:47:49 Tim wrote:
> On Mon, 2009-03-30 at 11:23 +0100, Anne Wilson wrote:
> > If you examine my key you will see that it is signed by a number of
> > people who have properly verified that I am who I say I am.  This is
> > essential for the web of trust to work, but frankly it is not
> > understood by many people, and I've seen conversations where people
> > will sign anyone's key.  The whole web of trust falls apart when this
> > happens.
>
> Looking at your key, using the seahorse program, I can see nothing that
> gives me any indication that the signers have checked anything, only a
> list of names of who the signers are.  Not very helpful...  You'd have
> to use something else to see certification levels, e.g. command line
> tools.  Of course the indicator will only be that person X *says*
> they've checked you out.  There's nothing to enforce them being
> truthful.
>
Exactly.  In this case there were all the appropriate checks, but all you can 
see is a list of names, and I suppose you can check that those names are ones 
you have reason to trust, but that's all, and it's a bit vague.  The person 
who signed the key had to produce their own key to sign it, and that key will 
also have signatures of people that have checked his identity, but it does 
depend entirely on the web of trust being respected, carried out to the 
letter.  Which was my point.

> As you say, some will sign anything willy nilly.  The web of trust is
> really only useful with people that you actually know.  You can't make
> any assumptions just because a key is counter-signed.  A third party's
> referral is useless.  The only third party that you could trust would be
> some service that you know refuses to sign keys without adequate
> verification, assuming that there is one, and that you know of their
> reputation.
>
Absolutely.  It would help if the action of signing included some information 
about the act, such as whether it was carried out at a LUG, Conference, or 
some other organisation, so you could come to some decision about its 
reliability, but there is no such thing.  Consequently I am advocating, as you 
are, careful thought about how much credence to put on gpg- (or pgp-) signing.

Anne
-- 
New to KDE4? - get help from http://userbase.kde.org
Just found a cool new feature?  Add it to UserBase

Attachment: signature.asc
Description: This is a digitally signed message part.

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux