On 29/10/2007, Erik Abele <[EMAIL PROTECTED]> wrote:
> On 29.10.2007, at 03:13, Niclas Hedhman wrote:
>
> > On Sunday 28 October 2007 23:15, Erik Abele wrote:
> >> As BenL always says: "I don't give a shit about some random document,
> >> that could be faked anyway. All I care about is the email address
> >> connected to the key I intend to sign - is it really the address of
> >> the person in question?".
> >
> > Ok, and if you don't know the individual in person, you put the
> > trust in
> > a "Driver's license" or similar... but doesn't really care how that
> > 'trust'
> > was established.
>
> There's a ton of interpretations and levels of trust out there; I
> suggest you consult Google for that.
>
> > I must be plain dumb, but I don't "get" why this provides any
> > comfort to
> > end-users, even if they manage to figure out what to do with
> > the .ASCs (I bet
> > a very small percentage do).
>
> Well, if you verify an ASF release it can show you two things:
>
> a) if the signature is good you know that the file has not been
> tampered with;
>    it's the same as when the release was originally cut by the RM
> b) if you can establish a trust path to the signer of the file then
> you can be
>    pretty sure that it's a legit release and not a faked one

Even if you can't establish a trust path, the PGP signature gives a
bit more assurance than a hash. The KEY file should be in SVN, so you
can ensure that the person that added the key to the KEY file was at
least a committer to SVN.

> Again, please see http://httpd.apache.org/dev/verification.html -
> especially the sections on "Checking Signatures" [a) above] and
> "Validating Authenticity of a Key" [b) above].
>
> Re small percentage: I doubt that most users even care; the majority
> probably won't even think about it :(
>
> > And that is why I am asking for better tooling.
>
> Ok, feel free to improve that :-)
>
> >> See also http://wiki.apache.org/apachecon/PgpKeySigning
> >
> > Ok, it shows half the picture; How to sign the keys are left out...
>
> See one of the billions of tutorials in Google, or simply "man
> gpg" (--sign-key or --edit-key).
>
> >>> as well as tooling support for verifications.
> >> http://httpd.apache.org/dev/verification.html
> >
> > Uhhhh, we probably have more than a million users. Do we expect
> > them all to
> > get a hook into the WOT ?? IMHO, there is something wrong with that
> > picture...
>
> The million users don't even care about all that - the ones who do
> will find a way to connect the dots or even get into the WOT (see
> examples provided by Robert).
>
> E.g. if I see that a release is signed by the key XYZ of S. Striker
> and I go and fetch that key from a public keyserver and take a look
> at the list of signatures, I'll find out that there a names like Roy
> T. Fielding, Jim Jagielski, and so on... now, when I compare the
> fingerprints and maybe also have a look at http://www.apache.org/dist/
> httpd/KEYS then I can be pretty sure that the release was made by an
> official member of the HTTPD PMC - that should be enough for Random
> Joe to feel comfortable...
>
> > Couldn't a simple; http://www.apache.org/verify where I put the ASC
> > file (and
> > the MD5 of download??) and get a "Authenticated" or not response be
> > done?? If
> > that is too hard to automate, I don't think we ever will see any
> > increase in
> > user awareness.
>
> http://people.apache.org/~henkp/cgi-bin/md5.cgi will verify the MD5
> for you - it doesn't really make sense to have the same for PGP
> signatures IMHO.
>
> > The process on the above page is beyond most users'
> > imagination.
>
> As said, they probably don't even care otherwise they would know...
>
> Cheers,
> Erik
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to