Ubuntu Fredericton Key Signing Meeting
Bob Jonkman
bjonkman at sobac.com
Sat Jan 5 03:09:05 UTC 2008
This is what Joel Goguen <jgoguen at jgoguen.ca> said
about "Ubuntu Fredericton Key Signing Meeting" on 4 Jan 2008 at 21:03
> Please ensure that you bring a government-issued
> photo ID
Please forgive me for being pedantic for a few moments...
Government-issued ID isn't necessary for a key-signing, and some would even say it's
undesireable.
The purpose of key-signing is to establish a web of trust, independent of a hierarchical
Certificate Authority. By requiring government-issued ID you're essentially making the
government into a Certificate Authority at the top of the hierarchy.
Allowing government-issued ID to substitute for your actual knowledge of the identity of the
person holding the key you're signing makes the government a proxy for your trust. By
signing a key based on government ID you're saying "I believe this key belongs to the person
the government trusts to be Bob Jonkman" or "I believe this key belongs to a person who is
licensed to drive a car" rather than "I believe this key belongs to Bob Jonkman".
There are MANY keysigning "Howto" pages on the Internet that make the same mistake.
Trust should be based on personal knowledge that the key you're signing is associated with
the person who holds the key. Note that the actual name of the person isn't really important
-- pseudonymous keys still allow secure and non-repudiable transactions. By signing a
pseudonymous key you're verifying that the person you met is the person who signed today's e-
mail and is the same person who signed yesterday's e-mail.
Pseudonymous keys are also used for corporate keys that are not tied to a particular person,
or keys that are associated with a process or an event. The Toronto Cypherpunks used to
create a new key for every keysigning party, which was used to sign the keys of the
participants. That would provide evidence that a key was signed at a particular party.
Participants also signed the keyparty key, completing the web of trust. See
http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x44CE7F46 for an example.
A keysigning party that doesn't depend on third-party ID does require a good bit of
preparation:
1. All participants submit their public keys to the party organizer.
2. The party organizer gathers the submitted keys into a party keyring and publicly posts
it.[1]
3. All participants download the party keyring and print it out, complete with key
fingerprints.
4. All participants print copies of their own signed public keys, with fingerprints (and
optionally, a picture and/or signature) [2]
5. At the party the participants distribute their printed keys to the other participants. [3]
6. Back at home, each participant compares the distributed key fingerprints from other
participants with those on the party keyring.
7. Participants import verified keys into their own keyrings and sign them.
8. Participants upload signed keys to a keyserver.
9. When all participants have uploaded their keys, they download the same keys to gather all
the signatures from the keyparty.
[1] The party organizer can create a new party key and add it to the keyring. The party key
becomes just another participant. When all keys have been signed the party key is revoked,
providing one-time proof of attendance at this particular keysigning party.
[2] I initial each of my printed keys right through the text of the fingerprint. This
provides proof to me if someone asks me if a particular printout is mine.
[3] Optionally, the key fingerprints can be read aloud from the printed party keyring, and
each participant acknowledges that his key has been read correctly. This establishes a
"meatspace" identity for each key. Optionally, another participant can vouch for the
identity of the key owner. That's how the Web of Trust works...
This is mostly well described at http://www3.ietf.org/proceedings/05aug/PGPKeySigning.txt
OK, enough of this. Pendantry off. Thank you for your indulgence.
-- -- -- --
Bob Jonkman <bjonkman at sobac.com> http://sobac.com/sobac/
SOBAC Microcomputer Services Voice: +1-519-669-0388
6 James Street, Elmira ON Canada N3B 1L5 Cel: +1-519-635-9413
Networking -- Office & Business Automation -- Consulting
More information about the ubuntu-ca
mailing list