ietf-openpgp
[Top] [All Lists]

Re: updating status of keys in public key chain..?

1997-10-21 17:41:01
In 
<Pine(_dot_)GSO(_dot_)3(_dot_)96(_dot_)971021150617(_dot_)2672D-100000(_at_)log3>,
 on 10/21/97 
   at 02, robert(_dot_)guerra(_at_)utoronto(_dot_)ca said:


I have thought of an interesting issue which has to date not been
mentioned which is the following:

** Methods to check the status of public keys on one's public keychain.

Several weeks ago when I had to revoke several of my pgp keys I asked
myself if there was any way of notifying people who send me pgp messages
that my "public" key had been changed. 

The only answer I could think of was to email everyone and inform them.
However another method would be preferable. Ideally if the "public" keys
in one's keychain could be verified/updated with those in a particular
keyserver than one would know if a key is still valid.


ie.

1. (local) keychain with public keys A, B, C
2. Key A has been revoked and sent to keyserver
3. user performs (local) public key "refresh"
    a. public keys in local keychain are checked against keyserver
    b. existing keys are checked to see if valid
    c. existing keys if invalid -> "updated key" fetched

4. One now knows which locally held keys are "valid" (when compared vs.
keyserver)


I am curious as to why  this "verification" is not present in any of the
pgp implentations  to this date. Should it be in a future implementation?


I had mentioned on the PGP Keyserver list awhile back about storing hashes
of the PGP keys on the servers and making use of those for checking if
keys had been changed (Note: hash here refers to a hash of the entire key
including userid's & Signatures but not including trust packets).

client                                           server
------                                           ------

send KeyId/Hash request ------------------>
                        <-----------------        Return Hash hash diff?
yes. request key        ------------------>       
                        <-----------------        Send Key

Update Key                                                  
hash diff?
yes. post key           ------------------>



I had also proposed using a similar mechanism for processing keyring
updates:


server 1                                         server 2
--------                                         --------

send newkey list        ------------------>       
                                                  Compare hashes to DB
                        <-----------------        and request diffs

send keys               ------------------>
                                                  Update Keys
                                                  hash diff?
                        <-----------------        send diff list   request
diff keys       ------------------>

                        <-----------------        Send Keys

Also a periodic maintenance update would be performed where a complete DB
hashlist would be exchanged and key updates processed.

-- 
---------------------------------------------------------------
William H. Geiger III  http://www.amaranth.com/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html                 
       
---------------------------------------------------------------


<Prev in Thread] Current Thread [Next in Thread>