ietf-openpgp
[Top] [All Lists]

Re: [openpgp] Web Key Directory I-D -07

2018-11-15 03:17:10
Hi,

Thus if presented with a new address test+foo(_at_)spodhuis(_dot_)org and 
needing
to get a key for it, with Bart's proposal, the MUA and the OpenPGP
client software can make no assumptions.  It must not normalize anything
to the left of the '@' sign.  But the MUA can use WKD and get back a key
for <test(_at_)spodhuis(_dot_)org>; the software can then record a mapping of
test+foo(_at_)spodhuis(_dot_)org -> test(_at_)spodhuis(_dot_)org in OpenPGP 
recipient key
selection preferences.  When later sending email to
test+foo(_at_)spodhuis(_dot_)org, the SMTP transaction proceeds unmodified: 
the MUA
does not rewrite the recipient, you have to preserve the address
as-given.  The remapped OpenPGP key selection proceeds as suggested
though.  If sending email to test+bar(_at_)spodhuis(_dot_)org then another 
WKD
lookup needs to be made.  (Future work might look at protocols for
indicating patterns to avoid repeated lookups).
I'm probably confused, but is this implying that WKD would insert a new
"lookup" operation such that a compromised WKD could cause me to encrypt a
message to an attacker-controlled key (with different UID) when I am trying
to encrypt to a non-attacker peer?
As far as i understand the compromised WKD could easily send you
an attacker controlled key with a valid UID as well.

Why would the different UID make the attack any worse?

Cheers,
 Azul

_______________________________________________
openpgp mailing list
openpgp(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/openpgp