List Archive: gentoo-dev
Note: Due to technical difficulties, the Archives are currently not up to date.
provides an alternative service for most mailing lists.c.f. bug 424647
I was trying to point out the fact that any system relies on trust and
to device a sensible system we have to pick a few things to trust.
You have to trust the interface with witch you perform the signing.
How much effort that is required to trust a component should be
I believe that there are some human elements that can be 'fixed'. Some
room for human errors can be removed if it would be impossible for the
keeper of the master key to extract the private key from the signing
tool, even if he/she wanted to.
On Tue, 2004-03-30 at 02:03, Joshua Brindle wrote:
> This thread is getting way 'out there'. Noone ever said that GPG signing
> is the end-all in security, noone ever said that it's the perfect method
> of protection, what we did say is that it's *alot* better than what we
> have now.
> I wish that people would stop coming up with obscure holes in the
> signing model, there is no way around them but this is a far greater
> amount of protection than we have now.
> The key to security is layers, we implement as many layers of security
> as possible to prevent compromises but there is obviously a huge human
> element that we can't 'fix'. The obscure ways of defeating the model
> should not stop us from implementing it, and it won't so lets try to
> keep our eyes on the goal and not get drawn off by non-productive
> Joshua Brindle
> John Nilsson wrote:
> > You have to trust the device that you interface with in any case. If the
> > computer is compromised, how do you know that the message you pipe
> > through for signing is the same as on the screen?
> > -John
> > On Mon, 2004-03-29 at 10:47, Paul de Vrieze wrote:
> > On Sunday 28 March 2004 18:39, Sami Näätänen wrote:
> >>To do what?
> >>The master key will not be present there.
> >>And if you don't provide those keys that are in the card the keys you
> >>make with the trojaned machine can't be validated with the master
> >>public key.
> > That would only work if the external device actually performs the
> > singing. Not when the key itself is readable by the computer the device
> > is inserted in. I don't know if it would be possible to acquire such a
> > device allthough they probably exist.
> > Paul
> email@example.com mailing list
signature.asc (This is a digitally signed message part)