Mailing List Archive

Re: ADK's
On Fri, 28 Apr 2023 16:57, Johan Wevers said:

> So you finally caved in to the backdoor demands.

In business it is quite common to share subkeys with others. Thus the
ADSK makes it only more explicit and flexible. See the blog entry.

> What I'm missing (maybe I just didn't found it?) is an option in my
> config file to ignore adk requests and just don't encrypt to those keys

It does not make any sense so have such an option. If a user wants to
allow colleagues or an archive system to decrypt her mails that is her
decision.


Salam-Shalom,

Werner


--
The pioneers of a warless world are the youth that
refuse military service. - A. Einstein
Re: ADK's [ In reply to ]
On 2023-04-30 14:10, Werner Koch via Gnupg-users wrote:

> It does not make any sense so have such an option. If a user wants to
> allow colleagues or an archive system to decrypt her mails that is her
> decision.

What I've had in practice in one company: you got a company key with a
personal key and an adk added. Nothing to want from my part there. If I
want to mail someone at such a company I may just want to ignore the adk.

--
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
On 30 Apr 2023, at 13:45, Johan Wevers via Gnupg-users <gnupg-users@gnupg.org> wrote:
>
> ?On 2023-04-30 14:10, Werner Koch via Gnupg-users wrote:
>
>> It does not make any sense so have such an option. If a user wants to
>> allow colleagues or an archive system to decrypt her mails that is her
>> decision.
>
> What I've had in practice in one company: you got a company key with a
> personal key and an adk added. Nothing to want from my part there. If I
> want to mail someone at such a company I may just want to ignore the adk.

E2E encryption can’t protect you from your correspondent disclosing your communication at the other end. Whether this is done voluntarily or under duress from their employer is an opsec issue, not a comsec one. If you don’t want your correspondent’s employer reading your emails, don’t send messages to their work email address.

The danger of an “ignore ADK” option is that it gives a false sense of security. It is already possible for an employer to require escrow of the decryption subkeys of their employees - ADK actually makes this process more transparent.

A
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote:

> E2E encryption can’t protect you from your correspondent disclosing your communication at the other end.

That is obvious.

> Whether this is done voluntarily or under duress from their employer is an opsec issue, not a comsec one.

If it is an ex-employer that might be more compicated.

> The danger of an “ignore ADK” option is that it gives a false sense of security. It is already possible for an employer to require escrow of the decryption subkeys of their employees - ADK actually makes this process more transparent.

That might be, but it is nowhere certain that this escrow will happen,
especially if they roll out adk's. Not providing such an option might be
a case where the perfect is the enemy of the good: it might not be a
perfect solution but it can be better than the alternative.

Besides, this is begging for GnuPG forks to arise, and if those forks
are well implemented remains to be seen.

--
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
?On 30 Apr 2023, at 14:42, Johan Wevers via Gnupg-users <gnupg-users@gnupg.org> wrote:
>
> ?On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote:
>> Whether this is done voluntarily or under duress from their employer is an opsec issue, not a comsec one.
>
> If it is an ex-employer that might be more compicated.

Indeed. If this is in your threat model then don’t use work email addresses for personal communication, because encryption cannot protect you.

>> The danger of an “ignore ADK” option is that it gives a false sense of security. It is already possible for an employer to require escrow of the decryption subkeys of their employees - ADK actually makes this process more transparent.
>
> That might be, but it is nowhere certain that this escrow will happen,
> especially if they roll out adk's.

You’re inverting the burden of proof here. The important consideration is that E2E can’t prove that a key *wasn’t* escrowed - so it’s much better for the software to make no claims about it than potentially misleading ones.

A



_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
On 2023-04-30 16:54, Andrew Gallagher via Gnupg-users wrote:

>> That might be, but it is nowhere certain that this escrow will happen,
>> especially if they roll out adk's.
>
> You’re inverting the burden of proof here. The important consideration is that E2E can’t prove that a key *wasn’t* escrowed - so it’s much better for the software to make no claims about it than potentially misleading ones.

There is also no strict proof that the employer doesn't have access to
the personal key of the receiver.

All I want is an option to ignore adk's - and it should not claim
anything else than that.

--
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
On Sun, Apr 30, 2023 at 05:41:31PM +0200, Johan Wevers via Gnupg-users wrote:
>
> All I want is an option to ignore adk's - and it should not claim
> anything else than that.

Can't you remove ADK subkeys from your keyring?
Re: ADK's [ In reply to ]
There are 2 simple workarounds to employment ADK's :
[ 1 ]. Send a symmetrically encrypted message to the key with the
ADK(This will require an agreed upon symmetric passphrase communicated
in person, phone, or another non-ADK manner)
[ 2 ]. Generate a non-ADK key, not uploaded to any server and send
and receive messages with a hidden-ID option, and keep this key on a
separated keyring. This can be communicated symmetrically as in [ 1 ].

vedaal
Re: ADK's [ In reply to ]
On 2023-04-30 21:01, Ineiev via Gnupg-users wrote:

>> All I want is an option to ignore adk's - and it should not claim
>> anything else than that.
>
> Can't you remove ADK subkeys from your keyring?

On someone else's key?

--
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
Johan Wevers via Gnupg-users wrote:
> On 2023-04-30 14:58, Andrew Gallagher via Gnupg-users wrote:
>
> [...]
>
>> The danger of an “ignore ADK” option is that it gives a false sense of security. It is already possible for an employer to require escrow of the decryption subkeys of their employees - ADK actually makes this process more transparent.
>>
>
> That might be, but it is nowhere certain that this escrow will happen,
> especially if they roll out adk's. Not providing such an option might be
> a case where the perfect is the enemy of the good: it might not be a
> perfect solution but it can be better than the alternative.
>
> Besides, this is begging for GnuPG forks to arise, and if those forks
> are well implemented remains to be seen.

Maybe the best option here is an "--override-encryption-target
KEYGRIP/SUBKEYGRIP" option, repeatable to encrypt to multiple specific
subkeys of the same or different PGP keys, which is why it requires both
a keygrip and a subkeygrip. This would also allow encrypting to some
ADKs while ignoring others and resolve the demands for an "ignore ADK"
option.

ADKs seem particularly valuable to me as a solution to the "group inbox"
problem that avoids actually sharing private key material: simply
attach encryption subkeys for all recipients to the "group inbox"
certificate. This requires publishing new certificates when the
recipient list changes and discloses the recipient list to some extent,
but that is the trade-off for end-to-end security in this context.
Could a "--notify-ADK-encrypt" option that could be placed in the
configuration file be appropriate to address user concerns about
possible improper proliferation of ADKs? Should a notification that an
ADK was used actually be default? After all, there are legitimate uses
for ADKs, but an ADK turning up where not expected could be a strong
hint that you have a bogus certificate.

I would also note that, for a work email system in an environment where
there is a legal or quasi-legal requirement (not uncommon in finance) to
archive messages, simply dropping any incoming message not decryptable
with the archive ADK as spam would be reasonable. Since the primary
concern motivating message archival in this example is deterring insider
trading, simply not allowing unreadable messages to be delivered
accomplishes the same objective.


-- Jacob

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
Jacob Bachmeyer via Gnupg-users <gnupg-users@gnupg.org> wrote:
> ADKs seem particularly valuable to me as a solution to the "group inbox"
> problem that avoids actually sharing private key material: simply
> attach encryption subkeys for all recipients to the "group inbox"
> certificate. This requires publishing new certificates when the
> recipient list changes and discloses the recipient list to some extent, but
> that is the trade-off for end-to-end security in this context. Could a
> "--notify-ADK-encrypt" option that could be placed in the configuration file
> be appropriate to address user concerns about possible improper proliferation
> of ADKs? Should a notification that an ADK was used actually be default?
> After all, there are legitimate uses for ADKs, but an ADK turning up where
> not expected could be a strong hint that you have a bogus certificate.

That would be really useful for security@example.com

I'm unclear if this is a new feature (I think so), and if so what happens if
the sender hasn't upgraded yet?

> I would also note that, for a work email system in an environment where there
> is a legal or quasi-legal requirement (not uncommon in finance) to archive
> messages, simply dropping any incoming message not decryptable with the
> archive ADK as spam would be reasonable. Since the primary concern
> motivating message archival in this example is deterring insider trading,
> simply not allowing unreadable messages to be delivered accomplishes the same
> objective.

Yes, reasonable.
OTH, the emails investigating the insider trading by the HR people might need
to avoid the ADK.
Re: ADK's [ In reply to ]
Michael Richardson wrote:
> Jacob Bachmeyer via Gnupg-users <gnupg-users@gnupg.org> wrote:
> > ADKs seem particularly valuable to me as a solution to the "group inbox"
> > problem that avoids actually sharing private key material: simply
> > attach encryption subkeys for all recipients to the "group inbox"
> > certificate. This requires publishing new certificates when the
> > recipient list changes and discloses the recipient list to some extent, but
> > that is the trade-off for end-to-end security in this context. Could a
> > "--notify-ADK-encrypt" option that could be placed in the configuration file
> > be appropriate to address user concerns about possible improper proliferation
> > of ADKs? Should a notification that an ADK was used actually be default?
> > After all, there are legitimate uses for ADKs, but an ADK turning up where
> > not expected could be a strong hint that you have a bogus certificate.
>
> That would be really useful for security@example.com
>

That is an almost prototypical example. In that case, the "archive" key
would actually be the main subkey, and the list recipients' personal
keys would be attached as ADKs.

Another example: suppose I have multiple hardware tokens and wish to be
able to use them interchangeably, but also want maximal security with
this arrangement, so have generated an encryption keypair on each
token. I list all of the per-token subkeys as ADKs. In this case, the
ADKs really would all be /my/ keys. Again, I would have to publish a
new certificate every time my collection of live tokens changes, which
may or may not leak useful information to an adversary.

> I'm unclear if this is a new feature (I think so), and if so what happens if
> the sender hasn't upgraded yet?
>

My understanding: ADKs are new and do not work without support on the
sender's side. The ADK is a request to also encrypt any message to the
subkey to the ADK. If the sender's software does not understand that
request, it does not happen. If the sender rejects that request, either
by setting an option or by patching their software to ignore the
request, it does not happen.

My primary reason for arguing to support some way to suppress the use of
an ADK when encrypting is that, as Johan noted, this is an issue where
feelings are strong enough to provoke forks, which are likely to simply
rip out ADK support entirely, thus making its legitimate uses (group
inboxes, multiple tokens, business-related) unreliable.

> > I would also note that, for a work email system in an environment where there
> > is a legal or quasi-legal requirement (not uncommon in finance) to archive
> > messages, simply dropping any incoming message not decryptable with the
> > archive ADK as spam would be reasonable. Since the primary concern
> > motivating message archival in this example is deterring insider trading,
> > simply not allowing unreadable messages to be delivered accomplishes the same
> > objective.
>
> Yes, reasonable.
> OTH, the emails investigating the insider trading by the HR people might need
> to avoid the ADK.

If we are talking about investigating HR malfeasance, those messages
would not be going to the traders' regular inboxes in the first place.
You are right that an HR ADK could be a very bad idea in this example,
since it could allow HR to front-run their own employer. The expected
solution would be to give the trading archives only to the audit or
legal departments, and only after some period of time has passed. That
still leaves potential auditor or lawyer malfeasance, but that is an
existing risk such businesses already handle.


-- Jacob


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
Hi Johan,

Johan Wevers via Gnupg-users <gnupg-users@gnupg.org> wrote:

>On 2023-04-30 21:01, Ineiev via Gnupg-users wrote:
>
>>> All I want is an option to ignore adk's - and it should not claim
>>> anything else than that.
>>
>> Can't you remove ADK subkeys from your keyring?
>
>On someone else's key?
>

Yes.

1. identify ADK key: [R]/usage: R ("restricted encryption key") and
extract adk's fingerprint
2. gpg --batch --delete-keys adkfp!

after every key import or refresh.

--
mlnl

GPG:1FC05426F87FA623

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
On Sun, Apr 30, 2023 at 10:52:10PM -0500, Jacob Bachmeyer via Gnupg-users wrote:
>
> That is an almost prototypical example. In that case, the "archive" key
> would actually be the main subkey, and the list recipients' personal keys
> would be attached as ADKs.
>
> Another example: suppose I have multiple hardware tokens and wish to be
> able to use them interchangeably, but also want maximal security with this
> arrangement, so have generated an encryption keypair on each token. I list
> all of the per-token subkeys as ADKs. In this case, the ADKs really would
> all be /my/ keys. Again, I would have to publish a new certificate every
> time my collection of live tokens changes, which may or may not leak useful
> information to an adversary.

It looks like the feature will allow for quite unexpected (if not
unintended) uses.

Another potential use is: I have reasons to believe that the holder
of the key 0123456789ABCDEF controls the email yu@guan.edu, but that
key has no user ID with such email, and I couldn't validate any other
emails in that key. when I'm writing to that email, my MUA will look
for keys with user IDs that match it. now, I generate a key
for yu@guan.edu locally and add 0123456789ABCDEF as an ADK (BTW,
will GnuPG complain if the only encryption-capable subkey is ADK?
can I make all self-signatures local in order to avoid sending
the key to keyservers?)
Re: ADK's [ In reply to ]
On 1 May 2023, at 12:40, Ineiev via Gnupg-users <gnupg-users@gnupg.org> wrote:
> now, I generate a key
> for yu@guan.edu locally and add 0123456789ABCDEF as an ADK (BTW,
> will GnuPG complain if the only encryption-capable subkey is ADK?

Or you could just use an alias…?

A
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
Jacob Bachmeyer <jcb62281@gmail.com> wrote:
>> I'm unclear if this is a new feature (I think so), and if so what happens if
>> the sender hasn't upgraded yet?
>>

> My understanding: ADKs are new and do not work without support on the
> sender's side. The ADK is a request to also encrypt any message to the
> subkey to the ADK. If the sender's software does not understand that
> request, it does not happen. If the sender rejects that request, either
> by setting an option or by patching their software to ignore the request, it
> does not happen.

Does it still (by default) encrypt to the main key?

> My primary reason for arguing to support some way to suppress the use of an
> ADK when encrypting is that, as Johan noted, this is an issue where feelings
> are strong enough to provoke forks, which are likely to simply rip out ADK
> support entirely, thus making its legitimate uses (group inboxes, multiple
> tokens, business-related) unreliable.

I agree with this view.

>> > I would also note that, for a work email system in an environment where there
>> > is a legal or quasi-legal requirement (not uncommon in finance) to archive
>> > messages, simply dropping any incoming message not decryptable with the
>> > archive ADK as spam would be reasonable. Since the primary concern
>> > motivating message archival in this example is deterring insider trading,
>> > simply not allowing unreadable messages to be delivered accomplishes the same
>> > objective.
>>
>> Yes, reasonable.
>> OTH, the emails investigating the insider trading by the HR people might need
>> to avoid the ADK.

> If we are talking about investigating HR malfeasance, those messages would
> not be going to the traders' regular inboxes in the first place. You are
> right that an HR ADK could be a very bad idea in this example, since it could
> allow HR to front-run their own employer. The expected solution would be to
> give the trading archives only to the audit or legal departments, and only
> after some period of time has passed. That still leaves potential auditor or
> lawyer malfeasance, but that is an existing risk such businesses already
> handle.

It's the initial investigation of an irregularity where there could be a problem.
There is also an issue with 2FA and password reset emails: it's something
that may be a vulnerability to archive. Okay, few are encrypted today, but
we can hope. Many companies with forced proxis are starting to realize that
they become liable when they store banking login cookies.

Anyway, I think senders need to be made mildly aware that it's occuring, and
I think they should be allowed to pick a specific ADK or suppress them all in
certain circumstances best decided by them.

--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works | IoT architect [
] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on rails [
Re: ADK's [ In reply to ]
Michael Richardson wrote:
> Jacob Bachmeyer <jcb62281@gmail.com> wrote:
> >> I'm unclear if this is a new feature (I think so), and if so what happens if
> >> the sender hasn't upgraded yet?
> >>
>
> > My understanding: ADKs are new and do not work without support on the
> > sender's side. The ADK is a request to also encrypt any message to the
> > subkey to the ADK. If the sender's software does not understand that
> > request, it does not happen. If the sender rejects that request, either
> > by setting an option or by patching their software to ignore the request, it
> > does not happen.
>
> Does it still (by default) encrypt to the main key?
>

My understanding: Yes, if ADKs are not supported, the message is
encrypted only for the main key.

> [...]
>
> >> > I would also note that, for a work email system in an environment where there
> >> > is a legal or quasi-legal requirement (not uncommon in finance) to archive
> >> > messages, simply dropping any incoming message not decryptable with the
> >> > archive ADK as spam would be reasonable. Since the primary concern
> >> > motivating message archival in this example is deterring insider trading,
> >> > simply not allowing unreadable messages to be delivered accomplishes the same
> >> > objective.
> >>
> >> Yes, reasonable.
> >> OTH, the emails investigating the insider trading by the HR people might need
> >> to avoid the ADK.
>
> > If we are talking about investigating HR malfeasance, those messages would
> > not be going to the traders' regular inboxes in the first place. You are
> > right that an HR ADK could be a very bad idea in this example, since it could
> > allow HR to front-run their own employer. The expected solution would be to
> > give the trading archives only to the audit or legal departments, and only
> > after some period of time has passed. That still leaves potential auditor or
> > lawyer malfeasance, but that is an existing risk such businesses already
> > handle.
>
> It's the initial investigation of an irregularity where there could be a problem.
> There is also an issue with 2FA and password reset emails: it's something
> that may be a vulnerability to archive. Okay, few are encrypted today, but
> we can hope. Many companies with forced proxis are starting to realize that
> they become liable when they store banking login cookies.
>

Really, the banks should be recognizing those networks and denying
logins. Perhaps corporate forced proxies should be required to insert
an additional header reporting that the connection is not actually
point-to-point encrypted, which banks and other sensitive services could
use to reject sessions.

The main problem here seems to be a work-life balance issue. People
should not be conducting personal business on the company network, and,
in turn, companies need to understand that personal time outside of work
is /personal/ /time/ /outside/ /of/ /work/. I am not sure in which
direction this first broke down, but it is the root cause of a wide
variety of problems.

> Anyway, I think senders need to be made mildly aware that it's occuring, and
> I think they should be allowed to pick a specific ADK or suppress them all in
> certain circumstances best decided by them.
>

I believe that is substantially what I proposed, so at least two of us
agree.


-- Jacob

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
On Sun, 30 Apr 2023 13:58, Andrew Gallagher said:

> The danger of an “ignore ADK” option is that it gives a false sense of

And not to forget the other important use case: Add an ADK for your own
second device so that you are able to decrypt also on that device -
without the need to keep the pimary key on that device.

BTW, OpenKeychain does something very similar for many years.


Shalom-Salam,

Werner

--
The pioneers of a warless world are the youth that
refuse military service. - A. Einstein
Re: ADK's [ In reply to ]
On 2 May 2023, at 02:18, Michael Richardson <mcr@sandelman.ca> wrote:
>
> It's the initial investigation of an irregularity where there could be a problem.

These examples are becoming increasingly contrived. If you are investigating fraud by someone who can read all your company emails, don’t discuss it over company email. This is really basic stuff.

> There is also an issue with 2FA and password reset emails: it's something
> that may be a vulnerability to archive. Okay, few are encrypted today, but
> we can hope.

Password reset emails are supposed to be immune to replay attacks.

> Many companies with forced proxis are starting to realize that
> they become liable when they store banking login cookies.

The only way that a company would end up archiving a password reset email encrypted to an ADK would be if an employee was using their work email address for password resets. If using their work email for this purpose is inadvisable, then it is inadvisable regardless of ADKs.

> Anyway, I think senders need to be made mildly aware that it's occuring, and
> I think they should be allowed to pick a specific ADK or suppress them all in
> certain circumstances best decided by them.

If I add an ADK notation to my key for legitimate reasons that I do not discuss with all my correspondents, on what basis do they decide to second guess it? How is this any different from where I store my private key, whether it is escrowed, whether it has a password etc, which are invisible to the sender and generally none of their business? If you don’t trust how I manage my key, the only reasonable recourse is to avoid using it.

ADK introduces no new considerations that are not also an issue for key escrow, which happens anyway, and has several advantages over escrow, particularly transparency. If however it became common for people to disable encrypting to the ADK, it would simply encourage companies to stop using it and keep using escrow, which doesn’t prevent any of the proposed abuses.

If you don’t trust your correspondent’s employer, then the only effective course of action is to not use their employer’s email address. Technical measures cannot protect you from opsec problems.

A
_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ADK's [ In reply to ]
Andrew Gallagher <andrewg@andrewg.com> wrote:
> The only way that a company would end up archiving a password reset
> email encrypted to an ADK would be if an employee was using their work
> email address for password resets. If using their work email for this
> purpose is inadvisable, then it is inadvisable regardless of ADKs.

Like you mean, an employee was using a work email for a work thing, maybe?

> ADK introduces no new considerations that are not also an issue for key
> escrow, which happens anyway, and has several advantages over escrow,

I agree.

> If you don’t trust your correspondent’s employer, then the only
> effective course of action is to not use their employer’s email
> address. Technical measures cannot protect you from opsec problems.

I'm asking to be informed so that I can make the decision to do
something else.
Re: out-of-key UIDs [was: ADK's] [ In reply to ]
On Mon, May 01, 2023 at 03:16:12PM +0100, Andrew Gallagher wrote:
> On 1 May 2023, at 12:40, Ineiev via Gnupg-users <gnupg-users@gnupg.org> wrote:
> > now, I generate a key
> > for yu@guan.edu locally and add 0123456789ABCDEF as an ADK (BTW,
> > will GnuPG complain if the only encryption-capable subkey is ADK?
>
> Or you could just use an alias…?

I don't think I fully understand what you mean.

$ gpg --group fnord@test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A --list-keys fnord@test.eu
gpg: error reading key: No public key
$ gpg --list-keys BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A | head -n1
pub rsa2048 2014-10-21 [SC] [expires: 2024-10-17]
$ gpg --version | head -n2
gpg (GnuPG) 2.2.41
libgcrypt 1.8.10
Re: out-of-key UIDs [was: ADK's] [ In reply to ]
On 4 May 2023, at 06:46, Ineiev <ineiev@gnu.org> wrote:
>
> On Mon, May 01, 2023 at 03:16:12PM +0100, Andrew Gallagher wrote:
>> On 1 May 2023, at 12:40, Ineiev via Gnupg-users <gnupg-users@gnupg.org> wrote:
>>> now, I generate a key
>>> for yu@guan.edu locally and add 0123456789ABCDEF as an ADK (BTW,
>>> will GnuPG complain if the only encryption-capable subkey is ADK?
>>
>> Or you could just use an alias…?
>
> I don't think I fully understand what you mean.
>
> $ gpg --group fnord@test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A --list-keys fnord@test.eu
> gpg: error reading key: No public key
> $ gpg --list-keys BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A | head -n1
> pub rsa2048 2014-10-21 [SC] [expires: 2024-10-17]
> $ gpg --version | head -n2
> gpg (GnuPG) 2.2.41
> libgcrypt 1.8.10



—list-keys doesn’t expand groups. Try this instead:


andrewg@serenity % gpg --group fnord@test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A -r fnord@test.eu -e < /etc/shells > shells.gpg
gpg: 0x40F9B9601900E974: There is no assurance this key belongs to the named user

sub rsa2048/0x40F9B9601900E974 2014-10-21 Ineiev (fencepost) <ineiev@gnu.org>
Primary key fingerprint: BD9D 4DEE 7B2F F1CB EF2E E0C4 E0AC D3E0 CBE7 874A
Subkey fingerprint: F495 D912 C380 C534 23CD 6B7C 40F9 B960 1900 E974

It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.

Use this key anyway? (y/N) y
andrewg@serenity % gpg --list-packets shells.gpg
gpg: encrypted with rsa2048 key, ID 0x40F9B9601900E974, created 2014-10-21
"Ineiev (fencepost) <ineiev@gnu.org>"
gpg: problem with fast path key listing: IPC parameter error - ignored
gpg: public key decryption failed: No secret key
gpg: decryption failed: No secret key
# off=0 ctb=85 tag=1 hlen=3 plen=268
:pubkey enc packet: version 3, algo 1, keyid 40F9B9601900E974
data: [2047 bits]
# off=271 ctb=d2 tag=18 hlen=2 plen=187 new-ctb
:encrypted data packet:
length: 187
mdc_method: 2
andrewg@serenity %

A
Re: out-of-key UIDs [was: ADK's] [ In reply to ]
On Thu, May 04, 2023 at 09:52:54AM +0100, Andrew Gallagher wrote:
> > $ gpg --group fnord@test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A --list-keys fnord@test.eu
> > gpg: error reading key: No public key
...
> —list-keys doesn’t expand groups. Try this instead:
>
>
> andrewg@serenity % gpg --group fnord@test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A -r fnord@test.eu -e < /etc/shells > shells.gpg
> gpg: 0x40F9B9601900E974: There is no assurance this key belongs to the named user

I tried something like this with my MUA, I believe that doesn't work:
it first looks for appropriate keys, probably using --list-keys;
in fact, it insists on choosing a single key when multiple ones
are available.

...
> It is NOT certain that the key belongs to the person named
> in the user ID. If you *really* know what you are doing,
> you may answer the next question with yes.
>
> Use this key anyway? (y/N) y

This is another issue ADK might handle differently---if gpg skipped
validation of the donor keys (where ADK subkeys come from),
I wouldn't have to certify any UIDs in it.
Re: out-of-key UIDs [was: ADK's] [ In reply to ]
On 4 May 2023, at 10:43, Ineiev <ineiev@gnu.org> wrote:
>
> On Thu, May 04, 2023 at 09:52:54AM +0100, Andrew Gallagher wrote:
>>
>> andrewg@serenity % gpg --group fnord@test.eu=BD9D4DEE7B2FF1CBEF2EE0C4E0ACD3E0CBE7874A -r fnord@test.eu -e < /etc/shells > shells.gpg
>> gpg: 0x40F9B9601900E974: There is no assurance this key belongs to the named user
>
> I tried something like this with my MUA, I believe that doesn't work:
> it first looks for appropriate keys, probably using --list-keys;
> in fact, it insists on choosing a single key when multiple ones
> are available.

Which MUA is this? I know that Thunderbird doesn’t support gnupg’s groups any more, but it has an equivalent inbuilt feature that you can configure separately.

A
Re: out-of-key UIDs [was: ADK's] [ In reply to ]
On Thu, 4 May 2023 09:43, Ineiev said:

> This is another issue ADK might handle differently---if gpg skipped
> validation of the donor keys (where ADK subkeys come from),

The ADSK shall work very similar to --encrypt-to - that is it is only
used if there is already an encryption key. That is why it is named
ADS(ub)K(ey) and not just ADK(ey) - the ADSK is always in your keyblock.

In gnupg/g10/pkclist.c:find_and_check_key at line 921 we got the regular
encryption key and add it to our list of keys. Right after that we scan
that keyblock for an ADSK (i.e. PUBKEY_USAGE_RENC) and add that one too.


Shalom-Salam,

Werner

--
The pioneers of a warless world are the youth that
refuse military service. - A. Einstein

1 2  View All