[kwlug-disc] Fw: PGP Keysigning Protocol
Paul Nijjar
paul_nijjar at yahoo.ca
Fri Sep 3 10:28:00 EDT 2010
This month's KWLUG meeting is supposed to feature a key-signing party.
Bob forwarded the following guidelines for the party to me.
Do we agree with these guidelines?
Do we have a KeyMaster who will be in charge of the organizing?
- Paul
----- Forwarded message from Bob Jonkman <bjonkman at sobac.com> -----
Hi Paul: Here is the text of the PGP keysigning protocol that does not
require computers or coercive-authority identification. This is what we
used at the initial meetings of the Toronto Cypherpunks, although later
meetings devolved into exhibitions of identification cards of the
afore-mentioned coercive authorities...
--Bob.
=====
The PGP FAQ is at <URL:http://www.pgp.net/pgpnet/pgp-faq/>
6.7 What's a key signing party?
A key signing party is a get-together with various other users of PGP
for the purpose of meeting and signing keys. This helps to extend the
"web of trust" to a great degree.
6.8 How do I organize a key signing party?
Though the idea is simple, actually doing it is a bit complex,
because
you don't want to compromise other people's private keys or spread
viruses (which is a risk whenever floppies are swapped willy-nilly).
Usually, these parties involve meeting everyone at the party,
verifying their identity and getting key fingerprints from them, and
signing their key at home.
Derek Atkins <warlord at mit.edu> has recommended this method:
There are many ways to hold a key-signing session. Many viable
suggestions have been given. And, just to add more signal to this
newsgroup, I will suggest another one which seems to work very well
and also solves the N-squared problem of distributing and signing
keys. Here is the process:
1. You announce the keysigning session, and ask everyone who plans
to
come to send you (or some single person who _will_ be there)
their
public key. The RSVP also allows for a count of the number of
people for step 3.
2. You compile the public keys into a single keyring, run "pgp -kvc"
on that keyring, and save the output to a file.
3. Print out N copies of the "pgp -kvc" file onto hardcopy, and
bring
this and the keyring on media to the meeting.
4. At the meeting, distribute the printouts, and provide a site to
retreive the keyring (an ftp site works, or you can make floppy
copies, or whatever -- it doesn't matter).
5. When you are all in the room, each person stands up, and people
vouch for this person (e.g., "Yes, this really is Derek Atkins --
I went to school with him for 6 years, and lived with him for
2").
6. Each person securely obtains their own fingerprint, and after
being vouched for, they then read out their fingerprint out loud
so everyone can verify it on the printout they have.
7. After everyone finishes this protocol, they can go home, obtain
the keyring, run "pgp -kvc" on it themselves, and re-verify the
bits, and sign the keys at their own leisure.
8. To save load on the keyservers, you can optionally send all
signatures to the original person, who can coalate them again
into
a single keyring and propagate that single keyring to the
keyservers and to each individual.
_________________________________________________________________
Last updated: 05 Nov 1997.
Copyright (C) 1996 by Arnoud Engelfriet. Comments, additions and
--
Bob Jonkman <bjonkman at sobac.com> http://sobac.com/sobac/
SOBAC Microcomputer Services Voice: +1-519-669-0388
6 James Street, Elmira ON Canada N3B 1L5 Cel: +1-519-635-9413
Software --- Office & Business Automation --- Consulting
----- End forwarded message -----
--
http://pnijjar.freeshell.org
More information about the kwlug-disc
mailing list