[pkg-gnupg-maint] Bug#807620: Bug#807620: dirmngr: split SKS keyserver network CA into separate ca-certificates compatible package
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Thu Dec 10 23:51:57 UTC 2015
Hi Christoph--
thanks for the suggestion!
On Thu 2015-12-10 18:31:12 -0500, Christoph Anton Mitterer wrote:
> May I suggest, that the SKS keyserver network CA cert is
> split into it's own package that would integrate into the
> ca-certificates framework.
> An example would be the ca-cacert package.
I don't think that the sks keyserver network CA should be in the general
ca-certificates framework, because it isn't properly name constrained.
adding it to ca-certificates would allow Kristian the ability to MITM
most TLS connections.
While i suspect Kristian would be more responsible than the
least-responsible of the parties authorized by the CA cartel, i don't
think we want to increase that particular attack surface.
However, i agree with you that we should ship the sks keyserver CA in a
known place so that tools that are deliberately trying to talk to
hkps://hkps.pool.sks-keyservers.net will have an easy time verifying it.
This part is already done: dirmngr ships the CA at:
/usr/share/dirmngr/sks-keyservers.netCA.pem
You can think of this as a crufty "DLV" (domain lookaside validation)
for this one particular point in the DNS, i guess.
I'm working on a patch for GnuPG that should make it automatically use
this file as a cert if the user is visiting the hkps pool.
> Given that the SKS keyserver network CA will be typically used for
> the webinterface of the keyservers as well, some people may
> want to have it generally available.
i don't know anyone who uses it for the web interface, and i suspect
that using it there would be problematic for the non-name-constrained
reason described above.
--dkg
More information about the pkg-gnupg-maint
mailing list