GPG: local signatures may be exportable

When you sign a (public key, user ID) couple using a V3 RSA key, gnupg will create a V3 signature. This includes the case of local signatures. Bad enough, there is no such concept as a local V3 signature, which implies that using “lsign” with a V3…

When you sign a (public key, user ID) couple using a V3 RSA key, gnupg will create a V3 signature. This includes the case of local signatures. Bad enough, there is no such concept as a local V3 signature, which implies that using “lsign” with a V3 RSA key is equivalent to “sign”, and produces an exportable(!) signature.

This, in turn, can lead to considerable embarrassment (and loss of reputation) of the signer, and to bad judgement by others who rely on such signatures.

This patch fixes this problem by adding a minimum version parameter to make_keysig_packet(), and makes sure that local signatures are always at least V4.

Know Your Enemy: Statistics

Lance Spitzner of the Honeynet Project writes: The Honeynet Project is excited to announce the release of a new paper, “Know Your Enemy: Statistics”. The paper is based on eleven months of data we have collected, and covers two areas. 1. Aggressiv…

Lance Spitzner of the Honeynet Project writes: The Honeynet Project is excited to announce the release of a new paper, “Know Your Enemy: Statistics”. The paper is based on eleven months of data we have collected, and covers two areas.

1. Aggressiveness. We show a variety of statistics, based on eleven months of Honeynet data, that demonstrate just how aggressive the blackhat community can be. Even more revealing is it appears the threat is getting worse.

2. Early Warning and Prediction. We present proof of concept that attacks can be predicted. The research is still preliminary, but based on statistical analysis, 7 out of 8 attacks could be predicted last year. Two different team members took two different statistical approaches, yet they findings were almost identical. Most of the attacks made against the Honeynet could be predicted two to three days in advance.

As this research is part of the Honeynet Project, all eleven months of data are also publicly released for review and further analysis.

PGP/MIME: Eudora vs. Mutt

As was reported in comp.mail.mutt, there’s an interoperability problem between mutt and Eudora when it comes to PGP/MIME encrypted messages. Apparently, Eudora expects that the first MIME header within the encryption envelope contains a MIME-Versi…

As was reported in comp.mail.mutt, there’s an interoperability problem between mutt and Eudora when it comes to PGP/MIME encrypted messages. Apparently, Eudora expects that the first MIME header within the encryption envelope contains a MIME-Version: 1.0 field. This is a bug. For details, read the Usenetr thread.

Updated PGP keyring analysis posted.

M. Drew Streib has posted an updated PGP key ring analysis. This version only takes signatures on self-signed user IDs into account, and it offers extended information on where individual keys sit within the web of trust.

M. Drew Streib has posted an updated PGP key ring analysis. This version only takes signatures on self-signed user IDs into account, and it offers extended information on where individual keys sit within the web of trust.