--
You received this message because you are subscribed to the Google Groups "Crypto and Privacy Village" group.
To unsubscribe from this group and stop receiving emails from it, send an email to cryptovillag...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
-- Adi Kamdar Activist, Electronic Frontier Foundation https://eff.org a...@eff.org | 415.436.9333 x144
These are valid issues, but, luckily, we don't need to rely oninternet access, or anyone having their computers with them. All that's
*really* required is that the people attending have the fingerprint of
their public key with them. (It can be on a piece of paper.)
Many common keysigning party rules actually go to lengths to tell
people *not* to bring their computer. For example,
http://rhonda.deb.at/projects/gpg-party/gpg-party.en.html#toc3
--
My understanding is that computers are discouraged at *any* key signing party.
Here's one way of running a large key signing party: http://keysigning.org/methods/sassaman-efficient
Here's one way of running a large key signing party: http://keysigning.org/methods/sassaman-efficient
| Subject: | Re: Running a secure keysigning party |
|---|---|
| Date: | Wed, 30 Jul 2014 00:46:11 -0600 |
| From: | Alan Eliasen <eli...@mindspring.com> |
| To: | Adi Kamdar <a...@eff.org>, Tony Arcieri <bas...@gmail.com> |
| CC: | crypto...@googlegroups.com <crypto...@googlegroups.com> |
On 07/29/2014 09:56 PM, Adi Kamdar wrote: > On 7/29/14, 8:42 PM, Tony Arcieri wrote: >> >> That's not really a keysigning party so much as a "collect >> fingerprints" party. Participants won't leave with signed keys in that >> case. >> >> People can retroactively sign keys, but having an actual mechanism for >> exchanging public keys and signatures would be a lot more useful, IMO. >> How many people do you think will retroactively download and sign keys >> based on the fingerprints they collected, versus doing it in person? >> > A fair few, I think. Most of the key signing parties I've been to have > operated this way—exchanging fingerprints, verify identities, sign after > at your leisure. Many common keysigning party rules actually go to lengths to tell people *not* to bring their computer. For example, http://rhonda.deb.at/projects/gpg-party/gpg-party.en.html#toc3 "Keysigning party" is a bit of a misnomer; it's the validating of identities and checking of fingerprints that is the reason for meeting face-to-face. The actual keysigning can be done at leisure, and is usually not done at the event in my experience. I, personally, will probably not be signing any keys during the event. (In fact, I try to avoid carrying my strong crypto keys when traveling, especially to the Most Hostile Network On Earth. I replace my hard drive with one that has never touched my secure systems before I go to DEFCON.) As part of my crypto evangelism, I also find myself being a bit of a pedant and checking others' keys for good practices. For example, I usually make sure that the symmetric encryption algorithms specified in their public key preferences require strong algorithms first (the default in GPG is to be weak). I usually verify that they're using stronger algorithms before publicly signing their key. This is discussed in this section of my document: https://futureboy.us/pgp.html#StrongerAlgorithms I usually like to check their other indicators at leisure, including looking for any unrevoked or duplicate keys, and looking for any other red flags. In any case, if someone wants to sign others' keys at the event, and they have network connectivity, they are absolutely free to do so (if the keys are available on a keyserver.) They just can't expect that everyone else signs theirs on the spot (if at all; participants should be free and under no pressure to vouch for anyone they don't want to. We need to make sure that it's "okay" for people to not feel forced to exchange information with anyone they don't want to, and do so in a way that makes people feel safe.) Participants should also not expect that others will be able to import a raw public key during the event if the public key is not on a keyserver. They'll have to just verify the fingerprint and identity and arrange another way to exchange the private key. I'd like for us to have a roll of blue painter's tape available so people can feel free to cover up sensitive information that might appear on their photo ID. We don't want this to be an Identity Theft Party nor a Stalker Party. Let's face it; there are some creepy people there and we don't want to *hurt* peoples' privacy; we want to enhance it. We need to think about good ways to help people safely say "no" to requests to exchange information with others. Maybe something like what I've seen at other conferences: each person had a color of the stoplight on their badge: green means it's okay to hug when we meet, even if I don't know you; yellow means it's okay to hug iff I know you; red means don't hug me ever. We could do the same. Yellow could mean I'm only here to exchange keys face-to-face with people I know or initiate contact with. Red could mean "don't ask me for anything." That actually might go a long way toward making people feel safe about saying "no". Whaddya think? By the way, my messages to crypto...@googlegroups.com don't go through because I'm not part of the group. Dunno if you want to forward them or if I should join. -- Alan Eliasen eli...@mindspring.com http://futureboy.us/
Thanks! I considered that method, but I'm not sure it would be
appropriate for a free-form cat-herding conference like DEFCON. It
has the disadvantages of 1.) people having to know that they're going
to attend the keysigning party well in advance and 2.) making us keep
an "attendance list" of people who are there. For the same reasons
that DEFCON only takes anonymous cash at the door, I'd rather not hold
nor hand out an official attendance list.
I think it'd be great if we could find a mobile app that exchanges public keys with something like QR codes, but I can't find one with a cursory googling :(
A major problem with sharing public keys via QR codes is that many public keys easily get so big that no QR code reader I've seen on android can even scan them. If you have an embedded photo, or tons of signatures, or a lot of subkeys, or even a lot of changes to your key, all bets are off (when you make a change to your public key it usually just *appends* the change to your key so your key gets huge rapidly.)
Also, I'm not sure that I trust APG. It was totally dead for years with no updates or bugfixes, and suddenly a new version showed up that requires a lot of unnecessary and scary permissions.