On Sat, Mar 14, 2020 at 01:38:05PM -0700, CranialRitalin5084 wrote:
> What are your thoughts, is it time to retire PGP for newer tools?
Signify is solving a slightly different problem than PGP is --
specifically, it doesn't concern itself with trust delegation or key
management.
For example, if you wanted to check a signify signature, you'd need to
get the public key from somewhere -- the project website, an email
message, a forum post, etc. All of these cases require that you trust
the medium and the connection (the site isn't hacked to show the wrong
public key, and nobody is reading your email to substitute the proper
key with a bogus one).
Furthermore, if the private key is compromised and can no longer be
trusted, there is absolutely no mechanism to tell minisign/signify
"don't use that key!". You are just supposed to be paying attention and
switch to the newer key when you're told to do so.
Now, PGP has a solution for these problems in the form of the Web of
Trust and a key revocation framework. Both of these things suck -- but
not because GnuPG's implementation of them sucks, but because it's a
hard problem to solve and any solution is going to be complicated and
cumbersome. Nobody outside of niche communities is using the Web of
Trust, and very few people refresh their keyrings frequently enough for
the key revocation to work reliably.
However, at least PGP tries to offer *some* solution to delegated trust
and key management. For those who don't care about these aspects, GnuPG
is now offering the Trust-On-First-Use (TOFU) trust model, in which a
key is marked as trusted the first time you encounter it. If you come
across another key with the same identity on it, GnuPG will mark both
keys untrusted and let you figure out which one is "the real one."
In my mind, signify-style signatures make sense when signing software
releases or packages, since in this case we implicitly trust the
distribution to do all trust management. For software releases, the
public key can be published in a signed DNS zone (trust delegated to
DNSSec) or posted on the website (trust delegated to commercial CAs).
For all other uses, and until signify gains some kind of key management
framework, e.g. via various Distributed-Identity (DID) frameworks, PGP
is still the way to go.
> Will Qubes transition at some point?
I think Qubes should offer signify-style signatures on its released
objects, sure.
-K