Privacy feature

Bug #1074224 reported by Casey Marshall
12
This bug affects 2 people
Affects Status Importance Assigned to Milestone
hockeypuck
New
Undecided
Unassigned

Bug Description

A user should be able to manage how their key information is shared by the keyserver.

With a signed command message, the owner of a key should be able to instruct hockeypuck to strip identifying information out of search results for that key. Only fingerprints would be returned by public queries.

Revision history for this message
DarkLinkXXXX (darklinkxxxx) wrote :

I like the idea, but I know next to nothing about keyservers. How would this work?

Changed in hockeypuck:
assignee: nobody → Crypto Social (crypto-social)
assignee: Crypto Social (crypto-social) → nobody
Revision history for this message
Casey Marshall (cmars) wrote :

For some background, the OpenPGP keyserver protocol (basically, a simple, RESTful HTTP API) is described here: http://ietfreport.isoc.org/idref/draft-shaw-openpgp-hkp/

My thoughts for extending HKP to implement privacy features and other key management policies are rough (this is post 1.0 for sure) but basically would involve adding an authentication token to the HTTP request that proves to the server that the requester has the corresponding private key.

For example, a protocol extension to HKP could work like this:

1. Client requests a randomly-generated SHA256 session ticket from Hockeypuck.
2. Client makes a signature with an OpenPGP private key and adds this to the HTTP header in an HKP request.
3. Server then authenticates this request and grants it special privilege to perform key management commands such as:
- Delete my key and never store it (I don't want to be on any keyservers)
- Store my key, but don't allow my name or email to show up in search results; require the full fingerprint (like an unlisted telephone number)
- Store my key, but only distribute it to requests that are signed by keys in a designated group
..etc.

Most public keyservers "gossip" with each other to share public key material, effectively forming a global, distributed database of public keys. Really cool, but really public. Implementing the above policies would mean limiting the distribution of such keys when Hockeypuck joins reconciliation with these servers.

Revision history for this message
DarkLinkXXXX (darklinkxxxx) wrote :

I like it. I'll do it when it's convenient.

Changed in pgp-plus:
importance: Undecided → Low
assignee: nobody → Crypto Social (crypto-social)
no longer affects: pgp-plus
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.