User masquerading - audit trail?
Jeremy Lizakowski
jeremy at GreenSpringDesign.com
Sat Jan 17 03:04:16 UTC 2009
>> I think masquerading can be prevented quite easily, and done securely.
> Um, er, no it can't. ... bridge between the meat and the electronic
I meant that masquerading could be solved by treating the key
fingerprint as the user's 'unforgeable' identity, not the name provided.
You are right - correlating the key and the human is difficult. There
are two aspect of correlating keys with humans: the question of whether
the person is truthfully identifying themselves, and whether the key has
been compromised.
Identification can be done by meeting the person, or by a web of trust
(with which GPG can assist). It also may not matter the real name of
the developer. Good work can be done under an alias, and that might be
sufficient to trust that person.
>> the key for the signature is essentially not forgeable.
> You might want to check out the latest stats on the various forms of
> data theft (via stolen/lost devices such as laptops,
Regarding compromised keys, I understand that entire systems can fall
and keys can be stolen. If the laptop is stolen, or the user held
against their will (rubber-hose cryptanalysis), then all forms of
security can fall.
Anything that compromises their code-signing key could compromise every
root password they use from that system. But this does not negate the
need for root passwords, nor the need for authentication.
Perfectly secure systems don't exist, but we can increase the cost for
the attacker, and increase the likelihood of detection.
The failure mode I'm concerned with is users providing their credentials
by setting a string in a file themselves. Editing a text file is easier
than stealing a laptop.
> Basically, the belief that you can enlarge your fundamental trust
> boundary by relying on such signatures without significant risk is a
> fallacy. Studying basic epidemiology is, IMHO, a requirement for anyone
> in the security field. :-)
I'm not saying that all people can be trusted if they have a key. I'm
saying that trusted people can be identified if they use keys.
If Linus Torvalds signs code, I trust that he won't lend his identity to
an interloper, and that he will take steps to avoid being hacked. He
has a reputation to protect, and he's smart. I'll bet my kernel on it.
For everyone else, I would add the required number of grains of salt.
The idea is to provide a means to identify the code submissions of those
you trust. Whether they control their own signature effectively is part
of measuring that trust.
Theory aside, I just want to know that 3rd party contractors are
legitimately identifying themselves. I think this would be interesting
beyond that, but I'm just looking for a specific solution.
I got pretty close with hooks, but not quite.
Jeremy
More information about the Mercurial
mailing list