[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: gnutls_openpgp_crt_verify_self and key fingerprint
From: |
Nikos Mavrogiannopoulos |
Subject: |
Re: gnutls_openpgp_crt_verify_self and key fingerprint |
Date: |
Sun, 10 Jan 2010 12:28:01 +0100 |
User-agent: |
Thunderbird 2.0.0.23 (X11/20090817) |
Ilari Liusvaara wrote:
> I'm writing new protocol implementation that utilizes TLS-OpenPGP
> and GnuTLS and I am not completely sure what I'm doing with
> authentication is safe thing to do:
>
> Does gnutls_openpgp_crt_verify_self() verify OpenPGP certificate
> throughly enough that the gnutls_openpgp_crt_get_fingerprint()
> output can be trusted not to be forgeable by grabbing certificate
> (without stealing/deriving corresponding private keys) with desired
> fingerprint and tampering with it?
Hello,
The verify_self() verifies the self signature and that's all. It
doesn't say whether someone you trust has signed this certificate.
> The scenario I'm most worried about is attacker using unauthorized
> subkey (missing/invalid main->subkey signature) to pass TLS signature
> checks. If that is not caught, the fingerprint value will be
> completely untrustworthy (since AFAIK fingerprint comes from the
> main key and does not directly cover subkeys). I'm guessing whole
> purpose of ...verify_self() is to catch trickery like that (if not,
> what it is for?)
Could you please elaborate on the scenario above? I cannot really
understand what you worry of.
regards,
Nikos
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- Re: gnutls_openpgp_crt_verify_self and key fingerprint,
Nikos Mavrogiannopoulos <=