Home GnuPG
Diffusion GnuPG db1f74ba5338

gpg: Protect against rogue keyservers sending secret keys.
db1f74ba5338Unpublished

Unpublished Commit · Learn More

Not On Permanent Ref: This commit is not an ancestor of any permanent ref.

Description

gpg: Protect against rogue keyservers sending secret keys.

* g10/options.h (IMPORT_NO_SECKEY): New.
* g10/keyserver.c (keyserver_spawn, keyserver_import_cert): Set new
flag.
* g10/import.c (import_secret_one): Deny import if flag is set.

By modifying a keyserver or a DNS record to send a secret key, an
attacker could trick a user into signing using a different key and
user id. The trust model should protect against such rogue keys but
we better make sure that secret keys are never received from remote
sources.

(cherry picked from commit e7abed3448c1c1a4e756c12f95b665b517d22ebe)

Resolved conflicts:
g10/import.c
g10/keyserver.c

  • Suggested-by: Stefan Tomanek
  • Signed-off-by: Werner Koch <wk@gnupg.org>

Details

Provenance
wernerAuthored on Oct 4 2013, 1:44 PM
Parents
rG90688b29f370: agent: Fix UPDATESTARTUPTTY for ssh.
Branches
Unknown
Tags
Unknown

Event Timeline