Home GnuPG
Diffusion GnuPG e7abed3448c1

gpg: Protect against rogue keyservers sending secret keys.
e7abed3448c1Unpublished

Unpublished Commit · Learn More

Not On Permanent Ref: This commit is not an ancestor of any permanent ref.

Description

gpg: Protect against rogue keyservers sending secret keys.

* g10/options.h (IMPORT_NO_SECKEY): New.
* g10/keyserver.c (keyserver_spawn, keyserver_import_cert): Set new
flag.
* g10/import.c (import_secret_one): Deny import if flag is set.

By modifying a keyserver or a DNS record to send a secret key, an
attacker could trick a user into signing using a different key and
user id. The trust model should protect against such rogue keys but
we better make sure that secret keys are never received from remote
sources.

  • Suggested-by: Stefan Tomanek
  • Signed-off-by: Werner Koch <wk@gnupg.org>

Details

Provenance
wernerAuthored on Oct 4 2013, 1:44 PM
Parents
rGdd868acb0d13: gpg: Allow setting of all zero key flags
Branches
Unknown
Tags
Unknown

Event Timeline