The Call of the Open Sidewalk

From a place slightly to the side of the more popular path

User Tools

Site Tools


pgpfan:downgrade

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pgpfan:downgrade [2020/07/09 16:17] – Better order for more clarity b.walzerpgpfan:downgrade [2020/07/11 15:05] (current) – wrong identity case b.walzer
Line 5: Line 5:
 When PGP is used in a unidirectional application like email a downgrade attack is impossible for the simple reason that any sort of negotiation of the method to be used is impossible. Negotiation would require some sort of reverse channel which in this case doesn't exist. When PGP is used in a unidirectional application like email a downgrade attack is impossible for the simple reason that any sort of negotiation of the method to be used is impossible. Negotiation would require some sort of reverse channel which in this case doesn't exist.
  
-If you want to send someone an encrypted message using PGP you need one of their PGP identities. If that  identity is, say, based on 2048 bit RSA encryption then you have to use 2048 bit encryption to encrypt that message. If you use any other type of encryption your correspondent will not be able to decrypt it as they will not have the corresponding private key.   +If you want to send someone an encrypted message using PGP you need one of their PGP identities. If that  identity is, say, based on 2048 bit RSA encryption then you have to use 2048 bit encryption to encrypt that message. If you use any other type of encryption your correspondent will not be able to decrypt it as they will not have the corresponding private key. 
 + 
 +If you can trick someone into sending a message to the wrong PGP identity then you would not have to bother with a downgrade attack. You could just have them send the message to one of your PGP identities.
  
 Any preference information is embedded in the PGP identity (public key). This is the preference information from an identity generated from a recent version of GnuPG: Any preference information is embedded in the PGP identity (public key). This is the preference information from an identity generated from a recent version of GnuPG:
Line 18: Line 20:
  
 The preference information is in the secure part of the identity. That means that it is signed by the public key also embedded in the identity. This is the public key that will be used to encrypt the email so the preferences are linked to the public key in a way that means that you would have to break the underlying encryption to modify the preferences. If you could do that then you would not have to bother with a downgrade attack. The preference information is in the secure part of the identity. That means that it is signed by the public key also embedded in the identity. This is the public key that will be used to encrypt the email so the preferences are linked to the public key in a way that means that you would have to break the underlying encryption to modify the preferences. If you could do that then you would not have to bother with a downgrade attack.
 +
 +You can think of this as a secure signed message embedded in the PGP identity intended to inform those who want to send you secure messages.
  
 PGP means that you get to choose how you want your messages sent to you. There is no opaque process somewhere in the middle that can override that preference. PGP means that you get to choose how you want your messages sent to you. There is no opaque process somewhere in the middle that can override that preference.
pgpfan/downgrade.1594311467.txt.gz · Last modified: 2020/07/09 16:17 by b.walzer