pgpfan:downgrade
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
pgpfan:downgrade [2020/07/09 16:17] – Better order for more clarity b.walzer | pgpfan:downgrade [2020/07/11 15:05] (current) – wrong identity case b.walzer | ||
---|---|---|---|
Line 5: | Line 5: | ||
When PGP is used in a unidirectional application like email a downgrade attack is impossible for the simple reason that any sort of negotiation of the method to be used is impossible. Negotiation would require some sort of reverse channel which in this case doesn' | When PGP is used in a unidirectional application like email a downgrade attack is impossible for the simple reason that any sort of negotiation of the method to be used is impossible. Negotiation would require some sort of reverse channel which in this case doesn' | ||
- | If you want to send someone an encrypted message using PGP you need one of their PGP identities. If that identity is, say, based on 2048 bit RSA encryption then you have to use 2048 bit encryption to encrypt that message. If you use any other type of encryption your correspondent will not be able to decrypt it as they will not have the corresponding private key. | + | If you want to send someone an encrypted message using PGP you need one of their PGP identities. If that identity is, say, based on 2048 bit RSA encryption then you have to use 2048 bit encryption to encrypt that message. If you use any other type of encryption your correspondent will not be able to decrypt it as they will not have the corresponding private key. |
+ | |||
+ | If you can trick someone into sending a message to the wrong PGP identity then you would not have to bother with a downgrade attack. You could just have them send the message to one of your PGP identities. | ||
Any preference information is embedded in the PGP identity (public key). This is the preference information from an identity generated from a recent version of GnuPG: | Any preference information is embedded in the PGP identity (public key). This is the preference information from an identity generated from a recent version of GnuPG: | ||
Line 18: | Line 20: | ||
The preference information is in the secure part of the identity. That means that it is signed by the public key also embedded in the identity. This is the public key that will be used to encrypt the email so the preferences are linked to the public key in a way that means that you would have to break the underlying encryption to modify the preferences. If you could do that then you would not have to bother with a downgrade attack. | The preference information is in the secure part of the identity. That means that it is signed by the public key also embedded in the identity. This is the public key that will be used to encrypt the email so the preferences are linked to the public key in a way that means that you would have to break the underlying encryption to modify the preferences. If you could do that then you would not have to bother with a downgrade attack. | ||
+ | |||
+ | You can think of this as a secure signed message embedded in the PGP identity intended to inform those who want to send you secure messages. | ||
PGP means that you get to choose how you want your messages sent to you. There is no opaque process somewhere in the middle that can override that preference. | PGP means that you get to choose how you want your messages sent to you. There is no opaque process somewhere in the middle that can override that preference. |
pgpfan/downgrade.1594311467.txt.gz · Last modified: 2020/07/09 16:17 by b.walzer