After an evaluation, GNOME has moved from Bugzilla to GitLab. Learn more about GitLab.
No new issues can be reported in GNOME Bugzilla anymore.
To report an issue in a GNOME project, go to GNOME GitLab.
Do not go to GNOME Gitlab for: Bluefish, Doxygen, GnuCash, GStreamer, java-gnome, LDTP, NetworkManager, Tomboy.
Bug 617383 - Please support HKP over TLS (HKPS) and LDAP over TLS (LDAPS) using gnupg-curl
Please support HKP over TLS (HKPS) and LDAP over TLS (LDAPS) using gnupg-curl
Status: RESOLVED OBSOLETE
Product: seahorse
Classification: Applications
Component: general
2.30.x
Other Linux
: Normal enhancement
: 2.26.0
Assigned To: Seahorse Maintainer
Seahorse Maintainer
safety
: 629981 736756 (view as bug list)
Depends on:
Blocks:
 
 
Reported: 2010-05-01 17:08 UTC by bugzilla.gnome.org
Modified: 2018-08-03 19:18 UTC
See Also:
GNOME target: ---
GNOME version: ---



Description bugzilla.gnome.org 2010-05-01 17:08:39 UTC
HKPS and LDAPS are alternatives to HKP and LDAP which provide transport encryption when talking to key servers. HKPS is implemented in GnuPG since 1.4.10 by means of gnupg-curl. Seahorse does not support these protocols, yet. It would be nice for seahorse to support them, too, since it would allow for increased privacy (on the datas' way to and from the keyserver).
Comment 1 Daniel Kahn Gillmor 2010-05-01 17:30:25 UTC
Note that doing this currently requires providing a list of trusted root CAs via the gpg keyserver options, like this:

keyserver-options ca-cert-file=/home/wherever/cas.crt

For debian and debian-derived systems, a good default choice for seahorse here would be /etc/ssl/certs/ca-certificates.crt
Comment 2 Adam Schreiber 2010-05-02 15:26:11 UTC
(In reply to comment #0)
> since it would allow for
> increased privacy (on the datas' way to and from the keyserver).

You know public keys are public, right?  All data sent to key servers is public.
Comment 3 Daniel Kahn Gillmor 2010-05-02 23:39:19 UTC
Yes, this is true.

However, TLS provides at least two different enhancements:

 0) defeats traffic analysis -- anyone on the network path between you and the keyserver can no longer learn whose keys you are fetching or what query you are running.

 1) defeats Man-in-the-Middle (MITM) attacks -- let's assume you have a trusted keyserver who you can rely on to forward you information about revocations, new certifications, etc.  If you access that keyserver over a clear, unauthenticated channel, an active attacker can masquerade as the server, and filter out the pieces of data you might be interested in.

There was a significant discussion about this on the GnuPG development list:

  http://thread.gmane.org/gmane.comp.encryption.gpg.devel/15028

Support in Seahorse would be welcome.
Comment 4 bugzilla.gnome.org 2010-09-17 10:15:25 UTC
Daniel nicely summed up the same reasons I see for why it makes sense to support HKPS. 

I know several people who, while some of them do trust a given key server to not record their usage patterns, dislike the fact that you basically disclose your web of trust to any entity able to monitor your traffic whenever you refresh your keys from a key server using an unencrypted connection. 

I think these people will, for this reason, not use seahorse at all but use plain GPG or Enigmail which both support HKPS and LDAPS for a while now. Many seahorse users who are not that worried may still consider it a nice feature if they become aware of the underlying (possible) issues - which most are probably not at this time.
Comment 5 Pablo Castellano (IRC: pablog) 2010-09-18 11:37:41 UTC
*** Bug 629981 has been marked as a duplicate of this bug. ***
Comment 6 Pablo Castellano (IRC: pablog) 2010-09-18 11:38:13 UTC
From Bug 629981:

bertagaz [reporter] 2010-09-18 11:37:15 CEST
I wasn't able to add a hkps enabled keyserver in seahorse, which is usefull in
term of privacy. There are some of them already available and the sks
developers are talking about setting up a dedicated dns pool for hpks
keyservers. Having seahorse able to push and pull from such a keyserver, and
correctly verifying their x509 certificates, would help a lot to keep some
privacy about what key(s) people are pushing or pulling.
Comment 7 bugzilla.gnome.org 2014-09-10 20:55:32 UTC
It's four years later, and a lot has happened in the meantime which should suggest that this feature would be great to have.
Comment 8 Stef Walter 2014-09-11 05:15:28 UTC
Sounds good to me. Now someone needs to want it enough to contribute the feature.
Comment 9 Stef Walter 2014-09-17 07:02:52 UTC
*** Bug 736756 has been marked as a duplicate of this bug. ***
Comment 10 Ismael Olea 2015-07-15 09:56:08 UTC
I'm not an expert but seems to me anyone of the most common public servers accept not encrypted conections so, in practice, all Seahorse's keyserver features are useless now, AFAIK :-/
Comment 11 Ismael Olea 2015-07-15 10:46:00 UTC
Please forgot https://bugzilla.gnome.org/show_bug.cgi?id=617383#c10

I didn't realised I've doing my tests in a network with restricted out ports.

Sorry for the noise :-(
Comment 12 5a54a 2016-07-20 10:06:05 UTC
Any change this will be implemented? HKPS key servers are becoming more and more popular.
Comment 13 mschnait 2017-09-06 18:51:52 UTC
It is insane that this has yet to be implemented.  A secure connection to keyservers over TLS is imperative and should not be hard to implement using OpenSSL. This makes seahorse almost useless
Comment 14 Stef Walter 2017-09-11 06:58:09 UTC
> It is insane that this has yet to be implemented.  A secure connection to keyservers over TLS is imperative and should not be hard to implement using OpenSSL. This makes seahorse almost useless

I agree. But this is an open source project. Absence of a feature means not enough people care about it to contribute that feature.

Do you need pointers on where to contribute the necessary code? A code change here would probably do the trick:

pgp/seahorse-hkp-source.c line 93 in function get_http_server_uri().
Comment 15 Daiki Ueno 2017-09-11 09:10:57 UTC
Why not implement this through the GPGME_KEYLIST_MODE_EXTERN option:
https://www.gnupg.org/documentation/manuals/gpgme/Key-Listing-Mode.html#Key-Listing-Mode
instead of writing custom code to access key servers?
Comment 16 GNOME Infrastructure Team 2018-08-03 19:18:44 UTC
-- GitLab Migration Automatic Message --

This bug has been migrated to GNOME's GitLab instance and has been closed from further activity.

You can subscribe and participate further through the new bug through this link to our GitLab instance: https://gitlab.gnome.org/GNOME/seahorse/issues/47.