-
Notifications
You must be signed in to change notification settings - Fork 98
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unclear TODO "Flags (s.a. disabled
) checks are not yet implemented!!!")
#456
Comments
The intent of the checks in this lib is similar to the intent of the checks of TLS certificates. If anything is not OK, then we just fail rather than allow potential compromise. Currently we have some checks, but in order to inform users of this lib that the checks are not quite doing everything we expect them to do, so we try to warn them via warnings, because we know almost noone reads bug trackers if thay are not about the bugs the uset has encountered. |
Thanks for the explanation, @KOLANICH, but i still don't get it. What flags aren't currently checked? we do indeed check usage flags (see the There is a separate (and correct) TODO emitted as a comment about not checking revocations. I think it is reasonable to keep that one until it gets resolved. But i'm trying to think about how to resolve this one, and i wouldn't even know how to begin. A warning that just sounds scary without being actionable is worse than no warning at all. |
I don't remember exactly what I meant then (quite a long time has passed since I have implemented verification), but I suspect that the meaning was that we don't check |
the Trust packet's defnition explicitly says that the meaning is only defined for a given implementation, and that it generally shouldn't be exported or imported between implementations. I think PGPy should ignore it entirely, and never produce it. |
I have read the most recent draft of RFC 4880 bis, and I think it can be improved. IMHO it leaves too many things up to an implementer. While it allows some flexibility, IMHO it should be addressed in a more constrained way. I propose to replace the loose words with code in Haxe (one can say "pseudocode", but I think pseudocode usually has all the disadvantages of real code that it has to be translated into the target language, but real code allows to skip the translation at least for the case when the target language is the same as the code used, and Haxe was created with the goal of transpilation in mind) doing the needed things and require the usage of the direct close-to-original translations into target languages (with necessary modifications done for the exact project and taking into accou t programming language specifics, but the meaning of the code MUST be the same). In other words, standardize the implementation. The implementers should be encouraged to create scripts transforming the code from the RFC into the code within their project source tree.
The RFC should define at least 2 profiles. The
|
fwiw, the draft you're looking at is not an IETF draft, it's something that Werner Koch is developing indepenently. The draft that has been submitted to the IESG for publication is draft-ietf-openpgp-crypto-refresh. I understand that you want the specification to be more formal, but that's not generally how IETF specs are written, for better or for worse. If you're interested in trying to write up a more formal specification, I would be interested in reading it. Perhaps that's something that the OpenPGP working group would consider if the group decides to recharter. There will be a meeting on Friday if you're interested in joining. you may need to enroll in the meeting if you want full audio/video participation, but i think you might be able to join the audio stream and the text chat without fully subscribing. Whether access to the meeting works or not, you should go ahead and formulate your desired outcome and send it to the workingn group mailing list, |
Thanks for the info and for the invitation, but unfortunately I cannot be fully involved into OpenPGP standardization in observable future. About the warning: feel free to remove it. |
in
pgpy/pgp.py
,PGPKey.check_management
contains this warning, added by @KOLANICH in b8c28c5:It's not clear what this means. I'm assuming "s.a." means "such as", but what is a "disabled" flag check? There is no such concept in RFC 4880 or in
draft-ietf-openpgp-crypto-refresh-10
.GnuPG's
--with-colons
output may contain aD
flag in field 12 to mean "disabled" (see/usr/share/doc/gnupg/DETAILS.gz
), but this doesn't appear to be any sort of interoperable standard.There is also no other way for a user of PGPy to mark a key as
disabled
.If there's some plan to do this, the plan should be outlined in a bug report, rather than adding a noisy warning.
The text was updated successfully, but these errors were encountered: