[ale] Key management
Michael H. Warfield
mhw at WittsEnd.com
Wed May 14 15:11:55 EDT 2008
On Wed, 2008-05-14 at 11:01 -0700, Kevin O'Neill Stoll wrote:
> We are saying the same thing, just worded diff.
> Problem being, I don't want to have to distribute O's pub
> key manually to a dozen or 12 dozen sources.
> In the case of a pks, I would just configure the S clients
> to lookup against an internal pks for the O pub key,
> instead of manually placing a copy locally with each S.
How does that differ from using a PGP key server (public or otherwise)?
> And in reverse, O could lookup the pub key of the signer to
> validate the origin.
Same thing again. And you could sign that key with O's key and only
accept keys that O had signed, preventing any key spoofing.
Mike
> --- "Michael H. Warfield" <mhw at wittsend.com> wrote:
>
> > Hello,
> >
> > On Wed, 2008-05-14 at 09:26 -0700, Kevin O'Neill Stoll
> > wrote:
> > > Hey guys,
> >
> > > Need some help with direction on encryption
> >
> > > Goal: I need to encryption plain text files while at
> > rest.
> > > One use case would be: files are received via ftp from
> > > various banks and should/could be encrypted with gpg
> > with
> > > the recipient defined as the consuming application, in
> > this
> > > case, Oracle Financials.
> >
> > > Problem: the consuming application will be receiving
> > > encrypted files from many sources, not just the ftp
> > host,
> > > so Oracle Financials has to know about a great many
> > public
> > > keys, assuming the use of gpg. How do I got about
> > managing
> > > these keys in a central way?
> >
> > Either I don't understand your application or you have
> > this completely
> > upside down. "Oracle Financials" only needs one key, its
> > private key.
> > All the other parties will have the public key and
> > encrypt the data to
> > that public key. Then, only Oracle Financials will be
> > able to decrypt
> > the files once it receives them.
> >
> > So, I'm assuming that originating source "S" encrypts to
> > key "O" and
> > then the data is transferred to "O" through some means
> > involving some
> > resting data at each end. "O" can then decrypt the data
> > as needed and
> > when needed and the data remains encrypted on storage.
> > "S" would then
> > have no means to even decrypt the data that they
> > generated unless they
> > added their own key (and a wise move would be to also
> > sign the data for
> > authentication purposes) or kept a copy for themselves
> > (very unwise).
> >
> > > I have looked into pks and sks, but catch here is they
> > > wanted something supported by our vendors (SuSE in this
> > > case).
> > >
> > > So, how do I manage a bunch of keys like this?
> > >
> > >
> > > If you don’t think gpg is the answer, I’m open to
> > ideas.
> > > I’m not stuck on anything at this point, just trying
> > to
> > > figure out how to roll an encryption solution that I
> > can
> > > ultimately hand off to an operations group and can
> > scale /
> > > support 500+ end-points.
> > >
> > > Also, not afraid of commercial solutions but would like
> > to
> > > exhaust any and all oss solutions first.
> > >
> > >
> > > Thanks
> > >
> > > PKS: http://pks.sourceforge.net/
> > >
> > > SKS: http://www.nongnu.org/sks/
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > Ale mailing list
> > > Ale at ale.org
> > > http://mail.ale.org/mailman/listinfo/ale
> > >
> > --
> > Michael H. Warfield (AI4NB) | (770) 985-6132 |
> > mhw at WittsEnd.com
> > /\/\|=mhw=|\/\/ | (678) 463-0932 |
> > http://www.wittsend.com/mhw/
> > NIC whois: MHW9 | An optimist believes we
> > live in the best of all
> > PGP Key: 0xDF1DD471 | possible worlds. A
> > pessimist is sure of it!
> >
> > > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
> > http://mail.ale.org/mailman/listinfo/ale
> >
>
>
>
>
>
--
Michael H. Warfield (AI4NB) | (770) 985-6132 | mhw at WittsEnd.com
/\/\|=mhw=|\/\/ | (678) 463-0932 | http://www.wittsend.com/mhw/
NIC whois: MHW9 | An optimist believes we live in the best of all
PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 307 bytes
Desc: This is a digitally signed message part
Url : http://mail.ale.org/pipermail/ale/attachments/20080514/29ae99e9/attachment.bin
More information about the Ale
mailing list