Visible to the public TOFU for OpenPGP

TitleTOFU for OpenPGP
Publication TypeConference Paper
Year of Publication2016
AuthorsWalfield, Neal H., Koch, Werner
Conference NameProceedings of the 9th European Workshop on System Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4295-7
Keywordsauthentication, Human Behavior, Metrics, mimicry, MITM, OpenPGP, PKI Trust Models, pubcrawl, Resiliency, Scalability, security, TOFU
Abstract

We present the design and implementation of a trust-on-first-use (TOFU) policy for OpenPGP. When an OpenPGP user verifies a signature, TOFU checks that the signer used the same key as in the past. If not, this is a strong indicator that a key is a forgery and either the message is also a forgery or an active man-in-the-middle attack (MitM) is or was underway. That is, TOFU can proactively detect new attacks if the user had previously verified a message from the signer. And, it can reactively detect an attack if the signer gets a message through. TOFU cannot, however, protect against sustained MitM attacks. Despite this weakness, TOFU's practical security is stronger than the Web of Trust (WoT), OpenPGP's current trust policy, for most users. The problem with the WoT is that it requires too much user support. TOFU is also better than the most popular alternative, an X.509-based PKI, which relies on central servers whose certification processes are often sloppy. In this paper, we outline how TOFU can be integrated into OpenPGP; we address a number of potential attacks against TOFU; and, we show how TOFU can work alongside the WoT. Our implementation demonstrates the practicality of the approach.

URLhttp://doi.acm.org/10.1145/2905760.2905761
DOI10.1145/2905760.2905761
Citation Keywalfield_tofu_2016