TOFU for OpenPGP
Title | TOFU for OpenPGP |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Walfield, Neal H., Koch, Werner |
Conference Name | Proceedings of the 9th European Workshop on System Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4295-7 |
Keywords | authentication, Human Behavior, Metrics, mimicry, MITM, OpenPGP, PKI Trust Models, pubcrawl, Resiliency, Scalability, security, TOFU |
Abstract | We present the design and implementation of a trust-on-first-use (TOFU) policy for OpenPGP. When an OpenPGP user verifies a signature, TOFU checks that the signer used the same key as in the past. If not, this is a strong indicator that a key is a forgery and either the message is also a forgery or an active man-in-the-middle attack (MitM) is or was underway. That is, TOFU can proactively detect new attacks if the user had previously verified a message from the signer. And, it can reactively detect an attack if the signer gets a message through. TOFU cannot, however, protect against sustained MitM attacks. Despite this weakness, TOFU's practical security is stronger than the Web of Trust (WoT), OpenPGP's current trust policy, for most users. The problem with the WoT is that it requires too much user support. TOFU is also better than the most popular alternative, an X.509-based PKI, which relies on central servers whose certification processes are often sloppy. In this paper, we outline how TOFU can be integrated into OpenPGP; we address a number of potential attacks against TOFU; and, we show how TOFU can work alongside the WoT. Our implementation demonstrates the practicality of the approach. |
URL | http://doi.acm.org/10.1145/2905760.2905761 |
DOI | 10.1145/2905760.2905761 |
Citation Key | walfield_tofu_2016 |