http://qs321.pair.com?node_id=246482


in reply to Re^3: Affero
in thread www.Affero.com and interview from slashdot

The thing is that the digital signature is inherently paired with the message it signs - so it won't work for any other message. You can copy it together with the orignal message but this would not make any harm to the poster.

Replies are listed 'Best First'.
Re^5: Affero
by LAI (Hermit) on Mar 28, 2003 at 16:41 UTC

    Update: I realize I'm doing sort of an apples-oranges thing talking about server-client relationships and signatures. Please ignore my brainfarting i.e, this node) until I manage to get my wits together and express myself more clearly.

    Of course the signature is paired with the message. But the logic that says "This signature matches that document" can't be on the client side, or it can be faked. That's why I suggested something like a database connection to verify authenticity. It's the digital equivalent of my bank calling me up and saying "Hey, did you write a cheque for $100 to the EFF?"

    Rule #1 of any client-server based encryption work or security-related programming: Don't trust the client.

    LAI

    __END__
      Rule #1 of any client-server based encryption - you have to trust someone.

      The normal flow of events is to sign a message digest with a private key. Given the corresponding public key, I can be gaurenteed the message is valid and it is from the person who sent it --- as long as I trust the public key. Now you could distrust the public key and do some type of db lookup. But PKC is set up so that as long as you trust the signer of the public key (the cert authority), you can trust the public key. The only time you would need to do any type of lookup was either the sender did not include the public key or if you failed to trust the sent public key. You could then do some type of database (ldap) lookup to retrieve a known, trusted public key for the sender.

      -derby