[asterisk-users] Security communication dilemma: your help needed

Kevin P. Fleming kpfleming at digium.com
Sat Jan 10 06:38:45 CST 2009


John Todd wrote:

> Desired procedure:  A public key signature method would be publicly  
> available via an SSL web page or various keyservers.  Individuals  
> could sign messages with the public key.  Signed messages sent to  
> "security@" would then be decrypted, and re-encrypted with the  
> security@ key and sent to the small list of end recipients.  Any  
> recipients who replied back to the message would have the process  
> happen in reverse, and also have copies if the reply sent (encrypted)  
> to the other members of this email "exploder" as well as the external  
> author.

Actually, a slight clarification is in order.

Let's assume for the moment that the security@ role is actually serviced
by developers A, B, C and D (not necessarily all Digium employees, but
Asterisk developers). Let's also assume that third-party X wants to send
a secure vulnerability report.

1) X retrieves the security@ public key from a reliable source; this key
would be countersigned by a large number of Asterisk developers to
ensure its authenticity.

2) X would compose their message, attach their GPG public key, digitally
sign the message using their GPG private key, then encrypt the entire
message using the security@ public key.

3) The message would be received by this super-duper email alias
processor, which would then (because it has the security@ private key),
decrypt the message, verify the signature from X, then store X's public
key in a local database along with some sort of thread ID for this
conversation.

4) The processor would then re-send the message to A, B, C and D, in
each case signing the message using the security@ public key and
encrypting it using the recipient's public key, so each copy of the
message leaving the processor can only be read by the recipient.

5) If A, B, C or D responds to the message (back to the security@
processor), they would also sign/encrypt their response, and the same
process would occur. However, since the processor would have the thread
ID (presumably in a References or In-Reply-To header in the reply), it
would also include X in the distribution of the reply, encrypting the
message using X's stored public key.

-- 
Kevin P. Fleming
Digium, Inc. | Director of Software Technologies
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
skype: kpfleming | jabber: kpfleming at digium.com
Check us out at www.digium.com & www.asterisk.org



More information about the asterisk-users mailing list