PGP implementation in the RIPE DB software
Elise Gerich
Fri Oct 28 17:49:59 CET 1994
Laurent,
This is great news!
--Elise
>Laurent Joncheray writes:
>
> I've ported PGP into the RIPE DB software has an authentification
> method for the maitainer stuff. Here is a summary of what i did so far.
> If you're interested in that work and want me to include my extention
> into the RIPE DB software please let me know. It's working and really
> easy to use.
> --
> Laurent
>
> PS: all files available on request.
>
> -----------------------------------------------------------------------------
>
> PGP implementation in the RIPE software. Summary.
> lpj. 10/27/94
>
> Authentication of the maintainer using pgp is defined by
> the 'auth' attribute. The value is 'PGP-FROM <pgp-user-id>'. Example:
>
> mntner: LPJ
> descr: The Boss
> admin-c: DK58
> tech-c: MT2
> tech-c: TB230
> upd-to: lpj at merit.edu
> mnt-nfy: lpj at merit.edu
> auth: PGP-FROM lpj at merit.edu
> mnt-by: LPJ
> changed: lpj at merit.edu 941026
>
> The user 'lpj at merit.edu' should have registered is pgp public
> key in the RR. He should signe all updated sent by mail to the RR with
> his secret key.
>
> Implementation:
>
> The mail is piped through two processes: 'pgp.pl' and 'dbupdate.
> 'dbupdate' is the RIPE tool to process updated from the mail. 'pgp.pl'
> is a perl script which checks the validity of the signature and
> 'unsignes' the mail. If the signature is ok pgp.pl add a new line in
> the mail header with the user ID of the pgp certifyed sender. It also
> add an error code. For example after processing by pgp.pl the mail looks
> like:
>
> From: Laurent Joncheray <lpj at merit.edu>
> Subject: test 26
> To: lpj at fox.merit.edu
> Date: Thu, 27 Oct 1994 13:00:04 -0400 (EDT)
> X-pgp-signature: lpj at merit.edu
> X-pgp-error: 0
>
> [...]
>
> All the pgp envelop has been stripped. pgp.pl reads the signed mail from
> std in and writes the unsigned mail to std out. The dbupdate tool
> authenticates the maintainer by comparing the 'X-pgp-signature' line with
> the PGP user ID provided in the auth attribute of the maintainer object.
>
> How to generate a secret/public key
>
> C.f. [PGP]. Sum up: use 'pgp -kg'
>
> How to register a public key
>
> C.f. [PGP]. Sum up: generate the public key from you key ring
> by using 'pgp -kxa <your-pgp-user-id> <file-where-to-store-the-key>'.
> Send <file-where-to-store-the-key> to the RR manager.
> The RR call the user to check the public key (with the key's fingerprint)
> and certify it.
>
> A.O.B
> The RR needs to agree on who owns the public keys (Here it's the
> user id under which dbupdate is run).
>
> Files:
> src/syntax.pl: hacked version to support the PGP-FROM authentication
> method.
> src/maintainer.pl: hacked version to support the PGP-FROM
> authentication method.
> src/pgp.pl: the PGP mail filter.
> src/dbupdate.sh: a sh script which pipes the mail through pgp.pl
> and dbupdate[.pl]
> doc/ripe-120++.txt: modified version of ripe-120.txt with support of
> the PGP-FROM method
> README.PGP: this file
>
> References:
>
> [PGP] MIT PGP 2.6.1, ftp://net-dist.mit.edu/pub/PGP/README :-)
>
>
-------- Logged at Tue Nov 1 18:25:58 MET 1994 ---------
[ rr-impl Archive ]