[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Confidant Mail



On 2/3/2015 10:31 AM, Kevin wrote:
On 2/3/2015 12:33 PM, krishna e bera wrote:
On 15-02-02 09:57 PM, Mike Ingle wrote:
http://www.confidantmail.org
Mike Ingle <mike@xxxxxxxxxxxxxxxxx>
d2b89e6f95e72e26e0c917d02d1847dfecfcd0c2
I am curious why someone delivering security and privacy software does
not have HTTPS on their webserver.  Also what is that string after your
email address for?

That string looks like a key

That string is indeed a key. The format is Name <email> keyid
and you can search for either the name or the keyid to find someone's key. If you search for the keyid you know you have the right key. If you search for the name, you have to verify the keyid somehow.

I don't have HTTPS because there is nothing secret on the site, and because I don't place much trust in it. The keyid in the announce posting has signed the code signing key, and the code signing key has signed
all the binaries, so you can validate the code integrity.

On 2/3/2015 9:26 AM, Steve Weis wrote:
Why are the Confident Mail PGP key, binaries, and signatures are all served over http?

Skimming over the code, it lacks any documentation or tests. I see blocks of commented-out code scattered through the files. I also see a lot of potentially unsafe input being concatenated together and used throughout the code.

I recommend that you warn people not to use this software for anything real yet. It needs a lot of work.
The commented-out code is mostly debug output and some test drivers. There was another separate test driver which is not part of the release. I left that in for now in case I need to test something; it will be removed eventually. The code has been tested quite a bit on Windows and Linux, including Tor and I2P.

The program is written in Python, which is an interpreted language with counted strings, so concatenating strings is not a dangerous operation. There are functions to validate the blocks using regular expressions.
There is also an option to open untrusted messages text-only.

The security is done using GPG, not in the Python code. The client also does not accept incoming connections. It's already being used to exchange large files and works fine. Yes it is beta software, but it is already more
secure than most conventional email.

MacOS binary package is close to working.

Mike Ingle <mike@xxxxxxxxxxxxxxxxx> d2b89e6f95e72e26e0c917d02d1847dfecfcd0c2


--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk