summaryrefslogtreecommitdiff
path: root/doc/conferences/lca2010/abstract
blob: 2770675389aca25a3ef5b10eb5227ab86ee5ca42 (plain)
  1. The Monkeysphere uses the OpenPGP web of trust to provide a
  2. distributed Public Key Infrastructure (PKI) for users and
  3. administrators of ssh. This talk is about why the Monkeysphere is
  4. useful, how it works, and how you can use it to ease your workload and
  5. automatically fully authenticate people and servers.
  6. The Secure Shell protocol has offered public-key-based mutual
  7. authentication since its inception, but popular implementations offer
  8. no formalized public key infrastructure. This means there is no
  9. straightforward, computable method to signal re-keying events, key
  10. revocations, or even basic key-to-identity binding (e.g. "host
  11. foo.example.org has key X"). As a result, dealing with host keys is
  12. usually a manual process with the possibility of tedium, room for
  13. error, difficulty of maintenance, or users and administrators simply
  14. ignoring or skipping baseline cryptographic precautions.
  15. The OpenPGP specification offers a robust public key infrastructure
  16. that has traditionally only been used for e-mail and for encrypted
  17. storage. By its nature, the OpenPGP Web of Trust (WoT) is a
  18. distributed system, with no intrinsic chokepoints or global
  19. authorities. And the global key distribution network provides
  20. commonly-held, public infrastructure for rapid distribution of key
  21. changes, revocations, and identity binding.
  22. The Monkeysphere mixes the two to provide new functionality for ssh
  23. (key revocation, key expiry, re-keying, fewer unintelligible prompts,
  24. semantic authorization, etc) while taking advantage of existing but
  25. often-unused functionality in OpenPGP. Additionally, the Monkeysphere
  26. implementation does not require any patches to OpenSSH on the client
  27. or server, but takes advantage of existing hooks, which makes it easy
  28. to adopt.
  29. Specifically, the Monkeysphere allows users to automatically validate
  30. ssh host keys through the Web of Trust, and it allows servers to
  31. identify authorized users through the Web of Trust. Users decide
  32. which certifications in the Web of Trust they put stock in (so they
  33. are not spoofed by spurious certifications of host keys). Server
  34. administrators decide whose certifications the server should put stock
  35. in (so that the server is not spoofed by spurious certifications of
  36. user keys).
  37. This presentation will go over how the Monkeysphere works; how you can
  38. use it to increase the security of servers you maintain; how you can
  39. use it to increase the security of accounts you connect to with ssh;
  40. and we'll discuss future possibilities lurking in the ideas of the
  41. Monkeysphere.
  42. Monkeysphere is currently available in the main Debian repository and
  43. as a port in FreeBSD. A Slackbuild is available for Slackware, and
  44. Monkeysphere itself should work on any POSIX-ish system with the
  45. appropriate dependencies available.
  46. The Monkeysphere project began to coalesce in early 2008, and remains
  47. an ongoing collaboration of many people, including:
  48. * Micah Anderson
  49. * Mike Castleman
  50. * Daniel Kahn Gillmor
  51. * Ross Glover
  52. * Matthew James Goins
  53. * Greg Lyle
  54. * Jamie McClelland
  55. * Jameson Graef Rollins
  56. The project's main web site is http://web.monkeysphere.info/