jammy (8) pgpverify.8.gz

Provided by: inn_1.7.2q-46build3_amd64 bug

NAME

       pgpverify - cryptographically verify Usenet control messages

SYNOPSIS

       pgpverify

DESCRIPTION

       The  pgpverify program reads (on standard input) a Usenet control message that has been cryptographically
       signed using the signcontrol program.  pgpverify then uses the pgp program to determine  who  signed  the
       control message.  If the control message was validly signed, pgpverify outputs (to stdout) the User ID of
       the key ID that signed the message.

OPTIONS

       The pgpverify program takes no options.

EXIT STATUS

       pgpverify returns the follow exit statuses for the following cases:

       0      The control message had a good PGP signature.

       1      The control message had no PGP signature.

       2      The control message had an unknown PGP signature.

       3      The control message had a bad PGP signature.

       255    A problem occurred not directly related to PGP analysis of signature.

AUTHOR

       David C Lawrence <tale@isc.org>

ENVIRONMENT

       pgpverify does not modify or otherwise alter the environment before invoking the pgp program.  It is  the
       responsibility  of  the person who installs pgpverify to ensure that when pgp runs, it has the ability to
       locate and read a PGP key file that contains the PGP public keys for  the  appropriate  Usenet  hierarchy
       administrators.

SEE ALSO

       pgp(1)

NOTES

       Historically, Usenet news server administrators have configured their news servers to automatically honor
       Usenet control messages based on the originator of the control messages and the hierarchies for which the
       control  messages  applied.  For example, in the past, David C Lawrence <tale@uunet.uu.net> always issued
       control messages for the "Big 8" hierarchies (comp, humanities, misc, news, rec, sci, soc, talk).  Usenet
       news  administrators  would  configure  their  news  server  software to automatically honor newgroup and
       rmgroup control messages that originated from David Lawrence and applied to any of the Big 8 hierarchies.

       Unfortunately, Usenet news articles (including control messages) are notoriously easy  to  forge.   Soon,
       malicious  users  realized  they  could  create or remove (at least temporarily) any Big 8 newsgroup they
       wanted by simply forging an appropriate control message in David Lawrence's name.  As Usenet became  more
       widely used, forgeries became more common.

       The  pgpverify  program  was  designed  to allow Usenet news administrators to configure their servers to
       cryptographically verify control messages before automatically  acting  on  them.   Under  the  pgpverify
       system,  a  Usenet hierarchy maintainer creates a PGP public/private key pair and disseminates the public
       key.  Whenever the hierarchy maintainer issues a control message, he uses the signcontrol program to sign
       the control message with the PGP private key.  Usenet news administrators configure their news servers to
       run the pgpverify program on the appropriate control messages, and take action based on the PGP key  User
       ID that signed the control message, not the name and address that appear in the control message's From or
       Sender headers.

       Thus, using the signcontrol and pgpverify programs appropriately essentially eliminates  the  possibility
       of  malicious users forging Usenet control messages that sites will act upon, as such users would have to
       obtain the PGP private key in order to  forge  a  control  message  that  would  pass  the  cryptographic
       verification step.  If the hierarchy administrators properly protect their PGP private keys, the only way
       a malicious user could forge a validly-signed control message would be by  breaking  the  RSA  encryption
       algorithm, which (at least at this time) is believed to be an NP-complete problem.  If this is indeed the
       case, discovering the PGP private key based on the PGP public key is computationally impossible  for  PGP
       keys of a sufficient bit length.

       <URL:ftp://ftp.isc.org/pub/pgpcontrol/>  is  where  the most recent versions of signcontrol and pgpverify
       live, along with PGP public keys used for hierarchy administration.

                                                                                                    pgpverify(8)