McAfee MEJCAE-AM-DA Product Guide - Page 49

Checking a key’s validity, Viewing signatures on a key

Page 49 highlights

Working with Digital Signatures Validity and trust Checking a key's validity Viewing signatures on a key To view the signatures on a key use the --key-list option with the --with-sigs modifier. E-Business Server displays all the keys on your keyring and then, for each key, the signatures on the key. It also displays the level of trust you have in each key and its validity, and verifies the signatures. ebs --key-list --with-sigs E-Business Server lists the keys on your keyring with the signatures for each key. The signatures are represented with "sig" in the Type column. For more information on the variations of the --key-list option, see Viewing your keys on page 28. Getting more information about signatures on a key You may want to display information about a signature on a key, such as the signature's creation date or expiration date. Use the --sig-detail option with the --signer modifier to list information about a signature on a key. ebs --sig-detail --signer For example, if there is a signature belonging to David Gibson on Odette Richards key, then I can view information about David's signature by entering the following command: ebs --sig-detail "Odette Richards" --signer "David Gibson" E-Business Server displays information about David's signature. Viewing a key's fingerprint You can check that a certificate is valid by calling the key's owner (so that you originate the transaction) and asking the owner to read his or her key's fingerprint to you and verifying that fingerprint against the one you believe to be the real one. To do so, both you and the key's owner use the --key-detail option to view the key's fingerprint: ebs --key-detail [--fingerprint-view hex|words] This command instructs E-Business Server to display the key with the 40 character digest of the public key components (RSA Legacy keys have 32 character fingerprints). Read the fingerprint to the key's owner to see if the fingerprints match. Using this procedure, you can verify and sign each other's keys with confidence. This is a safe and convenient way to get the key trust network started for your circle of friends. Note that sending a key fingerprint via email is not the best way to verify the key because email can be intercepted and modified. It is best to use a different channel than the one that was used to send the key itself. A good combination is to send the key via email, and verify the key fingerprint via a voice telephone conversation. Some people even distribute their key fingerprint on their business cards. The default format of a fingerprint view is a hexadecimal display. If you would prefer to display the fingerprint as a word list, set the --fingerprint-view option to words. This can also be set in the E-Business Server configuration file. The word list is made up of special authentication words that E-Business Server uses and are carefully selected to be phonetically distinct and easy to understand without phonetic ambiguity. The word list serves a similar purpose as the military alphabet, which allows pilots to convey information distinctly over a noisy radio channel. If you'd like to know more about the word hash technique and view the word list, see Biometric Word Lists Granting trust for key validations Trust is confidence in another person's ability to validate a key. If you designate someone a trusted introducer, then all keys validated by the trusted introducer are considered to be valid to you. 47 E-Business Server™ 8.6 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

47
E-Business Server
8.6
Product Guide
Working with Digital Signatures
Validity and trust
Checking a key’s validity
Viewing signatures on a key
To view the signatures on a key use the
--key-list
option with the
--with-sigs
modifier. E-Business Server
displays all the keys on your keyring and then, for each key, the signatures on the key. It also displays the
level of trust you have in each key and its validity, and verifies the signatures.
ebs --key-list --with-sigs
E-Business Server lists the keys on your keyring with the signatures for each key. The signatures are
represented with “
sig
” in the
Type
column.
For more information on the variations of the
--key-list
option, see
Viewing your keys
on page 28
.
Getting more information about signatures on a key
You may want to display information about a signature on a key, such as the signature’s creation date or
expiration date. Use the
--sig-detail
option with the
--signer
modifier to list information about a signature
on a key.
ebs --sig-detail <userID> --signer <userID of signing key>
For example, if there is a signature belonging to David Gibson on Odette Richards key, then I can view
information about David’s signature by entering the following command:
ebs --sig-detail “Odette Richards” --signer “David Gibson”
E-Business Server displays information about David’s signature.
Viewing a key’s fingerprint
You can check that a certificate is valid by calling the key’s owner (so that you originate the transaction) and
asking the owner to read his or her key’s fingerprint to you and verifying that fingerprint against the one you
believe to be the real one.
To do so, both you and the key’s owner use the
--key-detail
option to view the key’s fingerprint:
ebs --key-detail <userID> [--fingerprint-view hex|words]
This command instructs E-Business Server to display the key with the 40 character digest of the public key
components (RSA Legacy keys have 32 character fingerprints). Read the fingerprint to the key’s owner to
see if the fingerprints match.
Using this procedure, you can verify and sign each other’s keys with confidence. This is a safe and convenient
way to get the key trust network started for your circle of friends.
Note that sending a key fingerprint via email is not the best way to verify the key because email can be
intercepted and modified. It is best to use a different channel than the one that was used to send the key
itself. A good combination is to send the key via email, and verify the key fingerprint via a voice telephone
conversation. Some people even distribute their key fingerprint on their business cards.
The default format of a fingerprint view is a hexadecimal display. If you would prefer to display the fingerprint
as a word list, set the
--fingerprint-view
option to
words
. This can also be set in the E-Business Server
configuration file.
The word list is made up of special authentication words that E-Business Server uses and are carefully
selected to be phonetically distinct and easy to understand without phonetic ambiguity.
The word list serves a similar purpose as the military alphabet, which allows pilots to convey information
distinctly over a noisy radio channel. If you’d like to know more about the word hash technique and view the
word list, see
Biometric Word Lists
Granting trust for key validations
Trust
is confidence in another person’s ability to validate a key. If you designate someone a
trusted
introducer
, then all keys validated by the trusted introducer are considered to be valid to you.