Currently, GPG supports using HTTP proxies, but not using SOCKS proxies. Before we get rid of Polipo, we should add support for SOCKS proxies to GPG so Windows users have some hope of torifying GPG. (Users of most Unixoid systems, now including MacOS and FreeBSD, can use torsocks to torify GPG.)
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
Also, gnupg's network code really isn't bad at all, and there isn't much of it: if we want to go via a patch route, it doesn't look as if it would be too hard.
That's great. The reality is this shouldn't block us from making releases without Polipo though. There are probably 2 people who use the gpg command line on Windows with Tor. It is almost certain that the other 7 GPG users on Windows use a GUI and would never even know to set proxy settings of any sort for the execution of gpg itself.
We can probably hack gpg to try connect to a bare IP and if it fails to connect with that error, we could take that as a hint that gpg isn't safe to use.
I don't think this is a solved problem on Windows.
On Mac OS X 10.5.8, I see that the popular gpg package ( https://www.gpgtools.org ) links against libcurl/7.16.3 and so it does not work. I suspect that other versions of Mac OS X will have other versions of libcurl. A version table would be nice - does anyone have one offhand?
I've heard that curl Version 7.21.4 is the version included in Mac OS X 10.8 - so that would likely be safe if it is properly used by gpgtools.
It appears that the versions of curl are as follows:
Mac OS X 10.8.x - 7.24.0
Mac OS X 10.7.4 - 7.21.4
Mac OS X 10.6 - 7.19.0
Mac OS X 10.5 - 7.16.2
Mac OS X 10.4 (intel) - 7.13.0
I'm guessing that information based on extracting version numbers from Apple's developer man page website. Painful and likely error prone.
If that is correct, I guess no version of gpg on Mac OS X 10.4.x -> 10.7.x would be likely to support such a proxy. It may be the case that Mac OS X 10.8.x has a newer curl release but I'm not sure.
Well - things just appear to get worse and worse here - I see the same SRV DNS leaks (DNS Standard query SRV _pgpkey-http._tcp.pool.sks-keyservers.net) even when we use an HTTP proxy. See this bug for how I setup a local HTTP proxy with shim:
https://trac.torproject.org/projects/tor/ticket/6060#comment:8
I thought that perhaps if we set '--no-auto-key-locate' - we would not leak DNS. It still leaks DNS as far as I am able to tell. It looks like the configuration option '--disable-dns-srv' at compile time may be the next best hope.
It seems like there isn't much of a patch required - either the current version of GPG is built against a curl with socks:// support or it isn't; either way, we'll need to smoke out all the stray dnsleaks.
I presume pka-lookups, cert, ldap modes of keylookup will likely also leak DNS.
In the case of pka-lookups it looks like internally (g10/gpg.c) it may require that we set 'no-auto-key-retrieve' - I'm not sure of the best way to trigger such a lookup. If anyone has suggestions, I'd love to know how to trigger it.
So now we're up to two DNS leak plugging key-server options:
no-auto-key-retrieve,no-try-dns-srv
I'll next look into the 'cert, ldap' code to see how it leaks and report back.
gpg --keyserver ///://keyserver.pgp.com --keyserver-options broken-http-proxy,no-auto-key-retrieve,no-try-dns-srv,http-proxy=http://127.0.0.1:8119,debug,verbose --recv-key 0x4193A197A special local host name (see line 359 of g10/keyserver.c):{{{gpg --keyserver x-hkp///keyserver.pgp.com --keyserver-options broken-http-proxy,no-auto-key-retrieve,no-try-dns-srv,http-proxy=http://127.0.0.1:8119,debug,verbose --recv-key 0x4193A197
That last one is funny and causes gpg to do something odd (looks like a bug to me...):
> GET http://x-hkp:11371///keyserver.pgp.com/pks/lookup?op=get&options=mr&search=0x4193A197 HTTP/1.1
Lucky for us - the proxy support is respected in all of the above cases.
To be specific - I need the above tests run (with tcpdump logging traffic) for gpg built against libcurl >= 7.21.7 - this should help us to see if the SOCKS5 proxy support is working properly.
To be specific - I need the above tests run (with tcpdump logging traffic) for gpg built against libcurl >= 7.21.7 - this should help us to see if the SOCKS5 proxy support is working properly.
To be specific - I need the above tests run (with tcpdump logging traffic) for gpg built against libcurl >= 7.21.7 - this should help us to see if the SOCKS5 proxy support is working properly.
Well - things just appear to get worse and worse here - I see the same SRV DNS leaks (DNS Standard query SRV _pgpkey-http._tcp.pool.sks-keyservers.net) even when we use an HTTP proxy.
This SRV DNS leak is analyzed and explained in chapter 3.6.6 (workaround see figure 4)
http://bit.ly/qDZm7C
Well - things just appear to get worse and worse here - I see the same SRV DNS leaks (DNS Standard query SRV _pgpkey-http._tcp.pool.sks-keyservers.net) even when we use an HTTP proxy.
This SRV DNS leak is analyzed and explained in chapter 3.6.6 (workaround see figure 4)
http://bit.ly/qDZm7C
i'm using these : Windows XP (SP3), Wireshark (1.8.1), Tor (0.2.2.39), polipo, Gpg4win (2.1.1 34299 beta), Thunderbird (12.0.1), Enigmail (1.4.2), other socks proxy server, other http-proxy server, Unbound (3rd party local DNS-Resolver), other network traffic monitoring software, etc.
This ticket's title seems obsolete, but I cannot rename it as it's unclear to me what is the expected outcome of this ticket. Now that the bundles don't ship a HTTP proxy anymore, I see two possible goals:
improving GnuPG torification in Torbirdy's gpg.conf, and future bundles that may include GnuPG; e.g. should no-try-dns-srv be added there?
It seems that the way to go is to first evaluate Torbirdy's gpg.conf wrt. the insight provided on this ticket, improve it if needed, and once happy, use it as a reference in the best practices doc. Perhaps we need two tickets for that, the latter being blocked by the former.
Documenting gnupg --keyserver-options no-try-dns-srv: it's given to the keyserver helper (gpgkeys_hkp), which polls the SRV record _pgpkey-http._tcp.KEYSERVERNAME (or _pgpkey-https._tcp.KEYSERVERNAME) to find out the real host and port. This is the code:
The GnuPG 2.1 branch uses dirmngr for key server communication. According to its documentation it supports the use-tor option. To quote the documentation
This option switches Dirmngr and thus GnuPG into "Tor mode" to route all network access via Tor (an anonymity network). WARNING: As of now this still leaks the DNS queries; e.g. to lookup the hosts in a keyserver pool. Certain other features are disabled if this mode is active.
The DNS leaks are probably caused by the dependence on SRV records to make these pools work and Tor not supporting these types of resource records.
For key server pools people can visit the SKS keyservers pool page. This page also mentions a hidden service. Using the hidden service bypasses the dependence on SRV records so someone would expect no DNS leaks. I've tested this solution by adding
keyserver hkp://jirk5u4osbsr34t5.onionuse-tor
to my ~/.gnupg/dirmngr.conf file. The subsequent packet capture showed no DNS leaks during execution of gnupg --search and gnupg --refresh-keys.
I forgot to mention that my previous post aims to provide proof that the initial problem of torifying GnuPG has been solved by GnuPG itself. I'm suggesting to close this ticket and open new tickets (if they don't exist already) to address the points in comment:46.