• Arthur Besse@lemmy.mlOP
    link
    fedilink
    English
    arrow-up
    0
    ·
    13 days ago

    Yes, you can make a signature using the private key and anyone can verify it using the corresponding public key.

    But, if the attacker can replace the public key they can also replace the signature with one made using their own key - so this doesn’t solve the problem of keys being unverified.

    If public keys were actually verified, signatures could protect the other fields in the profile packet from being modified. You could also theoretically use signatures to authenticate key rotation, by signing a packet containing your new public key using your old private key. But this doesn’t really work in the unreliable radio setting where some messages are likely to be missed.

    • shortwavesurfer@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      13 days ago

      Yeah, you absolutely need trust on first use and not allowing a new key to be used until the user has said that they trust it.