From openmind@apollo.lv Fri May 1 14:27:50 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A5DA93A679F for ; Fri, 1 May 2009 14:27:50 -0700 (PDT) X-Quarantine-ID: X-Virus-Scanned: amavisd-new at amsl.com X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char AE hex): Subject: SALE 75% OFF on VIAGRA\256 \n X-Spam-Flag: NO X-Spam-Score: -54.613 X-Spam-Level: X-Spam-Status: No, score=-54.613 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DRUGS_ERECTILE=1, DRUG_ED_CAPS=0.322, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, GB_I_LETTER=-2, GB_PHARMACY=1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RDNS_DYNAMIC=0.1, SARE_UNI=0.591, SUBJECT_NEEDS_ENCODING=0.001, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vpp4Qe9UqFPP for ; Fri, 1 May 2009 14:27:42 -0700 (PDT) Received: from ip-85-160-3-77.eurotel.cz (ip-85-160-3-77.eurotel.cz [85.160.3.77]) by core3.amsl.com (Postfix) with SMTP id F0B4B3A69A8 for ; Fri, 1 May 2009 14:27:37 -0700 (PDT) Content-Return: allowed X-Mailer: CME-V6.5.4.3; MSN Received: (qmail 2768 by uid 168); Fri, 1 May 2009 11:29:12 +0100 Message-Id: <20090501122912.2770.qmail@ip-85-160-3-77.eurotel.cz> To: Subject: SALE 75% OFF on VIAGRA® From: MIME-Version: 1.0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit Date: Fri, 1 May 2009 14:27:37 -0700 (PDT) Bernat® Newsletter - Spring 2009

This e-mail was sent to you by Pharmacy®. You are receiving this email because you have subscribed to the Viagra® newsletter with the following address: openpgp-archive@ietf.org.

View Web Version || Privacy policy | Contact us


Member's Newsletter
Summer 2008
Satisfaction Guaranteed - Our Company wants you to be absolutely satisfied with your pharmacy.
If, within 30 days of receiving your purchase you're not completely
satisfied, return it for the price you paid or we will gladly replace it.

Web Exclusive Satin Lace Cardigan

Buy Online

You are receiving this email because you have subscribed to the Pharmacy® newsletter with the following address: openpgp-archive@ietf.org.

Unsubscribe | Privacy policy | Contact us

© 2008 Pharmacy All rights reserved.

From openmind710@eircom.net Sat May 2 14:04:08 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 807563A6EA8 for ; Sat, 2 May 2009 14:04:08 -0700 (PDT) X-Quarantine-ID: X-Virus-Scanned: amavisd-new at amsl.com X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char AE hex): Subject: XW: SALE 45% OFF on VIAGRA\256\n X-Spam-Flag: NO X-Spam-Score: -25.65 X-Spam-Level: X-Spam-Status: No, score=-25.65 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DRUGS_ERECTILE=1, DRUG_ED_CAPS=0.322, FH_RELAY_NODNS=1.451, GB_I_LETTER=-2, HELO_MISMATCH_COM=0.553, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SUBJECT_NEEDS_ENCODING=0.001, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fcWhrP4fEUr3 for ; Sat, 2 May 2009 14:04:01 -0700 (PDT) Received: from amerblind.outbound.ed10.com (unknown [213.215.67.24]) by core3.amsl.com (Postfix) with SMTP id 4117B3A6EA3 for ; Sat, 2 May 2009 14:04:00 -0700 (PDT) X-Originating-IP: [74.8.059.73] X-Originating-Email: [openpgp-archive@ietf.org] X-Sender: openpgp-archive@ietf.org To: Subject: XW: SALE 45% OFF on VIAGRA® From: 2002-2009 Pfizer Inc. MIME-Version: 1.0 Importance: High Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit Message-Id: <20090502210401.4117B3A6EA3@core3.amsl.com> Date: Sat, 2 May 2009 14:04:00 -0700 (PDT) Welcome to WebMD
Welcome to WebMD
 •  Sat, 2 May 2009 11:05:36 +0100
New from WebMD: Dear openpgp-archive@ietf.org!The Internet Drug Index for prescription drugs Sign-up today!

You are subscribed as openpgp-archive@ietf.org.
View and manage your WebMD newsletter preferences.
Subscribe to more newsletters. Change/update your email address.

WebMD Privacy Policy
WebMD Office of Privacy
1175 Peachtree Street, Suite 2400, Atlanta, GA 30361
© 2009 WebMD, LLC. All rights reserved.
From owner-ietf-openpgp@mail.imc.org Mon May 4 07:56:38 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9E07F3A7055 for ; Mon, 4 May 2009 07:56:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ACaElBHl81mk for ; Mon, 4 May 2009 07:56:37 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E36BB3A6962 for ; Mon, 4 May 2009 07:55:46 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ef55i048913 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ef5lx048912; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Eerru048893 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Eek5u019879 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 10:40:53 -0400 Message-Id: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Changing GPG's default key type Date: Mon, 4 May 2009 10:40:52 -0400 X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Hi, Currently, GPG's default key type, the one that is recommended to all new users, is a DSA primary key (1024 bits - not "DSA2") with an Elgamal subkey. We are currently thinking about changing the default primary to a 2048-bit RSA key. The main benefits of changing the key type is that it can go past the 1024 bit DSA1 limit, and would also not be limited to a 160-bit hash, both of which are getting a little long in the tooth. We could get similar benefits with a DSA2 key, but DSA2 is not nearly as widely implemented as RSA is, so is not a good option for a default key at this time. We will of course continue supporting DSA2 (and DSA "1") as we do now. This is purely a question of what the default key should be. This is not directly prompted by the recent SHA-1 troubles, but it is somewhat related, as it would let users of the default key type use hashes larger than 160 bits. That said, this is not intended to be a fix for the SHA-1 problems. We are not proposing changing our default signing hash, which will remain SHA-1. After a bit of internal discussion, we thought it was worth mentioning this here, to see if the OpenPGP community had any issue or other comments. I don't expect this to be a particularly controversial move, but discussion is always welcome. One issue, of course, is that RSA is not a required key type in OpenPGP, so there could be some implementation out there that won't be able to handle it. I'm not terribly concerned about this, as in practice, the vast majority of code has handled RSA just fine for the past decade, and if a particular user needs to generate a non-RSA key, they can still do so. There are a few other details (RSA signatures are physically larger, etc), but I believe they are outweighed by the benefit of the larger key and additional hash flexibility. David From owner-ietf-openpgp@mail.imc.org Mon May 4 08:41:40 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5EA963A6CD2 for ; Mon, 4 May 2009 08:41:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.378 X-Spam-Level: X-Spam-Status: No, score=-3.378 tagged_above=-999 required=5 tests=[AWL=-1.445, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, SARE_OBFU_MATERIALLY=1.666] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R+gNrimpZlBY for ; Mon, 4 May 2009 08:41:39 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 22A903A7093 for ; Mon, 4 May 2009 08:41:26 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44FVMU1052728 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 08:31:23 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44FVMb5052727; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44FVB9L052711 for ; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 49473 invoked from network); 4 May 2009 15:31:09 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 15:31:09 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF0A74.5030805@fifthhorseman.net> Date: Mon, 04 May 2009 11:32:04 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> In-Reply-To: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig0EEC22D02892A3EDBBB25B03" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig0EEC22D02892A3EDBBB25B03 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 04/30/2009 06:39 PM, David Shaw wrote: >=20 > http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf >=20 > There is not much hard information yet, but the two big quotes are > "SHA-1 collisions now 2^52" and "Practical collisions are within > resources of a well funded organisation." Ugh. i didn't think this would happen this soon. I'd like to formally suggest that we need to re-open this working group and begin discussion on a new revision of the OpenPGP draft. Whether or not the above report turns out to have legitimate theoretical grounding (i've only read the abstract, and don't know if my math would be sufficient to evaluate a full report anyway), we know that there are explicit dependencies on SHA-1 in OpenPGP that need to be made more flexible. Here are some key points that need to be adjusted w.r.t. digest algorithm= s: a) Fingerprints: these are currently SHA-1 hashes of the public key mateerial. One proposal is to continue hashing the exact same data but to prefix the fingerprint with the canonical name of the digest algorithm used, separated by an unambiguous delimiter (i'm using - because : seems pretty overloaded in a lot of places, but i'm sure we can collaboratively choose a good delimiter). So in that case, my current fingerprint would be re-written as: SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 b) fix the Revocation Key (subpacket 12) to indicate digest algorithm and variable length data. A poorly-worded attempt at a revision: 5.2.3.15. Revocation Key (1 octet of class, 1 octet of public-key algorithm ID, 1 octet of digest algorithm, N octets of digest) Authorizes the specified key to issue revocation signatures for this key. Class octet must have bit 0x80 set. If the bit 0x40 is set, then this means that the revocation information is sensitive. If bit 0x20 is unset, the digest algorithm is assumed to be SHA-1, and no octet identifying the digest algorithm is included. Implementations SHOULD set bit 0x20 and explicitly include the hash identifier. Other bits are for future expansion to other kinds of authorizations. This is found on a self-signature. If the "sensitive" flag is set, the keyholder feels this subpacket contains private trust information that describes a real-world sensitive relationship. If this flag is set, implementations SHOULD NOT export this signature to other users except in cases where the data needs to be available: when the signature is being sent to the designated revoker, or when it is accompanied by a revocation signature from that revoker. Note that it may be appropriate to isolate this subpacket within a separate signature so that it is not combined with other subpackets that need to be exported. c) settling on a new "lowest-common-denominator" hash aside from SHA-1 (or discarding the idea of a lowest-common-denominator hash?) Some other possible changes: d) suggesting new defaults for key choices (does this mean avoiding DSA1, for example, or other algorithms that rely on 160-bit hashes?) e) allow injection of arbitrary key material at the head of signatures to allow signers to to avoid a chosen-prefix attack? This would make it significantly more difficult to predict the hash that someone will sign, which makes birthday attack collisions more difficult to pull off since the signer cannot be compelled to sign a particular hash. f) explicit introduction of new hashes/ciphers/asymmetric algorithms? I've probably missed something. What else should be addressed? What steps are necessary to get the WG back in order again? Or is that not needed? --dkg --------------enig0EEC22D02892A3EDBBB25B03 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf8KeczS7ZTSFznpAQo3VQ/9EnJgcDEjIxKrIZaWX8JR5fRyyVyEGN0C 1UPPOE7YB6sOScQPAhE7+6S65sekfcMIlhGPMSsPu6QkxjRCHo7P6sRcJ9C8tZY1 vIxumm5zFzrxvGla1IIiLqgMXaQyjD/11AGwV4pWJxdMa5eFPVElz8/EHggmXkbG GKg7jY/m3Rbkjabkc87rD6+ZkzBRJDq1kKQ8ep13Ucp4u8w80njWKYaJa0fe4vDx VYbkZVOvVN3A0QYGXOrdmkpDry9XbXbrBmZxMo93a1MA1h6s8wd5TOQcoZAkTR92 mDcrbRFbeU1gOmXLfnfL9nXEj+gOf6BGF+dZILgaxEPsmPYwbJ3OvddKbBzcA2cu Mulv38iaWsFNeuvNLC12SE12I9T8dxywKnaHGL7O1RB9kGBWYYHsDGzthLqkvBEF UKlqZ41M8vR+xvSA6SBKl9qAcuyO+a4pObHmOMCjmiTBjmtAjsGAo6O+E9rNuSSa r76rNk/DgA81bjzTUNMc3+8qv+UwBulU3dFIfD9chWI9TVQCi43PcoQcCdvlnm0e e7JRZuGGuQfzaSzJg0LHgAoVUY9QOKsaS7c7TFbDS/vEnQCmzEkaSo512PzLAwwn fwE0h+kHJU087If950aujlRnu/7a8KcJiyGig4aZRYOXu6kZe4iQjnr5l+RpdRXP ycwuZiPEKTA= =q4zH -----END PGP SIGNATURE----- --------------enig0EEC22D02892A3EDBBB25B03-- From owner-ietf-openpgp@mail.imc.org Mon May 4 10:33:12 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8A9323A7133 for ; Mon, 4 May 2009 10:33:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gkbt1+0xPfat for ; Mon, 4 May 2009 10:33:11 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4211D3A7138 for ; Mon, 4 May 2009 10:30:55 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HLKBC060640 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HLKEc060639; Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HL9fc060629 for ; Mon, 4 May 2009 10:21:19 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:21902) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M11qk-0002WV-45 (Exim 4.69) (return-path ); Mon, 04 May 2009 18:21:06 +0100 Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 5D21F5D65; Mon, 4 May 2009 18:21:03 +0100 (GMT/BST) Message-ID: <49FF23FF.9020701@systemics.com> Date: Mon, 04 May 2009 19:21:03 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: David Shaw Cc: IETF OpenPGP Working Group Subject: Re: Changing GPG's default key type References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 4/5/09 16:40, David Shaw wrote: > We are currently thinking about changing the default primary to > a 2048-bit RSA key. I see no problems here, I would agree with the shift to RSA 2048 as the default. iang From owner-ietf-openpgp@mail.imc.org Mon May 4 10:36:52 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E96933A7091 for ; Mon, 4 May 2009 10:36:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1fCG+n7s+cTs for ; Mon, 4 May 2009 10:36:52 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D55F13A7092 for ; Mon, 4 May 2009 10:36:49 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSvOG061013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HSv4D061012; Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailgw01.dd24.net (mailgw01.dd24.net [217.188.214.191]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSjCk060991 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 10:28:56 -0700 (MST) (envelope-from calestyo@scientia.net) Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw01.dd24.net (Postfix) with ESMTPA id 0FE127CC66D; Mon, 4 May 2009 17:28:44 +0000 (GMT) Subject: Re: Changing GPG's default key type From: Christoph Anton Mitterer To: David Shaw Cc: IETF OpenPGP Working Group In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-H+nUPs1cUv+b2JQsJxx7" Date: Mon, 04 May 2009 19:28:43 +0200 Message-Id: <1241458123.4024.2.camel@fermat.scientia.net> Mime-Version: 1.0 X-Mailer: Evolution 2.26.1.1 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --=-H+nUPs1cUv+b2JQsJxx7 Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote: > We are currently thinking about changing the default =20 > primary to a 2048-bit RSA key. Nice :-) > We are not proposing changing our default =20 > signing hash, which will remain SHA-1. Uhm.. why not? Chris. --=-H+nUPs1cUv+b2JQsJxx7 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Disposition: attachment; filename="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQ/DCCBXQw ggNcoAMCAQICAjh/MA0GCSqGSIb3DQEBBQUAMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYD VQQLExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3Qw HhcNMDcxMDI0MTkyNzQxWhcNMDkxMDIzMTkyNzQxWjB8MSEwHwYDVQQDExhDaHJpc3RvcGggQW50 b24gTWl0dGVyZXIxJDAiBgkqhkiG9w0BCQEWFWNhbGVzdHlvQHNjaWVudGlhLm5ldDExMC8GCSqG SIb3DQEJARYibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAPgLlUBy3NRbH25w8pOnhF+qtj4GN04aG7ur+JsXTcEkFNOZWZ5I al2PaQWP7GfEEp5lL0w/LdYXPfnLNohp4l/Nb+db8aHUeVBYgGBTPGF+mJHfJGeochfvZo78u6Bp KkCrDAw2BKN1JNxw+OxmWuunCmXSFM9gqRfBnfmc25P6ba9tQlDXGLKZA8/JKXLMKcTTS7dIkroE bM5FTSaAmGWkvwnD6fpxjFgWNLXjagNqlQD6+q+a//+gXNOGP34aZ3qPnLPR/gUi/yqrQuAVvGep GAhl4B1Kn+c7eROoodq33Ghomoznh8hogBkDJXp+Xq4k8measwtN99ZUdMaFeJsCAwEAAaOCASYw ggEiMAwGA1UdEwEB/wQCMAAwVgYJYIZIAYb4QgENBEkWR1RvIGdldCB5b3VyIG93biBjZXJ0aWZp Y2F0ZSBmb3IgRlJFRSBoZWFkIG92ZXIgdG8gaHR0cDovL3d3dy5DQWNlcnQub3JnMEAGA1UdJQQ5 MDcGCCsGAQUFBwMEBggrBgEFBQcDAgYKKwYBBAGCNwoDBAYKKwYBBAGCNwoDAwYJYIZIAYb4QgQB MDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYWaHR0cDovL29jc3AuY2FjZXJ0Lm9yZzBEBgNV HREEPTA7gRVjYWxlc3R5b0BzY2llbnRpYS5uZXSBIm1haWxAY2hyaXN0b3BoLmFudG9uLm1pdHRl cmVyLm5hbWUwDQYJKoZIhvcNAQEFBQADggIBAKZI/PvI6ynlgITrRTU7WaFlllAtkWCC6MGKEE16 hUebNwK/ccjUquHLfDg2LYbp/WHx3zZQxkj7CarzMUqnoDTnJMbKovDOdZ3vqbs6p6fKuRUjTkaE cN/0ZDllc4Bewa5ZUfdD2Ml3ObxF2oK7wmTw4tQCSKZlPcq+ML5hV3Exag2fBcGzeR+G/QUWKcmY laOpRj8Vu8ZMXpzSD8T+Tp2nKP+iqa2lv+UCI6cSXJ+fdyVMB1Tw98TdRo2ogk38ZhdlxpEDRonW kWuBmS9e7lABqVpyfVAuODF3cKfbxWJnFBkipEJzkpSUsCFQ0SSxs5xkad/bAFF3g1p+E9+EnZMe UJ55L2ZEEtFfgfsPo0N/M7QvWS8COPSwttdSgiXFm9/WHPxu10D6mb/ghNeUFRTrn8miZOer+3p+ 8TRruFMazmsak0emJ8dxsTCdbWZzJEqgz833uttaqZWbHsNY7FuIcj242RTsgetkIRHzaxpKxmUY NnF78vxm3HW/ZX1OpOQsLIT5t+7YDKuLGB15dJnQjQFy9w8TZFaoFUSd39rFdrFtfps7FWb73yov Zcz42a8MrxBcWpZWzpif59TT34IJEEN1/+bXPMGELyT417DIoV8faB6GPKCFV0l7G1TEJTYlobbZ rYVb8B7a0Uu1lPgyxLWlZLWiTYDQF2y8U3KWMIIFdDCCA1ygAwIBAgICOH8wDQYJKoZIhvcNAQEF BQAwVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cuQ0FjZXJ0Lm9y ZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDAeFw0wNzEwMjQxOTI3NDFaFw0wOTEwMjMx OTI3NDFaMHwxITAfBgNVBAMTGENocmlzdG9waCBBbnRvbiBNaXR0ZXJlcjEkMCIGCSqGSIb3DQEJ ARYVY2FsZXN0eW9Ac2NpZW50aWEubmV0MTEwLwYJKoZIhvcNAQkBFiJtYWlsQGNocmlzdG9waC5h bnRvbi5taXR0ZXJlci5uYW1lMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+AuVQHLc 1FsfbnDyk6eEX6q2PgY3Thobu6v4mxdNwSQU05lZnkhqXY9pBY/sZ8QSnmUvTD8t1hc9+cs2iGni X81v51vxodR5UFiAYFM8YX6Ykd8kZ6hyF+9mjvy7oGkqQKsMDDYEo3Uk3HD47GZa66cKZdIUz2Cp F8Gd+Zzbk/ptr21CUNcYspkDz8kpcswpxNNLt0iSugRszkVNJoCYZaS/CcPp+nGMWBY0teNqA2qV APr6r5r//6Bc04Y/fhpneo+cs9H+BSL/KqtC4BW8Z6kYCGXgHUqf5zt5E6ih2rfcaGiajOeHyGiA GQMlen5eriTyZ5qzC0331lR0xoV4mwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIwADBWBglghkgB hvhCAQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQgb3ZlciB0 byBodHRwOi8vd3d3LkNBY2VydC5vcmcwQAYDVR0lBDkwNwYIKwYBBQUHAwQGCCsGAQUFBwMCBgor BgEEAYI3CgMEBgorBgEEAYI3CgMDBglghkgBhvhCBAEwMgYIKwYBBQUHAQEEJjAkMCIGCCsGAQUF BzABhhZodHRwOi8vb2NzcC5jYWNlcnQub3JnMEQGA1UdEQQ9MDuBFWNhbGVzdHlvQHNjaWVudGlh Lm5ldIEibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTANBgkqhkiG9w0BAQUFAAOC AgEApkj8+8jrKeWAhOtFNTtZoWWWUC2RYILowYoQTXqFR5s3Ar9xyNSq4ct8ODYthun9YfHfNlDG SPsJqvMxSqegNOckxsqi8M51ne+puzqnp8q5FSNORoRw3/RkOWVzgF7BrllR90PYyXc5vEXagrvC ZPDi1AJIpmU9yr4wvmFXcTFqDZ8FwbN5H4b9BRYpyZiVo6lGPxW7xkxenNIPxP5Onaco/6KpraW/ 5QIjpxJcn593JUwHVPD3xN1GjaiCTfxmF2XGkQNGidaRa4GZL17uUAGpWnJ9UC44MXdwp9vFYmcU GSKkQnOSlJSwIVDRJLGznGRp39sAUXeDWn4T34Sdkx5QnnkvZkQS0V+B+w+jQ38ztC9ZLwI49LC2 11KCJcWb39Yc/G7XQPqZv+CE15QVFOufyaJk56v7en7xNGu4UxrOaxqTR6Ynx3GxMJ1tZnMkSqDP zfe621qplZsew1jsW4hyPbjZFOyB62QhEfNrGkrGZRg2cXvy/Gbcdb9lfU6k5CwshPm37tgMq4sY HXl0mdCNAXL3DxNkVqgVRJ3f2sV2sW1+mzsVZvvfKi9lzPjZrwyvEFxallbOmJ/n1NPfggkQQ3X/ 5tc8wYQvJPjXsMihXx9oHoY8oIVXSXsbVMQlNiWhttmthVvwHtrRS7WU+DLEtaVktaJNgNAXbLxT cpYwggYIMIID8KADAgECAgEBMA0GCSqGSIb3DQEBBAUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0ExHjAc BgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1 dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNlcnQub3JnMB4XDTA1MTAxNDA3MzY1 NVoXDTMzMDMyODA3MzY1NVowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6 Ly93d3cuQ0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAKtJNRFIfNImflOUz0Op3SjXQiqL84d4GVh8D57aiX3h++ty kA10oZZkq5+gJJlz2uJVdscXe/UErEa4w75/ZI0QbCTzYZzA8pD6Ueb1aQFjww9W4kpCz+JEjCUo qMV5CX1GuYrz6fM0KQhF5Byfy5QEHIGoFLOYZcRD7E6CjQnRvapbjZLQ7N6QxX8KwuPr5jFaXnQ+ lzNZ6MMDPWAzv/fRb0fEze5ig1JuLgiapNkVGJGmhZJHsK5I6223IeyFGmhyNav/8BBdwPSUp2rV O5J+TJAFfpPBLIukjmJ0FXFuC3ED6q8VOJrU0gVyb4z5K+taciX5OUbjchs+BMNkJyIQKopPWKcD rb60LhPtXapI19V91Cp7XPpGBFDkzA5CW4zt2/LP/JaT4NsRNlRiNDiPDGCbO5dWOK3z0luLoFvq Tpa4fNfVoIZwQNORKbeiPK31jLvPGpKK5DR7wNhsX+kKwsOnIJpa3yxdUly6R9Wb7yQocDggL9V/ KcCyQQNokszgnMyXS0XvOhAKq3A6mJVwrTWx6oUrpByAITGprmB6gCZIALgBwJNjVSKRPFbnr9s6 JfOPMVTqJouBWfmh0VMRxXudA/Z0EeBtsSw/LIaRmXGapneLNGDRFLQsrJ2vjBDTn8Rq+G8T/HNZ 92ZCdB6K4/jc0m+YnMtHmJVABfvpAgMBAAGjgb8wgbwwDwYDVR0TAQH/BAUwAwEB/zBdBggrBgEF BQcBAQRRME8wIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLkNBY2VydC5vcmcvMCgGCCsGAQUFBzAC hhxodHRwOi8vd3d3LkNBY2VydC5vcmcvY2EuY3J0MEoGA1UdIARDMEEwPwYIKwYBBAGBkEowMzAx BggrBgEFBQcCARYlaHR0cDovL3d3dy5DQWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDANBgkqhkiG 9w0BAQQFAAOCAgEAfwiIodoaUEnaifuhCHLzivcexDq0eVsgMLFF3sJd02Vp8cJdVFQ8hV+5e0KR wpn9G1Gbq0aloRBTnm2IrHNuLDOm8PSe4HXBPohFqeFmQ/5WWtF6QXj3QNpKOvELW6W7FgbmwueT uYVNl0+xHjhDgO+bDYzvuKdgAIdXfR5EHMsj75s8mZ2vtSkcRXkWlk0nbfEcbMPCVWSzvBTi86Qf HjL8JxUFz90urj6CYXvwIRAY9kTqUzn53NCaIODGu+C7Wk/EmcgHvbW9otsuYg1CNEG8/4uK9VEi qogwAOKw1Ly+ZbrVA1d5m+jcyE34UO2RpVIooqz7Nlg+6ZQrkVCHG9Ze1ozM9w8QDFJO0BZh5eUK bL8Xx3JGV5yY9WxgY3pvXrlOL8i5ubtqhbyYDe35PpeENJSuAK+h5eeSbk698+LZFItc0usBbKAX pS0Q65x6Sr297s797SJAq3A4iPUKh2rCqwVgyUgF2lPB3kR3arPzPDztgLymOEopJF/+WTubJXpW YwBkuV2kYn1XNk+tg+8fklOgjndX3eVhET0jAJBMPPqjYJMEo6819g5qj09KYKeFBWxGoY/0x3bj oVlX93GyxG4UXG1tQWbfG5Ox1ADD7svPPD0hgKlfY2X83eBfpPQr8IVxQdRnJfsasZeu1pmCE0HS bqUbmSeA5wupqAAxggK6MIICtgIBATBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQL ExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/ MAkGBSsOAwIaBQCgggE1MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8X DTA5MDUwNDE3Mjg0M1owIwYJKoZIhvcNAQkEMRYEFGQ1X5fulypDcmv4l7L+HM0g9wGbMGkGCSsG AQQBgjcQBDFcMFowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cu Q0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdAICOH8wawYLKoZIhvcNAQkQ AgsxXKBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQLExVodHRwOi8vd3d3LkNBY2Vy dC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/MA0GCSqGSIb3DQEBAQUABIIB ABuKf/d/NXUCyjnLKEy9V6BqPBVNpY7Wa0bWp11AgdPMjdrsagxLBRHLvyIcagrvhDgxvlyKC3LU eBX/ZQ7kQ3TZcOcu91sz5Q//BPekdrU1H1L4ddoZaLS7tC61aRRufQdJmQk/1JB+DDBJj+966Mjb wtbAaSR9hHeUrXYStI4vr0eZN+kah3J724ysG3Ohk7i4gh0XeIqmPcn3eIqtRYjoiENL6hLZtyMb 319f4fsUB1qf/Rgoe6RzVWhD0qBOtl3abCEurgSFJUztV3i3UZTrCeesvSc5t5T0KotRFJyIZpag rdnsLiCt9sx378JiSYvZyh7g9aI70kZBRM4zlP8AAAAAAAA= --=-H+nUPs1cUv+b2JQsJxx7-- From owner-ietf-openpgp@mail.imc.org Mon May 4 10:56:41 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 280723A6358 for ; Mon, 4 May 2009 10:56:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3FZZXwPZdTxP for ; Mon, 4 May 2009 10:56:40 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 987033A6AC6 for ; Mon, 4 May 2009 10:55:48 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Hko3r062224 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HkoEn062223; Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HkmMD062215 for ; Mon, 4 May 2009 10:46:49 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M12Fa-0002cM-Hs for ; Mon, 04 May 2009 19:46:46 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M127Y-0007gx-OA for ; Mon, 04 May 2009 19:38:28 +0200 From: Werner Koch To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Mon, 04 May 2009 19:38:28 +0200 In-Reply-To: <49FF0A74.5030805@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 11:32:04 -0400") Message-ID: <87iqkgbwff.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, 4 May 2009 17:32, dkg@fifthhorseman.net said: > current fingerprint would be re-written as: > > SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 Using a number (2) and, say, a dot as a prefix would be a better choice. We use algorithnm numbers anyway and OpenPGP users are used tp spell a large row of hex digits; we would only confuse them with an S and an H.. > e) allow injection of arbitrary key material at the head of signatures > to allow signers to to avoid a chosen-prefix attack? This would make it > significantly more difficult to predict the hash that someone will sign, and gives more bandwidth for a subliminal channel... > f) explicit introduction of new hashes/ciphers/asymmetric algorithms? We should defer such a discussion until there are semi final results from the SHA-3 contest. > I've probably missed something. What else should be addressed? What > steps are necessary to get the WG back in order again? Or is that not Right, we should re-establish the WG to no rely on I-Ds by individuals. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. From owner-ietf-openpgp@mail.imc.org Mon May 4 11:13:21 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5E57D3A7043 for ; Mon, 4 May 2009 11:13:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xqzHEreGfhuW for ; Mon, 4 May 2009 11:13:20 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3E0203A6BEF for ; Mon, 4 May 2009 11:13:20 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0PDk063585 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I0PWU063584; Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0D5t063572 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 11:00:24 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44I0CJk021847 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:00:13 -0400 Cc: IETF OpenPGP Working Group Message-Id: From: David Shaw To: Christoph Anton Mitterer In-Reply-To: <1241458123.4024.2.camel@fermat.scientia.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: Changing GPG's default key type Date: Mon, 4 May 2009 14:00:12 -0400 References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 1:28 PM, Christoph Anton Mitterer wrote: > On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote: >> We are currently thinking about changing the default >> primary to a 2048-bit RSA key. > Nice :-) > >> We are not proposing changing our default >> signing hash, which will remain SHA-1. > Uhm.. why not? Concerns about compatibility, mainly. There is a much larger installed base of clients that understand SHA-1 than that understand (say) SHA-256. SHA-256 has only been understood in a non-development version of GPG since 2004. If I recall properly, PGP added it more or less around the same time. That's not that long ago, and I frequently see people asking for support for some version of GPG or PGP that predates SHA-256. Mind you, we're not stopping people from choosing to use SHA-256 or whatever they like, and with a RSA key, they are of course free to choose anything. SHA-1 is just a default. One way to look at the RSA change, in fact, is to enable users to make their own hash choice, which they didn't really have with the previous default of a 1024-bit DSA key (so locked at 160 bits). None of this means that we wouldn't change the default signing hash at some point later. It's just not something we're currently planning on for today. David From owner-ietf-openpgp@mail.imc.org Mon May 4 11:18:34 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9349D3A6954 for ; Mon, 4 May 2009 11:18:34 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VfsApvsNyrgm for ; Mon, 4 May 2009 11:18:33 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3B3993A68A0 for ; Mon, 4 May 2009 11:18:33 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7su7064123 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I7s0T064122; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailgw02.dd24.net (mailgw02.dd24.net [217.188.214.197]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7gVd064103 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from calestyo@scientia.net) Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw02.dd24.net (Postfix) with ESMTPA id 0AB6F35546C for ; Mon, 4 May 2009 18:07:42 +0000 (GMT) Subject: Re: Changing GPG's default key type From: Christoph Anton Mitterer To: IETF OpenPGP Working Group In-Reply-To: References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net> Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-TqwuP8rGE/wYOL6Ec1bJ" Date: Mon, 04 May 2009 20:07:41 +0200 Message-Id: <1241460461.4024.12.camel@fermat.scientia.net> Mime-Version: 1.0 X-Mailer: Evolution 2.26.1.1 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --=-TqwuP8rGE/wYOL6Ec1bJ Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Mon, 2009-05-04 at 14:00 -0400, David Shaw wrote: > Concerns about compatibility, mainly. There is a much larger =20 > installed base of clients that understand SHA-1 than that understand =20 > (say) SHA-256. SHA-256 has only been understood in a non-development =20 > version of GPG since 2004. If I recall properly, PGP added it more or =20 > less around the same time. That's not that long ago, and I frequently =20 > see people asking for support for some version of GPG or PGP that =20 > predates SHA-256. At least we've seen from the recent SHA1-related events,... that this point is comming closer ;) > None of this means that we wouldn't change the default signing hash at =20 > some point later. It's just not something we're currently planning on =20 > for today. Of course :) Chris. --=-TqwuP8rGE/wYOL6Ec1bJ Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Disposition: attachment; filename="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQ/DCCBXQw ggNcoAMCAQICAjh/MA0GCSqGSIb3DQEBBQUAMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYD VQQLExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3Qw HhcNMDcxMDI0MTkyNzQxWhcNMDkxMDIzMTkyNzQxWjB8MSEwHwYDVQQDExhDaHJpc3RvcGggQW50 b24gTWl0dGVyZXIxJDAiBgkqhkiG9w0BCQEWFWNhbGVzdHlvQHNjaWVudGlhLm5ldDExMC8GCSqG SIb3DQEJARYibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAPgLlUBy3NRbH25w8pOnhF+qtj4GN04aG7ur+JsXTcEkFNOZWZ5I al2PaQWP7GfEEp5lL0w/LdYXPfnLNohp4l/Nb+db8aHUeVBYgGBTPGF+mJHfJGeochfvZo78u6Bp KkCrDAw2BKN1JNxw+OxmWuunCmXSFM9gqRfBnfmc25P6ba9tQlDXGLKZA8/JKXLMKcTTS7dIkroE bM5FTSaAmGWkvwnD6fpxjFgWNLXjagNqlQD6+q+a//+gXNOGP34aZ3qPnLPR/gUi/yqrQuAVvGep GAhl4B1Kn+c7eROoodq33Ghomoznh8hogBkDJXp+Xq4k8measwtN99ZUdMaFeJsCAwEAAaOCASYw ggEiMAwGA1UdEwEB/wQCMAAwVgYJYIZIAYb4QgENBEkWR1RvIGdldCB5b3VyIG93biBjZXJ0aWZp Y2F0ZSBmb3IgRlJFRSBoZWFkIG92ZXIgdG8gaHR0cDovL3d3dy5DQWNlcnQub3JnMEAGA1UdJQQ5 MDcGCCsGAQUFBwMEBggrBgEFBQcDAgYKKwYBBAGCNwoDBAYKKwYBBAGCNwoDAwYJYIZIAYb4QgQB MDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYWaHR0cDovL29jc3AuY2FjZXJ0Lm9yZzBEBgNV HREEPTA7gRVjYWxlc3R5b0BzY2llbnRpYS5uZXSBIm1haWxAY2hyaXN0b3BoLmFudG9uLm1pdHRl cmVyLm5hbWUwDQYJKoZIhvcNAQEFBQADggIBAKZI/PvI6ynlgITrRTU7WaFlllAtkWCC6MGKEE16 hUebNwK/ccjUquHLfDg2LYbp/WHx3zZQxkj7CarzMUqnoDTnJMbKovDOdZ3vqbs6p6fKuRUjTkaE cN/0ZDllc4Bewa5ZUfdD2Ml3ObxF2oK7wmTw4tQCSKZlPcq+ML5hV3Exag2fBcGzeR+G/QUWKcmY laOpRj8Vu8ZMXpzSD8T+Tp2nKP+iqa2lv+UCI6cSXJ+fdyVMB1Tw98TdRo2ogk38ZhdlxpEDRonW kWuBmS9e7lABqVpyfVAuODF3cKfbxWJnFBkipEJzkpSUsCFQ0SSxs5xkad/bAFF3g1p+E9+EnZMe UJ55L2ZEEtFfgfsPo0N/M7QvWS8COPSwttdSgiXFm9/WHPxu10D6mb/ghNeUFRTrn8miZOer+3p+ 8TRruFMazmsak0emJ8dxsTCdbWZzJEqgz833uttaqZWbHsNY7FuIcj242RTsgetkIRHzaxpKxmUY NnF78vxm3HW/ZX1OpOQsLIT5t+7YDKuLGB15dJnQjQFy9w8TZFaoFUSd39rFdrFtfps7FWb73yov Zcz42a8MrxBcWpZWzpif59TT34IJEEN1/+bXPMGELyT417DIoV8faB6GPKCFV0l7G1TEJTYlobbZ rYVb8B7a0Uu1lPgyxLWlZLWiTYDQF2y8U3KWMIIFdDCCA1ygAwIBAgICOH8wDQYJKoZIhvcNAQEF BQAwVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cuQ0FjZXJ0Lm9y ZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDAeFw0wNzEwMjQxOTI3NDFaFw0wOTEwMjMx OTI3NDFaMHwxITAfBgNVBAMTGENocmlzdG9waCBBbnRvbiBNaXR0ZXJlcjEkMCIGCSqGSIb3DQEJ ARYVY2FsZXN0eW9Ac2NpZW50aWEubmV0MTEwLwYJKoZIhvcNAQkBFiJtYWlsQGNocmlzdG9waC5h bnRvbi5taXR0ZXJlci5uYW1lMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+AuVQHLc 1FsfbnDyk6eEX6q2PgY3Thobu6v4mxdNwSQU05lZnkhqXY9pBY/sZ8QSnmUvTD8t1hc9+cs2iGni X81v51vxodR5UFiAYFM8YX6Ykd8kZ6hyF+9mjvy7oGkqQKsMDDYEo3Uk3HD47GZa66cKZdIUz2Cp F8Gd+Zzbk/ptr21CUNcYspkDz8kpcswpxNNLt0iSugRszkVNJoCYZaS/CcPp+nGMWBY0teNqA2qV APr6r5r//6Bc04Y/fhpneo+cs9H+BSL/KqtC4BW8Z6kYCGXgHUqf5zt5E6ih2rfcaGiajOeHyGiA GQMlen5eriTyZ5qzC0331lR0xoV4mwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIwADBWBglghkgB hvhCAQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQgb3ZlciB0 byBodHRwOi8vd3d3LkNBY2VydC5vcmcwQAYDVR0lBDkwNwYIKwYBBQUHAwQGCCsGAQUFBwMCBgor BgEEAYI3CgMEBgorBgEEAYI3CgMDBglghkgBhvhCBAEwMgYIKwYBBQUHAQEEJjAkMCIGCCsGAQUF BzABhhZodHRwOi8vb2NzcC5jYWNlcnQub3JnMEQGA1UdEQQ9MDuBFWNhbGVzdHlvQHNjaWVudGlh Lm5ldIEibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTANBgkqhkiG9w0BAQUFAAOC AgEApkj8+8jrKeWAhOtFNTtZoWWWUC2RYILowYoQTXqFR5s3Ar9xyNSq4ct8ODYthun9YfHfNlDG SPsJqvMxSqegNOckxsqi8M51ne+puzqnp8q5FSNORoRw3/RkOWVzgF7BrllR90PYyXc5vEXagrvC ZPDi1AJIpmU9yr4wvmFXcTFqDZ8FwbN5H4b9BRYpyZiVo6lGPxW7xkxenNIPxP5Onaco/6KpraW/ 5QIjpxJcn593JUwHVPD3xN1GjaiCTfxmF2XGkQNGidaRa4GZL17uUAGpWnJ9UC44MXdwp9vFYmcU GSKkQnOSlJSwIVDRJLGznGRp39sAUXeDWn4T34Sdkx5QnnkvZkQS0V+B+w+jQ38ztC9ZLwI49LC2 11KCJcWb39Yc/G7XQPqZv+CE15QVFOufyaJk56v7en7xNGu4UxrOaxqTR6Ynx3GxMJ1tZnMkSqDP zfe621qplZsew1jsW4hyPbjZFOyB62QhEfNrGkrGZRg2cXvy/Gbcdb9lfU6k5CwshPm37tgMq4sY HXl0mdCNAXL3DxNkVqgVRJ3f2sV2sW1+mzsVZvvfKi9lzPjZrwyvEFxallbOmJ/n1NPfggkQQ3X/ 5tc8wYQvJPjXsMihXx9oHoY8oIVXSXsbVMQlNiWhttmthVvwHtrRS7WU+DLEtaVktaJNgNAXbLxT cpYwggYIMIID8KADAgECAgEBMA0GCSqGSIb3DQEBBAUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0ExHjAc BgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1 dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNlcnQub3JnMB4XDTA1MTAxNDA3MzY1 NVoXDTMzMDMyODA3MzY1NVowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6 Ly93d3cuQ0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAKtJNRFIfNImflOUz0Op3SjXQiqL84d4GVh8D57aiX3h++ty kA10oZZkq5+gJJlz2uJVdscXe/UErEa4w75/ZI0QbCTzYZzA8pD6Ueb1aQFjww9W4kpCz+JEjCUo qMV5CX1GuYrz6fM0KQhF5Byfy5QEHIGoFLOYZcRD7E6CjQnRvapbjZLQ7N6QxX8KwuPr5jFaXnQ+ lzNZ6MMDPWAzv/fRb0fEze5ig1JuLgiapNkVGJGmhZJHsK5I6223IeyFGmhyNav/8BBdwPSUp2rV O5J+TJAFfpPBLIukjmJ0FXFuC3ED6q8VOJrU0gVyb4z5K+taciX5OUbjchs+BMNkJyIQKopPWKcD rb60LhPtXapI19V91Cp7XPpGBFDkzA5CW4zt2/LP/JaT4NsRNlRiNDiPDGCbO5dWOK3z0luLoFvq Tpa4fNfVoIZwQNORKbeiPK31jLvPGpKK5DR7wNhsX+kKwsOnIJpa3yxdUly6R9Wb7yQocDggL9V/ KcCyQQNokszgnMyXS0XvOhAKq3A6mJVwrTWx6oUrpByAITGprmB6gCZIALgBwJNjVSKRPFbnr9s6 JfOPMVTqJouBWfmh0VMRxXudA/Z0EeBtsSw/LIaRmXGapneLNGDRFLQsrJ2vjBDTn8Rq+G8T/HNZ 92ZCdB6K4/jc0m+YnMtHmJVABfvpAgMBAAGjgb8wgbwwDwYDVR0TAQH/BAUwAwEB/zBdBggrBgEF BQcBAQRRME8wIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLkNBY2VydC5vcmcvMCgGCCsGAQUFBzAC hhxodHRwOi8vd3d3LkNBY2VydC5vcmcvY2EuY3J0MEoGA1UdIARDMEEwPwYIKwYBBAGBkEowMzAx BggrBgEFBQcCARYlaHR0cDovL3d3dy5DQWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDANBgkqhkiG 9w0BAQQFAAOCAgEAfwiIodoaUEnaifuhCHLzivcexDq0eVsgMLFF3sJd02Vp8cJdVFQ8hV+5e0KR wpn9G1Gbq0aloRBTnm2IrHNuLDOm8PSe4HXBPohFqeFmQ/5WWtF6QXj3QNpKOvELW6W7FgbmwueT uYVNl0+xHjhDgO+bDYzvuKdgAIdXfR5EHMsj75s8mZ2vtSkcRXkWlk0nbfEcbMPCVWSzvBTi86Qf HjL8JxUFz90urj6CYXvwIRAY9kTqUzn53NCaIODGu+C7Wk/EmcgHvbW9otsuYg1CNEG8/4uK9VEi qogwAOKw1Ly+ZbrVA1d5m+jcyE34UO2RpVIooqz7Nlg+6ZQrkVCHG9Ze1ozM9w8QDFJO0BZh5eUK bL8Xx3JGV5yY9WxgY3pvXrlOL8i5ubtqhbyYDe35PpeENJSuAK+h5eeSbk698+LZFItc0usBbKAX pS0Q65x6Sr297s797SJAq3A4iPUKh2rCqwVgyUgF2lPB3kR3arPzPDztgLymOEopJF/+WTubJXpW YwBkuV2kYn1XNk+tg+8fklOgjndX3eVhET0jAJBMPPqjYJMEo6819g5qj09KYKeFBWxGoY/0x3bj oVlX93GyxG4UXG1tQWbfG5Ox1ADD7svPPD0hgKlfY2X83eBfpPQr8IVxQdRnJfsasZeu1pmCE0HS bqUbmSeA5wupqAAxggK6MIICtgIBATBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQL ExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/ MAkGBSsOAwIaBQCgggE1MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8X DTA5MDUwNDE4MDc0MVowIwYJKoZIhvcNAQkEMRYEFNGCmj8sZK0DhoZ3DPl3EpWmN2RIMGkGCSsG AQQBgjcQBDFcMFowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cu Q0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdAICOH8wawYLKoZIhvcNAQkQ AgsxXKBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQLExVodHRwOi8vd3d3LkNBY2Vy dC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/MA0GCSqGSIb3DQEBAQUABIIB AD4lPWSZmUQJ4p2ufa5TBmwGw32UBUdBM8XP9AGBHZqYzvS/DBEbzJP/spr1d7YIB/Yt28LXnKFN TRaaDvhTj0QYnmZiUI0/WBBh0M9H8FROM61+vct05ahJ13vPOncwk9NMcVavfkfotC3rdcQK4PLB 04aWzCluGJkI/MALE/v+4acSroorOgvBpV5XKvBSLmFnH6DmkZD4i6mDr9xqYZKSm+qZB+qyV8d1 YTj8U5GtyYqRMPm5V0wnnwuzoahzoS0VvO3rkQ9ZZM9cwHb7lcBNunYUXFybspiiPWTXCdUcOg7f sbyeMAMYiGyk58vIo3uJFvUVlYoqM+V6y1KSFt0AAAAAAAA= --=-TqwuP8rGE/wYOL6Ec1bJ-- From owner-ietf-openpgp@mail.imc.org Mon May 4 11:31:41 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F17D93A6AB8 for ; Mon, 4 May 2009 11:31:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.729 X-Spam-Level: X-Spam-Status: No, score=-3.729 tagged_above=-999 required=5 tests=[AWL=-0.130, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WQdplEoZCz0Z for ; Mon, 4 May 2009 11:31:39 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A4FA53A6CF4 for ; Mon, 4 May 2009 11:30:51 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44ILPBN066013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44ILPH9066012; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44ILOHs066006 for ; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 55092 invoked from network); 4 May 2009 18:21:23 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 18:21:23 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF325A.80106@fifthhorseman.net> Date: Mon, 04 May 2009 14:22:18 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig9CD82D7FEB196C5B478EC8A3" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig9CD82D7FEB196C5B478EC8A3 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 01:38 PM, Werner Koch wrote: > Using a number (2) and, say, a dot as a prefix would be a better choice= =2E > We use algorithnm numbers anyway and OpenPGP users are used tp spell a > large row of hex digits; we would only confuse them with an S and an H.= =2E ok, that works for me. would the prefix be in hex or decimal? for example, would an SHA512 fingerprint look like a.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734= d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff or 10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734= d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff Ugh. that's horrifically long either way. Is a base64 encoding worth considering? it would shave off a third of the length, but it seems like it would introduce significant ambiguity (0 vs O, A vs a, etc) >> e) allow injection of arbitrary key material at the head of signature= s >> to allow signers to to avoid a chosen-prefix attack? This would make = it >> significantly more difficult to predict the hash that someone will sig= n, >=20 > and gives more bandwidth for a subliminal channel... True, but some room for the subliminal channel already exists (e.g. notations can be injected in the signed material). This would simply allow signers to better control what they actually sign, rather than being compelled into signing a given text. Daniel Franke's recent message on gnupg-devel about this is interesting: http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html Another approach would be to formally prefer digest algorithms that do not exhibit the same single-pass behavior of SHA-1 -- is that feasible? >> f) explicit introduction of new hashes/ciphers/asymmetric algorithms?= >=20 > We should defer such a discussion until there are semi final results > from the SHA-3 contest. SHA-3 finalizes in the end of 2012, though first-round candidates have already been selected. Third quarter of 2010 should have finalists selected: http://csrc.nist.gov/groups/ST/hash/timeline.html Which phase of the timeline would be sufficient for you? > Right, we should re-establish the WG to no rely on I-Ds by individuals.= So what's the process to do this? --dkg --------------enig9CD82D7FEB196C5B478EC8A3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf8yX8zS7ZTSFznpAQpoPw//eeXQ64tF5ABLRWImiVF3GdCZluqcDz3P ZTY+h8YPigxxmnNSTvDxvBSB0w3uu/PrI/O3h0v48HRE5Q2ipbdjdcEbfLt4c/+b zrvNl/4OccmwRL49qJnievsMBZQSvLd90xROEdB25jOU7q4eoGmFM9Fboz81YWOR CiGSlLnz/iEhqP8v2sCaP9ZFCSNM925tsmOtNdYAPwBLQ1iSUWCRJ4C2l2mOIK7k mZWie3rSxrhHjc+Go6K05c11ZSo2ifjUgwax4RdCNrYD+K9cAh7f/vkrMdZz8Prw nhnnhF/2BlxptBduGR5th126QYthaxG+QRBsDOQaXnq+TOKT7fX7Ajx0308FFqc9 eL236qiqQWte0xWm3XrYZCYRNcRXckdVcBh60IPwzWb6Sqe38eNCG9Etu39vAhky IaB7KHRES3REBIY6ZxrFJi2GyIsC+IMXEYQgtsHthRqw3q51YZzf9HQOUPz/oRcq 1wUrmVnp2GWvvUwFvVZFWaxS9cXaAIr56d1bHGiY0KtSRzR3uAB/FxaJWnk3unRd xaTSn2UJC0kuBaOYJPoRPYY5NTKfbIn+V1vxS7jlrfGXqCDGl3MymHa3LJ4Escbj FIRUlwvVUgzPsV3g/1uiCOb1j4+wnDmrlaoUXQ316qf6x7gUDwP0TL8u4NVrF8DL 9Ru4HW5fDSQ= =/xKh -----END PGP SIGNATURE----- --------------enig9CD82D7FEB196C5B478EC8A3-- From owner-ietf-openpgp@mail.imc.org Mon May 4 11:47:47 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 17C903A6B87 for ; Mon, 4 May 2009 11:47:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.74 X-Spam-Level: X-Spam-Status: No, score=-0.74 tagged_above=-999 required=5 tests=[BAYES_20=-0.74] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g7DnmczIxxA4 for ; Mon, 4 May 2009 11:47:46 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D716F3A684F for ; Mon, 4 May 2009 11:47:45 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ie2G2067128 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ie2gs067127; Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from smtp12.hushmail.com (smtp12.hushmail.com [65.39.178.135]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44IdolO067098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 4 May 2009 11:40:01 -0700 (MST) (envelope-from vedaal@hush.com) Received: from smtp12.hushmail.com (localhost.localdomain [127.0.0.1]) by smtp12.hushmail.com (Postfix) with SMTP id 6F9EA70271 for ; Mon, 4 May 2009 18:39:49 +0000 (UTC) Received: from smtp.hushmail.com (mailserver8.hushmail.com [65.39.178.61]) by smtp12.hushmail.com (Postfix) with ESMTP for ; Mon, 4 May 2009 18:39:48 +0000 (UTC) Received: by smtp.hushmail.com (Postfix, from userid 99) id AA2D51A003A; Mon, 4 May 2009 18:39:48 +0000 (UTC) MIME-Version: 1.0 Date: Mon, 04 May 2009 14:39:48 -0400 To: "IETF OpenPGP Working Group" Subject: Re: New results against SHA-1 From: vedaal@hush.com Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="UTF-8" Message-Id: <20090504183948.AA2D51A003A@smtp.hushmail.com> Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, 04 May 2009 11:32:04 -0400 Daniel Kahn Gillmor wrote: >On 04/30/2009 06:39 PM, David Shaw wrote: >> >> >http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d. >pdf >> >> There is not much hard information yet, but the two big quotes >are >> "SHA-1 collisions now 2^52" and "Practical collisions are within >> resources of a well funded organisation." >What else should be addressed? MDC's ? currently SHA-1 rfc-4880 p. 49 ff vedaal any ads or links below this message are added by hushmail without my endorsement or awareness of the nature of the link -- Click to learn about options trading and get the latest information. http://tagline.hushmail.com/fc/BLSrjkqecvgn6JU6GKTTYn4JLCimaHzrO00szZPMXyt3Ax5yZ2fL1OvWzD6/ From owner-ietf-openpgp@mail.imc.org Mon May 4 12:04:47 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8E7D83A6BCE for ; Mon, 4 May 2009 12:04:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q629Vt9C3o31 for ; Mon, 4 May 2009 12:04:46 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6CD483A68A0 for ; Mon, 4 May 2009 12:04:46 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw59f068538 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:58:06 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Iw5Pd068537; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw4qi068531 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44IvLtF022390 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:57:21 -0400 Cc: IETF OpenPGP Working Group Message-Id: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> From: David Shaw To: Werner Koch In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: New results against SHA-1 Date: Mon, 4 May 2009 14:57:21 -0400 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 1:38 PM, Werner Koch wrote: > > On Mon, 4 May 2009 17:32, dkg@fifthhorseman.net said: >> current fingerprint would be re-written as: >> >> SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 > > Using a number (2) and, say, a dot as a prefix would be a better > choice. > We use algorithnm numbers anyway and OpenPGP users are used tp spell a > large row of hex digits; we would only confuse them with an S and an > H.. I like the dot, but I'd like to see the hash number in two-digit hex. The reason is that I strongly suspect that when read out over the phone, or written down, or transmitted in pretty much any means other than strict cut-and-paste, the dot (or any other delimiter) will be lost in translation. Thus, "40.ABCDEF0123456....." will become "40ABCDEF0123456....." and we would have to play length checking games to guess if they meant hash 4 or 40. With 2-digit hex, "4" would be written as "04", removing any doubt. David From owner-ietf-openpgp@mail.imc.org Mon May 4 12:21:46 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E3FDA3A6911 for ; Mon, 4 May 2009 12:21:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.697 X-Spam-Level: X-Spam-Status: No, score=-3.697 tagged_above=-999 required=5 tests=[AWL=-0.098, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5m6-HivaeMde for ; Mon, 4 May 2009 12:21:46 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 116853A69B2 for ; Mon, 4 May 2009 12:21:43 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JERnC069907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JERWZ069904; Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JEGRt069840 for ; Mon, 4 May 2009 12:14:26 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 14369 invoked from network); 4 May 2009 19:14:15 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:14:15 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF3EC2.7030504@fifthhorseman.net> Date: Mon, 04 May 2009 15:15:14 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <20090504183948.AA2D51A003A@smtp.hushmail.com> In-Reply-To: <20090504183948.AA2D51A003A@smtp.hushmail.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig14CC89960466A28BEAC9A5A5" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig14CC89960466A28BEAC9A5A5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 02:39 PM, vedaal@hush.com wrote: > MDC's ? >=20 > currently SHA-1 > rfc-4880 p. 49 ff Ah, right. Jon Callas' remarks about the MDC from back in January might be relevant: http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html I think his point stands that the MDC only cares about the one-wayness of the digest used in MDC -- there is no reliance on a collision-resistance property. So i'm not sure that this needs to change in a new draft, particularly if it could make the discussion more contentious. What do other folks think? --dkg --------------enig14CC89960466A28BEAC9A5A5 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf8+wszS7ZTSFznpAQrOGw//djHRreV/gQYDsEsCgxVLBf7F7g3jAQwY NmttihGJAw+egC6u8TcwMGb4nT+B/YKXMc5WiyQmgH8ekeiKll74g00ZOm1fHdEq 0DYZFRQLmhipzTuok0gCQa+FOtcippa6HAd23+v4L7KvDmUstLzszSc7eTUHpLX7 HhcelVdb9G9eRMDaKQFX+xVH2sYsVtln5d2KbiBY9NJKJOywaoyt3WghhvVyR4cU xj4rawzDriCU35peULoFcuAObh2oDlK6SPrxXAGAG3s8S9+Hv3edT4UoKcOJVtsS 4GEBPbVnLQvDbjFk2hLKZ64GMfEwi0eiv/w82seuEuVPH5Ml23Lr2itD7mPzE8bN 6oedDxnzdoqm5KMl+SRrd8R/mTR+goSM6Pj8llx+mAuacvtimmtzPC61zYDB9Pfx MALmTGeNEdLS+1g+3GQ5W7HiptiNH4pyK2xLL58/jXgNfgAEISLGUpNl0skYJg/D ryX0Do3jn/5ceZSGQGsVVZjGeeOrk5euyOye5DmARWiy4QrkzS4pykTp1tRskEUo air3YviYt+iNgze+h94icZljG4vusPvjVlhXIXPNGQyB4L3qZ4NWhsbGIb181H+h cMkP+4Fb+GxRgJehZRjg9Gsm0e51gboB8W2PDYrpICrbKYXjvy3ZJnt/gt2BJbcI wAxwYPonsDs= =afkV -----END PGP SIGNATURE----- --------------enig14CC89960466A28BEAC9A5A5-- From owner-ietf-openpgp@mail.imc.org Mon May 4 12:30:29 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C8823A6CF4 for ; Mon, 4 May 2009 12:30:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.677 X-Spam-Level: X-Spam-Status: No, score=-3.677 tagged_above=-999 required=5 tests=[AWL=-0.078, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zznQNloPe3AU for ; Mon, 4 May 2009 12:30:27 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 08CA328C220 for ; Mon, 4 May 2009 12:30:25 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JNGgX070552 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JNGES070551; Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JNFrb070537 for ; Mon, 4 May 2009 12:23:15 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 19140 invoked from network); 4 May 2009 19:23:14 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:23:14 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF40DD.5040300@fifthhorseman.net> Date: Mon, 04 May 2009 15:24:13 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> In-Reply-To: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3377F6EA6DEFE8F1B189E8C5" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig3377F6EA6DEFE8F1B189E8C5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 02:57 PM, David Shaw wrote: > we would have to play length checking games > to guess if they meant hash 4 or 40. We're still going to have to do a little bit of length-checking games, to distinguish between traditional SHA1 fingerprints and an accidentally-truncated version of the newer (and presumably longer) fingerprints. One of the reasons that i initially proposed prefixes like SHA256- is because they are so unambiguously *unlike* the traditional fingerprints that it is clear what to expect next. --dkg --------------enig3377F6EA6DEFE8F1B189E8C5 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf9A3szS7ZTSFznpAQqrTQ/5ASHx4M4jOukvhduteqhbHSYdrs7mxK5e FXwsiiFS6EZzng3hSfair5T6EHKaBHQkfCEnlI17fPluXM5jZgMT/owbmUlL3orU nAuff4/lKvnf/esrKfMRhb9igg8UHZXweW7lqT8hxL+GHIWF+NnqIlMjA91BpufL rczzbumid4Is3QTeFDceG/xJFZY9/Tx6jHw8H+pgpbTte2PShptti+e8m5SToCRK fQIhL404kv/XJFitIzw7OqoYQoigrh8e3nKxxjx2GjDnIClRNLKkB0tEH1h1CpP+ iRTJs/XrCWZosZbjkBJ8p0L/v6Qu+LpblZZfqmqfJGN281+cy4zm5qCpFFhuRs6m FI5ESmBPZ1+bteLij5v0zqYxu+qR0Fq5OjrHArvkloy4sP1oWjoNDuhDTFj2y8Vy yVACcYKKJ5+QQJZjaBvYyuDMigps5R2zCaPDEdQsQnPf70TgJnqVaAN85jpD2Agk J7+LgwuL5YJ9IXyK0OBXqdeQqvhLIQyLl8UP5HbcSio6NGAV/qnxTkzgoi456j2k eIcP+f7jXXr6khyysOlTklhKaIZMHJJicZ9bKLVihr4GiaoU6MzUOU1MPqDEAIGm 86ABiBomr1ZuTmV6zn07mhG9tl8xJ7F5pHHkxQVfaGK90Wx+PO4OIJgMdHezOihd /dxudUVwf7Y= =I4ZX -----END PGP SIGNATURE----- --------------enig3377F6EA6DEFE8F1B189E8C5-- From owner-ietf-openpgp@mail.imc.org Mon May 4 12:32:56 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0C3E928C1B7 for ; Mon, 4 May 2009 12:32:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.999 X-Spam-Level: X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_22=0.6] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CkhSOTu3NTQ3 for ; Mon, 4 May 2009 12:32:55 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C9B773A67B3 for ; Mon, 4 May 2009 12:32:54 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPdue070689 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JPdQF070688; Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mail-bw0-f222.google.com (mail-bw0-f222.google.com [209.85.218.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPRRM070676 for ; Mon, 4 May 2009 12:25:38 -0700 (MST) (envelope-from dacrick@gmail.com) Received: by bwz22 with SMTP id 22so4021195bwz.10 for ; Mon, 04 May 2009 12:25:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=CjQUsywfVRGnWO7w3luIJPeKdKuyqA3ISTRnQm/0um8=; b=C18BoKzQEZRk26m4vyNrFiNgw0YwGHtL7Deuqx7i3UZ7sokeDa2AfuHsjwtyV+UWHP i11XLWUbvL0WMVXaXMok8JZrfu38+nl7jfYbXsGWk1F2YGQv6MikLu28FG/yQwixkx0c kh7+3nP97Yk18qQw8LxDIYnm7+DAWtTY2ahsA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=YCzt9UymiDnKbaU4GvKhxv0QTgy3Y0CCYPm1aLNQ1k6c50AX0X4m8QSFvFuZEkLMwA Jbomxn83XPiADUo9cPtu7KZnmH1bFnO+QJznfBmqnCt8yIfm0cJZkKlUD2T4AD7W4Ijl pUDSede9nusTDdeulqMqFly6T13/bP2QTRqII= MIME-Version: 1.0 Received: by 10.204.69.66 with SMTP id y2mr6072460bki.49.1241465126246; Mon, 04 May 2009 12:25:26 -0700 (PDT) In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net> References: <20090504183948.AA2D51A003A@smtp.hushmail.com> <49FF3EC2.7030504@fifthhorseman.net> Date: Mon, 4 May 2009 20:25:26 +0100 Message-ID: <117bad160905041225k1dc1c23fref21f17d6fa73064@mail.gmail.com> Subject: Re: New results against SHA-1 From: David Crick To: IETF OpenPGP Working Group Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, May 4, 2009 at 8:15 PM, Daniel Kahn Gillmor wrote: > On 05/04/2009 02:39 PM, vedaal@hush.com wrote: >> MDC's ? >> >> currently SHA-1 >> rfc-4880 p. 49 ff > > Ah, right. =A0Jon Callas' remarks about the MDC from back in January migh= t > be relevant: > > =A0http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html > > I think his point stands that the MDC only cares about the one-wayness > of the digest used in MDC -- there is no reliance on a > collision-resistance property. =A0So i'm not sure that this needs to > change in a new draft, particularly if it could make the discussion more > contentious. > > What do other folks think? I think we need to address it; we may as well, plus also during the IETF review of the draft of what would become 4880, we have to CONVINCE IETF that it was "OK" to use SHA-1 here (when there were already concerns about it). "SHA-1 baad, mm'ok?" :) From owner-ietf-openpgp@mail.imc.org Mon May 4 12:54:09 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4D84328C165 for ; Mon, 4 May 2009 12:54:09 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2szAotvgpCCw for ; Mon, 4 May 2009 12:54:08 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8B5433A6B9A for ; Mon, 4 May 2009 12:54:07 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjrTX072189 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JjrnU072187; Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjpXp072177 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 12:45:52 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Jjok3022882 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 15:45:51 -0400 Message-Id: <4E07EDF9-3293-4210-9843-D366B68EED0B@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group In-Reply-To: <49FF40DD.5040300@fifthhorseman.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: New results against SHA-1 Date: Mon, 4 May 2009 15:45:50 -0400 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> <49FF40DD.5040300@fifthhorseman.net> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 3:24 PM, Daniel Kahn Gillmor wrote: > On 05/04/2009 02:57 PM, David Shaw wrote: >> we would have to play length checking games >> to guess if they meant hash 4 or 40. > > We're still going to have to do a little bit of length-checking games, > to distinguish between traditional SHA1 fingerprints and an > accidentally-truncated version of the newer (and presumably longer) > fingerprints. We can use the presence of the delimiter dot to tell the difference. If they've lost the dot, then, well, absent some special knowledge, we can't really tell the difference between a old-style fingerprint and a new-style fingerprint that is both accidentally truncated and missing its delimiter dot. I wouldn't even try. Note that the current OpenPGP does not attempt to tell the difference between a V3 fingerprint (32 printed digits) and a V4 fingerprint that just happened to lose 8 characters in a cut and paste error somewhere. That's the job of the client (if it chooses to take it on at all) more so than the job of the protocol. David From owner-ietf-openpgp@mail.imc.org Mon May 4 14:45:12 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 703623A6B82 for ; Mon, 4 May 2009 14:45:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cxs3xTGseJzH for ; Mon, 4 May 2009 14:45:11 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 41C423A6B65 for ; Mon, 4 May 2009 14:45:11 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZDTV079793 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44LZDJW079792; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZ2Ja079782 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44LZ1Ho023777 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 17:35:01 -0400 Message-Id: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Non-SHA-1 fingerprints Date: Mon, 4 May 2009 17:35:01 -0400 X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Now that I think about the variable-hash fingerprint question a bit, I'm concerned about things like RFC-4398, which uses OpenPGP fingerprints in DNS. There is a fingerprint field there, and it is variable length, but it has no concept of hash algorithm. We'd have to define some standard way to write out a fingerprint in binary with the hash field incorporated. So given that, I am wondering why we need a delimiter between the hash specifier and the fingerprint data for the human-readable version at all? A written fingerprint is expected to be readable, but not interpretable by a human being anyway, and software doesn't care about the delimiter one way or another. So rather than 01.23456789ABCDEF.... or MD5-23456789ABCDEF... why not just 0123456789ABCDEF... ? We already have a concept of variable length fingerprints (V3 = 16 bytes, and V4 = 20 bytes), and this fits reasonably well alongside those two. The rule would be 16 bytes means it's V3, 20 bytes means it's V4, and an odd number of bytes means it's this new format. If you see an odd number of bytes, you pull off the leftmost byte, and that's the algorithm number. The rest of the bytes are the hash value. We can trivially transform a V4 fingerprint into this new format by sticking the value 2 in front of it. This does, of course, presume that all of our hashes for OpenPGP in the future will generate an even number of bytes. David From owner-ietf-openpgp@mail.imc.org Mon May 4 15:04:23 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E8EBF3A6C6D for ; Mon, 4 May 2009 15:04:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f37ZtFi1zach for ; Mon, 4 May 2009 15:04:23 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D0B913A69B4 for ; Mon, 4 May 2009 15:04:22 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpwX1080695 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Lpw7L080694; Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpuKV080687 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 14:51:57 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Lpt82023932 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 17:51:56 -0400 Message-Id: <0F0DEA3C-A1B9-4F24-8F1E-9B8649F2464C@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group In-Reply-To: <49FF325A.80106@fifthhorseman.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: New results against SHA-1 Date: Mon, 4 May 2009 17:51:55 -0400 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 2:22 PM, Daniel Kahn Gillmor wrote: > On 05/04/2009 01:38 PM, Werner Koch wrote: >> Using a number (2) and, say, a dot as a prefix would be a better >> choice. >> We use algorithnm numbers anyway and OpenPGP users are used tp >> spell a >> large row of hex digits; we would only confuse them with an S and >> an H.. > > ok, that works for me. would the prefix be in hex or decimal? for > example, would an SHA512 fingerprint look like > a. > 3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff > > or > > 10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff > > Ugh. that's horrifically long either way. Is a base64 encoding worth > considering? it would shave off a third of the length, but it seems > like it would introduce significant ambiguity (0 vs O, A vs a, etc) I'm sure there is a study somewhere that says just how long of a string a human being can handle without getting lost, but even without such a study I can say that 512 bits is just too long for usability. If you think about it, the whole point of fingerprints is that they're a short way to refer to a key. If we make them too long, we're hurting the very thing that fingerprints were created for. "3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff " is not exactly the kind of thing someone could print on a business card or read to a corespondent over the phone. David From owner-ietf-openpgp@mail.imc.org Mon May 4 15:18:47 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E7463A687F for ; Mon, 4 May 2009 15:18:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qAwXMZaXD887 for ; Mon, 4 May 2009 15:18:46 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6E4613A70F7 for ; Mon, 4 May 2009 15:16:17 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9bBd081710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M9bGE081709; Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9ZFJ081702 for ; Mon, 4 May 2009 15:09:36 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 40FCB31A58B for ; Tue, 5 May 2009 00:09:35 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 1A884598099 for ; Tue, 5 May 2009 00:09:35 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id NW5dxk15LoHW for ; Tue, 5 May 2009 00:09:34 +0200 (CEST) Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D15D7598091 for ; Tue, 5 May 2009 00:09:34 +0200 (CEST) Message-ID: <49FF679E.1090400@epointsystem.org> Date: Tue, 05 May 2009 00:09:34 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net> In-Reply-To: <49FF325A.80106@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig61BC0E22A9B40C8F1917A17F" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig61BC0E22A9B40C8F1917A17F Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable > Ugh. that's horrifically long either way. Is a base64 encoding worth > considering? it would shave off a third of the length, but it seems > like it would introduce significant ambiguity (0 vs O, A vs a, etc) I would go the other way. Since collision-resistance is not an issue with= fingerprints, 128 bits are perfectly adequate for 2048-bit keys (i.e. bre= aking the key and making a new key matching the fingerprint require about the s= ame amount of work). Also, keeping mobile phones in mind, I would suggest usi= ng 40 decimal digits. This way, the total length of fingerprints remain the sam= e (40 characters), but typing them in on a decimal keypad would be much faster = than currently. --=20 Daniel --------------enig61BC0E22A9B40C8F1917A17F Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/Z54ACgkQoeH/BzqmYjhxbgCgjDKZk2nfRWSZojAa9qklaeZR rQwAn2XGQCI0Q8Z2ckSWMHITtpd7mU4s =2qFS -----END PGP SIGNATURE----- --------------enig61BC0E22A9B40C8F1917A17F-- From owner-ietf-openpgp@mail.imc.org Mon May 4 15:19:08 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 575613A7058 for ; Mon, 4 May 2009 15:19:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JU-gSH8Ny1Ii for ; Mon, 4 May 2009 15:19:07 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2D9963A7169 for ; Mon, 4 May 2009 15:17:43 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4rdl081493 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M4rhT081492; Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4fpv081481 for ; Mon, 4 May 2009 15:04:52 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8F77C31A571; Tue, 5 May 2009 00:04:40 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 112B8598099; Tue, 5 May 2009 00:04:40 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id xcNlf78UM7xl; Tue, 5 May 2009 00:04:39 +0200 (CEST) Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id C9A52598091; Tue, 5 May 2009 00:04:39 +0200 (CEST) Message-ID: <49FF6677.7070907@epointsystem.org> Date: Tue, 05 May 2009 00:04:39 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig3A44C71DF68C61ECC525EF57" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig3A44C71DF68C61ECC525EF57 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable David Shaw wrote: >=20 > Now that I think about the variable-hash fingerprint question a bit, I'= m > concerned about things like RFC-4398, which uses OpenPGP fingerprints i= n > DNS.=20 For fingerprints, MDC and self-signatures, collision-resistance does not = matter, only the one-way property. So I think it is totally safe to postpone disc= ussion until SHA3 is selected. Reviewing the fingerprint is a MAJOR issue, as (parts of) fingerprints ar= e used as lookup keys in the PKS database. Here are some points: I believe that a fingerprint that is longer than 160 bits is pointless; e= ven 160 bits is an overkill causing inconvenience with no tangible benefit in ter= ms of security over a 128 bit fingerprint. What does cause some problems, is the fact that the creation date (32 bit= s) is included in the fingerprint. It makes sevaral attacks substantially easie= r than if the fingerprint was calculated only over the key material and key attr= ibutes (such as key type). Basically, it should be impossible for the same key t= o have different fingerprints. Also, since mobile phones typically have a numeric keypad, it would be ni= ce if fingerprints and key IDs were numeric-only. It is an increasingly importa= nt platform for OpenPGP, I believe. --=20 Daniel --------------enig3A44C71DF68C61ECC525EF57 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/ZncACgkQoeH/BzqmYjhfeACfRnMUEXiw7+Y1Yvnp8TYGchbh 2U8AoKbcP+V3g8YXf+hJlsWbgdJyQe9z =ce8+ -----END PGP SIGNATURE----- --------------enig3A44C71DF68C61ECC525EF57-- From owner-ietf-openpgp@mail.imc.org Mon May 4 15:55:17 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 170173A684E for ; Mon, 4 May 2009 15:55:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TXMxKlndbblp for ; Mon, 4 May 2009 15:55:16 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 06BD23A682D for ; Mon, 4 May 2009 15:55:15 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJKuH082315 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44MJK3l082314; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJ97m082294 for ; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:41870) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M16V9-0003rE-CR (Exim 4.69) (return-path ); Mon, 04 May 2009 23:19:07 +0100 Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 52A5E5D65; Mon, 4 May 2009 23:19:04 +0100 (GMT/BST) Message-ID: <49FF69D9.7070206@systemics.com> Date: Tue, 05 May 2009 00:19:05 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: David Shaw Cc: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 4/5/09 23:35, David Shaw wrote: > This does, of course, presume that all of our hashes for OpenPGP in the > future will generate an even number of bytes. I like the idea. But, I'm the one who favours aphorisms such as "there is only one mode, and it is secure." Or, perhaps, "There is one cipher suite, and it is numbered Number 1." So I would be looking for SHA3 as the one and only thing that ever hashes the publics, and bugger the rest. Algorithm agility is for the birds. We would just need to agree how many even bytes to allocate to the SHA3 for the next 4 decades. iang From owner-ietf-openpgp@mail.imc.org Mon May 4 16:34:28 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0A2613A6C51 for ; Mon, 4 May 2009 16:34:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PnRF6leubaCK for ; Mon, 4 May 2009 16:34:27 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D9A1F3A6B13 for ; Mon, 4 May 2009 16:34:26 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQPQJ086141 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NQP5k086140; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQEjb086130 for ; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id CE5732E215 for ; Mon, 4 May 2009 16:27:06 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-02 for ; Mon, 4 May 2009 16:27:02 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 3FB282E5B8 for ; Mon, 4 May 2009 16:27:02 -0700 (PDT) Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:26:09 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:26:09 -0700 Cc: IETF OpenPGP Working Group Message-Id: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org> From: Jon Callas To: David Shaw In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Changing GPG's default key type Date: Mon, 4 May 2009 16:26:07 -0700 References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > > > One issue, of course, is that RSA is not a required key type in > OpenPGP, so there could be some implementation out there that won't > be able to handle it. I'm not terribly concerned about this, as in > practice, the vast majority of code has handled RSA just fine for > the past decade, and if a particular user needs to generate a non- > RSA key, they can still do so. > There are a few other details (RSA signatures are physically larger, > etc), but I believe they are outweighed by the benefit of the larger > key and additional hash flexibility. PGP does precisely this now. The default you'll get when creating a new key is RSA 2048. I'll invoke Jeff Schiller in this as well. The DSA/Elgamal keys are mandatory to implement. Mandatory to implement does not mean mandatory to use. It would be perfectly reasonable to make an RSA-only system that merely didn't hork up a hairball when it found a DSA key. Many X.509 systems are like this too -- DSA is the mandatory-to- implement, but it's not clear that anyone has ever created a DSA certificate outside of interop testing. I'm sure someone can find some example that proves me literally wrong on that, but figuratively right. These days, I see the effective -- ummm, I'm looking for the right word, I don't want to say "deprecate" -- minimization of integer discrete log. The world is pretty much integer RSA, and moving to elliptic curve discrete log. Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFJ/3mRsTedWZOD3gYRAvnSAJ930wrrwBfdtMQR7u45vOXhP1nCqQCcCUSb mmQtr8tYoSe5XMK6ya3Jg5Q= =JpoU -----END PGP SIGNATURE----- From owner-ietf-openpgp@mail.imc.org Mon May 4 16:40:21 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 203953A6C5C for ; Mon, 4 May 2009 16:40:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zCkbIFKMuXB1 for ; Mon, 4 May 2009 16:40:20 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C47DD3A6BD5 for ; Mon, 4 May 2009 16:40:19 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWxab086472 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NWxei086471; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWw9I086465 for ; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 5E9EA2E659 for ; Mon, 4 May 2009 16:33:51 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-05 for ; Mon, 4 May 2009 16:33:46 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 990162E3CA for ; Mon, 4 May 2009 16:33:46 -0700 (PDT) Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:32:53 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:32:53 -0700 Cc: IETF OpenPGP Working Group Message-Id: From: Jon Callas To: David Shaw In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Non-SHA-1 fingerprints Date: Mon, 4 May 2009 16:32:52 -0700 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At the last IETF meeting, Derek discussed new drafts (particularly this one) with Tim Polk, and either Derek can shepherd it, or we can find someone else. I sent Derek a sketch of what I propose. Note that it's pretty much what's been discussed here, but I used a colon (which is what I remember in the original proposal) rather than a dot. > From: "Jon Callas" > Date: April 1, 2009 3:43:08 AM PDT > To: "Derek Atkins" > Cc: "Jon Callas" > Subject: Re: OpenPGP Extensions Doc(s) > > * PGP Signed: 04/01/2009 at 07:37:45 AM, Decrypted > ... > > Here's what I propose: > > We define a new fingerprint. > > Basics > ------ > > The fingerprint is a struct, consisting of: > > Hash Alogrithm Type (1 Octet) > Hash Value (N Octets) > > The hash is computed over the same fields of the key packet, just as > in RFC4880, just with a different hash function than SHA1. > > Truncations > ----------- > > The Hash Value may be of any size equal to or less than the natural > size of the hash function. If it is a truncation, then it is the > high-order bits. Thus, the SHA1 hash "ED15 5BDF CD41 ADFC 00F3 28B6 > 52BF 5A46 BC98 E63D" truncated to 64 bits is "ED15 5BDF CD41 ADFC". > > There are a number of reasons truncating a fingerprint. One is for > ease in transport, display, etc. In the past, we moved from 16-byte > fingerprints to 20-byte fingerprints. While a larger fingerprint may > have increased cryptographic use, human beings still sometimes use > them > > Display > ------- > > The normal display of a fingerprint is: > > : > > White space may be added for readability. > > Example: > > 2:ED15 5BDF CD41 ADFC 00F3 28B6 52BF 5A46 BC98 E63D > > Other formats are possible, but they should remember to show the > algorithm either numberically or symbolically. Note that RFC 4880 > defines ASCII display strings for all algorithms. > > Fingerprint Preference > ----------- ---------- > This is a new preference subpacket that is a single byte of the hash > algorithm preferred fingerprint type. Not only can this be used by > an implementation for display, but an implementation SHOULD use this > algorithm for determining a key id when encrypting to that key. > > If this preference is not present, the implementation SHOULD use old- > style SHA1 fingerprints. > > Key IDs > --- --- > > OpenPGP already has one natural truncation of the fingerprint, the > Key ID. Under this proposal, a Key ID is a 64-bit truncation of the > Hash Value of a fingerprint. An example is given above. > > Note that for SHA1, this means that there are two possible Key IDs, > the old one and a new one. RFC 4880 (and 2440 before it) already > said that an implementation must recognize that there could be > collisions in Key IDs. An implementation SHOULD use the old-style > one unless there is a preference specifying SHA1. > > Other places to look at > ----- ------ -- ---- -- > > We need to look at updating (or handwaving) 5.2.3.15. Revocation Key. > > What do you think? > > Jon > > > -- > Jon Callas > CTO, CSO > PGP Corporation Tel: +1 (650) 319-9016 > 200 Jefferson Drive Fax: +1 (650) 319-9001 > Menlo Park, CA 94025 PGP: ed15 5bdf cd41 adfc 00f3 > USA 28b6 52bf 5a46 bc98 e63d > > > > > * Jon Callas > * 0xBC98E63D(L) > -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFJ/3slsTedWZOD3gYRAlWTAJ9C2q5AAqUNMLMbsNlz/teDfMaT+ACfYm4U iGyxP9l5DBF+7yAfwR83uu0= =SV8T -----END PGP SIGNATURE----- From owner-ietf-openpgp@mail.imc.org Mon May 4 17:24:03 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A06E33A6E3D for ; Mon, 4 May 2009 17:24:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PJUchmg-otyr for ; Mon, 4 May 2009 17:24:02 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 72C6E3A6D96 for ; Mon, 4 May 2009 17:24:02 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDHp089058 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HD1N089056; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HBwW089041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9X0025116; Mon, 4 May 2009 20:17:10 -0400 Cc: IETF OpenPGP Working Group Message-Id: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> From: David Shaw To: "Daniel A. Nagy" In-Reply-To: <49FF6677.7070907@epointsystem.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) Date: Mon, 4 May 2009 20:17:10 -0400 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> X-Mailer: Apple Mail (2.930.3) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: > David Shaw wrote: >> >> Now that I think about the variable-hash fingerprint question a >> bit, I'm >> concerned about things like RFC-4398, which uses OpenPGP >> fingerprints in >> DNS. > > For fingerprints, MDC and self-signatures, collision-resistance does > not matter, > only the one-way property. So I think it is totally safe to postpone > discussion > until SHA3 is selected. It's a larger problem than just fingerprints. We also use a fingerprint as a specifier inside the revocation key subpacket, to designate which key can be used to issue revocations on our behalf. The thing is, though, a fingerprint isn't really a very good revocation key specifier: Fingerprints: * Must be human-readable * Needs to be small to be useful * Can collide to some small amount (4880 even documents that they collide in section 12.2) Revocation key specifier: * Does not need to be human-readable * Has much looser size requirements (shouldn't be enormous, but certainly can be bigger than 160 bits without hurting anything) * Should never collide (we don't want the wrong key being able to revoke our key) Perhaps we'd do better by leaving fingerprints alone and instead fixing how we specify revocation keys? We could try to come up with a new non-colliding way to disambiguate keys, but fundamentally, anything that is smaller than the key packet itself can still collide. So instead, why not define a new revocation subpacket that contains the class octet from the old revocation key, and the rest of the subpacket is simply a copy of the public key packet in question? I don't mean the whole transferable public key, of course, just the contents of packet #6. This public key packet doesn't need any self-signatures or anything else like that, as it is implicitly authenticated by the signature that carries the revocation key subpacket. David From owner-ietf-openpgp@mail.imc.org Mon May 4 17:50:31 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A27AD28C130 for ; Mon, 4 May 2009 17:50:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U7Iv33ksBafV for ; Mon, 4 May 2009 17:50:31 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8932D28C126 for ; Mon, 4 May 2009 17:50:30 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDi1089057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HDcE089055; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HB8s089038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9Wx025116; Mon, 4 May 2009 20:17:09 -0400 Cc: IETF OpenPGP Working Group Message-Id: From: David Shaw To: "Daniel A. Nagy" In-Reply-To: <49FF6677.7070907@epointsystem.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Non-SHA-1 fingerprints Date: Mon, 4 May 2009 20:17:09 -0400 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> X-Mailer: Apple Mail (2.930.3) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: > Also, since mobile phones typically have a numeric keypad, it would > be nice if > fingerprints and key IDs were numeric-only. It is an increasingly > important > platform for OpenPGP, I believe. I think that is a good point and a great idea, but the only reason that fingerprints and key IDs are printed in hex now is tradition. There is nothing in the standard one way or another about how humans should consume fingerprints. You could even do it with the current V4 fingerprints: just as my key fingerprint is 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct as 716901811312187285520504099705403090347495794016 in decimal. The big problem I see here is that's it's an awfully long number to type into a mobile keypad. (Well, that, and persuading the various implementations to support the decimal format in addition to the traditional hex). David From owner-ietf-openpgp@mail.imc.org Mon May 4 18:30:38 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 148993A715C for ; Mon, 4 May 2009 18:30:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.664 X-Spam-Level: X-Spam-Status: No, score=-3.664 tagged_above=-999 required=5 tests=[AWL=-0.065, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4WJNIHvNfG-E for ; Mon, 4 May 2009 18:30:37 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E7DC43A714C for ; Mon, 4 May 2009 18:30:35 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n451Lkkd092530 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n451LkLD092529; Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n451LYAX092518 for ; Mon, 4 May 2009 18:21:45 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 76223 invoked from network); 5 May 2009 01:21:34 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 01:21:34 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FF94D4.3030101@fifthhorseman.net> Date: Mon, 04 May 2009 21:22:28 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: decimal fingerprints [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-Reply-To: X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigBCCF34F563DA425E7D624803" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigBCCF34F563DA425E7D624803 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 08:17 PM, David Shaw wrote: >=20 > On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: >=20 >> Also, since mobile phones typically have a numeric keypad, it would be= >> nice if >> fingerprints and key IDs were numeric-only. It is an increasingly >> important >> platform for OpenPGP, I believe. >=20 > I think that is a good point and a great idea, but the only reason that= > fingerprints and key IDs are printed in hex now is tradition. There is= > nothing in the standard one way or another about how humans should > consume fingerprints. You could even do it with the current V4 > fingerprints: just as my key fingerprint is > 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct > as 716901811312187285520504099705403090347495794016 in decimal. The bi= g > problem I see here is that's it's an awfully long number to type into a= > mobile keypad. How often does anyone type in a fingerprint at all? My impression of the typical workflow is: * read fingerprint from physical media (business card, scrap of paper, e= tc) * search for a key from the public keyservers (usually by User ID). * scan list of results for a key with a matching keyid (truncated fingerprint) * fetch selected key from keyserver * view/double-check fingerprint of fetched key againt physical media In this workflow, the only typing done is to enter the user id to search for (and even that is not always needed on a mobile device, because the person searched for is may already be in the address book for other contacts). if the fingerprint is entered, it's often only the truncated keyid, which is guaranteed to be much smaller than the fpr in any case. Making this change to the fingerprint presentation seems huge: are people expected to change all their business cards, .sigs, web sites, etc. to show both styles of fingerprint? or to completely transition to the new style? in terms of truncated fingerprints (keyids), how are we to distinguish between the ones which currently have only digits 0-9 in hex and decimal-style fingerprints? This seems like a very costly tradeoff for the sake of thumbing in 8 decimal characters instead of 8 hex digits. --dkg --------------enigBCCF34F563DA425E7D624803 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+U2czS7ZTSFznpAQpf6g/9Eb8tc0/ShQHeFvOaKhdKSJRLEKGjMLTn XgmTP5SQ8ZclCFs8OQlVVYCHOjYdFxet5joJ6G7e1gQzcGnLpkSjN55/mxrKSRtc f0FlBO9jff/CsBTDRL7YG7RiqR7C89AjitDezHjLT2dCeHRJVxA6uOYLuVrs5b97 pM0u66ujHy4+UtYfqalt760eRUX6q7ZzSAxGdQwjxkn4wZo4cWXWEG2AOWwKrD3V y2MSDQya02w904TaBLrxHYB1eCHod0ZnX+wMpRCbym+tyko9J/hPiKd5SuR9rf8o eRRbsV/thYV34+gV7EABvpO95xuU66ABUGm9GuqKZ5GvA31D3W7cDWnH6CVvUK1D Ct5cASq0EUqZivS+C1CgPY6Q7UYvo9KAIQ0RAWIjUNeMkGA4rmMvv7IYVZAK9YcA YOXX6dkwEKoL3YK26OVztr45Pwra75XXIZA00Su93yrjTml6kA/r7bDgmwbb32G0 vie1IJ+8dPimTIEaXUkqiSoFjGELK1ArBV8T1CPrDIq8LZYVtQGFIsZ5BgDfHdit tnE2d7llw+zS9FQW9jD0AhkRCXlTB8/jvjJee+MrytgMLjeAzKisbEnuNfmcqs/+ Jb0zKa3QMDuBYZ2RgimrkVnkbjF88UjXGCMFKTzaAZAB0YANXksZVLFuQJd4Nuk3 3mfHEc2qYho= =rSZr -----END PGP SIGNATURE----- --------------enigBCCF34F563DA425E7D624803-- From owner-ietf-openpgp@mail.imc.org Mon May 4 19:54:14 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B0643A67EF for ; Mon, 4 May 2009 19:54:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.655 X-Spam-Level: X-Spam-Status: No, score=-3.655 tagged_above=-999 required=5 tests=[AWL=-0.056, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fVV+cAbTX222 for ; Mon, 4 May 2009 19:54:10 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id DBD243A6359 for ; Mon, 4 May 2009 19:54:09 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kfLt097036 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452kfEK097035; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452keiu097028 for ; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 90422 invoked from network); 5 May 2009 02:46:38 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:46:38 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FFA8C0.70306@fifthhorseman.net> Date: Mon, 04 May 2009 22:47:28 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-Reply-To: <49FF6677.7070907@epointsystem.org> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigE9C3B898F6A8B9A72D08A57A" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigE9C3B898F6A8B9A72D08A57A Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: > For fingerprints, MDC and self-signatures, collision-resistance does no= t matter, > only the one-way property. So I think it is totally safe to postpone di= scussion > until SHA3 is selected. The more that i consider this, the more important it seems. Thank you for emphasizing it, Daniel. If i understand you correctly, your point is that fingerprints and self-signatures use hashes over data that is provided entirely by the signer, covering nothing that is supplied by an outside party. Since "birthday" attacks rely on the attacker generating an arbitrary collision, providing one side of it for signing by the victim, and then transferring the signature onto the other side of the discovered collision, they do not work against material under full control of the signer (like fingerprints and self-sigs). Even if the recent claims of O(2^52) (instead of the theoretically-optimal 2^80) operations to generate a colliding pair were to scale proportionally to attacks against the one-wayness of SHA-1, that would mean O(2^104) (instead of 2^160) operations to find a message that hashes to a given value. i have no idea if these sort of results can actually scale this way, but i imagine we'd hear a much larger hullabaloo if someone had announced an attack against the one-wayness of SHA-1 with less than O(2^104) operations. Anyway, since 2^104 is still outside the capabilities of well-funded organizations, we have breathing room on these parts of the specification that only rely on collision-resistance. Did i get anything wrong above? I apologize if this is elementary for everyone else, i'm just trying to make sure i understand the ideas involv= ed. --dkg --------------enigE9C3B898F6A8B9A72D08A57A Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+oxczS7ZTSFznpAQr7+RAAoNZqPFaaLFm4/qGyoo/YzQfVi9Vi97JW Mw7JM1XeGm+F2stc1yG8mqBxXr34/0J1wAdI4BLcF6HLnWyI6xZP14YgPb/f1YOe JvseA55NEdS1SC6HXz5uoVdv74sxbyTuLXE69+AzS+mT4bKwU62eVNhrYLgG/zBS 2VWLB/gsOQnWdaQPzh3wX7MU3fYMkZL7O1u1Ixnsfw72kmhQz6sNwlfBQolqL8Bd VCZJztGXUn7KYXy8Q+ndfzPul/GLaUzcIg6CKnlSsb8/YRKffABRowa7zbkRT3Cd E2/ges0hmtMOmvYe7/4v9Vtl/MxuUBMPV4D7TvjATJsDHdM84DVi30wpzTEWLkdK 2spzRXUScXbOpAq9g4/+idgCQ2/AOr4VduHEYw+mIGdue2aB3ubNFFhxkNM12iX3 vbUT1uAmfkLgyGfQIUSK36EJLy45hSKkBhqlWzr8L3Byu3Tb65/17PVvS1uyEI4b cy7iLvJGuHW057xxkMvk1cEEYIYz7hn1XpHGd+XxZQyOBkjR78c0Qfmf0dvCv9HS /3lfUThuIJohDK7AkCKPZRDh1NfdKO24WF31kM7yWsKSufP5GzOSEYMVsqZllQ+9 h5ORvZtSdV9u/prCA67CcSRuHauHhKCZHZFHx9iZimhuJyTBzy3FhW8FIPMfQRtT bMgvtN6iLtg= =5ffQ -----END PGP SIGNATURE----- --------------enigE9C3B898F6A8B9A72D08A57A-- From owner-ietf-openpgp@mail.imc.org Mon May 4 19:56:38 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A58223A6A1A for ; Mon, 4 May 2009 19:56:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.648 X-Spam-Level: X-Spam-Status: No, score=-3.648 tagged_above=-999 required=5 tests=[AWL=-0.049, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FlGn24ZA6YsB for ; Mon, 4 May 2009 19:56:37 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 27EA43A6359 for ; Mon, 4 May 2009 19:55:36 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452mMwP097152 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452mMCA097151; Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452mL4J097145 for ; Mon, 4 May 2009 19:48:21 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 90678 invoked from network); 5 May 2009 02:48:20 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:48:20 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FFA92E.50100@fifthhorseman.net> Date: Mon, 04 May 2009 22:49:18 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig107BF823AF3E617747B108F1" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig107BF823AF3E617747B108F1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 08:17 PM, David Shaw wrote: > Perhaps we'd do better by leaving fingerprints alone and instead fixing= > how we specify revocation keys?=20 [...] > why not define a new revocation > subpacket that contains the class octet from the old revocation key, an= d > the rest of the subpacket is simply a copy of the public key packet in > question? I don't mean the whole transferable public key, of course, > just the contents of packet #6. This seems like a good strategy to me, and a *much* simpler one than trying to overhaul fingerprints! In fact, this seems like a good idea whether or not fingerprints are overhauled. Are there any objections in the WG to this re-definition of revocation key subpackets? the largest realistic keys out there right now are still only around 1KB of a subpacket, and revocation key subpackets themselves are pretty rare. So the added size doesn't seem problematic to me. --dkg --------------enig107BF823AF3E617747B108F1 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+pL8zS7ZTSFznpAQoOgQ//aOTc+ap0k3JTCDr+U4ktsFB48PIpIswt YQ6rTV//FOcTzTC9xpf2dB44D83QaC7IN77TLZq4Hu+PWlRsbZ67DRQJ0OBmxKKe i1ytF2O8M6N4EYWqgZwXFUnkybzaGISKNAFTm0N3f7C8bz79JLOWedWYuUmqCwfD AVazdFgbbWaIh+lyTxMl5sKBvkBK3fwFRN1RAZQhF68HEC2sq4aP6t7M3jwfmDUv sJzYerP5pAaWQi7AbO6dXynRMh16lRfGMpBTNlv2Rx3RX51Ll2rquOFVm/4CdrUV McTqH6sESIjTNvtUYs/d3cpXGG1jyXYE/5x+LBP0ovGVgNopA9ZM+DK1ChrzMK4L K6CxsWqXUzqIXaIPZNns7L9PqzMjziE/W6FyDE1MI8RJBLRm7+tXeLessAp3Z7M7 0J8J/eB5pU3eVkiHgpMJ+SjvLssRs4l6xvef9VAblm+ji7YvcECYMp8+OefE6zwy CiwALwg2Yi/KD4H+tdivXt4P1Qzn8FaevWTd5/b6Sq5Ryoztp03E0HyR1WLlr+Cr hnKhZvpQAuA7aw7MsM/GqPyhuGyBZ4ZvpCz9uDzOAc510TDPsY6qJsS1/OAIYVo8 ABiQL8Db5wJEa8pfi79kgOnaAhJUZh0cRxLBZskfYp4qoXITevTxyfSr1OFHEN9h TYy+v5KqJa0= =7grO -----END PGP SIGNATURE----- --------------enig107BF823AF3E617747B108F1-- From owner-ietf-openpgp@mail.imc.org Mon May 4 20:10:33 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D5253A6816 for ; Mon, 4 May 2009 20:10:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.424 X-Spam-Level: X-Spam-Status: No, score=-4.424 tagged_above=-999 required=5 tests=[AWL=-0.825, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z3F-IhTakR61 for ; Mon, 4 May 2009 20:10:32 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C4D4A3A6811 for ; Mon, 4 May 2009 20:10:30 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532uJZ098147 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 20:02:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4532uMq098146; Mon, 4 May 2009 20:02:56 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailhost.auckland.ac.nz (curly.its.auckland.ac.nz [130.216.12.33]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532jVV098136 for ; Mon, 4 May 2009 20:02:55 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz) Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id CEE3F9FE85; Tue, 5 May 2009 15:02:44 +1200 (NZST) X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (curly.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWjt9zissPYP; Tue, 5 May 2009 15:02:44 +1200 (NZST) Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 582829FB6F; Tue, 5 May 2009 15:02:42 +1200 (NZST) Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id A88031DE4001; Tue, 5 May 2009 15:02:36 +1200 (NZST) Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from ) id 1M1AvU-0002Fn-HI; Tue, 05 May 2009 15:02:36 +1200 From: Peter Gutmann To: dshaw@jabberwocky.com, jon@callas.org Subject: Re: Changing GPG's default key type Cc: ietf-openpgp@imc.org In-Reply-To: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org> Message-Id: Date: Tue, 05 May 2009 15:02:36 +1200 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Jon Callas writes: >Many X.509 systems are like this too -- DSA is the mandatory-to-implement, >but it's not clear that anyone has ever created a DSA certificate outside of >interop testing. Actually even the pretense of that one was dropped a long time ago, no-one apart from the people drafting the standards (and I'm not even sure about them) was ever under any illusion that the de facto standard was anything other than RSA (the PKIX spec still contains DSA signing certs because they were created by NIST more than a decade ago, not because they reflect current practice). People didn't even pretend to do the encryption-algorithm side of things, X9.42 DH, the only implementation I know of that bothered with this was the SFL reference implementation, which didn't have any choice in the matter [0]. Microsoft implemented it as a read-only (i.e. decrypt-only) option specifically to avoid accusations that they didn't comply with the standard, but that was about all. The last time I checked the specs still fudged the matter by saying that you MUST support one of the following shopping-list (including things like MD2 and X9.42), but most implementers know how to interpret this, MUST RSA, WHO-CARES anything else. Peter. [0] So everyone claimed standards compliance without being compliant secure in the knowledge that since no-one else was either, this could never be checked. From owner-ietf-openpgp@mail.imc.org Mon May 4 20:24:04 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7058A3A6C5A for ; Mon, 4 May 2009 20:24:04 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.902 X-Spam-Level: X-Spam-Status: No, score=-5.902 tagged_above=-999 required=5 tests=[AWL=0.697, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nMNUOP8OeJJV for ; Mon, 4 May 2009 20:24:03 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3255F3A67FA for ; Mon, 4 May 2009 20:24:02 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452klZ3097054 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452klUQ097053; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailhost.auckland.ac.nz (larry.its.auckland.ac.nz [130.216.12.34]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kVYg097007 for ; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz) Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 2EAF61A9A8 for ; Tue, 5 May 2009 14:46:31 +1200 (NZST) X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (larry.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UDz6NGCu2qBW for ; Tue, 5 May 2009 14:46:31 +1200 (NZST) Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 125091A9A2 for ; Tue, 5 May 2009 14:46:30 +1200 (NZST) Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id 150651BE4001 for ; Tue, 5 May 2009 14:46:30 +1200 (NZST) Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from ) id 1M1Aft-0001ZO-TZ for ietf-openpgp@imc.org; Tue, 05 May 2009 14:46:29 +1200 From: Peter Gutmann To: ietf-openpgp@imc.org Subject: Re: New results against SHA-1 In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net> Message-Id: Date: Tue, 05 May 2009 14:46:29 +1200 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Daniel Kahn Gillmor writes: >What do other folks think? Given that the MDC is a hash of plaintext that's then encrypted, and the hash value is itself encrypted, I'm not losing any sleep over it. The hash attacks so far have required bit-for-bit carefully-chosen plaintext with known hash values, not unknown (or even partially-known) plaintext with an unknown hash value. Peter. From owner-ietf-openpgp@mail.imc.org Mon May 4 21:15:45 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E4BC83A6BA7 for ; Mon, 4 May 2009 21:15:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.642 X-Spam-Level: X-Spam-Status: No, score=-3.642 tagged_above=-999 required=5 tests=[AWL=-0.043, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6iZo6RakFhZh for ; Mon, 4 May 2009 21:15:45 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0EF723A6BED for ; Mon, 4 May 2009 21:15:37 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4544dZA001088 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4544dBG001087; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4544cMQ001081 for ; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 2495 invoked from network); 5 May 2009 04:04:37 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 04:04:37 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FFBB0B.9070209@fifthhorseman.net> Date: Tue, 05 May 2009 00:05:31 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: how to specify "trust no signatures over hash X from this key"? X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig6B3E60808F65218637960D5B" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig6B3E60808F65218637960D5B Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable As i'm thinking about hash function transitions right now, it occurs to me that i'm not sure how to specify something like "The holder of this key will never issue signatures using digest algorithm $foo" In RFC 4880, section 5.2.3.8 the digest algorithm preferences subpacket says something similar: Message digest algorithm numbers that indicate which algorithms the key holder prefers to receive. Like the preferred symmetric algorithms, the list is ordered. Algorithm numbers are in Section 9. This is only found on a self-signature. But this is semantically something fairly different from stating what kind of use the keyholder expects to pursue. Consider the case where a user has in the past made and published MD5-based signatures, and no longer believes that hash algorithm is secure for the purposes used (or if you like, think into the near future, and imagine the same situation with SHA1). It seems to me that it would be useful to have a way that a keyholder could explicitly state "I no longer make signatures over digest X. Please consider any signatures from this key using digest X to be invalid= =2E" This does lead to the possibility of an explicit "impedance mismatch", where Alice says "I never issue MD5, SHA1, or RIPEMD160 digests" and Bob says "I prefer to receive only SHA1, RIPEMD160, or MD5 digests" -- in this case, Alice's key is useless to Bob. But this impedance mismatch exists implicitly anyway, if these are the actual policies. It seems like it would be useful to know that the conflict exists at that level. Note: *could* a user say "i never issue SHA1 signatures" and remain 4880-compliant? I think so; the spec says that implementations MUST implement SHA1, but it does not say that they must force the user to use it or trust it. Is there interest in being able to explicitly state such a policy? Would this be worth a new subpacket type? If so, would it make sense for ciphers as well as digests? --dkg --------------enig6B3E60808F65218637960D5B Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+7EMzS7ZTSFznpAQoCJw//QUtCuQnxqrr7uxVqdbi7m9mi3+x9kGwF viuS4Oujpa64RlU0by6nOEA5Cea7SVchrU+GKFhbytvfDQup+kNGIVuMJaNy6bSC e1C3YpXw+kiEwp45Y2214Pzv71MGsbyCOUkXgAroMS8nW0u9zOmgXiEhxYnEAWQJ lFSEBpyBEQMol8nenw95QgnVPI8bztS6S1BJDGo92u3NqehUfnhxheMR+iOd0L5i /rXN8RXOPHzwaob/f15gYNm7B/JJxiXYaMogmKP00FFcNxDh4WFkEYgV0mtMuj0P RewzNZlEBOVP5edZfOzvVRGr/ApVuZJ5C4SeQOa0ZdHypVZyM3djKtiMxyDj1YpS 5AhnpCGEWUOStnphuOtfJtWzDKV9aCc/hvr6r6KBO3xdzKsIJTk+c/LGrp2C3WvZ HbHf5EFuFhNZE8vMGp02ViXrEtWwqgfOATiLK+aNtgmDl8znpRrhq53k2u/Qcq5d Qz64HixsC/UT8CKwVl8ymrRG0juA59L6zHWlJfCiTajHM0SpxWoknIA4mDpC+RwU PujiiRmjTNDVREVM5iQmRm0S0cKzkNku59pUeEYhBJSJ26SpntGf+2xIo4dnwiYU eSeMr4Uh+mPlPzK578KHa9y1zPD8ifp9+zQFWCS55jTqJZrFGheHmB0VAgsnMCId PPHdK7f/6W8= =pCgL -----END PGP SIGNATURE----- --------------enig6B3E60808F65218637960D5B-- From owner-ietf-openpgp@mail.imc.org Mon May 4 23:23:25 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7532D3A6AD7 for ; Mon, 4 May 2009 23:23:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rsUp9FxA00Nh for ; Mon, 4 May 2009 23:23:24 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 345D73A6820 for ; Mon, 4 May 2009 23:23:23 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456EH9E008283 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456EHQM008282; Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456E5ac008275 for ; Mon, 4 May 2009 23:14:16 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4968431A8C0; Tue, 5 May 2009 08:14:04 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 234EC598099; Tue, 5 May 2009 08:14:04 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id CYSw8j1xOjfC; Tue, 5 May 2009 08:14:03 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id CD7E7598091; Tue, 5 May 2009 08:14:03 +0200 (CEST) Message-ID: <49FFD926.20802@epointsystem.org> Date: Tue, 05 May 2009 08:13:58 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF756CAA244F068AD36E04778" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigF756CAA244F068AD36E04778 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hi, David Shaw wrote: > It's a larger problem than just fingerprints. We also use a fingerprin= t > as a specifier inside the revocation key subpacket, to designate which > key can be used to issue revocations on our behalf. The thing is, > though, a fingerprint isn't really a very good revocation key specifier= : >=20 > Fingerprints: > * Must be human-readable > * Needs to be small to be useful > * Can collide to some small amount (4880 even documents that they > collide in section 12.2) That's not the fingerprint. That's the key ID. > Revocation key specifier: > * Does not need to be human-readable > * Has much looser size requirements (shouldn't be enormous, but > certainly can be bigger than 160 bits without hurting anything) > * Should never collide (we don't want the wrong key being able to revok= e > our key) In case of collision, both colliding pre-images are done by the same enti= ty. > Perhaps we'd do better by leaving fingerprints alone and instead fixing= > how we specify revocation keys? There is nothing wrong with them at present. Well, actually, I would argue that revocation is currently over-designed.= Since revocation is an irreversible act, there is no need for the heavy artille= ry of digital signatures for that purpose. All the s2k specifiers used for symm= etric encryption would do (in a hashed sub-packet together with the resulting symmetric key) and inserting a non-hashed sub-packet with a matching revo= cation passphrase into the revoked signature would be just as secure a method fo= r revocation than adding a revocation signature packet. There is no need for asymmetric crypto for revocation. Instead of revocat= ion signatures, it would be perfectly safe to use revocation passphrases. > We could try to come up with a new non-colliding way to disambiguate > keys, but fundamentally, anything that is smaller than the key packet > itself can still collide. Again, collisions are not important in this case. Collisions only matter = when the signed information is compiled by a different entity than the signer.= With a hash that is one-way but not collision resistant, you can do two k= eys that have the same fingerprint. So whay? Both are under your control, a signature with either is your signature. > So instead, why not define a new revocation > subpacket that contains the class octet from the old revocation key, an= d > the rest of the subpacket is simply a copy of the public key packet in > question? It costs more and does not provide any extra security. I mean there is no= attack that can be prevented in this way. Therefore, it is less secure. > I don't mean the whole transferable public key, of course, > just the contents of packet #6. This public key packet doesn't need an= y > self-signatures or anything else like that, as it is implicitly > authenticated by the signature that carries the revocation key subpacke= t. It still makes the key fatter without making any attack more difficult. I= t won't make illegitimate revocation more difficult. --=20 Daniel --------------enigF756CAA244F068AD36E04778 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/2SoACgkQoeH/BzqmYjhn+ACfXrHUxacK1Yon5Iwf32CPRY01 TuoAoJIBIlvrFmqoHGhEaIJUMScF93cu =lxIl -----END PGP SIGNATURE----- --------------enigF756CAA244F068AD36E04778-- From owner-ietf-openpgp@mail.imc.org Mon May 4 23:24:16 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1863828C0E2 for ; Mon, 4 May 2009 23:24:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cMp44t19yPWa for ; Mon, 4 May 2009 23:24:15 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D3EA03A6AD7 for ; Mon, 4 May 2009 23:24:14 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HrEM008484 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Hr1k008483; Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HquA008477 for ; Mon, 4 May 2009 23:17:52 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4346811A972 for ; Tue, 5 May 2009 08:17:49 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 26873598099 for ; Tue, 5 May 2009 08:17:49 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Wbp6SqEfRbcG for ; Tue, 5 May 2009 08:17:49 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D457A598091 for ; Tue, 5 May 2009 08:17:48 +0200 (CEST) Message-ID: <49FFDA0C.6040900@epointsystem.org> Date: Tue, 05 May 2009 08:17:48 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <49FFA8C0.70306@fifthhorseman.net> In-Reply-To: <49FFA8C0.70306@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig7486F63840E3487114A61F7A" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig7486F63840E3487114A61F7A Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Your reasoning below is correct, as far as I can tell. Daniel Kahn Gillmor wrote: > On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: >> For fingerprints, MDC and self-signatures, collision-resistance does n= ot matter, >> only the one-way property. So I think it is totally safe to postpone d= iscussion >> until SHA3 is selected. >=20 > The more that i consider this, the more important it seems. Thank you > for emphasizing it, Daniel. >=20 > If i understand you correctly, your point is that fingerprints and > self-signatures use hashes over data that is provided entirely by the > signer, covering nothing that is supplied by an outside party. >=20 > Since "birthday" attacks rely on the attacker generating an arbitrary > collision, providing one side of it for signing by the victim, and then= > transferring the signature onto the other side of the discovered > collision, they do not work against material under full control of the > signer (like fingerprints and self-sigs). >=20 > Even if the recent claims of O(2^52) (instead of the > theoretically-optimal 2^80) operations to generate a colliding pair wer= e > to scale proportionally to attacks against the one-wayness of SHA-1, > that would mean O(2^104) (instead of 2^160) operations to find a messag= e > that hashes to a given value. i have no idea if these sort of results > can actually scale this way, but i imagine we'd hear a much larger > hullabaloo if someone had announced an attack against the one-wayness > of SHA-1 with less than O(2^104) operations. >=20 > Anyway, since 2^104 is still outside the capabilities of well-funded > organizations, we have breathing room on these parts of the > specification that only rely on collision-resistance. >=20 > Did i get anything wrong above? I apologize if this is elementary for > everyone else, i'm just trying to make sure i understand the ideas invo= lved. >=20 > --dkg >=20 --------------enig7486F63840E3487114A61F7A Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/2gwACgkQoeH/BzqmYjgKNwCg3933RhIsA85EMI+lhIoMv6LO kIIAoLq19Ms4RZH8vLqgVaK0vcfwf91s =3hVN -----END PGP SIGNATURE----- --------------enig7486F63840E3487114A61F7A-- From owner-ietf-openpgp@mail.imc.org Mon May 4 23:36:36 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52E953A6A70 for ; Mon, 4 May 2009 23:36:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdb-rjyt3MK4 for ; Mon, 4 May 2009 23:36:35 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 1921B3A695B for ; Mon, 4 May 2009 23:36:34 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UBAF009026 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456UB90009024; Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UAmk009017 for ; Mon, 4 May 2009 23:30:10 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2E26131A590; Tue, 5 May 2009 08:30:09 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 0A566598099; Tue, 5 May 2009 08:30:09 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id n5iGA7C1kZE4; Tue, 5 May 2009 08:30:08 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AFBF6598091; Tue, 5 May 2009 08:30:08 +0200 (CEST) Message-ID: <49FFDCEF.5040006@epointsystem.org> Date: Tue, 05 May 2009 08:30:07 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Changing GPG's default key type References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigADA531ADE781892CA88A4D27" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigADA531ADE781892CA88A4D27 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable There is one reason why I still use DSA keys in some of my applications: They are much cheaper to generate. I strongly believe that in order for c= rypto to become ubiquitous, it is important that key pairs are generated right = after installation. In case of RSA, it can go wrong in two ways: 1. RSA requires too many random bits and a computer that nobody touches c= an just freeze up waiting for random input. 2. The time to generate an RSA key is too long on cheap embedded hardware= =2E Of course, neither is of concern for GPG's default key; if you have such = a system, just tell it to generate DSA keys. But these two points should be= kept in mind. The obvious workaround for #1, is to read enough random bits for the secu= rity of the key (e.g. 256) and then seed a secure PRNG with them. There is, however, no known workaround for #2. Generating a PGP-compliant= 1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enoug= h to make casual users frustrated and throw away the whole thing. Now, of cour= se, such slow mobiles are not manufactured anymore, but even 2 minutes is unacceptable, which is the norm for today's low-end phones. And since the= market values battery life much more than computational muscle (low-end phones = are very responsive at present clock rates) in mobiles, this is not going to = improve too rapidly. --=20 Daniel --------------enigADA531ADE781892CA88A4D27 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/3O8ACgkQoeH/BzqmYjjujwCgkC5EGQtwYoAEwNY4VKHYgooT hucAnjsB9OKhKWCBo3YQQalaUt55QBmF =4lhF -----END PGP SIGNATURE----- --------------enigADA531ADE781892CA88A4D27-- From owner-ietf-openpgp@mail.imc.org Mon May 4 23:53:47 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8EF2D3A68D9 for ; Mon, 4 May 2009 23:53:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c-6UjkO7xzOU for ; Mon, 4 May 2009 23:53:46 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6828F3A6407 for ; Mon, 4 May 2009 23:53:46 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FhxB008363 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Fhn0008362; Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FWEx008349 for ; Mon, 4 May 2009 23:15:42 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 7067D11A9BC for ; Tue, 5 May 2009 08:15:30 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 12992598099 for ; Tue, 5 May 2009 08:15:30 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id DIY3oRhoJPCf for ; Tue, 5 May 2009 08:15:29 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id BD5EB598091 for ; Tue, 5 May 2009 08:15:29 +0200 (CEST) Message-ID: <49FFD981.3030501@epointsystem.org> Date: Tue, 05 May 2009 08:15:29 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: decimal fingerprints [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <49FF94D4.3030101@fifthhorseman.net> In-Reply-To: <49FF94D4.3030101@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigC704609DD70F977B4CBDADD5" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigC704609DD70F977B4CBDADD5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Actually, it is not the fingerprint, but the key ID that is typed in, but= it is a NICE feature of OpenPGP at present that the key ID is simply a substrin= g of the fingerprint. I would hate to lose that. Daniel Kahn Gillmor wrote: > On 05/04/2009 08:17 PM, David Shaw wrote: >> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: >> >>> Also, since mobile phones typically have a numeric keypad, it would b= e >>> nice if >>> fingerprints and key IDs were numeric-only. It is an increasingly >>> important >>> platform for OpenPGP, I believe. >> I think that is a good point and a great idea, but the only reason tha= t >> fingerprints and key IDs are printed in hex now is tradition. There i= s >> nothing in the standard one way or another about how humans should >> consume fingerprints. You could even do it with the current V4 >> fingerprints: just as my key fingerprint is >> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct= >> as 716901811312187285520504099705403090347495794016 in decimal. The b= ig >> problem I see here is that's it's an awfully long number to type into = a >> mobile keypad. >=20 > How often does anyone type in a fingerprint at all? My impression of > the typical workflow is: >=20 >=20 > * read fingerprint from physical media (business card, scrap of paper,= etc) >=20 > * search for a key from the public keyservers (usually by User ID). >=20 > * scan list of results for a key with a matching keyid (truncated > fingerprint) >=20 > * fetch selected key from keyserver >=20 > * view/double-check fingerprint of fetched key againt physical media >=20 > In this workflow, the only typing done is to enter the user id to searc= h > for (and even that is not always needed on a mobile device, because the= > person searched for is may already be in the address book for other > contacts). if the fingerprint is entered, it's often only the truncate= d > keyid, which is guaranteed to be much smaller than the fpr in any case.= >=20 > Making this change to the fingerprint presentation seems huge: are > people expected to change all their business cards, .sigs, web sites, > etc. to show both styles of fingerprint? or to completely transition t= o > the new style? in terms of truncated fingerprints (keyids), how are we= > to distinguish between the ones which currently have only digits 0-9 in= > hex and decimal-style fingerprints? This seems like a very costly > tradeoff for the sake of thumbing in 8 decimal characters instead of 8 > hex digits. >=20 > --dkg >=20 --------------enigC704609DD70F977B4CBDADD5 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/2YEACgkQoeH/BzqmYjhMqgCdGkyMIaZiWDsVXO3zwgaOwRbX bpIAmgMAa48AYJM0yAeODejfeezxegtw =boiH -----END PGP SIGNATURE----- --------------enigC704609DD70F977B4CBDADD5-- From owner-ietf-openpgp@mail.imc.org Tue May 5 00:08:30 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 20F383A6881 for ; Tue, 5 May 2009 00:08:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FxyzEjUzc36D for ; Tue, 5 May 2009 00:08:29 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 013A83A67F5 for ; Tue, 5 May 2009 00:08:28 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456xHgS010463 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:59:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456xHTu010462; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456x6Qx010442 for ; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:6543) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M1EcK-00005d-65 (Exim 4.69) (return-path ); Tue, 05 May 2009 07:59:04 +0100 Received: from ip80-101-239-120.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 4F1915D65; Tue, 5 May 2009 07:58:58 +0100 (GMT/BST) Message-ID: <49FFE3B2.9060408@systemics.com> Date: Tue, 05 May 2009 08:58:58 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> In-Reply-To: <49FFBB0B.9070209@fifthhorseman.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 5/5/09 06:05, Daniel Kahn Gillmor wrote: > Is there interest in being able to explicitly state such a policy? None whatsoever. Simplify, simplify, simplify. One hash is good enough for 99.99% of the users, and the rest should be implementing not eulogising. Has anyone read the OSS Guide to Sabotage? In there it has a list of things about how to break up a user group. One of them is to insist on following rules because they are important, another advice is to always refer things to a committee. If it was updated today for IETF, it would say: always insist on the right to variations in protocols, for future-proofing. iang From owner-ietf-openpgp@mail.imc.org Tue May 5 00:13:45 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3D4683A6A70 for ; Tue, 5 May 2009 00:13:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5bEDbAFay1kR for ; Tue, 5 May 2009 00:13:44 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2C9373A6881 for ; Tue, 5 May 2009 00:13:43 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4577FhN010922 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4577F4R010920; Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45772lu010902 for ; Tue, 5 May 2009 00:07:13 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Ek0-0005ZZ-Hs for ; Tue, 05 May 2009 09:07:00 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ecn-0008P5-QE for ; Tue, 05 May 2009 08:59:33 +0200 From: Werner Koch To: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFA92E.50100@fifthhorseman.net> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Tue, 05 May 2009 08:59:33 +0200 In-Reply-To: <49FFA92E.50100@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 22:49:18 -0400") Message-ID: <87k54w9gru.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Tue, 5 May 2009 04:49, dkg@fifthhorseman.net said: > realistic keys out there right now are still only around 1KB of a > subpacket, and revocation key subpackets themselves are pretty rare. So > the added size doesn't seem problematic to me. I concur. In fact the forthcoming default of RSA signatures will increase the size of a keyblock far more than a single longer revocation key subpacket. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. From owner-ietf-openpgp@mail.imc.org Tue May 5 00:28:37 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4C3BE3A67F5 for ; Tue, 5 May 2009 00:28:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EBWLPyEzNMYc for ; Tue, 5 May 2009 00:28:36 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3574F3A6C0F for ; Tue, 5 May 2009 00:28:35 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H46S011600 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n457H4Oi011599; Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H2NR011592 for ; Tue, 5 May 2009 00:17:03 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Etg-0005eF-Uh for ; Tue, 05 May 2009 09:17:00 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Elx-0008Pk-QI for ; Tue, 05 May 2009 09:09:01 +0200 From: Werner Koch To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Tue, 05 May 2009 09:09:01 +0200 In-Reply-To: <49FF325A.80106@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 14:22:18 -0400") Message-ID: <87fxfk9gc2.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, 4 May 2009 20:22, dkg@fifthhorseman.net said: > Another approach would be to formally prefer digest algorithms that do > not exhibit the same single-pass behavior of SHA-1 -- is that feasible? No. Single pass processing an important feature. Anything else can only be done if the required amount of RAM is small enough and with an upper limit to be implemented on small devices. Think of a network proxy with no need to store the data passing through but to verify signatures of large chunks of this data. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. From owner-ietf-openpgp@mail.imc.org Tue May 5 04:51:51 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A96723A6AD9 for ; Tue, 5 May 2009 04:51:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1E5Qflbu9b1i for ; Tue, 5 May 2009 04:51:50 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 5E8E63A6A8C for ; Tue, 5 May 2009 04:51:50 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45BbI71029558 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45BbIwX029557; Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Bb65o029539 for ; Tue, 5 May 2009 04:37:17 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1IxN-00014O-2J for ; Tue, 05 May 2009 13:37:05 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ioo-0000B5-QN; Tue, 05 May 2009 13:28:14 +0200 From: Werner Koch To: "Daniel A. Nagy" Cc: David Shaw , IETF OpenPGP Working Group Subject: Re: Changing GPG's default key type References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <49FFDCEF.5040006@epointsystem.org> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Tue, 05 May 2009 13:28:14 +0200 In-Reply-To: <49FFDCEF.5040006@epointsystem.org> (Daniel A. Nagy's message of "Tue, 05 May 2009 08:30:07 +0200") Message-ID: <87r5z394c1.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Tue, 5 May 2009 08:30, nagydani@epointsystem.org said: > There is, however, no known workaround for #2. Generating a PGP-compliant > 1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enough to That is a problem of that implementation. Even 10 year old smartcards are able to generate a 1k RSA key in less than 30 seconds. Modern cards are much faster. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. From owner-ietf-openpgp@mail.imc.org Tue May 5 06:29:30 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BA3C28C115 for ; Tue, 5 May 2009 06:29:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.638 X-Spam-Level: X-Spam-Status: No, score=-3.638 tagged_above=-999 required=5 tests=[AWL=-0.039, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T0FxclbWZPM6 for ; Tue, 5 May 2009 06:29:29 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0BD6B3A6B83 for ; Tue, 5 May 2009 06:29:28 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45DJqG2037350 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45DJq7E037349; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay02.pair.com (relay02.pair.com [209.68.5.16]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n45DJfl1037327 for ; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 10420 invoked from network); 5 May 2009 13:19:39 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay02.pair.com with SMTP; 5 May 2009 13:19:39 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <4A003D23.1070208@fifthhorseman.net> Date: Tue, 05 May 2009 09:20:35 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> In-Reply-To: <49FFE3B2.9060408@systemics.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig171F5511815A85E73F57BC1D" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig171F5511815A85E73F57BC1D Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/05/2009 02:58 AM, Ian G wrote: > Simplify, simplify, simplify. One hash is good enough > for 99.99% of the users, and the rest should be implementing not > eulogising. [...] > If it was updated today for IETF, it would say: always insist on the > right to variations in protocols, for future-proofing. I've seen you express this sentiment before, Ian, and i can appreciate where you're coming from. Variable ciphers and digests are messy, difficult to get right, and alienating arcana to most users. But i don't understand what your concrete proposal is here. Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the best approach for us 0.01% of the users/implementors to take in response to the news that SHA-1's collision-resistance was insufficient against well-resourced organizations, and seems likely to get worse before SHA-3 is settled? How would we help facilitate the transition for the 99.99% of the users to a safer hash? Or would we simply tell them "OpenPGP is done, go find something else before the year is up if you want to maintain private/authenticated communications"? Regards, --dkg --------------enig171F5511815A85E73F57BC1D Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgA9KMzS7ZTSFznpAQoSJQ/7Bf2xRQQm1NLLSSK2xTBJYpRgPJb/PqNr ZBNcu1jyWJPNaAqnQpZIjpepFCO188qmnIgmwalQs8zvnDpn459ftEu12cb3Y5no Pf9sD8B2ufhhGNmDR84IjM/HQeRYgJ2ooeU/VqCnSGyQfZuQI7bvIi7U/KCu2j4J IN0ynMDOMES/CwLicf1IIYtO+QQjoRrATacBqOU92sQHpG74a2lEqx7nxSr+8l5S DyR3dn2jD4hvl3bhuHaoyUqm/0FQqElN/XuXwXU9IMyl1KrF3Da46SxrvGg8+z/1 PPtkcDLNrgpPioEj8XvUSM8BGqHFMYfwwe25IPInfdYoobvPse0KpreCPdZeBBbO /PljMfzqsRjomS19ogybe1TJ9dvoOnUluQxnDj88ydsfAFpNJg8qIE8x1u9IeLjC 0uwjQY5isXdoJpYKyI7/iOL3rKiu7v5V5RTuwwC/w32vPBWi3XCB9KysHBVQQmQC 6AmKijmMJfJcVUY6RoTykhV6Cfg/vBg3AzUMv/9Pxw7QniHbVVQDGzw4CMlk4joC NuV8s6sJb/TpT573bb/mRRMctvIu1jvsv/YzVV/paA/E4PGVUGYoBMSX7MNgeIdE P1tzqcGpiwbDEMywSHX6SdM3ya4qa9ORpo4MdbhgRwFdDwblUy7BwjYVtSSV9n/n 7xubhRlV9m0= =CyQN -----END PGP SIGNATURE----- --------------enig171F5511815A85E73F57BC1D-- From owner-ietf-openpgp@mail.imc.org Tue May 5 09:56:42 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 351FC3A6DF3 for ; Tue, 5 May 2009 09:56:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.8 X-Spam-Level: X-Spam-Status: No, score=-0.8 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_ORG=0.611, HOST_MISMATCH_NET=0.311, RCVD_IN_SORBS_DUL=0.877] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zPcqR5qCC-JT for ; Tue, 5 May 2009 09:56:41 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4AC4C3A704B for ; Tue, 5 May 2009 09:55:55 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Gj43A056300 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 09:45:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45Gj3Wc056299; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45GipDR056268 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from hal@finney.org) Received: by finney.org (Postfix, from userid 500) id 83D7814F6E1; Tue, 5 May 2009 08:03:00 -0700 (PDT) To: ietf-openpgp@imc.org Subject: Re: Non-SHA-1 fingerprints Message-Id: <20090505150300.83D7814F6E1@finney.org> Date: Tue, 5 May 2009 08:03:00 -0700 (PDT) From: hal@finney.org ("Hal Finney") Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: > For fingerprints, MDC and self-signatures, collision-resistance does > not matter, only the one-way property. So I think it is totally safe to > postpone discussion until SHA3 is selected. To quibble a bit, the real issue is not the specific usage, but whether the creator of the signature controls the content that is hashed, and whether he adds enough information and "entropy" of his own that no outsider could substantially control and/or guess the content. I can imagine situations from the list above where outsiders might be able to mount an attack. Even self-signatures may have substantial data contributed by outsiders, at least with use of some allowed extensions. We have notation subpackets and possibly other subpackets which could include data that is supplied by outsiders. PGP has for many years supported an extension to the User ID called a Photo ID, which includes a picture of the key holder. Imagine if you added to your key a photo of yourself, but one that was taken by someone else, and signed it with a self signature using a weak hash. Some time later you might discover a different-looking photo circulating, signed with that same signature (because the photo was gimmicked to allow a change in some data to display a different image). One could imagine security implications of this kind of substitution. MDC packets should be immune because we hash the prefix which should normally include 128+ bits of randomness. Likewise with fingerprints, presumably the key itself includes sufficient randomness to make it unguessable, otherwise many other attacks are possible. Hal Finney PGP Corporation From owner-ietf-openpgp@mail.imc.org Tue May 5 10:52:04 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BAC813A6AFC for ; Tue, 5 May 2009 10:52:04 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qtuk2dzyjOvO for ; Tue, 5 May 2009 10:52:03 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7CC793A6878 for ; Tue, 5 May 2009 10:52:03 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiRBZ061317 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HiRHw061316; Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiGsO061306 for ; Tue, 5 May 2009 10:44:26 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 824882E1D3 for ; Tue, 5 May 2009 10:45:08 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41465-05 for ; Tue, 5 May 2009 10:45:03 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id E8FF42E118 for ; Tue, 5 May 2009 10:45:03 -0700 (PDT) Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:44:10 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:44:10 -0700 Message-Id: <318A09AF-96C2-4A2A-8692-F579BCA15568@callas.org> From: Jon Callas To: OpenPGP Working Group In-Reply-To: Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: New results against SHA-1 Date: Tue, 5 May 2009 10:43:57 -0700 References: X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On May 4, 2009, at 7:46 PM, Peter Gutmann wrote: > > Daniel Kahn Gillmor writes: > >> What do other folks think? > > Given that the MDC is a hash of plaintext that's then encrypted, and > the hash > value is itself encrypted, I'm not losing any sleep over it. The > hash attacks > so far have required bit-for-bit carefully-chosen plaintext with > known hash > values, not unknown (or even partially-known) plaintext with an > unknown hash > value. I'm not losing a lot of sleep over it, either. The point of the MDC is to provide a low-level integrity check. There's an easy high-level integrity check, a digital signature. The MDC exists for people who don't want to sign, but do want more protection than naked CFB mode, which is completely vulnerable to truncation. The construction we use is not "secure". I put scare quotes around it for a reason. In particular, it's vulnerable to existential forgeries. However, every spam in the world is an existential forgery, and if you wanted to send an MDC forgery to someone, it's much easier to just write the message and encrypt it to them than modifying an existing message. What that means is that while there are some protocols that really have to worry about existential forgeries (like IPsec), we're really not one of them, especially since there's always signing for us. In 4880, we described how one might upgrade the MDC. If someone believes it's important, I would support anyone writing a draft for an upgraded MDC. (But as an implementer, I can't make a statement as to when or if PGP would implement it.) Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFKAHrqsTedWZOD3gYRAo0BAJ4maMvMTEHDIiJBQ+ry3VuUt3gW7gCglCkE 0nX3EUzYQ+alsPjef8RSeE4= =Tq6M -----END PGP SIGNATURE----- From owner-ietf-openpgp@mail.imc.org Tue May 5 11:05:22 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52D793A6E08 for ; Tue, 5 May 2009 11:05:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kribjga1CmeI for ; Tue, 5 May 2009 11:05:21 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 14A3728C1C1 for ; Tue, 5 May 2009 11:05:20 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwP69062007 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HwPBM062006; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwOvD062000 for ; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id BABA52E215 for ; Tue, 5 May 2009 10:59:17 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41539-07 for ; Tue, 5 May 2009 10:59:11 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id ACA3C2E118 for ; Tue, 5 May 2009 10:59:11 -0700 (PDT) Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:58:18 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:58:18 -0700 Message-Id: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> From: Jon Callas To: OpenPGP Working Group Mime-Version: 1.0 (Apple Message framework v930.3) Subject: I don't think that collides the way you think it does Date: Tue, 5 May 2009 10:58:14 -0700 X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Adi Shamir has pointed out for years now that no one has found *any* first or second preimage collision for SHA1. I'll shill for him here. The new results for 2^52 work, assuming it's actually doable, are still for migrating a bitstring into two dependent bitstrings that collide. This has significance for people who run CAs with sequential serial numbers, or who want to tweak PDFs to project the future, or create binary distributions that have and do not have malware. It's serious *for* *those* *and* *similar* *cases*. It does *not* mean that you can get a collision on an existing signature, nor on an existing fingerprint, nor on an MDC, etc. We are still sitting at *zero* first and second preimage collisions. I think that we should push through the generic fingerprint proposal. I sorta-kinda picked up the ball on that to work with Derek, but if there's anyone else who wants it (or who wants to co-author with Derek and me), I'm happy to have less work to do. I also think it's completely reasonable for an implementation to back away from SHA1 with all due speed -- but you're supposed to be doing that by 2010, anyway! Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFKAH46sTedWZOD3gYRAgw4AKD+McI0GJOGcFXk/n7gmY0PYsKO0ACfa0DQ zhTAaqwStSUApOg8EoG9Tuk= =s+6q -----END PGP SIGNATURE----- From owner-ietf-openpgp@mail.imc.org Tue May 5 12:29:57 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BF46D28C162 for ; Tue, 5 May 2009 12:29:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bFQ7y-lPsKgL for ; Tue, 5 May 2009 12:29:56 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 64AEC28C0CF for ; Tue, 5 May 2009 12:29:56 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JJ0aj068139 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 12:19:01 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45JJ0tr068138; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mho-01-ewr.mailhop.org (mho-01-ewr.mailhop.org [204.13.248.71]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JIne1068119 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from dfranke@feanor.dfranke.us) Received: from adsl-99-175-103-55.dsl.pltn13.sbcglobal.net ([99.175.103.55] helo=feanor.dfranke.us) by mho-01-ewr.mailhop.org with esmtpa (Exim 4.68) (envelope-from ) id 1M1QAC-000JTw-Fb; Tue, 05 May 2009 19:18:48 +0000 Received: by feanor.dfranke.us (Postfix, from userid 1000) id 096162D63ED; Tue, 5 May 2009 12:18:47 -0700 (PDT) X-Mail-Handler: MailHop Outbound by DynDNS X-Originating-IP: 99.175.103.55 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1+YEYY4vsbGMT1XhnwWCUwL DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dfranke.us; s=default; t=1241551127; bh=1FTDtm8GZXh7vDqToK08D1pw4d9PzmoVhBo4cTFtJPI=; h=From:To:Cc:Subject:References:Date:In-Reply-To:Message-ID: MIME-Version:Content-Type; b=yo9jWthLVI5RfjTIoCbAT41XS7CAXbifwxXCc TO/HcceMlVGLv2Q6FTUVAJn+Sfel9GJia7umKhwYrK/BeZi9PwRS/9fwWm4hpgmuioW Pjne0T4m7rcTTo97jZEvt+HRTLTWDny0Xe0mHVhZAwEOOI98GQmOIY6nivZjGileUVY = From: Daniel Franke To: Jon Callas Cc: OpenPGP Working Group Subject: Re: I don't think that collides the way you think it does References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> X-Hashcash: 1:26:090505:ietf-openpgp@imc.org::FWfm+2gA8G6xCEMY:000000000000000000000000000000000000000003UWa X-Hashcash: 1:26:090505:jon@callas.org::h6ykG/NGawgQKom8:000BNMG Date: Tue, 05 May 2009 12:18:41 -0700 In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (sfid-20090505_110311_348312_3F415D8B) (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700") Message-ID: <87eiv3cq9a.fsf@feanor.dfranke.us> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.0.60 (gnu/linux) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --=-=-= Content-Transfer-Encoding: quoted-printable Jon Callas writes: > Adi Shamir has pointed out for years now that no one has found *any*=20=20 > first or second preimage collision for SHA1. I'll shill for him here. > > The new results for 2^52 work, assuming it's actually doable, are=20=20 > still for migrating a bitstring into two dependent bitstrings that=20=20 > collide. This has significance for people who run CAs with sequential=20= =20 > serial numbers, or who want to tweak PDFs to project the future, or=20=20 > create binary distributions that have and do not have malware. It's=20=20 > serious *for* *those* *and* *similar* *cases*. I think you mean "no one has found any first or second preimage *attacks* for SHA-1". To the best of my knowledge, nobody has found any SHA-1 collisions at all, either chosen or otherwise. The 2^52 result is still theoretical, because while 2^52 hash operations is tractable for a WFO, it's still a formidable amount of work, and Cameron McDonald is not a WFO. Preimage attacks are hard. Even long, long-ago deprecated hash functions have held up well agaist them. The one in the worst shape is MD2, and that attack requires 2^104 operations (vs. 2^128 brute force). I'm pretty confident that by the time there's a computer that can do 2^104 of anything, nobody is going care about my secrets. Here's a threat model I suggest for future work on OpenPGP: assume that the hash function is ideal, but that the adversary has an oracle that takes as input two messages and pointers to n/2 bits of each message (where n is the digest length), and outputs colliding messages by filling in those bits. In other words, preimage attacks are impossible (short of brute force), but birthday attacks are trivial. I think securing OpenPGP against this threat model is possible. As you and others have already pointed out, most of OpenPGP's uses of hash functions already depend only on one-wayness. =2D-=20 Daniel Franke df@dfranke.us http://www.dfranke.us |----| =3D|\ \\\\=20=20=20=20 || * | -|-\--------- Man is free at the instant he wants to be.=20 -----| =3D| \ /// --Voltaire --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iF4EAREKAAYFAkoAkREACgkQ8tqcOcPA7qPwzQD+KPhUId+raki0OX9bx7ulEvKF WfATtLN2BUgdNFJfjg0A/1668CZF1Jw0mkApDGqf3KNRs4LIsvzmpbobvqNTWiX4 =sZo9 -----END PGP SIGNATURE----- --=-=-=-- From owner-ietf-openpgp@mail.imc.org Tue May 5 14:40:32 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 56D223A6A8A for ; Tue, 5 May 2009 14:40:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9jKaB9aDhpTw for ; Tue, 5 May 2009 14:40:31 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2CB543A68E6 for ; Tue, 5 May 2009 14:40:30 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LVCRU077932 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45LVCSx077931; Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LV1Gl077919 for ; Tue, 5 May 2009 14:31:11 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 9C6E92E118 for ; Tue, 5 May 2009 14:31:54 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 43121-01 for ; Tue, 5 May 2009 14:31:49 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id D8CBC2E1D3 for ; Tue, 5 May 2009 14:31:49 -0700 (PDT) Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 14:30:56 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 14:30:56 -0700 Cc: OpenPGP Working Group Message-Id: <12A3741B-5277-45CF-8D53-764CEA5732AD@callas.org> From: Jon Callas To: Daniel Franke In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us> Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: I don't think that collides the way you think it does Date: Tue, 5 May 2009 14:30:49 -0700 References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us> X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On May 5, 2009, at 12:18 PM, Daniel Franke wrote: > * PGP Signed by an unknown key > > Jon Callas writes: > >> Adi Shamir has pointed out for years now that no one has found *any* >> first or second preimage collision for SHA1. I'll shill for him here. >> >> The new results for 2^52 work, assuming it's actually doable, are >> still for migrating a bitstring into two dependent bitstrings that >> collide. This has significance for people who run CAs with sequential >> serial numbers, or who want to tweak PDFs to project the future, or >> create binary distributions that have and do not have malware. It's >> serious *for* *those* *and* *similar* *cases*. > > I think you mean "no one has found any first or second preimage > *attacks* for SHA-1". To the best of my knowledge, nobody has found > any > SHA-1 collisions at all, either chosen or otherwise. The 2^52 > result is > still theoretical, because while 2^52 hash operations is tractable > for a > WFO, it's still a formidable amount of work, and Cameron McDonald is > not > a WFO. Thank you for the further clarification. You are correct. Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFKALAQsTedWZOD3gYRAtQVAJ9bLVO5G5yS5oiCWb5KbWCGibNsEACeMwb3 B/qMAwa5oxwg1q7DJ/aXuww= =OUoa -----END PGP SIGNATURE----- From owner-ietf-openpgp@mail.imc.org Tue May 5 15:07:53 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2ED3828C1D2 for ; Tue, 5 May 2009 15:07:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.501 X-Spam-Level: X-Spam-Status: No, score=-4.501 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ymQj5DVmjOqw for ; Tue, 5 May 2009 15:07:52 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 319D23A6BC7 for ; Tue, 5 May 2009 15:07:50 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M17Ng079837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:01:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45M17xm079836; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mta-1.ms.rz.rwth-aachen.de (mta-1.ms.rz.RWTH-Aachen.DE [134.130.7.72]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M0tjZ079809 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=FAIL) for ; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from kloecker@kde.org) MIME-version: 1.0 Received: from ironport-out-1.rz.rwth-aachen.de ([134.130.5.40]) by mta-1.ms.rz.RWTH-Aachen.de (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008)) with ESMTP id <0KJ6004QSYHI11C0@mta-1.ms.rz.RWTH-Aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST) X-IronPort-AV: E=Sophos;i="4.40,299,1238968800"; d="asc'?scan'208";a="10826999" Received: from relay-auth-1.ms.rz.rwth-aachen.de (HELO relay-auth-1) ([134.130.7.78]) by ironport-in-1.rz.rwth-aachen.de with ESMTP; Wed, 06 May 2009 00:00:54 +0200 Received: from [192.168.0.161] ([unknown] [78.49.118.14]) by relay-auth-1.ms.rz.rwth-aachen.de (Sun Java(tm) System Messaging Server 7.0-3.01 64bit (built Dec 9 2008)) with ESMTPA id <0KJ600C6VYHI4X20@relay-auth-1.ms.rz.rwth-aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST) From: Ingo =?iso-8859-1?q?Kl=F6cker?= To: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints Date: Wed, 06 May 2009 00:00:42 +0200 User-Agent: KMail/1.9.10 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-reply-to: Content-type: multipart/signed; boundary=nextPart51737562.EtnubJnk9m; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-transfer-encoding: 7bit Message-id: <200905060000.49934@thufir.ingo-kloecker.de> Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --nextPart51737562.EtnubJnk9m Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Tuesday 05 May 2009, David Shaw wrote: > On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: > > Also, since mobile phones typically have a numeric keypad, it would > > be nice if > > fingerprints and key IDs were numeric-only. It is an increasingly > > important > > platform for OpenPGP, I believe. > > I think that is a good point and a great idea, but the only reason > that fingerprints and key IDs are printed in hex now is tradition. > There is nothing in the standard one way or another about how humans > should consume fingerprints. You could even do it with the current > V4 fingerprints: just as my key fingerprint is > 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally > correct as 716901811312187285520504099705403090347495794016 in > decimal. The big problem I see here is that's it's an awfully long > number to type into a mobile keypad. Right. I do already have a hard time typing an unknown phone number with=20 8 digits. Since most mobile phones come with a camera nowadays the way to go is to=20 take a picture of the fingerprint and then run some OCR on the picture.=20 In fact, it would be much better to encode the fingerprint in some kind=20 of easily scanable bar code (additionally to the common hex=20 fingerprint) than as long string of numbers (similar to Semapedia). Regards, Ingo P.S.: The mailing list software does not add a List-Post header (which=20 is used for "Reply to List" by my MUA). Is it possible to fix this? --nextPart51737562.EtnubJnk9m Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEABECAAYFAkoAtxEACgkQGnR+RTDgudiL5wCeL/YZtGQDctzOV8pBcxtZ4g+0 zeAAnA/MlL6QnAcjUcWwIP6GBmCQF0XQ =M/gC -----END PGP SIGNATURE----- --nextPart51737562.EtnubJnk9m-- From owner-ietf-openpgp@mail.imc.org Tue May 5 15:34:52 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E0E63A70CF for ; Tue, 5 May 2009 15:34:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oTgMSEbbJAsx for ; Tue, 5 May 2009 15:34:51 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 087653A704B for ; Tue, 5 May 2009 15:34:50 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRXEw081556 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45MRXv1081555; Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRMJF081540 for ; Tue, 5 May 2009 15:27:32 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:29068) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M1T6e-0006zP-B0 (Exim 4.69) (return-path ); Tue, 05 May 2009 23:27:20 +0100 Received: from ip80-101-235-1.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 2703C5D65; Tue, 5 May 2009 23:27:12 +0100 (GMT/BST) Message-ID: <4A00BD41.7060807@systemics.com> Date: Wed, 06 May 2009 00:27:13 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> In-Reply-To: <4A003D23.1070208@fifthhorseman.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 5/5/09 15:20, Daniel Kahn Gillmor wrote: > On 05/05/2009 02:58 AM, Ian G wrote: >> Simplify, simplify, simplify. One hash is good enough >> for 99.99% of the users, and the rest should be implementing not >> eulogising. > [...] >> If it was updated today for IETF, it would say: always insist on the >> right to variations in protocols, for future-proofing. > > I've seen you express this sentiment before, Ian, and i can appreciate > where you're coming from. Variable ciphers and digests are messy, > difficult to get right, and alienating arcana to most users. And, anything that slows users slows usage. Unusability is the killer, not the number of bits in the algorithm. > But i > don't understand what your concrete proposal is here. > > Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the > best approach for us 0.01% of the users/implementors to take in response > to the news that SHA-1's collision-resistance was insufficient against > well-resourced organizations, and seems likely to get worse before SHA-3 > is settled? Wait until SHA-3. Meanwhile, design how to use SHA-3 from 2012 to 2022. The predictions of the end of the world are premature. Note that nobody has stolen money through an MD5 as yet, and nobody has stolen money because of an RSA-512, either. Nor, has 40 bit secret keys been embarrassed as yet. (All my humble opinion of course :) The business problem here is that the crypto guys are far too far away from the real business to realise that business leakages are around the 50-80% level. In such an environment, nobody much cares about the difference between 99.99 and 99.999%. > How would we help facilitate the transition for the 99.99% of the users > to a safer hash? Or would we simply tell them "OpenPGP is done, go find > something else before the year is up if you want to maintain > private/authenticated communications"? I think it is best treated as a complete transition from packet types. E.g., "It's time to create a complete new key. V5 is ready." With not as much compatibility between the types as expected, but facilitated by tools. Once per decade. A bit like the transition from 2.6 to 5.0 if you recall. Again, what I believe, others think differently. iang From owner-ietf-openpgp@mail.imc.org Tue May 5 16:08:31 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B285A3A68B2 for ; Tue, 5 May 2009 16:08:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JnZV5N+9KEX for ; Tue, 5 May 2009 16:08:31 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 885C53A67F9 for ; Tue, 5 May 2009 16:08:30 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0vrt083597 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45N0vai083596; Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0jfN083581 for ; Tue, 5 May 2009 16:00:56 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8A08511A1A8; Wed, 6 May 2009 01:00:44 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 173EC598099; Wed, 6 May 2009 01:00:44 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id zeOzR+syRu8S; Wed, 6 May 2009 01:00:43 +0200 (CEST) Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D25BF598091; Wed, 6 May 2009 01:00:43 +0200 (CEST) Message-ID: <4A00C515.6000100@epointsystem.org> Date: Wed, 06 May 2009 01:00:37 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: Daniel Franke CC: Jon Callas , OpenPGP Working Group Subject: Re: I don't think that collides the way you think it does References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us> In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig40F5A262D60EEB9E17B2A2D8" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig40F5A262D60EEB9E17B2A2D8 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Daniel Franke wrote: > Jon Callas writes: >=20 >> Adi Shamir has pointed out for years now that no one has found *any* = >> first or second preimage collision for SHA1. I'll shill for him here. >> >> The new results for 2^52 work, assuming it's actually doable, are =20 >> still for migrating a bitstring into two dependent bitstrings that =20 >> collide. This has significance for people who run CAs with sequential = =20 >> serial numbers, or who want to tweak PDFs to project the future, or =20 >> create binary distributions that have and do not have malware. It's =20 >> serious *for* *those* *and* *similar* *cases*. >=20 > I think you mean "no one has found any first or second preimage > *attacks* for SHA-1". To the best of my knowledge, nobody has found an= y > SHA-1 collisions at all, either chosen or otherwise. The 2^52 result i= s > still theoretical, because while 2^52 hash operations is tractable for = a > WFO, it's still a formidable amount of work, and Cameron McDonald is no= t > a WFO. Just to give you some perspective what WFO means at this day and age: my cryptography lab at the University has just built and tested a DES cracke= r that cost us less than =E2=82=AC20000 EUR. It iterates through the 56-bit key = space in about one week. We are considering using it for finding a SHA1 collision using these new results. But, as noted above, this would be a collision where both pre-im= ages are carefully chosen by the attacker. --=20 Daniel --------------enig40F5A262D60EEB9E17B2A2D8 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoAxRoACgkQoeH/BzqmYjiJ3gCeL2/PxzNTS9+M79gZAQLAe3a7 NgwAoIw3e4dcVFtkC04JIqSwg405QlUp =tkBu -----END PGP SIGNATURE----- --------------enig40F5A262D60EEB9E17B2A2D8-- From owner-ietf-openpgp@mail.imc.org Tue May 5 23:00:38 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1496D3A6B43 for ; Tue, 5 May 2009 23:00:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.635 X-Spam-Level: X-Spam-Status: No, score=-3.635 tagged_above=-999 required=5 tests=[AWL=-0.035, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X1r-fwDOvC1Q for ; Tue, 5 May 2009 23:00:31 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B669C3A6A9E for ; Tue, 5 May 2009 23:00:30 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n465nmig005151 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n465nmM4005150; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n465nb8f005142 for ; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 83334 invoked from network); 6 May 2009 05:49:36 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 6 May 2009 05:49:36 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <4A012528.3080501@fifthhorseman.net> Date: Wed, 06 May 2009 01:50:32 -0400 From: Daniel Kahn Gillmor User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: building up the post-SHA1 Web of Trust X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9; url=http://fifthhorseman.net/dkg.gpg Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig8E6632BDC9EEDBA49FB9BB73" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig8E6632BDC9EEDBA49FB9BB73 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi people-- I just made a fairly gpg-specific blog post suggesting concrete, non-disruptive actions that people can take now to start building out the post-SHA1 Web of Trust: http://www.debian-administration.org/users/dkg/weblog/48 I realize this is a somewhat controversial topic, and i'm not trying to start a flamewar. I do welcome questions, comments, and criticism, though, and i'd be very happy to be able to link to similar HOWTOs for other OpenPGP implementations if anyone else has written them. The actual abandonment of SHA1 is still a ways off, and nothing in my post suggests that we *should* abandon it now. My goal is to see the Web of Trust be sufficiently robust well before SHA-1 is finally deprecated, and this seems possible with current tools and protocols, if we go about it reasonably and start early enough. I really appreciate all the knowledge people have shared on this list about the subject recently. I've learned a lot in the last few days, and hope i haven't screwed anything up too badly. Regards, --dkg --------------enig8E6632BDC9EEDBA49FB9BB73 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgElLczS7ZTSFznpAQowdA//YOcupFAs/Hb9ZD87PGy77kZ6tjO2ZTJZ 2qVz+9qBF8jMynJlXp6F5rvmdTum5bS1PGSDDCcepih9h6nV21UUY1D1mAD3TSlI ffehldROOSQqO6/4fUz3Hh3UTGGICE6MuJsgsVz9AEJdoXZIgpaPEDy3oY+o/T0C n7VKaKbnrvvDAK9x9xI3QZj1wQKThMangetmHiSuDyCPmAD0nZEK27uiXwXSikkb NrszgUW/aH3zyO4moJswJuryIEVvh0tXwBiyspnPiYn+JVocF+Fxenc8p+fzBdtN Lo0pvZZf8+glz9UkftXYjfKPvP1g5a0IVqPs9sUOrK0M5z/ccWsPTsnYA2NBB5MB uS7hZBEHhv5AX1QLimGb4iBAZ/lGSR+zzGiT8umCZpoKNz/mNWKqPPlj51J40iEg VmkUD9FLQ/8KfOsYm4GiRXTM6MD3BqnStJDyMSJHBWY7lABU2hbJrj7v5SSbUYP6 LZmpc0wi508urJLcMquAZA4GPsK9IizbRxliCDEOLWy1K3GbZiWSJeKJ9aQHLinY 3JTACz7/VGaO3+B238n0ViFw1/ZvBcJFgOLtdWY1f18ngvT2JXjdDsqRIb1B5dG0 XTkjRYFouVwj9LC34Z69/y4165KdzUw+ZVx2Kg/Wlr4EhHO3DgnMMa9yF8tDuHYq YHxOvZdONuo= =eChL -----END PGP SIGNATURE----- --------------enig8E6632BDC9EEDBA49FB9BB73-- From tarage1960@vnf-camping.se Wed May 6 08:49:29 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1F1523A68E1 for ; Wed, 6 May 2009 08:49:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -65.292 X-Spam-Level: X-Spam-Status: No, score=-65.292 tagged_above=-999 required=5 tests=[BAYES_95=3, HELO_EQ_DSL=1.129, HELO_EQ_PL=1.135, HOST_EQ_PL=1.95, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, URIBL_BLACK=20, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GjNrc+OAUecf for ; Wed, 6 May 2009 08:49:23 -0700 (PDT) Received: from hhl66.internetdsl.tpnet.pl (hhl66.internetdsl.tpnet.pl [79.187.193.66]) by core3.amsl.com (Postfix) with ESMTP id D3A113A6F00 for ; Wed, 6 May 2009 08:47:12 -0700 (PDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Wed, 6 May 2009 17:48:39 +0200 To: openpgp-archive@ietf.org From: Julio Hence Subject: Ask for John, plz Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_13635525==.ALT" Message-Id: <20090506154713.D3A113A6F00@core3.amsl.com> --=====================_13635525==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Your confidentiality is protected, if you buy pilulles using our site http://www.hitsowor.cn/ --=====================_13635525==.ALT Content-Type: text/html; charset="us-ascii" Your confidentiality is protected, if you buy pilulles using our site http://www.hitsowor.cn/ --=====================_13635525==.ALT-- From Emilia-ihcugozi@husbandandco.net Wed May 6 14:01:56 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9837E3A6F24 for ; Wed, 6 May 2009 14:01:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -61.255 X-Spam-Level: X-Spam-Status: No, score=-61.255 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_CUST=0.245, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_BLACK=20, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 91CD7QI1LgBj for ; Wed, 6 May 2009 14:01:51 -0700 (PDT) Received: from ip64-178-28-158.z28-178-64.customer.algx.net (ip64-178-28-158.z28-178-64.customer.algx.net [64.178.28.158]) by core3.amsl.com (Postfix) with ESMTP id 9D0EE28C1FF for ; Wed, 6 May 2009 14:01:41 -0700 (PDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Wed, 6 May 2009 17:03:09 -0400 To: openpgp-archive@ietf.org From: Emilia Bournazian Subject: Can we delay meeting? Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_93451225==.ALT" Message-Id: <20090506210141.9D0EE28C1FF@core3.amsl.com> --=====================_93451225==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed If you need pilules, the fastest and the cheapest way of getting them is located here http://www.borbupad.cn/ --=====================_93451225==.ALT Content-Type: text/html; charset="us-ascii" If you need pilules, the fastest and the cheapest way of getting them is located here http://www.borbupad.cn/ --=====================_93451225==.ALT-- From lewis@lewisleatherman.com Wed May 6 14:58:21 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F358A3A6DDC; Wed, 6 May 2009 14:58:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -30.682 X-Spam-Level: X-Spam-Status: No, score=-30.682 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_EQ_RO=1.235, HOST_EQ_RO=0.904, J_CHICKENPOX_42=0.6, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SORTED_RECIPS=1.125, URIBL_BLACK=20, URIBL_SBL=20, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2wXZPBTtEW3V; Wed, 6 May 2009 14:58:20 -0700 (PDT) Received: from host-89-42-97-72.bizartelecom.ro (host-89-42-97-72.bizartelecom.ro [89.42.97.72]) by core3.amsl.com (Postfix) with SMTP id CCD1C3A698F; Wed, 6 May 2009 14:58:16 -0700 (PDT) From: "Carmen Costello" TO: <"kink-archive@megatron.ietf.org, ldapbis-archive@megatron.ietf.org, multi6-archive@megatron.ietf.org, openpgp-archive@megatron.ietf.org, opes-archive@megatron.ietf.org, printmib-archive@megatron.ietf.org, provreg-archive@megatron.ietf.org, sctp-impl-archive@megatron.ietf.org, send-archive"@megatron.ietf.org> Subject: Rep or Original? Date: Wed, 06 May 2009 17:59:38 -0500 Message-ID: <48769ewyv764KOJRZkink-archive@megatron.ietf.org> Content-Type: text/plain; Content-Transfer-Encoding: 7Bit Why waste your hard-earned money on an expensive watch when you can have the next best thing for a tenth of its price? http://piovdjov.cn How does 90 percent off sound? Great, of course! And greatness is what awaits you at Diam0nd Reps, the preferred online store where you will find the finest watch imitations for exactly that: 90% off! http://piovdjov.cn Check out our extensive inventory and enjoy the fastest shipping available online! See you at Diam0nd Reps! From owner-ietf-openpgp@mail.imc.org Thu May 7 09:19:28 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CA46D3A7040 for ; Thu, 7 May 2009 09:19:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.322 X-Spam-Level: X-Spam-Status: No, score=-4.322 tagged_above=-999 required=5 tests=[AWL=1.724, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qveJdJpRReJp for ; Thu, 7 May 2009 09:19:28 -0700 (PDT) Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id 0B89F3A6FA9 for ; Thu, 7 May 2009 09:19:27 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjOBS050354 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47FjOxB050353; Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjBbw050335 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 7 May 2009 08:45:23 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n47Fj8O9003930 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 May 2009 11:45:09 -0400 Cc: IETF OpenPGP Working Group Message-Id: From: David Shaw To: "Daniel A. Nagy" In-Reply-To: <49FFD926.20802@epointsystem.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) Date: Thu, 7 May 2009 11:45:08 -0400 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote: > Hi, > > David Shaw wrote: >> It's a larger problem than just fingerprints. We also use a >> fingerprint >> as a specifier inside the revocation key subpacket, to designate >> which >> key can be used to issue revocations on our behalf. The thing is, >> though, a fingerprint isn't really a very good revocation key >> specifier: >> >> Fingerprints: >> * Must be human-readable >> * Needs to be small to be useful >> * Can collide to some small amount (4880 even documents that they >> collide in section 12.2) > > That's not the fingerprint. That's the key ID. A nit, but that really is the fingerprint. 12.2: Note that there is a much smaller, but still non-zero, probability that two different keys have the same fingerprint. It's not exactly *likely*, but it's not quite zero. I heard a urban- legendish story once about someone who (completely accidentally) generated a key that just happened to have a fingerprint collision with someone else's key. Unfortunately, thinking it was a bug, they deleted the key... make of that what you will :) David From owner-ietf-openpgp@mail.imc.org Thu May 7 10:29:21 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD78A3A6C5B for ; Thu, 7 May 2009 10:29:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.046 X-Spam-Level: X-Spam-Status: No, score=-6.046 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id apWuYFSYLODY for ; Thu, 7 May 2009 10:29:20 -0700 (PDT) Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id DA4673A6BC8 for ; Thu, 7 May 2009 10:29:20 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6caX056226 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47H6cVJ056225; Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6RDG056207 for ; Thu, 7 May 2009 10:06:37 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2EAB911A193; Thu, 7 May 2009 19:06:25 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C9B10598099; Thu, 7 May 2009 19:06:25 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id azfR40wWvHfj; Thu, 7 May 2009 19:06:25 +0200 (CEST) Received: from [157.181.227.235] (dhcp235.cs.elte.hu [157.181.227.235]) by mail.agileight.com (Postfix) with ESMTP id 89FBC598091; Thu, 7 May 2009 19:06:25 +0200 (CEST) Message-ID: <4A03150C.7050908@epointsystem.org> Date: Thu, 07 May 2009 19:06:20 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> In-Reply-To: X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig44DC6E51A3726AD501084468" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig44DC6E51A3726AD501084468 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hello, David Shaw wrote: > On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote: >=20 >> Hi, >> >> David Shaw wrote: >>> It's a larger problem than just fingerprints. We also use a fingerpr= int >>> as a specifier inside the revocation key subpacket, to designate whic= h >>> key can be used to issue revocations on our behalf. The thing is, >>> though, a fingerprint isn't really a very good revocation key specifi= er: >>> >>> Fingerprints: >>> * Must be human-readable >>> * Needs to be small to be useful >>> * Can collide to some small amount (4880 even documents that they >>> collide in section 12.2) >> >> That's not the fingerprint. That's the key ID. >=20 > A nit, but that really is the fingerprint. >=20 > 12.2: >=20 > Note that there is a much smaller, but still non-zero, probability > that two different keys have the same fingerprint. While the probability is non-zero, but it is roughly equal to accidentall= y guessing the discrete logarithm of a DSA key or a prime factor of the RSA= key. > It's not exactly *likely*, but it's not quite zero. I heard a > urban-legendish story once about someone who (completely accidentally) > generated a key that just happened to have a fingerprint collision with= > someone else's key. Unfortunately, thinking it was a bug, they deleted= > the key... make of that what you will :) There WAS a bug and he did the right thing. --=20 Daniel --------------enig44DC6E51A3726AD501084468 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoDFREACgkQoeH/BzqmYjjeUgCaA14f3l3FFh1akECwPoxEeLUa W6gAmgOXrbr8LyFINqUS55xAQvei3b8u =u3K1 -----END PGP SIGNATURE----- --------------enig44DC6E51A3726AD501084468-- From owner-ietf-openpgp@mail.imc.org Thu May 7 11:12:08 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4CA263A708E for ; Thu, 7 May 2009 11:12:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.632 X-Spam-Level: X-Spam-Status: No, score=-3.632 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SCGnNDs9mwBd for ; Thu, 7 May 2009 11:12:07 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 616E428C32A for ; Thu, 7 May 2009 11:10:48 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47Hk0MT058473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47Hk0S1058472; Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n47Hjn8Z058453 for ; Thu, 7 May 2009 10:45:59 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 54584 invoked from network); 7 May 2009 17:45:48 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 7 May 2009 17:45:48 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <4A031E88.5020304@fifthhorseman.net> Date: Thu, 07 May 2009 13:46:48 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: keyids vs. fingerprints [was: Re: Fix revocation keys instead of fingerprints?] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> In-Reply-To: X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig4F4AB24288A4BF6E2FDF8F74" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig4F4AB24288A4BF6E2FDF8F74 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/07/2009 11:45 AM, David Shaw wrote: > On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote: >> David Shaw wrote: >>> Fingerprints: >>> * Must be human-readable >>> * Needs to be small to be useful >>> * Can collide to some small amount (4880 even documents that they >>> collide in section 12.2) >> >> That's not the fingerprint. That's the key ID. >=20 > A nit, but that really is the fingerprint. The important items here are 1 and 2, which both apply to a fingerprint. Humans need to be able to cognitively compare fingerprints, so they must be both human-readable and small enough to wade through. As for collisions, 32-bit key ids don't collide "to some small amount". They have *massive* collisions because of the small output space. It takes a few hours of compute time on a single modern desktop machine to generate 32-bit keyID collisions against every single key in the public WoT. 64-bit keyids are better, but still nowhere near the collision resistance we should be expecting from tools we expect humans to use to validate content. keyIDs are useful as pointers, but are not at all useful for verification purposes. --dkg --------------enig4F4AB24288A4BF6E2FDF8F74 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgMejczS7ZTSFznpAQr9zw//TuBcCa2w9WVgU6mUTM8jke6BlILQqo/Q i/rct3ZKWkPhAH3ymMU5KE+MU8aNx7s09Q890anK+Kso/wwklh+UhI+j5//Ys9Uz Q5Sf7ZALcIXn/TTxo5/v8RENuYopW7d4Trm79ctDx6HgAxc8lAU8GGrm/69FJYSA P+xstUybrbKIhlf9tlm23OSrt6+QVfVw0HyeOCZo4GOF151ivXFkOOFLlOwJuqN5 qSTIk8FrEJxZrgzV3xfFDeSYp5XvjUhRmOwn4S/hlAwQr1KOe3diUK53n5nN/xLz qX2G7JTWd2w/3xI+l8gy1fXLGTAZKDw4eO+WQOmZHsSzwVsWLmquW1rekfW1mzQC m5D5gub3BcSFGA89y70aOgD5T8S6S0ZYpDS7yodJSFfAOQ0X06OEezC6oZKr4AKu zbLGs3Ja5ZUH0J+4JMBd1BA7Uc1krLnUssJxTYi2kTdY3I8LDc4qvuPNFqaQ1yyo BFgaoX8yCJVjqQ6lYUmErLEglsrPecPHsSTjuHPJPPTJDORdgLDc0or2AjbDgZSe g+1OKWeXIaRrtm84pWXgGGW7xNaMWTR9DHCbgHgkvq0wFCUm5tCXD6hgfO54Bjno JZyIEyYf7h7BYMmQd5Wr5DkvJ3V7fPHwPUNMCzWzwdHqh2rVPf8u1LoxiHU2q+sI C59VrAVNTsU= =0mp0 -----END PGP SIGNATURE----- --------------enig4F4AB24288A4BF6E2FDF8F74-- From Cathrine-enibbarc@gacha-mana.com Thu May 7 17:09:46 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5CFE33A696F for ; Thu, 7 May 2009 17:09:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -9.5 X-Spam-Level: X-Spam-Status: No, score=-9.5 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, GB_PAYLESS=0.5, HELO_DYNAMIC_IPADDR=2.426, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yhe7WRXRmfXN for ; Thu, 7 May 2009 17:09:40 -0700 (PDT) Received: from ip-210-48-63-20.asiaonline.net.nz (ip-210-48-63-20.asiaonline.net.nz [210.48.63.20]) by core3.amsl.com (Postfix) with ESMTP id 476293A707D for ; Thu, 7 May 2009 17:09:39 -0700 (PDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 8 May 2009 12:11:08 +1200 To: openpgp-archive@ietf.org From: Cathrine Caggiano Subject: Looking for you all day Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_70018343==.ALT" Message-Id: <20090508000940.476293A707D@core3.amsl.com> --=====================_70018343==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Pay less money and get your supplements and pilules shipped to you http://www.zepyosak.cn/ --=====================_70018343==.ALT Content-Type: text/html; charset="us-ascii" Pay less money and get your supplements and pilules shipped to you http://www.zepyosak.cn/ --=====================_70018343==.ALT-- From iareturc_1982@cdimaria.com Fri May 8 04:10:07 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6677E3A7090 for ; Fri, 8 May 2009 04:10:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -41.672 X-Spam-Level: X-Spam-Status: No, score=-41.672 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PVzMOCZiIgPN for ; Fri, 8 May 2009 04:10:01 -0700 (PDT) Received: from ip-89-102-178-169.karneval.cz (ip-89-102-178-169.karneval.cz [89.102.178.169]) by core3.amsl.com (Postfix) with ESMTP id 152DE28C104 for ; Fri, 8 May 2009 04:10:00 -0700 (PDT) X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 8 May 2009 13:11:27 +0200 To: openpgp-archive@ietf.org From: Juli Petko Subject: Prevent flu infection! Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_93496707==.ALT" Message-Id: <20090508111001.152DE28C104@core3.amsl.com> --=====================_93496707==.ALT Content-Type: text/plain; charset="us-ascii"; format=flowed Pilules for men, who want to give ladies more. Time of discounts was claimed http://www.tocfepen.cn/ --=====================_93496707==.ALT Content-Type: text/html; charset="us-ascii" Pilules for men, who want to give ladies more. Time of discounts was claimed http://www.tocfepen.cn/ --=====================_93496707==.ALT-- From owner-ietf-openpgp@mail.imc.org Fri May 8 14:08:18 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F8723A6821 for ; Fri, 8 May 2009 14:08:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.665 X-Spam-Level: X-Spam-Status: No, score=-1.665 tagged_above=-999 required=5 tests=[AWL=0.584, BAYES_00=-2.599, HELO_EQ_DE=0.35] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h6ezvNQxL4Nb for ; Fri, 8 May 2009 14:08:17 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7E4463A69BD for ; Fri, 8 May 2009 14:08:17 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48Kllvm059306 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 8 May 2009 13:47:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n48Klldp059305; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mail.enyo.de (mail.enyo.de [212.9.189.167]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48KlZsJ059290 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from fw@deneb.enyo.de) Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de) by mail.enyo.de with esmtp id 1M2Wyf-0003X8-Uj; Fri, 08 May 2009 22:47:30 +0200 Received: from fw by deneb.enyo.de with local (Exim 4.69) (envelope-from ) id 1M2Wyf-0000r1-ID; Fri, 08 May 2009 22:47:29 +0200 From: Florian Weimer To: Jon Callas Cc: OpenPGP Working Group Subject: Re: I don't think that collides the way you think it does References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> Date: Fri, 08 May 2009 22:47:29 +0200 In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700") Message-ID: <87skjfcof2.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: * Jon Callas: > The new results for 2^52 work, assuming it's actually doable, are > still for migrating a bitstring into two dependent bitstrings that > collide. This has significance for people who run CAs with sequential > serial numbers, or who want to tweak PDFs to project the future, or > create binary distributions that have and do not have malware. It's > serious *for* *those* *and* *similar* *cases*. Unfortunately, signing someone else's key and user ID is a similar case. You don't know what you're being asked to sign, and you haven't created the document yourself. And a photo ID gives you many bits to play with. In the abstract, you do not actually need collision resistance (and totally keyless hashes) for OpenPGP-like protocols, but current practice is certainly different. IMHO, an eventual OpenPGP successor should prepend salts/IVs in front of signatures. Of course, this might be used as a relatively high-bandwidth covert channel, but it means that the hash function will likely last somewhat longer. From mubn@almaden.ibm.com Sun May 10 12:43:52 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3DA703A6A19 for ; Sun, 10 May 2009 12:43:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -52.315 X-Spam-Level: X-Spam-Status: No, score=-52.315 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, HELO_EQ_DSL=1.129, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ip-5ZOqeUhik for ; Sun, 10 May 2009 12:43:45 -0700 (PDT) Received: from vfppp079167046212.dsl.hol.gr (vfppp079167046212.dsl.hol.gr [79.167.46.212]) by core3.amsl.com (Postfix) with SMTP id 4DEC63A6CEC for ; Sun, 10 May 2009 12:43:43 -0700 (PDT) To: " Date: Sun, 10 May 2009 12:43:43 -0700 (PDT)

Read more
Copyright
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From owner-ietf-openpgp@mail.imc.org Mon May 11 14:08:25 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9C1063A6A8C for ; Mon, 11 May 2009 14:08:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.629 X-Spam-Level: X-Spam-Status: No, score=-3.629 tagged_above=-999 required=5 tests=[AWL=-0.030, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d+7m6E2OG8cJ for ; Mon, 11 May 2009 14:08:24 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 72EA73A683E for ; Mon, 11 May 2009 14:08:24 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4BKvZgr091809 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4BKvZOr091808; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4BKvO0W091797 for ; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 93868 invoked from network); 11 May 2009 20:57:22 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay01.pair.com with SMTP; 11 May 2009 20:57:22 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <4A08916E.4000902@fifthhorseman.net> Date: Mon, 11 May 2009 16:58:22 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-Reply-To: <49FF6677.7070907@epointsystem.org> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3E288F6834146C1C811D07D6" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig3E288F6834146C1C811D07D6 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable (dredging this up from a week ago because i was re-thinking it today) On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: > For fingerprints, MDC and self-signatures, collision-resistance does no= t matter, > only the one-way property. So I think it is totally safe to postpone di= scussion > until SHA3 is selected. I think this point holds for fingerprints and MDCs. I'm not convinced that it holds for self-signatures, though. Let's assume Alice has an SHA-1 collision-generator that she can coax into generating two messages, A and B with the same digest, and that she is meeting Bob for a keysigning at the pub on Friday. She crafts message A, which looks like a regular public key/uid signature, including friday evening's timestamp and her User ID (this is exactly the information to be hashed in a non-self-signature -- maybe it hides the collision-generating bits in one of the public key MPIs?). Message B is the data within a self-signature over Bob's key, asserting something Bob didn't want to assert (e.g. binding a user ID of a known villain, or binding a false encryption subkey which Alice controls). The collision-generating bits in B might be hidden here in a notation subpacket or something similarly opaque. At the pub, Alice gets Bob to sign her key (message A) at just the right time, retrieves his signature, and transfers it to the new bogus self-sig (message B). I think this means we need to consider self-signatures made over a given algorithm as potentially spoofable if the digest's collision-resistance is weakened. It is *not* just the one-wayness that matters for self-sigs= =2E Is this analysis reasonable? What have i missed? --dkg PS i know that no one has demonstrated anything remotely close to the hypothesized oracle i've given Alice above. The point is just that collision-resistance affects self-sigs in ways that it does not affect the MDC or the fingerprint. --------------enig3E288F6834146C1C811D07D6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgiRf8zS7ZTSFznpAQrFLw/9EAnXGMWkzvNq39vQbSnfeKRgN6wdp58W BleRzhBLyb112LKpt7RZclRcbFtb26+Fr6mpzite7/zhn+ejWKIxdWSD+L79RLF6 V9YRpvtMGl3ja+MB1FPQpUBc5Rchvr+VHH1UlkhXh9BAKX+az5TWbEb6itVKk2Qg 1ilU7MK9bUZv3zsjrj8Bu6SBYza6q/Fk6FDpXVGlcKsTZ6HAiukmO/iE/EFJnZZP qVeEwZZ/g8UYCmFFbgJLaRv67VpvNulP3GPJTg9c28SwVO1l0lTkQjQkFobjU8+o YI/+FodxbSILIXuYbgq43JU0IQ9S5+GUSDO4Z40zf+rz4B+tTHGiavW7+oTIyHg9 S8S3ZGPLMofuy2ciJTaTwveTFhfMJ6YCySXTifIOutoz1HzjbDnGUL0VzTRynAic v7WnihVSVpLDYRjF3tLNR5D7Ow7DcU8MZTmbFyBJCvCDR7Bj989+Im2iXPGMiIZ2 EcCNB5evIQ+qG4/ZaCOap6202ZG5jcwy4AfWEzjvPdMja2+volYZG4Nyw6axKnJ0 PxwqmYLFgkY/Ab+l1W2AK23qA333Iq+/SCPKVH30XbQ6NWv+qmlBuvWKiO+fFGjY eM5+W2KZgtE4Kux8imx2hTAzg5zOrs8UiNUb6ZXpody/wYxVdkg+0UuxnnwEUXPI g41NE3JD75s= =JqA8 -----END PGP SIGNATURE----- --------------enig3E288F6834146C1C811D07D6-- From owner-ietf-openpgp@mail.imc.org Mon May 11 22:51:25 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2490F3A6A5E for ; Mon, 11 May 2009 22:51:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cB3ZlgIsLI4W for ; Mon, 11 May 2009 22:51:24 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id DEAE53A691F for ; Mon, 11 May 2009 22:51:23 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fVRk015727 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4C5fV4b015726; Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fJcW015714 for ; Mon, 11 May 2009 22:41:30 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 9B08D11AD04 for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C6F19598099 for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Xn-1VN4rsHtD for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) Received: from [10.0.0.129] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9143B598091 for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) Message-ID: <4A090BF5.6090805@epointsystem.org> Date: Tue, 12 May 2009 07:41:09 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <4A08916E.4000902@fifthhorseman.net> In-Reply-To: <4A08916E.4000902@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigBE9288F01ECA740305A0E4C1" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigBE9288F01ECA740305A0E4C1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable I think, you are right. My bad. Daniel Kahn Gillmor wrote: > (dredging this up from a week ago because i was re-thinking it today) >=20 > On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: >> For fingerprints, MDC and self-signatures, collision-resistance does n= ot matter, >> only the one-way property. So I think it is totally safe to postpone d= iscussion >> until SHA3 is selected. >=20 > I think this point holds for fingerprints and MDCs. I'm not convinced > that it holds for self-signatures, though. >=20 > Let's assume Alice has an SHA-1 collision-generator that she can coax > into generating two messages, A and B with the same digest, and that sh= e > is meeting Bob for a keysigning at the pub on Friday. >=20 > She crafts message A, which looks like a regular public key/uid > signature, including friday evening's timestamp and her User ID (this i= s > exactly the information to be hashed in a non-self-signature -- maybe i= t > hides the collision-generating bits in one of the public key MPIs?). > Message B is the data within a self-signature over Bob's key, asserting= > something Bob didn't want to assert (e.g. binding a user ID of a known > villain, or binding a false encryption subkey which Alice controls). > The collision-generating bits in B might be hidden here in a notation > subpacket or something similarly opaque. >=20 > At the pub, Alice gets Bob to sign her key (message A) at just the righ= t > time, retrieves his signature, and transfers it to the new bogus > self-sig (message B). >=20 > I think this means we need to consider self-signatures made over a give= n > algorithm as potentially spoofable if the digest's collision-resistance= > is weakened. It is *not* just the one-wayness that matters for self-si= gs. >=20 > Is this analysis reasonable? What have i missed? >=20 > --dkg >=20 > PS i know that no one has demonstrated anything remotely close to the > hypothesized oracle i've given Alice above. The point is just that > collision-resistance affects self-sigs in ways that it does not affect > the MDC or the fingerprint. >=20 --------------enigBE9288F01ECA740305A0E4C1 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoJC/wACgkQoeH/BzqmYjhJZACeKAuRrkPYj3iHa5gAtG+4ZEKg u9AAoL4L8gQPaZzN1HPT39ObaIO70F85 =Eskt -----END PGP SIGNATURE----- --------------enigBE9288F01ECA740305A0E4C1-- From carportg@genesiis.com Thu May 14 10:29:57 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C4D453A6B3F; Thu, 14 May 2009 10:29:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -41.752 X-Spam-Level: X-Spam-Status: No, score=-41.752 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DOS_OE_TO_MX=2.75, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_HCC=4.295, HELO_DYNAMIC_IPADDR2=4.395, HELO_EQ_BLUEYON=1.4, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, J_CHICKENPOX_34=0.6, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_SPEC_REPLICA_OBFU=1.812, SARE_SPEC_ROLEX_NOV5A=1.062, STOX_REPLY_TYPE=0.001, TVD_RCVD_IP=1.931, URIBL_SBL=20, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QPdp6MyhMhDs; Thu, 14 May 2009 10:29:57 -0700 (PDT) Received: from 77-97-15-37.cable.ubr20.uddi.blueyonder.co.uk (77-97-15-37.cable.ubr20.uddi.blueyonder.co.uk [77.97.15.37]) by core3.amsl.com (Postfix) with ESMTP id CA4103A704F; Thu, 14 May 2009 10:29:55 -0700 (PDT) Date: Thu, 14 May 2009 18:31:26 +0000 From: ntdp@ietf.org Subject: Watch e-shop To: Message-ID: <000d01c9d4b9$cf591590$6400a8c0@carportg> MIME-Version: 1.0 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 X-Mailer: Microsoft Outlook Express 6.00.2900.2180 Content-type: text/plain; format=flowed; charset=iso-8859-1; reply-type=original Content-transfer-encoding: 7bit X-Priority: 3 X-MSMail-priority: Normal This watch made similar to the real brand one, except, at a much lower cost. The replica watches are very popular as we can look classy and professional, yet not have to spend so many dollars. The rep1icas allow the normal person to be able to look and feel classy, without spending such ridiculous amounts of money. We also can have the watches to add a touch of classic to our life style. // -Patek Philippe -Panerai Click Here now! http://girlishrerunning.cn Thanks! Porsha Key UK From maurizio.sterpetti@agrileasing.it Thu May 14 18:15:27 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 860783A6C7F for ; Thu, 14 May 2009 18:15:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -15.25 X-Spam-Level: X-Spam-Status: No, score=-15.25 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RDNS_NONE=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q7sQmif6MwaH for ; Thu, 14 May 2009 18:15:27 -0700 (PDT) Received: from 201-93-22-99.dial-up.telesp.net.br (201-93-22-99.dial-up.telesp.net.br [201.93.22.99]) by core3.amsl.com (Postfix) with SMTP id CE6F53A708B for ; Thu, 14 May 2009 18:15:14 -0700 (PDT) To: " Date: Thu, 14 May 2009 18:15:14 -0700 (PDT)

THE SECRETS TO
Subscribe for catalogs
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From afresni@learnlink.emory.edu Thu May 14 21:55:17 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 892443A6AF8; Thu, 14 May 2009 21:55:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -19.129 X-Spam-Level: X-Spam-Status: No, score=-19.129 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SBL=20, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hrBaaLnlolB0; Thu, 14 May 2009 21:55:16 -0700 (PDT) Received: from 173-16-36-92.client.mchsi.com (173-16-36-92.client.mchsi.com [173.16.36.92]) by core3.amsl.com (Postfix) with SMTP id D82E93A63C9; Thu, 14 May 2009 21:55:12 -0700 (PDT) Message-ID: X-Originating-IP: 92.137.114.200 by 127.200.176.166; Fri, 15 May 2009 00:48:46 -0500 To: "Virgie Salgado" From: "Alexis Dickinson" Date: Fri, 15 May 2009 00:56:46 -0500 Subject: Why rep watches are better Content-Type: text/plain; Content-Transfer-Encoding: 7Bit Hello Virgie I had never seen such beautiful and greatly-performing watches like the ones I found online at http://www.exclussiveq.com The best news is that in May you can buy two watches and get an extra 15% off your purchase! http://www.exclussiveq.com Our Franck Muller have all appropriate markings, wordings and engravings same as orginal. Sincerely, Mr Salgado From sk8erdawn@gmail.com Fri May 15 11:34:06 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C6E693A6D96; Fri, 15 May 2009 11:34:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -28.843 X-Spam-Level: X-Spam-Status: No, score=-28.843 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EGLfIh26yo3F; Fri, 15 May 2009 11:34:00 -0700 (PDT) Received: from 200-71-113-92.pool.ukrtel.net (200-71-113-92.pool.ukrtel.net [92.113.71.200]) by core3.amsl.com (Postfix) with SMTP id E1DCE3A6987; Fri, 15 May 2009 11:33:49 -0700 (PDT) From: "Ron Cantrell" To: "Alexander Justice" Message-ID: Content-Type: text/plain; Content-Transfer-Encoding: 7Bit Date: Fri, 15 May 2009 14:35:26 -0500 Subject: Save thousands... no one will know Hello Alexander Looking for a Longines? How about getting two, one for you and one for your spouse? http://www.reppzlis.com Take advantage of our spring specials and get yourself Longines watch that you've always wanted! http://www.reppzlis.com Our Longines have Weights/feels and looks exactly same as original. Sincerely, Mr Justice From mjerums@amgen.com Sat May 16 04:11:21 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D922E3A67F4 for ; Sat, 16 May 2009 04:11:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -18.613 X-Spam-Level: X-Spam-Status: No, score=-18.613 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, DNS_FROM_RFC_BOGUSMX=1.482, FH_RELAY_NODNS=1.451, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_2=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HQ8C+tKD-0KW for ; Sat, 16 May 2009 04:11:21 -0700 (PDT) Received: from a-i-c.com (unknown [59.184.150.15]) by core3.amsl.com (Postfix) with SMTP id E52823A698A for ; Sat, 16 May 2009 04:10:20 -0700 (PDT) To: " Date: Sat, 16 May 2009 04:10:20 -0700 (PDT)

THE SECRETS TO
Subscribe for catalogs
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From lauraric@onthehouse.com Sun May 17 15:14:37 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 463063A693F; Sun, 17 May 2009 15:14:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 4.915 X-Spam-Level: **** X-Spam-Status: No, score=4.915 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_DHCP=1.398, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DSL=1.129, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_NJABL_PROXY=1.643, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SBL=20, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j-TdoOiNnlpS; Sun, 17 May 2009 15:14:36 -0700 (PDT) Received: from adsl-203-93-192-81.adsl2.iam.net.ma (adsl-203-93-192-81.adsl2.iam.net.ma [81.192.93.203]) by core3.amsl.com (Postfix) with SMTP id 1F6F93A682A; Sun, 17 May 2009 15:14:16 -0700 (PDT) X-Originating-IP: 212.163.0.136 by 160.97.236.8; Sun, 17 May 2009 17:06:52 -0600 Message-ID: To: "Angelique Kirk" From: "Johnnie Vogt" Subject: Save thousands... no one will know Date: Sun, 17 May 2009 18:15:52 -0500 Content-Type: text/plain; Content-Transfer-Encoding: 7Bit Hello Angelique If you've waited to get your Patek Phillipe watch, this is the right time to go for it. http://www.exclussiveq.com/ The best news is that in May you can buy two watches and get an extra 15% off your purchase! http://www.exclussiveq.com/ Our Patek Phillipe watches have perfect weight and feel same as orginal. Sincerely, Mr Kirk From lfelt@alexlee.com Thu May 21 04:29:18 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E5FB3A6AFD for ; Thu, 21 May 2009 04:29:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -7.462 X-Spam-Level: X-Spam-Status: No, score=-7.462 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d2+Y4omzzDMH for ; Thu, 21 May 2009 04:29:17 -0700 (PDT) Received: from 777date.com (unknown [190.26.156.141]) by core3.amsl.com (Postfix) with SMTP id C12683A6CE5 for ; Thu, 21 May 2009 04:29:16 -0700 (PDT) To: " Date: Thu, 21 May 2009 04:29:16 -0700 (PDT)

THE SECRETS TO
Subscribe for catalogs
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From mark.pauluzzidd@altertrading.com Thu May 21 09:08:54 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0C99628C13A for ; Thu, 21 May 2009 09:08:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.769 X-Spam-Level: X-Spam-Status: No, score=-1.769 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C4a55VdAyomX for ; Thu, 21 May 2009 09:08:48 -0700 (PDT) Received: from 204-119-22-245.dynpool.wntpr.com (204-119-22-245.dynpool.wntpr.com [204.119.22.245]) by core3.amsl.com (Postfix) with SMTP id 275713A6AFA for ; Thu, 21 May 2009 09:08:46 -0700 (PDT) To: " Date: Thu, 21 May 2009 09:08:46 -0700 (PDT)

THE SECRETS TO
Subscribe for catalogs
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From netexchangepro@aigfa.com Thu May 21 13:30:44 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 13AFF3A7007 for ; Thu, 21 May 2009 13:30:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -13.367 X-Spam-Level: X-Spam-Status: No, score=-13.367 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HOST_EQ_D_D_D_D=0.765, HELO_MISMATCH_COM=0.553, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IByGCgfmZRIu for ; Thu, 21 May 2009 13:30:40 -0700 (PDT) Received: from alshawaf.com (Wimax-Bgta-190-70-34-185.orbitel.net.co [190.70.34.185]) by core3.amsl.com (Postfix) with SMTP id B33B83A7009 for ; Thu, 21 May 2009 13:30:39 -0700 (PDT) To: " Date: Thu, 21 May 2009 13:30:39 -0700 (PDT)

THE SECRETS TO
Subscribe for catalogs
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From na3wong@abacusinfo.com Thu May 21 19:11:41 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B96BF3A68FD for ; Thu, 21 May 2009 19:11:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -51.282 X-Spam-Level: X-Spam-Status: No, score=-51.282 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JYCEAWDfFKw7 for ; Thu, 21 May 2009 19:11:35 -0700 (PDT) Received: from acr.org (unknown [190.49.34.89]) by core3.amsl.com (Postfix) with SMTP id B6F813A6AD6 for ; Thu, 21 May 2009 19:11:33 -0700 (PDT) To: " Date: Thu, 21 May 2009 19:11:33 -0700 (PDT)

THE SECRETS TO
Subscribe for catalogs
Unsubscribe | Your Privacy Rights

2008 Rodale Inc., all rights reserved.
Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
From owner-ietf-openpgp@mail.imc.org Fri May 22 16:36:23 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 389423A693F for ; Fri, 22 May 2009 16:36:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.054 X-Spam-Level: X-Spam-Status: No, score=-1.054 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HOST_EQ_NL=1.545] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y+i9mcRUBhQ8 for ; Fri, 22 May 2009 16:36:19 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 445BC3A6B20 for ; Fri, 22 May 2009 16:36:19 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOgQG045206 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4MNOgji045205; Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOT7u045186 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Fri, 22 May 2009 16:24:40 -0700 (MST) (envelope-from master@capsaicin.mamane.lu) Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from ) id 1M7e6E-0004zO-UT; Sat, 23 May 2009 01:24:27 +0200 Date: Sat, 23 May 2009 01:24:26 +0200 From: Lionel Elie Mamane To: Ian G Cc: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? Message-ID: <20090522232426.GA18238@capsaicin.mamane.lu> Mail-Followup-To: Lionel Elie Mamane , Ian G , IETF OpenPGP Working Group References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4A00BD41.7060807@systemics.com> X-Operating-System: GNU/Linux X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc User-Agent: Mutt/1.5.17+20080114 (2008-01-14) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: > The predictions of the end of the world are premature. Note that nobody > has stolen money through an MD5 as yet, and nobody has stolen money > because of an RSA-512, either. Maybe, but people have stolen money because of "too small RSA" keys. It was RSA-320, not RSA-512. According to my sources, yp to and including in the year 2007 (I don't know when it was stopped or whether it was). Because the debit card of the swiss PostFinance was using RSA-320 for authentication. As was the whole debit / credit card system in France until the early 21st century; it seems there were cases of theft up to 2001 in France. France: http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm http://www.parodie.com/monetique/ Switzerland: http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html http://www.postcard-sicherheit.ch/ http://chaostreff-zh.tuners.ch/Pestcard -- Lionel From owner-ietf-openpgp@mail.imc.org Sat May 23 03:23:18 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53A203A6C3D for ; Sat, 23 May 2009 03:23:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.855 X-Spam-Level: X-Spam-Status: No, score=-1.855 tagged_above=-999 required=5 tests=[AWL=-0.745, BAYES_05=-1.11] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RdifhVtV+gZ2 for ; Sat, 23 May 2009 03:23:16 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 5B6A03A6A59 for ; Sat, 23 May 2009 03:23:16 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NACFXc080304 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4NACF6g080303; Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NAC4Fb080289 for ; Sat, 23 May 2009 03:12:14 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:916) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M7oCv-0008OY-Iw (Exim 4.69) (return-path ); Sat, 23 May 2009 11:12:02 +0100 Received: from [IPv6:::1] (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0BCF55D65; Sat, 23 May 2009 11:11:57 +0100 (GMT/BST) Message-ID: <4A17CBF0.7060909@systemics.com> Date: Sat, 23 May 2009 12:12:00 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: Lionel Elie Mamane , IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> In-Reply-To: <20090522232426.GA18238@capsaicin.mamane.lu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 23/5/09 01:24, Lionel Elie Mamane wrote: > On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: > >> The predictions of the end of the world are premature. Note that nobody >> has stolen money through an MD5 as yet, and nobody has stolen money >> because of an RSA-512, either. > > Maybe, but people have stolen money because of "too small RSA" > keys. It was RSA-320, not RSA-512. According to my sources, yp to and > including in the year 2007 (I don't know when it was stopped or > whether it was). Because the debit card of the swiss PostFinance was > using RSA-320 for authentication. As was the whole debit / credit card > system in France until the early 21st century; it seems there were > cases of theft up to 2001 in France. > > France: > http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm > http://www.parodie.com/monetique/ > > Switzerland: > http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html > http://www.postcard-sicherheit.ch/ > http://chaostreff-zh.tuners.ch/Pestcard > Well, this is an important benchmark, if it indeed happened. The questions would be: was the RSA cracked, or was it something else that failed? Or a combination of things? What's with the 320 number? Secondly, was money stolen because of this? I noticed that CCC is in those links, and that indicates more of a "demo" quality. Unfortunately my french & german isn't up to it, often a problem when results come from other countries. iang From verifiesa141@mister.net Sat May 23 08:43:53 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D16843A65A6; Sat, 23 May 2009 08:43:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -13.477 X-Spam-Level: X-Spam-Status: No, score=-13.477 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DIET_1=0.083, DOS_OE_TO_MX=2.75, FH_HELO_EQ_CHARTER=2.175, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_HCC=4.295, HELO_DYNAMIC_IPADDR2=4.395, HOST_EQ_CHARTER=1.295, HOST_EQ_DHCP=1.295, HS_INDEX_PARAM=0.001, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SBL=20, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mnacVZrtFCAz; Sat, 23 May 2009 08:43:53 -0700 (PDT) Received: from 24-159-6-196.dhcp.smrt.tn.charter.com (24-159-6-196.dhcp.smrt.tn.charter.com [24.159.6.196]) by core3.amsl.com (Postfix) with ESMTP id E77A13A6AB6; Sat, 23 May 2009 08:43:52 -0700 (PDT) Message-ID: <000d01c9dbbd$8166a720$6400a8c0@verifiesa141> From: ntdp@ietf.org To: Subject: Get Healthy and stay healthy its easy WIth Acai Berry. Date: Sat, 23 May 2009 08:45:32 -0800 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C9DBBD.8166A720" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 This is a multi-part message in MIME format. ------=_NextPart_000_0007_01C9DBBD.8166A720 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable Have you tried every diet out there with out the desired results?   http://www.maindol.com/?jpljpdvpttx =A0 Lose wieght without dieting , Acai Berry.=20 =A0 Have a look =A0 =A0 best ragards Connolly ------=_NextPart_000_0007_01C9DBBD.8166A720 Content-Type: text/html; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable
Have you tried every diet out there with = out the desired results?
 
http://www.maindol.com/?jpljpd= vpttx
=A0
Lose wieght without dieting , Acai Berry.=
=A0
=A0
=A0
best ragards Connolly
<= /HTML> ------=_NextPart_000_0007_01C9DBBD.8166A720-- From owner-ietf-openpgp@mail.imc.org Sun May 24 03:32:44 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6CC273A6AF8 for ; Sun, 24 May 2009 03:32:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.246 X-Spam-Level: X-Spam-Status: No, score=0.246 tagged_above=-999 required=5 tests=[AWL=-1.300, BAYES_50=0.001, HOST_EQ_NL=1.545] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KqifsudUE1hI for ; Sun, 24 May 2009 03:32:43 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 754903A6F52 for ; Sun, 24 May 2009 03:32:42 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAFC5p062086 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OAFCwd062085; Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAEwid062066 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Sun, 24 May 2009 03:15:10 -0700 (MST) (envelope-from master@capsaicin.mamane.lu) Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from ) id 1M8AjI-0007Fw-To; Sun, 24 May 2009 12:14:56 +0200 Date: Sun, 24 May 2009 12:14:56 +0200 From: Lionel Elie Mamane To: Ian G Cc: IETF OpenPGP Working Group Subject: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from this key"?] Message-ID: <20090524101456.GA25020@capsaicin.mamane.lu> Mail-Followup-To: Lionel Elie Mamane , Ian G , IETF OpenPGP Working Group References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4A17CBF0.7060909@systemics.com> X-Operating-System: GNU/Linux X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc User-Agent: Mutt/1.5.17+20080114 (2008-01-14) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote: > On 23/5/09 01:24, Lionel Elie Mamane wrote: >> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: >>> The predictions of the end of the world are premature. Note that nobody >>> has stolen money through an MD5 as yet, and nobody has stolen money >>> because of an RSA-512, either. >> Maybe, but people have stolen money because of "too small RSA" >> keys. It was RSA-320, not RSA-512. According to my sources, yp to and >> including in the year 2007 (I don't know when it was stopped or >> whether it was). Because the debit card of the swiss PostFinance was >> using RSA-320 for authentication. As was the whole debit / credit card >> system in France until the early 21st century; it seems there were >> cases of theft up to 2001 in France. > Well, this is an important benchmark, if it indeed happened. > The questions would be: was the RSA cracked, or was it something > else that failed? Executive summary: The RSA was cracked, but that is not the only non social-engineering-or-physical attack on the system. AFAIK the RSA crack came after the other attacks were already used in the wild. All the information here comes from the websites I linked to, or from my memory of the media stories in France in 1999/2000 or talk at the CCC, translated when needed. AFAIK, the issued before 1999 French "Carte Bleue" and issued up to 2007 (and possibly later) Swiss PostFinance are exactly the same cards. I suppose the RSA key is not the same between the two systems, but it is the same modulus length (320 bits). The system around it (blacklisting bad cards, when to do an on-line check before accepting payment, ...) may vary, I don't know. The system has/had other security problems, but when the "factorise the RSA public key modulus" attack got practical, it got done, too. Especially since the factorisation started to float on the Internet. The RSA key is not a key per card, it is the global issuer key, that (if I remember well) signs the card info to certify that this card is a valid one that shall be accepted for payment. In particular, the debit cards can/could be cloned without any cryptographic attack (the information you need to successfully clone is readable in cleartext without authenticating to the smartcard). This attack requires brief access to the debit card of a victim, and allows only making payments debited from the victim's account, until he notices and the card number is put in the blacklist of repudiated cards. AFAIK, in France it didn't require knowing the PIN code of the original for payment in shops (below a certain amount (no on-line check, only off-line between the card and the terminal) or when the on-line checking server is blacklist-based instead of whitelist-based), because the payment terminal asks the smartcard if the entered PIN code is the right one; you just program the cloned smartcard to always say yes. However, using the cloned card in ATMs usually _did_ require knowing the right PIN, because ATMs did not use the smartcard but the magnetic strip on the back. (There were some attacks other than "watch the rightful owner type the PIN" to get the right PIN; it was on the magnetic stripe and circulated over phone lines DES-encrypted (one key per issuer bank), some ATMs contained a copy of the key, so stealing an ATM of that bank would allow getting the key, ...) Access to the RSA secret key allows to create "ex nihilo" (without access to a genuinely issued card) cards accepted for payment by payment terminals, but that are/were not necessarily linked to a bank account. In France, you needed to rotate the cards every day (or reprogram your card with a fresh number), because any card number accepted for payment but not linked to an account got blacklisted in the night. If you happen (by chance or design, e.g. by reading it off a receipt found in a dustbin) to hit an issued number, the corresponding bank account would be debited and the number blacklisted only when the card holder notices. Because some banks had predictable (from the old number) new card numbers when reissuing, the attacker could then forge the new card (without access to it) and attack the same holder again. > What's with the 320 number? I don't understand the question. > Secondly, was money stolen because of this? I noticed that CCC is > in those links, and that indicates more of a "demo" quality. The CCC talk came years after the speaker had warned the authorities (both the directors of the post and the federal government ministry responsible for oversight of the post), and they failed to address the problem, they were still issuing cards "secured" by RSA-320. Noticing the problem in Switzerland itself came years after it hit mainstream media in France and France solved the problem (first by moving to dual RSA-320 and RSA-768 for newly issued cards in 1999 with a transition period originally scheduled to go into 2004, during which old cards, signed only by RSA-320, where still accepted; I think they then to the EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm not sure at what date exactly they turned off acceptance of old RSA-320 cards.). The "create an accepted-for-payment card ex-nihilo knowing the RSA secret key" attack was demonstrated in France in mid-1998. The guy did it because the banks claimed not to believe him and to want proof. He was then charged (criminally) and sentenced in February 2000 to a suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR opposing counsel's fees and confiscation of his computer and smartcard equipment. He went public to the press with the story in 1999. He did ask the banks to pay him a fee for him to explain the attack to them and explain how to fix it; the banks called that extortion in the PR war, but he was never charged with anything having remotely to do with extortion. He also lost his employment as consequence of the affair in 1999. The CCC speaker was adamant that the attack was in the wild, had been for more than two years (by December 2006) and the post refused to reimburse victims fully. For example, he told the story of an elderly man whose account was debited (for significant amounts) while he was in surgery. If I remember well, that person only got 10% of the stolen amount back. I don't remember him saying that explicitly, but my context-in-the-talk understanding was that this would have been through the "I know the RSA secret key" (RSA-factorisation) attack, not a cloning attack. Whether his card number was taken by chance, read off a receipt or written down by a cashier, I don't know. In France, a case from November 2001: http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm Naturally, the banks in France and post in Switzerland were mum about details of fraud statistics (and claimed throughout the affairs that the system was secure); so we don't have statistics of how much fraud was committed through the RSA crack and how much through other attacks. It is also hard to know whether a particular theft was done by cloning or ex-nihilo creation (using the RSA crack). Obviously all victims will say they never let their card in untrusted hands. But the cloning could have happened in a twisted payment terminal, that the victim mistook for a bona fide one. Especially since that terminal still allowed her to pay and debited her account! However, you have to realise that all building blocks were out in the open on the Internet: - ASM code to program smartcards to emulate a debit card - factorisation of the RSA modulus (in France; for Switzerland in 2007, your home computer could do the factorisation within one hour, if I remember well), in a Usenet post indexed by DejaNews / Google Groups. - obviously, the RSA algorithm itself (how to compute the secret key from the two primes, how to compute a signature, ...) - the exact specification of what data has to be on the card and signed - smartcard readers / programmers / blank cards were already rather cheap at the time. I would find it hard to believe that such an easy and well documented attack would not have been exploited, especially since it is so much more powerful than previous attacks and does not give any additional risk to the criminal. (To add insult to injury, some attacks were already documented in the scientific literature by 1988/1990, that is before the system got deployed, in 1993!) > Unfortunately my french & german isn't up to it, often a problem > when results come from other countries. Is there any other information you would like? -- Lionel From owner-ietf-openpgp@mail.imc.org Sun May 24 05:15:39 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0BF7C3A6A98 for ; Sun, 24 May 2009 05:15:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dYjJ9ArCHtJl for ; Sun, 24 May 2009 05:15:33 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A2AD53A69CC for ; Sun, 24 May 2009 05:15:32 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC48fC067375 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OC48Yn067374; Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC3u7H067359 for ; Sun, 24 May 2009 05:04:07 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 6657911A53A; Sun, 24 May 2009 14:03:55 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id DE41E598099; Sun, 24 May 2009 14:03:54 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id a+aNzFVu+tWa; Sun, 24 May 2009 14:03:54 +0200 (CEST) Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AF200598091; Sun, 24 May 2009 14:03:54 +0200 (CEST) Message-ID: <4A1937A8.405@epointsystem.org> Date: Sun, 24 May 2009 14:03:52 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: Ian G CC: IETF OpenPGP Working Group Subject: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> In-Reply-To: <4A00BD41.7060807@systemics.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigFF160891008B155E9CB1BCC3" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigFF160891008B155E9CB1BCC3 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi, Ian G wrote: > Nor, has 40 bit secret keys been embarrassed as yet. That is not true. Stealing luxury cars with 40-bit ciphers in their RFID = keys by brute-forcing the (cryptographic) key is routine criminal practice. See also http://en.wikipedia.org/wiki/Motor_vehicle_theft --------------enigFF160891008B155E9CB1BCC3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoZN6gACgkQoeH/BzqmYjhdigCgqhy+JByapYfRxaOJL90tlhY2 16oAoL24nhvyRlcHxFW2BzxNZUpxVVv/ =7QFa -----END PGP SIGNATURE----- --------------enigFF160891008B155E9CB1BCC3-- From torched2290@samdaye.com Sun May 24 13:18:38 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D681F3A6A99; Sun, 24 May 2009 13:18:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -47.047 X-Spam-Level: X-Spam-Status: No, score=-47.047 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DOS_OE_TO_MX=2.75, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, GB_I_LETTER=-2, HELO_DYNAMIC_IPADDR2=4.395, HS_INDEX_PARAM=0.001, HTML_IMAGE_ONLY_32=1.778, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_UNA=1.231, SARE_URI_LET_DIG_PIC=1.157, TVD_RCVD_IP=1.931, URIBL_RHS_DOB=1.083, URIBL_SBL=20, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 05peEBoKTTBW; Sun, 24 May 2009 13:18:38 -0700 (PDT) Received: from 70-58-241-211.phnx.qwest.net (70-58-241-211.phnx.qwest.net [70.58.241.211]) by core3.amsl.com (Postfix) with ESMTP id 0E48E3A6768; Sun, 24 May 2009 13:18:38 -0700 (PDT) Message-ID: <000d01c9dcad$0df0fd40$6400a8c0@torched2290> From: ntdp@ietf.org To: Subject: get in to a healthy lifestyle with Acai Berry. Date: Sun, 24 May 2009 13:20:17 -0700 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C9DCAD.0DF0FD40" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 This is a multi-part message in MIME format. ------=_NextPart_000_0007_01C9DCAD.0DF0FD40 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable If you cannot see this=20 email, click here to view the web=20 version =20 =20 =20 =20 =20 =20 =20 22.05.2009=20 =20 =20 Product=20 news=20 =20 =20 =20 Register for Emails | Email=20 the Editor | Advertising=20 EnquiriesChemist+Druggist is published by CMPMedica - Healthcare divi= sion of=20 UBMCompany number 370721. Registered office: Ludgate House, 245=20 Blackfriars Road, London SE1 9UYTo change any of your C+D website=20 account details click=20 hereIf you would prefer not to receive newsletter emails from=20 Chemist+Druggist please click here ------=_NextPart_000_0007_01C9DCAD.0DF0FD40 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable
If you cann= ot see this=20 email, click here to view the web=20 version
<= /TABLE> ------=_NextPart_000_0007_01C9DCAD.0DF0FD40-- From owner-ietf-openpgp@mail.imc.org Sun May 24 14:31:32 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 61A263A68AC for ; Sun, 24 May 2009 14:31:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.45 X-Spam-Level: X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[AWL=0.149, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jw8OVMxqsjcm for ; Sun, 24 May 2009 14:31:24 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0DB5E3A6855 for ; Sun, 24 May 2009 14:31:23 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKomn098145 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLKofl098144; Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKcpq098132 for ; Sun, 24 May 2009 14:20:49 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:55943) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M8L7U-0004Hh-C8 (Exim 4.69) (return-path ); Sun, 24 May 2009 22:20:36 +0100 Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 7C5915D65; Sun, 24 May 2009 22:20:31 +0100 (GMT/BST) Message-ID: <4A19BA20.9000901@systemics.com> Date: Sun, 24 May 2009 23:20:32 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: "Daniel A. Nagy" Cc: IETF OpenPGP Working Group Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org> In-Reply-To: <4A1937A8.405@epointsystem.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 24/5/09 14:03, Daniel A. Nagy wrote: > Hi, > > Ian G wrote: >> Nor, has 40 bit secret keys been embarrassed as yet. > > That is not true. Ah, caught by my lack of precise terms. The earlier sentence gave the clue that I meant by embarrassment: broken and money lost because of it. > Stealing luxury cars with 40-bit ciphers in their RFID keys by > brute-forcing the (cryptographic) key is routine criminal practice. > > See also http://en.wikipedia.org/wiki/Motor_vehicle_theft OK, another great data point. But other than this: # New keyless ignition/lock cars often share the same 40-bit encryption method between their "keys" and their computers. Using a RFID microreader and a laptop, university students have managed to remotely unlock, start, and drive away in top-of-the-line luxury cars, not without returning the cars to their rightful owners of course and with their consent to "steal" it in the first place.[citation needed] I see no evidence of "routine criminal practice" ... and unlike some, I explicitly exclude "university students with or without laptop" from the general class of criminals :) Don't get me wrong: it is clear that we can crunch RSA in its smallest number (which is?) and 40 bit encryption. And one day, criminals will. What is not clear is whether they must be excluded from all possible endeavours of commerce. It's that whole pareto thing again. We don't exclude software with bugs from commerce, nor paper-which-gets-lost, nor people-who-lie, nor all the other unreliable elements of life. Why are we so obsessed with impossibility in crypto? iang From owner-ietf-openpgp@mail.imc.org Sun May 24 14:38:28 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E940728C1B4 for ; Sun, 24 May 2009 14:38:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.175 X-Spam-Level: X-Spam-Status: No, score=-1.175 tagged_above=-999 required=5 tests=[AWL=-1.176, BAYES_50=0.001] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id etLNhBQKnx-R for ; Sun, 24 May 2009 14:38:23 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id F2D1328C1A3 for ; Sun, 24 May 2009 14:38:22 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQLWJ098361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLQLkn098360; Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQA7X098348 for ; Sun, 24 May 2009 14:26:20 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:56455) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M8LCp-000343-Id (Exim 4.69) (return-path ); Sun, 24 May 2009 22:26:08 +0100 Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0944F5D65; Sun, 24 May 2009 22:26:03 +0100 (GMT/BST) Message-ID: <4A19BB6C.1060307@systemics.com> Date: Sun, 24 May 2009 23:26:04 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: Lionel Elie Mamane , IETF OpenPGP Working Group Subject: Re: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com> <20090524101456.GA25020@capsaicin.mamane.lu> In-Reply-To: <20090524101456.GA25020@capsaicin.mamane.lu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Thanks for the summary! I would conclude that (a) their system was a bit of a mess, and (b) it is a shame, because otherwise we would have got a clear benchmark. As the banks weren't cooperating, what we would have to do is look at the gangs and see if they could reveal the methods. Oh well, not this year. iang PS: the 320 question is that I was thinking RSA could only work down to something like 380? But then I thought about it some more, that's to do with the hash size and pacjet formats. Likely these guys didn't follow that. On 24/5/09 12:14, Lionel Elie Mamane wrote: > On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote: >> On 23/5/09 01:24, Lionel Elie Mamane wrote: >>> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: > >>>> The predictions of the end of the world are premature. Note that nobody >>>> has stolen money through an MD5 as yet, and nobody has stolen money >>>> because of an RSA-512, either. > >>> Maybe, but people have stolen money because of "too small RSA" >>> keys. It was RSA-320, not RSA-512. According to my sources, yp to and >>> including in the year 2007 (I don't know when it was stopped or >>> whether it was). Because the debit card of the swiss PostFinance was >>> using RSA-320 for authentication. As was the whole debit / credit card >>> system in France until the early 21st century; it seems there were >>> cases of theft up to 2001 in France. > >> Well, this is an important benchmark, if it indeed happened. > >> The questions would be: was the RSA cracked, or was it something >> else that failed? > > Executive summary: The RSA was cracked, but that is not the only non > social-engineering-or-physical attack on the system. AFAIK the RSA > crack came after the other attacks were already used in the wild. > > All the information here comes from the websites I linked to, or from > my memory of the media stories in France in 1999/2000 or talk at the > CCC, translated when needed. > > AFAIK, the issued before 1999 French "Carte Bleue" and issued up to > 2007 (and possibly later) Swiss PostFinance are exactly the same > cards. I suppose the RSA key is not the same between the two systems, > but it is the same modulus length (320 bits). The system around it > (blacklisting bad cards, when to do an on-line check before accepting > payment, ...) may vary, I don't know. > > The system has/had other security problems, but when the "factorise > the RSA public key modulus" attack got practical, it got done, > too. Especially since the factorisation started to float on the > Internet. The RSA key is not a key per card, it is the global issuer > key, that (if I remember well) signs the card info to certify that > this card is a valid one that shall be accepted for payment. > > In particular, the debit cards can/could be cloned without any > cryptographic attack (the information you need to successfully clone > is readable in cleartext without authenticating to the > smartcard). This attack requires brief access to the debit card of a > victim, and allows only making payments debited from the victim's > account, until he notices and the card number is put in the blacklist > of repudiated cards. AFAIK, in France it didn't require knowing the > PIN code of the original for payment in shops (below a certain amount > (no on-line check, only off-line between the card and the terminal) or > when the on-line checking server is blacklist-based instead of > whitelist-based), because the payment terminal asks the smartcard if > the entered PIN code is the right one; you just program the cloned > smartcard to always say yes. However, using the cloned card in ATMs > usually _did_ require knowing the right PIN, because ATMs did not use > the smartcard but the magnetic strip on the back. (There were some > attacks other than "watch the rightful owner type the PIN" to get the > right PIN; it was on the magnetic stripe and circulated over phone > lines DES-encrypted (one key per issuer bank), some ATMs contained a > copy of the key, so stealing an ATM of that bank would allow getting > the key, ...) > > Access to the RSA secret key allows to create "ex nihilo" (without > access to a genuinely issued card) cards accepted for payment by > payment terminals, but that are/were not necessarily linked to a bank > account. In France, you needed to rotate the cards every day (or > reprogram your card with a fresh number), because any card number > accepted for payment but not linked to an account got blacklisted in > the night. If you happen (by chance or design, e.g. by reading it off > a receipt found in a dustbin) to hit an issued number, the > corresponding bank account would be debited and the number blacklisted > only when the card holder notices. Because some banks had predictable > (from the old number) new card numbers when reissuing, the attacker > could then forge the new card (without access to it) and attack the > same holder again. > >> What's with the 320 number? > > I don't understand the question. > >> Secondly, was money stolen because of this? I noticed that CCC is >> in those links, and that indicates more of a "demo" quality. > > The CCC talk came years after the speaker had warned the authorities > (both the directors of the post and the federal government ministry > responsible for oversight of the post), and they failed to address the > problem, they were still issuing cards "secured" by RSA-320. Noticing > the problem in Switzerland itself came years after it hit mainstream > media in France and France solved the problem (first by moving to dual > RSA-320 and RSA-768 for newly issued cards in 1999 with a transition > period originally scheduled to go into 2004, during which old cards, > signed only by RSA-320, where still accepted; I think they then to the > EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm > not sure at what date exactly they turned off acceptance of old > RSA-320 cards.). > > The "create an accepted-for-payment card ex-nihilo knowing the RSA > secret key" attack was demonstrated in France in mid-1998. The guy did > it because the banks claimed not to believe him and to want proof. He > was then charged (criminally) and sentenced in February 2000 to a > suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR > opposing counsel's fees and confiscation of his computer and smartcard > equipment. He went public to the press with the story in 1999. He did > ask the banks to pay him a fee for him to explain the attack to them > and explain how to fix it; the banks called that extortion in the PR > war, but he was never charged with anything having remotely to do with > extortion. He also lost his employment as consequence of the affair in > 1999. > > The CCC speaker was adamant that the attack was in the wild, had been > for more than two years (by December 2006) and the post refused to > reimburse victims fully. For example, he told the story of an elderly > man whose account was debited (for significant amounts) while he was > in surgery. If I remember well, that person only got 10% of the stolen > amount back. I don't remember him saying that explicitly, but my > context-in-the-talk understanding was that this would have been > through the "I know the RSA secret key" (RSA-factorisation) attack, > not a cloning attack. Whether his card number was taken by chance, > read off a receipt or written down by a cashier, I don't know. > > In France, a case from November 2001: > http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm > > Naturally, the banks in France and post in Switzerland were mum about > details of fraud statistics (and claimed throughout the affairs that > the system was secure); so we don't have statistics of how much fraud > was committed through the RSA crack and how much through other > attacks. It is also hard to know whether a particular theft was done > by cloning or ex-nihilo creation (using the RSA crack). Obviously all > victims will say they never let their card in untrusted hands. But the > cloning could have happened in a twisted payment terminal, that the > victim mistook for a bona fide one. Especially since that terminal > still allowed her to pay and debited her account! > > > However, you have to realise that all building blocks were > out in the open on the Internet: > > - ASM code to program smartcards to emulate a debit card > > - factorisation of the RSA modulus (in France; for Switzerland in > 2007, your home computer could do the factorisation within one > hour, if I remember well), in a Usenet post indexed by DejaNews / > Google Groups. > > - obviously, the RSA algorithm itself (how to compute the secret key > from the two primes, how to compute a signature, ...) > > - the exact specification of what data has to be on the card and > signed > > - smartcard readers / programmers / blank cards were already rather > cheap at the time. > > I would find it hard to believe that such an easy and well documented > attack would not have been exploited, especially since it is so much > more powerful than previous attacks and does not give any additional > risk to the criminal. > > (To add insult to injury, some attacks were already documented in the > scientific literature by 1988/1990, that is before the system got > deployed, in 1993!) > >> Unfortunately my french& german isn't up to it, often a problem >> when results come from other countries. > > Is there any other information you would like? > From owner-ietf-openpgp@mail.imc.org Sun May 24 17:14:49 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D92123A6891 for ; Sun, 24 May 2009 17:14:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P2-Sn2eSn8Ki for ; Sun, 24 May 2009 17:14:43 -0700 (PDT) Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id ADEE83A692D for ; Sun, 24 May 2009 17:14:42 -0700 (PDT) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P05AsZ005904 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 17:05:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4P05ASc005903; Sun, 24 May 2009 17:05:10 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P04xAe005889 for ; Sun, 24 May 2009 17:05:09 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 427F131A10D; Mon, 25 May 2009 02:04:57 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id D5ADB598099; Mon, 25 May 2009 02:04:57 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id z-1DjHLkkaBA; Mon, 25 May 2009 02:04:57 +0200 (CEST) Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9CB91598091; Mon, 25 May 2009 02:04:57 +0200 (CEST) Message-ID: <4A19E0A2.70604@epointsystem.org> Date: Mon, 25 May 2009 02:04:50 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: Ian G CC: IETF OpenPGP Working Group Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org> <4A19BA20.9000901@systemics.com> In-Reply-To: <4A19BA20.9000901@systemics.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF03D821D9477C6E3CE5003E0" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigF03D821D9477C6E3CE5003E0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi, I think there *is* a good reason for being more paranoid about broken cry= pto than all the other attacks: broken crypto often leaves no evidence (to th= e point of the victim not even noticing the attack) and hence leaves no room to r= eactive countermeasures. More below. Ian G wrote: > I see no evidence of "routine criminal practice" ... and unlike some, I= > explicitly exclude "university students with or without laptop" from th= e > general class of criminals :) No-no, the wikipedia link was not meant as evidence, just a description o= f the actual method. I have provided no evidence to the fact that brute-forcing= 40 bit RFID keys is routine criminal practice, because I was too lazy/busy to di= g it up. But I *have* read somewhere that several real cars (and very expensiv= e ones, at that) have been really stolen (in several countries, AFAIR) using this= technique by real criminals. For now, please take my word for it or googl= e it up yourself. A bit later, I might do the googling for you. In the context of OpenPGP, I believe that we really should exclude the possibility of attacks that penetrate our crypto, because the intended us= e cases of OpenPGP include quite a few where such an attack cannot be detected ev= en ex post. A good example would be insider trading on information gained from supposedly confidential correspondence. Such threats cannot be validated.= Weak crypto invites such attacks without any possibility of validating the vul= nerability. --=20 Daniel --------------enigF03D821D9477C6E3CE5003E0 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoZ4KcACgkQoeH/BzqmYjiVCACgkzJ9H1+wapX4coM+FlOh6WcK hf4An3U9YwMLXj1aR08B4tYJwFz4osUZ =WUjA -----END PGP SIGNATURE----- --------------enigF03D821D9477C6E3CE5003E0-- From openoffice@globo.com Mon May 25 05:34:15 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D93193A68B0 for ; Mon, 25 May 2009 05:34:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -56.543 X-Spam-Level: X-Spam-Status: No, score=-56.543 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HOST_EQ_D_D_D_D=0.765, GB_I_LETTER=-2, HELO_MISMATCH_COM=0.553, HOST_EQ_RO=0.904, HS_INDEX_PARAM=0.001, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, MANGLED_OFF=2.3, MIME_HTML_ONLY=1.457, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OQENr+TZ+L9Z for ; Mon, 25 May 2009 05:34:13 -0700 (PDT) Received: from amerblind.outbound.ed10.com (host-89-42-87-59.bizartelecom.ro [89.42.87.59]) by core3.amsl.com (Postfix) with SMTP id 72AD33A6BBB for ; Mon, 25 May 2009 05:34:12 -0700 (PDT) X-Originating-IP: [68.0.89.4] X-Originating-Email: [openpgp-archive@ietf.org] X-Sender: openpgp-archive@ietf.org To: Subject: RE: DISCOUNT ID55778 70% 0FF on Pfizer ! From: openpgp-archive@ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit Message-Id: <20090525123412.72AD33A6BBB@core3.amsl.com> Date: Mon, 25 May 2009 05:34:12 -0700 (PDT) Welcome to WebMD

=20

2= 2.05.2009


Product=20 news


Register for Emails
| Email=20 the Editor | Adverti= sing=20 Enquiries


Chemist+Druggist is published by CMPMedica - Healthcare division of=20 UBM
Company number 370721. Registered office: Ludgate House, 245=20 Blackfriars Road, London SE1 9UY
To change any of your C+D website= =20 account details click=20 here
If you would prefer not to receive newsletter emails from= =20 Chemist+Druggist please click here

Welcome to WebMD
 •  Wed, 27 May 2009 02:35:16 +0200
New from WebMD: Sign-up today!

You are subscribed as openpgp-archive@ietf.org.
View and manage your WebMD newsletter preferences.
Subscribe to more newsletters. Change/update your email address.

WebMD Privacy Policy
WebMD Office of Privacy
1175 Peachtree Street, Suite 2400, Atlanta, GA 30361
© 2009 WebMD, LLC. All rights reserved.
From nbraga@acad.unibh.br Wed May 27 01:29:05 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4B7193A6AC4 for ; Wed, 27 May 2009 01:29:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -15.919 X-Spam-Level: X-Spam-Status: No, score=-15.919 tagged_above=-999 required=5 tests=[BAYES_60=1, FH_RELAY_NODNS=1.451, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YdIBl+H11jHo for ; Wed, 27 May 2009 01:28:58 -0700 (PDT) Received: from accountancy.smu.edu.sg (unknown [202.81.89.116]) by core3.amsl.com (Postfix) with SMTP id BB3093A6F2D for ; Wed, 27 May 2009 01:28:50 -0700 (PDT) To: openpgp-archive@ietf.org Subject: Re: Your subscribe #733656 From: openpgp-archive@ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html Message-Id: <20090527082853.BB3093A6F2D@core3.amsl.com> Date: Wed, 27 May 2009 01:28:50 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 3, 61941 AZ Amsterdam, The Netherlands

From jmolina@aguascordillera.cl Thu May 28 19:55:21 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A8A073A6831 for ; Thu, 28 May 2009 19:55:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.091 X-Spam-Level: X-Spam-Status: No, score=-4.091 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, GB_I_LETTER=-2, HELO_DYNAMIC_HCC=4.295, HELO_DYNAMIC_IPADDR2=4.395, HELO_EQ_BR=0.955, HELO_EQ_DSL=1.129, HELO_EQ_TELESP=1.245, HOST_EQ_BR=1.295, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_RECV_SPAM_DOMN02=1.666, SARE_UNI=0.591, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jZWHQ8gI+kxw for ; Thu, 28 May 2009 19:55:20 -0700 (PDT) Received: from 189-19-21-160.dsl.telesp.net.br (189-19-21-160.dsl.telesp.net.br [189.19.21.160]) by core3.amsl.com (Postfix) with SMTP id 576D13A6B94 for ; Thu, 28 May 2009 19:55:18 -0700 (PDT) To: openpgp-archive@ietf.org Subject: RE: Newsletter #874743 From: openpgp-archive@ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html Message-Id: <20090529025519.576D13A6B94@core3.amsl.com> Date: Thu, 28 May 2009 19:55:18 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 9, 94130 AZ Amsterdam, The Netherlands

From fibha24@lists.us.dell.com Sat May 30 23:38:46 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 87E843A68EC; Sat, 30 May 2009 23:38:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.483 X-Spam-Level: X-Spam-Status: No, score=-10.483 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DOS_OE_TO_MX=2.75, GB_I_LETTER=-2, HELO_EQ_DSL=1.129, HELO_EQ_PL=1.135, HOST_EQ_PL=1.95, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_GREY=0.25, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l19f3YwmbKU0; Sat, 30 May 2009 23:38:38 -0700 (PDT) Received: from abtb111.neoplus.adsl.tpnet.pl (abtb111.neoplus.adsl.tpnet.pl [83.8.147.111]) by core3.amsl.com (Postfix) with ESMTP id E9E5F3A699F; Sat, 30 May 2009 23:38:37 -0700 (PDT) Message-ID: <000d01c9e1ba$97703650$6400a8c0@fibha24> From: "Natalie Fournier" To: Subject: Have a glance here if you feel like an less of a man. Date: Sun, 31 May 2009 08:39:47 +0100 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C9E1BA.97703650" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.2180 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180 This is a multi-part message in MIME format. ------=_NextPart_000_0007_01C9E1BA.97703650 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable =09 =09 =09 =09 =20 =20 =09 =09 =09 About this mailing:=20 You are receiving this e-mail because you subscribed to MSN Featured Offers= Microsoft respects your privacy. If you do not wish to receive this MSN F= eatured Offers e-mail, please click the "Unsubscribe" link below. This will= not unsubscribe=20 you from e-mail communications from third-party advertisers that may appear= in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shal= l not be responsible or liable for the advertisers' content nor any of the = goods or service advertised. Prices and item availability subject to change without notice. 2009 Microsoft | Unsubscribe | More Newsletters | Privacy Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 =20 =20 =20 This message was sent from iContact to openpgp-archive@ietf.org. It= was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durha= m, NC 27713. You can modify/update your subscription via the link below. =20 =20 =20 =20 =20 =20 =20 View this message in the iContact Community= : =20 =20 =20 View message =20 =20 =20 =20 Comment on this message =20 =20 =20 =20 Receive as RSS =20 =20 =20 =20 =09 =09 =09 =09 =09 ------=_NextPart_000_0007_01C9E1BA.97703650 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
3D"Click
View this message in the iContact Community= : =20 View message =20 Comment on this message =20 Receive as RSS
------=_NextPart_000_0007_01C9E1BA.97703650-- From l.betham@acetateproducts.com Sun May 31 15:35:04 2009 Return-Path: X-Original-To: ietfarch-openpgp-archive@core3.amsl.com Delivered-To: ietfarch-openpgp-archive@core3.amsl.com Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5A7CD28C1D5 for ; Sun, 31 May 2009 15:35:04 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.489 X-Spam-Level: X-Spam-Status: No, score=-14.489 tagged_above=-999 required=5 tests=[BAYES_60=1, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id COxOPG7Wqe5K for ; Sun, 31 May 2009 15:34:57 -0700 (PDT) Received: from altuwairqi.com (unknown [190.26.29.78]) by core3.amsl.com (Postfix) with SMTP id 7212C28C1D0 for ; Sun, 31 May 2009 15:34:56 -0700 (PDT) To: openpgp-archive@ietf.org Subject: Re: Your subscribe #624277 From: openpgp-archive@ietf.org MIME-Version: 1.0 Importance: High Content-Type: text/html X-Antivirus: avast! (VPS 090531-0, 31/05/2009), Outbound message X-Antivirus-Status: Clean Message-Id: <20090531223456.7212C28C1D0@core3.amsl.com> Date: Sun, 31 May 2009 15:34:56 -0700 (PDT)
Tell a friend · Download latest version See this email as a webpage

Hello!

Shipped Privately And Discreetly To Your Door!

See this email as a webpage
  We want to put a great big grin on your face in 2009. You'll be to rejoice all year.  

Unsubscribe · Lost Password · Account Settings · Help · Terms of Service · Privacy

Ottho Heldringstraat 9, 23985 AZ Amsterdam, The Netherlands

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P05AsZ005904 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 17:05:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4P05ASc005903; Sun, 24 May 2009 17:05:10 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P04xAe005889 for ; Sun, 24 May 2009 17:05:09 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 427F131A10D; Mon, 25 May 2009 02:04:57 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id D5ADB598099; Mon, 25 May 2009 02:04:57 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id z-1DjHLkkaBA; Mon, 25 May 2009 02:04:57 +0200 (CEST) Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9CB91598091; Mon, 25 May 2009 02:04:57 +0200 (CEST) Message-ID: <4A19E0A2.70604@epointsystem.org> Date: Mon, 25 May 2009 02:04:50 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: Ian G CC: IETF OpenPGP Working Group Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org> <4A19BA20.9000901@systemics.com> In-Reply-To: <4A19BA20.9000901@systemics.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF03D821D9477C6E3CE5003E0" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigF03D821D9477C6E3CE5003E0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi, I think there *is* a good reason for being more paranoid about broken cry= pto than all the other attacks: broken crypto often leaves no evidence (to th= e point of the victim not even noticing the attack) and hence leaves no room to r= eactive countermeasures. More below. Ian G wrote: > I see no evidence of "routine criminal practice" ... and unlike some, I= > explicitly exclude "university students with or without laptop" from th= e > general class of criminals :) No-no, the wikipedia link was not meant as evidence, just a description o= f the actual method. I have provided no evidence to the fact that brute-forcing= 40 bit RFID keys is routine criminal practice, because I was too lazy/busy to di= g it up. But I *have* read somewhere that several real cars (and very expensiv= e ones, at that) have been really stolen (in several countries, AFAIR) using this= technique by real criminals. For now, please take my word for it or googl= e it up yourself. A bit later, I might do the googling for you. In the context of OpenPGP, I believe that we really should exclude the possibility of attacks that penetrate our crypto, because the intended us= e cases of OpenPGP include quite a few where such an attack cannot be detected ev= en ex post. A good example would be insider trading on information gained from supposedly confidential correspondence. Such threats cannot be validated.= Weak crypto invites such attacks without any possibility of validating the vul= nerability. --=20 Daniel --------------enigF03D821D9477C6E3CE5003E0 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoZ4KcACgkQoeH/BzqmYjiVCACgkzJ9H1+wapX4coM+FlOh6WcK hf4An3U9YwMLXj1aR08B4tYJwFz4osUZ =WUjA -----END PGP SIGNATURE----- --------------enigF03D821D9477C6E3CE5003E0-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQLWJ098361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLQLkn098360; Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQA7X098348 for ; Sun, 24 May 2009 14:26:20 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:56455) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M8LCp-000343-Id (Exim 4.69) (return-path ); Sun, 24 May 2009 22:26:08 +0100 Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0944F5D65; Sun, 24 May 2009 22:26:03 +0100 (GMT/BST) Message-ID: <4A19BB6C.1060307@systemics.com> Date: Sun, 24 May 2009 23:26:04 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: Lionel Elie Mamane , IETF OpenPGP Working Group Subject: Re: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com> <20090524101456.GA25020@capsaicin.mamane.lu> In-Reply-To: <20090524101456.GA25020@capsaicin.mamane.lu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Thanks for the summary! I would conclude that (a) their system was a bit of a mess, and (b) it is a shame, because otherwise we would have got a clear benchmark. As the banks weren't cooperating, what we would have to do is look at the gangs and see if they could reveal the methods. Oh well, not this year. iang PS: the 320 question is that I was thinking RSA could only work down to something like 380? But then I thought about it some more, that's to do with the hash size and pacjet formats. Likely these guys didn't follow that. On 24/5/09 12:14, Lionel Elie Mamane wrote: > On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote: >> On 23/5/09 01:24, Lionel Elie Mamane wrote: >>> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: > >>>> The predictions of the end of the world are premature. Note that nobody >>>> has stolen money through an MD5 as yet, and nobody has stolen money >>>> because of an RSA-512, either. > >>> Maybe, but people have stolen money because of "too small RSA" >>> keys. It was RSA-320, not RSA-512. According to my sources, yp to and >>> including in the year 2007 (I don't know when it was stopped or >>> whether it was). Because the debit card of the swiss PostFinance was >>> using RSA-320 for authentication. As was the whole debit / credit card >>> system in France until the early 21st century; it seems there were >>> cases of theft up to 2001 in France. > >> Well, this is an important benchmark, if it indeed happened. > >> The questions would be: was the RSA cracked, or was it something >> else that failed? > > Executive summary: The RSA was cracked, but that is not the only non > social-engineering-or-physical attack on the system. AFAIK the RSA > crack came after the other attacks were already used in the wild. > > All the information here comes from the websites I linked to, or from > my memory of the media stories in France in 1999/2000 or talk at the > CCC, translated when needed. > > AFAIK, the issued before 1999 French "Carte Bleue" and issued up to > 2007 (and possibly later) Swiss PostFinance are exactly the same > cards. I suppose the RSA key is not the same between the two systems, > but it is the same modulus length (320 bits). The system around it > (blacklisting bad cards, when to do an on-line check before accepting > payment, ...) may vary, I don't know. > > The system has/had other security problems, but when the "factorise > the RSA public key modulus" attack got practical, it got done, > too. Especially since the factorisation started to float on the > Internet. The RSA key is not a key per card, it is the global issuer > key, that (if I remember well) signs the card info to certify that > this card is a valid one that shall be accepted for payment. > > In particular, the debit cards can/could be cloned without any > cryptographic attack (the information you need to successfully clone > is readable in cleartext without authenticating to the > smartcard). This attack requires brief access to the debit card of a > victim, and allows only making payments debited from the victim's > account, until he notices and the card number is put in the blacklist > of repudiated cards. AFAIK, in France it didn't require knowing the > PIN code of the original for payment in shops (below a certain amount > (no on-line check, only off-line between the card and the terminal) or > when the on-line checking server is blacklist-based instead of > whitelist-based), because the payment terminal asks the smartcard if > the entered PIN code is the right one; you just program the cloned > smartcard to always say yes. However, using the cloned card in ATMs > usually _did_ require knowing the right PIN, because ATMs did not use > the smartcard but the magnetic strip on the back. (There were some > attacks other than "watch the rightful owner type the PIN" to get the > right PIN; it was on the magnetic stripe and circulated over phone > lines DES-encrypted (one key per issuer bank), some ATMs contained a > copy of the key, so stealing an ATM of that bank would allow getting > the key, ...) > > Access to the RSA secret key allows to create "ex nihilo" (without > access to a genuinely issued card) cards accepted for payment by > payment terminals, but that are/were not necessarily linked to a bank > account. In France, you needed to rotate the cards every day (or > reprogram your card with a fresh number), because any card number > accepted for payment but not linked to an account got blacklisted in > the night. If you happen (by chance or design, e.g. by reading it off > a receipt found in a dustbin) to hit an issued number, the > corresponding bank account would be debited and the number blacklisted > only when the card holder notices. Because some banks had predictable > (from the old number) new card numbers when reissuing, the attacker > could then forge the new card (without access to it) and attack the > same holder again. > >> What's with the 320 number? > > I don't understand the question. > >> Secondly, was money stolen because of this? I noticed that CCC is >> in those links, and that indicates more of a "demo" quality. > > The CCC talk came years after the speaker had warned the authorities > (both the directors of the post and the federal government ministry > responsible for oversight of the post), and they failed to address the > problem, they were still issuing cards "secured" by RSA-320. Noticing > the problem in Switzerland itself came years after it hit mainstream > media in France and France solved the problem (first by moving to dual > RSA-320 and RSA-768 for newly issued cards in 1999 with a transition > period originally scheduled to go into 2004, during which old cards, > signed only by RSA-320, where still accepted; I think they then to the > EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm > not sure at what date exactly they turned off acceptance of old > RSA-320 cards.). > > The "create an accepted-for-payment card ex-nihilo knowing the RSA > secret key" attack was demonstrated in France in mid-1998. The guy did > it because the banks claimed not to believe him and to want proof. He > was then charged (criminally) and sentenced in February 2000 to a > suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR > opposing counsel's fees and confiscation of his computer and smartcard > equipment. He went public to the press with the story in 1999. He did > ask the banks to pay him a fee for him to explain the attack to them > and explain how to fix it; the banks called that extortion in the PR > war, but he was never charged with anything having remotely to do with > extortion. He also lost his employment as consequence of the affair in > 1999. > > The CCC speaker was adamant that the attack was in the wild, had been > for more than two years (by December 2006) and the post refused to > reimburse victims fully. For example, he told the story of an elderly > man whose account was debited (for significant amounts) while he was > in surgery. If I remember well, that person only got 10% of the stolen > amount back. I don't remember him saying that explicitly, but my > context-in-the-talk understanding was that this would have been > through the "I know the RSA secret key" (RSA-factorisation) attack, > not a cloning attack. Whether his card number was taken by chance, > read off a receipt or written down by a cashier, I don't know. > > In France, a case from November 2001: > http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm > > Naturally, the banks in France and post in Switzerland were mum about > details of fraud statistics (and claimed throughout the affairs that > the system was secure); so we don't have statistics of how much fraud > was committed through the RSA crack and how much through other > attacks. It is also hard to know whether a particular theft was done > by cloning or ex-nihilo creation (using the RSA crack). Obviously all > victims will say they never let their card in untrusted hands. But the > cloning could have happened in a twisted payment terminal, that the > victim mistook for a bona fide one. Especially since that terminal > still allowed her to pay and debited her account! > > > However, you have to realise that all building blocks were > out in the open on the Internet: > > - ASM code to program smartcards to emulate a debit card > > - factorisation of the RSA modulus (in France; for Switzerland in > 2007, your home computer could do the factorisation within one > hour, if I remember well), in a Usenet post indexed by DejaNews / > Google Groups. > > - obviously, the RSA algorithm itself (how to compute the secret key > from the two primes, how to compute a signature, ...) > > - the exact specification of what data has to be on the card and > signed > > - smartcard readers / programmers / blank cards were already rather > cheap at the time. > > I would find it hard to believe that such an easy and well documented > attack would not have been exploited, especially since it is so much > more powerful than previous attacks and does not give any additional > risk to the criminal. > > (To add insult to injury, some attacks were already documented in the > scientific literature by 1988/1990, that is before the system got > deployed, in 1993!) > >> Unfortunately my french& german isn't up to it, often a problem >> when results come from other countries. > > Is there any other information you would like? > Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKomn098145 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLKofl098144; Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKcpq098132 for ; Sun, 24 May 2009 14:20:49 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:55943) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M8L7U-0004Hh-C8 (Exim 4.69) (return-path ); Sun, 24 May 2009 22:20:36 +0100 Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 7C5915D65; Sun, 24 May 2009 22:20:31 +0100 (GMT/BST) Message-ID: <4A19BA20.9000901@systemics.com> Date: Sun, 24 May 2009 23:20:32 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: "Daniel A. Nagy" Cc: IETF OpenPGP Working Group Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org> In-Reply-To: <4A1937A8.405@epointsystem.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 24/5/09 14:03, Daniel A. Nagy wrote: > Hi, > > Ian G wrote: >> Nor, has 40 bit secret keys been embarrassed as yet. > > That is not true. Ah, caught by my lack of precise terms. The earlier sentence gave the clue that I meant by embarrassment: broken and money lost because of it. > Stealing luxury cars with 40-bit ciphers in their RFID keys by > brute-forcing the (cryptographic) key is routine criminal practice. > > See also http://en.wikipedia.org/wiki/Motor_vehicle_theft OK, another great data point. But other than this: # New keyless ignition/lock cars often share the same 40-bit encryption method between their "keys" and their computers. Using a RFID microreader and a laptop, university students have managed to remotely unlock, start, and drive away in top-of-the-line luxury cars, not without returning the cars to their rightful owners of course and with their consent to "steal" it in the first place.[citation needed] I see no evidence of "routine criminal practice" ... and unlike some, I explicitly exclude "university students with or without laptop" from the general class of criminals :) Don't get me wrong: it is clear that we can crunch RSA in its smallest number (which is?) and 40 bit encryption. And one day, criminals will. What is not clear is whether they must be excluded from all possible endeavours of commerce. It's that whole pareto thing again. We don't exclude software with bugs from commerce, nor paper-which-gets-lost, nor people-who-lie, nor all the other unreliable elements of life. Why are we so obsessed with impossibility in crypto? iang Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC48fC067375 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OC48Yn067374; Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC3u7H067359 for ; Sun, 24 May 2009 05:04:07 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 6657911A53A; Sun, 24 May 2009 14:03:55 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id DE41E598099; Sun, 24 May 2009 14:03:54 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id a+aNzFVu+tWa; Sun, 24 May 2009 14:03:54 +0200 (CEST) Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AF200598091; Sun, 24 May 2009 14:03:54 +0200 (CEST) Message-ID: <4A1937A8.405@epointsystem.org> Date: Sun, 24 May 2009 14:03:52 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: Ian G CC: IETF OpenPGP Working Group Subject: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?] References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> In-Reply-To: <4A00BD41.7060807@systemics.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigFF160891008B155E9CB1BCC3" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigFF160891008B155E9CB1BCC3 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi, Ian G wrote: > Nor, has 40 bit secret keys been embarrassed as yet. That is not true. Stealing luxury cars with 40-bit ciphers in their RFID = keys by brute-forcing the (cryptographic) key is routine criminal practice. See also http://en.wikipedia.org/wiki/Motor_vehicle_theft --------------enigFF160891008B155E9CB1BCC3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoZN6gACgkQoeH/BzqmYjhdigCgqhy+JByapYfRxaOJL90tlhY2 16oAoL24nhvyRlcHxFW2BzxNZUpxVVv/ =7QFa -----END PGP SIGNATURE----- --------------enigFF160891008B155E9CB1BCC3-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAFC5p062086 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OAFCwd062085; Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAEwid062066 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Sun, 24 May 2009 03:15:10 -0700 (MST) (envelope-from master@capsaicin.mamane.lu) Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from ) id 1M8AjI-0007Fw-To; Sun, 24 May 2009 12:14:56 +0200 Date: Sun, 24 May 2009 12:14:56 +0200 From: Lionel Elie Mamane To: Ian G Cc: IETF OpenPGP Working Group Subject: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from this key"?] Message-ID: <20090524101456.GA25020@capsaicin.mamane.lu> Mail-Followup-To: Lionel Elie Mamane , Ian G , IETF OpenPGP Working Group References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4A17CBF0.7060909@systemics.com> X-Operating-System: GNU/Linux X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc User-Agent: Mutt/1.5.17+20080114 (2008-01-14) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote: > On 23/5/09 01:24, Lionel Elie Mamane wrote: >> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: >>> The predictions of the end of the world are premature. Note that nobody >>> has stolen money through an MD5 as yet, and nobody has stolen money >>> because of an RSA-512, either. >> Maybe, but people have stolen money because of "too small RSA" >> keys. It was RSA-320, not RSA-512. According to my sources, yp to and >> including in the year 2007 (I don't know when it was stopped or >> whether it was). Because the debit card of the swiss PostFinance was >> using RSA-320 for authentication. As was the whole debit / credit card >> system in France until the early 21st century; it seems there were >> cases of theft up to 2001 in France. > Well, this is an important benchmark, if it indeed happened. > The questions would be: was the RSA cracked, or was it something > else that failed? Executive summary: The RSA was cracked, but that is not the only non social-engineering-or-physical attack on the system. AFAIK the RSA crack came after the other attacks were already used in the wild. All the information here comes from the websites I linked to, or from my memory of the media stories in France in 1999/2000 or talk at the CCC, translated when needed. AFAIK, the issued before 1999 French "Carte Bleue" and issued up to 2007 (and possibly later) Swiss PostFinance are exactly the same cards. I suppose the RSA key is not the same between the two systems, but it is the same modulus length (320 bits). The system around it (blacklisting bad cards, when to do an on-line check before accepting payment, ...) may vary, I don't know. The system has/had other security problems, but when the "factorise the RSA public key modulus" attack got practical, it got done, too. Especially since the factorisation started to float on the Internet. The RSA key is not a key per card, it is the global issuer key, that (if I remember well) signs the card info to certify that this card is a valid one that shall be accepted for payment. In particular, the debit cards can/could be cloned without any cryptographic attack (the information you need to successfully clone is readable in cleartext without authenticating to the smartcard). This attack requires brief access to the debit card of a victim, and allows only making payments debited from the victim's account, until he notices and the card number is put in the blacklist of repudiated cards. AFAIK, in France it didn't require knowing the PIN code of the original for payment in shops (below a certain amount (no on-line check, only off-line between the card and the terminal) or when the on-line checking server is blacklist-based instead of whitelist-based), because the payment terminal asks the smartcard if the entered PIN code is the right one; you just program the cloned smartcard to always say yes. However, using the cloned card in ATMs usually _did_ require knowing the right PIN, because ATMs did not use the smartcard but the magnetic strip on the back. (There were some attacks other than "watch the rightful owner type the PIN" to get the right PIN; it was on the magnetic stripe and circulated over phone lines DES-encrypted (one key per issuer bank), some ATMs contained a copy of the key, so stealing an ATM of that bank would allow getting the key, ...) Access to the RSA secret key allows to create "ex nihilo" (without access to a genuinely issued card) cards accepted for payment by payment terminals, but that are/were not necessarily linked to a bank account. In France, you needed to rotate the cards every day (or reprogram your card with a fresh number), because any card number accepted for payment but not linked to an account got blacklisted in the night. If you happen (by chance or design, e.g. by reading it off a receipt found in a dustbin) to hit an issued number, the corresponding bank account would be debited and the number blacklisted only when the card holder notices. Because some banks had predictable (from the old number) new card numbers when reissuing, the attacker could then forge the new card (without access to it) and attack the same holder again. > What's with the 320 number? I don't understand the question. > Secondly, was money stolen because of this? I noticed that CCC is > in those links, and that indicates more of a "demo" quality. The CCC talk came years after the speaker had warned the authorities (both the directors of the post and the federal government ministry responsible for oversight of the post), and they failed to address the problem, they were still issuing cards "secured" by RSA-320. Noticing the problem in Switzerland itself came years after it hit mainstream media in France and France solved the problem (first by moving to dual RSA-320 and RSA-768 for newly issued cards in 1999 with a transition period originally scheduled to go into 2004, during which old cards, signed only by RSA-320, where still accepted; I think they then to the EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm not sure at what date exactly they turned off acceptance of old RSA-320 cards.). The "create an accepted-for-payment card ex-nihilo knowing the RSA secret key" attack was demonstrated in France in mid-1998. The guy did it because the banks claimed not to believe him and to want proof. He was then charged (criminally) and sentenced in February 2000 to a suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR opposing counsel's fees and confiscation of his computer and smartcard equipment. He went public to the press with the story in 1999. He did ask the banks to pay him a fee for him to explain the attack to them and explain how to fix it; the banks called that extortion in the PR war, but he was never charged with anything having remotely to do with extortion. He also lost his employment as consequence of the affair in 1999. The CCC speaker was adamant that the attack was in the wild, had been for more than two years (by December 2006) and the post refused to reimburse victims fully. For example, he told the story of an elderly man whose account was debited (for significant amounts) while he was in surgery. If I remember well, that person only got 10% of the stolen amount back. I don't remember him saying that explicitly, but my context-in-the-talk understanding was that this would have been through the "I know the RSA secret key" (RSA-factorisation) attack, not a cloning attack. Whether his card number was taken by chance, read off a receipt or written down by a cashier, I don't know. In France, a case from November 2001: http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm Naturally, the banks in France and post in Switzerland were mum about details of fraud statistics (and claimed throughout the affairs that the system was secure); so we don't have statistics of how much fraud was committed through the RSA crack and how much through other attacks. It is also hard to know whether a particular theft was done by cloning or ex-nihilo creation (using the RSA crack). Obviously all victims will say they never let their card in untrusted hands. But the cloning could have happened in a twisted payment terminal, that the victim mistook for a bona fide one. Especially since that terminal still allowed her to pay and debited her account! However, you have to realise that all building blocks were out in the open on the Internet: - ASM code to program smartcards to emulate a debit card - factorisation of the RSA modulus (in France; for Switzerland in 2007, your home computer could do the factorisation within one hour, if I remember well), in a Usenet post indexed by DejaNews / Google Groups. - obviously, the RSA algorithm itself (how to compute the secret key from the two primes, how to compute a signature, ...) - the exact specification of what data has to be on the card and signed - smartcard readers / programmers / blank cards were already rather cheap at the time. I would find it hard to believe that such an easy and well documented attack would not have been exploited, especially since it is so much more powerful than previous attacks and does not give any additional risk to the criminal. (To add insult to injury, some attacks were already documented in the scientific literature by 1988/1990, that is before the system got deployed, in 1993!) > Unfortunately my french & german isn't up to it, often a problem > when results come from other countries. Is there any other information you would like? -- Lionel Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NACFXc080304 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4NACF6g080303; Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NAC4Fb080289 for ; Sat, 23 May 2009 03:12:14 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:916) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M7oCv-0008OY-Iw (Exim 4.69) (return-path ); Sat, 23 May 2009 11:12:02 +0100 Received: from [IPv6:::1] (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0BCF55D65; Sat, 23 May 2009 11:11:57 +0100 (GMT/BST) Message-ID: <4A17CBF0.7060909@systemics.com> Date: Sat, 23 May 2009 12:12:00 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: Lionel Elie Mamane , IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> In-Reply-To: <20090522232426.GA18238@capsaicin.mamane.lu> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 23/5/09 01:24, Lionel Elie Mamane wrote: > On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: > >> The predictions of the end of the world are premature. Note that nobody >> has stolen money through an MD5 as yet, and nobody has stolen money >> because of an RSA-512, either. > > Maybe, but people have stolen money because of "too small RSA" > keys. It was RSA-320, not RSA-512. According to my sources, yp to and > including in the year 2007 (I don't know when it was stopped or > whether it was). Because the debit card of the swiss PostFinance was > using RSA-320 for authentication. As was the whole debit / credit card > system in France until the early 21st century; it seems there were > cases of theft up to 2001 in France. > > France: > http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm > http://www.parodie.com/monetique/ > > Switzerland: > http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html > http://www.postcard-sicherheit.ch/ > http://chaostreff-zh.tuners.ch/Pestcard > Well, this is an important benchmark, if it indeed happened. The questions would be: was the RSA cracked, or was it something else that failed? Or a combination of things? What's with the 320 number? Secondly, was money stolen because of this? I noticed that CCC is in those links, and that indicates more of a "demo" quality. Unfortunately my french & german isn't up to it, often a problem when results come from other countries. iang Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOgQG045206 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4MNOgji045205; Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOT7u045186 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Fri, 22 May 2009 16:24:40 -0700 (MST) (envelope-from master@capsaicin.mamane.lu) Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from ) id 1M7e6E-0004zO-UT; Sat, 23 May 2009 01:24:27 +0200 Date: Sat, 23 May 2009 01:24:26 +0200 From: Lionel Elie Mamane To: Ian G Cc: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? Message-ID: <20090522232426.GA18238@capsaicin.mamane.lu> Mail-Followup-To: Lionel Elie Mamane , Ian G , IETF OpenPGP Working Group References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4A00BD41.7060807@systemics.com> X-Operating-System: GNU/Linux X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc User-Agent: Mutt/1.5.17+20080114 (2008-01-14) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote: > The predictions of the end of the world are premature. Note that nobody > has stolen money through an MD5 as yet, and nobody has stolen money > because of an RSA-512, either. Maybe, but people have stolen money because of "too small RSA" keys. It was RSA-320, not RSA-512. According to my sources, yp to and including in the year 2007 (I don't know when it was stopped or whether it was). Because the debit card of the swiss PostFinance was using RSA-320 for authentication. As was the whole debit / credit card system in France until the early 21st century; it seems there were cases of theft up to 2001 in France. France: http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm http://www.parodie.com/monetique/ Switzerland: http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html http://www.postcard-sicherheit.ch/ http://chaostreff-zh.tuners.ch/Pestcard -- Lionel Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fVRk015727 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4C5fV4b015726; Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fJcW015714 for ; Mon, 11 May 2009 22:41:30 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 9B08D11AD04 for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C6F19598099 for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Xn-1VN4rsHtD for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) Received: from [10.0.0.129] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9143B598091 for ; Tue, 12 May 2009 07:41:17 +0200 (CEST) Message-ID: <4A090BF5.6090805@epointsystem.org> Date: Tue, 12 May 2009 07:41:09 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <4A08916E.4000902@fifthhorseman.net> In-Reply-To: <4A08916E.4000902@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigBE9288F01ECA740305A0E4C1" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigBE9288F01ECA740305A0E4C1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable I think, you are right. My bad. Daniel Kahn Gillmor wrote: > (dredging this up from a week ago because i was re-thinking it today) >=20 > On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: >> For fingerprints, MDC and self-signatures, collision-resistance does n= ot matter, >> only the one-way property. So I think it is totally safe to postpone d= iscussion >> until SHA3 is selected. >=20 > I think this point holds for fingerprints and MDCs. I'm not convinced > that it holds for self-signatures, though. >=20 > Let's assume Alice has an SHA-1 collision-generator that she can coax > into generating two messages, A and B with the same digest, and that sh= e > is meeting Bob for a keysigning at the pub on Friday. >=20 > She crafts message A, which looks like a regular public key/uid > signature, including friday evening's timestamp and her User ID (this i= s > exactly the information to be hashed in a non-self-signature -- maybe i= t > hides the collision-generating bits in one of the public key MPIs?). > Message B is the data within a self-signature over Bob's key, asserting= > something Bob didn't want to assert (e.g. binding a user ID of a known > villain, or binding a false encryption subkey which Alice controls). > The collision-generating bits in B might be hidden here in a notation > subpacket or something similarly opaque. >=20 > At the pub, Alice gets Bob to sign her key (message A) at just the righ= t > time, retrieves his signature, and transfers it to the new bogus > self-sig (message B). >=20 > I think this means we need to consider self-signatures made over a give= n > algorithm as potentially spoofable if the digest's collision-resistance= > is weakened. It is *not* just the one-wayness that matters for self-si= gs. >=20 > Is this analysis reasonable? What have i missed? >=20 > --dkg >=20 > PS i know that no one has demonstrated anything remotely close to the > hypothesized oracle i've given Alice above. The point is just that > collision-resistance affects self-sigs in ways that it does not affect > the MDC or the fingerprint. >=20 --------------enigBE9288F01ECA740305A0E4C1 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoJC/wACgkQoeH/BzqmYjhJZACeKAuRrkPYj3iHa5gAtG+4ZEKg u9AAoL4L8gQPaZzN1HPT39ObaIO70F85 =Eskt -----END PGP SIGNATURE----- --------------enigBE9288F01ECA740305A0E4C1-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4BKvZgr091809 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4BKvZOr091808; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4BKvO0W091797 for ; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 93868 invoked from network); 11 May 2009 20:57:22 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay01.pair.com with SMTP; 11 May 2009 20:57:22 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <4A08916E.4000902@fifthhorseman.net> Date: Mon, 11 May 2009 16:58:22 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-Reply-To: <49FF6677.7070907@epointsystem.org> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3E288F6834146C1C811D07D6" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig3E288F6834146C1C811D07D6 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable (dredging this up from a week ago because i was re-thinking it today) On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: > For fingerprints, MDC and self-signatures, collision-resistance does no= t matter, > only the one-way property. So I think it is totally safe to postpone di= scussion > until SHA3 is selected. I think this point holds for fingerprints and MDCs. I'm not convinced that it holds for self-signatures, though. Let's assume Alice has an SHA-1 collision-generator that she can coax into generating two messages, A and B with the same digest, and that she is meeting Bob for a keysigning at the pub on Friday. She crafts message A, which looks like a regular public key/uid signature, including friday evening's timestamp and her User ID (this is exactly the information to be hashed in a non-self-signature -- maybe it hides the collision-generating bits in one of the public key MPIs?). Message B is the data within a self-signature over Bob's key, asserting something Bob didn't want to assert (e.g. binding a user ID of a known villain, or binding a false encryption subkey which Alice controls). The collision-generating bits in B might be hidden here in a notation subpacket or something similarly opaque. At the pub, Alice gets Bob to sign her key (message A) at just the right time, retrieves his signature, and transfers it to the new bogus self-sig (message B). I think this means we need to consider self-signatures made over a given algorithm as potentially spoofable if the digest's collision-resistance is weakened. It is *not* just the one-wayness that matters for self-sigs= =2E Is this analysis reasonable? What have i missed? --dkg PS i know that no one has demonstrated anything remotely close to the hypothesized oracle i've given Alice above. The point is just that collision-resistance affects self-sigs in ways that it does not affect the MDC or the fingerprint. --------------enig3E288F6834146C1C811D07D6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgiRf8zS7ZTSFznpAQrFLw/9EAnXGMWkzvNq39vQbSnfeKRgN6wdp58W BleRzhBLyb112LKpt7RZclRcbFtb26+Fr6mpzite7/zhn+ejWKIxdWSD+L79RLF6 V9YRpvtMGl3ja+MB1FPQpUBc5Rchvr+VHH1UlkhXh9BAKX+az5TWbEb6itVKk2Qg 1ilU7MK9bUZv3zsjrj8Bu6SBYza6q/Fk6FDpXVGlcKsTZ6HAiukmO/iE/EFJnZZP qVeEwZZ/g8UYCmFFbgJLaRv67VpvNulP3GPJTg9c28SwVO1l0lTkQjQkFobjU8+o YI/+FodxbSILIXuYbgq43JU0IQ9S5+GUSDO4Z40zf+rz4B+tTHGiavW7+oTIyHg9 S8S3ZGPLMofuy2ciJTaTwveTFhfMJ6YCySXTifIOutoz1HzjbDnGUL0VzTRynAic v7WnihVSVpLDYRjF3tLNR5D7Ow7DcU8MZTmbFyBJCvCDR7Bj989+Im2iXPGMiIZ2 EcCNB5evIQ+qG4/ZaCOap6202ZG5jcwy4AfWEzjvPdMja2+volYZG4Nyw6axKnJ0 PxwqmYLFgkY/Ab+l1W2AK23qA333Iq+/SCPKVH30XbQ6NWv+qmlBuvWKiO+fFGjY eM5+W2KZgtE4Kux8imx2hTAzg5zOrs8UiNUb6ZXpody/wYxVdkg+0UuxnnwEUXPI g41NE3JD75s= =JqA8 -----END PGP SIGNATURE----- --------------enig3E288F6834146C1C811D07D6-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48Kllvm059306 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 8 May 2009 13:47:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n48Klldp059305; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mail.enyo.de (mail.enyo.de [212.9.189.167]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48KlZsJ059290 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for ; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from fw@deneb.enyo.de) Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de) by mail.enyo.de with esmtp id 1M2Wyf-0003X8-Uj; Fri, 08 May 2009 22:47:30 +0200 Received: from fw by deneb.enyo.de with local (Exim 4.69) (envelope-from ) id 1M2Wyf-0000r1-ID; Fri, 08 May 2009 22:47:29 +0200 From: Florian Weimer To: Jon Callas Cc: OpenPGP Working Group Subject: Re: I don't think that collides the way you think it does References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> Date: Fri, 08 May 2009 22:47:29 +0200 In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700") Message-ID: <87skjfcof2.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: * Jon Callas: > The new results for 2^52 work, assuming it's actually doable, are > still for migrating a bitstring into two dependent bitstrings that > collide. This has significance for people who run CAs with sequential > serial numbers, or who want to tweak PDFs to project the future, or > create binary distributions that have and do not have malware. It's > serious *for* *those* *and* *similar* *cases*. Unfortunately, signing someone else's key and user ID is a similar case. You don't know what you're being asked to sign, and you haven't created the document yourself. And a photo ID gives you many bits to play with. In the abstract, you do not actually need collision resistance (and totally keyless hashes) for OpenPGP-like protocols, but current practice is certainly different. IMHO, an eventual OpenPGP successor should prepend salts/IVs in front of signatures. Of course, this might be used as a relatively high-bandwidth covert channel, but it means that the hash function will likely last somewhat longer. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47Hk0MT058473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47Hk0S1058472; Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n47Hjn8Z058453 for ; Thu, 7 May 2009 10:45:59 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 54584 invoked from network); 7 May 2009 17:45:48 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 7 May 2009 17:45:48 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <4A031E88.5020304@fifthhorseman.net> Date: Thu, 07 May 2009 13:46:48 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: keyids vs. fingerprints [was: Re: Fix revocation keys instead of fingerprints?] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> In-Reply-To: X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig4F4AB24288A4BF6E2FDF8F74" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig4F4AB24288A4BF6E2FDF8F74 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/07/2009 11:45 AM, David Shaw wrote: > On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote: >> David Shaw wrote: >>> Fingerprints: >>> * Must be human-readable >>> * Needs to be small to be useful >>> * Can collide to some small amount (4880 even documents that they >>> collide in section 12.2) >> >> That's not the fingerprint. That's the key ID. >=20 > A nit, but that really is the fingerprint. The important items here are 1 and 2, which both apply to a fingerprint. Humans need to be able to cognitively compare fingerprints, so they must be both human-readable and small enough to wade through. As for collisions, 32-bit key ids don't collide "to some small amount". They have *massive* collisions because of the small output space. It takes a few hours of compute time on a single modern desktop machine to generate 32-bit keyID collisions against every single key in the public WoT. 64-bit keyids are better, but still nowhere near the collision resistance we should be expecting from tools we expect humans to use to validate content. keyIDs are useful as pointers, but are not at all useful for verification purposes. --dkg --------------enig4F4AB24288A4BF6E2FDF8F74 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgMejczS7ZTSFznpAQr9zw//TuBcCa2w9WVgU6mUTM8jke6BlILQqo/Q i/rct3ZKWkPhAH3ymMU5KE+MU8aNx7s09Q890anK+Kso/wwklh+UhI+j5//Ys9Uz Q5Sf7ZALcIXn/TTxo5/v8RENuYopW7d4Trm79ctDx6HgAxc8lAU8GGrm/69FJYSA P+xstUybrbKIhlf9tlm23OSrt6+QVfVw0HyeOCZo4GOF151ivXFkOOFLlOwJuqN5 qSTIk8FrEJxZrgzV3xfFDeSYp5XvjUhRmOwn4S/hlAwQr1KOe3diUK53n5nN/xLz qX2G7JTWd2w/3xI+l8gy1fXLGTAZKDw4eO+WQOmZHsSzwVsWLmquW1rekfW1mzQC m5D5gub3BcSFGA89y70aOgD5T8S6S0ZYpDS7yodJSFfAOQ0X06OEezC6oZKr4AKu zbLGs3Ja5ZUH0J+4JMBd1BA7Uc1krLnUssJxTYi2kTdY3I8LDc4qvuPNFqaQ1yyo BFgaoX8yCJVjqQ6lYUmErLEglsrPecPHsSTjuHPJPPTJDORdgLDc0or2AjbDgZSe g+1OKWeXIaRrtm84pWXgGGW7xNaMWTR9DHCbgHgkvq0wFCUm5tCXD6hgfO54Bjno JZyIEyYf7h7BYMmQd5Wr5DkvJ3V7fPHwPUNMCzWzwdHqh2rVPf8u1LoxiHU2q+sI C59VrAVNTsU= =0mp0 -----END PGP SIGNATURE----- --------------enig4F4AB24288A4BF6E2FDF8F74-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6caX056226 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47H6cVJ056225; Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6RDG056207 for ; Thu, 7 May 2009 10:06:37 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2EAB911A193; Thu, 7 May 2009 19:06:25 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C9B10598099; Thu, 7 May 2009 19:06:25 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id azfR40wWvHfj; Thu, 7 May 2009 19:06:25 +0200 (CEST) Received: from [157.181.227.235] (dhcp235.cs.elte.hu [157.181.227.235]) by mail.agileight.com (Postfix) with ESMTP id 89FBC598091; Thu, 7 May 2009 19:06:25 +0200 (CEST) Message-ID: <4A03150C.7050908@epointsystem.org> Date: Thu, 07 May 2009 19:06:20 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> In-Reply-To: X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig44DC6E51A3726AD501084468" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig44DC6E51A3726AD501084468 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hello, David Shaw wrote: > On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote: >=20 >> Hi, >> >> David Shaw wrote: >>> It's a larger problem than just fingerprints. We also use a fingerpr= int >>> as a specifier inside the revocation key subpacket, to designate whic= h >>> key can be used to issue revocations on our behalf. The thing is, >>> though, a fingerprint isn't really a very good revocation key specifi= er: >>> >>> Fingerprints: >>> * Must be human-readable >>> * Needs to be small to be useful >>> * Can collide to some small amount (4880 even documents that they >>> collide in section 12.2) >> >> That's not the fingerprint. That's the key ID. >=20 > A nit, but that really is the fingerprint. >=20 > 12.2: >=20 > Note that there is a much smaller, but still non-zero, probability > that two different keys have the same fingerprint. While the probability is non-zero, but it is roughly equal to accidentall= y guessing the discrete logarithm of a DSA key or a prime factor of the RSA= key. > It's not exactly *likely*, but it's not quite zero. I heard a > urban-legendish story once about someone who (completely accidentally) > generated a key that just happened to have a fingerprint collision with= > someone else's key. Unfortunately, thinking it was a bug, they deleted= > the key... make of that what you will :) There WAS a bug and he did the right thing. --=20 Daniel --------------enig44DC6E51A3726AD501084468 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoDFREACgkQoeH/BzqmYjjeUgCaA14f3l3FFh1akECwPoxEeLUa W6gAmgOXrbr8LyFINqUS55xAQvei3b8u =u3K1 -----END PGP SIGNATURE----- --------------enig44DC6E51A3726AD501084468-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjOBS050354 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47FjOxB050353; Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjBbw050335 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 7 May 2009 08:45:23 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n47Fj8O9003930 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 May 2009 11:45:09 -0400 Cc: IETF OpenPGP Working Group Message-Id: From: David Shaw To: "Daniel A. Nagy" In-Reply-To: <49FFD926.20802@epointsystem.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) Date: Thu, 7 May 2009 11:45:08 -0400 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote: > Hi, > > David Shaw wrote: >> It's a larger problem than just fingerprints. We also use a >> fingerprint >> as a specifier inside the revocation key subpacket, to designate >> which >> key can be used to issue revocations on our behalf. The thing is, >> though, a fingerprint isn't really a very good revocation key >> specifier: >> >> Fingerprints: >> * Must be human-readable >> * Needs to be small to be useful >> * Can collide to some small amount (4880 even documents that they >> collide in section 12.2) > > That's not the fingerprint. That's the key ID. A nit, but that really is the fingerprint. 12.2: Note that there is a much smaller, but still non-zero, probability that two different keys have the same fingerprint. It's not exactly *likely*, but it's not quite zero. I heard a urban- legendish story once about someone who (completely accidentally) generated a key that just happened to have a fingerprint collision with someone else's key. Unfortunately, thinking it was a bug, they deleted the key... make of that what you will :) David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n465nmig005151 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n465nmM4005150; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n465nb8f005142 for ; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 83334 invoked from network); 6 May 2009 05:49:36 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 6 May 2009 05:49:36 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <4A012528.3080501@fifthhorseman.net> Date: Wed, 06 May 2009 01:50:32 -0400 From: Daniel Kahn Gillmor User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: building up the post-SHA1 Web of Trust X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9; url=http://fifthhorseman.net/dkg.gpg Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig8E6632BDC9EEDBA49FB9BB73" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig8E6632BDC9EEDBA49FB9BB73 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi people-- I just made a fairly gpg-specific blog post suggesting concrete, non-disruptive actions that people can take now to start building out the post-SHA1 Web of Trust: http://www.debian-administration.org/users/dkg/weblog/48 I realize this is a somewhat controversial topic, and i'm not trying to start a flamewar. I do welcome questions, comments, and criticism, though, and i'd be very happy to be able to link to similar HOWTOs for other OpenPGP implementations if anyone else has written them. The actual abandonment of SHA1 is still a ways off, and nothing in my post suggests that we *should* abandon it now. My goal is to see the Web of Trust be sufficiently robust well before SHA-1 is finally deprecated, and this seems possible with current tools and protocols, if we go about it reasonably and start early enough. I really appreciate all the knowledge people have shared on this list about the subject recently. I've learned a lot in the last few days, and hope i haven't screwed anything up too badly. Regards, --dkg --------------enig8E6632BDC9EEDBA49FB9BB73 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgElLczS7ZTSFznpAQowdA//YOcupFAs/Hb9ZD87PGy77kZ6tjO2ZTJZ 2qVz+9qBF8jMynJlXp6F5rvmdTum5bS1PGSDDCcepih9h6nV21UUY1D1mAD3TSlI ffehldROOSQqO6/4fUz3Hh3UTGGICE6MuJsgsVz9AEJdoXZIgpaPEDy3oY+o/T0C n7VKaKbnrvvDAK9x9xI3QZj1wQKThMangetmHiSuDyCPmAD0nZEK27uiXwXSikkb NrszgUW/aH3zyO4moJswJuryIEVvh0tXwBiyspnPiYn+JVocF+Fxenc8p+fzBdtN Lo0pvZZf8+glz9UkftXYjfKPvP1g5a0IVqPs9sUOrK0M5z/ccWsPTsnYA2NBB5MB uS7hZBEHhv5AX1QLimGb4iBAZ/lGSR+zzGiT8umCZpoKNz/mNWKqPPlj51J40iEg VmkUD9FLQ/8KfOsYm4GiRXTM6MD3BqnStJDyMSJHBWY7lABU2hbJrj7v5SSbUYP6 LZmpc0wi508urJLcMquAZA4GPsK9IizbRxliCDEOLWy1K3GbZiWSJeKJ9aQHLinY 3JTACz7/VGaO3+B238n0ViFw1/ZvBcJFgOLtdWY1f18ngvT2JXjdDsqRIb1B5dG0 XTkjRYFouVwj9LC34Z69/y4165KdzUw+ZVx2Kg/Wlr4EhHO3DgnMMa9yF8tDuHYq YHxOvZdONuo= =eChL -----END PGP SIGNATURE----- --------------enig8E6632BDC9EEDBA49FB9BB73-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0vrt083597 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45N0vai083596; Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0jfN083581 for ; Tue, 5 May 2009 16:00:56 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8A08511A1A8; Wed, 6 May 2009 01:00:44 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 173EC598099; Wed, 6 May 2009 01:00:44 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id zeOzR+syRu8S; Wed, 6 May 2009 01:00:43 +0200 (CEST) Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D25BF598091; Wed, 6 May 2009 01:00:43 +0200 (CEST) Message-ID: <4A00C515.6000100@epointsystem.org> Date: Wed, 06 May 2009 01:00:37 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: Daniel Franke CC: Jon Callas , OpenPGP Working Group Subject: Re: I don't think that collides the way you think it does References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us> In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig40F5A262D60EEB9E17B2A2D8" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig40F5A262D60EEB9E17B2A2D8 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Daniel Franke wrote: > Jon Callas writes: >=20 >> Adi Shamir has pointed out for years now that no one has found *any* = >> first or second preimage collision for SHA1. I'll shill for him here. >> >> The new results for 2^52 work, assuming it's actually doable, are =20 >> still for migrating a bitstring into two dependent bitstrings that =20 >> collide. This has significance for people who run CAs with sequential = =20 >> serial numbers, or who want to tweak PDFs to project the future, or =20 >> create binary distributions that have and do not have malware. It's =20 >> serious *for* *those* *and* *similar* *cases*. >=20 > I think you mean "no one has found any first or second preimage > *attacks* for SHA-1". To the best of my knowledge, nobody has found an= y > SHA-1 collisions at all, either chosen or otherwise. The 2^52 result i= s > still theoretical, because while 2^52 hash operations is tractable for = a > WFO, it's still a formidable amount of work, and Cameron McDonald is no= t > a WFO. Just to give you some perspective what WFO means at this day and age: my cryptography lab at the University has just built and tested a DES cracke= r that cost us less than =E2=82=AC20000 EUR. It iterates through the 56-bit key = space in about one week. We are considering using it for finding a SHA1 collision using these new results. But, as noted above, this would be a collision where both pre-im= ages are carefully chosen by the attacker. --=20 Daniel --------------enig40F5A262D60EEB9E17B2A2D8 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkoAxRoACgkQoeH/BzqmYjiJ3gCeL2/PxzNTS9+M79gZAQLAe3a7 NgwAoIw3e4dcVFtkC04JIqSwg405QlUp =tkBu -----END PGP SIGNATURE----- --------------enig40F5A262D60EEB9E17B2A2D8-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRXEw081556 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45MRXv1081555; Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRMJF081540 for ; Tue, 5 May 2009 15:27:32 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:29068) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M1T6e-0006zP-B0 (Exim 4.69) (return-path ); Tue, 05 May 2009 23:27:20 +0100 Received: from ip80-101-235-1.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 2703C5D65; Tue, 5 May 2009 23:27:12 +0100 (GMT/BST) Message-ID: <4A00BD41.7060807@systemics.com> Date: Wed, 06 May 2009 00:27:13 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> In-Reply-To: <4A003D23.1070208@fifthhorseman.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 5/5/09 15:20, Daniel Kahn Gillmor wrote: > On 05/05/2009 02:58 AM, Ian G wrote: >> Simplify, simplify, simplify. One hash is good enough >> for 99.99% of the users, and the rest should be implementing not >> eulogising. > [...] >> If it was updated today for IETF, it would say: always insist on the >> right to variations in protocols, for future-proofing. > > I've seen you express this sentiment before, Ian, and i can appreciate > where you're coming from. Variable ciphers and digests are messy, > difficult to get right, and alienating arcana to most users. And, anything that slows users slows usage. Unusability is the killer, not the number of bits in the algorithm. > But i > don't understand what your concrete proposal is here. > > Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the > best approach for us 0.01% of the users/implementors to take in response > to the news that SHA-1's collision-resistance was insufficient against > well-resourced organizations, and seems likely to get worse before SHA-3 > is settled? Wait until SHA-3. Meanwhile, design how to use SHA-3 from 2012 to 2022. The predictions of the end of the world are premature. Note that nobody has stolen money through an MD5 as yet, and nobody has stolen money because of an RSA-512, either. Nor, has 40 bit secret keys been embarrassed as yet. (All my humble opinion of course :) The business problem here is that the crypto guys are far too far away from the real business to realise that business leakages are around the 50-80% level. In such an environment, nobody much cares about the difference between 99.99 and 99.999%. > How would we help facilitate the transition for the 99.99% of the users > to a safer hash? Or would we simply tell them "OpenPGP is done, go find > something else before the year is up if you want to maintain > private/authenticated communications"? I think it is best treated as a complete transition from packet types. E.g., "It's time to create a complete new key. V5 is ready." With not as much compatibility between the types as expected, but facilitated by tools. Once per decade. A bit like the transition from 2.6 to 5.0 if you recall. Again, what I believe, others think differently. iang Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M17Ng079837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:01:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45M17xm079836; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mta-1.ms.rz.rwth-aachen.de (mta-1.ms.rz.RWTH-Aachen.DE [134.130.7.72]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M0tjZ079809 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=FAIL) for ; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from kloecker@kde.org) MIME-version: 1.0 Received: from ironport-out-1.rz.rwth-aachen.de ([134.130.5.40]) by mta-1.ms.rz.RWTH-Aachen.de (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008)) with ESMTP id <0KJ6004QSYHI11C0@mta-1.ms.rz.RWTH-Aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST) X-IronPort-AV: E=Sophos;i="4.40,299,1238968800"; d="asc'?scan'208";a="10826999" Received: from relay-auth-1.ms.rz.rwth-aachen.de (HELO relay-auth-1) ([134.130.7.78]) by ironport-in-1.rz.rwth-aachen.de with ESMTP; Wed, 06 May 2009 00:00:54 +0200 Received: from [192.168.0.161] ([unknown] [78.49.118.14]) by relay-auth-1.ms.rz.rwth-aachen.de (Sun Java(tm) System Messaging Server 7.0-3.01 64bit (built Dec 9 2008)) with ESMTPA id <0KJ600C6VYHI4X20@relay-auth-1.ms.rz.rwth-aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST) From: Ingo =?iso-8859-1?q?Kl=F6cker?= To: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints Date: Wed, 06 May 2009 00:00:42 +0200 User-Agent: KMail/1.9.10 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-reply-to: Content-type: multipart/signed; boundary=nextPart51737562.EtnubJnk9m; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-transfer-encoding: 7bit Message-id: <200905060000.49934@thufir.ingo-kloecker.de> Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --nextPart51737562.EtnubJnk9m Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Tuesday 05 May 2009, David Shaw wrote: > On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: > > Also, since mobile phones typically have a numeric keypad, it would > > be nice if > > fingerprints and key IDs were numeric-only. It is an increasingly > > important > > platform for OpenPGP, I believe. > > I think that is a good point and a great idea, but the only reason > that fingerprints and key IDs are printed in hex now is tradition. > There is nothing in the standard one way or another about how humans > should consume fingerprints. You could even do it with the current > V4 fingerprints: just as my key fingerprint is > 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally > correct as 716901811312187285520504099705403090347495794016 in > decimal. The big problem I see here is that's it's an awfully long > number to type into a mobile keypad. Right. I do already have a hard time typing an unknown phone number with=20 8 digits. Since most mobile phones come with a camera nowadays the way to go is to=20 take a picture of the fingerprint and then run some OCR on the picture.=20 In fact, it would be much better to encode the fingerprint in some kind=20 of easily scanable bar code (additionally to the common hex=20 fingerprint) than as long string of numbers (similar to Semapedia). Regards, Ingo P.S.: The mailing list software does not add a List-Post header (which=20 is used for "Reply to List" by my MUA). Is it possible to fix this? --nextPart51737562.EtnubJnk9m Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEABECAAYFAkoAtxEACgkQGnR+RTDgudiL5wCeL/YZtGQDctzOV8pBcxtZ4g+0 zeAAnA/MlL6QnAcjUcWwIP6GBmCQF0XQ =M/gC -----END PGP SIGNATURE----- --nextPart51737562.EtnubJnk9m-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LVCRU077932 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45LVCSx077931; Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LV1Gl077919 for ; Tue, 5 May 2009 14:31:11 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 9C6E92E118 for ; Tue, 5 May 2009 14:31:54 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 43121-01 for ; Tue, 5 May 2009 14:31:49 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id D8CBC2E1D3 for ; Tue, 5 May 2009 14:31:49 -0700 (PDT) Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 14:30:56 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 14:30:56 -0700 Cc: OpenPGP Working Group Message-Id: <12A3741B-5277-45CF-8D53-764CEA5732AD@callas.org> From: Jon Callas To: Daniel Franke In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us> Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: I don't think that collides the way you think it does Date: Tue, 5 May 2009 14:30:49 -0700 References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us> X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On May 5, 2009, at 12:18 PM, Daniel Franke wrote: > * PGP Signed by an unknown key > > Jon Callas writes: > >> Adi Shamir has pointed out for years now that no one has found *any* >> first or second preimage collision for SHA1. I'll shill for him here. >> >> The new results for 2^52 work, assuming it's actually doable, are >> still for migrating a bitstring into two dependent bitstrings that >> collide. This has significance for people who run CAs with sequential >> serial numbers, or who want to tweak PDFs to project the future, or >> create binary distributions that have and do not have malware. It's >> serious *for* *those* *and* *similar* *cases*. > > I think you mean "no one has found any first or second preimage > *attacks* for SHA-1". To the best of my knowledge, nobody has found > any > SHA-1 collisions at all, either chosen or otherwise. The 2^52 > result is > still theoretical, because while 2^52 hash operations is tractable > for a > WFO, it's still a formidable amount of work, and Cameron McDonald is > not > a WFO. Thank you for the further clarification. You are correct. Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFKALAQsTedWZOD3gYRAtQVAJ9bLVO5G5yS5oiCWb5KbWCGibNsEACeMwb3 B/qMAwa5oxwg1q7DJ/aXuww= =OUoa -----END PGP SIGNATURE----- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JJ0aj068139 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 12:19:01 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45JJ0tr068138; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mho-01-ewr.mailhop.org (mho-01-ewr.mailhop.org [204.13.248.71]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JIne1068119 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from dfranke@feanor.dfranke.us) Received: from adsl-99-175-103-55.dsl.pltn13.sbcglobal.net ([99.175.103.55] helo=feanor.dfranke.us) by mho-01-ewr.mailhop.org with esmtpa (Exim 4.68) (envelope-from ) id 1M1QAC-000JTw-Fb; Tue, 05 May 2009 19:18:48 +0000 Received: by feanor.dfranke.us (Postfix, from userid 1000) id 096162D63ED; Tue, 5 May 2009 12:18:47 -0700 (PDT) X-Mail-Handler: MailHop Outbound by DynDNS X-Originating-IP: 99.175.103.55 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1+YEYY4vsbGMT1XhnwWCUwL DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dfranke.us; s=default; t=1241551127; bh=1FTDtm8GZXh7vDqToK08D1pw4d9PzmoVhBo4cTFtJPI=; h=From:To:Cc:Subject:References:Date:In-Reply-To:Message-ID: MIME-Version:Content-Type; b=yo9jWthLVI5RfjTIoCbAT41XS7CAXbifwxXCc TO/HcceMlVGLv2Q6FTUVAJn+Sfel9GJia7umKhwYrK/BeZi9PwRS/9fwWm4hpgmuioW Pjne0T4m7rcTTo97jZEvt+HRTLTWDny0Xe0mHVhZAwEOOI98GQmOIY6nivZjGileUVY = From: Daniel Franke To: Jon Callas Cc: OpenPGP Working Group Subject: Re: I don't think that collides the way you think it does References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> X-Hashcash: 1:26:090505:ietf-openpgp@imc.org::FWfm+2gA8G6xCEMY:000000000000000000000000000000000000000003UWa X-Hashcash: 1:26:090505:jon@callas.org::h6ykG/NGawgQKom8:000BNMG Date: Tue, 05 May 2009 12:18:41 -0700 In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (sfid-20090505_110311_348312_3F415D8B) (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700") Message-ID: <87eiv3cq9a.fsf@feanor.dfranke.us> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.0.60 (gnu/linux) MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --=-=-= Content-Transfer-Encoding: quoted-printable Jon Callas writes: > Adi Shamir has pointed out for years now that no one has found *any*=20=20 > first or second preimage collision for SHA1. I'll shill for him here. > > The new results for 2^52 work, assuming it's actually doable, are=20=20 > still for migrating a bitstring into two dependent bitstrings that=20=20 > collide. This has significance for people who run CAs with sequential=20= =20 > serial numbers, or who want to tweak PDFs to project the future, or=20=20 > create binary distributions that have and do not have malware. It's=20=20 > serious *for* *those* *and* *similar* *cases*. I think you mean "no one has found any first or second preimage *attacks* for SHA-1". To the best of my knowledge, nobody has found any SHA-1 collisions at all, either chosen or otherwise. The 2^52 result is still theoretical, because while 2^52 hash operations is tractable for a WFO, it's still a formidable amount of work, and Cameron McDonald is not a WFO. Preimage attacks are hard. Even long, long-ago deprecated hash functions have held up well agaist them. The one in the worst shape is MD2, and that attack requires 2^104 operations (vs. 2^128 brute force). I'm pretty confident that by the time there's a computer that can do 2^104 of anything, nobody is going care about my secrets. Here's a threat model I suggest for future work on OpenPGP: assume that the hash function is ideal, but that the adversary has an oracle that takes as input two messages and pointers to n/2 bits of each message (where n is the digest length), and outputs colliding messages by filling in those bits. In other words, preimage attacks are impossible (short of brute force), but birthday attacks are trivial. I think securing OpenPGP against this threat model is possible. As you and others have already pointed out, most of OpenPGP's uses of hash functions already depend only on one-wayness. =2D-=20 Daniel Franke df@dfranke.us http://www.dfranke.us |----| =3D|\ \\\\=20=20=20=20 || * | -|-\--------- Man is free at the instant he wants to be.=20 -----| =3D| \ /// --Voltaire --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iF4EAREKAAYFAkoAkREACgkQ8tqcOcPA7qPwzQD+KPhUId+raki0OX9bx7ulEvKF WfATtLN2BUgdNFJfjg0A/1668CZF1Jw0mkApDGqf3KNRs4LIsvzmpbobvqNTWiX4 =sZo9 -----END PGP SIGNATURE----- --=-=-=-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwP69062007 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HwPBM062006; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwOvD062000 for ; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id BABA52E215 for ; Tue, 5 May 2009 10:59:17 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41539-07 for ; Tue, 5 May 2009 10:59:11 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id ACA3C2E118 for ; Tue, 5 May 2009 10:59:11 -0700 (PDT) Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:58:18 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:58:18 -0700 Message-Id: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> From: Jon Callas To: OpenPGP Working Group Mime-Version: 1.0 (Apple Message framework v930.3) Subject: I don't think that collides the way you think it does Date: Tue, 5 May 2009 10:58:14 -0700 X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Adi Shamir has pointed out for years now that no one has found *any* first or second preimage collision for SHA1. I'll shill for him here. The new results for 2^52 work, assuming it's actually doable, are still for migrating a bitstring into two dependent bitstrings that collide. This has significance for people who run CAs with sequential serial numbers, or who want to tweak PDFs to project the future, or create binary distributions that have and do not have malware. It's serious *for* *those* *and* *similar* *cases*. It does *not* mean that you can get a collision on an existing signature, nor on an existing fingerprint, nor on an MDC, etc. We are still sitting at *zero* first and second preimage collisions. I think that we should push through the generic fingerprint proposal. I sorta-kinda picked up the ball on that to work with Derek, but if there's anyone else who wants it (or who wants to co-author with Derek and me), I'm happy to have less work to do. I also think it's completely reasonable for an implementation to back away from SHA1 with all due speed -- but you're supposed to be doing that by 2010, anyway! Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFKAH46sTedWZOD3gYRAgw4AKD+McI0GJOGcFXk/n7gmY0PYsKO0ACfa0DQ zhTAaqwStSUApOg8EoG9Tuk= =s+6q -----END PGP SIGNATURE----- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiRBZ061317 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HiRHw061316; Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiGsO061306 for ; Tue, 5 May 2009 10:44:26 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 824882E1D3 for ; Tue, 5 May 2009 10:45:08 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41465-05 for ; Tue, 5 May 2009 10:45:03 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id E8FF42E118 for ; Tue, 5 May 2009 10:45:03 -0700 (PDT) Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:44:10 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:44:10 -0700 Message-Id: <318A09AF-96C2-4A2A-8692-F579BCA15568@callas.org> From: Jon Callas To: OpenPGP Working Group In-Reply-To: Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: New results against SHA-1 Date: Tue, 5 May 2009 10:43:57 -0700 References: X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On May 4, 2009, at 7:46 PM, Peter Gutmann wrote: > > Daniel Kahn Gillmor writes: > >> What do other folks think? > > Given that the MDC is a hash of plaintext that's then encrypted, and > the hash > value is itself encrypted, I'm not losing any sleep over it. The > hash attacks > so far have required bit-for-bit carefully-chosen plaintext with > known hash > values, not unknown (or even partially-known) plaintext with an > unknown hash > value. I'm not losing a lot of sleep over it, either. The point of the MDC is to provide a low-level integrity check. There's an easy high-level integrity check, a digital signature. The MDC exists for people who don't want to sign, but do want more protection than naked CFB mode, which is completely vulnerable to truncation. The construction we use is not "secure". I put scare quotes around it for a reason. In particular, it's vulnerable to existential forgeries. However, every spam in the world is an existential forgery, and if you wanted to send an MDC forgery to someone, it's much easier to just write the message and encrypt it to them than modifying an existing message. What that means is that while there are some protocols that really have to worry about existential forgeries (like IPsec), we're really not one of them, especially since there's always signing for us. In 4880, we described how one might upgrade the MDC. If someone believes it's important, I would support anyone writing a draft for an upgraded MDC. (But as an implementer, I can't make a statement as to when or if PGP would implement it.) Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFKAHrqsTedWZOD3gYRAo0BAJ4maMvMTEHDIiJBQ+ry3VuUt3gW7gCglCkE 0nX3EUzYQ+alsPjef8RSeE4= =Tq6M -----END PGP SIGNATURE----- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Gj43A056300 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 09:45:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45Gj3Wc056299; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45GipDR056268 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from hal@finney.org) Received: by finney.org (Postfix, from userid 500) id 83D7814F6E1; Tue, 5 May 2009 08:03:00 -0700 (PDT) To: ietf-openpgp@imc.org Subject: Re: Non-SHA-1 fingerprints Message-Id: <20090505150300.83D7814F6E1@finney.org> Date: Tue, 5 May 2009 08:03:00 -0700 (PDT) From: hal@finney.org ("Hal Finney") Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: > For fingerprints, MDC and self-signatures, collision-resistance does > not matter, only the one-way property. So I think it is totally safe to > postpone discussion until SHA3 is selected. To quibble a bit, the real issue is not the specific usage, but whether the creator of the signature controls the content that is hashed, and whether he adds enough information and "entropy" of his own that no outsider could substantially control and/or guess the content. I can imagine situations from the list above where outsiders might be able to mount an attack. Even self-signatures may have substantial data contributed by outsiders, at least with use of some allowed extensions. We have notation subpackets and possibly other subpackets which could include data that is supplied by outsiders. PGP has for many years supported an extension to the User ID called a Photo ID, which includes a picture of the key holder. Imagine if you added to your key a photo of yourself, but one that was taken by someone else, and signed it with a self signature using a weak hash. Some time later you might discover a different-looking photo circulating, signed with that same signature (because the photo was gimmicked to allow a change in some data to display a different image). One could imagine security implications of this kind of substitution. MDC packets should be immune because we hash the prefix which should normally include 128+ bits of randomness. Likewise with fingerprints, presumably the key itself includes sufficient randomness to make it unguessable, otherwise many other attacks are possible. Hal Finney PGP Corporation Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45DJqG2037350 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45DJq7E037349; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay02.pair.com (relay02.pair.com [209.68.5.16]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n45DJfl1037327 for ; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 10420 invoked from network); 5 May 2009 13:19:39 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay02.pair.com with SMTP; 5 May 2009 13:19:39 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <4A003D23.1070208@fifthhorseman.net> Date: Tue, 05 May 2009 09:20:35 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> In-Reply-To: <49FFE3B2.9060408@systemics.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig171F5511815A85E73F57BC1D" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig171F5511815A85E73F57BC1D Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/05/2009 02:58 AM, Ian G wrote: > Simplify, simplify, simplify. One hash is good enough > for 99.99% of the users, and the rest should be implementing not > eulogising. [...] > If it was updated today for IETF, it would say: always insist on the > right to variations in protocols, for future-proofing. I've seen you express this sentiment before, Ian, and i can appreciate where you're coming from. Variable ciphers and digests are messy, difficult to get right, and alienating arcana to most users. But i don't understand what your concrete proposal is here. Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the best approach for us 0.01% of the users/implementors to take in response to the news that SHA-1's collision-resistance was insufficient against well-resourced organizations, and seems likely to get worse before SHA-3 is settled? How would we help facilitate the transition for the 99.99% of the users to a safer hash? Or would we simply tell them "OpenPGP is done, go find something else before the year is up if you want to maintain private/authenticated communications"? Regards, --dkg --------------enig171F5511815A85E73F57BC1D Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSgA9KMzS7ZTSFznpAQoSJQ/7Bf2xRQQm1NLLSSK2xTBJYpRgPJb/PqNr ZBNcu1jyWJPNaAqnQpZIjpepFCO188qmnIgmwalQs8zvnDpn459ftEu12cb3Y5no Pf9sD8B2ufhhGNmDR84IjM/HQeRYgJ2ooeU/VqCnSGyQfZuQI7bvIi7U/KCu2j4J IN0ynMDOMES/CwLicf1IIYtO+QQjoRrATacBqOU92sQHpG74a2lEqx7nxSr+8l5S DyR3dn2jD4hvl3bhuHaoyUqm/0FQqElN/XuXwXU9IMyl1KrF3Da46SxrvGg8+z/1 PPtkcDLNrgpPioEj8XvUSM8BGqHFMYfwwe25IPInfdYoobvPse0KpreCPdZeBBbO /PljMfzqsRjomS19ogybe1TJ9dvoOnUluQxnDj88ydsfAFpNJg8qIE8x1u9IeLjC 0uwjQY5isXdoJpYKyI7/iOL3rKiu7v5V5RTuwwC/w32vPBWi3XCB9KysHBVQQmQC 6AmKijmMJfJcVUY6RoTykhV6Cfg/vBg3AzUMv/9Pxw7QniHbVVQDGzw4CMlk4joC NuV8s6sJb/TpT573bb/mRRMctvIu1jvsv/YzVV/paA/E4PGVUGYoBMSX7MNgeIdE P1tzqcGpiwbDEMywSHX6SdM3ya4qa9ORpo4MdbhgRwFdDwblUy7BwjYVtSSV9n/n 7xubhRlV9m0= =CyQN -----END PGP SIGNATURE----- --------------enig171F5511815A85E73F57BC1D-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45BbI71029558 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45BbIwX029557; Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Bb65o029539 for ; Tue, 5 May 2009 04:37:17 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1IxN-00014O-2J for ; Tue, 05 May 2009 13:37:05 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ioo-0000B5-QN; Tue, 05 May 2009 13:28:14 +0200 From: Werner Koch To: "Daniel A. Nagy" Cc: David Shaw , IETF OpenPGP Working Group Subject: Re: Changing GPG's default key type References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <49FFDCEF.5040006@epointsystem.org> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Tue, 05 May 2009 13:28:14 +0200 In-Reply-To: <49FFDCEF.5040006@epointsystem.org> (Daniel A. Nagy's message of "Tue, 05 May 2009 08:30:07 +0200") Message-ID: <87r5z394c1.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Tue, 5 May 2009 08:30, nagydani@epointsystem.org said: > There is, however, no known workaround for #2. Generating a PGP-compliant > 1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enough to That is a problem of that implementation. Even 10 year old smartcards are able to generate a 1k RSA key in less than 30 seconds. Modern cards are much faster. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H46S011600 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n457H4Oi011599; Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H2NR011592 for ; Tue, 5 May 2009 00:17:03 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Etg-0005eF-Uh for ; Tue, 05 May 2009 09:17:00 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Elx-0008Pk-QI for ; Tue, 05 May 2009 09:09:01 +0200 From: Werner Koch To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Tue, 05 May 2009 09:09:01 +0200 In-Reply-To: <49FF325A.80106@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 14:22:18 -0400") Message-ID: <87fxfk9gc2.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, 4 May 2009 20:22, dkg@fifthhorseman.net said: > Another approach would be to formally prefer digest algorithms that do > not exhibit the same single-pass behavior of SHA-1 -- is that feasible? No. Single pass processing an important feature. Anything else can only be done if the required amount of RAM is small enough and with an upper limit to be implemented on small devices. Think of a network proxy with no need to store the data passing through but to verify signatures of large chunks of this data. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4577FhN010922 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4577F4R010920; Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45772lu010902 for ; Tue, 5 May 2009 00:07:13 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Ek0-0005ZZ-Hs for ; Tue, 05 May 2009 09:07:00 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ecn-0008P5-QE for ; Tue, 05 May 2009 08:59:33 +0200 From: Werner Koch To: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFA92E.50100@fifthhorseman.net> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Tue, 05 May 2009 08:59:33 +0200 In-Reply-To: <49FFA92E.50100@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 22:49:18 -0400") Message-ID: <87k54w9gru.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Tue, 5 May 2009 04:49, dkg@fifthhorseman.net said: > realistic keys out there right now are still only around 1KB of a > subpacket, and revocation key subpackets themselves are pretty rare. So > the added size doesn't seem problematic to me. I concur. In fact the forthcoming default of RSA signatures will increase the size of a keyblock far more than a single longer revocation key subpacket. Shalom-Salam, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456xHgS010463 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:59:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456xHTu010462; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456x6Qx010442 for ; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:6543) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M1EcK-00005d-65 (Exim 4.69) (return-path ); Tue, 05 May 2009 07:59:04 +0100 Received: from ip80-101-239-120.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 4F1915D65; Tue, 5 May 2009 07:58:58 +0100 (GMT/BST) Message-ID: <49FFE3B2.9060408@systemics.com> Date: Tue, 05 May 2009 08:58:58 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: how to specify "trust no signatures over hash X from this key"? References: <49FFBB0B.9070209@fifthhorseman.net> In-Reply-To: <49FFBB0B.9070209@fifthhorseman.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 5/5/09 06:05, Daniel Kahn Gillmor wrote: > Is there interest in being able to explicitly state such a policy? None whatsoever. Simplify, simplify, simplify. One hash is good enough for 99.99% of the users, and the rest should be implementing not eulogising. Has anyone read the OSS Guide to Sabotage? In there it has a list of things about how to break up a user group. One of them is to insist on following rules because they are important, another advice is to always refer things to a committee. If it was updated today for IETF, it would say: always insist on the right to variations in protocols, for future-proofing. iang Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UBAF009026 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456UB90009024; Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UAmk009017 for ; Mon, 4 May 2009 23:30:10 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2E26131A590; Tue, 5 May 2009 08:30:09 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 0A566598099; Tue, 5 May 2009 08:30:09 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id n5iGA7C1kZE4; Tue, 5 May 2009 08:30:08 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AFBF6598091; Tue, 5 May 2009 08:30:08 +0200 (CEST) Message-ID: <49FFDCEF.5040006@epointsystem.org> Date: Tue, 05 May 2009 08:30:07 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Changing GPG's default key type References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigADA531ADE781892CA88A4D27" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigADA531ADE781892CA88A4D27 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable There is one reason why I still use DSA keys in some of my applications: They are much cheaper to generate. I strongly believe that in order for c= rypto to become ubiquitous, it is important that key pairs are generated right = after installation. In case of RSA, it can go wrong in two ways: 1. RSA requires too many random bits and a computer that nobody touches c= an just freeze up waiting for random input. 2. The time to generate an RSA key is too long on cheap embedded hardware= =2E Of course, neither is of concern for GPG's default key; if you have such = a system, just tell it to generate DSA keys. But these two points should be= kept in mind. The obvious workaround for #1, is to read enough random bits for the secu= rity of the key (e.g. 256) and then seed a secure PRNG with them. There is, however, no known workaround for #2. Generating a PGP-compliant= 1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enoug= h to make casual users frustrated and throw away the whole thing. Now, of cour= se, such slow mobiles are not manufactured anymore, but even 2 minutes is unacceptable, which is the norm for today's low-end phones. And since the= market values battery life much more than computational muscle (low-end phones = are very responsive at present clock rates) in mobiles, this is not going to = improve too rapidly. --=20 Daniel --------------enigADA531ADE781892CA88A4D27 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/3O8ACgkQoeH/BzqmYjjujwCgkC5EGQtwYoAEwNY4VKHYgooT hucAnjsB9OKhKWCBo3YQQalaUt55QBmF =4lhF -----END PGP SIGNATURE----- --------------enigADA531ADE781892CA88A4D27-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HrEM008484 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Hr1k008483; Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HquA008477 for ; Mon, 4 May 2009 23:17:52 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4346811A972 for ; Tue, 5 May 2009 08:17:49 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 26873598099 for ; Tue, 5 May 2009 08:17:49 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Wbp6SqEfRbcG for ; Tue, 5 May 2009 08:17:49 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D457A598091 for ; Tue, 5 May 2009 08:17:48 +0200 (CEST) Message-ID: <49FFDA0C.6040900@epointsystem.org> Date: Tue, 05 May 2009 08:17:48 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <49FFA8C0.70306@fifthhorseman.net> In-Reply-To: <49FFA8C0.70306@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig7486F63840E3487114A61F7A" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig7486F63840E3487114A61F7A Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Your reasoning below is correct, as far as I can tell. Daniel Kahn Gillmor wrote: > On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: >> For fingerprints, MDC and self-signatures, collision-resistance does n= ot matter, >> only the one-way property. So I think it is totally safe to postpone d= iscussion >> until SHA3 is selected. >=20 > The more that i consider this, the more important it seems. Thank you > for emphasizing it, Daniel. >=20 > If i understand you correctly, your point is that fingerprints and > self-signatures use hashes over data that is provided entirely by the > signer, covering nothing that is supplied by an outside party. >=20 > Since "birthday" attacks rely on the attacker generating an arbitrary > collision, providing one side of it for signing by the victim, and then= > transferring the signature onto the other side of the discovered > collision, they do not work against material under full control of the > signer (like fingerprints and self-sigs). >=20 > Even if the recent claims of O(2^52) (instead of the > theoretically-optimal 2^80) operations to generate a colliding pair wer= e > to scale proportionally to attacks against the one-wayness of SHA-1, > that would mean O(2^104) (instead of 2^160) operations to find a messag= e > that hashes to a given value. i have no idea if these sort of results > can actually scale this way, but i imagine we'd hear a much larger > hullabaloo if someone had announced an attack against the one-wayness > of SHA-1 with less than O(2^104) operations. >=20 > Anyway, since 2^104 is still outside the capabilities of well-funded > organizations, we have breathing room on these parts of the > specification that only rely on collision-resistance. >=20 > Did i get anything wrong above? I apologize if this is elementary for > everyone else, i'm just trying to make sure i understand the ideas invo= lved. >=20 > --dkg >=20 --------------enig7486F63840E3487114A61F7A Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/2gwACgkQoeH/BzqmYjgKNwCg3933RhIsA85EMI+lhIoMv6LO kIIAoLq19Ms4RZH8vLqgVaK0vcfwf91s =3hVN -----END PGP SIGNATURE----- --------------enig7486F63840E3487114A61F7A-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FhxB008363 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Fhn0008362; Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FWEx008349 for ; Mon, 4 May 2009 23:15:42 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 7067D11A9BC for ; Tue, 5 May 2009 08:15:30 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 12992598099 for ; Tue, 5 May 2009 08:15:30 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id DIY3oRhoJPCf for ; Tue, 5 May 2009 08:15:29 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id BD5EB598091 for ; Tue, 5 May 2009 08:15:29 +0200 (CEST) Message-ID: <49FFD981.3030501@epointsystem.org> Date: Tue, 05 May 2009 08:15:29 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: decimal fingerprints [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <49FF94D4.3030101@fifthhorseman.net> In-Reply-To: <49FF94D4.3030101@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigC704609DD70F977B4CBDADD5" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigC704609DD70F977B4CBDADD5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Actually, it is not the fingerprint, but the key ID that is typed in, but= it is a NICE feature of OpenPGP at present that the key ID is simply a substrin= g of the fingerprint. I would hate to lose that. Daniel Kahn Gillmor wrote: > On 05/04/2009 08:17 PM, David Shaw wrote: >> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: >> >>> Also, since mobile phones typically have a numeric keypad, it would b= e >>> nice if >>> fingerprints and key IDs were numeric-only. It is an increasingly >>> important >>> platform for OpenPGP, I believe. >> I think that is a good point and a great idea, but the only reason tha= t >> fingerprints and key IDs are printed in hex now is tradition. There i= s >> nothing in the standard one way or another about how humans should >> consume fingerprints. You could even do it with the current V4 >> fingerprints: just as my key fingerprint is >> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct= >> as 716901811312187285520504099705403090347495794016 in decimal. The b= ig >> problem I see here is that's it's an awfully long number to type into = a >> mobile keypad. >=20 > How often does anyone type in a fingerprint at all? My impression of > the typical workflow is: >=20 >=20 > * read fingerprint from physical media (business card, scrap of paper,= etc) >=20 > * search for a key from the public keyservers (usually by User ID). >=20 > * scan list of results for a key with a matching keyid (truncated > fingerprint) >=20 > * fetch selected key from keyserver >=20 > * view/double-check fingerprint of fetched key againt physical media >=20 > In this workflow, the only typing done is to enter the user id to searc= h > for (and even that is not always needed on a mobile device, because the= > person searched for is may already be in the address book for other > contacts). if the fingerprint is entered, it's often only the truncate= d > keyid, which is guaranteed to be much smaller than the fpr in any case.= >=20 > Making this change to the fingerprint presentation seems huge: are > people expected to change all their business cards, .sigs, web sites, > etc. to show both styles of fingerprint? or to completely transition t= o > the new style? in terms of truncated fingerprints (keyids), how are we= > to distinguish between the ones which currently have only digits 0-9 in= > hex and decimal-style fingerprints? This seems like a very costly > tradeoff for the sake of thumbing in 8 decimal characters instead of 8 > hex digits. >=20 > --dkg >=20 --------------enigC704609DD70F977B4CBDADD5 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/2YEACgkQoeH/BzqmYjhMqgCdGkyMIaZiWDsVXO3zwgaOwRbX bpIAmgMAa48AYJM0yAeODejfeezxegtw =boiH -----END PGP SIGNATURE----- --------------enigC704609DD70F977B4CBDADD5-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456EH9E008283 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456EHQM008282; Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456E5ac008275 for ; Mon, 4 May 2009 23:14:16 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4968431A8C0; Tue, 5 May 2009 08:14:04 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 234EC598099; Tue, 5 May 2009 08:14:04 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id CYSw8j1xOjfC; Tue, 5 May 2009 08:14:03 +0200 (CEST) Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id CD7E7598091; Tue, 5 May 2009 08:14:03 +0200 (CEST) Message-ID: <49FFD926.20802@epointsystem.org> Date: Tue, 05 May 2009 08:13:58 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF756CAA244F068AD36E04778" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigF756CAA244F068AD36E04778 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hi, David Shaw wrote: > It's a larger problem than just fingerprints. We also use a fingerprin= t > as a specifier inside the revocation key subpacket, to designate which > key can be used to issue revocations on our behalf. The thing is, > though, a fingerprint isn't really a very good revocation key specifier= : >=20 > Fingerprints: > * Must be human-readable > * Needs to be small to be useful > * Can collide to some small amount (4880 even documents that they > collide in section 12.2) That's not the fingerprint. That's the key ID. > Revocation key specifier: > * Does not need to be human-readable > * Has much looser size requirements (shouldn't be enormous, but > certainly can be bigger than 160 bits without hurting anything) > * Should never collide (we don't want the wrong key being able to revok= e > our key) In case of collision, both colliding pre-images are done by the same enti= ty. > Perhaps we'd do better by leaving fingerprints alone and instead fixing= > how we specify revocation keys? There is nothing wrong with them at present. Well, actually, I would argue that revocation is currently over-designed.= Since revocation is an irreversible act, there is no need for the heavy artille= ry of digital signatures for that purpose. All the s2k specifiers used for symm= etric encryption would do (in a hashed sub-packet together with the resulting symmetric key) and inserting a non-hashed sub-packet with a matching revo= cation passphrase into the revoked signature would be just as secure a method fo= r revocation than adding a revocation signature packet. There is no need for asymmetric crypto for revocation. Instead of revocat= ion signatures, it would be perfectly safe to use revocation passphrases. > We could try to come up with a new non-colliding way to disambiguate > keys, but fundamentally, anything that is smaller than the key packet > itself can still collide. Again, collisions are not important in this case. Collisions only matter = when the signed information is compiled by a different entity than the signer.= With a hash that is one-way but not collision resistant, you can do two k= eys that have the same fingerprint. So whay? Both are under your control, a signature with either is your signature. > So instead, why not define a new revocation > subpacket that contains the class octet from the old revocation key, an= d > the rest of the subpacket is simply a copy of the public key packet in > question? It costs more and does not provide any extra security. I mean there is no= attack that can be prevented in this way. Therefore, it is less secure. > I don't mean the whole transferable public key, of course, > just the contents of packet #6. This public key packet doesn't need an= y > self-signatures or anything else like that, as it is implicitly > authenticated by the signature that carries the revocation key subpacke= t. It still makes the key fatter without making any attack more difficult. I= t won't make illegitimate revocation more difficult. --=20 Daniel --------------enigF756CAA244F068AD36E04778 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/2SoACgkQoeH/BzqmYjhn+ACfXrHUxacK1Yon5Iwf32CPRY01 TuoAoJIBIlvrFmqoHGhEaIJUMScF93cu =lxIl -----END PGP SIGNATURE----- --------------enigF756CAA244F068AD36E04778-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4544dZA001088 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4544dBG001087; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4544cMQ001081 for ; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 2495 invoked from network); 5 May 2009 04:04:37 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 04:04:37 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FFBB0B.9070209@fifthhorseman.net> Date: Tue, 05 May 2009 00:05:31 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: how to specify "trust no signatures over hash X from this key"? X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig6B3E60808F65218637960D5B" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig6B3E60808F65218637960D5B Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable As i'm thinking about hash function transitions right now, it occurs to me that i'm not sure how to specify something like "The holder of this key will never issue signatures using digest algorithm $foo" In RFC 4880, section 5.2.3.8 the digest algorithm preferences subpacket says something similar: Message digest algorithm numbers that indicate which algorithms the key holder prefers to receive. Like the preferred symmetric algorithms, the list is ordered. Algorithm numbers are in Section 9. This is only found on a self-signature. But this is semantically something fairly different from stating what kind of use the keyholder expects to pursue. Consider the case where a user has in the past made and published MD5-based signatures, and no longer believes that hash algorithm is secure for the purposes used (or if you like, think into the near future, and imagine the same situation with SHA1). It seems to me that it would be useful to have a way that a keyholder could explicitly state "I no longer make signatures over digest X. Please consider any signatures from this key using digest X to be invalid= =2E" This does lead to the possibility of an explicit "impedance mismatch", where Alice says "I never issue MD5, SHA1, or RIPEMD160 digests" and Bob says "I prefer to receive only SHA1, RIPEMD160, or MD5 digests" -- in this case, Alice's key is useless to Bob. But this impedance mismatch exists implicitly anyway, if these are the actual policies. It seems like it would be useful to know that the conflict exists at that level. Note: *could* a user say "i never issue SHA1 signatures" and remain 4880-compliant? I think so; the spec says that implementations MUST implement SHA1, but it does not say that they must force the user to use it or trust it. Is there interest in being able to explicitly state such a policy? Would this be worth a new subpacket type? If so, would it make sense for ciphers as well as digests? --dkg --------------enig6B3E60808F65218637960D5B Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+7EMzS7ZTSFznpAQoCJw//QUtCuQnxqrr7uxVqdbi7m9mi3+x9kGwF viuS4Oujpa64RlU0by6nOEA5Cea7SVchrU+GKFhbytvfDQup+kNGIVuMJaNy6bSC e1C3YpXw+kiEwp45Y2214Pzv71MGsbyCOUkXgAroMS8nW0u9zOmgXiEhxYnEAWQJ lFSEBpyBEQMol8nenw95QgnVPI8bztS6S1BJDGo92u3NqehUfnhxheMR+iOd0L5i /rXN8RXOPHzwaob/f15gYNm7B/JJxiXYaMogmKP00FFcNxDh4WFkEYgV0mtMuj0P RewzNZlEBOVP5edZfOzvVRGr/ApVuZJ5C4SeQOa0ZdHypVZyM3djKtiMxyDj1YpS 5AhnpCGEWUOStnphuOtfJtWzDKV9aCc/hvr6r6KBO3xdzKsIJTk+c/LGrp2C3WvZ HbHf5EFuFhNZE8vMGp02ViXrEtWwqgfOATiLK+aNtgmDl8znpRrhq53k2u/Qcq5d Qz64HixsC/UT8CKwVl8ymrRG0juA59L6zHWlJfCiTajHM0SpxWoknIA4mDpC+RwU PujiiRmjTNDVREVM5iQmRm0S0cKzkNku59pUeEYhBJSJ26SpntGf+2xIo4dnwiYU eSeMr4Uh+mPlPzK578KHa9y1zPD8ifp9+zQFWCS55jTqJZrFGheHmB0VAgsnMCId PPHdK7f/6W8= =pCgL -----END PGP SIGNATURE----- --------------enig6B3E60808F65218637960D5B-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532uJZ098147 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 20:02:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4532uMq098146; Mon, 4 May 2009 20:02:56 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailhost.auckland.ac.nz (curly.its.auckland.ac.nz [130.216.12.33]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532jVV098136 for ; Mon, 4 May 2009 20:02:55 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz) Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id CEE3F9FE85; Tue, 5 May 2009 15:02:44 +1200 (NZST) X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (curly.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWjt9zissPYP; Tue, 5 May 2009 15:02:44 +1200 (NZST) Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 582829FB6F; Tue, 5 May 2009 15:02:42 +1200 (NZST) Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id A88031DE4001; Tue, 5 May 2009 15:02:36 +1200 (NZST) Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from ) id 1M1AvU-0002Fn-HI; Tue, 05 May 2009 15:02:36 +1200 From: Peter Gutmann To: dshaw@jabberwocky.com, jon@callas.org Subject: Re: Changing GPG's default key type Cc: ietf-openpgp@imc.org In-Reply-To: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org> Message-Id: Date: Tue, 05 May 2009 15:02:36 +1200 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Jon Callas writes: >Many X.509 systems are like this too -- DSA is the mandatory-to-implement, >but it's not clear that anyone has ever created a DSA certificate outside of >interop testing. Actually even the pretense of that one was dropped a long time ago, no-one apart from the people drafting the standards (and I'm not even sure about them) was ever under any illusion that the de facto standard was anything other than RSA (the PKIX spec still contains DSA signing certs because they were created by NIST more than a decade ago, not because they reflect current practice). People didn't even pretend to do the encryption-algorithm side of things, X9.42 DH, the only implementation I know of that bothered with this was the SFL reference implementation, which didn't have any choice in the matter [0]. Microsoft implemented it as a read-only (i.e. decrypt-only) option specifically to avoid accusations that they didn't comply with the standard, but that was about all. The last time I checked the specs still fudged the matter by saying that you MUST support one of the following shopping-list (including things like MD2 and X9.42), but most implementers know how to interpret this, MUST RSA, WHO-CARES anything else. Peter. [0] So everyone claimed standards compliance without being compliant secure in the knowledge that since no-one else was either, this could never be checked. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452mMwP097152 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452mMCA097151; Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452mL4J097145 for ; Mon, 4 May 2009 19:48:21 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 90678 invoked from network); 5 May 2009 02:48:20 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:48:20 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FFA92E.50100@fifthhorseman.net> Date: Mon, 04 May 2009 22:49:18 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig107BF823AF3E617747B108F1" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig107BF823AF3E617747B108F1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 08:17 PM, David Shaw wrote: > Perhaps we'd do better by leaving fingerprints alone and instead fixing= > how we specify revocation keys?=20 [...] > why not define a new revocation > subpacket that contains the class octet from the old revocation key, an= d > the rest of the subpacket is simply a copy of the public key packet in > question? I don't mean the whole transferable public key, of course, > just the contents of packet #6. This seems like a good strategy to me, and a *much* simpler one than trying to overhaul fingerprints! In fact, this seems like a good idea whether or not fingerprints are overhauled. Are there any objections in the WG to this re-definition of revocation key subpackets? the largest realistic keys out there right now are still only around 1KB of a subpacket, and revocation key subpackets themselves are pretty rare. So the added size doesn't seem problematic to me. --dkg --------------enig107BF823AF3E617747B108F1 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+pL8zS7ZTSFznpAQoOgQ//aOTc+ap0k3JTCDr+U4ktsFB48PIpIswt YQ6rTV//FOcTzTC9xpf2dB44D83QaC7IN77TLZq4Hu+PWlRsbZ67DRQJ0OBmxKKe i1ytF2O8M6N4EYWqgZwXFUnkybzaGISKNAFTm0N3f7C8bz79JLOWedWYuUmqCwfD AVazdFgbbWaIh+lyTxMl5sKBvkBK3fwFRN1RAZQhF68HEC2sq4aP6t7M3jwfmDUv sJzYerP5pAaWQi7AbO6dXynRMh16lRfGMpBTNlv2Rx3RX51Ll2rquOFVm/4CdrUV McTqH6sESIjTNvtUYs/d3cpXGG1jyXYE/5x+LBP0ovGVgNopA9ZM+DK1ChrzMK4L K6CxsWqXUzqIXaIPZNns7L9PqzMjziE/W6FyDE1MI8RJBLRm7+tXeLessAp3Z7M7 0J8J/eB5pU3eVkiHgpMJ+SjvLssRs4l6xvef9VAblm+ji7YvcECYMp8+OefE6zwy CiwALwg2Yi/KD4H+tdivXt4P1Qzn8FaevWTd5/b6Sq5Ryoztp03E0HyR1WLlr+Cr hnKhZvpQAuA7aw7MsM/GqPyhuGyBZ4ZvpCz9uDzOAc510TDPsY6qJsS1/OAIYVo8 ABiQL8Db5wJEa8pfi79kgOnaAhJUZh0cRxLBZskfYp4qoXITevTxyfSr1OFHEN9h TYy+v5KqJa0= =7grO -----END PGP SIGNATURE----- --------------enig107BF823AF3E617747B108F1-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452klZ3097054 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452klUQ097053; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailhost.auckland.ac.nz (larry.its.auckland.ac.nz [130.216.12.34]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kVYg097007 for ; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz) Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 2EAF61A9A8 for ; Tue, 5 May 2009 14:46:31 +1200 (NZST) X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (larry.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UDz6NGCu2qBW for ; Tue, 5 May 2009 14:46:31 +1200 (NZST) Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 125091A9A2 for ; Tue, 5 May 2009 14:46:30 +1200 (NZST) Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id 150651BE4001 for ; Tue, 5 May 2009 14:46:30 +1200 (NZST) Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from ) id 1M1Aft-0001ZO-TZ for ietf-openpgp@imc.org; Tue, 05 May 2009 14:46:29 +1200 From: Peter Gutmann To: ietf-openpgp@imc.org Subject: Re: New results against SHA-1 In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net> Message-Id: Date: Tue, 05 May 2009 14:46:29 +1200 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Daniel Kahn Gillmor writes: >What do other folks think? Given that the MDC is a hash of plaintext that's then encrypted, and the hash value is itself encrypted, I'm not losing any sleep over it. The hash attacks so far have required bit-for-bit carefully-chosen plaintext with known hash values, not unknown (or even partially-known) plaintext with an unknown hash value. Peter. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kfLt097036 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452kfEK097035; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452keiu097028 for ; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 90422 invoked from network); 5 May 2009 02:46:38 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:46:38 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FFA8C0.70306@fifthhorseman.net> Date: Mon, 04 May 2009 22:47:28 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-Reply-To: <49FF6677.7070907@epointsystem.org> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigE9C3B898F6A8B9A72D08A57A" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigE9C3B898F6A8B9A72D08A57A Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 06:04 PM, Daniel A. Nagy wrote: > For fingerprints, MDC and self-signatures, collision-resistance does no= t matter, > only the one-way property. So I think it is totally safe to postpone di= scussion > until SHA3 is selected. The more that i consider this, the more important it seems. Thank you for emphasizing it, Daniel. If i understand you correctly, your point is that fingerprints and self-signatures use hashes over data that is provided entirely by the signer, covering nothing that is supplied by an outside party. Since "birthday" attacks rely on the attacker generating an arbitrary collision, providing one side of it for signing by the victim, and then transferring the signature onto the other side of the discovered collision, they do not work against material under full control of the signer (like fingerprints and self-sigs). Even if the recent claims of O(2^52) (instead of the theoretically-optimal 2^80) operations to generate a colliding pair were to scale proportionally to attacks against the one-wayness of SHA-1, that would mean O(2^104) (instead of 2^160) operations to find a message that hashes to a given value. i have no idea if these sort of results can actually scale this way, but i imagine we'd hear a much larger hullabaloo if someone had announced an attack against the one-wayness of SHA-1 with less than O(2^104) operations. Anyway, since 2^104 is still outside the capabilities of well-funded organizations, we have breathing room on these parts of the specification that only rely on collision-resistance. Did i get anything wrong above? I apologize if this is elementary for everyone else, i'm just trying to make sure i understand the ideas involv= ed. --dkg --------------enigE9C3B898F6A8B9A72D08A57A Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+oxczS7ZTSFznpAQr7+RAAoNZqPFaaLFm4/qGyoo/YzQfVi9Vi97JW Mw7JM1XeGm+F2stc1yG8mqBxXr34/0J1wAdI4BLcF6HLnWyI6xZP14YgPb/f1YOe JvseA55NEdS1SC6HXz5uoVdv74sxbyTuLXE69+AzS+mT4bKwU62eVNhrYLgG/zBS 2VWLB/gsOQnWdaQPzh3wX7MU3fYMkZL7O1u1Ixnsfw72kmhQz6sNwlfBQolqL8Bd VCZJztGXUn7KYXy8Q+ndfzPul/GLaUzcIg6CKnlSsb8/YRKffABRowa7zbkRT3Cd E2/ges0hmtMOmvYe7/4v9Vtl/MxuUBMPV4D7TvjATJsDHdM84DVi30wpzTEWLkdK 2spzRXUScXbOpAq9g4/+idgCQ2/AOr4VduHEYw+mIGdue2aB3ubNFFhxkNM12iX3 vbUT1uAmfkLgyGfQIUSK36EJLy45hSKkBhqlWzr8L3Byu3Tb65/17PVvS1uyEI4b cy7iLvJGuHW057xxkMvk1cEEYIYz7hn1XpHGd+XxZQyOBkjR78c0Qfmf0dvCv9HS /3lfUThuIJohDK7AkCKPZRDh1NfdKO24WF31kM7yWsKSufP5GzOSEYMVsqZllQ+9 h5ORvZtSdV9u/prCA67CcSRuHauHhKCZHZFHx9iZimhuJyTBzy3FhW8FIPMfQRtT bMgvtN6iLtg= =5ffQ -----END PGP SIGNATURE----- --------------enigE9C3B898F6A8B9A72D08A57A-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n451Lkkd092530 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n451LkLD092529; Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n451LYAX092518 for ; Mon, 4 May 2009 18:21:45 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 76223 invoked from network); 5 May 2009 01:21:34 -0000 Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 01:21:34 -0000 X-pair-Authenticated: 216.254.116.241 Message-ID: <49FF94D4.3030101@fifthhorseman.net> Date: Mon, 04 May 2009 21:22:28 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: decimal fingerprints [was: Re: Non-SHA-1 fingerprints] References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> In-Reply-To: X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigBCCF34F563DA425E7D624803" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enigBCCF34F563DA425E7D624803 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 08:17 PM, David Shaw wrote: >=20 > On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: >=20 >> Also, since mobile phones typically have a numeric keypad, it would be= >> nice if >> fingerprints and key IDs were numeric-only. It is an increasingly >> important >> platform for OpenPGP, I believe. >=20 > I think that is a good point and a great idea, but the only reason that= > fingerprints and key IDs are printed in hex now is tradition. There is= > nothing in the standard one way or another about how humans should > consume fingerprints. You could even do it with the current V4 > fingerprints: just as my key fingerprint is > 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct > as 716901811312187285520504099705403090347495794016 in decimal. The bi= g > problem I see here is that's it's an awfully long number to type into a= > mobile keypad. How often does anyone type in a fingerprint at all? My impression of the typical workflow is: * read fingerprint from physical media (business card, scrap of paper, e= tc) * search for a key from the public keyservers (usually by User ID). * scan list of results for a key with a matching keyid (truncated fingerprint) * fetch selected key from keyserver * view/double-check fingerprint of fetched key againt physical media In this workflow, the only typing done is to enter the user id to search for (and even that is not always needed on a mobile device, because the person searched for is may already be in the address book for other contacts). if the fingerprint is entered, it's often only the truncated keyid, which is guaranteed to be much smaller than the fpr in any case. Making this change to the fingerprint presentation seems huge: are people expected to change all their business cards, .sigs, web sites, etc. to show both styles of fingerprint? or to completely transition to the new style? in terms of truncated fingerprints (keyids), how are we to distinguish between the ones which currently have only digits 0-9 in hex and decimal-style fingerprints? This seems like a very costly tradeoff for the sake of thumbing in 8 decimal characters instead of 8 hex digits. --dkg --------------enigBCCF34F563DA425E7D624803 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf+U2czS7ZTSFznpAQpf6g/9Eb8tc0/ShQHeFvOaKhdKSJRLEKGjMLTn XgmTP5SQ8ZclCFs8OQlVVYCHOjYdFxet5joJ6G7e1gQzcGnLpkSjN55/mxrKSRtc f0FlBO9jff/CsBTDRL7YG7RiqR7C89AjitDezHjLT2dCeHRJVxA6uOYLuVrs5b97 pM0u66ujHy4+UtYfqalt760eRUX6q7ZzSAxGdQwjxkn4wZo4cWXWEG2AOWwKrD3V y2MSDQya02w904TaBLrxHYB1eCHod0ZnX+wMpRCbym+tyko9J/hPiKd5SuR9rf8o eRRbsV/thYV34+gV7EABvpO95xuU66ABUGm9GuqKZ5GvA31D3W7cDWnH6CVvUK1D Ct5cASq0EUqZivS+C1CgPY6Q7UYvo9KAIQ0RAWIjUNeMkGA4rmMvv7IYVZAK9YcA YOXX6dkwEKoL3YK26OVztr45Pwra75XXIZA00Su93yrjTml6kA/r7bDgmwbb32G0 vie1IJ+8dPimTIEaXUkqiSoFjGELK1ArBV8T1CPrDIq8LZYVtQGFIsZ5BgDfHdit tnE2d7llw+zS9FQW9jD0AhkRCXlTB8/jvjJee+MrytgMLjeAzKisbEnuNfmcqs/+ Jb0zKa3QMDuBYZ2RgimrkVnkbjF88UjXGCMFKTzaAZAB0YANXksZVLFuQJd4Nuk3 3mfHEc2qYho= =rSZr -----END PGP SIGNATURE----- --------------enigBCCF34F563DA425E7D624803-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDHp089058 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HD1N089056; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HBwW089041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9X0025116; Mon, 4 May 2009 20:17:10 -0400 Cc: IETF OpenPGP Working Group Message-Id: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> From: David Shaw To: "Daniel A. Nagy" In-Reply-To: <49FF6677.7070907@epointsystem.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints) Date: Mon, 4 May 2009 20:17:10 -0400 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> X-Mailer: Apple Mail (2.930.3) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: > David Shaw wrote: >> >> Now that I think about the variable-hash fingerprint question a >> bit, I'm >> concerned about things like RFC-4398, which uses OpenPGP >> fingerprints in >> DNS. > > For fingerprints, MDC and self-signatures, collision-resistance does > not matter, > only the one-way property. So I think it is totally safe to postpone > discussion > until SHA3 is selected. It's a larger problem than just fingerprints. We also use a fingerprint as a specifier inside the revocation key subpacket, to designate which key can be used to issue revocations on our behalf. The thing is, though, a fingerprint isn't really a very good revocation key specifier: Fingerprints: * Must be human-readable * Needs to be small to be useful * Can collide to some small amount (4880 even documents that they collide in section 12.2) Revocation key specifier: * Does not need to be human-readable * Has much looser size requirements (shouldn't be enormous, but certainly can be bigger than 160 bits without hurting anything) * Should never collide (we don't want the wrong key being able to revoke our key) Perhaps we'd do better by leaving fingerprints alone and instead fixing how we specify revocation keys? We could try to come up with a new non-colliding way to disambiguate keys, but fundamentally, anything that is smaller than the key packet itself can still collide. So instead, why not define a new revocation subpacket that contains the class octet from the old revocation key, and the rest of the subpacket is simply a copy of the public key packet in question? I don't mean the whole transferable public key, of course, just the contents of packet #6. This public key packet doesn't need any self-signatures or anything else like that, as it is implicitly authenticated by the signature that carries the revocation key subpacket. David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDi1089057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HDcE089055; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HB8s089038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9Wx025116; Mon, 4 May 2009 20:17:09 -0400 Cc: IETF OpenPGP Working Group Message-Id: From: David Shaw To: "Daniel A. Nagy" In-Reply-To: <49FF6677.7070907@epointsystem.org> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Non-SHA-1 fingerprints Date: Mon, 4 May 2009 20:17:09 -0400 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> X-Mailer: Apple Mail (2.930.3) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote: > Also, since mobile phones typically have a numeric keypad, it would > be nice if > fingerprints and key IDs were numeric-only. It is an increasingly > important > platform for OpenPGP, I believe. I think that is a good point and a great idea, but the only reason that fingerprints and key IDs are printed in hex now is tradition. There is nothing in the standard one way or another about how humans should consume fingerprints. You could even do it with the current V4 fingerprints: just as my key fingerprint is 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct as 716901811312187285520504099705403090347495794016 in decimal. The big problem I see here is that's it's an awfully long number to type into a mobile keypad. (Well, that, and persuading the various implementations to support the decimal format in addition to the traditional hex). David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWxab086472 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NWxei086471; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWw9I086465 for ; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 5E9EA2E659 for ; Mon, 4 May 2009 16:33:51 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-05 for ; Mon, 4 May 2009 16:33:46 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 990162E3CA for ; Mon, 4 May 2009 16:33:46 -0700 (PDT) Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:32:53 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:32:53 -0700 Cc: IETF OpenPGP Working Group Message-Id: From: Jon Callas To: David Shaw In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Non-SHA-1 fingerprints Date: Mon, 4 May 2009 16:32:52 -0700 References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At the last IETF meeting, Derek discussed new drafts (particularly this one) with Tim Polk, and either Derek can shepherd it, or we can find someone else. I sent Derek a sketch of what I propose. Note that it's pretty much what's been discussed here, but I used a colon (which is what I remember in the original proposal) rather than a dot. > From: "Jon Callas" > Date: April 1, 2009 3:43:08 AM PDT > To: "Derek Atkins" > Cc: "Jon Callas" > Subject: Re: OpenPGP Extensions Doc(s) > > * PGP Signed: 04/01/2009 at 07:37:45 AM, Decrypted > ... > > Here's what I propose: > > We define a new fingerprint. > > Basics > ------ > > The fingerprint is a struct, consisting of: > > Hash Alogrithm Type (1 Octet) > Hash Value (N Octets) > > The hash is computed over the same fields of the key packet, just as > in RFC4880, just with a different hash function than SHA1. > > Truncations > ----------- > > The Hash Value may be of any size equal to or less than the natural > size of the hash function. If it is a truncation, then it is the > high-order bits. Thus, the SHA1 hash "ED15 5BDF CD41 ADFC 00F3 28B6 > 52BF 5A46 BC98 E63D" truncated to 64 bits is "ED15 5BDF CD41 ADFC". > > There are a number of reasons truncating a fingerprint. One is for > ease in transport, display, etc. In the past, we moved from 16-byte > fingerprints to 20-byte fingerprints. While a larger fingerprint may > have increased cryptographic use, human beings still sometimes use > them > > Display > ------- > > The normal display of a fingerprint is: > > : > > White space may be added for readability. > > Example: > > 2:ED15 5BDF CD41 ADFC 00F3 28B6 52BF 5A46 BC98 E63D > > Other formats are possible, but they should remember to show the > algorithm either numberically or symbolically. Note that RFC 4880 > defines ASCII display strings for all algorithms. > > Fingerprint Preference > ----------- ---------- > This is a new preference subpacket that is a single byte of the hash > algorithm preferred fingerprint type. Not only can this be used by > an implementation for display, but an implementation SHOULD use this > algorithm for determining a key id when encrypting to that key. > > If this preference is not present, the implementation SHOULD use old- > style SHA1 fingerprints. > > Key IDs > --- --- > > OpenPGP already has one natural truncation of the fingerprint, the > Key ID. Under this proposal, a Key ID is a 64-bit truncation of the > Hash Value of a fingerprint. An example is given above. > > Note that for SHA1, this means that there are two possible Key IDs, > the old one and a new one. RFC 4880 (and 2440 before it) already > said that an implementation must recognize that there could be > collisions in Key IDs. An implementation SHOULD use the old-style > one unless there is a preference specifying SHA1. > > Other places to look at > ----- ------ -- ---- -- > > We need to look at updating (or handwaving) 5.2.3.15. Revocation Key. > > What do you think? > > Jon > > > -- > Jon Callas > CTO, CSO > PGP Corporation Tel: +1 (650) 319-9016 > 200 Jefferson Drive Fax: +1 (650) 319-9001 > Menlo Park, CA 94025 PGP: ed15 5bdf cd41 adfc 00f3 > USA 28b6 52bf 5a46 bc98 e63d > > > > > * Jon Callas > * 0xBC98E63D(L) > -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFJ/3slsTedWZOD3gYRAlWTAJ9C2q5AAqUNMLMbsNlz/teDfMaT+ACfYm4U iGyxP9l5DBF+7yAfwR83uu0= =SV8T -----END PGP SIGNATURE----- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQPQJ086141 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NQP5k086140; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQEjb086130 for ; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from jon@callas.org) Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id CE5732E215 for ; Mon, 4 May 2009 16:27:06 -0700 (PDT) Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-02 for ; Mon, 4 May 2009 16:27:02 -0700 (PDT) Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 3FB282E5B8 for ; Mon, 4 May 2009 16:27:02 -0700 (PDT) Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:26:09 -0700 X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:26:09 -0700 Cc: IETF OpenPGP Working Group Message-Id: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org> From: Jon Callas To: David Shaw In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> Mime-Version: 1.0 (Apple Message framework v930.3) Subject: Re: Changing GPG's default key type Date: Mon, 4 May 2009 16:26:07 -0700 References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> X-Mailer: Apple Mail (2.930.3) X-PGP-Encoding-Format: Partitioned X-PGP-Encoding-Version: 2.0.2 X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7BIT X-Virus-Scanned: Maia Mailguard Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > > > One issue, of course, is that RSA is not a required key type in > OpenPGP, so there could be some implementation out there that won't > be able to handle it. I'm not terribly concerned about this, as in > practice, the vast majority of code has handled RSA just fine for > the past decade, and if a particular user needs to generate a non- > RSA key, they can still do so. > There are a few other details (RSA signatures are physically larger, > etc), but I believe they are outweighed by the benefit of the larger > key and additional hash flexibility. PGP does precisely this now. The default you'll get when creating a new key is RSA 2048. I'll invoke Jeff Schiller in this as well. The DSA/Elgamal keys are mandatory to implement. Mandatory to implement does not mean mandatory to use. It would be perfectly reasonable to make an RSA-only system that merely didn't hork up a hairball when it found a DSA key. Many X.509 systems are like this too -- DSA is the mandatory-to- implement, but it's not clear that anyone has ever created a DSA certificate outside of interop testing. I'm sure someone can find some example that proves me literally wrong on that, but figuratively right. These days, I see the effective -- ummm, I'm looking for the right word, I don't want to say "deprecate" -- minimization of integer discrete log. The world is pretty much integer RSA, and moving to elliptic curve discrete log. Jon -----BEGIN PGP SIGNATURE----- Version: PGP Universal 2.6.3 Charset: US-ASCII wj8DBQFJ/3mRsTedWZOD3gYRAvnSAJ930wrrwBfdtMQR7u45vOXhP1nCqQCcCUSb mmQtr8tYoSe5XMK6ya3Jg5Q= =JpoU -----END PGP SIGNATURE----- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJKuH082315 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44MJK3l082314; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJ97m082294 for ; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:41870) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M16V9-0003rE-CR (Exim 4.69) (return-path ); Mon, 04 May 2009 23:19:07 +0100 Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 52A5E5D65; Mon, 4 May 2009 23:19:04 +0100 (GMT/BST) Message-ID: <49FF69D9.7070206@systemics.com> Date: Tue, 05 May 2009 00:19:05 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: David Shaw Cc: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 4/5/09 23:35, David Shaw wrote: > This does, of course, presume that all of our hashes for OpenPGP in the > future will generate an even number of bytes. I like the idea. But, I'm the one who favours aphorisms such as "there is only one mode, and it is secure." Or, perhaps, "There is one cipher suite, and it is numbered Number 1." So I would be looking for SHA3 as the one and only thing that ever hashes the publics, and bugger the rest. Algorithm agility is for the birds. We would just need to agree how many even bytes to allocate to the SHA3 for the next 4 decades. iang Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9bBd081710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M9bGE081709; Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9ZFJ081702 for ; Mon, 4 May 2009 15:09:36 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 40FCB31A58B for ; Tue, 5 May 2009 00:09:35 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 1A884598099 for ; Tue, 5 May 2009 00:09:35 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id NW5dxk15LoHW for ; Tue, 5 May 2009 00:09:34 +0200 (CEST) Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D15D7598091 for ; Tue, 5 May 2009 00:09:34 +0200 (CEST) Message-ID: <49FF679E.1090400@epointsystem.org> Date: Tue, 05 May 2009 00:09:34 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net> In-Reply-To: <49FF325A.80106@fifthhorseman.net> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig61BC0E22A9B40C8F1917A17F" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig61BC0E22A9B40C8F1917A17F Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable > Ugh. that's horrifically long either way. Is a base64 encoding worth > considering? it would shave off a third of the length, but it seems > like it would introduce significant ambiguity (0 vs O, A vs a, etc) I would go the other way. Since collision-resistance is not an issue with= fingerprints, 128 bits are perfectly adequate for 2048-bit keys (i.e. bre= aking the key and making a new key matching the fingerprint require about the s= ame amount of work). Also, keeping mobile phones in mind, I would suggest usi= ng 40 decimal digits. This way, the total length of fingerprints remain the sam= e (40 characters), but typing them in on a decimal keypad would be much faster = than currently. --=20 Daniel --------------enig61BC0E22A9B40C8F1917A17F Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/Z54ACgkQoeH/BzqmYjhxbgCgjDKZk2nfRWSZojAa9qklaeZR rQwAn2XGQCI0Q8Z2ckSWMHITtpd7mU4s =2qFS -----END PGP SIGNATURE----- --------------enig61BC0E22A9B40C8F1917A17F-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4rdl081493 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M4rhT081492; Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4fpv081481 for ; Mon, 4 May 2009 15:04:52 -0700 (MST) (envelope-from nagydani@epointsystem.org) Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8F77C31A571; Tue, 5 May 2009 00:04:40 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 112B8598099; Tue, 5 May 2009 00:04:40 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail.agileight.com Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id xcNlf78UM7xl; Tue, 5 May 2009 00:04:39 +0200 (CEST) Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id C9A52598091; Tue, 5 May 2009 00:04:39 +0200 (CEST) Message-ID: <49FF6677.7070907@epointsystem.org> Date: Tue, 05 May 2009 00:04:39 +0200 From: "Daniel A. Nagy" User-Agent: Thunderbird 2.0.0.21 (X11/20090318) MIME-Version: 1.0 To: David Shaw CC: IETF OpenPGP Working Group Subject: Re: Non-SHA-1 fingerprints References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> X-Enigmail-Version: 0.95.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig3A44C71DF68C61ECC525EF57" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig3A44C71DF68C61ECC525EF57 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable David Shaw wrote: >=20 > Now that I think about the variable-hash fingerprint question a bit, I'= m > concerned about things like RFC-4398, which uses OpenPGP fingerprints i= n > DNS.=20 For fingerprints, MDC and self-signatures, collision-resistance does not = matter, only the one-way property. So I think it is totally safe to postpone disc= ussion until SHA3 is selected. Reviewing the fingerprint is a MAJOR issue, as (parts of) fingerprints ar= e used as lookup keys in the PKS database. Here are some points: I believe that a fingerprint that is longer than 160 bits is pointless; e= ven 160 bits is an overkill causing inconvenience with no tangible benefit in ter= ms of security over a 128 bit fingerprint. What does cause some problems, is the fact that the creation date (32 bit= s) is included in the fingerprint. It makes sevaral attacks substantially easie= r than if the fingerprint was calculated only over the key material and key attr= ibutes (such as key type). Basically, it should be impossible for the same key t= o have different fingerprints. Also, since mobile phones typically have a numeric keypad, it would be ni= ce if fingerprints and key IDs were numeric-only. It is an increasingly importa= nt platform for OpenPGP, I believe. --=20 Daniel --------------enig3A44C71DF68C61ECC525EF57 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEAREIAAYFAkn/ZncACgkQoeH/BzqmYjhfeACfRnMUEXiw7+Y1Yvnp8TYGchbh 2U8AoKbcP+V3g8YXf+hJlsWbgdJyQe9z =ce8+ -----END PGP SIGNATURE----- --------------enig3A44C71DF68C61ECC525EF57-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpwX1080695 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Lpw7L080694; Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpuKV080687 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 14:51:57 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Lpt82023932 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 17:51:56 -0400 Message-Id: <0F0DEA3C-A1B9-4F24-8F1E-9B8649F2464C@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group In-Reply-To: <49FF325A.80106@fifthhorseman.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: New results against SHA-1 Date: Mon, 4 May 2009 17:51:55 -0400 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 2:22 PM, Daniel Kahn Gillmor wrote: > On 05/04/2009 01:38 PM, Werner Koch wrote: >> Using a number (2) and, say, a dot as a prefix would be a better >> choice. >> We use algorithnm numbers anyway and OpenPGP users are used tp >> spell a >> large row of hex digits; we would only confuse them with an S and >> an H.. > > ok, that works for me. would the prefix be in hex or decimal? for > example, would an SHA512 fingerprint look like > a. > 3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff > > or > > 10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff > > Ugh. that's horrifically long either way. Is a base64 encoding worth > considering? it would shave off a third of the length, but it seems > like it would introduce significant ambiguity (0 vs O, A vs a, etc) I'm sure there is a study somewhere that says just how long of a string a human being can handle without getting lost, but even without such a study I can say that 512 bits is just too long for usability. If you think about it, the whole point of fingerprints is that they're a short way to refer to a key. If we make them too long, we're hurting the very thing that fingerprints were created for. "3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff " is not exactly the kind of thing someone could print on a business card or read to a corespondent over the phone. David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZDTV079793 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44LZDJW079792; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZ2Ja079782 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44LZ1Ho023777 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 17:35:01 -0400 Message-Id: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Non-SHA-1 fingerprints Date: Mon, 4 May 2009 17:35:01 -0400 X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Now that I think about the variable-hash fingerprint question a bit, I'm concerned about things like RFC-4398, which uses OpenPGP fingerprints in DNS. There is a fingerprint field there, and it is variable length, but it has no concept of hash algorithm. We'd have to define some standard way to write out a fingerprint in binary with the hash field incorporated. So given that, I am wondering why we need a delimiter between the hash specifier and the fingerprint data for the human-readable version at all? A written fingerprint is expected to be readable, but not interpretable by a human being anyway, and software doesn't care about the delimiter one way or another. So rather than 01.23456789ABCDEF.... or MD5-23456789ABCDEF... why not just 0123456789ABCDEF... ? We already have a concept of variable length fingerprints (V3 = 16 bytes, and V4 = 20 bytes), and this fits reasonably well alongside those two. The rule would be 16 bytes means it's V3, 20 bytes means it's V4, and an odd number of bytes means it's this new format. If you see an odd number of bytes, you pull off the leftmost byte, and that's the algorithm number. The rest of the bytes are the hash value. We can trivially transform a V4 fingerprint into this new format by sticking the value 2 in front of it. This does, of course, presume that all of our hashes for OpenPGP in the future will generate an even number of bytes. David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjrTX072189 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JjrnU072187; Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjpXp072177 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 12:45:52 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Jjok3022882 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 15:45:51 -0400 Message-Id: <4E07EDF9-3293-4210-9843-D366B68EED0B@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group In-Reply-To: <49FF40DD.5040300@fifthhorseman.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: New results against SHA-1 Date: Mon, 4 May 2009 15:45:50 -0400 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> <49FF40DD.5040300@fifthhorseman.net> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 3:24 PM, Daniel Kahn Gillmor wrote: > On 05/04/2009 02:57 PM, David Shaw wrote: >> we would have to play length checking games >> to guess if they meant hash 4 or 40. > > We're still going to have to do a little bit of length-checking games, > to distinguish between traditional SHA1 fingerprints and an > accidentally-truncated version of the newer (and presumably longer) > fingerprints. We can use the presence of the delimiter dot to tell the difference. If they've lost the dot, then, well, absent some special knowledge, we can't really tell the difference between a old-style fingerprint and a new-style fingerprint that is both accidentally truncated and missing its delimiter dot. I wouldn't even try. Note that the current OpenPGP does not attempt to tell the difference between a V3 fingerprint (32 printed digits) and a V4 fingerprint that just happened to lose 8 characters in a cut and paste error somewhere. That's the job of the client (if it chooses to take it on at all) more so than the job of the protocol. David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPdue070689 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JPdQF070688; Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mail-bw0-f222.google.com (mail-bw0-f222.google.com [209.85.218.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPRRM070676 for ; Mon, 4 May 2009 12:25:38 -0700 (MST) (envelope-from dacrick@gmail.com) Received: by bwz22 with SMTP id 22so4021195bwz.10 for ; Mon, 04 May 2009 12:25:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=CjQUsywfVRGnWO7w3luIJPeKdKuyqA3ISTRnQm/0um8=; b=C18BoKzQEZRk26m4vyNrFiNgw0YwGHtL7Deuqx7i3UZ7sokeDa2AfuHsjwtyV+UWHP i11XLWUbvL0WMVXaXMok8JZrfu38+nl7jfYbXsGWk1F2YGQv6MikLu28FG/yQwixkx0c kh7+3nP97Yk18qQw8LxDIYnm7+DAWtTY2ahsA= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=YCzt9UymiDnKbaU4GvKhxv0QTgy3Y0CCYPm1aLNQ1k6c50AX0X4m8QSFvFuZEkLMwA Jbomxn83XPiADUo9cPtu7KZnmH1bFnO+QJznfBmqnCt8yIfm0cJZkKlUD2T4AD7W4Ijl pUDSede9nusTDdeulqMqFly6T13/bP2QTRqII= MIME-Version: 1.0 Received: by 10.204.69.66 with SMTP id y2mr6072460bki.49.1241465126246; Mon, 04 May 2009 12:25:26 -0700 (PDT) In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net> References: <20090504183948.AA2D51A003A@smtp.hushmail.com> <49FF3EC2.7030504@fifthhorseman.net> Date: Mon, 4 May 2009 20:25:26 +0100 Message-ID: <117bad160905041225k1dc1c23fref21f17d6fa73064@mail.gmail.com> Subject: Re: New results against SHA-1 From: David Crick To: IETF OpenPGP Working Group Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, May 4, 2009 at 8:15 PM, Daniel Kahn Gillmor wrote: > On 05/04/2009 02:39 PM, vedaal@hush.com wrote: >> MDC's ? >> >> currently SHA-1 >> rfc-4880 p. 49 ff > > Ah, right. =A0Jon Callas' remarks about the MDC from back in January migh= t > be relevant: > > =A0http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html > > I think his point stands that the MDC only cares about the one-wayness > of the digest used in MDC -- there is no reliance on a > collision-resistance property. =A0So i'm not sure that this needs to > change in a new draft, particularly if it could make the discussion more > contentious. > > What do other folks think? I think we need to address it; we may as well, plus also during the IETF review of the draft of what would become 4880, we have to CONVINCE IETF that it was "OK" to use SHA-1 here (when there were already concerns about it). "SHA-1 baad, mm'ok?" :) Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JNGgX070552 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JNGES070551; Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JNFrb070537 for ; Mon, 4 May 2009 12:23:15 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 19140 invoked from network); 4 May 2009 19:23:14 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:23:14 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF40DD.5040300@fifthhorseman.net> Date: Mon, 04 May 2009 15:24:13 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> In-Reply-To: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3377F6EA6DEFE8F1B189E8C5" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig3377F6EA6DEFE8F1B189E8C5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 02:57 PM, David Shaw wrote: > we would have to play length checking games > to guess if they meant hash 4 or 40. We're still going to have to do a little bit of length-checking games, to distinguish between traditional SHA1 fingerprints and an accidentally-truncated version of the newer (and presumably longer) fingerprints. One of the reasons that i initially proposed prefixes like SHA256- is because they are so unambiguously *unlike* the traditional fingerprints that it is clear what to expect next. --dkg --------------enig3377F6EA6DEFE8F1B189E8C5 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf9A3szS7ZTSFznpAQqrTQ/5ASHx4M4jOukvhduteqhbHSYdrs7mxK5e FXwsiiFS6EZzng3hSfair5T6EHKaBHQkfCEnlI17fPluXM5jZgMT/owbmUlL3orU nAuff4/lKvnf/esrKfMRhb9igg8UHZXweW7lqT8hxL+GHIWF+NnqIlMjA91BpufL rczzbumid4Is3QTeFDceG/xJFZY9/Tx6jHw8H+pgpbTte2PShptti+e8m5SToCRK fQIhL404kv/XJFitIzw7OqoYQoigrh8e3nKxxjx2GjDnIClRNLKkB0tEH1h1CpP+ iRTJs/XrCWZosZbjkBJ8p0L/v6Qu+LpblZZfqmqfJGN281+cy4zm5qCpFFhuRs6m FI5ESmBPZ1+bteLij5v0zqYxu+qR0Fq5OjrHArvkloy4sP1oWjoNDuhDTFj2y8Vy yVACcYKKJ5+QQJZjaBvYyuDMigps5R2zCaPDEdQsQnPf70TgJnqVaAN85jpD2Agk J7+LgwuL5YJ9IXyK0OBXqdeQqvhLIQyLl8UP5HbcSio6NGAV/qnxTkzgoi456j2k eIcP+f7jXXr6khyysOlTklhKaIZMHJJicZ9bKLVihr4GiaoU6MzUOU1MPqDEAIGm 86ABiBomr1ZuTmV6zn07mhG9tl8xJ7F5pHHkxQVfaGK90Wx+PO4OIJgMdHezOihd /dxudUVwf7Y= =I4ZX -----END PGP SIGNATURE----- --------------enig3377F6EA6DEFE8F1B189E8C5-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JERnC069907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JERWZ069904; Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JEGRt069840 for ; Mon, 4 May 2009 12:14:26 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 14369 invoked from network); 4 May 2009 19:14:15 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:14:15 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF3EC2.7030504@fifthhorseman.net> Date: Mon, 04 May 2009 15:15:14 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <20090504183948.AA2D51A003A@smtp.hushmail.com> In-Reply-To: <20090504183948.AA2D51A003A@smtp.hushmail.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig14CC89960466A28BEAC9A5A5" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig14CC89960466A28BEAC9A5A5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 02:39 PM, vedaal@hush.com wrote: > MDC's ? >=20 > currently SHA-1 > rfc-4880 p. 49 ff Ah, right. Jon Callas' remarks about the MDC from back in January might be relevant: http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html I think his point stands that the MDC only cares about the one-wayness of the digest used in MDC -- there is no reliance on a collision-resistance property. So i'm not sure that this needs to change in a new draft, particularly if it could make the discussion more contentious. What do other folks think? --dkg --------------enig14CC89960466A28BEAC9A5A5 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf8+wszS7ZTSFznpAQrOGw//djHRreV/gQYDsEsCgxVLBf7F7g3jAQwY NmttihGJAw+egC6u8TcwMGb4nT+B/YKXMc5WiyQmgH8ekeiKll74g00ZOm1fHdEq 0DYZFRQLmhipzTuok0gCQa+FOtcippa6HAd23+v4L7KvDmUstLzszSc7eTUHpLX7 HhcelVdb9G9eRMDaKQFX+xVH2sYsVtln5d2KbiBY9NJKJOywaoyt3WghhvVyR4cU xj4rawzDriCU35peULoFcuAObh2oDlK6SPrxXAGAG3s8S9+Hv3edT4UoKcOJVtsS 4GEBPbVnLQvDbjFk2hLKZ64GMfEwi0eiv/w82seuEuVPH5Ml23Lr2itD7mPzE8bN 6oedDxnzdoqm5KMl+SRrd8R/mTR+goSM6Pj8llx+mAuacvtimmtzPC61zYDB9Pfx MALmTGeNEdLS+1g+3GQ5W7HiptiNH4pyK2xLL58/jXgNfgAEISLGUpNl0skYJg/D ryX0Do3jn/5ceZSGQGsVVZjGeeOrk5euyOye5DmARWiy4QrkzS4pykTp1tRskEUo air3YviYt+iNgze+h94icZljG4vusPvjVlhXIXPNGQyB4L3qZ4NWhsbGIb181H+h cMkP+4Fb+GxRgJehZRjg9Gsm0e51gboB8W2PDYrpICrbKYXjvy3ZJnt/gt2BJbcI wAxwYPonsDs= =afkV -----END PGP SIGNATURE----- --------------enig14CC89960466A28BEAC9A5A5-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw59f068538 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:58:06 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Iw5Pd068537; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw4qi068531 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44IvLtF022390 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:57:21 -0400 Cc: IETF OpenPGP Working Group Message-Id: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> From: David Shaw To: Werner Koch In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: New results against SHA-1 Date: Mon, 4 May 2009 14:57:21 -0400 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 1:38 PM, Werner Koch wrote: > > On Mon, 4 May 2009 17:32, dkg@fifthhorseman.net said: >> current fingerprint would be re-written as: >> >> SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 > > Using a number (2) and, say, a dot as a prefix would be a better > choice. > We use algorithnm numbers anyway and OpenPGP users are used tp spell a > large row of hex digits; we would only confuse them with an S and an > H.. I like the dot, but I'd like to see the hash number in two-digit hex. The reason is that I strongly suspect that when read out over the phone, or written down, or transmitted in pretty much any means other than strict cut-and-paste, the dot (or any other delimiter) will be lost in translation. Thus, "40.ABCDEF0123456....." will become "40ABCDEF0123456....." and we would have to play length checking games to guess if they meant hash 4 or 40. With 2-digit hex, "4" would be written as "04", removing any doubt. David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ie2G2067128 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ie2gs067127; Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from smtp12.hushmail.com (smtp12.hushmail.com [65.39.178.135]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44IdolO067098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for ; Mon, 4 May 2009 11:40:01 -0700 (MST) (envelope-from vedaal@hush.com) Received: from smtp12.hushmail.com (localhost.localdomain [127.0.0.1]) by smtp12.hushmail.com (Postfix) with SMTP id 6F9EA70271 for ; Mon, 4 May 2009 18:39:49 +0000 (UTC) Received: from smtp.hushmail.com (mailserver8.hushmail.com [65.39.178.61]) by smtp12.hushmail.com (Postfix) with ESMTP for ; Mon, 4 May 2009 18:39:48 +0000 (UTC) Received: by smtp.hushmail.com (Postfix, from userid 99) id AA2D51A003A; Mon, 4 May 2009 18:39:48 +0000 (UTC) MIME-Version: 1.0 Date: Mon, 04 May 2009 14:39:48 -0400 To: "IETF OpenPGP Working Group" Subject: Re: New results against SHA-1 From: vedaal@hush.com Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="UTF-8" Message-Id: <20090504183948.AA2D51A003A@smtp.hushmail.com> Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, 04 May 2009 11:32:04 -0400 Daniel Kahn Gillmor wrote: >On 04/30/2009 06:39 PM, David Shaw wrote: >> >> >http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d. >pdf >> >> There is not much hard information yet, but the two big quotes >are >> "SHA-1 collisions now 2^52" and "Practical collisions are within >> resources of a well funded organisation." >What else should be addressed? MDC's ? currently SHA-1 rfc-4880 p. 49 ff vedaal any ads or links below this message are added by hushmail without my endorsement or awareness of the nature of the link -- Click to learn about options trading and get the latest information. http://tagline.hushmail.com/fc/BLSrjkqecvgn6JU6GKTTYn4JLCimaHzrO00szZPMXyt3Ax5yZ2fL1OvWzD6/ Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44ILPBN066013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44ILPH9066012; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44ILOHs066006 for ; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 55092 invoked from network); 4 May 2009 18:21:23 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 18:21:23 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF325A.80106@fifthhorseman.net> Date: Mon, 04 May 2009 14:22:18 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig9CD82D7FEB196C5B478EC8A3" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig9CD82D7FEB196C5B478EC8A3 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 05/04/2009 01:38 PM, Werner Koch wrote: > Using a number (2) and, say, a dot as a prefix would be a better choice= =2E > We use algorithnm numbers anyway and OpenPGP users are used tp spell a > large row of hex digits; we would only confuse them with an S and an H.= =2E ok, that works for me. would the prefix be in hex or decimal? for example, would an SHA512 fingerprint look like a.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734= d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff or 10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734= d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff Ugh. that's horrifically long either way. Is a base64 encoding worth considering? it would shave off a third of the length, but it seems like it would introduce significant ambiguity (0 vs O, A vs a, etc) >> e) allow injection of arbitrary key material at the head of signature= s >> to allow signers to to avoid a chosen-prefix attack? This would make = it >> significantly more difficult to predict the hash that someone will sig= n, >=20 > and gives more bandwidth for a subliminal channel... True, but some room for the subliminal channel already exists (e.g. notations can be injected in the signed material). This would simply allow signers to better control what they actually sign, rather than being compelled into signing a given text. Daniel Franke's recent message on gnupg-devel about this is interesting: http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html Another approach would be to formally prefer digest algorithms that do not exhibit the same single-pass behavior of SHA-1 -- is that feasible? >> f) explicit introduction of new hashes/ciphers/asymmetric algorithms?= >=20 > We should defer such a discussion until there are semi final results > from the SHA-3 contest. SHA-3 finalizes in the end of 2012, though first-round candidates have already been selected. Third quarter of 2010 should have finalists selected: http://csrc.nist.gov/groups/ST/hash/timeline.html Which phase of the timeline would be sufficient for you? > Right, we should re-establish the WG to no rely on I-Ds by individuals.= So what's the process to do this? --dkg --------------enig9CD82D7FEB196C5B478EC8A3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf8yX8zS7ZTSFznpAQpoPw//eeXQ64tF5ABLRWImiVF3GdCZluqcDz3P ZTY+h8YPigxxmnNSTvDxvBSB0w3uu/PrI/O3h0v48HRE5Q2ipbdjdcEbfLt4c/+b zrvNl/4OccmwRL49qJnievsMBZQSvLd90xROEdB25jOU7q4eoGmFM9Fboz81YWOR CiGSlLnz/iEhqP8v2sCaP9ZFCSNM925tsmOtNdYAPwBLQ1iSUWCRJ4C2l2mOIK7k mZWie3rSxrhHjc+Go6K05c11ZSo2ifjUgwax4RdCNrYD+K9cAh7f/vkrMdZz8Prw nhnnhF/2BlxptBduGR5th126QYthaxG+QRBsDOQaXnq+TOKT7fX7Ajx0308FFqc9 eL236qiqQWte0xWm3XrYZCYRNcRXckdVcBh60IPwzWb6Sqe38eNCG9Etu39vAhky IaB7KHRES3REBIY6ZxrFJi2GyIsC+IMXEYQgtsHthRqw3q51YZzf9HQOUPz/oRcq 1wUrmVnp2GWvvUwFvVZFWaxS9cXaAIr56d1bHGiY0KtSRzR3uAB/FxaJWnk3unRd xaTSn2UJC0kuBaOYJPoRPYY5NTKfbIn+V1vxS7jlrfGXqCDGl3MymHa3LJ4Escbj FIRUlwvVUgzPsV3g/1uiCOb1j4+wnDmrlaoUXQ316qf6x7gUDwP0TL8u4NVrF8DL 9Ru4HW5fDSQ= =/xKh -----END PGP SIGNATURE----- --------------enig9CD82D7FEB196C5B478EC8A3-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7su7064123 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I7s0T064122; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailgw02.dd24.net (mailgw02.dd24.net [217.188.214.197]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7gVd064103 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from calestyo@scientia.net) Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw02.dd24.net (Postfix) with ESMTPA id 0AB6F35546C for ; Mon, 4 May 2009 18:07:42 +0000 (GMT) Subject: Re: Changing GPG's default key type From: Christoph Anton Mitterer To: IETF OpenPGP Working Group In-Reply-To: References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net> Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-TqwuP8rGE/wYOL6Ec1bJ" Date: Mon, 04 May 2009 20:07:41 +0200 Message-Id: <1241460461.4024.12.camel@fermat.scientia.net> Mime-Version: 1.0 X-Mailer: Evolution 2.26.1.1 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --=-TqwuP8rGE/wYOL6Ec1bJ Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Mon, 2009-05-04 at 14:00 -0400, David Shaw wrote: > Concerns about compatibility, mainly. There is a much larger =20 > installed base of clients that understand SHA-1 than that understand =20 > (say) SHA-256. SHA-256 has only been understood in a non-development =20 > version of GPG since 2004. If I recall properly, PGP added it more or =20 > less around the same time. That's not that long ago, and I frequently =20 > see people asking for support for some version of GPG or PGP that =20 > predates SHA-256. At least we've seen from the recent SHA1-related events,... that this point is comming closer ;) > None of this means that we wouldn't change the default signing hash at =20 > some point later. It's just not something we're currently planning on =20 > for today. Of course :) Chris. --=-TqwuP8rGE/wYOL6Ec1bJ Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Disposition: attachment; filename="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQ/DCCBXQw ggNcoAMCAQICAjh/MA0GCSqGSIb3DQEBBQUAMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYD VQQLExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3Qw HhcNMDcxMDI0MTkyNzQxWhcNMDkxMDIzMTkyNzQxWjB8MSEwHwYDVQQDExhDaHJpc3RvcGggQW50 b24gTWl0dGVyZXIxJDAiBgkqhkiG9w0BCQEWFWNhbGVzdHlvQHNjaWVudGlhLm5ldDExMC8GCSqG SIb3DQEJARYibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAPgLlUBy3NRbH25w8pOnhF+qtj4GN04aG7ur+JsXTcEkFNOZWZ5I al2PaQWP7GfEEp5lL0w/LdYXPfnLNohp4l/Nb+db8aHUeVBYgGBTPGF+mJHfJGeochfvZo78u6Bp KkCrDAw2BKN1JNxw+OxmWuunCmXSFM9gqRfBnfmc25P6ba9tQlDXGLKZA8/JKXLMKcTTS7dIkroE bM5FTSaAmGWkvwnD6fpxjFgWNLXjagNqlQD6+q+a//+gXNOGP34aZ3qPnLPR/gUi/yqrQuAVvGep GAhl4B1Kn+c7eROoodq33Ghomoznh8hogBkDJXp+Xq4k8measwtN99ZUdMaFeJsCAwEAAaOCASYw ggEiMAwGA1UdEwEB/wQCMAAwVgYJYIZIAYb4QgENBEkWR1RvIGdldCB5b3VyIG93biBjZXJ0aWZp Y2F0ZSBmb3IgRlJFRSBoZWFkIG92ZXIgdG8gaHR0cDovL3d3dy5DQWNlcnQub3JnMEAGA1UdJQQ5 MDcGCCsGAQUFBwMEBggrBgEFBQcDAgYKKwYBBAGCNwoDBAYKKwYBBAGCNwoDAwYJYIZIAYb4QgQB MDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYWaHR0cDovL29jc3AuY2FjZXJ0Lm9yZzBEBgNV HREEPTA7gRVjYWxlc3R5b0BzY2llbnRpYS5uZXSBIm1haWxAY2hyaXN0b3BoLmFudG9uLm1pdHRl cmVyLm5hbWUwDQYJKoZIhvcNAQEFBQADggIBAKZI/PvI6ynlgITrRTU7WaFlllAtkWCC6MGKEE16 hUebNwK/ccjUquHLfDg2LYbp/WHx3zZQxkj7CarzMUqnoDTnJMbKovDOdZ3vqbs6p6fKuRUjTkaE cN/0ZDllc4Bewa5ZUfdD2Ml3ObxF2oK7wmTw4tQCSKZlPcq+ML5hV3Exag2fBcGzeR+G/QUWKcmY laOpRj8Vu8ZMXpzSD8T+Tp2nKP+iqa2lv+UCI6cSXJ+fdyVMB1Tw98TdRo2ogk38ZhdlxpEDRonW kWuBmS9e7lABqVpyfVAuODF3cKfbxWJnFBkipEJzkpSUsCFQ0SSxs5xkad/bAFF3g1p+E9+EnZMe UJ55L2ZEEtFfgfsPo0N/M7QvWS8COPSwttdSgiXFm9/WHPxu10D6mb/ghNeUFRTrn8miZOer+3p+ 8TRruFMazmsak0emJ8dxsTCdbWZzJEqgz833uttaqZWbHsNY7FuIcj242RTsgetkIRHzaxpKxmUY NnF78vxm3HW/ZX1OpOQsLIT5t+7YDKuLGB15dJnQjQFy9w8TZFaoFUSd39rFdrFtfps7FWb73yov Zcz42a8MrxBcWpZWzpif59TT34IJEEN1/+bXPMGELyT417DIoV8faB6GPKCFV0l7G1TEJTYlobbZ rYVb8B7a0Uu1lPgyxLWlZLWiTYDQF2y8U3KWMIIFdDCCA1ygAwIBAgICOH8wDQYJKoZIhvcNAQEF BQAwVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cuQ0FjZXJ0Lm9y ZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDAeFw0wNzEwMjQxOTI3NDFaFw0wOTEwMjMx OTI3NDFaMHwxITAfBgNVBAMTGENocmlzdG9waCBBbnRvbiBNaXR0ZXJlcjEkMCIGCSqGSIb3DQEJ ARYVY2FsZXN0eW9Ac2NpZW50aWEubmV0MTEwLwYJKoZIhvcNAQkBFiJtYWlsQGNocmlzdG9waC5h bnRvbi5taXR0ZXJlci5uYW1lMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+AuVQHLc 1FsfbnDyk6eEX6q2PgY3Thobu6v4mxdNwSQU05lZnkhqXY9pBY/sZ8QSnmUvTD8t1hc9+cs2iGni X81v51vxodR5UFiAYFM8YX6Ykd8kZ6hyF+9mjvy7oGkqQKsMDDYEo3Uk3HD47GZa66cKZdIUz2Cp F8Gd+Zzbk/ptr21CUNcYspkDz8kpcswpxNNLt0iSugRszkVNJoCYZaS/CcPp+nGMWBY0teNqA2qV APr6r5r//6Bc04Y/fhpneo+cs9H+BSL/KqtC4BW8Z6kYCGXgHUqf5zt5E6ih2rfcaGiajOeHyGiA GQMlen5eriTyZ5qzC0331lR0xoV4mwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIwADBWBglghkgB hvhCAQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQgb3ZlciB0 byBodHRwOi8vd3d3LkNBY2VydC5vcmcwQAYDVR0lBDkwNwYIKwYBBQUHAwQGCCsGAQUFBwMCBgor BgEEAYI3CgMEBgorBgEEAYI3CgMDBglghkgBhvhCBAEwMgYIKwYBBQUHAQEEJjAkMCIGCCsGAQUF BzABhhZodHRwOi8vb2NzcC5jYWNlcnQub3JnMEQGA1UdEQQ9MDuBFWNhbGVzdHlvQHNjaWVudGlh Lm5ldIEibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTANBgkqhkiG9w0BAQUFAAOC AgEApkj8+8jrKeWAhOtFNTtZoWWWUC2RYILowYoQTXqFR5s3Ar9xyNSq4ct8ODYthun9YfHfNlDG SPsJqvMxSqegNOckxsqi8M51ne+puzqnp8q5FSNORoRw3/RkOWVzgF7BrllR90PYyXc5vEXagrvC ZPDi1AJIpmU9yr4wvmFXcTFqDZ8FwbN5H4b9BRYpyZiVo6lGPxW7xkxenNIPxP5Onaco/6KpraW/ 5QIjpxJcn593JUwHVPD3xN1GjaiCTfxmF2XGkQNGidaRa4GZL17uUAGpWnJ9UC44MXdwp9vFYmcU GSKkQnOSlJSwIVDRJLGznGRp39sAUXeDWn4T34Sdkx5QnnkvZkQS0V+B+w+jQ38ztC9ZLwI49LC2 11KCJcWb39Yc/G7XQPqZv+CE15QVFOufyaJk56v7en7xNGu4UxrOaxqTR6Ynx3GxMJ1tZnMkSqDP zfe621qplZsew1jsW4hyPbjZFOyB62QhEfNrGkrGZRg2cXvy/Gbcdb9lfU6k5CwshPm37tgMq4sY HXl0mdCNAXL3DxNkVqgVRJ3f2sV2sW1+mzsVZvvfKi9lzPjZrwyvEFxallbOmJ/n1NPfggkQQ3X/ 5tc8wYQvJPjXsMihXx9oHoY8oIVXSXsbVMQlNiWhttmthVvwHtrRS7WU+DLEtaVktaJNgNAXbLxT cpYwggYIMIID8KADAgECAgEBMA0GCSqGSIb3DQEBBAUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0ExHjAc BgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1 dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNlcnQub3JnMB4XDTA1MTAxNDA3MzY1 NVoXDTMzMDMyODA3MzY1NVowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6 Ly93d3cuQ0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAKtJNRFIfNImflOUz0Op3SjXQiqL84d4GVh8D57aiX3h++ty kA10oZZkq5+gJJlz2uJVdscXe/UErEa4w75/ZI0QbCTzYZzA8pD6Ueb1aQFjww9W4kpCz+JEjCUo qMV5CX1GuYrz6fM0KQhF5Byfy5QEHIGoFLOYZcRD7E6CjQnRvapbjZLQ7N6QxX8KwuPr5jFaXnQ+ lzNZ6MMDPWAzv/fRb0fEze5ig1JuLgiapNkVGJGmhZJHsK5I6223IeyFGmhyNav/8BBdwPSUp2rV O5J+TJAFfpPBLIukjmJ0FXFuC3ED6q8VOJrU0gVyb4z5K+taciX5OUbjchs+BMNkJyIQKopPWKcD rb60LhPtXapI19V91Cp7XPpGBFDkzA5CW4zt2/LP/JaT4NsRNlRiNDiPDGCbO5dWOK3z0luLoFvq Tpa4fNfVoIZwQNORKbeiPK31jLvPGpKK5DR7wNhsX+kKwsOnIJpa3yxdUly6R9Wb7yQocDggL9V/ KcCyQQNokszgnMyXS0XvOhAKq3A6mJVwrTWx6oUrpByAITGprmB6gCZIALgBwJNjVSKRPFbnr9s6 JfOPMVTqJouBWfmh0VMRxXudA/Z0EeBtsSw/LIaRmXGapneLNGDRFLQsrJ2vjBDTn8Rq+G8T/HNZ 92ZCdB6K4/jc0m+YnMtHmJVABfvpAgMBAAGjgb8wgbwwDwYDVR0TAQH/BAUwAwEB/zBdBggrBgEF BQcBAQRRME8wIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLkNBY2VydC5vcmcvMCgGCCsGAQUFBzAC hhxodHRwOi8vd3d3LkNBY2VydC5vcmcvY2EuY3J0MEoGA1UdIARDMEEwPwYIKwYBBAGBkEowMzAx BggrBgEFBQcCARYlaHR0cDovL3d3dy5DQWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDANBgkqhkiG 9w0BAQQFAAOCAgEAfwiIodoaUEnaifuhCHLzivcexDq0eVsgMLFF3sJd02Vp8cJdVFQ8hV+5e0KR wpn9G1Gbq0aloRBTnm2IrHNuLDOm8PSe4HXBPohFqeFmQ/5WWtF6QXj3QNpKOvELW6W7FgbmwueT uYVNl0+xHjhDgO+bDYzvuKdgAIdXfR5EHMsj75s8mZ2vtSkcRXkWlk0nbfEcbMPCVWSzvBTi86Qf HjL8JxUFz90urj6CYXvwIRAY9kTqUzn53NCaIODGu+C7Wk/EmcgHvbW9otsuYg1CNEG8/4uK9VEi qogwAOKw1Ly+ZbrVA1d5m+jcyE34UO2RpVIooqz7Nlg+6ZQrkVCHG9Ze1ozM9w8QDFJO0BZh5eUK bL8Xx3JGV5yY9WxgY3pvXrlOL8i5ubtqhbyYDe35PpeENJSuAK+h5eeSbk698+LZFItc0usBbKAX pS0Q65x6Sr297s797SJAq3A4iPUKh2rCqwVgyUgF2lPB3kR3arPzPDztgLymOEopJF/+WTubJXpW YwBkuV2kYn1XNk+tg+8fklOgjndX3eVhET0jAJBMPPqjYJMEo6819g5qj09KYKeFBWxGoY/0x3bj oVlX93GyxG4UXG1tQWbfG5Ox1ADD7svPPD0hgKlfY2X83eBfpPQr8IVxQdRnJfsasZeu1pmCE0HS bqUbmSeA5wupqAAxggK6MIICtgIBATBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQL ExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/ MAkGBSsOAwIaBQCgggE1MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8X DTA5MDUwNDE4MDc0MVowIwYJKoZIhvcNAQkEMRYEFNGCmj8sZK0DhoZ3DPl3EpWmN2RIMGkGCSsG AQQBgjcQBDFcMFowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cu Q0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdAICOH8wawYLKoZIhvcNAQkQ AgsxXKBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQLExVodHRwOi8vd3d3LkNBY2Vy dC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/MA0GCSqGSIb3DQEBAQUABIIB AD4lPWSZmUQJ4p2ufa5TBmwGw32UBUdBM8XP9AGBHZqYzvS/DBEbzJP/spr1d7YIB/Yt28LXnKFN TRaaDvhTj0QYnmZiUI0/WBBh0M9H8FROM61+vct05ahJ13vPOncwk9NMcVavfkfotC3rdcQK4PLB 04aWzCluGJkI/MALE/v+4acSroorOgvBpV5XKvBSLmFnH6DmkZD4i6mDr9xqYZKSm+qZB+qyV8d1 YTj8U5GtyYqRMPm5V0wnnwuzoahzoS0VvO3rkQ9ZZM9cwHb7lcBNunYUXFybspiiPWTXCdUcOg7f sbyeMAMYiGyk58vIo3uJFvUVlYoqM+V6y1KSFt0AAAAAAAA= --=-TqwuP8rGE/wYOL6Ec1bJ-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0PDk063585 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I0PWU063584; Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0D5t063572 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 11:00:24 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44I0CJk021847 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:00:13 -0400 Cc: IETF OpenPGP Working Group Message-Id: From: David Shaw To: Christoph Anton Mitterer In-Reply-To: <1241458123.4024.2.camel@fermat.scientia.net> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Re: Changing GPG's default key type Date: Mon, 4 May 2009 14:00:12 -0400 References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net> X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On May 4, 2009, at 1:28 PM, Christoph Anton Mitterer wrote: > On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote: >> We are currently thinking about changing the default >> primary to a 2048-bit RSA key. > Nice :-) > >> We are not proposing changing our default >> signing hash, which will remain SHA-1. > Uhm.. why not? Concerns about compatibility, mainly. There is a much larger installed base of clients that understand SHA-1 than that understand (say) SHA-256. SHA-256 has only been understood in a non-development version of GPG since 2004. If I recall properly, PGP added it more or less around the same time. That's not that long ago, and I frequently see people asking for support for some version of GPG or PGP that predates SHA-256. Mind you, we're not stopping people from choosing to use SHA-256 or whatever they like, and with a RSA key, they are of course free to choose anything. SHA-1 is just a default. One way to look at the RSA change, in fact, is to enable users to make their own hash choice, which they didn't really have with the previous default of a 1024-bit DSA key (so locked at 160 bits). None of this means that we wouldn't change the default signing hash at some point later. It's just not something we're currently planning on for today. David Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Hko3r062224 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HkoEn062223; Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HkmMD062215 for ; Mon, 4 May 2009 10:46:49 -0700 (MST) (envelope-from wk@gnupg.org) Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M12Fa-0002cM-Hs for ; Mon, 04 May 2009 19:46:46 +0200 Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M127Y-0007gx-OA for ; Mon, 04 May 2009 19:38:28 +0200 From: Werner Koch To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> Organisation: g10 Code GmbH OpenPGP: id=5B0358A2; url=finger:wk@g10code.com Date: Mon, 04 May 2009 19:38:28 +0200 In-Reply-To: <49FF0A74.5030805@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 11:32:04 -0400") Message-ID: <87iqkgbwff.fsf@wheatstone.g10code.de> User-Agent: Gnus/5.110011 (No Gnus v0.11) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On Mon, 4 May 2009 17:32, dkg@fifthhorseman.net said: > current fingerprint would be re-written as: > > SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 Using a number (2) and, say, a dot as a prefix would be a better choice. We use algorithnm numbers anyway and OpenPGP users are used tp spell a large row of hex digits; we would only confuse them with an S and an H.. > e) allow injection of arbitrary key material at the head of signatures > to allow signers to to avoid a chosen-prefix attack? This would make it > significantly more difficult to predict the hash that someone will sign, and gives more bandwidth for a subliminal channel... > f) explicit introduction of new hashes/ciphers/asymmetric algorithms? We should defer such a discussion until there are semi final results from the SHA-3 contest. > I've probably missed something. What else should be addressed? What > steps are necessary to get the WG back in order again? Or is that not Right, we should re-establish the WG to no rely on I-Ds by individuals. Salam-Shalom, Werner -- Die Gedanken sind frei. Auschnahme regelt ein Bundeschgesetz. Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSvOG061013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HSv4D061012; Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from mailgw01.dd24.net (mailgw01.dd24.net [217.188.214.191]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSjCk060991 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 10:28:56 -0700 (MST) (envelope-from calestyo@scientia.net) Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw01.dd24.net (Postfix) with ESMTPA id 0FE127CC66D; Mon, 4 May 2009 17:28:44 +0000 (GMT) Subject: Re: Changing GPG's default key type From: Christoph Anton Mitterer To: David Shaw Cc: IETF OpenPGP Working Group In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-H+nUPs1cUv+b2JQsJxx7" Date: Mon, 04 May 2009 19:28:43 +0200 Message-Id: <1241458123.4024.2.camel@fermat.scientia.net> Mime-Version: 1.0 X-Mailer: Evolution 2.26.1.1 Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: --=-H+nUPs1cUv+b2JQsJxx7 Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote: > We are currently thinking about changing the default =20 > primary to a 2048-bit RSA key. Nice :-) > We are not proposing changing our default =20 > signing hash, which will remain SHA-1. Uhm.. why not? Chris. --=-H+nUPs1cUv+b2JQsJxx7 Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Disposition: attachment; filename="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQ/DCCBXQw ggNcoAMCAQICAjh/MA0GCSqGSIb3DQEBBQUAMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYD VQQLExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3Qw HhcNMDcxMDI0MTkyNzQxWhcNMDkxMDIzMTkyNzQxWjB8MSEwHwYDVQQDExhDaHJpc3RvcGggQW50 b24gTWl0dGVyZXIxJDAiBgkqhkiG9w0BCQEWFWNhbGVzdHlvQHNjaWVudGlhLm5ldDExMC8GCSqG SIb3DQEJARYibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTCCASIwDQYJKoZIhvcN AQEBBQADggEPADCCAQoCggEBAPgLlUBy3NRbH25w8pOnhF+qtj4GN04aG7ur+JsXTcEkFNOZWZ5I al2PaQWP7GfEEp5lL0w/LdYXPfnLNohp4l/Nb+db8aHUeVBYgGBTPGF+mJHfJGeochfvZo78u6Bp KkCrDAw2BKN1JNxw+OxmWuunCmXSFM9gqRfBnfmc25P6ba9tQlDXGLKZA8/JKXLMKcTTS7dIkroE bM5FTSaAmGWkvwnD6fpxjFgWNLXjagNqlQD6+q+a//+gXNOGP34aZ3qPnLPR/gUi/yqrQuAVvGep GAhl4B1Kn+c7eROoodq33Ghomoznh8hogBkDJXp+Xq4k8measwtN99ZUdMaFeJsCAwEAAaOCASYw ggEiMAwGA1UdEwEB/wQCMAAwVgYJYIZIAYb4QgENBEkWR1RvIGdldCB5b3VyIG93biBjZXJ0aWZp Y2F0ZSBmb3IgRlJFRSBoZWFkIG92ZXIgdG8gaHR0cDovL3d3dy5DQWNlcnQub3JnMEAGA1UdJQQ5 MDcGCCsGAQUFBwMEBggrBgEFBQcDAgYKKwYBBAGCNwoDBAYKKwYBBAGCNwoDAwYJYIZIAYb4QgQB MDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYWaHR0cDovL29jc3AuY2FjZXJ0Lm9yZzBEBgNV HREEPTA7gRVjYWxlc3R5b0BzY2llbnRpYS5uZXSBIm1haWxAY2hyaXN0b3BoLmFudG9uLm1pdHRl cmVyLm5hbWUwDQYJKoZIhvcNAQEFBQADggIBAKZI/PvI6ynlgITrRTU7WaFlllAtkWCC6MGKEE16 hUebNwK/ccjUquHLfDg2LYbp/WHx3zZQxkj7CarzMUqnoDTnJMbKovDOdZ3vqbs6p6fKuRUjTkaE cN/0ZDllc4Bewa5ZUfdD2Ml3ObxF2oK7wmTw4tQCSKZlPcq+ML5hV3Exag2fBcGzeR+G/QUWKcmY laOpRj8Vu8ZMXpzSD8T+Tp2nKP+iqa2lv+UCI6cSXJ+fdyVMB1Tw98TdRo2ogk38ZhdlxpEDRonW kWuBmS9e7lABqVpyfVAuODF3cKfbxWJnFBkipEJzkpSUsCFQ0SSxs5xkad/bAFF3g1p+E9+EnZMe UJ55L2ZEEtFfgfsPo0N/M7QvWS8COPSwttdSgiXFm9/WHPxu10D6mb/ghNeUFRTrn8miZOer+3p+ 8TRruFMazmsak0emJ8dxsTCdbWZzJEqgz833uttaqZWbHsNY7FuIcj242RTsgetkIRHzaxpKxmUY NnF78vxm3HW/ZX1OpOQsLIT5t+7YDKuLGB15dJnQjQFy9w8TZFaoFUSd39rFdrFtfps7FWb73yov Zcz42a8MrxBcWpZWzpif59TT34IJEEN1/+bXPMGELyT417DIoV8faB6GPKCFV0l7G1TEJTYlobbZ rYVb8B7a0Uu1lPgyxLWlZLWiTYDQF2y8U3KWMIIFdDCCA1ygAwIBAgICOH8wDQYJKoZIhvcNAQEF BQAwVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cuQ0FjZXJ0Lm9y ZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDAeFw0wNzEwMjQxOTI3NDFaFw0wOTEwMjMx OTI3NDFaMHwxITAfBgNVBAMTGENocmlzdG9waCBBbnRvbiBNaXR0ZXJlcjEkMCIGCSqGSIb3DQEJ ARYVY2FsZXN0eW9Ac2NpZW50aWEubmV0MTEwLwYJKoZIhvcNAQkBFiJtYWlsQGNocmlzdG9waC5h bnRvbi5taXR0ZXJlci5uYW1lMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+AuVQHLc 1FsfbnDyk6eEX6q2PgY3Thobu6v4mxdNwSQU05lZnkhqXY9pBY/sZ8QSnmUvTD8t1hc9+cs2iGni X81v51vxodR5UFiAYFM8YX6Ykd8kZ6hyF+9mjvy7oGkqQKsMDDYEo3Uk3HD47GZa66cKZdIUz2Cp F8Gd+Zzbk/ptr21CUNcYspkDz8kpcswpxNNLt0iSugRszkVNJoCYZaS/CcPp+nGMWBY0teNqA2qV APr6r5r//6Bc04Y/fhpneo+cs9H+BSL/KqtC4BW8Z6kYCGXgHUqf5zt5E6ih2rfcaGiajOeHyGiA GQMlen5eriTyZ5qzC0331lR0xoV4mwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIwADBWBglghkgB hvhCAQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQgb3ZlciB0 byBodHRwOi8vd3d3LkNBY2VydC5vcmcwQAYDVR0lBDkwNwYIKwYBBQUHAwQGCCsGAQUFBwMCBgor BgEEAYI3CgMEBgorBgEEAYI3CgMDBglghkgBhvhCBAEwMgYIKwYBBQUHAQEEJjAkMCIGCCsGAQUF BzABhhZodHRwOi8vb2NzcC5jYWNlcnQub3JnMEQGA1UdEQQ9MDuBFWNhbGVzdHlvQHNjaWVudGlh Lm5ldIEibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTANBgkqhkiG9w0BAQUFAAOC AgEApkj8+8jrKeWAhOtFNTtZoWWWUC2RYILowYoQTXqFR5s3Ar9xyNSq4ct8ODYthun9YfHfNlDG SPsJqvMxSqegNOckxsqi8M51ne+puzqnp8q5FSNORoRw3/RkOWVzgF7BrllR90PYyXc5vEXagrvC ZPDi1AJIpmU9yr4wvmFXcTFqDZ8FwbN5H4b9BRYpyZiVo6lGPxW7xkxenNIPxP5Onaco/6KpraW/ 5QIjpxJcn593JUwHVPD3xN1GjaiCTfxmF2XGkQNGidaRa4GZL17uUAGpWnJ9UC44MXdwp9vFYmcU GSKkQnOSlJSwIVDRJLGznGRp39sAUXeDWn4T34Sdkx5QnnkvZkQS0V+B+w+jQ38ztC9ZLwI49LC2 11KCJcWb39Yc/G7XQPqZv+CE15QVFOufyaJk56v7en7xNGu4UxrOaxqTR6Ynx3GxMJ1tZnMkSqDP zfe621qplZsew1jsW4hyPbjZFOyB62QhEfNrGkrGZRg2cXvy/Gbcdb9lfU6k5CwshPm37tgMq4sY HXl0mdCNAXL3DxNkVqgVRJ3f2sV2sW1+mzsVZvvfKi9lzPjZrwyvEFxallbOmJ/n1NPfggkQQ3X/ 5tc8wYQvJPjXsMihXx9oHoY8oIVXSXsbVMQlNiWhttmthVvwHtrRS7WU+DLEtaVktaJNgNAXbLxT cpYwggYIMIID8KADAgECAgEBMA0GCSqGSIb3DQEBBAUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0ExHjAc BgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1 dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNlcnQub3JnMB4XDTA1MTAxNDA3MzY1 NVoXDTMzMDMyODA3MzY1NVowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6 Ly93d3cuQ0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAKtJNRFIfNImflOUz0Op3SjXQiqL84d4GVh8D57aiX3h++ty kA10oZZkq5+gJJlz2uJVdscXe/UErEa4w75/ZI0QbCTzYZzA8pD6Ueb1aQFjww9W4kpCz+JEjCUo qMV5CX1GuYrz6fM0KQhF5Byfy5QEHIGoFLOYZcRD7E6CjQnRvapbjZLQ7N6QxX8KwuPr5jFaXnQ+ lzNZ6MMDPWAzv/fRb0fEze5ig1JuLgiapNkVGJGmhZJHsK5I6223IeyFGmhyNav/8BBdwPSUp2rV O5J+TJAFfpPBLIukjmJ0FXFuC3ED6q8VOJrU0gVyb4z5K+taciX5OUbjchs+BMNkJyIQKopPWKcD rb60LhPtXapI19V91Cp7XPpGBFDkzA5CW4zt2/LP/JaT4NsRNlRiNDiPDGCbO5dWOK3z0luLoFvq Tpa4fNfVoIZwQNORKbeiPK31jLvPGpKK5DR7wNhsX+kKwsOnIJpa3yxdUly6R9Wb7yQocDggL9V/ KcCyQQNokszgnMyXS0XvOhAKq3A6mJVwrTWx6oUrpByAITGprmB6gCZIALgBwJNjVSKRPFbnr9s6 JfOPMVTqJouBWfmh0VMRxXudA/Z0EeBtsSw/LIaRmXGapneLNGDRFLQsrJ2vjBDTn8Rq+G8T/HNZ 92ZCdB6K4/jc0m+YnMtHmJVABfvpAgMBAAGjgb8wgbwwDwYDVR0TAQH/BAUwAwEB/zBdBggrBgEF BQcBAQRRME8wIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLkNBY2VydC5vcmcvMCgGCCsGAQUFBzAC hhxodHRwOi8vd3d3LkNBY2VydC5vcmcvY2EuY3J0MEoGA1UdIARDMEEwPwYIKwYBBAGBkEowMzAx BggrBgEFBQcCARYlaHR0cDovL3d3dy5DQWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDANBgkqhkiG 9w0BAQQFAAOCAgEAfwiIodoaUEnaifuhCHLzivcexDq0eVsgMLFF3sJd02Vp8cJdVFQ8hV+5e0KR wpn9G1Gbq0aloRBTnm2IrHNuLDOm8PSe4HXBPohFqeFmQ/5WWtF6QXj3QNpKOvELW6W7FgbmwueT uYVNl0+xHjhDgO+bDYzvuKdgAIdXfR5EHMsj75s8mZ2vtSkcRXkWlk0nbfEcbMPCVWSzvBTi86Qf HjL8JxUFz90urj6CYXvwIRAY9kTqUzn53NCaIODGu+C7Wk/EmcgHvbW9otsuYg1CNEG8/4uK9VEi qogwAOKw1Ly+ZbrVA1d5m+jcyE34UO2RpVIooqz7Nlg+6ZQrkVCHG9Ze1ozM9w8QDFJO0BZh5eUK bL8Xx3JGV5yY9WxgY3pvXrlOL8i5ubtqhbyYDe35PpeENJSuAK+h5eeSbk698+LZFItc0usBbKAX pS0Q65x6Sr297s797SJAq3A4iPUKh2rCqwVgyUgF2lPB3kR3arPzPDztgLymOEopJF/+WTubJXpW YwBkuV2kYn1XNk+tg+8fklOgjndX3eVhET0jAJBMPPqjYJMEo6819g5qj09KYKeFBWxGoY/0x3bj oVlX93GyxG4UXG1tQWbfG5Ox1ADD7svPPD0hgKlfY2X83eBfpPQr8IVxQdRnJfsasZeu1pmCE0HS bqUbmSeA5wupqAAxggK6MIICtgIBATBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQL ExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/ MAkGBSsOAwIaBQCgggE1MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8X DTA5MDUwNDE3Mjg0M1owIwYJKoZIhvcNAQkEMRYEFGQ1X5fulypDcmv4l7L+HM0g9wGbMGkGCSsG AQQBgjcQBDFcMFowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cu Q0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdAICOH8wawYLKoZIhvcNAQkQ AgsxXKBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQLExVodHRwOi8vd3d3LkNBY2Vy dC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/MA0GCSqGSIb3DQEBAQUABIIB ABuKf/d/NXUCyjnLKEy9V6BqPBVNpY7Wa0bWp11AgdPMjdrsagxLBRHLvyIcagrvhDgxvlyKC3LU eBX/ZQ7kQ3TZcOcu91sz5Q//BPekdrU1H1L4ddoZaLS7tC61aRRufQdJmQk/1JB+DDBJj+966Mjb wtbAaSR9hHeUrXYStI4vr0eZN+kah3J724ysG3Ohk7i4gh0XeIqmPcn3eIqtRYjoiENL6hLZtyMb 319f4fsUB1qf/Rgoe6RzVWhD0qBOtl3abCEurgSFJUztV3i3UZTrCeesvSc5t5T0KotRFJyIZpag rdnsLiCt9sx378JiSYvZyh7g9aI70kZBRM4zlP8AAAAAAAA= --=-H+nUPs1cUv+b2JQsJxx7-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HLKBC060640 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HLKEc060639; Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HL9fc060629 for ; Mon, 4 May 2009 10:21:19 -0700 (MST) (envelope-from iang@systemics.com) Received: from skaro.afraid.org ([212.169.1.61]:21902) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M11qk-0002WV-45 (Exim 4.69) (return-path ); Mon, 04 May 2009 18:21:06 +0100 Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 5D21F5D65; Mon, 4 May 2009 18:21:03 +0100 (GMT/BST) Message-ID: <49FF23FF.9020701@systemics.com> Date: Mon, 04 May 2009 19:21:03 +0200 From: Ian G User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2 MIME-Version: 1.0 To: David Shaw Cc: IETF OpenPGP Working Group Subject: Re: Changing GPG's default key type References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: On 4/5/09 16:40, David Shaw wrote: > We are currently thinking about changing the default primary to > a 2048-bit RSA key. I see no problems here, I would agree with the shift to RSA 2048 as the default. iang Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44FVMU1052728 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 08:31:23 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44FVMb5052727; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44FVB9L052711 for ; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from dkg@fifthhorseman.net) Received: (qmail 49473 invoked from network); 4 May 2009 15:31:09 -0000 Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 15:31:09 -0000 X-pair-Authenticated: 216.254.70.154 Message-ID: <49FF0A74.5030805@fifthhorseman.net> Date: Mon, 04 May 2009 11:32:04 -0400 From: Daniel Kahn Gillmor Reply-To: IETF OpenPGP Working Group User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103) MIME-Version: 1.0 To: IETF OpenPGP Working Group Subject: Re: New results against SHA-1 References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> In-Reply-To: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> X-Enigmail-Version: 0.95.7 OpenPGP: id=D21739E9 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig0EEC22D02892A3EDBBB25B03" Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig0EEC22D02892A3EDBBB25B03 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable On 04/30/2009 06:39 PM, David Shaw wrote: >=20 > http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf >=20 > There is not much hard information yet, but the two big quotes are > "SHA-1 collisions now 2^52" and "Practical collisions are within > resources of a well funded organisation." Ugh. i didn't think this would happen this soon. I'd like to formally suggest that we need to re-open this working group and begin discussion on a new revision of the OpenPGP draft. Whether or not the above report turns out to have legitimate theoretical grounding (i've only read the abstract, and don't know if my math would be sufficient to evaluate a full report anyway), we know that there are explicit dependencies on SHA-1 in OpenPGP that need to be made more flexible. Here are some key points that need to be adjusted w.r.t. digest algorithm= s: a) Fingerprints: these are currently SHA-1 hashes of the public key mateerial. One proposal is to continue hashing the exact same data but to prefix the fingerprint with the canonical name of the digest algorithm used, separated by an unambiguous delimiter (i'm using - because : seems pretty overloaded in a lot of places, but i'm sure we can collaboratively choose a good delimiter). So in that case, my current fingerprint would be re-written as: SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9 b) fix the Revocation Key (subpacket 12) to indicate digest algorithm and variable length data. A poorly-worded attempt at a revision: 5.2.3.15. Revocation Key (1 octet of class, 1 octet of public-key algorithm ID, 1 octet of digest algorithm, N octets of digest) Authorizes the specified key to issue revocation signatures for this key. Class octet must have bit 0x80 set. If the bit 0x40 is set, then this means that the revocation information is sensitive. If bit 0x20 is unset, the digest algorithm is assumed to be SHA-1, and no octet identifying the digest algorithm is included. Implementations SHOULD set bit 0x20 and explicitly include the hash identifier. Other bits are for future expansion to other kinds of authorizations. This is found on a self-signature. If the "sensitive" flag is set, the keyholder feels this subpacket contains private trust information that describes a real-world sensitive relationship. If this flag is set, implementations SHOULD NOT export this signature to other users except in cases where the data needs to be available: when the signature is being sent to the designated revoker, or when it is accompanied by a revocation signature from that revoker. Note that it may be appropriate to isolate this subpacket within a separate signature so that it is not combined with other subpackets that need to be exported. c) settling on a new "lowest-common-denominator" hash aside from SHA-1 (or discarding the idea of a lowest-common-denominator hash?) Some other possible changes: d) suggesting new defaults for key choices (does this mean avoiding DSA1, for example, or other algorithms that rely on 160-bit hashes?) e) allow injection of arbitrary key material at the head of signatures to allow signers to to avoid a chosen-prefix attack? This would make it significantly more difficult to predict the hash that someone will sign, which makes birthday attack collisions more difficult to pull off since the signer cannot be compelled to sign a particular hash. f) explicit introduction of new hashes/ciphers/asymmetric algorithms? I've probably missed something. What else should be addressed? What steps are necessary to get the WG back in order again? Or is that not needed? --dkg --------------enig0EEC22D02892A3EDBBB25B03 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQIVAwUBSf8KeczS7ZTSFznpAQo3VQ/9EnJgcDEjIxKrIZaWX8JR5fRyyVyEGN0C 1UPPOE7YB6sOScQPAhE7+6S65sekfcMIlhGPMSsPu6QkxjRCHo7P6sRcJ9C8tZY1 vIxumm5zFzrxvGla1IIiLqgMXaQyjD/11AGwV4pWJxdMa5eFPVElz8/EHggmXkbG GKg7jY/m3Rbkjabkc87rD6+ZkzBRJDq1kKQ8ep13Ucp4u8w80njWKYaJa0fe4vDx VYbkZVOvVN3A0QYGXOrdmkpDry9XbXbrBmZxMo93a1MA1h6s8wd5TOQcoZAkTR92 mDcrbRFbeU1gOmXLfnfL9nXEj+gOf6BGF+dZILgaxEPsmPYwbJ3OvddKbBzcA2cu Mulv38iaWsFNeuvNLC12SE12I9T8dxywKnaHGL7O1RB9kGBWYYHsDGzthLqkvBEF UKlqZ41M8vR+xvSA6SBKl9qAcuyO+a4pObHmOMCjmiTBjmtAjsGAo6O+E9rNuSSa r76rNk/DgA81bjzTUNMc3+8qv+UwBulU3dFIfD9chWI9TVQCi43PcoQcCdvlnm0e e7JRZuGGuQfzaSzJg0LHgAoVUY9QOKsaS7c7TFbDS/vEnQCmzEkaSo512PzLAwwn fwE0h+kHJU087If950aujlRnu/7a8KcJiyGig4aZRYOXu6kZe4iQjnr5l+RpdRXP ycwuZiPEKTA= =q4zH -----END PGP SIGNATURE----- --------------enig0EEC22D02892A3EDBBB25B03-- Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ef55i048913 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ef5lx048912; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org) X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Eerru048893 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com) Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Eek5u019879 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Mon, 4 May 2009 10:40:53 -0400 Message-Id: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> From: David Shaw To: IETF OpenPGP Working Group Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v930.4) Subject: Changing GPG's default key type Date: Mon, 4 May 2009 10:40:52 -0400 X-Mailer: Apple Mail (2.930.4) Sender: owner-ietf-openpgp@mail.imc.org Precedence: bulk List-Archive: List-Unsubscribe: List-ID: Hi, Currently, GPG's default key type, the one that is recommended to all new users, is a DSA primary key (1024 bits - not "DSA2") with an Elgamal subkey. We are currently thinking about changing the default primary to a 2048-bit RSA key. The main benefits of changing the key type is that it can go past the 1024 bit DSA1 limit, and would also not be limited to a 160-bit hash, both of which are getting a little long in the tooth. We could get similar benefits with a DSA2 key, but DSA2 is not nearly as widely implemented as RSA is, so is not a good option for a default key at this time. We will of course continue supporting DSA2 (and DSA "1") as we do now. This is purely a question of what the default key should be. This is not directly prompted by the recent SHA-1 troubles, but it is somewhat related, as it would let users of the default key type use hashes larger than 160 bits. That said, this is not intended to be a fix for the SHA-1 problems. We are not proposing changing our default signing hash, which will remain SHA-1. After a bit of internal discussion, we thought it was worth mentioning this here, to see if the OpenPGP community had any issue or other comments. I don't expect this to be a particularly controversial move, but discussion is always welcome. One issue, of course, is that RSA is not a required key type in OpenPGP, so there could be some implementation out there that won't be able to handle it. I'm not terribly concerned about this, as in practice, the vast majority of code has handled RSA just fine for the past decade, and if a particular user needs to generate a non-RSA key, they can still do so. There are a few other details (RSA signatures are physically larger, etc), but I believe they are outweighed by the benefit of the larger key and additional hash flexibility. David