From owner-ietf-openpgp@mail.imc.org  Tue Nov  4 13:15:38 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25868
	for <openpgp-archive@lists.ietf.org>; Tue, 4 Nov 2003 13:15:38 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4HjGkT064860
	for <ietf-openpgp-bks@above.proper.com>; Tue, 4 Nov 2003 09:45:16 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hA4HjGNW064859
	for ietf-openpgp-bks; Tue, 4 Nov 2003 09:45:16 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.transarc.ibm.com (bi-02pt1.bluebird.ibm.com [129.42.208.182])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4HjBkT064851
	for <ietf-openpgp@imc.org>; Tue, 4 Nov 2003 09:45:13 -0800 (PST)
	(envelope-from mwy-opgp97@the-youngs.org)
Received: from the-youngs.org (dhcp-196-20.transarc.ibm.com [9.38.196.220]) by mailhost.transarc.ibm.com (8.8.0/8.8.0) with ESMTP id MAA29670 for <ietf-openpgp@imc.org>; Tue, 4 Nov 2003 12:44:57 -0500 (EST)
Message-ID: <3FA7E536.5020608@the-youngs.org>
Date: Tue, 04 Nov 2003 12:43:18 -0500
From: Michael Young <mwy-opgp97@the-youngs.org>
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-openpgp@imc.org
Subject: Re: theory (was Re: Back-signatures proposal)
References: <20031028163528.GA6792@jabberwocky.com> <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
In-Reply-To: <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
Content-Transfer-Encoding: 7bit


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Trevor Perrin wrote [excerpts quoted out of order]:
...
 > I notice the patent has a signature on it, and I know the USPTO is
 > in the habit of signing pending applications with its own key.
 >
 > I go to a PGP key server and find a key claiming to belong to
 > USPTO. I use it to verify the application.  Since it verifies, I
 > jump to the conclusion that the key belongs to the USPTO.

Yes, you have made a serious error in verifying that key.

You wouldn't do this with a document you received insecurely.  You
wouldn't do this if you considered the possibility that the USPTO
site might vend documents signed by others, a perfectly reasonable
possibility.

You seem to be relying on this preface:

 > Suppose I download the patent application from USPTO's site, over a
 > secure link.

If you believe that the link is secure, why wouldn't you use it
to retrieve the USPTO's key?  [OK, they might not publish their
key this way.  Ask them to do so.  If they won't take that
seriously, why would you trust signatures gathered this way?]

Even this has its risks -- a generic "secure link" (like HTTPS)
doesn't carry the connotations that a key certification does.  But it
seems less likely that an organization would securely publish dubious
keys (particularly ones that refer to themselves) than documents
signed by third parties.  FAR less likely if the key is explicitly
introduced, for example with text to the effect "this is a USPTO
key".

Now, all that said, I'm quite happy with defining a subkey
cross-signature mechanism (and with David Shaw's proposal in
particular).  Let's just not overstate the problem.


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBP6flHuc3iHYL8FknEQL+4ACgy0ACDS1iAWzdZcnw+9jAeHIjy3IAn1Gb
eZvd12MCfhrJNMDXbFfGFbwx
=baY9
-----END PGP SIGNATURE-----




From owner-ietf-openpgp@mail.imc.org  Tue Nov  4 18:15:03 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA11022
	for <openpgp-archive@lists.ietf.org>; Tue, 4 Nov 2003 18:15:03 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4MSKkT075207
	for <ietf-openpgp-bks@above.proper.com>; Tue, 4 Nov 2003 14:28:20 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hA4MSKhN075206
	for ietf-openpgp-bks; Tue, 4 Nov 2003 14:28:20 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mtaw4.prodigy.net (mtaw4.prodigy.net [64.164.98.52])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4MSIkT075200
	for <ietf-openpgp@imc.org>; Tue, 4 Nov 2003 14:28:19 -0800 (PST)
	(envelope-from trevp@trevp.net)
Received: from TREVOR.trevp.net (adsl-68-122-41-120.dsl.pltn13.pacbell.net [68.122.41.120])
	by mtaw4.prodigy.net (8.12.10/8.12.10) with ESMTP id hA4MSJYT003502;
	Tue, 4 Nov 2003 14:28:20 -0800 (PST)
Message-Id: <5.2.0.9.0.20031104135303.0444de40@pop.sbcglobal.yahoo.com>
X-Sender: trevorperrin@sbcglobal.net@pop.sbcglobal.yahoo.com
X-Mailer: QUALCOMM Windows Eudora Version 5.2.0.9
Date: Tue, 04 Nov 2003 14:27:52 -0800
To: Michael Young <mwy-opgp97@the-youngs.org>, ietf-openpgp@imc.org
From: Trevor Perrin <trevp@trevp.net>
Subject: Re: theory (was Re: Back-signatures proposal)
In-Reply-To: <3FA7E536.5020608@the-youngs.org>
References: <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
 <20031028163528.GA6792@jabberwocky.com>
 <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


At 12:43 PM 11/4/2003 -0500, Michael Young wrote:
>Content-Transfer-Encoding: 7bit
>
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>Trevor Perrin wrote [excerpts quoted out of order]:
>...
> > I notice the patent has a signature on it, and I know the USPTO is
> > in the habit of signing pending applications with its own key.
> >
> > I go to a PGP key server and find a key claiming to belong to
> > USPTO. I use it to verify the application.  Since it verifies, I
> > jump to the conclusion that the key belongs to the USPTO.
>
>Yes, you have made a serious error in verifying that key.
>
>You wouldn't do this with a document you received insecurely.  You
>wouldn't do this if you considered the possibility that the USPTO
>site might vend documents signed by others, a perfectly reasonable
>possibility.
>
>You seem to be relying on this preface:
>
> > Suppose I download the patent application from USPTO's site, over a
> > secure link.

Yes, I'm relying on that.



>If you believe that the link is secure, why wouldn't you use it
>to retrieve the USPTO's key?

Agreed, that would be better.

I'm not saying that verifying a document with a key is a *good* way to 
authenticate the key.  I'm just saying it's something a foolish user might do.

Perhaps such a user deserves what he gets.

However, including relevant fingerprints (of the signing key and primary 
key) in every signature makes the above safe, whereas the subkey 
back-signature doesn't, entirely.  It also makes safe the case where 
subkeys are re-used under different primary keys.  Since I think the 
fingerprint solution is also simpler and more efficient, my vote is for that.

But I also agree with David when he says:

"...either of the proposed fixes raises the bar sufficiently to stop casual 
exploitation."

so I'm fine with either approach.

Trevor 



From owner-ietf-openpgp@mail.imc.org  Mon Nov 10 13:17:46 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA03801
	for <openpgp-archive@lists.ietf.org>; Mon, 10 Nov 2003 13:17:45 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAHeskT084019
	for <ietf-openpgp-bks@above.proper.com>; Mon, 10 Nov 2003 09:40:54 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAAHerf0084018
	for ietf-openpgp-bks; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp3.hushmail.com (smtp3.hushmail.com [65.39.178.135])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAHeqkT084013
	for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 09:40:52 -0800 (PST)
	(envelope-from vedaal@hush.com)
Received: from mailserver1.hushmail.com (mailserver1.hushmail.com [65.39.178.20])
	by smtp3.hushmail.com (Postfix) with ESMTP id 2252F10E72C
	for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
Received: from mailserver1.hushmail.com (localhost.hushmail.com [127.0.0.1])
	by mailserver1.hushmail.com (8.12.6/8.12.3) with ESMTP id hAAHerBQ075663
	for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
	(envelope-from vedaal@hush.com)
Received: (from nobody@localhost)
	by mailserver1.hushmail.com (8.12.6/8.12.3/Submit) id hAAHerlj075662
	for ietf-openpgp@imc.org; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
Message-Id: <200311101740.hAAHerlj075662@mailserver1.hushmail.com>
Date: Mon, 10 Nov 2003 09:40:52 -0800
To: ietf-openpgp@imc.org
Subject: Shamir's Discrete Logarithm Hash  //  for possible inclusion into open-pgp ?
From: <vedaal@hush.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


Shamir's Discrete Logarithm Hash was recently implemented by Ralf Senderek
in a new small crypto program, PCP (Pure Crypto Project)

(hash description is here:)
http://senderek.de/SDLH/

it has been around for a while, was proven to be collision resistant,
 but hasn't really been implemented before, possibly because of the length
of time required to sign directly with the rsa key

now, with faster processors,
this may be an appropriate hash for e-mail-length messages,

and, as there are plans for the wider SHA hashes to be introduced,
maybe it would be worthwhile considering a hash will remain secure as
long as the keysize is considered secure

(although it won't work for dh keys ;-(  )


just a thought,

vedaal



Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427


From owner-ietf-openpgp@mail.imc.org  Mon Nov 10 14:28:23 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA07364
	for <openpgp-archive@lists.ietf.org>; Mon, 10 Nov 2003 14:28:23 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAJ4lkT087868
	for <ietf-openpgp-bks@above.proper.com>; Mon, 10 Nov 2003 11:04:47 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAAJ4l7c087867
	for ietf-openpgp-bks; Mon, 10 Nov 2003 11:04:47 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAJ4jkT087862
	for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 11:04:46 -0800 (PST)
	(envelope-from hal@finney.org)
Received: (from hal@localhost)
	by finney.org (8.11.6/8.11.6) id hAAJ3UV29397
	for ietf-openpgp@imc.org; Mon, 10 Nov 2003 11:03:30 -0800
Date: Mon, 10 Nov 2003 11:03:30 -0800
From: "Hal Finney" <hal@finney.org>
Message-Id: <200311101903.hAAJ3UV29397@finney.org>
To: ietf-openpgp@imc.org
Subject: Re: Shamir's Discrete Logarithm Hash  //  for possible inclusion into open-pgp ?
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


Vedaal writes:
> Shamir's Discrete Logarithm Hash was recently implemented by Ralf Senderek
> in a new small crypto program, PCP (Pure Crypto Project)
>
> (hash description is here:)
> http://senderek.de/SDLH/

It's security properties are a little unusual, in that the creator of
the hash function can forge collisions.  Senderek has the creator be
the signer, which seems to work OK, but it is still different enough
from traditional hashes that it makes me wonder.

Traditionally, signature security proofs are based on a random oracle
model, while this hash function is like a random oracle with a trap door.
I don't know if there exist security proofs for that arrangement.

> (although it won't work for dh keys ;-(  )

I don't see why it can't.  The hash's RSA modulus has nothing to do
with the signature key.

Hal Finney


From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 08:17:24 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA10691
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 08:17:23 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHCsSkT023371
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 04:54:28 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHCsSCs023370
	for ietf-openpgp-bks; Mon, 17 Nov 2003 04:54:28 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from brunch.mit.edu (BRUNCH.MIT.EDU [18.92.0.171])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHCsRkT023363
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 04:54:27 -0800 (PST)
	(envelope-from dmaus@alum.mit.edu)
Received: from brunch.mit.edu (localhost [127.0.0.1])
	by brunch.mit.edu (8.12.10/8.12.8) with ESMTP id hAHCsQCn014522
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 07:54:26 -0500 (EST)
Date: Mon, 17 Nov 2003 07:54:26 -0500 (EST)
Message-ID: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu>
From: Douglas Maus <dmaus@alum.mit.edu>
Reply-To: Douglas Maus <dmaus@alum.mit.edu>
To: ietf-openpgp@imc.org
Subject: private key CFB
Mime-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
Content-Transfer-Encoding: 7bit


Two beginner questions:

1. In Private Key packets (tag 5, section 5.5.3), what is the bitsize of the CFB mode used in encrypting the secret MPI? For example, AES256 may be performed in CFB 1bit, CFB 8bit and CFB 128bit (1bit, 1octet, and 1block). Is this noted somewhere in the RFC that I'm missing?

2. Could someone please help me confirm a key from salt and passphrase?
keysize of 256 (AES 256 - algorithm 9 in section 9.2)
Iterated and salted mode (3.7.1.3)
SHA1 hash (algorithm 2 in section 9.4)
salt of 0x61f8a7c834124c3a
coded count 96 (count then 65536)
passphrase: 'passphrase'

I get
0x66913d886546e5e352edaddff30255d26a4f0b969603131df274720b68d78f6f

(unfortunately this doesn't work in decrypting my MPI)

Thanks,
Douglas Maus


From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 12:49:17 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24531
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 12:49:16 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHHNEkT039446
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 09:23:14 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHHNEUL039445
	for ietf-openpgp-bks; Mon, 17 Nov 2003 09:23:14 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHHNDkT039439
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 09:23:13 -0800 (PST)
	(envelope-from hal@finney.org)
Received: (from hal@localhost)
	by finney.org (8.11.6/8.11.6) id hAHHMI922472
	for ietf-openpgp@imc.org; Mon, 17 Nov 2003 09:22:18 -0800
Date: Mon, 17 Nov 2003 09:22:18 -0800
From: "Hal Finney" <hal@finney.org>
Message-Id: <200311171722.hAHHMI922472@finney.org>
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


Douglas Maus writes:
> 1. In Private Key packets (tag 5, section 5.5.3), what is the bitsize of the CFB mode used in encrypting the secret MPI? For example, AES256 may be performed in CFB 1bit, CFB 8bit and CFB 128bit (1bit, 1octet, and 1block). Is this noted somewhere in the RFC that I'm missing?

CFB in PGP always uses one block shift widths.  That would be 128 bits for
AES.

> 2. Could someone please help me confirm a key from salt and passphrase?
> keysize of 256 (AES 256 - algorithm 9 in section 9.2)
> Iterated and salted mode (3.7.1.3)
> SHA1 hash (algorithm 2 in section 9.4)
> salt of 0x61f8a7c834124c3a
> coded count 96 (count then 65536)
> passphrase: 'passphrase'
>
> I get
> 0x66913d886546e5e352edaddff30255d26a4f0b969603131df274720b68d78f6f

Sorry, I don't have time to do this.

Hal Finney


From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 13:45:48 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27689
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 13:45:48 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHI55kT040898
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 10:05:05 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHI5557040897
	for ietf-openpgp-bks; Mon, 17 Nov 2003 10:05:05 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.transarc.ibm.com (bi-02pt1.bluebird.ibm.com [129.42.208.182])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHI53kT040888
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 10:05:03 -0800 (PST)
	(envelope-from mwy-opgp97@the-youngs.org)
Received: from the-youngs.org (dhcp-196-20.transarc.ibm.com [9.38.196.220]) by mailhost.transarc.ibm.com (8.8.0/8.8.0) with ESMTP id NAA21086 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 13:04:57 -0500 (EST)
Message-ID: <3FB90D5E.8080202@the-youngs.org>
Date: Mon, 17 Nov 2003 13:03:10 -0500
From: Michael Young <mwy-opgp97@the-youngs.org>
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu>
In-Reply-To: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
Content-Transfer-Encoding: 7bit



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I made a quick tweak to my implementation (to emit the raw session
key),
so there's some chance I've goofed, but I got:
     1d.43.a2.ec.02.75.db.29.c1.30.d9.a1.24.28.b6.c6.

Sadly, GnuPG (1.2.2)'s --show-session-key doesn't seem to work on
symmetrically encrypted packets, but it might be easy to tweak.

Good luck!

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBP7kNTOc3iHYL8FknEQIQxgCgjG+7LnJCsAt57Un6ch5OZZ0jcUoAn2V/
XP0C5VqBxkJRH3NrT8Ibx+Lc
=J09U
-----END PGP SIGNATURE-----



From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 14:28:58 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA29320
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 14:28:57 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHJ3lkT042981
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 11:03:47 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHJ3lXJ042980
	for ietf-openpgp-bks; Mon, 17 Nov 2003 11:03:47 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHJ3kkT042972
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 11:03:46 -0800 (PST)
	(envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost)
	by claude.jabberwocky.com (8.11.6/8.11.6) id hAHJ3kr04511
	for ietf-openpgp@imc.org; Mon, 17 Nov 2003 14:03:46 -0500
Date: Mon, 17 Nov 2003 14:03:46 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
Message-ID: <20031117190346.GA3874@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu> <3FB90D5E.8080202@the-youngs.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3FB90D5E.8080202@the-youngs.org>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waning Crescent (44% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


On Mon, Nov 17, 2003 at 01:03:10PM -0500, Michael Young wrote:

> I made a quick tweak to my implementation (to emit the raw session
> key),
> so there's some chance I've goofed, but I got:
>     1d.43.a2.ec.02.75.db.29.c1.30.d9.a1.24.28.b6.c6.

Isn't that too short for a 256-bit key?

I got BD3511280C74BC56D12E066DF12C5E22E1D9776B068F3A276017D59C39397794

> Sadly, GnuPG (1.2.2)'s --show-session-key doesn't seem to work on
> symmetrically encrypted packets, but it might be easy to tweak.

That's not what show-session-key is for.  It's for, well, showing
session keys ;)

David


From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 16:46:21 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA07380
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 16:46:21 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHL6LkT047014
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 13:06:21 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHL6L65047013
	for ietf-openpgp-bks; Mon, 17 Nov 2003 13:06:21 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.transarc.ibm.com (bi-02pt1.bluebird.ibm.com [129.42.208.182])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHL6HkT047002
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 13:06:20 -0800 (PST)
	(envelope-from mwy-opgp97@the-youngs.org)
Received: from the-youngs.org (dhcp-196-20.transarc.ibm.com [9.38.196.220]) by mailhost.transarc.ibm.com (8.8.0/8.8.0) with ESMTP id QAA21257 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 16:06:13 -0500 (EST)
Message-ID: <3FB937C8.6040103@the-youngs.org>
Date: Mon, 17 Nov 2003 16:04:08 -0500
From: Michael Young <mwy-opgp97@the-youngs.org>
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu> <3FB90D5E.8080202@the-youngs.org> <20031117190346.GA3874@jabberwocky.com>
In-Reply-To: <20031117190346.GA3874@jabberwocky.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
Content-Transfer-Encoding: 7bit


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 > Isn't that too short for a 256-bit key?

Indeed, my post included a 128-bit key computation.  (I also
used MD5, rather than SHA1 as asked.)  Sorry about that.

For a 256-bit key, based on SHA1, I get:
     53.f2.fd.a7.69.7d.0b.a6.c0.ee.18.4f.89.db.1d.f8.
     14.6c.d4.ad.36.1b.8c.4e.63.13.ab.68.75.a7.ad.0b.

I also generated a 64k-sized file and tested with "sha1sum",
getting the same first 20 bytes.

 >>Sadly, GnuPG (1.2.2)'s --show-session-key doesn't seem to work on
 >>symmetrically encrypted packets, but it might be easy to tweak.
 >
 >
 > That's not what show-session-key is for.  It's for, well, showing
 > session keys ;)

I think you may have misread my comment as wanting to produce the
session key that protects a secret key, based on the original
context.
I did not. I was talking about a "conventionally encrypted" message,
using a Symmetrically Encrypted Data Packet.  If the S2K doesn't
include an (*optional*) encryption of the session key, then the S2K
computation result *is* the session key; I was simply trying to use
that feature to generate an S2K output to check mine.

I think that the intended purpose of GnuPG's session key feature is
equally applicable here.  If you disagree, I'd be happy to discuss it
in a GnuPG forum.  In any case, it's not an OpenPGP issue.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBP7k3wuc3iHYL8FknEQLiKgCfX19EOKUNQzbuv016mWTTamca9j8AoOEE
l94AOHh1yXmDF5ARHrIvuGxx
=9Yzg
-----END PGP SIGNATURE-----



From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 17:20:02 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA09575
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 17:19:53 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHM0GkT049757
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 14:00:16 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHM0GGx049755
	for ietf-openpgp-bks; Mon, 17 Nov 2003 14:00:16 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHM0FkT049747
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 14:00:15 -0800 (PST)
	(envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost)
	by claude.jabberwocky.com (8.11.6/8.11.6) id hAHM0Gl05265
	for ietf-openpgp@imc.org; Mon, 17 Nov 2003 17:00:16 -0500
Date: Mon, 17 Nov 2003 17:00:16 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
Message-ID: <20031117220016.GD3874@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu> <3FB90D5E.8080202@the-youngs.org> <20031117190346.GA3874@jabberwocky.com> <3FB937C8.6040103@the-youngs.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3FB937C8.6040103@the-youngs.org>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waning Crescent (44% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


On Mon, Nov 17, 2003 at 04:04:08PM -0500, Michael Young wrote:

> > That's not what show-session-key is for.  It's for, well, showing
> > session keys ;)
> 
> I think you may have misread my comment as wanting to produce the
> session key that protects a secret key, based on the original
> context.

Given that the original poster was asking about decrypting his secret
key MPIs, I'm uncertain where a discussion of conventionally encrypted
messages came from.  Context is generally important in having a
discussion as it ties together various thoughts about the sunrise,
which was very pretty this morning.  If there is a GnuPG feature you
want, bring it up on one of the GnuPG lists.  I'll confess I'm not too
sure what behavior you are arguing for.

David


From owner-ietf-openpgp@mail.imc.org  Mon Nov 17 17:58:10 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA11369
	for <openpgp-archive@lists.ietf.org>; Mon, 17 Nov 2003 17:58:10 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHMWakT052301
	for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 14:32:36 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAHMWa5l052300
	for ietf-openpgp-bks; Mon, 17 Nov 2003 14:32:36 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHMWZkT052294
	for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 14:32:35 -0800 (PST)
	(envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost)
	by claude.jabberwocky.com (8.11.6/8.11.6) id hAHMWbX05403
	for ietf-openpgp@imc.org; Mon, 17 Nov 2003 17:32:37 -0500
Date: Mon, 17 Nov 2003 17:32:37 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: Re: Shamir's Discrete Logarithm Hash  //  for possible inclusion into open-pgp ?
Message-ID: <20031117223237.GE3874@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
References: <200311101740.hAAHerlj075662@mailserver1.hushmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <200311101740.hAAHerlj075662@mailserver1.hushmail.com>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waning Crescent (44% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


On Mon, Nov 10, 2003 at 09:40:52AM -0800, vedaal@hush.com wrote:
> 
> Shamir's Discrete Logarithm Hash was recently implemented by Ralf Senderek
> in a new small crypto program, PCP (Pure Crypto Project)
> 
> (hash description is here:)
> http://senderek.de/SDLH/
> 
> it has been around for a while, was proven to be collision resistant,
>  but hasn't really been implemented before, possibly because of the length
> of time required to sign directly with the rsa key
> 
> now, with faster processors,
> this may be an appropriate hash for e-mail-length messages,
> 
> and, as there are plans for the wider SHA hashes to be introduced,
> maybe it would be worthwhile considering a hash will remain secure as
> long as the keysize is considered secure

Back when NASA was gearing up for the Apollo moon missions, they had a
saying that the rocket wasn't launched until the stack of paperwork to
validate, document, analyze, attack, correct, and prove as much as
possible the correctness of the mission was as tall as the rocket
itself.

I don't feel qualified to argue for or against the SDLH in terms of
its security.  I do, however, argue that any new algorithm needs more
than one web page describing it before it should be included in
OpenPGP.  There just aren't enough "inches of paperwork" yet.

There was a very interesting thread about the SDLH and the Pure Crypto
project on the cryptography mailing list a few months ago.
http://www.mit.edu:8008/bloom-picayune/crypto/13163

David


From owner-ietf-openpgp@mail.imc.org  Tue Nov 18 13:26:14 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA05664
	for <openpgp-archive@lists.ietf.org>; Tue, 18 Nov 2003 13:26:13 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAIHmUkT075382
	for <ietf-openpgp-bks@above.proper.com>; Tue, 18 Nov 2003 09:48:30 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAIHmUnS075381
	for ietf-openpgp-bks; Tue, 18 Nov 2003 09:48:30 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp3.hushmail.com (smtp3.hushmail.com [65.39.178.135])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAIHmRkT075370
	for <ietf-openpgp@imc.org>; Tue, 18 Nov 2003 09:48:29 -0800 (PST)
	(envelope-from vedaal@hush.com)
Received: from mailserver1.hushmail.com (mailserver1.hushmail.com [65.39.178.20])
	by smtp3.hushmail.com (Postfix) with ESMTP id A95FD10E7A0
	for <ietf-openpgp@imc.org>; Tue, 18 Nov 2003 09:48:27 -0800 (PST)
Received: from mailserver1.hushmail.com (localhost.hushmail.com [127.0.0.1])
	by mailserver1.hushmail.com (8.12.6/8.12.3) with ESMTP id hAIHmSBQ019562
	for <ietf-openpgp@imc.org>; Tue, 18 Nov 2003 09:48:28 -0800 (PST)
	(envelope-from vedaal@hush.com)
Received: (from nobody@localhost)
	by mailserver1.hushmail.com (8.12.6/8.12.3/Submit) id hAIHmRJu019561
	for ietf-openpgp@imc.org; Tue, 18 Nov 2003 09:48:27 -0800 (PST)
Message-Id: <200311181748.hAIHmRJu019561@mailserver1.hushmail.com>
Date: Tue, 18 Nov 2003 09:48:27 -0800
To: ietf-openpgp@imc.org
Subject: Re: Shamir's Discrete Logarithm Hash 
From: <vedaal@hush.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>




On Mon, 17 Nov 2003 14:32:37 -0800 David Shaw <dshaw@jabberwocky.com>
wrote:

[...]

>I don't feel qualified to argue for or against the SDLH in terms
>of
>its security.  I do, however, argue that any new algorithm needs
>more
>than one web page describing it before it should be included in
>OpenPGP.  There just aren't enough "inches of paperwork" yet.
>
>There was a very interesting thread about the SDLH and the Pure
>Crypto
>project on the cryptography mailing list a few months ago.
>http://www.mit.edu:8008/bloom-picayune/crypto/13163

Thanks, was a very interesting thread!

the only potential practical flaw that was mentioned in the thread, was
that by Peter Wayner, in the event that a signer could be tricked into

signing a specially constructed message,

this could easily be avoided by implementing the hash to have the signer
routinely add some 'salt' 
at the end of the message, after a disclaimer line saying:
"this added line is not part of the content of the message but is added
to avoid certain cryptographic attacks."

a similar approach could also be used by adding a line of plaintext to
an rsa encrypted message, and then signing the 
[rsa message + plaintext line ] 
and avoid a Ross Anderson type attack in those instances where the signature
is on an encrypted rsa message itself.

there is a 'proof' of security by Ron Rivest mentioned in the thread,


and while i agree with you, that it is not yet widely tested / studied
enough to be blanketly accepted as 'secure'

still,
perhaps then, it might find a place as  one of those 
'off-the-beaten-path' niceties offered in gnupg,
as a way to verify pcp signed messages using v3 keys

(with the appropriate cautions like,
"warning, hash not yet fully extensively evaluated by cryptographic community",
 etc.)

and then, as it 'does' get off the ground and get used, and evaluated,

then it will either have a vulnerability found,
or found to be a nice hash function of relatively predictable practical
durability,
(as long as the key size is considered 'secure')


anyway,
just a thought for those periods of 'lull-time' on this list ;-)


vedaal









Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427


From owner-ietf-openpgp@mail.imc.org  Thu Nov 20 15:57:41 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA25734
	for <openpgp-archive@lists.ietf.org>; Thu, 20 Nov 2003 15:57:41 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAKKO5kT051059
	for <ietf-openpgp-bks@above.proper.com>; Thu, 20 Nov 2003 12:24:05 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAKKO5CW051058
	for ietf-openpgp-bks; Thu, 20 Nov 2003 12:24:05 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAKKO4kT051053
	for <ietf-openpgp@imc.org>; Thu, 20 Nov 2003 12:24:05 -0800 (PST)
	(envelope-from dinaras@cnri.reston.va.us)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA23482;
	Thu, 20 Nov 2003 15:23:53 -0500 (EST)
Message-Id: <200311202023.PAA23482@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-openpgp@imc.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-openpgp-rfc2440bis-09.txt
Date: Thu, 20 Nov 2003 15:23:53 -0500
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the An Open Specification for Pretty Good Privacy Working Group of the IETF.

	Title		: OpenPGP Message Format
	Author(s)	: J. Callas, L. Donnerhacke, H. Finney, R. Thayer
	Filename	: draft-ietf-openpgp-rfc2440bis-09.txt
	Pages		: 71
	Date		: 2003-11-20
	
This document is maintained in order to publish all necessary
information needed to develop interoperable applications based on
the OpenPGP format. It is not a step-by-step cookbook for writing an
application. It describes only the format and methods needed to
read, check, generate, and write conforming packets crossing any
network. It does not deal with storage and implementation questions.
It does, however, discuss implementation issues necessary to avoid
security flaws.
OpenPGP software uses a combination of strong public-key and
symmetric cryptography to provide security services for electronic
communications and data storage.  These services include
confidentiality, key management, authentication, and digital
signatures. This document specifies the message formats used in
OpenPGP.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-openpgp-rfc2440bis-09.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-openpgp-rfc2440bis-09.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-openpgp-rfc2440bis-09.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<2003-11-20153857.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-openpgp-rfc2440bis-09.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-openpgp-rfc2440bis-09.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<2003-11-20153857.I-D@ietf.org>

--OtherAccess--

--NextPart--




From owner-ietf-openpgp@mail.imc.org  Fri Nov 21 04:01:31 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA06103
	for <openpgp-archive@lists.ietf.org>; Fri, 21 Nov 2003 04:01:30 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAL8gikT030646
	for <ietf-openpgp-bks@above.proper.com>; Fri, 21 Nov 2003 00:42:44 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAL8giT1030645
	for ietf-openpgp-bks; Fri, 21 Nov 2003 00:42:44 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from www.safe-mail.net (tapuz.safe-mail.net [212.68.149.115])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAL8ggkT030626
	for <ietf-openpgp@imc.org>; Fri, 21 Nov 2003 00:42:43 -0800 (PST)
	(envelope-from poiboy@SAFe-mail.net)
Received: from poiboy@SAFe-mail.net by www.safe-mail.net with SAFe-mail (Exim 4.20)
	id 1AN6s6-0003vr-Os; Fri, 21 Nov 2003 03:42:34 -0500
Received: from pc ([66.91.42.66]) by mail.SAFe-mail.net
Subject: Re: private key CFB
Date: Fri, 21 Nov 2003 08:42:34 +0000
From: poiboy@SAFe-mail.net
To: dmaus@alum.mit.edu
CC: ietf-openpgp@imc.org
X-SMType: Regular
X-SMRef: N1-rL8TjRYd
Message-Id: <N1-rL8TjRYd@SAFe-mail.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>
Content-Transfer-Encoding: 7bit


> Two beginner questions:
..begets at least one beginner's answer:

#1. CFB shifts == the algorithm's block size.
    Blowfish, 3DES, CAST, & IDEA use 8 byte blocks.
    AES (128, 192, 256) and Twofish use 16 byte blocks.

#2. Given the string-to-key parameters:

    Hash algorithm: 2
    Salt: 0x61f8a7c834124c3a 
    Type: 3 
    Count code: 96
    Encryption algorithm: 9
    Passphrase: 'passphrase'

..the resulting string is (previously posted by Michael Young,
seconded by yours truly):
 0x 53 f2 fd a7 69 7d 0b a6 c0 ee 18 4f 89 db 1d f8 
    14 6c d4 ad 36 1b 8c 4e 63 13 ab 68 75 a7 ad 0b 

Grammatically-challenged, I gave up trying to figure out S2K mechanics
using the draft and eventually found a nice code sample at the link
below. I also gave up trying to improve on the documentation which
actually makes a lot more sense once the code is working. :)

My Python-ized version looks something like:

# Given string 'passphrase', string 'salt', integer 'count' (actual
# "big" count, not the "count code"), and integer keysize (16 for
# CAST, Blowfish, and AES128, 24 for 3DES and AES192, and 32 for
# AES256)
# 'hasher' is a magic MD5 or SHA1 hash machine
# len(x) : "length of x"

pos, run, result = 0, 0, ''
while pos < keysize:
    md = [] # reset message digest "hash context" every run
    done = 0
    for i in range(run): # preloaded 0x00s depending on iteration "run"
        md.append('\x00')
    if count < (len(passphrase) + len(salt)):
        count = len(passphrase) + len(salt)
    while (count - done) > (len(passphrase) + len(salt)):
        if (len(salt) > 0):
            md.append(salt)
        md.append(passphrase)
        done = done + len(passphrase) + len(salt)
    for i in range(len(salt)): # "for (i=0; i++; i<=len(salt))"
        if done < count:
            md.append(salt[i]) # byte index of 'salt'
            done += 1
    for i in range(len(passphrase)):
        if done < count:
            md.append(passphrase[i]) 
            done += 1
    hash = hasher.new(''.join(md)).digest() # list joining quirk
    size = len(hash)
    if (pos + size) > keysize:
        size = keysize - pos
    result = ''.join([result[:pos], hash[0:size]]) # quirk again
    pos += size
    run += 1
return result

Best of luck,
the poiboy

CVS source for Cryptix OpenPGP implementation
(file PGPIteratedAndSaltedS2K.java)
http://anoncvs.cryptix.org/co.php/projects/openpgp/src/cryptix/openpgp/algorithm/PGPIteratedAndSaltedS2K.java?r=1.8


From owner-ietf-openpgp@mail.imc.org  Mon Nov 24 17:17:10 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA06370
	for <openpgp-archive@lists.ietf.org>; Mon, 24 Nov 2003 17:17:10 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAOLoEkT068546
	for <ietf-openpgp-bks@above.proper.com>; Mon, 24 Nov 2003 13:50:14 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hAOLoEGv068545
	for ietf-openpgp-bks; Mon, 24 Nov 2003 13:50:14 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hAOLoCkT068540
	for <ietf-openpgp@imc.org>; Mon, 24 Nov 2003 13:50:13 -0800 (PST)
	(envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost)
	by claude.jabberwocky.com (8.11.6/8.11.6) id hAOLoCf24233;
	Mon, 24 Nov 2003 16:50:12 -0500
Date: Mon, 24 Nov 2003 16:50:12 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: Christian Kanja <Christian.Kanja@glueckkanja.com>
Cc: ietf-openpgp@imc.org
Subject: Re: Non UTF-8 Text in Message Body
Message-ID: <20031124215012.GA23802@jabberwocky.com>
Mail-Followup-To: Christian Kanja <Christian.Kanja@glueckkanja.com>,
	ietf-openpgp@imc.org
References: <1ED7BFBAE5FE164B9AF47D5BE458ED3D1D090F@GUK1D002.glueckkanja.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <1ED7BFBAE5FE164B9AF47D5BE458ED3D1D090F@GUK1D002.glueckkanja.org>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waxing Crescent (1% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


The way I read it, "Charset" is little more than a comment.  An
implementation may use the Charset header if it wants to, but on the
recipient side, the other implementation is free to ignore it.

The safe assumption if there is no Charset header should be that the
plaintext is UTF8.

I've cc'd the list, so perhaps someone there will comment as well.

David

> please have a look at felix question - its about the UTF8-handling in
> messages. PGP8 does it "different" and we would be happy about some
> clarification in this topic. what yould you suggest? is it worth to put
> it on the list and if, i would appreciate if you could just forward
> it... ;-).
> 
> thanks a lot,
> best regards,
> christian
> 
> -----Original Message-----
> Sent: Montag, 27. Oktober 2003 18:26
> To: 'ietf-openpgp@imc.org'
> Subject: Non UTF-8 Text in Message Body
> 
> Hi,
> 
> just to clear things up a bit for me:
> Encoding: Is it allowed to encode the message body of a mail in any
> other character set than UTF-8 without using the "Charset" armor header
> key? If I interpret the standard and the current draft correctly, this
> header key MUST be used if text is encoded in any other character set,
> but I think there are some implementations that do not obey this rule...
> Decoding: Is it allowed to assume that an encoded message body is just
> plain ISO-8859-1 if no "Charset" armor header key is present?
> 
> Thanks and best regards,
> Felix Storm,
> Glueck & Kanja Technology AG
> http://www.glueckkanja.com


From owner-ietf-openpgp@mail.imc.org  Sat Nov 29 08:41:42 2003
Received: from above.proper.com (above.proper.com [208.184.76.39])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA15951
	for <openpgp-archive@lists.ietf.org>; Sat, 29 Nov 2003 08:41:42 -0500 (EST)
Received: from above.proper.com (localhost [127.0.0.1])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hATDFbib053499
	for <ietf-openpgp-bks@above.proper.com>; Sat, 29 Nov 2003 05:15:37 -0800 (PST)
	(envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost)
	by above.proper.com (8.12.10/8.12.9/Submit) id hATDFbwG053498
	for ietf-openpgp-bks; Sat, 29 Nov 2003 05:15:37 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222])
	by above.proper.com (8.12.10/8.12.8) with ESMTP id hATDFYib053492
	for <ietf-openpgp@imc.org>; Sat, 29 Nov 2003 05:15:35 -0800 (PST)
	(envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 3.35 #1 (Debian))
	id 1AQ4ls-00057a-00
	for <ietf-openpgp@imc.org>; Sat, 29 Nov 2003 14:04:24 +0100
Received: from wk by alberti.g10code.de with local (Exim 3.36 #1 (Debian))
	id 1AQ4vL-00028R-00; Sat, 29 Nov 2003 14:14:11 +0100
To: ietf-openpgp@imc.org
Subject: Removing Elgamal signatures
From: Werner Koch <wk@gnupg.org>
Organisation: g10 Code GmbH
X-Request-PGP: finger:wk@g10code.com
X-PGP-KeyID:   621CC013
Date: Sat, 29 Nov 2003 14:14:08 +0100
Message-ID: <873cc7uxjz.fsf@alberti.g10code.de>
User-Agent: Gnus/5.1002 (Gnus v5.10.2) Emacs/20.7 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>


Hello!

In the light of the recent GnuPG bug, where I accidently used the same
small sized k for signature creation as it is used for encrypting, I'd
very much like to drop the ElGamal signing ability all together from
OpenPGP.  AFAIK, GnuPG is the only implementation with support for
these keys and by now the about 1100 known primary and subkeys should
have been revoked.  Thus there won't be any interoperability problem
anymore.

Type 20 should thus be declared as reserved (historic use) and all
security notes for this type of key removed.

If we can't agree on that, I'd suggest to declare type 20 keys to be
Elgamal sign only - this way a new problem with this algorithm will
at least not affect the encryption use.

  Werner

-- 
Werner Koch                                      <wk@gnupg.org>
The GnuPG Experts                                http://g10code.com
Free Software Foundation Europe                  http://fsfeurope.org




Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hATDFbib053499 for <ietf-openpgp-bks@above.proper.com>; Sat, 29 Nov 2003 05:15:37 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hATDFbwG053498 for ietf-openpgp-bks; Sat, 29 Nov 2003 05:15:37 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hATDFYib053492 for <ietf-openpgp@imc.org>; Sat, 29 Nov 2003 05:15:35 -0800 (PST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 3.35 #1 (Debian)) id 1AQ4ls-00057a-00 for <ietf-openpgp@imc.org>; Sat, 29 Nov 2003 14:04:24 +0100
Received: from wk by alberti.g10code.de with local (Exim 3.36 #1 (Debian)) id 1AQ4vL-00028R-00; Sat, 29 Nov 2003 14:14:11 +0100
To: ietf-openpgp@imc.org
Subject: Removing Elgamal signatures
From: Werner Koch <wk@gnupg.org>
Organisation: g10 Code GmbH
X-Request-PGP: finger:wk@g10code.com
X-PGP-KeyID:   621CC013
Date: Sat, 29 Nov 2003 14:14:08 +0100
Message-ID: <873cc7uxjz.fsf@alberti.g10code.de>
User-Agent: Gnus/5.1002 (Gnus v5.10.2) Emacs/20.7 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Hello!

In the light of the recent GnuPG bug, where I accidently used the same
small sized k for signature creation as it is used for encrypting, I'd
very much like to drop the ElGamal signing ability all together from
OpenPGP.  AFAIK, GnuPG is the only implementation with support for
these keys and by now the about 1100 known primary and subkeys should
have been revoked.  Thus there won't be any interoperability problem
anymore.

Type 20 should thus be declared as reserved (historic use) and all
security notes for this type of key removed.

If we can't agree on that, I'd suggest to declare type 20 keys to be
Elgamal sign only - this way a new problem with this algorithm will
at least not affect the encryption use.

  Werner

-- 
Werner Koch                                      <wk@gnupg.org>
The GnuPG Experts                                http://g10code.com
Free Software Foundation Europe                  http://fsfeurope.org



Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAOLoEkT068546 for <ietf-openpgp-bks@above.proper.com>; Mon, 24 Nov 2003 13:50:14 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAOLoEGv068545 for ietf-openpgp-bks; Mon, 24 Nov 2003 13:50:14 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAOLoCkT068540 for <ietf-openpgp@imc.org>; Mon, 24 Nov 2003 13:50:13 -0800 (PST) (envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost) by claude.jabberwocky.com (8.11.6/8.11.6) id hAOLoCf24233; Mon, 24 Nov 2003 16:50:12 -0500
Date: Mon, 24 Nov 2003 16:50:12 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: Christian Kanja <Christian.Kanja@glueckkanja.com>
Cc: ietf-openpgp@imc.org
Subject: Re: Non UTF-8 Text in Message Body
Message-ID: <20031124215012.GA23802@jabberwocky.com>
Mail-Followup-To: Christian Kanja <Christian.Kanja@glueckkanja.com>, ietf-openpgp@imc.org
References: <1ED7BFBAE5FE164B9AF47D5BE458ED3D1D090F@GUK1D002.glueckkanja.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <1ED7BFBAE5FE164B9AF47D5BE458ED3D1D090F@GUK1D002.glueckkanja.org>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waxing Crescent (1% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

The way I read it, "Charset" is little more than a comment.  An
implementation may use the Charset header if it wants to, but on the
recipient side, the other implementation is free to ignore it.

The safe assumption if there is no Charset header should be that the
plaintext is UTF8.

I've cc'd the list, so perhaps someone there will comment as well.

David

> please have a look at felix question - its about the UTF8-handling in
> messages. PGP8 does it "different" and we would be happy about some
> clarification in this topic. what yould you suggest? is it worth to put
> it on the list and if, i would appreciate if you could just forward
> it... ;-).
> 
> thanks a lot,
> best regards,
> christian
> 
> -----Original Message-----
> Sent: Montag, 27. Oktober 2003 18:26
> To: 'ietf-openpgp@imc.org'
> Subject: Non UTF-8 Text in Message Body
> 
> Hi,
> 
> just to clear things up a bit for me:
> Encoding: Is it allowed to encode the message body of a mail in any
> other character set than UTF-8 without using the "Charset" armor header
> key? If I interpret the standard and the current draft correctly, this
> header key MUST be used if text is encoded in any other character set,
> but I think there are some implementations that do not obey this rule...
> Decoding: Is it allowed to assume that an encoded message body is just
> plain ISO-8859-1 if no "Charset" armor header key is present?
> 
> Thanks and best regards,
> Felix Storm,
> Glueck & Kanja Technology AG
> http://www.glueckkanja.com


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAL8gikT030646 for <ietf-openpgp-bks@above.proper.com>; Fri, 21 Nov 2003 00:42:44 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAL8giT1030645 for ietf-openpgp-bks; Fri, 21 Nov 2003 00:42:44 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from www.safe-mail.net (tapuz.safe-mail.net [212.68.149.115]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAL8ggkT030626 for <ietf-openpgp@imc.org>; Fri, 21 Nov 2003 00:42:43 -0800 (PST) (envelope-from poiboy@SAFe-mail.net)
Received: from poiboy@SAFe-mail.net by www.safe-mail.net with SAFe-mail (Exim 4.20) id 1AN6s6-0003vr-Os; Fri, 21 Nov 2003 03:42:34 -0500
Received: from pc ([66.91.42.66]) by mail.SAFe-mail.net
Subject: Re: private key CFB
Date: Fri, 21 Nov 2003 08:42:34 +0000
From: poiboy@SAFe-mail.net
To: dmaus@alum.mit.edu
CC: ietf-openpgp@imc.org
X-SMType: Regular
X-SMRef: N1-rL8TjRYd
Message-Id: <N1-rL8TjRYd@SAFe-mail.net>
MIME-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

> Two beginner questions:
..begets at least one beginner's answer:

#1. CFB shifts == the algorithm's block size.
    Blowfish, 3DES, CAST, & IDEA use 8 byte blocks.
    AES (128, 192, 256) and Twofish use 16 byte blocks.

#2. Given the string-to-key parameters:

    Hash algorithm: 2
    Salt: 0x61f8a7c834124c3a 
    Type: 3 
    Count code: 96
    Encryption algorithm: 9
    Passphrase: 'passphrase'

..the resulting string is (previously posted by Michael Young,
seconded by yours truly):
 0x 53 f2 fd a7 69 7d 0b a6 c0 ee 18 4f 89 db 1d f8 
    14 6c d4 ad 36 1b 8c 4e 63 13 ab 68 75 a7 ad 0b 

Grammatically-challenged, I gave up trying to figure out S2K mechanics
using the draft and eventually found a nice code sample at the link
below. I also gave up trying to improve on the documentation which
actually makes a lot more sense once the code is working. :)

My Python-ized version looks something like:

# Given string 'passphrase', string 'salt', integer 'count' (actual
# "big" count, not the "count code"), and integer keysize (16 for
# CAST, Blowfish, and AES128, 24 for 3DES and AES192, and 32 for
# AES256)
# 'hasher' is a magic MD5 or SHA1 hash machine
# len(x) : "length of x"

pos, run, result = 0, 0, ''
while pos < keysize:
    md = [] # reset message digest "hash context" every run
    done = 0
    for i in range(run): # preloaded 0x00s depending on iteration "run"
        md.append('\x00')
    if count < (len(passphrase) + len(salt)):
        count = len(passphrase) + len(salt)
    while (count - done) > (len(passphrase) + len(salt)):
        if (len(salt) > 0):
            md.append(salt)
        md.append(passphrase)
        done = done + len(passphrase) + len(salt)
    for i in range(len(salt)): # "for (i=0; i++; i<=len(salt))"
        if done < count:
            md.append(salt[i]) # byte index of 'salt'
            done += 1
    for i in range(len(passphrase)):
        if done < count:
            md.append(passphrase[i]) 
            done += 1
    hash = hasher.new(''.join(md)).digest() # list joining quirk
    size = len(hash)
    if (pos + size) > keysize:
        size = keysize - pos
    result = ''.join([result[:pos], hash[0:size]]) # quirk again
    pos += size
    run += 1
return result

Best of luck,
the poiboy

CVS source for Cryptix OpenPGP implementation
(file PGPIteratedAndSaltedS2K.java)
http://anoncvs.cryptix.org/co.php/projects/openpgp/src/cryptix/openpgp/algorithm/PGPIteratedAndSaltedS2K.java?r=1.8


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAKKO5kT051059 for <ietf-openpgp-bks@above.proper.com>; Thu, 20 Nov 2003 12:24:05 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAKKO5CW051058 for ietf-openpgp-bks; Thu, 20 Nov 2003 12:24:05 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAKKO4kT051053 for <ietf-openpgp@imc.org>; Thu, 20 Nov 2003 12:24:05 -0800 (PST) (envelope-from dinaras@cnri.reston.va.us)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA23482; Thu, 20 Nov 2003 15:23:53 -0500 (EST)
Message-Id: <200311202023.PAA23482@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: ietf-openpgp@imc.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Subject: I-D ACTION:draft-ietf-openpgp-rfc2440bis-09.txt
Date: Thu, 20 Nov 2003 15:23:53 -0500
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the An Open Specification for Pretty Good Privacy Working Group of the IETF.

	Title		: OpenPGP Message Format
	Author(s)	: J. Callas, L. Donnerhacke, H. Finney, R. Thayer
	Filename	: draft-ietf-openpgp-rfc2440bis-09.txt
	Pages		: 71
	Date		: 2003-11-20
	
This document is maintained in order to publish all necessary
information needed to develop interoperable applications based on
the OpenPGP format. It is not a step-by-step cookbook for writing an
application. It describes only the format and methods needed to
read, check, generate, and write conforming packets crossing any
network. It does not deal with storage and implementation questions.
It does, however, discuss implementation issues necessary to avoid
security flaws.
OpenPGP software uses a combination of strong public-key and
symmetric cryptography to provide security services for electronic
communications and data storage.  These services include
confidentiality, key management, authentication, and digital
signatures. This document specifies the message formats used in
OpenPGP.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-openpgp-rfc2440bis-09.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-openpgp-rfc2440bis-09.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-openpgp-rfc2440bis-09.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<2003-11-20153857.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-openpgp-rfc2440bis-09.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-openpgp-rfc2440bis-09.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<2003-11-20153857.I-D@ietf.org>

--OtherAccess--

--NextPart--




Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAIHmUkT075382 for <ietf-openpgp-bks@above.proper.com>; Tue, 18 Nov 2003 09:48:30 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAIHmUnS075381 for ietf-openpgp-bks; Tue, 18 Nov 2003 09:48:30 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp3.hushmail.com (smtp3.hushmail.com [65.39.178.135]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAIHmRkT075370 for <ietf-openpgp@imc.org>; Tue, 18 Nov 2003 09:48:29 -0800 (PST) (envelope-from vedaal@hush.com)
Received: from mailserver1.hushmail.com (mailserver1.hushmail.com [65.39.178.20]) by smtp3.hushmail.com (Postfix) with ESMTP id A95FD10E7A0 for <ietf-openpgp@imc.org>; Tue, 18 Nov 2003 09:48:27 -0800 (PST)
Received: from mailserver1.hushmail.com (localhost.hushmail.com [127.0.0.1]) by mailserver1.hushmail.com (8.12.6/8.12.3) with ESMTP id hAIHmSBQ019562 for <ietf-openpgp@imc.org>; Tue, 18 Nov 2003 09:48:28 -0800 (PST) (envelope-from vedaal@hush.com)
Received: (from nobody@localhost) by mailserver1.hushmail.com (8.12.6/8.12.3/Submit) id hAIHmRJu019561 for ietf-openpgp@imc.org; Tue, 18 Nov 2003 09:48:27 -0800 (PST)
Message-Id: <200311181748.hAIHmRJu019561@mailserver1.hushmail.com>
Date: Tue, 18 Nov 2003 09:48:27 -0800
To: ietf-openpgp@imc.org
Cc: 
Subject: Re: Shamir's Discrete Logarithm Hash 
From: <vedaal@hush.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, 17 Nov 2003 14:32:37 -0800 David Shaw <dshaw@jabberwocky.com>
wrote:

[...]

>I don't feel qualified to argue for or against the SDLH in terms
>of
>its security.  I do, however, argue that any new algorithm needs
>more
>than one web page describing it before it should be included in
>OpenPGP.  There just aren't enough "inches of paperwork" yet.
>
>There was a very interesting thread about the SDLH and the Pure
>Crypto
>project on the cryptography mailing list a few months ago.
>http://www.mit.edu:8008/bloom-picayune/crypto/13163

Thanks, was a very interesting thread!

the only potential practical flaw that was mentioned in the thread, was
that by Peter Wayner, in the event that a signer could be tricked into

signing a specially constructed message,

this could easily be avoided by implementing the hash to have the signer
routinely add some 'salt' 
at the end of the message, after a disclaimer line saying:
"this added line is not part of the content of the message but is added
to avoid certain cryptographic attacks."

a similar approach could also be used by adding a line of plaintext to
an rsa encrypted message, and then signing the 
[rsa message + plaintext line ] 
and avoid a Ross Anderson type attack in those instances where the signature
is on an encrypted rsa message itself.

there is a 'proof' of security by Ron Rivest mentioned in the thread,


and while i agree with you, that it is not yet widely tested / studied
enough to be blanketly accepted as 'secure'

still,
perhaps then, it might find a place as  one of those 
'off-the-beaten-path' niceties offered in gnupg,
as a way to verify pcp signed messages using v3 keys

(with the appropriate cautions like,
"warning, hash not yet fully extensively evaluated by cryptographic community",
 etc.)

and then, as it 'does' get off the ground and get used, and evaluated,

then it will either have a vulnerability found,
or found to be a nice hash function of relatively predictable practical
durability,
(as long as the key size is considered 'secure')


anyway,
just a thought for those periods of 'lull-time' on this list ;-)


vedaal









Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHMWakT052301 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 14:32:36 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHMWa5l052300 for ietf-openpgp-bks; Mon, 17 Nov 2003 14:32:36 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHMWZkT052294 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 14:32:35 -0800 (PST) (envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost) by claude.jabberwocky.com (8.11.6/8.11.6) id hAHMWbX05403 for ietf-openpgp@imc.org; Mon, 17 Nov 2003 17:32:37 -0500
Date: Mon, 17 Nov 2003 17:32:37 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: Re: Shamir's Discrete Logarithm Hash  //  for possible inclusion into open-pgp ?
Message-ID: <20031117223237.GE3874@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
References: <200311101740.hAAHerlj075662@mailserver1.hushmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <200311101740.hAAHerlj075662@mailserver1.hushmail.com>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waning Crescent (44% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, Nov 10, 2003 at 09:40:52AM -0800, vedaal@hush.com wrote:
> 
> Shamir's Discrete Logarithm Hash was recently implemented by Ralf Senderek
> in a new small crypto program, PCP (Pure Crypto Project)
> 
> (hash description is here:)
> http://senderek.de/SDLH/
> 
> it has been around for a while, was proven to be collision resistant,
>  but hasn't really been implemented before, possibly because of the length
> of time required to sign directly with the rsa key
> 
> now, with faster processors,
> this may be an appropriate hash for e-mail-length messages,
> 
> and, as there are plans for the wider SHA hashes to be introduced,
> maybe it would be worthwhile considering a hash will remain secure as
> long as the keysize is considered secure

Back when NASA was gearing up for the Apollo moon missions, they had a
saying that the rocket wasn't launched until the stack of paperwork to
validate, document, analyze, attack, correct, and prove as much as
possible the correctness of the mission was as tall as the rocket
itself.

I don't feel qualified to argue for or against the SDLH in terms of
its security.  I do, however, argue that any new algorithm needs more
than one web page describing it before it should be included in
OpenPGP.  There just aren't enough "inches of paperwork" yet.

There was a very interesting thread about the SDLH and the Pure Crypto
project on the cryptography mailing list a few months ago.
http://www.mit.edu:8008/bloom-picayune/crypto/13163

David


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHM0GkT049757 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 14:00:16 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHM0GGx049755 for ietf-openpgp-bks; Mon, 17 Nov 2003 14:00:16 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHM0FkT049747 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 14:00:15 -0800 (PST) (envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost) by claude.jabberwocky.com (8.11.6/8.11.6) id hAHM0Gl05265 for ietf-openpgp@imc.org; Mon, 17 Nov 2003 17:00:16 -0500
Date: Mon, 17 Nov 2003 17:00:16 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
Message-ID: <20031117220016.GD3874@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu> <3FB90D5E.8080202@the-youngs.org> <20031117190346.GA3874@jabberwocky.com> <3FB937C8.6040103@the-youngs.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3FB937C8.6040103@the-youngs.org>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waning Crescent (44% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, Nov 17, 2003 at 04:04:08PM -0500, Michael Young wrote:

> > That's not what show-session-key is for.  It's for, well, showing
> > session keys ;)
> 
> I think you may have misread my comment as wanting to produce the
> session key that protects a secret key, based on the original
> context.

Given that the original poster was asking about decrypting his secret
key MPIs, I'm uncertain where a discussion of conventionally encrypted
messages came from.  Context is generally important in having a
discussion as it ties together various thoughts about the sunrise,
which was very pretty this morning.  If there is a GnuPG feature you
want, bring it up on one of the GnuPG lists.  I'll confess I'm not too
sure what behavior you are arguing for.

David


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHL6LkT047014 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 13:06:21 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHL6L65047013 for ietf-openpgp-bks; Mon, 17 Nov 2003 13:06:21 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.transarc.ibm.com (bi-02pt1.bluebird.ibm.com [129.42.208.182]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHL6HkT047002 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 13:06:20 -0800 (PST) (envelope-from mwy-opgp97@the-youngs.org)
Received: from the-youngs.org (dhcp-196-20.transarc.ibm.com [9.38.196.220]) by mailhost.transarc.ibm.com (8.8.0/8.8.0) with ESMTP id QAA21257 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 16:06:13 -0500 (EST)
Message-ID: <3FB937C8.6040103@the-youngs.org>
Date: Mon, 17 Nov 2003 16:04:08 -0500
From: Michael Young <mwy-opgp97@the-youngs.org>
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu> <3FB90D5E.8080202@the-youngs.org> <20031117190346.GA3874@jabberwocky.com>
In-Reply-To: <20031117190346.GA3874@jabberwocky.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 > Isn't that too short for a 256-bit key?

Indeed, my post included a 128-bit key computation.  (I also
used MD5, rather than SHA1 as asked.)  Sorry about that.

For a 256-bit key, based on SHA1, I get:
     53.f2.fd.a7.69.7d.0b.a6.c0.ee.18.4f.89.db.1d.f8.
     14.6c.d4.ad.36.1b.8c.4e.63.13.ab.68.75.a7.ad.0b.

I also generated a 64k-sized file and tested with "sha1sum",
getting the same first 20 bytes.

 >>Sadly, GnuPG (1.2.2)'s --show-session-key doesn't seem to work on
 >>symmetrically encrypted packets, but it might be easy to tweak.
 >
 >
 > That's not what show-session-key is for.  It's for, well, showing
 > session keys ;)

I think you may have misread my comment as wanting to produce the
session key that protects a secret key, based on the original
context.
I did not. I was talking about a "conventionally encrypted" message,
using a Symmetrically Encrypted Data Packet.  If the S2K doesn't
include an (*optional*) encryption of the session key, then the S2K
computation result *is* the session key; I was simply trying to use
that feature to generate an S2K output to check mine.

I think that the intended purpose of GnuPG's session key feature is
equally applicable here.  If you disagree, I'd be happy to discuss it
in a GnuPG forum.  In any case, it's not an OpenPGP issue.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBP7k3wuc3iHYL8FknEQLiKgCfX19EOKUNQzbuv016mWTTamca9j8AoOEE
l94AOHh1yXmDF5ARHrIvuGxx
=9Yzg
-----END PGP SIGNATURE-----



Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHJ3lkT042981 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 11:03:47 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHJ3lXJ042980 for ietf-openpgp-bks; Mon, 17 Nov 2003 11:03:47 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from claude.jabberwocky.com (walrus.ne.client2.attbi.com [24.60.132.70]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHJ3kkT042972 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 11:03:46 -0800 (PST) (envelope-from dshaw@jabberwocky.com)
Received: (from dshaw@localhost) by claude.jabberwocky.com (8.11.6/8.11.6) id hAHJ3kr04511 for ietf-openpgp@imc.org; Mon, 17 Nov 2003 14:03:46 -0500
Date: Mon, 17 Nov 2003 14:03:46 -0500
From: David Shaw <dshaw@jabberwocky.com>
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
Message-ID: <20031117190346.GA3874@jabberwocky.com>
Mail-Followup-To: ietf-openpgp@imc.org
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu> <3FB90D5E.8080202@the-youngs.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <3FB90D5E.8080202@the-youngs.org>
X-PGP-Key: 99242560 / 7D92 FD31 3AB6 F373 4CC5 9CA1 DB69 8D71 9924 2560
X-Request-PGP: http://www.jabberwocky.com/david/keys.asc
X-Phase-Of-Moon: The Moon is Waning Crescent (44% of Full)
User-Agent: Mutt/1.5.5i
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, Nov 17, 2003 at 01:03:10PM -0500, Michael Young wrote:

> I made a quick tweak to my implementation (to emit the raw session
> key),
> so there's some chance I've goofed, but I got:
>     1d.43.a2.ec.02.75.db.29.c1.30.d9.a1.24.28.b6.c6.

Isn't that too short for a 256-bit key?

I got BD3511280C74BC56D12E066DF12C5E22E1D9776B068F3A276017D59C39397794

> Sadly, GnuPG (1.2.2)'s --show-session-key doesn't seem to work on
> symmetrically encrypted packets, but it might be easy to tweak.

That's not what show-session-key is for.  It's for, well, showing
session keys ;)

David


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHI55kT040898 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 10:05:05 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHI5557040897 for ietf-openpgp-bks; Mon, 17 Nov 2003 10:05:05 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.transarc.ibm.com (bi-02pt1.bluebird.ibm.com [129.42.208.182]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHI53kT040888 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 10:05:03 -0800 (PST) (envelope-from mwy-opgp97@the-youngs.org)
Received: from the-youngs.org (dhcp-196-20.transarc.ibm.com [9.38.196.220]) by mailhost.transarc.ibm.com (8.8.0/8.8.0) with ESMTP id NAA21086 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 13:04:57 -0500 (EST)
Message-ID: <3FB90D5E.8080202@the-youngs.org>
Date: Mon, 17 Nov 2003 13:03:10 -0500
From: Michael Young <mwy-opgp97@the-youngs.org>
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
References: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu>
In-Reply-To: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I made a quick tweak to my implementation (to emit the raw session
key),
so there's some chance I've goofed, but I got:
     1d.43.a2.ec.02.75.db.29.c1.30.d9.a1.24.28.b6.c6.

Sadly, GnuPG (1.2.2)'s --show-session-key doesn't seem to work on
symmetrically encrypted packets, but it might be easy to tweak.

Good luck!

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBP7kNTOc3iHYL8FknEQIQxgCgjG+7LnJCsAt57Un6ch5OZZ0jcUoAn2V/
XP0C5VqBxkJRH3NrT8Ibx+Lc
=J09U
-----END PGP SIGNATURE-----



Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHHNEkT039446 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 09:23:14 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHHNEUL039445 for ietf-openpgp-bks; Mon, 17 Nov 2003 09:23:14 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHHNDkT039439 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 09:23:13 -0800 (PST) (envelope-from hal@finney.org)
Received: (from hal@localhost) by finney.org (8.11.6/8.11.6) id hAHHMI922472 for ietf-openpgp@imc.org; Mon, 17 Nov 2003 09:22:18 -0800
Date: Mon, 17 Nov 2003 09:22:18 -0800
From: "Hal Finney" <hal@finney.org>
Message-Id: <200311171722.hAHHMI922472@finney.org>
To: ietf-openpgp@imc.org
Subject: Re: private key CFB
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Douglas Maus writes:
> 1. In Private Key packets (tag 5, section 5.5.3), what is the bitsize of the CFB mode used in encrypting the secret MPI? For example, AES256 may be performed in CFB 1bit, CFB 8bit and CFB 128bit (1bit, 1octet, and 1block). Is this noted somewhere in the RFC that I'm missing?

CFB in PGP always uses one block shift widths.  That would be 128 bits for
AES.

> 2. Could someone please help me confirm a key from salt and passphrase?
> keysize of 256 (AES 256 - algorithm 9 in section 9.2)
> Iterated and salted mode (3.7.1.3)
> SHA1 hash (algorithm 2 in section 9.4)
> salt of 0x61f8a7c834124c3a
> coded count 96 (count then 65536)
> passphrase: 'passphrase'
>
> I get
> 0x66913d886546e5e352edaddff30255d26a4f0b969603131df274720b68d78f6f

Sorry, I don't have time to do this.

Hal Finney


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHCsSkT023371 for <ietf-openpgp-bks@above.proper.com>; Mon, 17 Nov 2003 04:54:28 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAHCsSCs023370 for ietf-openpgp-bks; Mon, 17 Nov 2003 04:54:28 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from brunch.mit.edu (BRUNCH.MIT.EDU [18.92.0.171]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAHCsRkT023363 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 04:54:27 -0800 (PST) (envelope-from dmaus@alum.mit.edu)
Received: from brunch.mit.edu (localhost [127.0.0.1]) by brunch.mit.edu (8.12.10/8.12.8) with ESMTP id hAHCsQCn014522 for <ietf-openpgp@imc.org>; Mon, 17 Nov 2003 07:54:26 -0500 (EST)
Date: Mon, 17 Nov 2003 07:54:26 -0500 (EST)
Message-ID: <8010860.1069073666253.JavaMail.cyyang@brunch.mit.edu>
From: Douglas Maus <dmaus@alum.mit.edu>
Reply-To: Douglas Maus <dmaus@alum.mit.edu>
To: ietf-openpgp@imc.org
Subject: private key CFB
Mime-Version: 1.0
Content-Type: text/plain
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Two beginner questions:

1. In Private Key packets (tag 5, section 5.5.3), what is the bitsize of the CFB mode used in encrypting the secret MPI? For example, AES256 may be performed in CFB 1bit, CFB 8bit and CFB 128bit (1bit, 1octet, and 1block). Is this noted somewhere in the RFC that I'm missing?

2. Could someone please help me confirm a key from salt and passphrase?
keysize of 256 (AES 256 - algorithm 9 in section 9.2)
Iterated and salted mode (3.7.1.3)
SHA1 hash (algorithm 2 in section 9.4)
salt of 0x61f8a7c834124c3a
coded count 96 (count then 65536)
passphrase: 'passphrase'

I get
0x66913d886546e5e352edaddff30255d26a4f0b969603131df274720b68d78f6f

(unfortunately this doesn't work in decrypting my MPI)

Thanks,
Douglas Maus


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAJ4lkT087868 for <ietf-openpgp-bks@above.proper.com>; Mon, 10 Nov 2003 11:04:47 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAAJ4l7c087867 for ietf-openpgp-bks; Mon, 10 Nov 2003 11:04:47 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAJ4jkT087862 for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 11:04:46 -0800 (PST) (envelope-from hal@finney.org)
Received: (from hal@localhost) by finney.org (8.11.6/8.11.6) id hAAJ3UV29397 for ietf-openpgp@imc.org; Mon, 10 Nov 2003 11:03:30 -0800
Date: Mon, 10 Nov 2003 11:03:30 -0800
From: "Hal Finney" <hal@finney.org>
Message-Id: <200311101903.hAAJ3UV29397@finney.org>
To: ietf-openpgp@imc.org
Subject: Re: Shamir's Discrete Logarithm Hash  //  for possible inclusion into open-pgp ?
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Vedaal writes:
> Shamir's Discrete Logarithm Hash was recently implemented by Ralf Senderek
> in a new small crypto program, PCP (Pure Crypto Project)
>
> (hash description is here:)
> http://senderek.de/SDLH/

It's security properties are a little unusual, in that the creator of
the hash function can forge collisions.  Senderek has the creator be
the signer, which seems to work OK, but it is still different enough
from traditional hashes that it makes me wonder.

Traditionally, signature security proofs are based on a random oracle
model, while this hash function is like a random oracle with a trap door.
I don't know if there exist security proofs for that arrangement.

> (although it won't work for dh keys ;-(  )

I don't see why it can't.  The hash's RSA modulus has nothing to do
with the signature key.

Hal Finney


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAHeskT084019 for <ietf-openpgp-bks@above.proper.com>; Mon, 10 Nov 2003 09:40:54 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hAAHerf0084018 for ietf-openpgp-bks; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp3.hushmail.com (smtp3.hushmail.com [65.39.178.135]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hAAHeqkT084013 for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 09:40:52 -0800 (PST) (envelope-from vedaal@hush.com)
Received: from mailserver1.hushmail.com (mailserver1.hushmail.com [65.39.178.20]) by smtp3.hushmail.com (Postfix) with ESMTP id 2252F10E72C for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
Received: from mailserver1.hushmail.com (localhost.hushmail.com [127.0.0.1]) by mailserver1.hushmail.com (8.12.6/8.12.3) with ESMTP id hAAHerBQ075663 for <ietf-openpgp@imc.org>; Mon, 10 Nov 2003 09:40:53 -0800 (PST) (envelope-from vedaal@hush.com)
Received: (from nobody@localhost) by mailserver1.hushmail.com (8.12.6/8.12.3/Submit) id hAAHerlj075662 for ietf-openpgp@imc.org; Mon, 10 Nov 2003 09:40:53 -0800 (PST)
Message-Id: <200311101740.hAAHerlj075662@mailserver1.hushmail.com>
Date: Mon, 10 Nov 2003 09:40:52 -0800
To: ietf-openpgp@imc.org
Cc: 
Subject: Shamir's Discrete Logarithm Hash  //  for possible inclusion into open-pgp ?
From: <vedaal@hush.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Shamir's Discrete Logarithm Hash was recently implemented by Ralf Senderek
in a new small crypto program, PCP (Pure Crypto Project)

(hash description is here:)
http://senderek.de/SDLH/

it has been around for a while, was proven to be collision resistant,
 but hasn't really been implemented before, possibly because of the length
of time required to sign directly with the rsa key

now, with faster processors,
this may be an appropriate hash for e-mail-length messages,

and, as there are plans for the wider SHA hashes to be introduced,
maybe it would be worthwhile considering a hash will remain secure as
long as the keysize is considered secure

(although it won't work for dh keys ;-(  )


just a thought,

vedaal



Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2

Free, ultra-private instant messaging with Hush Messenger
https://www.hushmail.com/services.php?subloc=messenger&l=434

Promote security and make money with the Hushmail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427


Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4MSKkT075207 for <ietf-openpgp-bks@above.proper.com>; Tue, 4 Nov 2003 14:28:20 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hA4MSKhN075206 for ietf-openpgp-bks; Tue, 4 Nov 2003 14:28:20 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mtaw4.prodigy.net (mtaw4.prodigy.net [64.164.98.52]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4MSIkT075200 for <ietf-openpgp@imc.org>; Tue, 4 Nov 2003 14:28:19 -0800 (PST) (envelope-from trevp@trevp.net)
Received: from TREVOR.trevp.net (adsl-68-122-41-120.dsl.pltn13.pacbell.net [68.122.41.120]) by mtaw4.prodigy.net (8.12.10/8.12.10) with ESMTP id hA4MSJYT003502; Tue, 4 Nov 2003 14:28:20 -0800 (PST)
Message-Id: <5.2.0.9.0.20031104135303.0444de40@pop.sbcglobal.yahoo.com>
X-Sender: trevorperrin@sbcglobal.net@pop.sbcglobal.yahoo.com
X-Mailer: QUALCOMM Windows Eudora Version 5.2.0.9
Date: Tue, 04 Nov 2003 14:27:52 -0800
To: Michael Young <mwy-opgp97@the-youngs.org>, ietf-openpgp@imc.org
From: Trevor Perrin <trevp@trevp.net>
Subject: Re: theory (was Re: Back-signatures proposal)
In-Reply-To: <3FA7E536.5020608@the-youngs.org>
References: <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com> <20031028163528.GA6792@jabberwocky.com> <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

At 12:43 PM 11/4/2003 -0500, Michael Young wrote:
>Content-Transfer-Encoding: 7bit
>
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>Trevor Perrin wrote [excerpts quoted out of order]:
>...
> > I notice the patent has a signature on it, and I know the USPTO is
> > in the habit of signing pending applications with its own key.
> >
> > I go to a PGP key server and find a key claiming to belong to
> > USPTO. I use it to verify the application.  Since it verifies, I
> > jump to the conclusion that the key belongs to the USPTO.
>
>Yes, you have made a serious error in verifying that key.
>
>You wouldn't do this with a document you received insecurely.  You
>wouldn't do this if you considered the possibility that the USPTO
>site might vend documents signed by others, a perfectly reasonable
>possibility.
>
>You seem to be relying on this preface:
>
> > Suppose I download the patent application from USPTO's site, over a
> > secure link.

Yes, I'm relying on that.



>If you believe that the link is secure, why wouldn't you use it
>to retrieve the USPTO's key?

Agreed, that would be better.

I'm not saying that verifying a document with a key is a *good* way to 
authenticate the key.  I'm just saying it's something a foolish user might do.

Perhaps such a user deserves what he gets.

However, including relevant fingerprints (of the signing key and primary 
key) in every signature makes the above safe, whereas the subkey 
back-signature doesn't, entirely.  It also makes safe the case where 
subkeys are re-used under different primary keys.  Since I think the 
fingerprint solution is also simpler and more efficient, my vote is for that.

But I also agree with David when he says:

"...either of the proposed fixes raises the bar sufficiently to stop casual 
exploitation."

so I'm fine with either approach.

Trevor 



Received: from above.proper.com (localhost [127.0.0.1]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4HjGkT064860 for <ietf-openpgp-bks@above.proper.com>; Tue, 4 Nov 2003 09:45:16 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.10/8.12.9/Submit) id hA4HjGNW064859 for ietf-openpgp-bks; Tue, 4 Nov 2003 09:45:16 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.transarc.ibm.com (bi-02pt1.bluebird.ibm.com [129.42.208.182]) by above.proper.com (8.12.10/8.12.8) with ESMTP id hA4HjBkT064851 for <ietf-openpgp@imc.org>; Tue, 4 Nov 2003 09:45:13 -0800 (PST) (envelope-from mwy-opgp97@the-youngs.org)
Received: from the-youngs.org (dhcp-196-20.transarc.ibm.com [9.38.196.220]) by mailhost.transarc.ibm.com (8.8.0/8.8.0) with ESMTP id MAA29670 for <ietf-openpgp@imc.org>; Tue, 4 Nov 2003 12:44:57 -0500 (EST)
Message-ID: <3FA7E536.5020608@the-youngs.org>
Date: Tue, 04 Nov 2003 12:43:18 -0500
From: Michael Young <mwy-opgp97@the-youngs.org>
User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.5) Gecko/20031007
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: ietf-openpgp@imc.org
Subject: Re: theory (was Re: Back-signatures proposal)
References: <20031028163528.GA6792@jabberwocky.com> <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
In-Reply-To: <5.2.0.9.0.20031031103638.03ab7420@pop.sbcglobal.yahoo.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Trevor Perrin wrote [excerpts quoted out of order]:
...
 > I notice the patent has a signature on it, and I know the USPTO is
 > in the habit of signing pending applications with its own key.
 >
 > I go to a PGP key server and find a key claiming to belong to
 > USPTO. I use it to verify the application.  Since it verifies, I
 > jump to the conclusion that the key belongs to the USPTO.

Yes, you have made a serious error in verifying that key.

You wouldn't do this with a document you received insecurely.  You
wouldn't do this if you considered the possibility that the USPTO
site might vend documents signed by others, a perfectly reasonable
possibility.

You seem to be relying on this preface:

 > Suppose I download the patent application from USPTO's site, over a
 > secure link.

If you believe that the link is secure, why wouldn't you use it
to retrieve the USPTO's key?  [OK, they might not publish their
key this way.  Ask them to do so.  If they won't take that
seriously, why would you trust signatures gathered this way?]

Even this has its risks -- a generic "secure link" (like HTTPS)
doesn't carry the connotations that a key certification does.  But it
seems less likely that an organization would securely publish dubious
keys (particularly ones that refer to themselves) than documents
signed by third parties.  FAR less likely if the key is explicitly
introduced, for example with text to the effect "this is a USPTO
key".

Now, all that said, I'm quite happy with defining a subkey
cross-signature mechanism (and with David Shaw's proposal in
particular).  Let's just not overstate the problem.


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBP6flHuc3iHYL8FknEQL+4ACgy0ACDS1iAWzdZcnw+9jAeHIjy3IAn1Gb
eZvd12MCfhrJNMDXbFfGFbwx
=baY9
-----END PGP SIGNATURE-----



