
From openmind@apollo.lv  Fri May  1 14:27:50 2009
Return-Path: <openmind@apollo.lv>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A5DA93A679F for <ietfarch-openpgp-archive@core3.amsl.com>; Fri,  1 May 2009 14:27:50 -0700 (PDT)
X-Quarantine-ID: <Vpp4Qe9UqFPP>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char AE hex): Subject: SALE 75% OFF on VIAGRA\256 \n
X-Spam-Flag: NO
X-Spam-Score: -54.613
X-Spam-Level: 
X-Spam-Status: No, score=-54.613 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DRUGS_ERECTILE=1, DRUG_ED_CAPS=0.322, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, GB_I_LETTER=-2, GB_PHARMACY=1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RDNS_DYNAMIC=0.1, SARE_UNI=0.591, SUBJECT_NEEDS_ENCODING=0.001, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vpp4Qe9UqFPP for <ietfarch-openpgp-archive@core3.amsl.com>; Fri,  1 May 2009 14:27:42 -0700 (PDT)
Received: from ip-85-160-3-77.eurotel.cz (ip-85-160-3-77.eurotel.cz [85.160.3.77]) by core3.amsl.com (Postfix) with SMTP id F0B4B3A69A8 for <openpgp-archive@ietf.org>; Fri,  1 May 2009 14:27:37 -0700 (PDT)
Content-Return: allowed 
X-Mailer: CME-V6.5.4.3; MSN 
Received: (qmail 2768 by uid 168); Fri, 1 May 2009 11:29:12 +0100
Message-Id: <20090501122912.2770.qmail@ip-85-160-3-77.eurotel.cz>
To: <openpgp-archive@ietf.org>
Subject: SALE 75% OFF on VIAGRA® 
From: <openpgp-archive@ietf.org>
MIME-Version: 1.0
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Date: Fri,  1 May 2009 14:27:37 -0700 (PDT)

<title>Bernat® Newsletter - Spring 2009</title><body>
<p style="MARGIN-BOTTOM: 1.5em; FONT: 11px Arial, sans-serif; COLOR: #999999; TEXT-ALIGN: center">This e-mail was sent to you by Pharmacy®. You are receiving this email because you have subscribed to the
 Viagra® newsletter with the following address: openpgp-archive@ietf.org. <br>
<br>
<a href="http://www.boostfresh.com" target="_blank">View Web Version</a> || <a href="http://www.boostfresh.com" target="_blank">Privacy policy</a> | <a href="http://www.fabaroma.com" target="_blank">Contact us</a></p>
<table width="540" border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#ffffff">
 <tr>
 <td><table width="100%" border="0" cellpadding="0" cellspacing="0">
 <tr valign="center">
  <td width="3" height="1" valign="top"><a href="http://www.bernat.com/?utm_source=newsletter&utm_medium=email&utm_content=bernat&utm_campaign=summer2008" target="_blank"></a></td>
     <td width="537" align="right" valign="top" background="http://www.bernat.com/email/img/c.gif" style="FONT: 12px Arial, sans-serif; COLOR: #99191c; MARGIN-RIGHT: 6px"
         ><a href="http://www.boostfresh.com" 
            target="_blank"><img src="http://www.bernat.com/email/img/shim.gif" width="355" height="54" border="0"></a><br></td>
    </tr>
 <tr>
   <td colspan="2" align="right" valign="bottom" background="http://www.bernat.com/email/img/shim.gif"><span style="FONT: 12px Arial, sans-serif; COLOR: #99191c; MARGIN-RIGHT: 6px"><span align="RIGHT" style="MARGIN-RIGHT: 9px">Member's Newsletter </span><br>
       <span align="RIGHT" style="MARGIN-RIGHT: 9px">Summer 2008 </span> </span></td>
 </tr>
 </table></td>
 </tr>
</table>
<table width="583" border="0" align="center" cellpadding="0" cellspacing="0" bgcolor="#ffffff" style="BORDER-RIGHT: #4e4469 1px solid; BORDER-TOP: #4e4469 1px solid; BORDER-LEFT: #4e4469 1px solid; BORDER-BOTTOM: #4e4469 1px solid">
 <tr>
 <td width="581" style="PADDING-RIGHT: 12px; PADDING-LEFT: 12px; PADDING-BOTTOM: 12px; PADDING-TOP: 12px"
   ><div style="PADDING-RIGHT: 3px; PADDING-LEFT: 7px; MARGIN-BOTTOM: 1.5em; PADDING-BOTTOM: 3px; FONT: 18px Arial, Helvetica, sans-serif; COLOR: #fff; PADDING-TOP: 3px; BACKGROUND-COLOR: #a6b463"
     >Satisfaction Guaranteed -   Our Company wants you to be absolutely satisfied with your pharmacy.<BR>
    If, within 30 days of receiving your purchase you're not   completely<BR>
   satisfied, return it for the price you paid or we will gladly   replace it. <br>
     <br>
   </div>
   <table width="100%" border="0" cellspacing="0" cellpadding="0" style="BORDER-RIGHT: #99191c 1px dashed; BORDER-TOP: #99191c 1px dashed; FONT: 12px Arial, sans-serif; BORDER-LEFT: #99191c 1px dashed; COLOR: #4f2510; BORDER-BOTTOM: #99191c 1px dashed; BACKGROUND-COLOR: #fcfae5"
     >
  <tr>
   <td valign="top" style="PADDING-RIGHT: 10px; PADDING-LEFT: 10px; PADDING-BOTTOM: 10px; PADDING-TOP: 10px"
         ><a href="http://www.fabaroma.com"><img src="http://mediapix.ru/pics/c53e44bf1bf9e82bbba82903e7164118.gif" border="0"></a></td>
         <td align="middle" valign="top"><a href="http://www.bernat.com/patternbook.php?PBS=530168"></a><a href="http://www.boostfresh.com" target="_blank"><img src="http://www.bernat.com/newsletters/summer2008/satincardigan.jpg" alt="Web Exclusive Satin Lace Cardigan" border="0"></a></td>
       </tr>
      </table><br>
	   
     <div style="MARGIN-BOTTOM: 1.5em; HEIGHT: 4px; BACKGROUND-COLOR: #a6b463"
     ></div>
     <p style="MARGIN-BOTTOM: 1.5em; FONT: 12px Arial, sans-serif; COLOR: #4f2510"
     ><a href="http://www.boostfresh.com"><ing src="http://www.fabaroma.com/mainvq7.jpg" border="0"></a></p>
     <p style="MARGIN-BOTTOM: 1.5em; FONT: 12px Arial, sans-serif; COLOR: #4f2510"
     ><a href="http://www.fabaroma.com"
      target="_blank"><img src="http://www.bernat.com/images/interior/buyonline-bernat.jpg" alt="Buy Online" width="180" height="42" border="0" align="absMiddle"></a></p>
     <p style="MARGIN-BOTTOM: 1.5em; FONT: 12px Arial, sans-serif; COLOR: #4f2510"
     > </p>
     <p> </p></td>
 </tr>
 <tr>
   <td> </td>
 </tr>
 <tr>
 <td style="PADDING-RIGHT: 6px; PADDING-LEFT: 6px; PADDING-BOTTOM: 6px; PADDING-TOP: 6px"
   ><table width="100%" border="0" cellspacing="0" cellpadding="4" style="BORDER-RIGHT: #4e4469 1px solid; BORDER-TOP: #4e4469 1px solid; FONT: 12px Arial, sans-serif; BORDER-LEFT: #4e4469 1px solid; COLOR: #4f2510; BORDER-BOTTOM: #4e4469 1px solid"
     >
 <tr>
  <td bgcolor="#ffffff" style="FONT: 11px Arial, sans-serif; COLOR: #4f2510"
         ><p style="FONT: 11px Arial, sans-serif; COLOR: #4f2510">You are
    receiving this email because you have subscribed to the Pharmacy® newsletter with the following address: openpgp-archive@ietf.org.<br>
    <br>
    <span style="FONT: 11px Arial, sans-serif; COLOR: #999999"
           ><a =
href="http://www.fabaroma.com" target="_blank">Unsubscribe</a><a href="http://www.bernat.com/newsletters/spring2008web.html" target="_blank"></a><a href="http://www.bernat.com/member.php?utm_source=newsletter&utm_medium=email&utm_content=membersettings&utm_campaign=summer2008" target="_blank"></a> | <a href="http://www.boostfresh.com" target="_blank">Privacy policy</a> | <a href="http://www.fabaroma.com" target="_blank">Contact us </a></span></p>
       <p style="FONT: 11px Arial, sans-serif; COLOR: #4f2510"
            align=right>© 2008 Pharmacy All rights
   reserved.</p>
       </td>
    </tr>
 </table></td>
 </tr>
</table>
</body>

</html>


From openmind710@eircom.net  Sat May  2 14:04:08 2009
Return-Path: <openmind710@eircom.net>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 807563A6EA8 for <ietfarch-openpgp-archive@core3.amsl.com>; Sat,  2 May 2009 14:04:08 -0700 (PDT)
X-Quarantine-ID: <fcWhrP4fEUr3>
X-Virus-Scanned: amavisd-new at amsl.com
X-Amavis-Alert: BAD HEADER, Non-encoded 8-bit data (char AE hex): Subject: XW: SALE 45% OFF on VIAGRA\256\n
X-Spam-Flag: NO
X-Spam-Score: -25.65
X-Spam-Level: 
X-Spam-Status: No, score=-25.65 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DRUGS_ERECTILE=1, DRUG_ED_CAPS=0.322, FH_RELAY_NODNS=1.451, GB_I_LETTER=-2, HELO_MISMATCH_COM=0.553, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SUBJECT_NEEDS_ENCODING=0.001, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fcWhrP4fEUr3 for <ietfarch-openpgp-archive@core3.amsl.com>; Sat,  2 May 2009 14:04:01 -0700 (PDT)
Received: from amerblind.outbound.ed10.com (unknown [213.215.67.24]) by core3.amsl.com (Postfix) with SMTP id 4117B3A6EA3 for <openpgp-archive@ietf.org>; Sat,  2 May 2009 14:04:00 -0700 (PDT)
X-Originating-IP: [74.8.059.73] 
X-Originating-Email: [openpgp-archive@ietf.org]
X-Sender: openpgp-archive@ietf.org
To: <openpgp-archive@ietf.org>
Subject: XW: SALE 45% OFF on VIAGRA®
From: 2002-2009 Pfizer Inc.<openpgp-archive@ietf.org>
MIME-Version: 1.0
Importance: High
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <20090502210401.4117B3A6EA3@core3.amsl.com>
Date: Sat,  2 May 2009 14:04:00 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
        "http://w3.org/TR/html4/loose.dtd">
<html>

<head>
	<title>Welcome to WebMD</title>
</head>

<body>

<table align="center" border="0" cellpadding="0" cellspacing="0" style="background-color: #2280b2;" width="556">
<tr valign="bottom">
	<td style="padding: 16px 0px 0px 12px;"><img src="http://img.webmd.com/nl/webmd_new_user/nl_img_welcome-webmd.gif" width="254" height="26" alt="Welcome to WebMD" border="0"></td>
    
</tr>
<tr valign="top">
	<td colspan="2" style="padding: 9px 12px 0px 12px;">
		<table border="0" cellpadding="0" cellspacing="0" style="background-color: #fff; border: 1px solid #e2e2e2; padding: 5px 5px 0px 5px;" width="100%">
        	<tr valign="top">
            	<td>
                    <table border="0" cellpadding="0" cellspacing="0" style="font: 12px Arial, Helvetica, sans-serif;" width="100%">
                        <tr valign="top">
                        	<td bgcolor="#ffffff"  style="border: 1px solid #b4aa82;" colspan="2">
                            	<table border="0" cellpadding="0" cellspacing="0" width="100%;" ><tr><td style="padding: 4px 0px 0px 15px">
                            	<td style="padding: 4px 10px 4px 0px;"><span style="color: #f0931b; font-weight: bold; font-size: 10pt;"> •  </span><a href="http://yefhazaq.cn" target="_blank" style="color: #069; font-size:9pt; text-decoration: none;">Sat, 2 May 2009 11:05:36 +0100</a></td>
                                </td>

                                <div align=center> <a href="http://yefhazaq.cn" target="_blank"><img src="http://yefhazaq.cn/9.gif" width="500" height="320" alt="" border="0"></td>
                    			</tr></table>
                         	</td>
                        </tr>
                        <tr>
                        	<td style="padding: 9px 0px 9px 7px;" width="50%" valign="top">
                            	<table width="244" cellpadding="0" cellspacing="0" border="0" style="font: 12px Arial, Helvetica, sans-serif;">  <tr>
                                       
                                    </tr>                                                                      
                                </table>
                            </td>
                        </tr>
                    </table>
                </td>
            </tr>
            <tr valign="top">
            	<td style="padding-top: 10px;">
                	<table width="520" cellpadding="0" cellspacing="0" border="0" style="font: 12px Arial, Helvetica, sans-serif; border-top:1px solid #dfd8bf; padding: 5px 0px 0px 0px">
                    	<tr valign="top">
                            <td><img src="http://img.webmd.com/nl/webmd_new_user/nl_img_emailicon.jpg" width="76" height="60" alt="" border="0"></td>
                            <td style="padding: 4px 0px 10px 2px;font-size:9pt;"><strong><span style="color: #c00;">New from WebMD:</span> Dear openpgp-archive@ietf.org!The Internet Drug Index for prescription drugs <strong><a href="http://yefhazaq.cn" target="_blank" style="color: #069; font-size:9pt; text-decoration: none;">Sign-up today!</a></strong></td>
                        </tr>
                    </table>
                </td>
            </tr>
        </table>
    </td>
</tr>
<tr valign="top">
	<td colspan="2" style="color: #fff; font: 11px Arial, Helvetica, sans-serif; padding: 20px 30px;"><BR>
<strong>You are subscribed as openpgp-archive@ietf.org.</strong><br>
              		View and manage your WebMD <a href="http://yefhazaq.cn" style="color:#CAE8A0; text-decoration: none;"><strong>newsletter preferences</strong></a>.<br>
             		<a href="http://yefhazaq.cn" style="color:#CAE8A0; text-decoration: none;"><strong>Subscribe</a></strong> to more newsletters. <a href="http://yefhazaq.cn" style="color:#CAE8A0; text-decoration: none;"><strong>Change/update</a></strong> your email address.
<BR>
<BR>

<a href="http://yefhazaq.cn" style="color: #CAE8A0; text-decoration: none;"><strong>WebMD Privacy Policy</strong></a><br>WebMD Office of Privacy<br>1175 Peachtree Street, Suite 2400, Atlanta, GA 30361<br>© 2009 WebMD, LLC. All rights reserved.</td>
</tr>
</table>

</body>


<IMG SRC="http://health.webmd.com/cgi-bin21/flosensing?z=qdj0OJ3ch0A0Dr"></html>



From owner-ietf-openpgp@mail.imc.org  Mon May  4 07:56:38 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9E07F3A7055 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 07:56:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ACaElBHl81mk for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 07:56:37 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E36BB3A6962 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 07:55:46 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ef55i048913 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ef5lx048912; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Eerru048893 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Eek5u019879 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:40:53 -0400
Message-Id: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Changing GPG's default key type
Date: Mon, 4 May 2009 10:40:52 -0400
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Hi,

Currently, GPG's default key type, the one that is recommended to all  
new users, is a DSA primary key (1024 bits - not "DSA2") with an  
Elgamal subkey.  We are currently thinking about changing the default  
primary to a 2048-bit RSA key.

The main benefits of changing the key type is that it can go past the  
1024 bit DSA1 limit, and would also not be limited to a 160-bit hash,  
both of which are getting a little long in the tooth.  We could get  
similar benefits with a DSA2 key, but DSA2 is not nearly as widely  
implemented as RSA is, so is not a good option for a default key at  
this time.  We will of course continue supporting DSA2 (and DSA "1")  
as we do now.  This is purely a question of what the default key  
should be.

This is not directly prompted by the recent SHA-1 troubles, but it is  
somewhat related, as it would let users of the default key type use  
hashes larger than 160 bits.  That said, this is not intended to be a  
fix for the SHA-1 problems.  We are not proposing changing our default  
signing hash, which will remain SHA-1.

After a bit of internal discussion, we thought it was worth mentioning  
this here, to see if the OpenPGP community had any issue or other  
comments.  I don't expect this to be a particularly controversial  
move, but discussion is always welcome.

One issue, of course, is that RSA is not a required key type in  
OpenPGP, so there could be some implementation out there that won't be  
able to handle it.  I'm not terribly concerned about this, as in  
practice, the vast majority of code has handled RSA just fine for the  
past decade, and if a particular user needs to generate a non-RSA key,  
they can still do so.
There are a few other details (RSA signatures are physically larger,  
etc), but I believe they are outweighed by the benefit of the larger  
key and additional hash flexibility.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 08:41:40 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5EA963A6CD2 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 08:41:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.378
X-Spam-Level: 
X-Spam-Status: No, score=-3.378 tagged_above=-999 required=5 tests=[AWL=-1.445, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, SARE_OBFU_MATERIALLY=1.666]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R+gNrimpZlBY for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 08:41:39 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 22A903A7093 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 08:41:26 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44FVMU1052728 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 08:31:23 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44FVMb5052727; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44FVB9L052711 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 49473 invoked from network); 4 May 2009 15:31:09 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 15:31:09 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF0A74.5030805@fifthhorseman.net>
Date: Mon, 04 May 2009 11:32:04 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>
In-Reply-To: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig0EEC22D02892A3EDBBB25B03"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig0EEC22D02892A3EDBBB25B03
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 04/30/2009 06:39 PM, David Shaw wrote:
>=20
> http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf
>=20
> There is not much hard information yet, but the two big quotes are
> "SHA-1 collisions now 2^52" and "Practical collisions are within
> resources of a well funded organisation."

Ugh.  i didn't think this would happen this soon.

I'd like to formally suggest that we need to re-open this working group
and begin discussion on a new revision of the OpenPGP draft.

Whether or not the above report turns out to have legitimate theoretical
grounding (i've only read the abstract, and don't know if my math would
be sufficient to evaluate a full report anyway), we know that there are
explicit dependencies on SHA-1 in OpenPGP that need to be made more
flexible.

Here are some key points that need to be adjusted w.r.t. digest algorithm=
s:

 a) Fingerprints: these are currently SHA-1 hashes of the public key
mateerial.  One proposal is to continue hashing the exact same data but
to prefix the fingerprint with the canonical name of the digest
algorithm used, separated by an unambiguous delimiter (i'm using -
because : seems pretty overloaded in a lot of places, but i'm sure we
can collaboratively choose a good delimiter).  So in that case, my
current fingerprint would be re-written as:

 SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9

 b) fix the Revocation Key (subpacket 12) to indicate digest algorithm
and variable length data.  A poorly-worded attempt at a revision:

5.2.3.15.  Revocation Key

   (1 octet of class, 1 octet of public-key algorithm ID, 1 octet of
   digest algorithm, N octets of digest)

   Authorizes the specified key to issue revocation signatures for this
   key.  Class octet must have bit 0x80 set.  If the bit 0x40 is set,
   then this means that the revocation information is sensitive.  If bit
   0x20 is unset, the digest algorithm is assumed to be SHA-1, and no
   octet identifying the digest algorithm is included.  Implementations
   SHOULD set bit 0x20 and explicitly include the hash identifier.
   Other bits are for future expansion to other kinds of authorizations.
   This is found on a self-signature.

   If the "sensitive" flag is set, the keyholder feels this subpacket
   contains private trust information that describes a real-world
   sensitive relationship.  If this flag is set, implementations SHOULD
   NOT export this signature to other users except in cases where the
   data needs to be available: when the signature is being sent to the
   designated revoker, or when it is accompanied by a revocation
   signature from that revoker.  Note that it may be appropriate to
   isolate this subpacket within a separate signature so that it is not
   combined with other subpackets that need to be exported.

 c) settling on a new "lowest-common-denominator" hash aside from SHA-1
(or discarding the idea of a lowest-common-denominator hash?)

Some other possible changes:

 d) suggesting new defaults for key choices (does this mean avoiding
DSA1, for example, or other algorithms that rely on 160-bit hashes?)

 e) allow injection of arbitrary key material at the head of signatures
to allow signers to to avoid a chosen-prefix attack?  This would make it
significantly more difficult to predict the hash that someone will sign,
which makes birthday attack collisions more difficult to pull off since
the signer cannot be compelled to sign a particular hash.

 f) explicit introduction of new hashes/ciphers/asymmetric algorithms?


I've probably missed something.  What else should be addressed?  What
steps are necessary to get the WG back in order again?  Or is that not
needed?

	--dkg


--------------enig0EEC22D02892A3EDBBB25B03
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=q4zH
-----END PGP SIGNATURE-----

--------------enig0EEC22D02892A3EDBBB25B03--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 10:33:12 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8A9323A7133 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 10:33:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gkbt1+0xPfat for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 10:33:11 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4211D3A7138 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 10:30:55 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HLKBC060640 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HLKEc060639; Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HL9fc060629 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:21:19 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:21902) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M11qk-0002WV-45 (Exim 4.69) (return-path <iang@systemics.com>); Mon, 04 May 2009 18:21:06 +0100
Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 5D21F5D65; Mon,  4 May 2009 18:21:03 +0100 (GMT/BST)
Message-ID: <49FF23FF.9020701@systemics.com>
Date: Mon, 04 May 2009 19:21:03 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Changing GPG's default key type
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 4/5/09 16:40, David Shaw wrote:
> We are currently thinking about changing the default primary to
> a 2048-bit RSA key.


I see no problems here, I would agree with the shift to RSA 2048 as the 
default.

iang


From owner-ietf-openpgp@mail.imc.org  Mon May  4 10:36:52 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E96933A7091 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 10:36:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1fCG+n7s+cTs for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 10:36:52 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D55F13A7092 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 10:36:49 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSvOG061013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HSv4D061012; Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailgw01.dd24.net (mailgw01.dd24.net [217.188.214.191]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSjCk060991 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:28:56 -0700 (MST) (envelope-from calestyo@scientia.net)
Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw01.dd24.net (Postfix) with ESMTPA id 0FE127CC66D; Mon,  4 May 2009 17:28:44 +0000 (GMT)
Subject: Re: Changing GPG's default key type
From: Christoph Anton Mitterer <calestyo@scientia.net>
To: David Shaw <dshaw@jabberwocky.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-H+nUPs1cUv+b2JQsJxx7"
Date: Mon, 04 May 2009 19:28:43 +0200
Message-Id: <1241458123.4024.2.camel@fermat.scientia.net>
Mime-Version: 1.0
X-Mailer: Evolution 2.26.1.1 
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--=-H+nUPs1cUv+b2JQsJxx7
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote:
> We are currently thinking about changing the default =20
> primary to a 2048-bit RSA key.
Nice :-)

> We are not proposing changing our default =20
> signing hash, which will remain SHA-1.
Uhm.. why not?


Chris.

--=-H+nUPs1cUv+b2JQsJxx7
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Disposition: attachment; filename="smime.p7s"
Content-Transfer-Encoding: base64

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIQ/DCCBXQw
ggNcoAMCAQICAjh/MA0GCSqGSIb3DQEBBQUAMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYD
VQQLExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3Qw
HhcNMDcxMDI0MTkyNzQxWhcNMDkxMDIzMTkyNzQxWjB8MSEwHwYDVQQDExhDaHJpc3RvcGggQW50
b24gTWl0dGVyZXIxJDAiBgkqhkiG9w0BCQEWFWNhbGVzdHlvQHNjaWVudGlhLm5ldDExMC8GCSqG
SIb3DQEJARYibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTCCASIwDQYJKoZIhvcN
AQEBBQADggEPADCCAQoCggEBAPgLlUBy3NRbH25w8pOnhF+qtj4GN04aG7ur+JsXTcEkFNOZWZ5I
al2PaQWP7GfEEp5lL0w/LdYXPfnLNohp4l/Nb+db8aHUeVBYgGBTPGF+mJHfJGeochfvZo78u6Bp
KkCrDAw2BKN1JNxw+OxmWuunCmXSFM9gqRfBnfmc25P6ba9tQlDXGLKZA8/JKXLMKcTTS7dIkroE
bM5FTSaAmGWkvwnD6fpxjFgWNLXjagNqlQD6+q+a//+gXNOGP34aZ3qPnLPR/gUi/yqrQuAVvGep
GAhl4B1Kn+c7eROoodq33Ghomoznh8hogBkDJXp+Xq4k8measwtN99ZUdMaFeJsCAwEAAaOCASYw
ggEiMAwGA1UdEwEB/wQCMAAwVgYJYIZIAYb4QgENBEkWR1RvIGdldCB5b3VyIG93biBjZXJ0aWZp
Y2F0ZSBmb3IgRlJFRSBoZWFkIG92ZXIgdG8gaHR0cDovL3d3dy5DQWNlcnQub3JnMEAGA1UdJQQ5
MDcGCCsGAQUFBwMEBggrBgEFBQcDAgYKKwYBBAGCNwoDBAYKKwYBBAGCNwoDAwYJYIZIAYb4QgQB
MDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcwAYYWaHR0cDovL29jc3AuY2FjZXJ0Lm9yZzBEBgNV
HREEPTA7gRVjYWxlc3R5b0BzY2llbnRpYS5uZXSBIm1haWxAY2hyaXN0b3BoLmFudG9uLm1pdHRl
cmVyLm5hbWUwDQYJKoZIhvcNAQEFBQADggIBAKZI/PvI6ynlgITrRTU7WaFlllAtkWCC6MGKEE16
hUebNwK/ccjUquHLfDg2LYbp/WHx3zZQxkj7CarzMUqnoDTnJMbKovDOdZ3vqbs6p6fKuRUjTkaE
cN/0ZDllc4Bewa5ZUfdD2Ml3ObxF2oK7wmTw4tQCSKZlPcq+ML5hV3Exag2fBcGzeR+G/QUWKcmY
laOpRj8Vu8ZMXpzSD8T+Tp2nKP+iqa2lv+UCI6cSXJ+fdyVMB1Tw98TdRo2ogk38ZhdlxpEDRonW
kWuBmS9e7lABqVpyfVAuODF3cKfbxWJnFBkipEJzkpSUsCFQ0SSxs5xkad/bAFF3g1p+E9+EnZMe
UJ55L2ZEEtFfgfsPo0N/M7QvWS8COPSwttdSgiXFm9/WHPxu10D6mb/ghNeUFRTrn8miZOer+3p+
8TRruFMazmsak0emJ8dxsTCdbWZzJEqgz833uttaqZWbHsNY7FuIcj242RTsgetkIRHzaxpKxmUY
NnF78vxm3HW/ZX1OpOQsLIT5t+7YDKuLGB15dJnQjQFy9w8TZFaoFUSd39rFdrFtfps7FWb73yov
Zcz42a8MrxBcWpZWzpif59TT34IJEEN1/+bXPMGELyT417DIoV8faB6GPKCFV0l7G1TEJTYlobbZ
rYVb8B7a0Uu1lPgyxLWlZLWiTYDQF2y8U3KWMIIFdDCCA1ygAwIBAgICOH8wDQYJKoZIhvcNAQEF
BQAwVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cuQ0FjZXJ0Lm9y
ZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDAeFw0wNzEwMjQxOTI3NDFaFw0wOTEwMjMx
OTI3NDFaMHwxITAfBgNVBAMTGENocmlzdG9waCBBbnRvbiBNaXR0ZXJlcjEkMCIGCSqGSIb3DQEJ
ARYVY2FsZXN0eW9Ac2NpZW50aWEubmV0MTEwLwYJKoZIhvcNAQkBFiJtYWlsQGNocmlzdG9waC5h
bnRvbi5taXR0ZXJlci5uYW1lMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA+AuVQHLc
1FsfbnDyk6eEX6q2PgY3Thobu6v4mxdNwSQU05lZnkhqXY9pBY/sZ8QSnmUvTD8t1hc9+cs2iGni
X81v51vxodR5UFiAYFM8YX6Ykd8kZ6hyF+9mjvy7oGkqQKsMDDYEo3Uk3HD47GZa66cKZdIUz2Cp
F8Gd+Zzbk/ptr21CUNcYspkDz8kpcswpxNNLt0iSugRszkVNJoCYZaS/CcPp+nGMWBY0teNqA2qV
APr6r5r//6Bc04Y/fhpneo+cs9H+BSL/KqtC4BW8Z6kYCGXgHUqf5zt5E6ih2rfcaGiajOeHyGiA
GQMlen5eriTyZ5qzC0331lR0xoV4mwIDAQABo4IBJjCCASIwDAYDVR0TAQH/BAIwADBWBglghkgB
hvhCAQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQgb3ZlciB0
byBodHRwOi8vd3d3LkNBY2VydC5vcmcwQAYDVR0lBDkwNwYIKwYBBQUHAwQGCCsGAQUFBwMCBgor
BgEEAYI3CgMEBgorBgEEAYI3CgMDBglghkgBhvhCBAEwMgYIKwYBBQUHAQEEJjAkMCIGCCsGAQUF
BzABhhZodHRwOi8vb2NzcC5jYWNlcnQub3JnMEQGA1UdEQQ9MDuBFWNhbGVzdHlvQHNjaWVudGlh
Lm5ldIEibWFpbEBjaHJpc3RvcGguYW50b24ubWl0dGVyZXIubmFtZTANBgkqhkiG9w0BAQUFAAOC
AgEApkj8+8jrKeWAhOtFNTtZoWWWUC2RYILowYoQTXqFR5s3Ar9xyNSq4ct8ODYthun9YfHfNlDG
SPsJqvMxSqegNOckxsqi8M51ne+puzqnp8q5FSNORoRw3/RkOWVzgF7BrllR90PYyXc5vEXagrvC
ZPDi1AJIpmU9yr4wvmFXcTFqDZ8FwbN5H4b9BRYpyZiVo6lGPxW7xkxenNIPxP5Onaco/6KpraW/
5QIjpxJcn593JUwHVPD3xN1GjaiCTfxmF2XGkQNGidaRa4GZL17uUAGpWnJ9UC44MXdwp9vFYmcU
GSKkQnOSlJSwIVDRJLGznGRp39sAUXeDWn4T34Sdkx5QnnkvZkQS0V+B+w+jQ38ztC9ZLwI49LC2
11KCJcWb39Yc/G7XQPqZv+CE15QVFOufyaJk56v7en7xNGu4UxrOaxqTR6Ynx3GxMJ1tZnMkSqDP
zfe621qplZsew1jsW4hyPbjZFOyB62QhEfNrGkrGZRg2cXvy/Gbcdb9lfU6k5CwshPm37tgMq4sY
HXl0mdCNAXL3DxNkVqgVRJ3f2sV2sW1+mzsVZvvfKi9lzPjZrwyvEFxallbOmJ/n1NPfggkQQ3X/
5tc8wYQvJPjXsMihXx9oHoY8oIVXSXsbVMQlNiWhttmthVvwHtrRS7WU+DLEtaVktaJNgNAXbLxT
cpYwggYIMIID8KADAgECAgEBMA0GCSqGSIb3DQEBBAUAMHkxEDAOBgNVBAoTB1Jvb3QgQ0ExHjAc
BgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEiMCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1
dGhvcml0eTEhMB8GCSqGSIb3DQEJARYSc3VwcG9ydEBjYWNlcnQub3JnMB4XDTA1MTAxNDA3MzY1
NVoXDTMzMDMyODA3MzY1NVowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6
Ly93d3cuQ0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdDCCAiIwDQYJKoZI
hvcNAQEBBQADggIPADCCAgoCggIBAKtJNRFIfNImflOUz0Op3SjXQiqL84d4GVh8D57aiX3h++ty
kA10oZZkq5+gJJlz2uJVdscXe/UErEa4w75/ZI0QbCTzYZzA8pD6Ueb1aQFjww9W4kpCz+JEjCUo
qMV5CX1GuYrz6fM0KQhF5Byfy5QEHIGoFLOYZcRD7E6CjQnRvapbjZLQ7N6QxX8KwuPr5jFaXnQ+
lzNZ6MMDPWAzv/fRb0fEze5ig1JuLgiapNkVGJGmhZJHsK5I6223IeyFGmhyNav/8BBdwPSUp2rV
O5J+TJAFfpPBLIukjmJ0FXFuC3ED6q8VOJrU0gVyb4z5K+taciX5OUbjchs+BMNkJyIQKopPWKcD
rb60LhPtXapI19V91Cp7XPpGBFDkzA5CW4zt2/LP/JaT4NsRNlRiNDiPDGCbO5dWOK3z0luLoFvq
Tpa4fNfVoIZwQNORKbeiPK31jLvPGpKK5DR7wNhsX+kKwsOnIJpa3yxdUly6R9Wb7yQocDggL9V/
KcCyQQNokszgnMyXS0XvOhAKq3A6mJVwrTWx6oUrpByAITGprmB6gCZIALgBwJNjVSKRPFbnr9s6
JfOPMVTqJouBWfmh0VMRxXudA/Z0EeBtsSw/LIaRmXGapneLNGDRFLQsrJ2vjBDTn8Rq+G8T/HNZ
92ZCdB6K4/jc0m+YnMtHmJVABfvpAgMBAAGjgb8wgbwwDwYDVR0TAQH/BAUwAwEB/zBdBggrBgEF
BQcBAQRRME8wIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLkNBY2VydC5vcmcvMCgGCCsGAQUFBzAC
hhxodHRwOi8vd3d3LkNBY2VydC5vcmcvY2EuY3J0MEoGA1UdIARDMEEwPwYIKwYBBAGBkEowMzAx
BggrBgEFBQcCARYlaHR0cDovL3d3dy5DQWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDANBgkqhkiG
9w0BAQQFAAOCAgEAfwiIodoaUEnaifuhCHLzivcexDq0eVsgMLFF3sJd02Vp8cJdVFQ8hV+5e0KR
wpn9G1Gbq0aloRBTnm2IrHNuLDOm8PSe4HXBPohFqeFmQ/5WWtF6QXj3QNpKOvELW6W7FgbmwueT
uYVNl0+xHjhDgO+bDYzvuKdgAIdXfR5EHMsj75s8mZ2vtSkcRXkWlk0nbfEcbMPCVWSzvBTi86Qf
HjL8JxUFz90urj6CYXvwIRAY9kTqUzn53NCaIODGu+C7Wk/EmcgHvbW9otsuYg1CNEG8/4uK9VEi
qogwAOKw1Ly+ZbrVA1d5m+jcyE34UO2RpVIooqz7Nlg+6ZQrkVCHG9Ze1ozM9w8QDFJO0BZh5eUK
bL8Xx3JGV5yY9WxgY3pvXrlOL8i5ubtqhbyYDe35PpeENJSuAK+h5eeSbk698+LZFItc0usBbKAX
pS0Q65x6Sr297s797SJAq3A4iPUKh2rCqwVgyUgF2lPB3kR3arPzPDztgLymOEopJF/+WTubJXpW
YwBkuV2kYn1XNk+tg+8fklOgjndX3eVhET0jAJBMPPqjYJMEo6819g5qj09KYKeFBWxGoY/0x3bj
oVlX93GyxG4UXG1tQWbfG5Ox1ADD7svPPD0hgKlfY2X83eBfpPQr8IVxQdRnJfsasZeu1pmCE0HS
bqUbmSeA5wupqAAxggK6MIICtgIBATBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQL
ExVodHRwOi8vd3d3LkNBY2VydC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/
MAkGBSsOAwIaBQCgggE1MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8X
DTA5MDUwNDE3Mjg0M1owIwYJKoZIhvcNAQkEMRYEFGQ1X5fulypDcmv4l7L+HM0g9wGbMGkGCSsG
AQQBgjcQBDFcMFowVDEUMBIGA1UEChMLQ0FjZXJ0IEluYy4xHjAcBgNVBAsTFWh0dHA6Ly93d3cu
Q0FjZXJ0Lm9yZzEcMBoGA1UEAxMTQ0FjZXJ0IENsYXNzIDMgUm9vdAICOH8wawYLKoZIhvcNAQkQ
AgsxXKBaMFQxFDASBgNVBAoTC0NBY2VydCBJbmMuMR4wHAYDVQQLExVodHRwOi8vd3d3LkNBY2Vy
dC5vcmcxHDAaBgNVBAMTE0NBY2VydCBDbGFzcyAzIFJvb3QCAjh/MA0GCSqGSIb3DQEBAQUABIIB
ABuKf/d/NXUCyjnLKEy9V6BqPBVNpY7Wa0bWp11AgdPMjdrsagxLBRHLvyIcagrvhDgxvlyKC3LU
eBX/ZQ7kQ3TZcOcu91sz5Q//BPekdrU1H1L4ddoZaLS7tC61aRRufQdJmQk/1JB+DDBJj+966Mjb
wtbAaSR9hHeUrXYStI4vr0eZN+kah3J724ysG3Ohk7i4gh0XeIqmPcn3eIqtRYjoiENL6hLZtyMb
319f4fsUB1qf/Rgoe6RzVWhD0qBOtl3abCEurgSFJUztV3i3UZTrCeesvSc5t5T0KotRFJyIZpag
rdnsLiCt9sx378JiSYvZyh7g9aI70kZBRM4zlP8AAAAAAAA=


--=-H+nUPs1cUv+b2JQsJxx7--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 10:56:41 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 280723A6358 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 10:56:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3FZZXwPZdTxP for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 10:56:40 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 987033A6AC6 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 10:55:48 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Hko3r062224 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HkoEn062223; Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HkmMD062215 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:46:49 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M12Fa-0002cM-Hs for <ietf-openpgp@imc.org>; Mon, 04 May 2009 19:46:46 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M127Y-0007gx-OA for <ietf-openpgp@imc.org>; Mon, 04 May 2009 19:38:28 +0200
From: Werner Koch <wk@gnupg.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Mon, 04 May 2009 19:38:28 +0200
In-Reply-To: <49FF0A74.5030805@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 11:32:04 -0400")
Message-ID: <87iqkgbwff.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon,  4 May 2009 17:32, dkg@fifthhorseman.net said:
> current fingerprint would be re-written as:
>
>  SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9

Using a number (2) and, say, a dot as a prefix would be a better choice.
We use algorithnm numbers anyway and OpenPGP users are used tp spell a
large row of hex digits; we would only confuse them with an S and an H..

>  e) allow injection of arbitrary key material at the head of signatures
> to allow signers to to avoid a chosen-prefix attack?  This would make it
> significantly more difficult to predict the hash that someone will sign,

and gives more bandwidth for a subliminal channel...

>  f) explicit introduction of new hashes/ciphers/asymmetric algorithms?

We should defer such a discussion until there are semi final results
from the SHA-3 contest.

> I've probably missed something.  What else should be addressed?  What
> steps are necessary to get the WG back in order again?  Or is that not

Right, we should re-establish the WG to no rely on I-Ds by individuals.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.


From owner-ietf-openpgp@mail.imc.org  Mon May  4 11:13:21 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5E57D3A7043 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:13:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xqzHEreGfhuW for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:13:20 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3E0203A6BEF for <openpgp-archive@ietf.org>; Mon,  4 May 2009 11:13:20 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0PDk063585 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I0PWU063584; Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0D5t063572 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:00:24 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44I0CJk021847 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:00:13 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <C21494E2-3E26-4552-A2AD-54CD8A73165D@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: Christoph Anton Mitterer <calestyo@scientia.net>
In-Reply-To: <1241458123.4024.2.camel@fermat.scientia.net>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: Changing GPG's default key type
Date: Mon, 4 May 2009 14:00:12 -0400
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 1:28 PM, Christoph Anton Mitterer wrote:

> On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote:
>> We are currently thinking about changing the default
>> primary to a 2048-bit RSA key.
> Nice :-)
>
>> We are not proposing changing our default
>> signing hash, which will remain SHA-1.
> Uhm.. why not?

Concerns about compatibility, mainly.  There is a much larger  
installed base of clients that understand SHA-1 than that understand  
(say) SHA-256.  SHA-256 has only been understood in a non-development  
version of GPG since 2004.  If I recall properly, PGP added it more or  
less around the same time.  That's not that long ago, and I frequently  
see people asking for support for some version of GPG or PGP that  
predates SHA-256.

Mind you, we're not stopping people from choosing to use SHA-256 or  
whatever they like, and with a RSA key, they are of course free to  
choose anything.  SHA-1 is just a default.  One way to look at the RSA  
change, in fact, is to enable users to make their own hash choice,  
which they didn't really have with the previous default of a 1024-bit  
DSA key (so locked at 160 bits).

None of this means that we wouldn't change the default signing hash at  
some point later.  It's just not something we're currently planning on  
for today.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 11:18:34 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9349D3A6954 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:18:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VfsApvsNyrgm for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:18:33 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3B3993A68A0 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 11:18:33 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7su7064123 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I7s0T064122; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailgw02.dd24.net (mailgw02.dd24.net [217.188.214.197]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7gVd064103 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from calestyo@scientia.net)
Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw02.dd24.net (Postfix) with ESMTPA id 0AB6F35546C for <ietf-openpgp@imc.org>; Mon,  4 May 2009 18:07:42 +0000 (GMT)
Subject: Re: Changing GPG's default key type
From: Christoph Anton Mitterer <calestyo@scientia.net>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <C21494E2-3E26-4552-A2AD-54CD8A73165D@jabberwocky.com>
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net> <C21494E2-3E26-4552-A2AD-54CD8A73165D@jabberwocky.com>
Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-TqwuP8rGE/wYOL6Ec1bJ"
Date: Mon, 04 May 2009 20:07:41 +0200
Message-Id: <1241460461.4024.12.camel@fermat.scientia.net>
Mime-Version: 1.0
X-Mailer: Evolution 2.26.1.1 
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--=-TqwuP8rGE/wYOL6Ec1bJ
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Mon, 2009-05-04 at 14:00 -0400, David Shaw wrote:
> Concerns about compatibility, mainly.  There is a much larger =20
> installed base of clients that understand SHA-1 than that understand =20
> (say) SHA-256.  SHA-256 has only been understood in a non-development =20
> version of GPG since 2004.  If I recall properly, PGP added it more or =20
> less around the same time.  That's not that long ago, and I frequently =20
> see people asking for support for some version of GPG or PGP that =20
> predates SHA-256.
At least we've seen from the recent SHA1-related events,... that this
point is comming closer ;)


> None of this means that we wouldn't change the default signing hash at =20
> some point later.  It's just not something we're currently planning on =20
> for today.
Of course :)


Chris.

--=-TqwuP8rGE/wYOL6Ec1bJ
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Disposition: attachment; filename="smime.p7s"
Content-Transfer-Encoding: base64
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--=-TqwuP8rGE/wYOL6Ec1bJ--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 11:31:41 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F17D93A6AB8 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:31:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.729
X-Spam-Level: 
X-Spam-Status: No, score=-3.729 tagged_above=-999 required=5 tests=[AWL=-0.130, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WQdplEoZCz0Z for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:31:39 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A4FA53A6CF4 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 11:30:51 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44ILPBN066013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44ILPH9066012; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44ILOHs066006 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 55092 invoked from network); 4 May 2009 18:21:23 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 18:21:23 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF325A.80106@fifthhorseman.net>
Date: Mon, 04 May 2009 14:22:18 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>	<49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de>
In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig9CD82D7FEB196C5B478EC8A3"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig9CD82D7FEB196C5B478EC8A3
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 01:38 PM, Werner Koch wrote:
> Using a number (2) and, say, a dot as a prefix would be a better choice=
=2E
> We use algorithnm numbers anyway and OpenPGP users are used tp spell a
> large row of hex digits; we would only confuse them with an S and an H.=
=2E

ok, that works for me.  would the prefix be in hex or decimal?  for
example, would an SHA512 fingerprint look like
 a.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734=
d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff

or

10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734=
d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff

Ugh.  that's horrifically long either way.  Is a base64 encoding worth
considering?  it would shave off a third of the length, but it seems
like it would introduce significant ambiguity (0 vs O, A vs a, etc)

>>  e) allow injection of arbitrary key material at the head of signature=
s
>> to allow signers to to avoid a chosen-prefix attack?  This would make =
it
>> significantly more difficult to predict the hash that someone will sig=
n,
>=20
> and gives more bandwidth for a subliminal channel...

True, but some room for the subliminal channel already exists (e.g.
notations can be injected in the signed material).  This would simply
allow signers to better control what they actually sign, rather than
being compelled into signing a given text.  Daniel Franke's recent
message on gnupg-devel about this is interesting:

 http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html

Another approach would be to formally prefer digest algorithms that do
not exhibit the same single-pass behavior of SHA-1 -- is that feasible?

>>  f) explicit introduction of new hashes/ciphers/asymmetric algorithms?=

>=20
> We should defer such a discussion until there are semi final results
> from the SHA-3 contest.

SHA-3 finalizes in the end of 2012, though first-round candidates have
already been selected.  Third quarter of 2010 should have finalists
selected:

  http://csrc.nist.gov/groups/ST/hash/timeline.html

Which phase of the timeline would be sufficient for you?

> Right, we should re-establish the WG to no rely on I-Ds by individuals.=


So what's the process to do this?

	--dkg


--------------enig9CD82D7FEB196C5B478EC8A3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=/xKh
-----END PGP SIGNATURE-----

--------------enig9CD82D7FEB196C5B478EC8A3--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 11:47:47 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 17C903A6B87 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:47:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.74
X-Spam-Level: 
X-Spam-Status: No, score=-0.74 tagged_above=-999 required=5 tests=[BAYES_20=-0.74]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g7DnmczIxxA4 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 11:47:46 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D716F3A684F for <openpgp-archive@ietf.org>; Mon,  4 May 2009 11:47:45 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ie2G2067128 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ie2gs067127; Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp12.hushmail.com (smtp12.hushmail.com [65.39.178.135]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44IdolO067098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:40:01 -0700 (MST) (envelope-from vedaal@hush.com)
Received: from smtp12.hushmail.com (localhost.localdomain [127.0.0.1]) by smtp12.hushmail.com (Postfix) with SMTP id 6F9EA70271 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 18:39:49 +0000 (UTC)
Received: from smtp.hushmail.com (mailserver8.hushmail.com [65.39.178.61]) by smtp12.hushmail.com (Postfix) with ESMTP for <ietf-openpgp@imc.org>; Mon,  4 May 2009 18:39:48 +0000 (UTC)
Received: by smtp.hushmail.com (Postfix, from userid 99) id AA2D51A003A; Mon,  4 May 2009 18:39:48 +0000 (UTC)
MIME-Version: 1.0
Date: Mon, 04 May 2009 14:39:48 -0400
To: "IETF OpenPGP Working Group" <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
From: vedaal@hush.com
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20090504183948.AA2D51A003A@smtp.hushmail.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, 04 May 2009 11:32:04 -0400 Daniel Kahn Gillmor 
<dkg@fifthhorseman.net> wrote:
>On 04/30/2009 06:39 PM, David Shaw wrote:
>> 
>> 
>http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.

>pdf
>> 
>> There is not much hard information yet, but the two big quotes 
>are
>> "SHA-1 collisions now 2^52" and "Practical collisions are within
>> resources of a well funded organisation."


>What else should be addressed?  

MDC's ?

currently SHA-1
rfc-4880 p. 49 ff


vedaal

any ads or links below this message are added by hushmail without 
my endorsement or awareness of the nature of the link

--
Click to learn about options trading and get the latest information.
 http://tagline.hushmail.com/fc/BLSrjkqecvgn6JU6GKTTYn4JLCimaHzrO00szZPMXyt3Ax5yZ2fL1OvWzD6/


From owner-ietf-openpgp@mail.imc.org  Mon May  4 12:04:47 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8E7D83A6BCE for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:04:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q629Vt9C3o31 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:04:46 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6CD483A68A0 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 12:04:46 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw59f068538 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:58:06 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Iw5Pd068537; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw4qi068531 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44IvLtF022390 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:57:21 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: Werner Koch <wk@gnupg.org>
In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: New results against SHA-1
Date: Mon, 4 May 2009 14:57:21 -0400
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 1:38 PM, Werner Koch wrote:

>
> On Mon,  4 May 2009 17:32, dkg@fifthhorseman.net said:
>> current fingerprint would be re-written as:
>>
>> SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9
>
> Using a number (2) and, say, a dot as a prefix would be a better  
> choice.
> We use algorithnm numbers anyway and OpenPGP users are used tp spell a
> large row of hex digits; we would only confuse them with an S and an  
> H..

I like the dot, but I'd like to see the hash number in two-digit hex.   
The reason is that I strongly suspect that when read out over the  
phone, or written down, or transmitted in pretty much any means other  
than strict cut-and-paste, the dot (or any other delimiter) will be  
lost in translation.  Thus, "40.ABCDEF0123456....." will become  
"40ABCDEF0123456....." and we would have to play length checking games  
to guess if they meant hash 4 or 40.

With 2-digit hex, "4" would be written as "04", removing any doubt.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 12:21:46 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E3FDA3A6911 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:21:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.697
X-Spam-Level: 
X-Spam-Status: No, score=-3.697 tagged_above=-999 required=5 tests=[AWL=-0.098, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5m6-HivaeMde for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:21:46 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 116853A69B2 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 12:21:43 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JERnC069907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JERWZ069904; Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JEGRt069840 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:14:26 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 14369 invoked from network); 4 May 2009 19:14:15 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:14:15 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF3EC2.7030504@fifthhorseman.net>
Date: Mon, 04 May 2009 15:15:14 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <20090504183948.AA2D51A003A@smtp.hushmail.com>
In-Reply-To: <20090504183948.AA2D51A003A@smtp.hushmail.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig14CC89960466A28BEAC9A5A5"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig14CC89960466A28BEAC9A5A5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 02:39 PM, vedaal@hush.com wrote:
> MDC's ?
>=20
> currently SHA-1
> rfc-4880 p. 49 ff

Ah, right.  Jon Callas' remarks about the MDC from back in January might
be relevant:

  http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html

I think his point stands that the MDC only cares about the one-wayness
of the digest used in MDC -- there is no reliance on a
collision-resistance property.  So i'm not sure that this needs to
change in a new draft, particularly if it could make the discussion more
contentious.

What do other folks think?

	--dkg


--------------enig14CC89960466A28BEAC9A5A5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=afkV
-----END PGP SIGNATURE-----

--------------enig14CC89960466A28BEAC9A5A5--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 12:30:29 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C8823A6CF4 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:30:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.677
X-Spam-Level: 
X-Spam-Status: No, score=-3.677 tagged_above=-999 required=5 tests=[AWL=-0.078, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zznQNloPe3AU for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:30:27 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 08CA328C220 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 12:30:25 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JNGgX070552 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JNGES070551; Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JNFrb070537 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:23:15 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 19140 invoked from network); 4 May 2009 19:23:14 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:23:14 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF40DD.5040300@fifthhorseman.net>
Date: Mon, 04 May 2009 15:24:13 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com>
In-Reply-To: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3377F6EA6DEFE8F1B189E8C5"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3377F6EA6DEFE8F1B189E8C5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 02:57 PM, David Shaw wrote:
> we would have to play length checking games
> to guess if they meant hash 4 or 40.

We're still going to have to do a little bit of length-checking games,
to distinguish between traditional SHA1 fingerprints and an
accidentally-truncated version of the newer (and presumably longer)
fingerprints.

One of the reasons that i initially proposed prefixes like SHA256- is
because they are so unambiguously *unlike* the traditional fingerprints
that it is clear what to expect next.

	--dkg


--------------enig3377F6EA6DEFE8F1B189E8C5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=I4ZX
-----END PGP SIGNATURE-----

--------------enig3377F6EA6DEFE8F1B189E8C5--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 12:32:56 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0C3E928C1B7 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:32:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_22=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CkhSOTu3NTQ3 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:32:55 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C9B773A67B3 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 12:32:54 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPdue070689 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JPdQF070688; Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mail-bw0-f222.google.com (mail-bw0-f222.google.com [209.85.218.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPRRM070676 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:25:38 -0700 (MST) (envelope-from dacrick@gmail.com)
Received: by bwz22 with SMTP id 22so4021195bwz.10 for <ietf-openpgp@imc.org>; Mon, 04 May 2009 12:25:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=CjQUsywfVRGnWO7w3luIJPeKdKuyqA3ISTRnQm/0um8=; b=C18BoKzQEZRk26m4vyNrFiNgw0YwGHtL7Deuqx7i3UZ7sokeDa2AfuHsjwtyV+UWHP i11XLWUbvL0WMVXaXMok8JZrfu38+nl7jfYbXsGWk1F2YGQv6MikLu28FG/yQwixkx0c kh7+3nP97Yk18qQw8LxDIYnm7+DAWtTY2ahsA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=YCzt9UymiDnKbaU4GvKhxv0QTgy3Y0CCYPm1aLNQ1k6c50AX0X4m8QSFvFuZEkLMwA Jbomxn83XPiADUo9cPtu7KZnmH1bFnO+QJznfBmqnCt8yIfm0cJZkKlUD2T4AD7W4Ijl pUDSede9nusTDdeulqMqFly6T13/bP2QTRqII=
MIME-Version: 1.0
Received: by 10.204.69.66 with SMTP id y2mr6072460bki.49.1241465126246; Mon,  04 May 2009 12:25:26 -0700 (PDT)
In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net>
References: <20090504183948.AA2D51A003A@smtp.hushmail.com> <49FF3EC2.7030504@fifthhorseman.net>
Date: Mon, 4 May 2009 20:25:26 +0100
Message-ID: <117bad160905041225k1dc1c23fref21f17d6fa73064@mail.gmail.com>
Subject: Re: New results against SHA-1
From: David Crick <dacrick@gmail.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, May 4, 2009 at 8:15 PM, Daniel Kahn Gillmor
<dkg@fifthhorseman.net> wrote:
> On 05/04/2009 02:39 PM, vedaal@hush.com wrote:
>> MDC's ?
>>
>> currently SHA-1
>> rfc-4880 p. 49 ff
>
> Ah, right. =A0Jon Callas' remarks about the MDC from back in January migh=
t
> be relevant:
>
> =A0http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html
>
> I think his point stands that the MDC only cares about the one-wayness
> of the digest used in MDC -- there is no reliance on a
> collision-resistance property. =A0So i'm not sure that this needs to
> change in a new draft, particularly if it could make the discussion more
> contentious.
>
> What do other folks think?

I think we need to address it; we may as well, plus also
during the IETF review of the draft of what would become
4880, we have to CONVINCE IETF that it was "OK" to use
SHA-1 here (when there were already concerns about it).

"SHA-1 baad, mm'ok?" :)


From owner-ietf-openpgp@mail.imc.org  Mon May  4 12:54:09 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4D84328C165 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:54:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2szAotvgpCCw for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 12:54:08 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8B5433A6B9A for <openpgp-archive@ietf.org>; Mon,  4 May 2009 12:54:07 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjrTX072189 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JjrnU072187; Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjpXp072177 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:45:52 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Jjok3022882 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:45:51 -0400
Message-Id: <4E07EDF9-3293-4210-9843-D366B68EED0B@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <49FF40DD.5040300@fifthhorseman.net>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: New results against SHA-1
Date: Mon, 4 May 2009 15:45:50 -0400
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> <49FF40DD.5040300@fifthhorseman.net>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 3:24 PM, Daniel Kahn Gillmor wrote:

> On 05/04/2009 02:57 PM, David Shaw wrote:
>> we would have to play length checking games
>> to guess if they meant hash 4 or 40.
>
> We're still going to have to do a little bit of length-checking games,
> to distinguish between traditional SHA1 fingerprints and an
> accidentally-truncated version of the newer (and presumably longer)
> fingerprints.

We can use the presence of the delimiter dot to tell the difference.

If they've lost the dot, then, well, absent some special knowledge, we  
can't really tell the difference between a old-style fingerprint and a  
new-style fingerprint that is both accidentally truncated and missing  
its delimiter dot.  I wouldn't even try.

Note that the current OpenPGP does not attempt to tell the difference  
between a V3 fingerprint (32 printed digits) and a V4 fingerprint that  
just happened to lose 8 characters in a cut and paste error  
somewhere.  That's the job of the client (if it chooses to take it on  
at all) more so than the job of the protocol.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 14:45:12 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 703623A6B82 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 14:45:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cxs3xTGseJzH for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 14:45:11 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 41C423A6B65 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 14:45:11 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZDTV079793 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44LZDJW079792; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZ2Ja079782 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44LZ1Ho023777 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:35:01 -0400
Message-Id: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Non-SHA-1 fingerprints
Date: Mon, 4 May 2009 17:35:01 -0400
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Now that I think about the variable-hash fingerprint question a bit,  
I'm concerned about things like RFC-4398, which uses OpenPGP  
fingerprints in DNS.  There is a fingerprint field there, and it is  
variable length, but it has no concept of hash algorithm.  We'd have  
to define some standard way to write out a fingerprint in binary with  
the hash field incorporated.

So given that, I am wondering why we need a delimiter between the hash  
specifier and the fingerprint data for the human-readable version at  
all?  A written fingerprint is expected to be readable, but not  
interpretable by a human being anyway, and software doesn't care about  
the delimiter one way or another.

So rather than 01.23456789ABCDEF.... or MD5-23456789ABCDEF... why not  
just 0123456789ABCDEF... ?

We already have a concept of variable length fingerprints (V3 = 16  
bytes, and V4 = 20 bytes), and this fits reasonably well alongside  
those two.  The rule would be 16 bytes means it's V3, 20 bytes means  
it's V4, and an odd number of bytes means it's this new format.  If  
you see an odd number of bytes, you pull off the leftmost byte, and  
that's the algorithm number.  The rest of the bytes are the hash  
value.  We can trivially transform a V4 fingerprint into this new  
format by sticking the value 2 in front of it.

This does, of course, presume that all of our hashes for OpenPGP in  
the future will generate an even number of bytes.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 15:04:23 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E8EBF3A6C6D for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:04:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f37ZtFi1zach for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:04:23 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D0B913A69B4 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 15:04:22 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpwX1080695 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Lpw7L080694; Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpuKV080687 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 14:51:57 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Lpt82023932 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:51:56 -0400
Message-Id: <0F0DEA3C-A1B9-4F24-8F1E-9B8649F2464C@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <49FF325A.80106@fifthhorseman.net>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: New results against SHA-1
Date: Mon, 4 May 2009 17:51:55 -0400
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>	<49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 2:22 PM, Daniel Kahn Gillmor wrote:

> On 05/04/2009 01:38 PM, Werner Koch wrote:
>> Using a number (2) and, say, a dot as a prefix would be a better  
>> choice.
>> We use algorithnm numbers anyway and OpenPGP users are used tp  
>> spell a
>> large row of hex digits; we would only confuse them with an S and  
>> an H..
>
> ok, that works for me.  would the prefix be in hex or decimal?  for
> example, would an SHA512 fingerprint look like
> a. 
> 3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff
>
> or
>
> 10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff
>
> Ugh.  that's horrifically long either way.  Is a base64 encoding worth
> considering?  it would shave off a third of the length, but it seems
> like it would introduce significant ambiguity (0 vs O, A vs a, etc)

I'm sure there is a study somewhere that says just how long of a  
string a human being can handle without getting lost, but even without  
such a study I can say that 512 bits is just too long for usability.   
If you think about it, the whole point of fingerprints is that they're  
a short way to refer to a key.  If we make them too long, we're  
hurting the very thing that fingerprints were created for.

"3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff 
" is not exactly the kind of thing someone could print on a business  
card or read to a corespondent over the phone.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 15:18:47 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E7463A687F for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:18:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qAwXMZaXD887 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:18:46 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6E4613A70F7 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 15:16:17 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9bBd081710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M9bGE081709; Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9ZFJ081702 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:09:36 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 40FCB31A58B for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:35 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 1A884598099 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:35 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id NW5dxk15LoHW for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:34 +0200 (CEST)
Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D15D7598091 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:34 +0200 (CEST)
Message-ID: <49FF679E.1090400@epointsystem.org>
Date: Tue, 05 May 2009 00:09:34 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>	<49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net>
In-Reply-To: <49FF325A.80106@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig61BC0E22A9B40C8F1917A17F"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig61BC0E22A9B40C8F1917A17F
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

> Ugh.  that's horrifically long either way.  Is a base64 encoding worth
> considering?  it would shave off a third of the length, but it seems
> like it would introduce significant ambiguity (0 vs O, A vs a, etc)

I would go the other way. Since collision-resistance is not an issue with=

fingerprints, 128 bits are perfectly adequate for 2048-bit keys (i.e. bre=
aking
the key and making a new key matching the fingerprint require about the s=
ame
amount of work). Also, keeping mobile phones in mind, I would suggest usi=
ng 40
decimal digits. This way, the total length of fingerprints remain the sam=
e (40
characters), but typing them in on a decimal keypad would be much faster =
than
currently.

--=20
Daniel


--------------enig61BC0E22A9B40C8F1917A17F
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/Z54ACgkQoeH/BzqmYjhxbgCgjDKZk2nfRWSZojAa9qklaeZR
rQwAn2XGQCI0Q8Z2ckSWMHITtpd7mU4s
=2qFS
-----END PGP SIGNATURE-----

--------------enig61BC0E22A9B40C8F1917A17F--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 15:19:08 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 575613A7058 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:19:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JU-gSH8Ny1Ii for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:19:07 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2D9963A7169 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 15:17:43 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4rdl081493 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M4rhT081492; Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4fpv081481 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:04:52 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8F77C31A571; Tue,  5 May 2009 00:04:40 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 112B8598099; Tue,  5 May 2009 00:04:40 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id xcNlf78UM7xl; Tue,  5 May 2009 00:04:39 +0200 (CEST)
Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id C9A52598091; Tue,  5 May 2009 00:04:39 +0200 (CEST)
Message-ID: <49FF6677.7070907@epointsystem.org>
Date: Tue, 05 May 2009 00:04:39 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig3A44C71DF68C61ECC525EF57"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3A44C71DF68C61ECC525EF57
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

David Shaw wrote:
>=20
> Now that I think about the variable-hash fingerprint question a bit, I'=
m
> concerned about things like RFC-4398, which uses OpenPGP fingerprints i=
n
> DNS.=20

For fingerprints, MDC and self-signatures, collision-resistance does not =
matter,
only the one-way property. So I think it is totally safe to postpone disc=
ussion
until SHA3 is selected.

Reviewing the fingerprint is a MAJOR issue, as (parts of) fingerprints ar=
e used
as lookup keys in the PKS database.

Here are some points:

I believe that a fingerprint that is longer than 160 bits is pointless; e=
ven 160
bits is an overkill causing inconvenience with no tangible benefit in ter=
ms of
security over a 128 bit fingerprint.

What does cause some problems, is the fact that the creation date (32 bit=
s) is
included in the fingerprint. It makes sevaral attacks substantially easie=
r than
if the fingerprint was calculated only over the key material and key attr=
ibutes
(such as key type). Basically, it should be impossible for the same key t=
o have
different fingerprints.

Also, since mobile phones typically have a numeric keypad, it would be ni=
ce if
fingerprints and key IDs were numeric-only. It is an increasingly importa=
nt
platform for OpenPGP, I believe.

--=20
Daniel


--------------enig3A44C71DF68C61ECC525EF57
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/ZncACgkQoeH/BzqmYjhfeACfRnMUEXiw7+Y1Yvnp8TYGchbh
2U8AoKbcP+V3g8YXf+hJlsWbgdJyQe9z
=ce8+
-----END PGP SIGNATURE-----

--------------enig3A44C71DF68C61ECC525EF57--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 15:55:17 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 170173A684E for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:55:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TXMxKlndbblp for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 15:55:16 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 06BD23A682D for <openpgp-archive@ietf.org>; Mon,  4 May 2009 15:55:15 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJKuH082315 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44MJK3l082314; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJ97m082294 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:41870) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M16V9-0003rE-CR (Exim 4.69) (return-path <iang@systemics.com>); Mon, 04 May 2009 23:19:07 +0100
Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 52A5E5D65; Mon,  4 May 2009 23:19:04 +0100 (GMT/BST)
Message-ID: <49FF69D9.7070206@systemics.com>
Date: Tue, 05 May 2009 00:19:05 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 4/5/09 23:35, David Shaw wrote:

> This does, of course, presume that all of our hashes for OpenPGP in the
> future will generate an even number of bytes.


I like the idea.

But, I'm the one who favours aphorisms such as "there is only one mode, 
and it is secure."  Or, perhaps, "There is one cipher suite, and it is 
numbered Number 1."

So I would be looking for SHA3 as the one and only thing that ever 
hashes the publics, and bugger the rest.  Algorithm agility is for the 
birds.  We would just need to agree how many even bytes to allocate to 
the SHA3 for the next 4 decades.

iang


From owner-ietf-openpgp@mail.imc.org  Mon May  4 16:34:28 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0A2613A6C51 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 16:34:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PnRF6leubaCK for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 16:34:27 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D9A1F3A6B13 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 16:34:26 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQPQJ086141 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NQP5k086140; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQEjb086130 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id CE5732E215 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:27:06 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-02 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:27:02 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 3FB282E5B8 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:27:02 -0700 (PDT)
Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:26:09 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:26:09 -0700
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org>
From: Jon Callas <jon@callas.org>
To: David Shaw <dshaw@jabberwocky.com>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: Changing GPG's default key type
Date: Mon, 4 May 2009 16:26:07 -0700
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>
>
> One issue, of course, is that RSA is not a required key type in  
> OpenPGP, so there could be some implementation out there that won't  
> be able to handle it.  I'm not terribly concerned about this, as in  
> practice, the vast majority of code has handled RSA just fine for  
> the past decade, and if a particular user needs to generate a non- 
> RSA key, they can still do so.
> There are a few other details (RSA signatures are physically larger,  
> etc), but I believe they are outweighed by the benefit of the larger  
> key and additional hash flexibility.

PGP does precisely this now. The default you'll get when creating a  
new key is RSA 2048.

I'll invoke Jeff Schiller in this as well. The DSA/Elgamal keys are  
mandatory to implement. Mandatory to implement does not mean mandatory  
to use. It would be perfectly reasonable to make an RSA-only system  
that merely didn't hork up a hairball when it found a DSA key.

Many X.509 systems are like this too -- DSA is the mandatory-to- 
implement, but it's not clear that anyone has ever created a DSA  
certificate outside of interop testing. I'm sure someone can find some  
example that proves me literally wrong on that, but figuratively right.

These days, I see the effective -- ummm, I'm looking for the right  
word, I don't want to say "deprecate" -- minimization of integer  
discrete log. The world is pretty much integer RSA, and moving to  
elliptic curve discrete log.

	Jon

-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFJ/3mRsTedWZOD3gYRAvnSAJ930wrrwBfdtMQR7u45vOXhP1nCqQCcCUSb
mmQtr8tYoSe5XMK6ya3Jg5Q=
=JpoU
-----END PGP SIGNATURE-----


From owner-ietf-openpgp@mail.imc.org  Mon May  4 16:40:21 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 203953A6C5C for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 16:40:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zCkbIFKMuXB1 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 16:40:20 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C47DD3A6BD5 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 16:40:19 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWxab086472 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NWxei086471; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWw9I086465 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 5E9EA2E659 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:33:51 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-05 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:33:46 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 990162E3CA for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:33:46 -0700 (PDT)
Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:32:53 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:32:53 -0700
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <C9D4DE45-C67F-45C6-96C2-2B0AB379B846@callas.org>
From: Jon Callas <jon@callas.org>
To: David Shaw <dshaw@jabberwocky.com>
In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: Non-SHA-1 fingerprints
Date: Mon, 4 May 2009 16:32:52 -0700
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the last IETF meeting, Derek discussed new drafts (particularly  
this one) with Tim Polk, and either Derek can shepherd it, or we can  
find someone else. I sent Derek a sketch of what I propose.

Note that it's pretty much what's been discussed here, but I used a  
colon (which is what I remember in the original proposal) rather than  
a dot.

> From: "Jon Callas" <jcallas@pgp.com>
> Date: April 1, 2009 3:43:08 AM PDT
> To: "Derek Atkins" <warlord@pgp.com>
> Cc: "Jon Callas" <jon@pgp.com>
> Subject: Re: OpenPGP Extensions Doc(s)
>
> * PGP Signed: 04/01/2009 at 07:37:45 AM, Decrypted
>

...

>
> Here's what I propose:
>
> We define a new fingerprint.
>
> Basics
> ------
>
> The fingerprint is a struct, consisting of:
>
> Hash Alogrithm Type (1 Octet)
> Hash Value (N Octets)
>
> The hash is computed over the same fields of the key packet, just as  
> in RFC4880, just with a different hash function than SHA1.
>
> Truncations
> -----------
>
> The Hash Value may be of any size equal to or less than the natural  
> size of the hash function. If it is a truncation, then it is the  
> high-order bits. Thus, the SHA1 hash "ED15 5BDF CD41 ADFC 00F3  28B6  
> 52BF 5A46 BC98 E63D" truncated to 64 bits is "ED15 5BDF CD41 ADFC".
>
> There are a number of reasons truncating a fingerprint. One is for  
> ease in transport, display, etc. In the past, we moved from 16-byte  
> fingerprints to 20-byte fingerprints. While a larger fingerprint may  
> have increased cryptographic use, human beings still sometimes use  
> them
>
> Display
> -------
>
> The normal display of a fingerprint is:
>
> <algid>:<hex digits>
>
> White space may be added for readability.
>
> Example:
>
> 2:ED15 5BDF CD41 ADFC 00F3  28B6 52BF 5A46 BC98 E63D
>
> Other formats are possible, but they should remember to show the  
> algorithm either numberically or symbolically. Note that RFC 4880  
> defines ASCII display strings for all algorithms.
>
> Fingerprint Preference
> ----------- ----------
> This is a new preference subpacket that is a single byte of the hash  
> algorithm preferred fingerprint type. Not only can this be used by  
> an implementation for display, but an implementation SHOULD use this  
> algorithm for determining a key id when encrypting to that key.
>
> If this preference is not present, the implementation SHOULD use old- 
> style SHA1 fingerprints.
>
> Key IDs
> --- ---
>
> OpenPGP already has one natural truncation of the fingerprint, the  
> Key ID. Under this proposal, a Key ID is a 64-bit truncation of the  
> Hash Value of a fingerprint. An example is given above.
>
> Note that for SHA1, this means that there are two possible Key IDs,  
> the old one and a new one. RFC 4880 (and 2440 before it) already  
> said that an implementation must recognize that there could be  
> collisions in Key IDs. An implementation SHOULD use the old-style  
> one unless there is a preference specifying SHA1.
>
> Other places to look at
> ----- ------ -- ---- --
>
> We need to look at updating (or handwaving) 5.2.3.15.  Revocation Key.
>
> What do you think?
>
> 	Jon
>
>
> -- 
> Jon Callas
> CTO, CSO
> PGP Corporation         Tel: +1 (650) 319-9016
> 200 Jefferson Drive     Fax: +1 (650) 319-9001
> Menlo Park, CA 94025    PGP: ed15 5bdf cd41 adfc 00f3
> USA                          28b6 52bf 5a46 bc98 e63d
>
>
>
>
> * Jon Callas <jcallas@pgp.com>
> * 0xBC98E63D(L)
>


-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFJ/3slsTedWZOD3gYRAlWTAJ9C2q5AAqUNMLMbsNlz/teDfMaT+ACfYm4U
iGyxP9l5DBF+7yAfwR83uu0=
=SV8T
-----END PGP SIGNATURE-----


From owner-ietf-openpgp@mail.imc.org  Mon May  4 17:24:03 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A06E33A6E3D for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 17:24:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PJUchmg-otyr for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 17:24:02 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 72C6E3A6D96 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 17:24:02 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDHp089058 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HD1N089056; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HBwW089041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9X0025116; Mon, 4 May 2009 20:17:10 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
Date: Mon, 4 May 2009 20:17:10 -0400
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
X-Mailer: Apple Mail (2.930.3)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:

> David Shaw wrote:
>>
>> Now that I think about the variable-hash fingerprint question a  
>> bit, I'm
>> concerned about things like RFC-4398, which uses OpenPGP  
>> fingerprints in
>> DNS.
>
> For fingerprints, MDC and self-signatures, collision-resistance does  
> not matter,
> only the one-way property. So I think it is totally safe to postpone  
> discussion
> until SHA3 is selected.

It's a larger problem than just fingerprints.  We also use a  
fingerprint as a specifier inside the revocation key subpacket, to  
designate which key can be used to issue revocations on our behalf.   
The thing is, though, a fingerprint isn't really a very good  
revocation key specifier:

Fingerprints:
* Must be human-readable
* Needs to be small to be useful
* Can collide to some small amount (4880 even documents that they  
collide in section 12.2)

Revocation key specifier:
* Does not need to be human-readable
* Has much looser size requirements (shouldn't be enormous, but  
certainly can be bigger than 160 bits without hurting anything)
* Should never collide (we don't want the wrong key being able to  
revoke our key)

Perhaps we'd do better by leaving fingerprints alone and instead  
fixing how we specify revocation keys?

We could try to come up with a new non-colliding way to disambiguate  
keys, but fundamentally, anything that is smaller than the key packet  
itself can still collide.  So instead, why not define a new revocation  
subpacket that contains the class octet from the old revocation key,  
and the rest of the subpacket is simply a copy of the public key  
packet in question?  I don't mean the whole transferable public key,  
of course, just the contents of packet #6.  This public key packet  
doesn't need any self-signatures or anything else like that, as it is  
implicitly authenticated by the signature that carries the revocation  
key subpacket.

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 17:50:31 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A27AD28C130 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 17:50:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U7Iv33ksBafV for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 17:50:31 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8932D28C126 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 17:50:30 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDi1089057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HDcE089055; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HB8s089038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9Wx025116; Mon, 4 May 2009 20:17:09 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: Non-SHA-1 fingerprints
Date: Mon, 4 May 2009 20:17:09 -0400
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
X-Mailer: Apple Mail (2.930.3)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:

> Also, since mobile phones typically have a numeric keypad, it would  
> be nice if
> fingerprints and key IDs were numeric-only. It is an increasingly  
> important
> platform for OpenPGP, I believe.

I think that is a good point and a great idea, but the only reason  
that fingerprints and key IDs are printed in hex now is tradition.   
There is nothing in the standard one way or another about how humans  
should consume fingerprints.  You could even do it with the current V4  
fingerprints: just as my key fingerprint is
7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct  
as 716901811312187285520504099705403090347495794016 in decimal.  The  
big problem I see here is that's it's an awfully long number to type  
into a mobile keypad.  (Well, that, and persuading the various  
implementations to support the decimal format in addition to the  
traditional hex).

David


From owner-ietf-openpgp@mail.imc.org  Mon May  4 18:30:38 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 148993A715C for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 18:30:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.664
X-Spam-Level: 
X-Spam-Status: No, score=-3.664 tagged_above=-999 required=5 tests=[AWL=-0.065, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4WJNIHvNfG-E for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 18:30:37 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id E7DC43A714C for <openpgp-archive@ietf.org>; Mon,  4 May 2009 18:30:35 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n451Lkkd092530 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n451LkLD092529; Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n451LYAX092518 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 18:21:45 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 76223 invoked from network); 5 May 2009 01:21:34 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 01:21:34 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FF94D4.3030101@fifthhorseman.net>
Date: Mon, 04 May 2009 21:22:28 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: decimal fingerprints [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
In-Reply-To: <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigBCCF34F563DA425E7D624803"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigBCCF34F563DA425E7D624803
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 08:17 PM, David Shaw wrote:
>=20
> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:
>=20
>> Also, since mobile phones typically have a numeric keypad, it would be=

>> nice if
>> fingerprints and key IDs were numeric-only. It is an increasingly
>> important
>> platform for OpenPGP, I believe.
>=20
> I think that is a good point and a great idea, but the only reason that=

> fingerprints and key IDs are printed in hex now is tradition.  There is=

> nothing in the standard one way or another about how humans should
> consume fingerprints.  You could even do it with the current V4
> fingerprints: just as my key fingerprint is
> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct
> as 716901811312187285520504099705403090347495794016 in decimal.  The bi=
g
> problem I see here is that's it's an awfully long number to type into a=

> mobile keypad.

How often does anyone type in a fingerprint at all?  My impression of
the typical workflow is:


 * read fingerprint from physical media (business card, scrap of paper, e=
tc)

 * search for a key from the public keyservers (usually by User ID).

 * scan list of results for a key with a matching keyid (truncated
fingerprint)

 * fetch selected key from keyserver

 * view/double-check fingerprint of fetched key againt physical media

In this workflow, the only typing done is to enter the user id to search
for (and even that is not always needed on a mobile device, because the
person searched for is may already be in the address book for other
contacts).  if the fingerprint is entered, it's often only the truncated
keyid, which is guaranteed to be much smaller than the fpr in any case.

Making this change to the fingerprint presentation seems huge: are
people expected to change all their business cards, .sigs, web sites,
etc. to show both styles of fingerprint?  or to completely transition to
the new style?  in terms of truncated fingerprints (keyids), how are we
to distinguish between the ones which currently have only digits 0-9 in
hex and decimal-style fingerprints?  This seems like a very costly
tradeoff for the sake of thumbing in 8 decimal characters instead of 8
hex digits.

	--dkg


--------------enigBCCF34F563DA425E7D624803
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=rSZr
-----END PGP SIGNATURE-----

--------------enigBCCF34F563DA425E7D624803--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 19:54:14 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B0643A67EF for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 19:54:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.655
X-Spam-Level: 
X-Spam-Status: No, score=-3.655 tagged_above=-999 required=5 tests=[AWL=-0.056, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fVV+cAbTX222 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 19:54:10 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id DBD243A6359 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 19:54:09 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kfLt097036 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452kfEK097035; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452keiu097028 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 90422 invoked from network); 5 May 2009 02:46:38 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:46:38 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FFA8C0.70306@fifthhorseman.net>
Date: Mon, 04 May 2009 22:47:28 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigE9C3B898F6A8B9A72D08A57A"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE9C3B898F6A8B9A72D08A57A
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
> For fingerprints, MDC and self-signatures, collision-resistance does no=
t matter,
> only the one-way property. So I think it is totally safe to postpone di=
scussion
> until SHA3 is selected.

The more that i consider this, the more important it seems.  Thank you
for emphasizing it, Daniel.

If i understand you correctly, your point is that fingerprints and
self-signatures use hashes over data that is provided entirely by the
signer, covering nothing that is supplied by an outside party.

Since "birthday" attacks rely on the attacker generating an arbitrary
collision, providing one side of it for signing by the victim, and then
transferring the signature onto the other side of the discovered
collision, they do not work against material under full control of the
signer (like fingerprints and self-sigs).

Even if the recent claims of O(2^52) (instead of the
theoretically-optimal 2^80) operations to generate a colliding pair were
to scale proportionally to attacks against the one-wayness of SHA-1,
that would mean O(2^104) (instead of 2^160) operations to find a message
that hashes to a given value.  i have no idea if these sort of results
can actually scale this way, but i  imagine we'd hear a much larger
hullabaloo if someone had announced an  attack against the one-wayness
of SHA-1 with less than O(2^104) operations.

Anyway, since 2^104 is still outside the capabilities of well-funded
organizations, we have breathing room on these parts of the
specification that only rely on collision-resistance.

Did i get anything wrong above?  I apologize if this is elementary for
everyone else, i'm just trying to make sure i understand the ideas involv=
ed.

	--dkg


--------------enigE9C3B898F6A8B9A72D08A57A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=5ffQ
-----END PGP SIGNATURE-----

--------------enigE9C3B898F6A8B9A72D08A57A--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 19:56:38 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A58223A6A1A for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 19:56:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.648
X-Spam-Level: 
X-Spam-Status: No, score=-3.648 tagged_above=-999 required=5 tests=[AWL=-0.049, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FlGn24ZA6YsB for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 19:56:37 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 27EA43A6359 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 19:55:36 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452mMwP097152 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452mMCA097151; Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452mL4J097145 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 19:48:21 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 90678 invoked from network); 5 May 2009 02:48:20 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:48:20 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FFA92E.50100@fifthhorseman.net>
Date: Mon, 04 May 2009 22:49:18 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig107BF823AF3E617747B108F1"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig107BF823AF3E617747B108F1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 08:17 PM, David Shaw wrote:
> Perhaps we'd do better by leaving fingerprints alone and instead fixing=

> how we specify revocation keys?=20
 [...]
> why not define a new revocation
> subpacket that contains the class octet from the old revocation key, an=
d
> the rest of the subpacket is simply a copy of the public key packet in
> question?  I don't mean the whole transferable public key, of course,
> just the contents of packet #6.

This seems like a good strategy to me, and a *much* simpler one than
trying to overhaul fingerprints!  In fact, this seems like a good idea
whether or not fingerprints are overhauled.  Are there any objections in
the WG to this re-definition of revocation key subpackets?  the largest
realistic keys out there right now are still only around 1KB of a
subpacket, and revocation key subpackets themselves are pretty rare.  So
the added size doesn't seem problematic to me.

	--dkg


--------------enig107BF823AF3E617747B108F1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=7grO
-----END PGP SIGNATURE-----

--------------enig107BF823AF3E617747B108F1--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 20:10:33 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0D5253A6816 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 20:10:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.424
X-Spam-Level: 
X-Spam-Status: No, score=-4.424 tagged_above=-999 required=5 tests=[AWL=-0.825, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z3F-IhTakR61 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 20:10:32 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id C4D4A3A6811 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 20:10:30 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532uJZ098147 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 20:02:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4532uMq098146; Mon, 4 May 2009 20:02:56 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.auckland.ac.nz (curly.its.auckland.ac.nz [130.216.12.33]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532jVV098136 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 20:02:55 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id CEE3F9FE85; Tue,  5 May 2009 15:02:44 +1200 (NZST)
X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz
Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (curly.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWjt9zissPYP; Tue,  5 May 2009 15:02:44 +1200 (NZST)
Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 582829FB6F; Tue,  5 May 2009 15:02:42 +1200 (NZST)
Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id A88031DE4001; Tue,  5 May 2009 15:02:36 +1200 (NZST)
Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from <pgut001@wintermute01.cs.auckland.ac.nz>) id 1M1AvU-0002Fn-HI; Tue, 05 May 2009 15:02:36 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: dshaw@jabberwocky.com, jon@callas.org
Subject: Re: Changing GPG's default key type
Cc: ietf-openpgp@imc.org
In-Reply-To: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org>
Message-Id: <E1M1AvU-0002Fn-HI@wintermute01.cs.auckland.ac.nz>
Date: Tue, 05 May 2009 15:02:36 +1200
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Jon Callas <jon@callas.org> writes:

>Many X.509 systems are like this too -- DSA is the mandatory-to-implement,
>but it's not clear that anyone has ever created a DSA certificate outside of
>interop testing.

Actually even the pretense of that one was dropped a long time ago, no-one
apart from the people drafting the standards (and I'm not even sure about
them) was ever under any illusion that the de facto standard was anything
other than RSA (the PKIX spec still contains DSA signing certs because they
were created by NIST more than a decade ago, not because they reflect current
practice).  People didn't even pretend to do the encryption-algorithm side of
things, X9.42 DH, the only implementation I know of that bothered with this
was the SFL reference implementation, which didn't have any choice in the
matter [0].  Microsoft implemented it as a read-only (i.e. decrypt-only)
option specifically to avoid accusations that they didn't comply with the
standard, but that was about all.  The last time I checked the specs still
fudged the matter by saying that you MUST support one of the following
shopping-list (including things like MD2 and X9.42), but most implementers
know how to interpret this, MUST RSA, WHO-CARES anything else.

Peter.

[0] So everyone claimed standards compliance without being compliant secure in
    the knowledge that since no-one else was either, this could never be 
    checked.


From owner-ietf-openpgp@mail.imc.org  Mon May  4 20:24:04 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7058A3A6C5A for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 20:24:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.902
X-Spam-Level: 
X-Spam-Status: No, score=-5.902 tagged_above=-999 required=5 tests=[AWL=0.697, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nMNUOP8OeJJV for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 20:24:03 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3255F3A67FA for <openpgp-archive@ietf.org>; Mon,  4 May 2009 20:24:02 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452klZ3097054 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452klUQ097053; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.auckland.ac.nz (larry.its.auckland.ac.nz [130.216.12.34]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kVYg097007 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 2EAF61A9A8 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:31 +1200 (NZST)
X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz
Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (larry.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UDz6NGCu2qBW for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:31 +1200 (NZST)
Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 125091A9A2 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:30 +1200 (NZST)
Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id 150651BE4001 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:30 +1200 (NZST)
Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from <pgut001@wintermute01.cs.auckland.ac.nz>) id 1M1Aft-0001ZO-TZ for ietf-openpgp@imc.org; Tue, 05 May 2009 14:46:29 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: ietf-openpgp@imc.org
Subject: Re: New results against SHA-1
In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net>
Message-Id: <E1M1Aft-0001ZO-TZ@wintermute01.cs.auckland.ac.nz>
Date: Tue, 05 May 2009 14:46:29 +1200
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:

>What do other folks think?

Given that the MDC is a hash of plaintext that's then encrypted, and the hash 
value is itself encrypted, I'm not losing any sleep over it.  The hash attacks 
so far have required bit-for-bit carefully-chosen plaintext with known hash 
values, not unknown (or even partially-known) plaintext with an unknown hash 
value.

Peter.


From owner-ietf-openpgp@mail.imc.org  Mon May  4 21:15:45 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E4BC83A6BA7 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 21:15:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.642
X-Spam-Level: 
X-Spam-Status: No, score=-3.642 tagged_above=-999 required=5 tests=[AWL=-0.043, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6iZo6RakFhZh for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 21:15:45 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0EF723A6BED for <openpgp-archive@ietf.org>; Mon,  4 May 2009 21:15:37 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4544dZA001088 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4544dBG001087; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4544cMQ001081 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 2495 invoked from network); 5 May 2009 04:04:37 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 04:04:37 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FFBB0B.9070209@fifthhorseman.net>
Date: Tue, 05 May 2009 00:05:31 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: how to specify "trust no signatures over hash X from this key"?
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig6B3E60808F65218637960D5B"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig6B3E60808F65218637960D5B
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

As i'm thinking about hash function transitions right now, it occurs to
me that i'm not sure how to specify something like "The holder of this
key will never issue signatures using digest algorithm $foo"

In RFC 4880, section 5.2.3.8 the digest algorithm preferences subpacket
says something similar:

   Message digest algorithm numbers that indicate which algorithms the
   key holder prefers to receive.  Like the preferred symmetric
   algorithms, the list is ordered.  Algorithm numbers are in Section 9.
   This is only found on a self-signature.

But this is semantically something fairly different from stating what
kind of use the keyholder expects to pursue.

Consider the case where a user has in the past made and published
MD5-based signatures, and no longer believes that hash algorithm is
secure for the purposes used (or if you like, think into the near
future, and imagine the same situation with SHA1).

It seems to me that it would be useful to have a way that a keyholder
could explicitly state "I no longer make signatures over digest X.
Please consider any signatures from this key using digest X to be invalid=
=2E"

This does lead to the possibility of an explicit "impedance mismatch",
where Alice says "I never issue MD5, SHA1, or RIPEMD160 digests" and Bob
says "I prefer to receive only SHA1, RIPEMD160, or MD5 digests" -- in
this case, Alice's key is useless to Bob.  But this impedance mismatch
exists implicitly anyway, if these are the actual policies.  It seems
like it would be useful to know that the conflict exists at that level.

Note: *could* a user say "i never issue SHA1 signatures" and remain
4880-compliant?  I think so; the spec says that implementations MUST
implement SHA1, but it does not say that they must force the user to use
it or trust it.

Is there interest in being able to explicitly state such a policy?
Would this be worth a new subpacket type?  If so, would it make sense
for ciphers as well as digests?

	--dkg


--------------enig6B3E60808F65218637960D5B
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=pCgL
-----END PGP SIGNATURE-----

--------------enig6B3E60808F65218637960D5B--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 23:23:25 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7532D3A6AD7 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:23:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rsUp9FxA00Nh for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:23:24 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 345D73A6820 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 23:23:23 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456EH9E008283 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456EHQM008282; Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456E5ac008275 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:14:16 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4968431A8C0; Tue,  5 May 2009 08:14:04 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 234EC598099; Tue,  5 May 2009 08:14:04 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id CYSw8j1xOjfC; Tue,  5 May 2009 08:14:03 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id CD7E7598091; Tue,  5 May 2009 08:14:03 +0200 (CEST)
Message-ID: <49FFD926.20802@epointsystem.org>
Date: Tue, 05 May 2009 08:13:58 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF756CAA244F068AD36E04778"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigF756CAA244F068AD36E04778
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi,

David Shaw wrote:
> It's a larger problem than just fingerprints.  We also use a fingerprin=
t
> as a specifier inside the revocation key subpacket, to designate which
> key can be used to issue revocations on our behalf.  The thing is,
> though, a fingerprint isn't really a very good revocation key specifier=
:
>=20
> Fingerprints:
> * Must be human-readable
> * Needs to be small to be useful
> * Can collide to some small amount (4880 even documents that they
> collide in section 12.2)

That's not the fingerprint. That's the key ID.

> Revocation key specifier:
> * Does not need to be human-readable
> * Has much looser size requirements (shouldn't be enormous, but
> certainly can be bigger than 160 bits without hurting anything)
> * Should never collide (we don't want the wrong key being able to revok=
e
> our key)

In case of collision, both colliding pre-images are done by the same enti=
ty.

> Perhaps we'd do better by leaving fingerprints alone and instead fixing=

> how we specify revocation keys?

There is nothing wrong with them at present.

Well, actually, I would argue that revocation is currently over-designed.=
 Since
revocation is an irreversible act, there is no need for the heavy artille=
ry of
digital signatures for that purpose. All the s2k specifiers used for symm=
etric
encryption would do (in a hashed sub-packet together with the resulting
symmetric key) and inserting a non-hashed sub-packet with a matching revo=
cation
passphrase into the revoked signature would be just as secure a method fo=
r
revocation than adding a revocation signature packet.

There is no need for asymmetric crypto for revocation. Instead of revocat=
ion
signatures, it would be perfectly safe to use revocation passphrases.

> We could try to come up with a new non-colliding way to disambiguate
> keys, but fundamentally, anything that is smaller than the key packet
> itself can still collide.

Again, collisions are not important in this case. Collisions only matter =
when
the signed information is compiled by a different entity than the signer.=


With a hash that is one-way but not collision resistant, you can do two k=
eys
that have the same fingerprint. So whay? Both are under your control, a
signature with either is your signature.

> So instead, why not define a new revocation
> subpacket that contains the class octet from the old revocation key, an=
d
> the rest of the subpacket is simply a copy of the public key packet in
> question?

It costs more and does not provide any extra security. I mean there is no=
 attack
that can be prevented in this way. Therefore, it is less secure.

>  I don't mean the whole transferable public key, of course,
> just the contents of packet #6.  This public key packet doesn't need an=
y
> self-signatures or anything else like that, as it is implicitly
> authenticated by the signature that carries the revocation key subpacke=
t.

It still makes the key fatter without making any attack more difficult. I=
t won't
make illegitimate revocation more difficult.

--=20
Daniel


--------------enigF756CAA244F068AD36E04778
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/2SoACgkQoeH/BzqmYjhn+ACfXrHUxacK1Yon5Iwf32CPRY01
TuoAoJIBIlvrFmqoHGhEaIJUMScF93cu
=lxIl
-----END PGP SIGNATURE-----

--------------enigF756CAA244F068AD36E04778--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 23:24:16 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1863828C0E2 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:24:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cMp44t19yPWa for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:24:15 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id D3EA03A6AD7 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 23:24:14 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HrEM008484 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Hr1k008483; Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HquA008477 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:17:52 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4346811A972 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:49 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 26873598099 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:49 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Wbp6SqEfRbcG for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:49 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D457A598091 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:48 +0200 (CEST)
Message-ID: <49FFDA0C.6040900@epointsystem.org>
Date: Tue, 05 May 2009 08:17:48 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <49FFA8C0.70306@fifthhorseman.net>
In-Reply-To: <49FFA8C0.70306@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig7486F63840E3487114A61F7A"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig7486F63840E3487114A61F7A
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Your reasoning below is correct, as far as I can tell.

Daniel Kahn Gillmor wrote:
> On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
>> For fingerprints, MDC and self-signatures, collision-resistance does n=
ot matter,
>> only the one-way property. So I think it is totally safe to postpone d=
iscussion
>> until SHA3 is selected.
>=20
> The more that i consider this, the more important it seems.  Thank you
> for emphasizing it, Daniel.
>=20
> If i understand you correctly, your point is that fingerprints and
> self-signatures use hashes over data that is provided entirely by the
> signer, covering nothing that is supplied by an outside party.
>=20
> Since "birthday" attacks rely on the attacker generating an arbitrary
> collision, providing one side of it for signing by the victim, and then=

> transferring the signature onto the other side of the discovered
> collision, they do not work against material under full control of the
> signer (like fingerprints and self-sigs).
>=20
> Even if the recent claims of O(2^52) (instead of the
> theoretically-optimal 2^80) operations to generate a colliding pair wer=
e
> to scale proportionally to attacks against the one-wayness of SHA-1,
> that would mean O(2^104) (instead of 2^160) operations to find a messag=
e
> that hashes to a given value.  i have no idea if these sort of results
> can actually scale this way, but i  imagine we'd hear a much larger
> hullabaloo if someone had announced an  attack against the one-wayness
> of SHA-1 with less than O(2^104) operations.
>=20
> Anyway, since 2^104 is still outside the capabilities of well-funded
> organizations, we have breathing room on these parts of the
> specification that only rely on collision-resistance.
>=20
> Did i get anything wrong above?  I apologize if this is elementary for
> everyone else, i'm just trying to make sure i understand the ideas invo=
lved.
>=20
> 	--dkg
>=20


--------------enig7486F63840E3487114A61F7A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/2gwACgkQoeH/BzqmYjgKNwCg3933RhIsA85EMI+lhIoMv6LO
kIIAoLq19Ms4RZH8vLqgVaK0vcfwf91s
=3hVN
-----END PGP SIGNATURE-----

--------------enig7486F63840E3487114A61F7A--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 23:36:36 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52E953A6A70 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:36:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pdb-rjyt3MK4 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:36:35 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 1921B3A695B for <openpgp-archive@ietf.org>; Mon,  4 May 2009 23:36:34 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UBAF009026 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456UB90009024; Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UAmk009017 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:30:10 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2E26131A590; Tue,  5 May 2009 08:30:09 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 0A566598099; Tue,  5 May 2009 08:30:09 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id n5iGA7C1kZE4; Tue,  5 May 2009 08:30:08 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AFBF6598091; Tue,  5 May 2009 08:30:08 +0200 (CEST)
Message-ID: <49FFDCEF.5040006@epointsystem.org>
Date: Tue, 05 May 2009 08:30:07 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Changing GPG's default key type
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigADA531ADE781892CA88A4D27"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigADA531ADE781892CA88A4D27
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

There is one reason why I still use DSA keys in some of my applications:

They are much cheaper to generate. I strongly believe that in order for c=
rypto
to become ubiquitous, it is important that key pairs are generated right =
after
installation.

In case of RSA, it can go wrong in two ways:
1. RSA requires too many random bits and a computer that nobody touches c=
an just
freeze up waiting for random input.
2. The time to generate an RSA key is too long on cheap embedded hardware=
=2E

Of course, neither is of concern for GPG's default key; if you have such =
a
system, just tell it to generate DSA keys. But these two points should be=
 kept
in mind.

The obvious workaround for #1, is to read enough random bits for the secu=
rity of
the key (e.g. 256) and then seed a secure PRNG with them.

There is, however, no known workaround for #2. Generating a PGP-compliant=

1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enoug=
h to
make casual users frustrated and throw away the whole thing. Now, of cour=
se,
such slow mobiles are not manufactured anymore, but even 2 minutes is
unacceptable, which is the norm for today's low-end phones. And since the=
 market
 values battery life much more than computational muscle (low-end phones =
are
very responsive at present clock rates) in mobiles, this is not going to =
improve
too rapidly.

--=20
Daniel


--------------enigADA531ADE781892CA88A4D27
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/3O8ACgkQoeH/BzqmYjjujwCgkC5EGQtwYoAEwNY4VKHYgooT
hucAnjsB9OKhKWCBo3YQQalaUt55QBmF
=4lhF
-----END PGP SIGNATURE-----

--------------enigADA531ADE781892CA88A4D27--


From owner-ietf-openpgp@mail.imc.org  Mon May  4 23:53:47 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8EF2D3A68D9 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:53:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c-6UjkO7xzOU for <ietfarch-openpgp-archive@core3.amsl.com>; Mon,  4 May 2009 23:53:46 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 6828F3A6407 for <openpgp-archive@ietf.org>; Mon,  4 May 2009 23:53:46 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FhxB008363 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Fhn0008362; Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FWEx008349 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:15:42 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 7067D11A9BC for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:30 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 12992598099 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:30 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id DIY3oRhoJPCf for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:29 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id BD5EB598091 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:29 +0200 (CEST)
Message-ID: <49FFD981.3030501@epointsystem.org>
Date: Tue, 05 May 2009 08:15:29 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: decimal fingerprints [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com> <49FF94D4.3030101@fifthhorseman.net>
In-Reply-To: <49FF94D4.3030101@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigC704609DD70F977B4CBDADD5"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigC704609DD70F977B4CBDADD5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Actually, it is not the fingerprint, but the key ID that is typed in, but=
 it is
a NICE feature of OpenPGP at present that the key ID is simply a substrin=
g of
the fingerprint. I would hate to lose that.

Daniel Kahn Gillmor wrote:
> On 05/04/2009 08:17 PM, David Shaw wrote:
>> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:
>>
>>> Also, since mobile phones typically have a numeric keypad, it would b=
e
>>> nice if
>>> fingerprints and key IDs were numeric-only. It is an increasingly
>>> important
>>> platform for OpenPGP, I believe.
>> I think that is a good point and a great idea, but the only reason tha=
t
>> fingerprints and key IDs are printed in hex now is tradition.  There i=
s
>> nothing in the standard one way or another about how humans should
>> consume fingerprints.  You could even do it with the current V4
>> fingerprints: just as my key fingerprint is
>> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct=

>> as 716901811312187285520504099705403090347495794016 in decimal.  The b=
ig
>> problem I see here is that's it's an awfully long number to type into =
a
>> mobile keypad.
>=20
> How often does anyone type in a fingerprint at all?  My impression of
> the typical workflow is:
>=20
>=20
>  * read fingerprint from physical media (business card, scrap of paper,=
 etc)
>=20
>  * search for a key from the public keyservers (usually by User ID).
>=20
>  * scan list of results for a key with a matching keyid (truncated
> fingerprint)
>=20
>  * fetch selected key from keyserver
>=20
>  * view/double-check fingerprint of fetched key againt physical media
>=20
> In this workflow, the only typing done is to enter the user id to searc=
h
> for (and even that is not always needed on a mobile device, because the=

> person searched for is may already be in the address book for other
> contacts).  if the fingerprint is entered, it's often only the truncate=
d
> keyid, which is guaranteed to be much smaller than the fpr in any case.=

>=20
> Making this change to the fingerprint presentation seems huge: are
> people expected to change all their business cards, .sigs, web sites,
> etc. to show both styles of fingerprint?  or to completely transition t=
o
> the new style?  in terms of truncated fingerprints (keyids), how are we=

> to distinguish between the ones which currently have only digits 0-9 in=

> hex and decimal-style fingerprints?  This seems like a very costly
> tradeoff for the sake of thumbing in 8 decimal characters instead of 8
> hex digits.
>=20
> 	--dkg
>=20


--------------enigC704609DD70F977B4CBDADD5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/2YEACgkQoeH/BzqmYjhMqgCdGkyMIaZiWDsVXO3zwgaOwRbX
bpIAmgMAa48AYJM0yAeODejfeezxegtw
=boiH
-----END PGP SIGNATURE-----

--------------enigC704609DD70F977B4CBDADD5--


From owner-ietf-openpgp@mail.imc.org  Tue May  5 00:08:30 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 20F383A6881 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 00:08:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FxyzEjUzc36D for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 00:08:29 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 013A83A67F5 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 00:08:28 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456xHgS010463 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:59:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456xHTu010462; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456x6Qx010442 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:6543) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M1EcK-00005d-65 (Exim 4.69) (return-path <iang@systemics.com>); Tue, 05 May 2009 07:59:04 +0100
Received: from ip80-101-239-120.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 4F1915D65; Tue,  5 May 2009 07:58:58 +0100 (GMT/BST)
Message-ID: <49FFE3B2.9060408@systemics.com>
Date: Tue, 05 May 2009 08:58:58 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net>
In-Reply-To: <49FFBB0B.9070209@fifthhorseman.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 5/5/09 06:05, Daniel Kahn Gillmor wrote:

> Is there interest in being able to explicitly state such a policy?


None whatsoever.  Simplify, simplify, simplify.  One hash is good enough 
for 99.99% of the users, and the rest should be implementing not eulogising.

Has anyone read the OSS Guide to Sabotage?  In there it has a list of 
things about how to break up a user group.  One of them is to insist on 
following rules because they are important, another advice is to always 
refer things to a committee.

If it was updated today for IETF, it would say:  always insist on the 
right to variations in protocols, for future-proofing.

iang


From owner-ietf-openpgp@mail.imc.org  Tue May  5 00:13:45 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3D4683A6A70 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 00:13:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5bEDbAFay1kR for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 00:13:44 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2C9373A6881 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 00:13:43 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4577FhN010922 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4577F4R010920; Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45772lu010902 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 00:07:13 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Ek0-0005ZZ-Hs for <ietf-openpgp@imc.org>; Tue, 05 May 2009 09:07:00 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ecn-0008P5-QE for <ietf-openpgp@imc.org>; Tue, 05 May 2009 08:59:33 +0200
From: Werner Koch <wk@gnupg.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints?
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFA92E.50100@fifthhorseman.net>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Tue, 05 May 2009 08:59:33 +0200
In-Reply-To: <49FFA92E.50100@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 22:49:18 -0400")
Message-ID: <87k54w9gru.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Tue,  5 May 2009 04:49, dkg@fifthhorseman.net said:

> realistic keys out there right now are still only around 1KB of a
> subpacket, and revocation key subpackets themselves are pretty rare.  So
> the added size doesn't seem problematic to me.

I concur.

In fact the forthcoming default of RSA signatures will increase the size
of a keyblock far more than a single longer revocation key subpacket.



Shalom-Salam,

   Werner


-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.


From owner-ietf-openpgp@mail.imc.org  Tue May  5 00:28:37 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4C3BE3A67F5 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 00:28:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EBWLPyEzNMYc for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 00:28:36 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 3574F3A6C0F for <openpgp-archive@ietf.org>; Tue,  5 May 2009 00:28:35 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H46S011600 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n457H4Oi011599; Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H2NR011592 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 00:17:03 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Etg-0005eF-Uh for <ietf-openpgp@imc.org>; Tue, 05 May 2009 09:17:00 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Elx-0008Pk-QI for <ietf-openpgp@imc.org>; Tue, 05 May 2009 09:09:01 +0200
From: Werner Koch <wk@gnupg.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Tue, 05 May 2009 09:09:01 +0200
In-Reply-To: <49FF325A.80106@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 14:22:18 -0400")
Message-ID: <87fxfk9gc2.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon,  4 May 2009 20:22, dkg@fifthhorseman.net said:

> Another approach would be to formally prefer digest algorithms that do
> not exhibit the same single-pass behavior of SHA-1 -- is that feasible?

No.  Single pass processing an important feature.  Anything else can
only be done if the required amount of RAM is small enough and with an
upper limit to be implemented on small devices.  Think of a network
proxy with no need to store the data passing through but to verify
signatures of large chunks of this data.


Salam-Shalom,

   Werner


-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.


From owner-ietf-openpgp@mail.imc.org  Tue May  5 04:51:51 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A96723A6AD9 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 04:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1E5Qflbu9b1i for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 04:51:50 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 5E8E63A6A8C for <openpgp-archive@ietf.org>; Tue,  5 May 2009 04:51:50 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45BbI71029558 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45BbIwX029557; Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Bb65o029539 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 04:37:17 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1IxN-00014O-2J for <ietf-openpgp@imc.org>; Tue, 05 May 2009 13:37:05 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ioo-0000B5-QN; Tue, 05 May 2009 13:28:14 +0200
From: Werner Koch <wk@gnupg.org>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
Cc: David Shaw <dshaw@jabberwocky.com>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Changing GPG's default key type
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <49FFDCEF.5040006@epointsystem.org>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Tue, 05 May 2009 13:28:14 +0200
In-Reply-To: <49FFDCEF.5040006@epointsystem.org> (Daniel A. Nagy's message of "Tue, 05 May 2009 08:30:07 +0200")
Message-ID: <87r5z394c1.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Tue,  5 May 2009 08:30, nagydani@epointsystem.org said:

> There is, however, no known workaround for #2. Generating a PGP-compliant
> 1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enough to

That is a problem of that implementation.  Even 10 year old smartcards
are able to generate a 1k RSA key in less than 30 seconds.  Modern
cards are much faster.



Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.


From owner-ietf-openpgp@mail.imc.org  Tue May  5 06:29:30 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BA3C28C115 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 06:29:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.638
X-Spam-Level: 
X-Spam-Status: No, score=-3.638 tagged_above=-999 required=5 tests=[AWL=-0.039, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T0FxclbWZPM6 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 06:29:29 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0BD6B3A6B83 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 06:29:28 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45DJqG2037350 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45DJq7E037349; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay02.pair.com (relay02.pair.com [209.68.5.16]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n45DJfl1037327 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 10420 invoked from network); 5 May 2009 13:19:39 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay02.pair.com with SMTP; 5 May 2009 13:19:39 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <4A003D23.1070208@fifthhorseman.net>
Date: Tue, 05 May 2009 09:20:35 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com>
In-Reply-To: <49FFE3B2.9060408@systemics.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig171F5511815A85E73F57BC1D"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig171F5511815A85E73F57BC1D
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/05/2009 02:58 AM, Ian G wrote:
> Simplify, simplify, simplify.  One hash is good enough
> for 99.99% of the users, and the rest should be implementing not
> eulogising.
 [...]
> If it was updated today for IETF, it would say:  always insist on the
> right to variations in protocols, for future-proofing.

I've seen you express this sentiment before, Ian, and i can appreciate
where you're coming from.  Variable ciphers and digests are messy,
difficult to get right, and alienating arcana to most users.  But i
don't understand what your concrete proposal is here.

Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the
best approach for us 0.01% of the users/implementors to take in response
to the news that SHA-1's collision-resistance was insufficient against
well-resourced organizations, and seems likely to get worse before SHA-3
is settled?

How would we help facilitate the transition for the 99.99% of the users
to a safer hash?  Or would we simply tell them "OpenPGP is done, go find
something else before the year is up if you want to maintain
private/authenticated communications"?

Regards,

	--dkg


--------------enig171F5511815A85E73F57BC1D
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=CyQN
-----END PGP SIGNATURE-----

--------------enig171F5511815A85E73F57BC1D--


From owner-ietf-openpgp@mail.imc.org  Tue May  5 09:56:42 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 351FC3A6DF3 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 09:56:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.8
X-Spam-Level: 
X-Spam-Status: No, score=-0.8 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_ORG=0.611, HOST_MISMATCH_NET=0.311, RCVD_IN_SORBS_DUL=0.877]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zPcqR5qCC-JT for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 09:56:41 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 4AC4C3A704B for <openpgp-archive@ietf.org>; Tue,  5 May 2009 09:55:55 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Gj43A056300 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 09:45:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45Gj3Wc056299; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45GipDR056268 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-openpgp@imc.org>; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from hal@finney.org)
Received: by finney.org (Postfix, from userid 500) id 83D7814F6E1; Tue,  5 May 2009 08:03:00 -0700 (PDT)
To: ietf-openpgp@imc.org
Subject: Re: Non-SHA-1 fingerprints
Message-Id: <20090505150300.83D7814F6E1@finney.org>
Date: Tue,  5 May 2009 08:03:00 -0700 (PDT)
From: hal@finney.org ("Hal Finney")
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
> For fingerprints, MDC and self-signatures, collision-resistance does
> not matter, only the one-way property. So I think it is totally safe to
> postpone discussion until SHA3 is selected.

To quibble a bit, the real issue is not the specific usage, but whether
the creator of the signature controls the content that is hashed, and
whether he adds enough information and "entropy" of his own that no
outsider could substantially control and/or guess the content.

I can imagine situations from the list above where outsiders might be
able to mount an attack. Even self-signatures may have substantial
data contributed by outsiders, at least with use of some allowed
extensions. We have notation subpackets and possibly other subpackets
which could include data that is supplied by outsiders.

PGP has for many years supported an extension to the User ID called a
Photo ID, which includes a picture of the key holder. Imagine if you added
to your key a photo of yourself, but one that was taken by someone else,
and signed it with a self signature using a weak hash. Some time later
you might discover a different-looking photo circulating, signed with
that same signature (because the photo was gimmicked to allow a change
in some data to display a different image).  One could imagine security
implications of this kind of substitution.

MDC packets should be immune because we hash the prefix which should
normally include 128+ bits of randomness. Likewise with fingerprints,
presumably the key itself includes sufficient randomness to make it
unguessable, otherwise many other attacks are possible.

Hal Finney
PGP Corporation


From owner-ietf-openpgp@mail.imc.org  Tue May  5 10:52:04 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BAC813A6AFC for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 10:52:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qtuk2dzyjOvO for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 10:52:03 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7CC793A6878 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 10:52:03 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiRBZ061317 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HiRHw061316; Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiGsO061306 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 10:44:26 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 824882E1D3 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:45:08 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41465-05 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:45:03 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id E8FF42E118 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:45:03 -0700 (PDT)
Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:44:10 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:44:10 -0700
Message-Id: <318A09AF-96C2-4A2A-8692-F579BCA15568@callas.org>
From: Jon Callas <jon@callas.org>
To: OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <E1M1Aft-0001ZO-TZ@wintermute01.cs.auckland.ac.nz>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: New results against SHA-1
Date: Tue, 5 May 2009 10:43:57 -0700
References: <E1M1Aft-0001ZO-TZ@wintermute01.cs.auckland.ac.nz>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On May 4, 2009, at 7:46 PM, Peter Gutmann wrote:

>
> Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:
>
>> What do other folks think?
>
> Given that the MDC is a hash of plaintext that's then encrypted, and  
> the hash
> value is itself encrypted, I'm not losing any sleep over it.  The  
> hash attacks
> so far have required bit-for-bit carefully-chosen plaintext with  
> known hash
> values, not unknown (or even partially-known) plaintext with an  
> unknown hash
> value.

I'm not losing a lot of sleep over it, either.

The point of the MDC is to provide a low-level integrity check.  
There's an easy high-level integrity check, a digital signature. The  
MDC exists for people who don't want to sign, but do want more  
protection than naked CFB mode, which is completely vulnerable to  
truncation.

The construction we use is not "secure". I put scare quotes around it  
for a reason. In particular, it's vulnerable to existential forgeries.  
However, every spam in the world is an existential forgery, and if you  
wanted to send an MDC forgery to someone, it's much easier to just  
write the message and encrypt it to them than modifying an existing  
message. What that means is that while there are some protocols that  
really have to worry about existential forgeries (like IPsec), we're  
really not one of them, especially since there's always signing for us.

In 4880, we described how one might upgrade the MDC. If someone  
believes it's important, I would support anyone writing a draft for an  
upgraded MDC. (But as an implementer, I can't make a statement as to  
when or if PGP would implement it.)

	Jon



-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKAHrqsTedWZOD3gYRAo0BAJ4maMvMTEHDIiJBQ+ry3VuUt3gW7gCglCkE
0nX3EUzYQ+alsPjef8RSeE4=
=Tq6M
-----END PGP SIGNATURE-----


From owner-ietf-openpgp@mail.imc.org  Tue May  5 11:05:22 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 52D793A6E08 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 11:05:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kribjga1CmeI for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 11:05:21 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 14A3728C1C1 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 11:05:20 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwP69062007 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HwPBM062006; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwOvD062000 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id BABA52E215 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:59:17 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41539-07 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:59:11 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id ACA3C2E118 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:59:11 -0700 (PDT)
Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:58:18 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:58:18 -0700
Message-Id: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org>
From: Jon Callas <jon@callas.org>
To: OpenPGP Working Group <ietf-openpgp@imc.org>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: I don't think that collides the way you think it does
Date: Tue, 5 May 2009 10:58:14 -0700
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Adi Shamir has pointed out for years now that no one has found *any*  
first or second preimage collision for SHA1. I'll shill for him here.

The new results for 2^52 work, assuming it's actually doable, are  
still for migrating a bitstring into two dependent bitstrings that  
collide. This has significance for people who run CAs with sequential  
serial numbers, or who want to tweak PDFs to project the future, or  
create binary distributions that have and do not have malware. It's  
serious *for* *those* *and* *similar* *cases*.

It does *not* mean that you can get a collision on an existing  
signature, nor on an existing fingerprint, nor on an MDC, etc. We are  
still sitting at *zero* first and second preimage collisions.

I think that we should push through the generic fingerprint proposal.  
I sorta-kinda picked up the ball on that to work with Derek, but if  
there's anyone else who wants it (or who wants to co-author with Derek  
and me), I'm happy to have less work to do.

I also think it's completely reasonable for an implementation to back  
away from SHA1 with all due speed -- but you're supposed to be doing  
that by 2010, anyway!

	Jon



-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKAH46sTedWZOD3gYRAgw4AKD+McI0GJOGcFXk/n7gmY0PYsKO0ACfa0DQ
zhTAaqwStSUApOg8EoG9Tuk=
=s+6q
-----END PGP SIGNATURE-----


From owner-ietf-openpgp@mail.imc.org  Tue May  5 12:29:57 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BF46D28C162 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 12:29:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bFQ7y-lPsKgL for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 12:29:56 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 64AEC28C0CF for <openpgp-archive@ietf.org>; Tue,  5 May 2009 12:29:56 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JJ0aj068139 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 12:19:01 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45JJ0tr068138; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mho-01-ewr.mailhop.org (mho-01-ewr.mailhop.org [204.13.248.71]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JIne1068119 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from dfranke@feanor.dfranke.us)
Received: from adsl-99-175-103-55.dsl.pltn13.sbcglobal.net ([99.175.103.55] helo=feanor.dfranke.us) by mho-01-ewr.mailhop.org with esmtpa (Exim 4.68) (envelope-from <dfranke@feanor.dfranke.us>) id 1M1QAC-000JTw-Fb; Tue, 05 May 2009 19:18:48 +0000
Received: by feanor.dfranke.us (Postfix, from userid 1000) id 096162D63ED; Tue,  5 May 2009 12:18:47 -0700 (PDT)
X-Mail-Handler: MailHop Outbound by DynDNS
X-Originating-IP: 99.175.103.55
X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information)
X-MHO-User: U2FsdGVkX1+YEYY4vsbGMT1XhnwWCUwL
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dfranke.us; s=default; t=1241551127; bh=1FTDtm8GZXh7vDqToK08D1pw4d9PzmoVhBo4cTFtJPI=; h=From:To:Cc:Subject:References:Date:In-Reply-To:Message-ID: MIME-Version:Content-Type; b=yo9jWthLVI5RfjTIoCbAT41XS7CAXbifwxXCc TO/HcceMlVGLv2Q6FTUVAJn+Sfel9GJia7umKhwYrK/BeZi9PwRS/9fwWm4hpgmuioW Pjne0T4m7rcTTo97jZEvt+HRTLTWDny0Xe0mHVhZAwEOOI98GQmOIY6nivZjGileUVY =
From: Daniel Franke <df@dfranke.us>
To: Jon Callas <jon@callas.org>
Cc: OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: I don't think that collides the way you think it does
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org>
X-Hashcash: 1:26:090505:ietf-openpgp@imc.org::FWfm+2gA8G6xCEMY:000000000000000000000000000000000000000003UWa
X-Hashcash: 1:26:090505:jon@callas.org::h6ykG/NGawgQKom8:000BNMG
Date: Tue, 05 May 2009 12:18:41 -0700
In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (sfid-20090505_110311_348312_3F415D8B) (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700")
Message-ID: <87eiv3cq9a.fsf@feanor.dfranke.us>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.0.60 (gnu/linux)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--=-=-=
Content-Transfer-Encoding: quoted-printable

Jon Callas <jon@callas.org> writes:

> Adi Shamir has pointed out for years now that no one has found *any*=20=20
> first or second preimage collision for SHA1. I'll shill for him here.
>
> The new results for 2^52 work, assuming it's actually doable, are=20=20
> still for migrating a bitstring into two dependent bitstrings that=20=20
> collide. This has significance for people who run CAs with sequential=20=
=20
> serial numbers, or who want to tweak PDFs to project the future, or=20=20
> create binary distributions that have and do not have malware. It's=20=20
> serious *for* *those* *and* *similar* *cases*.

I think you mean "no one has found any first or second preimage
*attacks* for SHA-1".  To the best of my knowledge, nobody has found any
SHA-1 collisions at all, either chosen or otherwise.  The 2^52 result is
still theoretical, because while 2^52 hash operations is tractable for a
WFO, it's still a formidable amount of work, and Cameron McDonald is not
a WFO.

Preimage attacks are hard.  Even long, long-ago deprecated hash
functions have held up well agaist them.  The one in the worst shape is
MD2, and that attack requires 2^104 operations (vs. 2^128 brute force).
I'm pretty confident that by the time there's a computer that can do
2^104 of anything, nobody is going care about my secrets.

Here's a threat model I suggest for future work on OpenPGP: assume that
the hash function is ideal, but that the adversary has an oracle that
takes as input two messages and pointers to n/2 bits of each message
(where n is the digest length), and outputs colliding messages by
filling in those bits.  In other words, preimage attacks are impossible
(short of brute force), but birthday attacks are trivial.

I think securing OpenPGP against this threat model is possible.  As you
and others have already pointed out, most of OpenPGP's uses of hash
functions already depend only on one-wayness.

=2D-=20
 Daniel Franke         df@dfranke.us         http://www.dfranke.us
 |----| =3D|\     \\\\=20=20=20=20
 || * | -|-\---------   Man is free at the instant he wants to be.=20
 -----| =3D|  \   ///     --Voltaire

--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iF4EAREKAAYFAkoAkREACgkQ8tqcOcPA7qPwzQD+KPhUId+raki0OX9bx7ulEvKF
WfATtLN2BUgdNFJfjg0A/1668CZF1Jw0mkApDGqf3KNRs4LIsvzmpbobvqNTWiX4
=sZo9
-----END PGP SIGNATURE-----
--=-=-=--


From owner-ietf-openpgp@mail.imc.org  Tue May  5 14:40:32 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 56D223A6A8A for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 14:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9jKaB9aDhpTw for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 14:40:31 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 2CB543A68E6 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 14:40:30 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LVCRU077932 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45LVCSx077931; Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LV1Gl077919 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 14:31:11 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 9C6E92E118 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:31:54 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 43121-01 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:31:49 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id D8CBC2E1D3 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:31:49 -0700 (PDT)
Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 14:30:56 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 14:30:56 -0700
Cc: OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <12A3741B-5277-45CF-8D53-764CEA5732AD@callas.org>
From: Jon Callas <jon@callas.org>
To: Daniel Franke <df@dfranke.us>
In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: I don't think that collides the way you think it does
Date: Tue, 5 May 2009 14:30:49 -0700
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On May 5, 2009, at 12:18 PM, Daniel Franke wrote:

> * PGP Signed by an unknown key
>
> Jon Callas <jon@callas.org> writes:
>
>> Adi Shamir has pointed out for years now that no one has found *any*
>> first or second preimage collision for SHA1. I'll shill for him here.
>>
>> The new results for 2^52 work, assuming it's actually doable, are
>> still for migrating a bitstring into two dependent bitstrings that
>> collide. This has significance for people who run CAs with sequential
>> serial numbers, or who want to tweak PDFs to project the future, or
>> create binary distributions that have and do not have malware. It's
>> serious *for* *those* *and* *similar* *cases*.
>
> I think you mean "no one has found any first or second preimage
> *attacks* for SHA-1".  To the best of my knowledge, nobody has found  
> any
> SHA-1 collisions at all, either chosen or otherwise.  The 2^52  
> result is
> still theoretical, because while 2^52 hash operations is tractable  
> for a
> WFO, it's still a formidable amount of work, and Cameron McDonald is  
> not
> a WFO.

Thank you for the further clarification. You are correct.

	Jon


-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKALAQsTedWZOD3gYRAtQVAJ9bLVO5G5yS5oiCWb5KbWCGibNsEACeMwb3
B/qMAwa5oxwg1q7DJ/aXuww=
=OUoa
-----END PGP SIGNATURE-----


From owner-ietf-openpgp@mail.imc.org  Tue May  5 15:07:53 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2ED3828C1D2 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 15:07:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.501
X-Spam-Level: 
X-Spam-Status: No, score=-4.501 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ymQj5DVmjOqw for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 15:07:52 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 319D23A6BC7 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 15:07:50 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M17Ng079837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:01:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45M17xm079836; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mta-1.ms.rz.rwth-aachen.de (mta-1.ms.rz.RWTH-Aachen.DE [134.130.7.72]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M0tjZ079809 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=FAIL) for <ietf-openpgp@imc.org>; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from kloecker@kde.org)
MIME-version: 1.0
Received: from ironport-out-1.rz.rwth-aachen.de ([134.130.5.40]) by mta-1.ms.rz.RWTH-Aachen.de (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008)) with ESMTP id <0KJ6004QSYHI11C0@mta-1.ms.rz.RWTH-Aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST)
X-IronPort-AV: E=Sophos;i="4.40,299,1238968800"; d="asc'?scan'208";a="10826999"
Received: from relay-auth-1.ms.rz.rwth-aachen.de (HELO relay-auth-1) ([134.130.7.78]) by ironport-in-1.rz.rwth-aachen.de with ESMTP; Wed, 06 May 2009 00:00:54 +0200
Received: from [192.168.0.161] ([unknown] [78.49.118.14]) by relay-auth-1.ms.rz.rwth-aachen.de (Sun Java(tm) System Messaging Server 7.0-3.01 64bit (built Dec  9 2008)) with ESMTPA id <0KJ600C6VYHI4X20@relay-auth-1.ms.rz.rwth-aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST)
From: Ingo =?iso-8859-1?q?Kl=F6cker?= <kloecker@kde.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
Date: Wed, 06 May 2009 00:00:42 +0200
User-Agent: KMail/1.9.10
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
In-reply-to: <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
Content-type: multipart/signed; boundary=nextPart51737562.EtnubJnk9m; protocol="application/pgp-signature"; micalg=pgp-sha1
Content-transfer-encoding: 7bit
Message-id: <200905060000.49934@thufir.ingo-kloecker.de>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--nextPart51737562.EtnubJnk9m
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

On Tuesday 05 May 2009, David Shaw wrote:
> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:
> > Also, since mobile phones typically have a numeric keypad, it would
> > be nice if
> > fingerprints and key IDs were numeric-only. It is an increasingly
> > important
> > platform for OpenPGP, I believe.
>
> I think that is a good point and a great idea, but the only reason
> that fingerprints and key IDs are printed in hex now is tradition.
> There is nothing in the standard one way or another about how humans
> should consume fingerprints.  You could even do it with the current
> V4 fingerprints: just as my key fingerprint is
> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally
> correct as 716901811312187285520504099705403090347495794016 in
> decimal.  The big problem I see here is that's it's an awfully long
> number to type into a mobile keypad.

Right. I do already have a hard time typing an unknown phone number with=20
8 digits.

Since most mobile phones come with a camera nowadays the way to go is to=20
take a picture of the fingerprint and then run some OCR on the picture.=20
In fact, it would be much better to encode the fingerprint in some kind=20
of easily scanable bar code (additionally to the common hex=20
fingerprint) than as long string of numbers (similar to Semapedia).


Regards,
Ingo


P.S.: The mailing list software does not add a List-Post header (which=20
is used for "Reply to List" by my MUA). Is it possible to fix this?

--nextPart51737562.EtnubJnk9m
Content-Type: application/pgp-signature; name=signature.asc 
Content-Description: This is a digitally signed message part.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEABECAAYFAkoAtxEACgkQGnR+RTDgudiL5wCeL/YZtGQDctzOV8pBcxtZ4g+0
zeAAnA/MlL6QnAcjUcWwIP6GBmCQF0XQ
=M/gC
-----END PGP SIGNATURE-----

--nextPart51737562.EtnubJnk9m--


From owner-ietf-openpgp@mail.imc.org  Tue May  5 15:34:52 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E0E63A70CF for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 15:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oTgMSEbbJAsx for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 15:34:51 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 087653A704B for <openpgp-archive@ietf.org>; Tue,  5 May 2009 15:34:50 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRXEw081556 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45MRXv1081555; Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRMJF081540 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 15:27:32 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:29068) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M1T6e-0006zP-B0 (Exim 4.69) (return-path <iang@systemics.com>); Tue, 05 May 2009 23:27:20 +0100
Received: from ip80-101-235-1.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 2703C5D65; Tue,  5 May 2009 23:27:12 +0100 (GMT/BST)
Message-ID: <4A00BD41.7060807@systemics.com>
Date: Wed, 06 May 2009 00:27:13 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net>
In-Reply-To: <4A003D23.1070208@fifthhorseman.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 5/5/09 15:20, Daniel Kahn Gillmor wrote:
> On 05/05/2009 02:58 AM, Ian G wrote:
>> Simplify, simplify, simplify.  One hash is good enough
>> for 99.99% of the users, and the rest should be implementing not
>> eulogising.
>   [...]
>> If it was updated today for IETF, it would say:  always insist on the
>> right to variations in protocols, for future-proofing.
>
> I've seen you express this sentiment before, Ian, and i can appreciate
> where you're coming from.  Variable ciphers and digests are messy,
> difficult to get right, and alienating arcana to most users.


And, anything that slows users slows usage.  Unusability is the killer, 
not the number of bits in the algorithm.

> But i
> don't understand what your concrete proposal is here.
>
> Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the
> best approach for us 0.01% of the users/implementors to take in response
> to the news that SHA-1's collision-resistance was insufficient against
> well-resourced organizations, and seems likely to get worse before SHA-3
> is settled?


Wait until SHA-3.  Meanwhile, design how to use SHA-3 from 2012 to 2022.

The predictions of the end of the world are premature.  Note that nobody 
has stolen money through an MD5 as yet, and nobody has stolen money 
because of an RSA-512, either.  Nor, has 40 bit secret keys been 
embarrassed as yet.

(All my humble opinion of course :)

The business problem here is that the crypto guys are far too far away 
from the real business to realise that business leakages are around the 
50-80% level.  In such an environment, nobody much cares about the 
difference between 99.99 and 99.999%.


> How would we help facilitate the transition for the 99.99% of the users
> to a safer hash?  Or would we simply tell them "OpenPGP is done, go find
> something else before the year is up if you want to maintain
> private/authenticated communications"?


I think it is best treated as a complete transition from packet types. 
E.g., "It's time to create a complete new key.  V5 is ready."  With not 
as much compatibility between the types as expected, but facilitated by 
tools.  Once per decade.  A bit like the transition from 2.6 to 5.0 if 
you recall.  Again, what I believe, others think differently.




iang


From owner-ietf-openpgp@mail.imc.org  Tue May  5 16:08:31 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B285A3A68B2 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 16:08:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JnZV5N+9KEX for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 16:08:31 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 885C53A67F9 for <openpgp-archive@ietf.org>; Tue,  5 May 2009 16:08:30 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0vrt083597 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45N0vai083596; Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0jfN083581 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 16:00:56 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8A08511A1A8; Wed,  6 May 2009 01:00:44 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 173EC598099; Wed,  6 May 2009 01:00:44 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id zeOzR+syRu8S; Wed,  6 May 2009 01:00:43 +0200 (CEST)
Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D25BF598091; Wed,  6 May 2009 01:00:43 +0200 (CEST)
Message-ID: <4A00C515.6000100@epointsystem.org>
Date: Wed, 06 May 2009 01:00:37 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: Daniel Franke <df@dfranke.us>
CC: Jon Callas <jon@callas.org>, OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: I don't think that collides the way you think it does
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us>
In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig40F5A262D60EEB9E17B2A2D8"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig40F5A262D60EEB9E17B2A2D8
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Daniel Franke wrote:
> Jon Callas <jon@callas.org> writes:
>=20
>> Adi Shamir has pointed out for years now that no one has found *any*  =

>> first or second preimage collision for SHA1. I'll shill for him here.
>>
>> The new results for 2^52 work, assuming it's actually doable, are =20
>> still for migrating a bitstring into two dependent bitstrings that =20
>> collide. This has significance for people who run CAs with sequential =
=20
>> serial numbers, or who want to tweak PDFs to project the future, or =20
>> create binary distributions that have and do not have malware. It's =20
>> serious *for* *those* *and* *similar* *cases*.
>=20
> I think you mean "no one has found any first or second preimage
> *attacks* for SHA-1".  To the best of my knowledge, nobody has found an=
y
> SHA-1 collisions at all, either chosen or otherwise.  The 2^52 result i=
s
> still theoretical, because while 2^52 hash operations is tractable for =
a
> WFO, it's still a formidable amount of work, and Cameron McDonald is no=
t
> a WFO.

Just to give you some perspective what WFO means at this day and age: my
cryptography lab at the University has just built and tested a DES cracke=
r that
cost us less than =E2=82=AC20000 EUR. It iterates through the 56-bit key =
space in about
one week.

We are considering using it for finding a SHA1 collision using these new
results. But, as noted above, this would be a collision where both pre-im=
ages
are carefully chosen by the attacker.

--=20
Daniel


--------------enig40F5A262D60EEB9E17B2A2D8
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoAxRoACgkQoeH/BzqmYjiJ3gCeL2/PxzNTS9+M79gZAQLAe3a7
NgwAoIw3e4dcVFtkC04JIqSwg405QlUp
=tkBu
-----END PGP SIGNATURE-----

--------------enig40F5A262D60EEB9E17B2A2D8--


From owner-ietf-openpgp@mail.imc.org  Tue May  5 23:00:38 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1496D3A6B43 for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 23:00:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.635
X-Spam-Level: 
X-Spam-Status: No, score=-3.635 tagged_above=-999 required=5 tests=[AWL=-0.035, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X1r-fwDOvC1Q for <ietfarch-openpgp-archive@core3.amsl.com>; Tue,  5 May 2009 23:00:31 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id B669C3A6A9E for <openpgp-archive@ietf.org>; Tue,  5 May 2009 23:00:30 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n465nmig005151 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n465nmM4005150; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n465nb8f005142 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 83334 invoked from network); 6 May 2009 05:49:36 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 6 May 2009 05:49:36 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <4A012528.3080501@fifthhorseman.net>
Date: Wed, 06 May 2009 01:50:32 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: building up the post-SHA1 Web of Trust
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9; url=http://fifthhorseman.net/dkg.gpg
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig8E6632BDC9EEDBA49FB9BB73"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig8E6632BDC9EEDBA49FB9BB73
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi people--

I just made a fairly gpg-specific blog post suggesting concrete,
non-disruptive actions that people can take now to start building out
the post-SHA1 Web of Trust:

  http://www.debian-administration.org/users/dkg/weblog/48

I realize this is a somewhat controversial topic, and i'm not trying to
start a flamewar.  I do welcome questions, comments, and criticism,
though, and i'd be very happy to be able to link to similar HOWTOs for
other OpenPGP implementations if anyone else has written them.

The actual abandonment of SHA1 is still a ways off, and nothing in my
post suggests that we *should* abandon it now.  My goal is to see the
Web of Trust be sufficiently robust well before SHA-1 is finally
deprecated, and this seems possible with current tools and protocols, if
we go about it reasonably and start early enough.

I really appreciate all the knowledge people have shared on this list
about the subject recently.  I've learned a lot in the last few days,
and hope i haven't screwed anything up too badly.

Regards,

	--dkg


--------------enig8E6632BDC9EEDBA49FB9BB73
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=eChL
-----END PGP SIGNATURE-----

--------------enig8E6632BDC9EEDBA49FB9BB73--


From tarage1960@vnf-camping.se  Wed May  6 08:49:29 2009
Return-Path: <tarage1960@vnf-camping.se>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1F1523A68E1 for <ietfarch-openpgp-archive@core3.amsl.com>; Wed,  6 May 2009 08:49:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -65.292
X-Spam-Level: 
X-Spam-Status: No, score=-65.292 tagged_above=-999 required=5 tests=[BAYES_95=3, HELO_EQ_DSL=1.129, HELO_EQ_PL=1.135, HOST_EQ_PL=1.95, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, URIBL_BLACK=20, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GjNrc+OAUecf for <ietfarch-openpgp-archive@core3.amsl.com>; Wed,  6 May 2009 08:49:23 -0700 (PDT)
Received: from hhl66.internetdsl.tpnet.pl (hhl66.internetdsl.tpnet.pl [79.187.193.66]) by core3.amsl.com (Postfix) with ESMTP id D3A113A6F00 for <openpgp-archive@ietf.org>; Wed,  6 May 2009 08:47:12 -0700 (PDT)
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date:   Wed, 6 May 2009 17:48:39 +0200
To:     openpgp-archive@ietf.org
From:   Julio Hence <openpgp-archive@ietf.org>
Subject: Ask for John, plz
Mime-Version: 1.0
Content-Type: multipart/alternative;        boundary="=====================_13635525==.ALT"
Message-Id: <20090506154713.D3A113A6F00@core3.amsl.com>

--=====================_13635525==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

Your confidentiality is protected, if you buy pilulles using our site http://www.hitsowor.cn/
--=====================_13635525==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<b>Your confidentiality is protected, if you buy pilulles using our site</b>
<a href="http://www.hitsowor.cn/" eudora="autourl">http://www.hitsowor.cn/</a></body>
</html>

--=====================_13635525==.ALT--

From Emilia-ihcugozi@husbandandco.net  Wed May  6 14:01:56 2009
Return-Path: <Emilia-ihcugozi@husbandandco.net>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9837E3A6F24 for <ietfarch-openpgp-archive@core3.amsl.com>; Wed,  6 May 2009 14:01:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -61.255
X-Spam-Level: 
X-Spam-Status: No, score=-61.255 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_CUST=0.245, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_BLACK=20, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 91CD7QI1LgBj for <ietfarch-openpgp-archive@core3.amsl.com>; Wed,  6 May 2009 14:01:51 -0700 (PDT)
Received: from ip64-178-28-158.z28-178-64.customer.algx.net (ip64-178-28-158.z28-178-64.customer.algx.net [64.178.28.158]) by core3.amsl.com (Postfix) with ESMTP id 9D0EE28C1FF for <openpgp-archive@ietf.org>; Wed,  6 May 2009 14:01:41 -0700 (PDT)
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date:   Wed, 6 May 2009 17:03:09 -0400
To:     openpgp-archive@ietf.org
From:   Emilia Bournazian <openpgp-archive@ietf.org>
Subject: Can we delay meeting?
Mime-Version: 1.0
Content-Type: multipart/alternative;        boundary="=====================_93451225==.ALT"
Message-Id: <20090506210141.9D0EE28C1FF@core3.amsl.com>

--=====================_93451225==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

If you need pilules, the fastest and the cheapest way of getting them is located here http://www.borbupad.cn/
--=====================_93451225==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<b>If you need pilules, the fastest and the cheapest way of getting them is located here</b>
<a href="http://www.borbupad.cn/" eudora="autourl">http://www.borbupad.cn/</a></body>
</html>

--=====================_93451225==.ALT--

From lewis@lewisleatherman.com  Wed May  6 14:58:21 2009
Return-Path: <lewis@lewisleatherman.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F358A3A6DDC; Wed,  6 May 2009 14:58:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -30.682
X-Spam-Level: 
X-Spam-Status: No, score=-30.682 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_EQ_RO=1.235, HOST_EQ_RO=0.904, J_CHICKENPOX_42=0.6, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SORTED_RECIPS=1.125, URIBL_BLACK=20, URIBL_SBL=20, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2wXZPBTtEW3V; Wed,  6 May 2009 14:58:20 -0700 (PDT)
Received: from host-89-42-97-72.bizartelecom.ro (host-89-42-97-72.bizartelecom.ro [89.42.97.72]) by core3.amsl.com (Postfix) with SMTP id CCD1C3A698F; Wed,  6 May 2009 14:58:16 -0700 (PDT)
From: "Carmen Costello" <kink-archive@megatron.ietf.org>
TO: <"kink-archive@megatron.ietf.org, ldapbis-archive@megatron.ietf.org, multi6-archive@megatron.ietf.org, openpgp-archive@megatron.ietf.org, opes-archive@megatron.ietf.org, printmib-archive@megatron.ietf.org, provreg-archive@megatron.ietf.org, sctp-impl-archive@megatron.ietf.org, send-archive"@megatron.ietf.org>
Subject: Rep or Original?
Date: Wed, 06 May 2009 17:59:38 -0500
Message-ID: <48769ewyv764KOJRZkink-archive@megatron.ietf.org>
Content-Type: text/plain;
Content-Transfer-Encoding: 7Bit

Why waste your hard-earned money on an expensive watch when you can have the next best thing for a tenth of its price?
http://piovdjov.cn

How does 90 percent off sound? Great, of course! And greatness is what awaits you at Diam0nd Reps, the preferred online store where you will find the finest watch imitations for exactly that: 90% off!
http://piovdjov.cn

Check out our extensive inventory and enjoy the fastest shipping available online! See you at Diam0nd Reps!






From owner-ietf-openpgp@mail.imc.org  Thu May  7 09:19:28 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CA46D3A7040 for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 09:19:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.322
X-Spam-Level: 
X-Spam-Status: No, score=-4.322 tagged_above=-999 required=5 tests=[AWL=1.724, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qveJdJpRReJp for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 09:19:28 -0700 (PDT)
Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id 0B89F3A6FA9 for <openpgp-archive@ietf.org>; Thu,  7 May 2009 09:19:27 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjOBS050354 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47FjOxB050353; Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjBbw050335 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Thu, 7 May 2009 08:45:23 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n47Fj8O9003930 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 May 2009 11:45:09 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
In-Reply-To: <49FFD926.20802@epointsystem.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
Date: Thu, 7 May 2009 11:45:08 -0400
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote:

> Hi,
>
> David Shaw wrote:
>> It's a larger problem than just fingerprints.  We also use a  
>> fingerprint
>> as a specifier inside the revocation key subpacket, to designate  
>> which
>> key can be used to issue revocations on our behalf.  The thing is,
>> though, a fingerprint isn't really a very good revocation key  
>> specifier:
>>
>> Fingerprints:
>> * Must be human-readable
>> * Needs to be small to be useful
>> * Can collide to some small amount (4880 even documents that they
>> collide in section 12.2)
>
> That's not the fingerprint. That's the key ID.

A nit, but that really is the fingerprint.

12.2:

    Note that there is a much smaller, but still non-zero, probability  
that two different keys have the same fingerprint.

It's not exactly *likely*, but it's not quite zero.  I heard a urban- 
legendish story once about someone who (completely accidentally)  
generated a key that just happened to have a fingerprint collision  
with someone else's key.  Unfortunately, thinking it was a bug, they  
deleted the key... make of that what you will :)

David


From owner-ietf-openpgp@mail.imc.org  Thu May  7 10:29:21 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BD78A3A6C5B for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 10:29:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.046
X-Spam-Level: 
X-Spam-Status: No, score=-6.046 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id apWuYFSYLODY for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 10:29:20 -0700 (PDT)
Received: from balder-227.proper.com (Balder-227.Proper.COM [192.245.12.227]) by core3.amsl.com (Postfix) with ESMTP id DA4673A6BC8 for <openpgp-archive@ietf.org>; Thu,  7 May 2009 10:29:20 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6caX056226 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47H6cVJ056225; Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6RDG056207 for <ietf-openpgp@imc.org>; Thu, 7 May 2009 10:06:37 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2EAB911A193; Thu,  7 May 2009 19:06:25 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C9B10598099; Thu,  7 May 2009 19:06:25 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id azfR40wWvHfj; Thu,  7 May 2009 19:06:25 +0200 (CEST)
Received: from [157.181.227.235] (dhcp235.cs.elte.hu [157.181.227.235]) by mail.agileight.com (Postfix) with ESMTP id 89FBC598091; Thu,  7 May 2009 19:06:25 +0200 (CEST)
Message-ID: <4A03150C.7050908@epointsystem.org>
Date: Thu, 07 May 2009 19:06:20 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
In-Reply-To: <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig44DC6E51A3726AD501084468"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig44DC6E51A3726AD501084468
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hello,

David Shaw wrote:
> On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote:
>=20
>> Hi,
>>
>> David Shaw wrote:
>>> It's a larger problem than just fingerprints.  We also use a fingerpr=
int
>>> as a specifier inside the revocation key subpacket, to designate whic=
h
>>> key can be used to issue revocations on our behalf.  The thing is,
>>> though, a fingerprint isn't really a very good revocation key specifi=
er:
>>>
>>> Fingerprints:
>>> * Must be human-readable
>>> * Needs to be small to be useful
>>> * Can collide to some small amount (4880 even documents that they
>>> collide in section 12.2)
>>
>> That's not the fingerprint. That's the key ID.
>=20
> A nit, but that really is the fingerprint.
>=20
> 12.2:
>=20
>    Note that there is a much smaller, but still non-zero, probability
> that two different keys have the same fingerprint.

While the probability is non-zero, but it is roughly equal to accidentall=
y
guessing the discrete logarithm of a DSA key or a prime factor of the RSA=
 key.

> It's not exactly *likely*, but it's not quite zero.  I heard a
> urban-legendish story once about someone who (completely accidentally)
> generated a key that just happened to have a fingerprint collision with=

> someone else's key.  Unfortunately, thinking it was a bug, they deleted=

> the key... make of that what you will :)

There WAS a bug and he did the right thing.

--=20
Daniel


--------------enig44DC6E51A3726AD501084468
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoDFREACgkQoeH/BzqmYjjeUgCaA14f3l3FFh1akECwPoxEeLUa
W6gAmgOXrbr8LyFINqUS55xAQvei3b8u
=u3K1
-----END PGP SIGNATURE-----

--------------enig44DC6E51A3726AD501084468--


From owner-ietf-openpgp@mail.imc.org  Thu May  7 11:12:08 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4CA263A708E for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 11:12:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.632
X-Spam-Level: 
X-Spam-Status: No, score=-3.632 tagged_above=-999 required=5 tests=[AWL=-0.033, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SCGnNDs9mwBd for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 11:12:07 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 616E428C32A for <openpgp-archive@ietf.org>; Thu,  7 May 2009 11:10:48 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47Hk0MT058473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47Hk0S1058472; Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n47Hjn8Z058453 for <ietf-openpgp@imc.org>; Thu, 7 May 2009 10:45:59 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 54584 invoked from network); 7 May 2009 17:45:48 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 7 May 2009 17:45:48 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <4A031E88.5020304@fifthhorseman.net>
Date: Thu, 07 May 2009 13:46:48 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: keyids vs. fingerprints [was: Re: Fix revocation keys instead of fingerprints?]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
In-Reply-To: <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig4F4AB24288A4BF6E2FDF8F74"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig4F4AB24288A4BF6E2FDF8F74
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/07/2009 11:45 AM, David Shaw wrote:
> On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote:
>> David Shaw wrote:
>>> Fingerprints:
>>> * Must be human-readable
>>> * Needs to be small to be useful
>>> * Can collide to some small amount (4880 even documents that they
>>> collide in section 12.2)
>>
>> That's not the fingerprint. That's the key ID.
>=20
> A nit, but that really is the fingerprint.

The important items here are 1 and 2, which both apply to a fingerprint.
 Humans need to be able to cognitively compare fingerprints, so they
must be both human-readable and small enough to wade through.

As for collisions, 32-bit key ids don't collide "to some small amount".
They have *massive* collisions because of the small output space.  It
takes a few hours of compute time on a single modern desktop machine to
generate 32-bit keyID collisions against every single key in the public
WoT.  64-bit keyids are better, but still nowhere near the collision
resistance we should be expecting from tools we expect humans to use to
validate content.

keyIDs are useful as pointers, but are not at all useful for
verification purposes.

	--dkg


--------------enig4F4AB24288A4BF6E2FDF8F74
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=0mp0
-----END PGP SIGNATURE-----

--------------enig4F4AB24288A4BF6E2FDF8F74--


From Cathrine-enibbarc@gacha-mana.com  Thu May  7 17:09:46 2009
Return-Path: <Cathrine-enibbarc@gacha-mana.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5CFE33A696F for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 17:09:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.5
X-Spam-Level: 
X-Spam-Status: No, score=-9.5 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, GB_PAYLESS=0.5, HELO_DYNAMIC_IPADDR=2.426, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yhe7WRXRmfXN for <ietfarch-openpgp-archive@core3.amsl.com>; Thu,  7 May 2009 17:09:40 -0700 (PDT)
Received: from ip-210-48-63-20.asiaonline.net.nz (ip-210-48-63-20.asiaonline.net.nz [210.48.63.20]) by core3.amsl.com (Postfix) with ESMTP id 476293A707D for <openpgp-archive@ietf.org>; Thu,  7 May 2009 17:09:39 -0700 (PDT)
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date:   Fri, 8 May 2009 12:11:08 +1200
To:     openpgp-archive@ietf.org
From:   Cathrine Caggiano <openpgp-archive@ietf.org>
Subject: Looking for you all day
Mime-Version: 1.0
Content-Type: multipart/alternative;        boundary="=====================_70018343==.ALT"
Message-Id: <20090508000940.476293A707D@core3.amsl.com>

--=====================_70018343==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

Pay less money and get your supplements and pilules shipped to you http://www.zepyosak.cn/
--=====================_70018343==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<b>Pay less money and get your supplements and pilules shipped to you</b>
<a href="http://www.zepyosak.cn/" eudora="autourl">http://www.zepyosak.cn/</a></body>
</html>

--=====================_70018343==.ALT--

From iareturc_1982@cdimaria.com  Fri May  8 04:10:07 2009
Return-Path: <iareturc_1982@cdimaria.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6677E3A7090 for <ietfarch-openpgp-archive@core3.amsl.com>; Fri,  8 May 2009 04:10:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -41.672
X-Spam-Level: 
X-Spam-Status: No, score=-41.672 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PVzMOCZiIgPN for <ietfarch-openpgp-archive@core3.amsl.com>; Fri,  8 May 2009 04:10:01 -0700 (PDT)
Received: from ip-89-102-178-169.karneval.cz (ip-89-102-178-169.karneval.cz [89.102.178.169]) by core3.amsl.com (Postfix) with ESMTP id 152DE28C104 for <openpgp-archive@ietf.org>; Fri,  8 May 2009 04:10:00 -0700 (PDT)
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date:   Fri, 8 May 2009 13:11:27 +0200
To:     openpgp-archive@ietf.org
From:   Juli Petko <openpgp-archive@ietf.org>
Subject: Prevent flu infection!
Mime-Version: 1.0
Content-Type: multipart/alternative;        boundary="=====================_93496707==.ALT"
Message-Id: <20090508111001.152DE28C104@core3.amsl.com>

--=====================_93496707==.ALT
Content-Type: text/plain; charset="us-ascii"; format=flowed

Pilules for men, who want to give ladies more. Time of discounts was claimed http://www.tocfepen.cn/
--=====================_93496707==.ALT
Content-Type: text/html; charset="us-ascii"

<html>
<body>
<b>Pilules for men, who want to give ladies more. Time of discounts was claimed</b>
<a href="http://www.tocfepen.cn/" eudora="autourl">http://www.tocfepen.cn/</a></body>
</html>

--=====================_93496707==.ALT--

From owner-ietf-openpgp@mail.imc.org  Fri May  8 14:08:18 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7F8723A6821 for <ietfarch-openpgp-archive@core3.amsl.com>; Fri,  8 May 2009 14:08:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.665
X-Spam-Level: 
X-Spam-Status: No, score=-1.665 tagged_above=-999 required=5 tests=[AWL=0.584, BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h6ezvNQxL4Nb for <ietfarch-openpgp-archive@core3.amsl.com>; Fri,  8 May 2009 14:08:17 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 7E4463A69BD for <openpgp-archive@ietf.org>; Fri,  8 May 2009 14:08:17 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48Kllvm059306 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 8 May 2009 13:47:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n48Klldp059305; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mail.enyo.de (mail.enyo.de [212.9.189.167]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48KlZsJ059290 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from fw@deneb.enyo.de)
Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de) by mail.enyo.de with esmtp id 1M2Wyf-0003X8-Uj; Fri, 08 May 2009 22:47:30 +0200
Received: from fw by deneb.enyo.de with local (Exim 4.69) (envelope-from <fw@deneb.enyo.de>) id 1M2Wyf-0000r1-ID; Fri, 08 May 2009 22:47:29 +0200
From: Florian Weimer <fw@deneb.enyo.de>
To: Jon Callas <jon@callas.org>
Cc: OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: I don't think that collides the way you think it does
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org>
Date: Fri, 08 May 2009 22:47:29 +0200
In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700")
Message-ID: <87skjfcof2.fsf@mid.deneb.enyo.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

* Jon Callas:

> The new results for 2^52 work, assuming it's actually doable, are  
> still for migrating a bitstring into two dependent bitstrings that  
> collide. This has significance for people who run CAs with sequential  
> serial numbers, or who want to tweak PDFs to project the future, or  
> create binary distributions that have and do not have malware. It's  
> serious *for* *those* *and* *similar* *cases*.

Unfortunately, signing someone else's key and user ID is a similar
case.  You don't know what you're being asked to sign, and you haven't
created the document yourself.  And a photo ID gives you many bits to
play with.

In the abstract, you do not actually need collision resistance (and
totally keyless hashes) for OpenPGP-like protocols, but current
practice is certainly different.  IMHO, an eventual OpenPGP successor
should prepend salts/IVs in front of signatures.  Of course, this
might be used as a relatively high-bandwidth covert channel, but it
means that the hash function will likely last somewhat longer.


From mubn@almaden.ibm.com  Sun May 10 12:43:52 2009
Return-Path: <mubn@almaden.ibm.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3DA703A6A19 for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 10 May 2009 12:43:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -52.315
X-Spam-Level: 
X-Spam-Status: No, score=-52.315 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, HELO_EQ_DSL=1.129, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ip-5ZOqeUhik for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 10 May 2009 12:43:45 -0700 (PDT)
Received: from vfppp079167046212.dsl.hol.gr (vfppp079167046212.dsl.hol.gr [79.167.46.212]) by core3.amsl.com (Postfix) with SMTP id 4DEC63A6CEC for <openpgp-archive@ietf.org>; Sun, 10 May 2009 12:43:43 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Re: Discount code #99604
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090510194344.4DEC63A6CEC@core3.amsl.com>
Date: Sun, 10 May 2009 12:43:43 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://whizplus.com"><img src="http://www.menshealth.com/media/MH_Static/Mens-Health-logo-231x62-sunday.gif"
width="231" height="50" border="0">
<img src="http://www.menshealth.com/spotlight/sexualhealth/images/logo-sexual-health.jpg" width="710" height="44" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://whizplus.com/"><img src="http://whizplus.com/changes.gif" border="0" alt="Read more"></a><br>
<a href="http://whizplus.com/"><img src="http://www.menshealth.com/media/MH_Static/2009/04/1240846107540/0904_sexy_alluring_woman.jpg" 
border="0" alt="Copyright"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://whizplus.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://whizplus.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From owner-ietf-openpgp@mail.imc.org  Mon May 11 14:08:25 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9C1063A6A8C for <ietfarch-openpgp-archive@core3.amsl.com>; Mon, 11 May 2009 14:08:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.629
X-Spam-Level: 
X-Spam-Status: No, score=-3.629 tagged_above=-999 required=5 tests=[AWL=-0.030, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d+7m6E2OG8cJ for <ietfarch-openpgp-archive@core3.amsl.com>; Mon, 11 May 2009 14:08:24 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 72EA73A683E for <openpgp-archive@ietf.org>; Mon, 11 May 2009 14:08:24 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4BKvZgr091809 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4BKvZOr091808; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4BKvO0W091797 for <ietf-openpgp@imc.org>; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 93868 invoked from network); 11 May 2009 20:57:22 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay01.pair.com with SMTP; 11 May 2009 20:57:22 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <4A08916E.4000902@fifthhorseman.net>
Date: Mon, 11 May 2009 16:58:22 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3E288F6834146C1C811D07D6"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3E288F6834146C1C811D07D6
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

(dredging this up from a week ago because i was re-thinking it today)

On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
> For fingerprints, MDC and self-signatures, collision-resistance does no=
t matter,
> only the one-way property. So I think it is totally safe to postpone di=
scussion
> until SHA3 is selected.

I think this point holds for fingerprints and MDCs.  I'm not convinced
that it holds for self-signatures, though.

Let's assume Alice has an SHA-1 collision-generator that she can coax
into generating two messages, A and B with the same digest, and that she
is meeting Bob for a keysigning at the pub on Friday.

She crafts message A, which looks like a regular public key/uid
signature, including friday evening's timestamp and her User ID (this is
exactly the information to be hashed in a non-self-signature -- maybe it
hides the collision-generating bits in one of the public key MPIs?).
Message B is the data within a self-signature over Bob's key, asserting
something Bob didn't want to assert (e.g. binding a user ID of a known
villain, or binding a false encryption subkey which Alice controls).
The collision-generating bits in B might be hidden here in a notation
subpacket or something similarly opaque.

At the pub, Alice gets Bob to sign her key (message A) at just the right
time, retrieves his signature, and transfers it to the new bogus
self-sig (message B).

I think this means we need to consider self-signatures made over a given
algorithm as potentially spoofable if the digest's collision-resistance
is weakened.  It is *not* just the one-wayness that matters for self-sigs=
=2E

Is this analysis reasonable?  What have i missed?

	--dkg

PS i know that no one has demonstrated anything remotely close to the
hypothesized oracle i've given Alice above.  The point is just that
collision-resistance affects self-sigs in ways that it does not affect
the MDC or the fingerprint.


--------------enig3E288F6834146C1C811D07D6
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=JqA8
-----END PGP SIGNATURE-----

--------------enig3E288F6834146C1C811D07D6--


From owner-ietf-openpgp@mail.imc.org  Mon May 11 22:51:25 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2490F3A6A5E for <ietfarch-openpgp-archive@core3.amsl.com>; Mon, 11 May 2009 22:51:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cB3ZlgIsLI4W for <ietfarch-openpgp-archive@core3.amsl.com>; Mon, 11 May 2009 22:51:24 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id DEAE53A691F for <openpgp-archive@ietf.org>; Mon, 11 May 2009 22:51:23 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fVRk015727 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4C5fV4b015726; Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fJcW015714 for <ietf-openpgp@imc.org>; Mon, 11 May 2009 22:41:30 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 9B08D11AD04 for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C6F19598099 for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Xn-1VN4rsHtD for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
Received: from [10.0.0.129] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9143B598091 for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
Message-ID: <4A090BF5.6090805@epointsystem.org>
Date: Tue, 12 May 2009 07:41:09 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <4A08916E.4000902@fifthhorseman.net>
In-Reply-To: <4A08916E.4000902@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigBE9288F01ECA740305A0E4C1"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigBE9288F01ECA740305A0E4C1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I think, you are right. My bad.

Daniel Kahn Gillmor wrote:
> (dredging this up from a week ago because i was re-thinking it today)
>=20
> On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
>> For fingerprints, MDC and self-signatures, collision-resistance does n=
ot matter,
>> only the one-way property. So I think it is totally safe to postpone d=
iscussion
>> until SHA3 is selected.
>=20
> I think this point holds for fingerprints and MDCs.  I'm not convinced
> that it holds for self-signatures, though.
>=20
> Let's assume Alice has an SHA-1 collision-generator that she can coax
> into generating two messages, A and B with the same digest, and that sh=
e
> is meeting Bob for a keysigning at the pub on Friday.
>=20
> She crafts message A, which looks like a regular public key/uid
> signature, including friday evening's timestamp and her User ID (this i=
s
> exactly the information to be hashed in a non-self-signature -- maybe i=
t
> hides the collision-generating bits in one of the public key MPIs?).
> Message B is the data within a self-signature over Bob's key, asserting=

> something Bob didn't want to assert (e.g. binding a user ID of a known
> villain, or binding a false encryption subkey which Alice controls).
> The collision-generating bits in B might be hidden here in a notation
> subpacket or something similarly opaque.
>=20
> At the pub, Alice gets Bob to sign her key (message A) at just the righ=
t
> time, retrieves his signature, and transfers it to the new bogus
> self-sig (message B).
>=20
> I think this means we need to consider self-signatures made over a give=
n
> algorithm as potentially spoofable if the digest's collision-resistance=

> is weakened.  It is *not* just the one-wayness that matters for self-si=
gs.
>=20
> Is this analysis reasonable?  What have i missed?
>=20
> 	--dkg
>=20
> PS i know that no one has demonstrated anything remotely close to the
> hypothesized oracle i've given Alice above.  The point is just that
> collision-resistance affects self-sigs in ways that it does not affect
> the MDC or the fingerprint.
>=20


--------------enigBE9288F01ECA740305A0E4C1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoJC/wACgkQoeH/BzqmYjhJZACeKAuRrkPYj3iHa5gAtG+4ZEKg
u9AAoL4L8gQPaZzN1HPT39ObaIO70F85
=Eskt
-----END PGP SIGNATURE-----

--------------enigBE9288F01ECA740305A0E4C1--


From carportg@genesiis.com  Thu May 14 10:29:57 2009
Return-Path: <carportg@genesiis.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C4D453A6B3F; Thu, 14 May 2009 10:29:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -41.752
X-Spam-Level: 
X-Spam-Status: No, score=-41.752 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DOS_OE_TO_MX=2.75, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_HCC=4.295, HELO_DYNAMIC_IPADDR2=4.395, HELO_EQ_BLUEYON=1.4, HELO_EQ_MODEMCABLE=0.768, HOST_EQ_MODEMCABLE=1.368, J_CHICKENPOX_34=0.6, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_SPEC_REPLICA_OBFU=1.812, SARE_SPEC_ROLEX_NOV5A=1.062, STOX_REPLY_TYPE=0.001, TVD_RCVD_IP=1.931, URIBL_SBL=20, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QPdp6MyhMhDs; Thu, 14 May 2009 10:29:57 -0700 (PDT)
Received: from 77-97-15-37.cable.ubr20.uddi.blueyonder.co.uk (77-97-15-37.cable.ubr20.uddi.blueyonder.co.uk [77.97.15.37]) by core3.amsl.com (Postfix) with ESMTP id CA4103A704F; Thu, 14 May 2009 10:29:55 -0700 (PDT)
Date: Thu, 14 May 2009 18:31:26 +0000
From: ntdp@ietf.org
Subject: Watch e-shop
To: <ntdp@ietf.org>
Message-ID: <000d01c9d4b9$cf591590$6400a8c0@carportg>
MIME-Version: 1.0
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
Content-type: text/plain; format=flowed; charset=iso-8859-1; reply-type=original
Content-transfer-encoding: 7bit
X-Priority: 3
X-MSMail-priority: Normal

This watch made similar to the real brand one, except, at a much lower cost.
The replica watches are very popular as we can look classy and professional, yet not have to spend so many dollars. The rep1icas allow the normal person to be able to look and feel classy, without spending such ridiculous amounts of money. We also can have the watches to add a touch of classic to our life style.

//
-Patek Philippe
-Panerai

Click Here now! http://girlishrerunning.cn

Thanks! Porsha Key UK


From maurizio.sterpetti@agrileasing.it  Thu May 14 18:15:27 2009
Return-Path: <maurizio.sterpetti@agrileasing.it>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 860783A6C7F for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 14 May 2009 18:15:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.25
X-Spam-Level: 
X-Spam-Status: No, score=-15.25 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RDNS_NONE=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q7sQmif6MwaH for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 14 May 2009 18:15:27 -0700 (PDT)
Received: from 201-93-22-99.dial-up.telesp.net.br (201-93-22-99.dial-up.telesp.net.br [201.93.22.99]) by core3.amsl.com (Postfix) with SMTP id CE6F53A708B for <openpgp-archive@ietf.org>; Thu, 14 May 2009 18:15:14 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Order Shipped -- Order #93865
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090515011518.CE6F53A708B@core3.amsl.com>
Date: Thu, 14 May 2009 18:15:14 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://briefpearl.com"><img src="http://www.menshealth.fr/design/css/=base/=header/-images/logo.jpg"
width="207" height="80" border="0">
<img src="http://www.trendsmag.com/trendsmag/menshealth/images/m_t591.jpg" width="462" height="80" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://briefpearl.com/"><img src="http://briefpearl.com/changes.gif" border="0" alt="THE SECRETS TO"></a><br>
<a href="http://briefpearl.com/"><img src="http://www.menshealth.fr/IMG/arton417.jpg" 
border="0" alt="Subscribe for catalogs"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://briefpearl.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://briefpearl.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From afresni@learnlink.emory.edu  Thu May 14 21:55:17 2009
Return-Path: <afresni@learnlink.emory.edu>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 892443A6AF8; Thu, 14 May 2009 21:55:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -19.129
X-Spam-Level: 
X-Spam-Status: No, score=-19.129 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SBL=20, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hrBaaLnlolB0; Thu, 14 May 2009 21:55:16 -0700 (PDT)
Received: from 173-16-36-92.client.mchsi.com (173-16-36-92.client.mchsi.com [173.16.36.92]) by core3.amsl.com (Postfix) with SMTP id D82E93A63C9; Thu, 14 May 2009 21:55:12 -0700 (PDT)
Message-ID: <xvlmz037180.SSGG0168802624nemo-request@ietf.org>
X-Originating-IP: 92.137.114.200 by 127.200.176.166; Fri, 15 May 2009 00:48:46 -0500
To: "Virgie Salgado" <nemo-request@ietf.org>
From: "Alexis Dickinson" <nemo-request@ietf.org>
Date: Fri, 15 May 2009 00:56:46 -0500
Subject: Why rep watches are better
Content-Type: text/plain;
Content-Transfer-Encoding: 7Bit

Hello Virgie

I had never seen such beautiful and greatly-performing watches like the ones I found online at
http://www.exclussiveq.com

The best news is that in May you can buy two watches and get an extra 15% off your purchase!
http://www.exclussiveq.com

Our Franck Muller have all appropriate markings, wordings and engravings same as orginal.

Sincerely,
Mr Salgado




From sk8erdawn@gmail.com  Fri May 15 11:34:06 2009
Return-Path: <sk8erdawn@gmail.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C6E693A6D96; Fri, 15 May 2009 11:34:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -28.843
X-Spam-Level: 
X-Spam-Status: No, score=-28.843 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EGLfIh26yo3F; Fri, 15 May 2009 11:34:00 -0700 (PDT)
Received: from 200-71-113-92.pool.ukrtel.net (200-71-113-92.pool.ukrtel.net [92.113.71.200]) by core3.amsl.com (Postfix) with SMTP id E1DCE3A6987; Fri, 15 May 2009 11:33:49 -0700 (PDT)
From: "Ron Cantrell" <nemo-request@ietf.org>
To: "Alexander Justice" <nemo-request@ietf.org>
Message-ID: <HRXTfrgj622vjnemo-request@ietf.org>
Content-Type: text/plain;
Content-Transfer-Encoding: 7Bit
Date: Fri, 15 May 2009 14:35:26 -0500
Subject: Save thousands... no one will know

Hello Alexander

Looking for a Longines? How about getting two, one for you and one for your spouse?
http://www.reppzlis.com

Take advantage of our spring specials and get yourself Longines watch that you've always wanted!
http://www.reppzlis.com

Our Longines have Weights/feels and looks exactly same as original.

Sincerely,
Mr Justice






From mjerums@amgen.com  Sat May 16 04:11:21 2009
Return-Path: <mjerums@amgen.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D922E3A67F4 for <ietfarch-openpgp-archive@core3.amsl.com>; Sat, 16 May 2009 04:11:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -18.613
X-Spam-Level: 
X-Spam-Status: No, score=-18.613 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, DNS_FROM_RFC_BOGUSMX=1.482, FH_RELAY_NODNS=1.451, HELO_EQ_DE=0.35, HELO_MISMATCH_DE=1.448, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_2=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HQ8C+tKD-0KW for <ietfarch-openpgp-archive@core3.amsl.com>; Sat, 16 May 2009 04:11:21 -0700 (PDT)
Received: from a-i-c.com (unknown [59.184.150.15]) by core3.amsl.com (Postfix) with SMTP id E52823A698A for <openpgp-archive@ietf.org>; Sat, 16 May 2009 04:10:20 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Customer Receipt/Purchase Confirmation
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090516111020.E52823A698A@core3.amsl.com>
Date: Sat, 16 May 2009 04:10:20 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://pearlpeak.com"><img src="http://www.menshealth.fr/design/css/=base/=header/-images/logo.jpg"
width="207" height="80" border="0">
<img src="http://www.trendsmag.com/trendsmag/menshealth/images/m_t591.jpg" width="462" height="80" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://pearlpeak.com/"><img src="http://pearlpeak.com/changes.gif" border="0" alt="THE SECRETS TO"></a><br>
<a href="http://pearlpeak.com/"><img src="http://www.menshealth.fr/IMG/arton417.jpg" 
border="0" alt="Subscribe for catalogs"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://pearlpeak.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://pearlpeak.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From lauraric@onthehouse.com  Sun May 17 15:14:37 2009
Return-Path: <lauraric@onthehouse.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 463063A693F; Sun, 17 May 2009 15:14:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.915
X-Spam-Level: ****
X-Spam-Status: No, score=4.915 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_DHCP=1.398, HELO_DYNAMIC_IPADDR=2.426, HELO_EQ_DSL=1.129, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_NJABL_PROXY=1.643, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SBL=20, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j-TdoOiNnlpS; Sun, 17 May 2009 15:14:36 -0700 (PDT)
Received: from adsl-203-93-192-81.adsl2.iam.net.ma (adsl-203-93-192-81.adsl2.iam.net.ma [81.192.93.203]) by core3.amsl.com (Postfix) with SMTP id 1F6F93A682A; Sun, 17 May 2009 15:14:16 -0700 (PDT)
X-Originating-IP: 212.163.0.136 by 160.97.236.8; Sun, 17 May 2009 17:06:52 -0600
Message-ID: <xpb6584DNU92606.695Xnemo-request@ietf.org>
To: "Angelique Kirk" <nemo-request@ietf.org>
From: "Johnnie Vogt" <nemo-request@ietf.org>
Subject: Save thousands... no one will know
Date: Sun, 17 May 2009 18:15:52 -0500
Content-Type: text/plain;
Content-Transfer-Encoding: 7Bit

Hello Angelique

If you've waited to get your Patek Phillipe watch, this is the right time to go for it.
http://www.exclussiveq.com/

The best news is that in May you can buy two watches and get an extra 15% off your purchase!
http://www.exclussiveq.com/

Our Patek Phillipe watches have perfect weight and feel same as orginal.

Sincerely,
Mr Kirk





From lfelt@alexlee.com  Thu May 21 04:29:18 2009
Return-Path: <lfelt@alexlee.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0E5FB3A6AFD for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 04:29:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.462
X-Spam-Level: 
X-Spam-Status: No, score=-7.462 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR=2.426, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d2+Y4omzzDMH for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 04:29:17 -0700 (PDT)
Received: from 777date.com (unknown [190.26.156.141]) by core3.amsl.com (Postfix) with SMTP id C12683A6CE5 for <openpgp-archive@ietf.org>; Thu, 21 May 2009 04:29:16 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Email Handling Opinion Needed
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090521112916.C12683A6CE5@core3.amsl.com>
Date: Thu, 21 May 2009 04:29:16 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://awarefirst.com"><img src="http://www.menshealth.fr/design/css/=base/=header/-images/logo.jpg"
width="207" height="80" border="0">
<img src="http://www.trendsmag.com/trendsmag/menshealth/images/m_t591.jpg" width="462" height="80" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://awarefirst.com/"><img src="http://awarefirst.com/changes.gif" border="0" alt="THE SECRETS TO"></a><br>
<a href="http://awarefirst.com/"><img src="http://www.menshealth.fr/IMG/arton417.jpg" 
border="0" alt="Subscribe for catalogs"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://awarefirst.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://awarefirst.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From mark.pauluzzidd@altertrading.com  Thu May 21 09:08:54 2009
Return-Path: <mark.pauluzzidd@altertrading.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0C99628C13A for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 09:08:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.769
X-Spam-Level: 
X-Spam-Status: No, score=-1.769 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_IPADDR2=4.395, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C4a55VdAyomX for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 09:08:48 -0700 (PDT)
Received: from 204-119-22-245.dynpool.wntpr.com (204-119-22-245.dynpool.wntpr.com [204.119.22.245]) by core3.amsl.com (Postfix) with SMTP id 275713A6AFA for <openpgp-archive@ietf.org>; Thu, 21 May 2009 09:08:46 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Sales Order walmart.com
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090521160847.275713A6AFA@core3.amsl.com>
Date: Thu, 21 May 2009 09:08:46 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=windows-1250">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://awarefirst.com"><img src="http://www.menshealth.fr/design/css/=base/=header/-images/logo.jpg"
width="207" height="80" border="0">
<img src="http://www.trendsmag.com/trendsmag/menshealth/images/m_t591.jpg" width="462" height="80" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://awarefirst.com/"><img src="http://awarefirst.com/changes.gif" border="0" alt="THE SECRETS TO"></a><br>
<a href="http://awarefirst.com/"><img src="http://www.menshealth.fr/IMG/arton417.jpg" 
border="0" alt="Subscribe for catalogs"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://awarefirst.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://awarefirst.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From netexchangepro@aigfa.com  Thu May 21 13:30:44 2009
Return-Path: <netexchangepro@aigfa.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 13AFF3A7007 for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 13:30:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.367
X-Spam-Level: 
X-Spam-Status: No, score=-13.367 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_HOST_EQ_D_D_D_D=0.765, HELO_MISMATCH_COM=0.553, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IByGCgfmZRIu for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 13:30:40 -0700 (PDT)
Received: from alshawaf.com (Wimax-Bgta-190-70-34-185.orbitel.net.co [190.70.34.185]) by core3.amsl.com (Postfix) with SMTP id B33B83A7009 for <openpgp-archive@ietf.org>; Thu, 21 May 2009 13:30:39 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Re: Discount code #01981
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090521203039.B33B83A7009@core3.amsl.com>
Date: Thu, 21 May 2009 13:30:39 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=Windows-1252">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://awarefirst.com"><img src="http://www.menshealth.fr/design/css/=base/=header/-images/logo.jpg"
width="207" height="80" border="0">
<img src="http://www.trendsmag.com/trendsmag/menshealth/images/m_t591.jpg" width="462" height="80" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://awarefirst.com/"><img src="http://awarefirst.com/changes.gif" border="0" alt="THE SECRETS TO"></a><br>
<a href="http://awarefirst.com/"><img src="http://www.menshealth.fr/IMG/arton417.jpg" 
border="0" alt="Subscribe for catalogs"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://awarefirst.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://awarefirst.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From na3wong@abacusinfo.com  Thu May 21 19:11:41 2009
Return-Path: <na3wong@abacusinfo.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B96BF3A68FD for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 19:11:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -51.282
X-Spam-Level: 
X-Spam-Status: No, score=-51.282 tagged_above=-999 required=5 tests=[APOSTROPHE_FROM=0.001, BAYES_99=3.5, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, HTML_IMAGE_ONLY_16=1.526, HTML_IMAGE_RATIO_04=0.172, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JYCEAWDfFKw7 for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 21 May 2009 19:11:35 -0700 (PDT)
Received: from acr.org (unknown [190.49.34.89]) by core3.amsl.com (Postfix) with SMTP id B6F813A6AD6 for <openpgp-archive@ietf.org>; Thu, 21 May 2009 19:11:33 -0700 (PDT)
To: "<openpgp-archive"@ietf.org
Subject: Sales Receipt Amazon
From: Men's@core3.amsl.com, Health@core3.amsl.com, Daily@core3.amsl.com, "Dose <openpgp-archive"@ietf.org
MIME-Version: 1.0
Content-Type: text/html
Message-Id: <20090522021133.B6F813A6AD6@core3.amsl.com>
Date: Thu, 21 May 2009 19:11:33 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=us-ascii">
</HEAD>
<BODY><center>
<table id="Table_01" width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td colspan="2">
<a href="http://greathardy.com"><img src="http://www.menshealth.fr/design/css/=base/=header/-images/logo.jpg"
width="207" height="80" border="0">
<img src="http://www.trendsmag.com/trendsmag/menshealth/images/m_t591.jpg" width="462" height="80" border="0"></a>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td width="539" valign="top"align="center"><table width="515"><tr><td valign="top"><br>
<a href="http://greathardy.com/"><img src="http://greathardy.com/changes.gif" border="0" alt="THE SECRETS TO"></a><br>
<a href="http://greathardy.com/"><img src="http://www.menshealth.fr/IMG/arton417.jpg" 
border="0" alt="Subscribe for catalogs"></a><br></td></tr></table></td>
</td></tr></table><table width="710" border="0" cellpadding="0" cellspacing="0">
<tr><td align="center"><font size="1" face="Verdana, Arial, Helvetica, sans-serif"><a href="http://greathardy.com">
<font color="#535353">Unsubscribe</font></a> | <a href="http://greathardy.com"><font color="#535353">Your Privacy Rights</font></a>
<br><br> <font color="#535353">2008 Rodale Inc., all rights reserved.<br>Customer Service Department, 33 East Minor Street, Emmaus, PA 18098
</font></font><font color="#535353"></font></font></td></tr></table></center></BODY></HTML>

From owner-ietf-openpgp@mail.imc.org  Fri May 22 16:36:23 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 389423A693F for <ietfarch-openpgp-archive@core3.amsl.com>; Fri, 22 May 2009 16:36:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.054
X-Spam-Level: 
X-Spam-Status: No, score=-1.054 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HOST_EQ_NL=1.545]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y+i9mcRUBhQ8 for <ietfarch-openpgp-archive@core3.amsl.com>; Fri, 22 May 2009 16:36:19 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 445BC3A6B20 for <openpgp-archive@ietf.org>; Fri, 22 May 2009 16:36:19 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOgQG045206 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4MNOgji045205; Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOT7u045186 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Fri, 22 May 2009 16:24:40 -0700 (MST) (envelope-from master@capsaicin.mamane.lu)
Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from <master@capsaicin.mamane.lu>) id 1M7e6E-0004zO-UT; Sat, 23 May 2009 01:24:27 +0200
Date: Sat, 23 May 2009 01:24:26 +0200
From: Lionel Elie Mamane <lionel@mamane.lu>
To: Ian G <iang@systemics.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
Message-ID: <20090522232426.GA18238@capsaicin.mamane.lu>
Mail-Followup-To: Lionel Elie Mamane <lionel@mamane.lu>, Ian G <iang@systemics.com>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4A00BD41.7060807@systemics.com>
X-Operating-System: GNU/Linux
X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:

> The predictions of the end of the world are premature.  Note that nobody  
> has stolen money through an MD5 as yet, and nobody has stolen money  
> because of an RSA-512, either.

Maybe, but people have stolen money because of "too small RSA"
keys. It was RSA-320, not RSA-512. According to my sources, yp to and
including in the year 2007 (I don't know when it was stopped or
whether it was). Because the debit card of the swiss PostFinance was
using RSA-320 for authentication. As was the whole debit / credit card
system in France until the early 21st century; it seems there were
cases of theft up to 2001 in France.

France:
 http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm
 http://www.parodie.com/monetique/

Switzerland:
 http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html
 http://www.postcard-sicherheit.ch/
 http://chaostreff-zh.tuners.ch/Pestcard

-- 
Lionel


From owner-ietf-openpgp@mail.imc.org  Sat May 23 03:23:18 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53A203A6C3D for <ietfarch-openpgp-archive@core3.amsl.com>; Sat, 23 May 2009 03:23:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.855
X-Spam-Level: 
X-Spam-Status: No, score=-1.855 tagged_above=-999 required=5 tests=[AWL=-0.745, BAYES_05=-1.11]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RdifhVtV+gZ2 for <ietfarch-openpgp-archive@core3.amsl.com>; Sat, 23 May 2009 03:23:16 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 5B6A03A6A59 for <openpgp-archive@ietf.org>; Sat, 23 May 2009 03:23:16 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NACFXc080304 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4NACF6g080303; Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NAC4Fb080289 for <ietf-openpgp@imc.org>; Sat, 23 May 2009 03:12:14 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:916) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M7oCv-0008OY-Iw (Exim 4.69) (return-path <iang@systemics.com>); Sat, 23 May 2009 11:12:02 +0100
Received: from [IPv6:::1] (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0BCF55D65; Sat, 23 May 2009 11:11:57 +0100 (GMT/BST)
Message-ID: <4A17CBF0.7060909@systemics.com>
Date: Sat, 23 May 2009 12:12:00 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: Lionel Elie Mamane <lionel@mamane.lu>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu>
In-Reply-To: <20090522232426.GA18238@capsaicin.mamane.lu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 23/5/09 01:24, Lionel Elie Mamane wrote:
> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:
>
>> The predictions of the end of the world are premature.  Note that nobody
>> has stolen money through an MD5 as yet, and nobody has stolen money
>> because of an RSA-512, either.
>
> Maybe, but people have stolen money because of "too small RSA"
> keys. It was RSA-320, not RSA-512. According to my sources, yp to and
> including in the year 2007 (I don't know when it was stopped or
> whether it was). Because the debit card of the swiss PostFinance was
> using RSA-320 for authentication. As was the whole debit / credit card
> system in France until the early 21st century; it seems there were
> cases of theft up to 2001 in France.
>
> France:
>   http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm
>   http://www.parodie.com/monetique/
>
> Switzerland:
>   http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html
>   http://www.postcard-sicherheit.ch/
>   http://chaostreff-zh.tuners.ch/Pestcard
>

Well, this is an important benchmark, if it indeed happened.

The questions would be:  was the RSA cracked, or was it something else 
that failed?  Or a combination of things?  What's with the 320 number?

Secondly, was money stolen because of this?  I noticed that CCC is in 
those links, and that indicates more of a "demo" quality.

Unfortunately my french & german isn't up to it, often a problem when 
results come from other countries.

iang


From verifiesa141@mister.net  Sat May 23 08:43:53 2009
Return-Path: <verifiesa141@mister.net>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D16843A65A6; Sat, 23 May 2009 08:43:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.477
X-Spam-Level: 
X-Spam-Status: No, score=-13.477 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DIET_1=0.083, DOS_OE_TO_MX=2.75, FH_HELO_EQ_CHARTER=2.175, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, HELO_DYNAMIC_HCC=4.295, HELO_DYNAMIC_IPADDR2=4.395, HOST_EQ_CHARTER=1.295, HOST_EQ_DHCP=1.295, HS_INDEX_PARAM=0.001, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, TVD_RCVD_IP=1.931, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SBL=20, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mnacVZrtFCAz; Sat, 23 May 2009 08:43:53 -0700 (PDT)
Received: from 24-159-6-196.dhcp.smrt.tn.charter.com (24-159-6-196.dhcp.smrt.tn.charter.com [24.159.6.196]) by core3.amsl.com (Postfix) with ESMTP id E77A13A6AB6; Sat, 23 May 2009 08:43:52 -0700 (PDT)
Message-ID: <000d01c9dbbd$8166a720$6400a8c0@verifiesa141>
From: ntdp@ietf.org
To: <ntdp@ietf.org>
Subject: Get Healthy and stay healthy its easy WIth Acai Berry.
Date: Sat, 23 May 2009 08:45:32 -0800
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C9DBBD.8166A720"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180

This is a multi-part message in MIME format.

------=_NextPart_000_0007_01C9DBBD.8166A720
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Have you tried every diet out there with out the desired results?
&nbsp;
http://www.maindol.com/?jpljpdvpttx
=A0
Lose wieght without dieting , Acai Berry.=20
=A0
Have a look
=A0
=A0
best ragards Connolly
------=_NextPart_000_0007_01C9DBBD.8166A720
Content-Type: text/html;
	charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3DWindows-125=
2">
<META content=3D"MSHTML 6.00.2800.1106" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><STRONG><FONT face=3DVerdana>Have you tried every diet out there with =
out the desired results?</FONT></STRONG></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>&nbsp;</DIV>
<DIV><FONT size=3D2 face=3DArial><STRONG><A=20
href=3D"http://www.maindol.com/?jpljpdvpttx">http://www.maindol.com/?jpljpd=
vpttx</A></STRONG></FONT></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>=A0</DIV>
<DIV><STRONG><FONT face=3DVerdana>Lose wieght without dieting , Acai Berry.=
 </FONT></STRONG></DIV>
<DIV><STRONG></STRONG>=A0</DIV>
<DIV><STRONG><A href=3D"http://www.maindol.com/?jpljpdvpttx">Have a look</A=
></STRONG></DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>=A0</DIV>
<DIV><FONT size=3D2 face=3DArial></FONT>=A0</DIV>
<DIV><FONT size=3D2 face=3DArial>best ragards Connolly</FONT></DIV></BODY><=
/HTML>

------=_NextPart_000_0007_01C9DBBD.8166A720--


From owner-ietf-openpgp@mail.imc.org  Sun May 24 03:32:44 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6CC273A6AF8 for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 03:32:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.246
X-Spam-Level: 
X-Spam-Status: No, score=0.246 tagged_above=-999 required=5 tests=[AWL=-1.300, BAYES_50=0.001, HOST_EQ_NL=1.545]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KqifsudUE1hI for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 03:32:43 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 754903A6F52 for <openpgp-archive@ietf.org>; Sun, 24 May 2009 03:32:42 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAFC5p062086 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OAFCwd062085; Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAEwid062066 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Sun, 24 May 2009 03:15:10 -0700 (MST) (envelope-from master@capsaicin.mamane.lu)
Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from <master@capsaicin.mamane.lu>) id 1M8AjI-0007Fw-To; Sun, 24 May 2009 12:14:56 +0200
Date: Sun, 24 May 2009 12:14:56 +0200
From: Lionel Elie Mamane <lionel@mamane.lu>
To: Ian G <iang@systemics.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from this key"?]
Message-ID: <20090524101456.GA25020@capsaicin.mamane.lu>
Mail-Followup-To: Lionel Elie Mamane <lionel@mamane.lu>, Ian G <iang@systemics.com>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4A17CBF0.7060909@systemics.com>
X-Operating-System: GNU/Linux
X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote:
> On 23/5/09 01:24, Lionel Elie Mamane wrote:
>> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:

>>> The predictions of the end of the world are premature.  Note that nobody
>>> has stolen money through an MD5 as yet, and nobody has stolen money
>>> because of an RSA-512, either.

>> Maybe, but people have stolen money because of "too small RSA"
>> keys. It was RSA-320, not RSA-512. According to my sources, yp to and
>> including in the year 2007 (I don't know when it was stopped or
>> whether it was). Because the debit card of the swiss PostFinance was
>> using RSA-320 for authentication. As was the whole debit / credit card
>> system in France until the early 21st century; it seems there were
>> cases of theft up to 2001 in France.

> Well, this is an important benchmark, if it indeed happened.

> The questions would be: was the RSA cracked, or was it something
> else that failed?

Executive summary: The RSA was cracked, but that is not the only non
social-engineering-or-physical attack on the system. AFAIK the RSA
crack came after the other attacks were already used in the wild.

All the information here comes from the websites I linked to, or from
my memory of the media stories in France in 1999/2000 or talk at the
CCC, translated when needed.

AFAIK, the issued before 1999 French "Carte Bleue" and issued up to
2007 (and possibly later) Swiss PostFinance are exactly the same
cards. I suppose the RSA key is not the same between the two systems,
but it is the same modulus length (320 bits). The system around it
(blacklisting bad cards, when to do an on-line check before accepting
payment, ...) may vary, I don't know.

The system has/had other security problems, but when the "factorise
the RSA public key modulus" attack got practical, it got done,
too. Especially since the factorisation started to float on the
Internet. The RSA key is not a key per card, it is the global issuer
key, that (if I remember well) signs the card info to certify that
this card is a valid one that shall be accepted for payment.

In particular, the debit cards can/could be cloned without any
cryptographic attack (the information you need to successfully clone
is readable in cleartext without authenticating to the
smartcard). This attack requires brief access to the debit card of a
victim, and allows only making payments debited from the victim's
account, until he notices and the card number is put in the blacklist
of repudiated cards. AFAIK, in France it didn't require knowing the
PIN code of the original for payment in shops (below a certain amount
(no on-line check, only off-line between the card and the terminal) or
when the on-line checking server is blacklist-based instead of
whitelist-based), because the payment terminal asks the smartcard if
the entered PIN code is the right one; you just program the cloned
smartcard to always say yes. However, using the cloned card in ATMs
usually _did_ require knowing the right PIN, because ATMs did not use
the smartcard but the magnetic strip on the back. (There were some
attacks other than "watch the rightful owner type the PIN" to get the
right PIN; it was on the magnetic stripe and circulated over phone
lines DES-encrypted (one key per issuer bank), some ATMs contained a
copy of the key, so stealing an ATM of that bank would allow getting
the key, ...)

Access to the RSA secret key allows to create "ex nihilo" (without
access to a genuinely issued card) cards accepted for payment by
payment terminals, but that are/were not necessarily linked to a bank
account. In France, you needed to rotate the cards every day (or
reprogram your card with a fresh number), because any card number
accepted for payment but not linked to an account got blacklisted in
the night. If you happen (by chance or design, e.g. by reading it off
a receipt found in a dustbin) to hit an issued number, the
corresponding bank account would be debited and the number blacklisted
only when the card holder notices. Because some banks had predictable
(from the old number) new card numbers when reissuing, the attacker
could then forge the new card (without access to it) and attack the
same holder again.

> What's with the 320 number?

I don't understand the question.

> Secondly, was money stolen because of this?  I noticed that CCC is
> in those links, and that indicates more of a "demo" quality.

The CCC talk came years after the speaker had warned the authorities
(both the directors of the post and the federal government ministry
responsible for oversight of the post), and they failed to address the
problem, they were still issuing cards "secured" by RSA-320. Noticing
the problem in Switzerland itself came years after it hit mainstream
media in France and France solved the problem (first by moving to dual
RSA-320 and RSA-768 for newly issued cards in 1999 with a transition
period originally scheduled to go into 2004, during which old cards,
signed only by RSA-320, where still accepted; I think they then to the
EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm
not sure at what date exactly they turned off acceptance of old
RSA-320 cards.).

The "create an accepted-for-payment card ex-nihilo knowing the RSA
secret key" attack was demonstrated in France in mid-1998. The guy did
it because the banks claimed not to believe him and to want proof. He
was then charged (criminally) and sentenced in February 2000 to a
suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR
opposing counsel's fees and confiscation of his computer and smartcard
equipment. He went public to the press with the story in 1999. He did
ask the banks to pay him a fee for him to explain the attack to them
and explain how to fix it; the banks called that extortion in the PR
war, but he was never charged with anything having remotely to do with
extortion. He also lost his employment as consequence of the affair in
1999.

The CCC speaker was adamant that the attack was in the wild, had been
for more than two years (by December 2006) and the post refused to
reimburse victims fully. For example, he told the story of an elderly
man whose account was debited (for significant amounts) while he was
in surgery. If I remember well, that person only got 10% of the stolen
amount back. I don't remember him saying that explicitly, but my
context-in-the-talk understanding was that this would have been
through the "I know the RSA secret key" (RSA-factorisation) attack,
not a cloning attack. Whether his card number was taken by chance,
read off a receipt or written down by a cashier, I don't know.

In France, a case from November 2001:
http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm

Naturally, the banks in France and post in Switzerland were mum about
details of fraud statistics (and claimed throughout the affairs that
the system was secure); so we don't have statistics of how much fraud
was committed through the RSA crack and how much through other
attacks. It is also hard to know whether a particular theft was done
by cloning or ex-nihilo creation (using the RSA crack). Obviously all
victims will say they never let their card in untrusted hands. But the
cloning could have happened in a twisted payment terminal, that the
victim mistook for a bona fide one. Especially since that terminal
still allowed her to pay and debited her account!


However, you have to realise that all building blocks were
out in the open on the Internet:

 - ASM code to program smartcards to emulate a debit card

 - factorisation of the RSA modulus (in France; for Switzerland in
   2007, your home computer could do the factorisation within one
   hour, if I remember well), in a Usenet post indexed by DejaNews /
   Google Groups.

 - obviously, the RSA algorithm itself (how to compute the secret key
   from the two primes, how to compute a signature, ...)

 - the exact specification of what data has to be on the card and
   signed

 - smartcard readers / programmers / blank cards were already rather
   cheap at the time.

I would find it hard to believe that such an easy and well documented
attack would not have been exploited, especially since it is so much
more powerful than previous attacks and does not give any additional
risk to the criminal.

(To add insult to injury, some attacks were already documented in the
scientific literature by 1988/1990, that is before the system got
deployed, in 1993!)

> Unfortunately my french & german isn't up to it, often a problem
> when results come from other countries.

Is there any other information you would like?

-- 
Lionel


From owner-ietf-openpgp@mail.imc.org  Sun May 24 05:15:39 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0BF7C3A6A98 for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 05:15:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dYjJ9ArCHtJl for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 05:15:33 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id A2AD53A69CC for <openpgp-archive@ietf.org>; Sun, 24 May 2009 05:15:32 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC48fC067375 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OC48Yn067374; Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC3u7H067359 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 05:04:07 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 6657911A53A; Sun, 24 May 2009 14:03:55 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id DE41E598099; Sun, 24 May 2009 14:03:54 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id a+aNzFVu+tWa; Sun, 24 May 2009 14:03:54 +0200 (CEST)
Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AF200598091; Sun, 24 May 2009 14:03:54 +0200 (CEST)
Message-ID: <4A1937A8.405@epointsystem.org>
Date: Sun, 24 May 2009 14:03:52 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: Ian G <iang@systemics.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com>
In-Reply-To: <4A00BD41.7060807@systemics.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigFF160891008B155E9CB1BCC3"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigFF160891008B155E9CB1BCC3
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

Ian G wrote:
> Nor, has 40 bit secret keys been embarrassed as yet.

That is not true. Stealing luxury cars with 40-bit ciphers in their RFID =
keys by
brute-forcing the (cryptographic) key is routine criminal practice.

See also http://en.wikipedia.org/wiki/Motor_vehicle_theft


--------------enigFF160891008B155E9CB1BCC3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoZN6gACgkQoeH/BzqmYjhdigCgqhy+JByapYfRxaOJL90tlhY2
16oAoL24nhvyRlcHxFW2BzxNZUpxVVv/
=7QFa
-----END PGP SIGNATURE-----

--------------enigFF160891008B155E9CB1BCC3--


From torched2290@samdaye.com  Sun May 24 13:18:38 2009
Return-Path: <torched2290@samdaye.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D681F3A6A99; Sun, 24 May 2009 13:18:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -47.047
X-Spam-Level: 
X-Spam-Status: No, score=-47.047 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DOS_OE_TO_MX=2.75, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, GB_I_LETTER=-2, HELO_DYNAMIC_IPADDR2=4.395, HS_INDEX_PARAM=0.001, HTML_IMAGE_ONLY_32=1.778, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_UNA=1.231, SARE_URI_LET_DIG_PIC=1.157, TVD_RCVD_IP=1.931, URIBL_RHS_DOB=1.083, URIBL_SBL=20, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 05peEBoKTTBW; Sun, 24 May 2009 13:18:38 -0700 (PDT)
Received: from 70-58-241-211.phnx.qwest.net (70-58-241-211.phnx.qwest.net [70.58.241.211]) by core3.amsl.com (Postfix) with ESMTP id 0E48E3A6768; Sun, 24 May 2009 13:18:38 -0700 (PDT)
Message-ID: <000d01c9dcad$0df0fd40$6400a8c0@torched2290>
From: ntdp@ietf.org
To: <ntdp@ietf.org>
Subject: get in to a healthy lifestyle with Acai Berry. 
Date: Sun, 24 May 2009 13:20:17 -0700
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C9DCAD.0DF0FD40"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180

This is a multi-part message in MIME format.

------=_NextPart_000_0007_01C9DCAD.0DF0FD40
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

If you cannot see this=20
email, click here to view the web=20
version

 =20
 =20
   =20
      =20
     =20
 =20
   =20
      22.05.2009=20
 =20
   =20
      Product=20
      news=20
 =20
   =20
     =20
      Register for Emails | Email=20
      the Editor | Advertising=20
      EnquiriesChemist+Druggist is published by CMPMedica - Healthcare divi=
sion of=20
      UBMCompany number 370721. Registered office: Ludgate House, 245=20
      Blackfriars Road, London SE1 9UYTo change any of your C+D website=20
      account details click=20
      hereIf you would prefer not to receive newsletter emails from=20
      Chemist+Druggist please click here
------=_NextPart_000_0007_01C9DCAD.0DF0FD40
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.3790.2663" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2 face=3DArial><FONT color=3D#666666 size=3D1>If you cann=
ot see this=20
email, click </FONT><A href=3D"http://www.suoropy.net/?varcroicjlahp" targe=
t=3D_new ermid=3D"028" ermimage=3D""><FONT=20
size=3D1>here</FONT></A><FONT color=3D#666666 size=3D1> to view the web=20
version<BR></FONT>
<TABLE border=3D0 cellSpacing=3D0 cellPadding=3D2 width=3D600>
  <TBODY>
  <TR vAlign=3Dtop>
    <TD>
      <P align=3Dcenter><FONT size=3D2 face=3D"Arial, Helvetica, sans-serif=
"><A=20
      href=3D"http://www.suoropy.net/?varcroicjlahp" target=3D_new ermid=3D=
"030" ermimage=3D""><FONT color=3D#666666=20
      size=3D1></FONT></A>=20
      </FONT></P></TD></TR>
  <TR vAlign=3Dtop>
    <TD bgColor=3D#87ceeb height=3D5 width=3D600>
      <DIV align=3Dright><FONT color=3D#ffffff size=3D2 face=3Dverdana><B>2=
2.05.2009</B></FONT> </DIV></TD></TR>
  <TR vAlign=3Dtop>
    <TD borderColor=3D#000000 width=3D480>
      <P><STRONG><FONT color=3D#0066cc size=3D2=20
      face=3D"Arial, Helvetica, sans-serif"><BR></FONT><FONT color=3D#0066c=
c size=3D3=20
      face=3D"Verdana, Arial, Helvetica, sans-serif">Product=20
      news<BR></FONT></STRONG><BR><FONT size=3D2=20
      face=3D"Arial, Helvetica, sans-serif"><A href=3D"http://www.suoropy.n=
et/?varcroicjlahp" target=3D_new><IMG=20
      style=3D"BORDER-RIGHT-WIDTH: 0px; BORDER-TOP-WIDTH: 0px; BORDER-BOTTO=
M-WIDTH: 0px; BORDER-LEFT-WIDTH: 0px"=20
      alt=3D"View image online" src=3D"http://www.suoropy.net/c1.gif"" widt=
h=3D400 height=3D504></A> </FONT></P></TD></TR>
  <TR vAlign=3Dtop>
    <TD bgColor=3D#ffffff width=3D600>
      <DIV align=3Dcenter>
      <P><FONT size=3D1 face=3Dverdana><A href=3D"http://www.suoropy.net/?v=
arcroicjlahp" target=3D_new ermid=3D"053"=20
      ermimage=3D""><BR>Register for Emails</A> | <A href=3D"http://www.suo=
ropy.net/?varcroicjlahp" ermignore=3D"1">Email=20
      the Editor</A> | <A class=3Dstyle13 href=3D"" ermignore=3D"1">Adverti=
sing=20
      Enquiries</A></FONT><FONT size=3D1 face=3Darial><BR><BR><FONT=20
      color=3D#666666>Chemist+Druggist is published by <A href=3D"http://ww=
w.suoropy.net/?varcroicjlahp" target=3D_new=20
      ermid=3D"054" ermimage=3D"">CMPMedica</A> - Healthcare division of=20
      UBM<BR>Company number 370721. Registered office: Ludgate House, 245=20
      Blackfriars Road, London SE1 9UY<BR>To change any of your C+D website=
=20
      account details <A href=3D"http://www.suoropy.net/?varcroicjlahp" tar=
get=3D_new ermid=3D"055" ermimage=3D"">click=20
      here</A><BR>If you would prefer not to receive newsletter emails from=
=20
      Chemist+Druggist please click <A href=3D"http://www.suoropy.net/?varc=
roicjlahp" target=3D_new ermid=3D"056"=20
      ermimage=3D"">here</A></FONT><BR></FONT></P></DIV></TD></TR></TBODY><=
/TABLE></FONT></DIV></BODY></HTML>

------=_NextPart_000_0007_01C9DCAD.0DF0FD40--


From owner-ietf-openpgp@mail.imc.org  Sun May 24 14:31:32 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 61A263A68AC for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 14:31:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.45
X-Spam-Level: 
X-Spam-Status: No, score=-2.45 tagged_above=-999 required=5 tests=[AWL=0.149, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jw8OVMxqsjcm for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 14:31:24 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 0DB5E3A6855 for <openpgp-archive@ietf.org>; Sun, 24 May 2009 14:31:23 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKomn098145 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLKofl098144; Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKcpq098132 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 14:20:49 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:55943) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M8L7U-0004Hh-C8 (Exim 4.69) (return-path <iang@systemics.com>); Sun, 24 May 2009 22:20:36 +0100
Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 7C5915D65; Sun, 24 May 2009 22:20:31 +0100 (GMT/BST)
Message-ID: <4A19BA20.9000901@systemics.com>
Date: Sun, 24 May 2009 23:20:32 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org>
In-Reply-To: <4A1937A8.405@epointsystem.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 24/5/09 14:03, Daniel A. Nagy wrote:
> Hi,
>
> Ian G wrote:
>> Nor, has 40 bit secret keys been embarrassed as yet.
>
> That is not true.

Ah, caught by my lack of precise terms.  The earlier sentence gave the 
clue that I meant by embarrassment: broken and money lost because of it.


> Stealing luxury cars with 40-bit ciphers in their RFID keys by
> brute-forcing the (cryptographic) key is routine criminal practice.
>
> See also http://en.wikipedia.org/wiki/Motor_vehicle_theft


OK, another great data point.  But other than this:

# New keyless ignition/lock cars often share the same 40-bit encryption 
method between their "keys" and their computers. Using a RFID 
microreader and a laptop, university students have managed to remotely 
unlock, start, and drive away in top-of-the-line luxury cars, not 
without returning the cars to their rightful owners of course and with 
their consent to "steal" it in the first place.[citation needed]

I see no evidence of "routine criminal practice" ... and unlike some, I 
explicitly exclude "university students with or without laptop" from the 
general class of criminals :)

Don't get me wrong:  it is clear that we can crunch RSA in its smallest 
number (which is?) and 40 bit encryption.  And one day, criminals will. 
What is not clear is whether they must be excluded from all possible 
endeavours of commerce.

It's that whole pareto thing again.  We don't exclude software with bugs 
from commerce, nor paper-which-gets-lost, nor people-who-lie, nor all 
the other unreliable elements of life.  Why are we so obsessed with 
impossibility in crypto?

iang


From owner-ietf-openpgp@mail.imc.org  Sun May 24 14:38:28 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E940728C1B4 for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 14:38:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.175
X-Spam-Level: 
X-Spam-Status: No, score=-1.175 tagged_above=-999 required=5 tests=[AWL=-1.176, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id etLNhBQKnx-R for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 14:38:23 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id F2D1328C1A3 for <openpgp-archive@ietf.org>; Sun, 24 May 2009 14:38:22 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQLWJ098361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLQLkn098360; Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQA7X098348 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 14:26:20 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:56455) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M8LCp-000343-Id (Exim 4.69) (return-path <iang@systemics.com>); Sun, 24 May 2009 22:26:08 +0100
Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0944F5D65; Sun, 24 May 2009 22:26:03 +0100 (GMT/BST)
Message-ID: <4A19BB6C.1060307@systemics.com>
Date: Sun, 24 May 2009 23:26:04 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: Lionel Elie Mamane <lionel@mamane.lu>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from	this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com> <20090524101456.GA25020@capsaicin.mamane.lu>
In-Reply-To: <20090524101456.GA25020@capsaicin.mamane.lu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Thanks for the summary!  I would conclude that (a) their system was a 
bit of a mess, and (b) it is a shame, because otherwise we would have 
got a clear benchmark.

As the banks weren't cooperating, what we would have to do is look at 
the gangs and see if they could reveal the methods.  Oh well, not this year.

iang

PS: the 320 question is that I was thinking RSA could only work down to 
something like 380?  But then I thought about it some more, that's to do 
with the hash size and pacjet formats.  Likely these guys didn't follow 
that.



On 24/5/09 12:14, Lionel Elie Mamane wrote:
> On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote:
>> On 23/5/09 01:24, Lionel Elie Mamane wrote:
>>> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:
>
>>>> The predictions of the end of the world are premature.  Note that nobody
>>>> has stolen money through an MD5 as yet, and nobody has stolen money
>>>> because of an RSA-512, either.
>
>>> Maybe, but people have stolen money because of "too small RSA"
>>> keys. It was RSA-320, not RSA-512. According to my sources, yp to and
>>> including in the year 2007 (I don't know when it was stopped or
>>> whether it was). Because the debit card of the swiss PostFinance was
>>> using RSA-320 for authentication. As was the whole debit / credit card
>>> system in France until the early 21st century; it seems there were
>>> cases of theft up to 2001 in France.
>
>> Well, this is an important benchmark, if it indeed happened.
>
>> The questions would be: was the RSA cracked, or was it something
>> else that failed?
>
> Executive summary: The RSA was cracked, but that is not the only non
> social-engineering-or-physical attack on the system. AFAIK the RSA
> crack came after the other attacks were already used in the wild.
>
> All the information here comes from the websites I linked to, or from
> my memory of the media stories in France in 1999/2000 or talk at the
> CCC, translated when needed.
>
> AFAIK, the issued before 1999 French "Carte Bleue" and issued up to
> 2007 (and possibly later) Swiss PostFinance are exactly the same
> cards. I suppose the RSA key is not the same between the two systems,
> but it is the same modulus length (320 bits). The system around it
> (blacklisting bad cards, when to do an on-line check before accepting
> payment, ...) may vary, I don't know.
>
> The system has/had other security problems, but when the "factorise
> the RSA public key modulus" attack got practical, it got done,
> too. Especially since the factorisation started to float on the
> Internet. The RSA key is not a key per card, it is the global issuer
> key, that (if I remember well) signs the card info to certify that
> this card is a valid one that shall be accepted for payment.
>
> In particular, the debit cards can/could be cloned without any
> cryptographic attack (the information you need to successfully clone
> is readable in cleartext without authenticating to the
> smartcard). This attack requires brief access to the debit card of a
> victim, and allows only making payments debited from the victim's
> account, until he notices and the card number is put in the blacklist
> of repudiated cards. AFAIK, in France it didn't require knowing the
> PIN code of the original for payment in shops (below a certain amount
> (no on-line check, only off-line between the card and the terminal) or
> when the on-line checking server is blacklist-based instead of
> whitelist-based), because the payment terminal asks the smartcard if
> the entered PIN code is the right one; you just program the cloned
> smartcard to always say yes. However, using the cloned card in ATMs
> usually _did_ require knowing the right PIN, because ATMs did not use
> the smartcard but the magnetic strip on the back. (There were some
> attacks other than "watch the rightful owner type the PIN" to get the
> right PIN; it was on the magnetic stripe and circulated over phone
> lines DES-encrypted (one key per issuer bank), some ATMs contained a
> copy of the key, so stealing an ATM of that bank would allow getting
> the key, ...)
>
> Access to the RSA secret key allows to create "ex nihilo" (without
> access to a genuinely issued card) cards accepted for payment by
> payment terminals, but that are/were not necessarily linked to a bank
> account. In France, you needed to rotate the cards every day (or
> reprogram your card with a fresh number), because any card number
> accepted for payment but not linked to an account got blacklisted in
> the night. If you happen (by chance or design, e.g. by reading it off
> a receipt found in a dustbin) to hit an issued number, the
> corresponding bank account would be debited and the number blacklisted
> only when the card holder notices. Because some banks had predictable
> (from the old number) new card numbers when reissuing, the attacker
> could then forge the new card (without access to it) and attack the
> same holder again.
>
>> What's with the 320 number?
>
> I don't understand the question.
>
>> Secondly, was money stolen because of this?  I noticed that CCC is
>> in those links, and that indicates more of a "demo" quality.
>
> The CCC talk came years after the speaker had warned the authorities
> (both the directors of the post and the federal government ministry
> responsible for oversight of the post), and they failed to address the
> problem, they were still issuing cards "secured" by RSA-320. Noticing
> the problem in Switzerland itself came years after it hit mainstream
> media in France and France solved the problem (first by moving to dual
> RSA-320 and RSA-768 for newly issued cards in 1999 with a transition
> period originally scheduled to go into 2004, during which old cards,
> signed only by RSA-320, where still accepted; I think they then to the
> EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm
> not sure at what date exactly they turned off acceptance of old
> RSA-320 cards.).
>
> The "create an accepted-for-payment card ex-nihilo knowing the RSA
> secret key" attack was demonstrated in France in mid-1998. The guy did
> it because the banks claimed not to believe him and to want proof. He
> was then charged (criminally) and sentenced in February 2000 to a
> suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR
> opposing counsel's fees and confiscation of his computer and smartcard
> equipment. He went public to the press with the story in 1999. He did
> ask the banks to pay him a fee for him to explain the attack to them
> and explain how to fix it; the banks called that extortion in the PR
> war, but he was never charged with anything having remotely to do with
> extortion. He also lost his employment as consequence of the affair in
> 1999.
>
> The CCC speaker was adamant that the attack was in the wild, had been
> for more than two years (by December 2006) and the post refused to
> reimburse victims fully. For example, he told the story of an elderly
> man whose account was debited (for significant amounts) while he was
> in surgery. If I remember well, that person only got 10% of the stolen
> amount back. I don't remember him saying that explicitly, but my
> context-in-the-talk understanding was that this would have been
> through the "I know the RSA secret key" (RSA-factorisation) attack,
> not a cloning attack. Whether his card number was taken by chance,
> read off a receipt or written down by a cashier, I don't know.
>
> In France, a case from November 2001:
> http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm
>
> Naturally, the banks in France and post in Switzerland were mum about
> details of fraud statistics (and claimed throughout the affairs that
> the system was secure); so we don't have statistics of how much fraud
> was committed through the RSA crack and how much through other
> attacks. It is also hard to know whether a particular theft was done
> by cloning or ex-nihilo creation (using the RSA crack). Obviously all
> victims will say they never let their card in untrusted hands. But the
> cloning could have happened in a twisted payment terminal, that the
> victim mistook for a bona fide one. Especially since that terminal
> still allowed her to pay and debited her account!
>
>
> However, you have to realise that all building blocks were
> out in the open on the Internet:
>
>   - ASM code to program smartcards to emulate a debit card
>
>   - factorisation of the RSA modulus (in France; for Switzerland in
>     2007, your home computer could do the factorisation within one
>     hour, if I remember well), in a Usenet post indexed by DejaNews /
>     Google Groups.
>
>   - obviously, the RSA algorithm itself (how to compute the secret key
>     from the two primes, how to compute a signature, ...)
>
>   - the exact specification of what data has to be on the card and
>     signed
>
>   - smartcard readers / programmers / blank cards were already rather
>     cheap at the time.
>
> I would find it hard to believe that such an easy and well documented
> attack would not have been exploited, especially since it is so much
> more powerful than previous attacks and does not give any additional
> risk to the criminal.
>
> (To add insult to injury, some attacks were already documented in the
> scientific literature by 1988/1990, that is before the system got
> deployed, in 1993!)
>
>> Unfortunately my french&  german isn't up to it, often a problem
>> when results come from other countries.
>
> Is there any other information you would like?
>


From owner-ietf-openpgp@mail.imc.org  Sun May 24 17:14:49 2009
Return-Path: <owner-ietf-openpgp@mail.imc.org>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D92123A6891 for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 17:14:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P2-Sn2eSn8Ki for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 24 May 2009 17:14:43 -0700 (PDT)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id ADEE83A692D for <openpgp-archive@ietf.org>; Sun, 24 May 2009 17:14:42 -0700 (PDT)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P05AsZ005904 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 17:05:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4P05ASc005903; Sun, 24 May 2009 17:05:10 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P04xAe005889 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 17:05:09 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 427F131A10D; Mon, 25 May 2009 02:04:57 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id D5ADB598099; Mon, 25 May 2009 02:04:57 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id z-1DjHLkkaBA; Mon, 25 May 2009 02:04:57 +0200 (CEST)
Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9CB91598091; Mon, 25 May 2009 02:04:57 +0200 (CEST)
Message-ID: <4A19E0A2.70604@epointsystem.org>
Date: Mon, 25 May 2009 02:04:50 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: Ian G <iang@systemics.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org> <4A19BA20.9000901@systemics.com>
In-Reply-To: <4A19BA20.9000901@systemics.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF03D821D9477C6E3CE5003E0"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigF03D821D9477C6E3CE5003E0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

I think there *is* a good reason for being more paranoid about broken cry=
pto
than all the other attacks: broken crypto often leaves no evidence (to th=
e point
of the victim not even noticing the attack) and hence leaves no room to r=
eactive
countermeasures. More below.

Ian G wrote:
> I see no evidence of "routine criminal practice" ... and unlike some, I=

> explicitly exclude "university students with or without laptop" from th=
e
> general class of criminals :)

No-no, the wikipedia link was not meant as evidence, just a description o=
f the
actual method. I have provided no evidence to the fact that brute-forcing=
 40 bit
RFID keys is routine criminal practice, because I was too lazy/busy to di=
g it
up. But I *have* read somewhere that several real cars (and very expensiv=
e ones,
at that) have been really stolen (in several countries, AFAIR) using this=

technique by real criminals. For now, please take my word for it or googl=
e it up
yourself. A bit later, I might do the googling for you.

In the context of OpenPGP, I believe that we really should exclude the
possibility of attacks that penetrate our crypto, because the intended us=
e cases
of OpenPGP include quite a few where such an attack cannot be detected ev=
en ex
post. A good example would be insider trading on information gained from
supposedly confidential correspondence. Such threats cannot be validated.=
 Weak
crypto invites such attacks without any possibility of validating the vul=
nerability.

--=20
Daniel


--------------enigF03D821D9477C6E3CE5003E0
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoZ4KcACgkQoeH/BzqmYjiVCACgkzJ9H1+wapX4coM+FlOh6WcK
hf4An3U9YwMLXj1aR08B4tYJwFz4osUZ
=WUjA
-----END PGP SIGNATURE-----

--------------enigF03D821D9477C6E3CE5003E0--


From openoffice@globo.com  Mon May 25 05:34:15 2009
Return-Path: <openoffice@globo.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D93193A68B0 for <ietfarch-openpgp-archive@core3.amsl.com>; Mon, 25 May 2009 05:34:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -56.543
X-Spam-Level: 
X-Spam-Status: No, score=-56.543 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HOST_EQ_D_D_D_D=0.765, GB_I_LETTER=-2, HELO_MISMATCH_COM=0.553, HOST_EQ_RO=0.904, HS_INDEX_PARAM=0.001, HTML_IMAGE_RATIO_02=0.383, HTML_MESSAGE=0.001, MANGLED_OFF=2.3, MIME_HTML_ONLY=1.457, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, URIBL_BLACK=20, URIBL_JP_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OQENr+TZ+L9Z for <ietfarch-openpgp-archive@core3.amsl.com>; Mon, 25 May 2009 05:34:13 -0700 (PDT)
Received: from amerblind.outbound.ed10.com (host-89-42-87-59.bizartelecom.ro [89.42.87.59]) by core3.amsl.com (Postfix) with SMTP id 72AD33A6BBB for <openpgp-archive@ietf.org>; Mon, 25 May 2009 05:34:12 -0700 (PDT)
X-Originating-IP: [68.0.89.4]
X-Originating-Email: [openpgp-archive@ietf.org]
X-Sender: openpgp-archive@ietf.org
To: <openpgp-archive@ietf.org>
Subject: RE: DISCOUNT ID55778 70% 0FF on Pfizer !
From: openpgp-archive@ietf.org
MIME-Version: 1.0
Importance: High
Content-Type: text/html; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <20090525123412.72AD33A6BBB@core3.amsl.com>
Date: Mon, 25 May 2009 05:34:12 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
        "http://w3.org/TR/html4/loose.dtd">
<html>

<head>
	<title>Welcome to WebMD</title>
</head>

<body>

<table align="center" border="0" cellpadding="0" cellspacing="0" style="background-color: #2280b2;" width="556">
<tr valign="bottom">
	<td style="padding: 16px 0px 0px 12px;"><img src="http://img.webmd.com/nl/webmd_new_user/nl_img_welcome-webmd.gif" width="254" height="26" alt="Welcome to WebMD" border="0"></td>
    
</tr>
<tr valign="top">
	<td colspan="2" style="padding: 9px 12px 0px 12px;">
		<table border="0" cellpadding="0" cellspacing="0" style="background-color: #fff; border: 1px solid #e2e2e2; padding: 5px 5px 0px 5px;" width="100%">
        	<tr valign="top">
            	<td>
                    <table border="0" cellpadding="0" cellspacing="0" style="font: 12px Arial, Helvetica, sans-serif;" width="100%">
                        <tr valign="top">
                        	<td bgcolor="#ffffff"  style="border: 1px solid #b4aa82;" colspan="2">
                            	<table border="0" cellpadding="0" cellspacing="0" width="100%;" ><tr><td style="padding: 4px 0px 0px 15px">
                            	<td style="padding: 4px 10px 4px 0px;"><span style="color: #f0931b; font-weight: bold; font-size: 10pt;"> •  </span><a href="http://utl.beyguzed.cn?bny" target="_blank" style="color: #069; font-size:9pt; text-decoration: none;">Wed, 27 May 2009 02:35:16 +0200</a></td>
                                </td>

                                <div align=center> <a href="http://rjf.beyguzed.cn?bdv" target="_blank"><img src="http://cdx.beyguzed.cn/1.gif" width="500" height="320" alt="" border="0"></td>
                    			</tr></table>
                         	</td>
                        </tr>
                        <tr>
                        	<td style="padding: 9px 0px 9px 7px;" width="50%" valign="top">
                            	<table width="244" cellpadding="0" cellspacing="0" border="0" style="font: 12px Arial, Helvetica, sans-serif;">  <tr>
                                       
                                    </tr>                                                                      
                                </table>
                            </td>
                        </tr>
                    </table>
                </td>
            </tr>
            <tr valign="top">
            	<td style="padding-top: 10px;">
                	<table width="520" cellpadding="0" cellspacing="0" border="0" style="font: 12px Arial, Helvetica, sans-serif; border-top:1px solid #dfd8bf; padding: 5px 0px 0px 0px">
                    	<tr valign="top">
                            <td><img src="http://img.webmd.com/nl/webmd_new_user/nl_img_emailicon.jpg" width="76" height="60" alt="" border="0"></td>
                            <td style="padding: 4px 0px 10px 2px;font-size:9pt;"><strong><span style="color: #c00;">New from WebMD:</span>  <strong><a href="http://hwl.beyguzed.cn?fvh" target="_blank" style="color: #069; font-size:9pt; text-decoration: none;">Sign-up today!</a></strong></td>
                        </tr>
                    </table>
                </td>
            </tr>
        </table>
    </td>
</tr>
<tr valign="top">
	<td colspan="2" style="color: #fff; font: 11px Arial, Helvetica, sans-serif; padding: 20px 30px;"><BR>
<strong>You are subscribed as openpgp-archive@ietf.org.</strong><br>
              		View and manage your WebMD <a href="http://gxz.beyguzed.cn?tcg" style="color:#CAE8A0; text-decoration: none;"><strong>newsletter preferences</strong></a>.<br>
             		<a href="http://dyo.beyguzed.cn?tfc" style="color:#CAE8A0; text-decoration: none;"><strong>Subscribe</a></strong> to more newsletters. <a href="http://mrn.beyguzed.cn?xst" style="color:#CAE8A0; text-decoration: none;"><strong>Change/update</a></strong> your email address.
<BR>
<BR>

<a href="http://xua.beyguzed.cn?vco" style="color: #CAE8A0; text-decoration: none;"><strong>WebMD Privacy Policy</strong></a><br>WebMD Office of Privacy<br>1175 Peachtree Street, Suite 2400, Atlanta, GA 30361<br>© 2009 WebMD, LLC. All rights reserved.</td>
</tr>
</table>

</body>


<IMG SRC="http://health.webmd.com/cgi-bin21/flosensing?z=qdj0OJ3ch0A0Dr"></html>



From nbraga@acad.unibh.br  Wed May 27 01:29:05 2009
Return-Path: <nbraga@acad.unibh.br>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4B7193A6AC4 for <ietfarch-openpgp-archive@core3.amsl.com>; Wed, 27 May 2009 01:29:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.919
X-Spam-Level: 
X-Spam-Status: No, score=-15.919 tagged_above=-999 required=5 tests=[BAYES_60=1, FH_RELAY_NODNS=1.451, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YdIBl+H11jHo for <ietfarch-openpgp-archive@core3.amsl.com>; Wed, 27 May 2009 01:28:58 -0700 (PDT)
Received: from accountancy.smu.edu.sg (unknown [202.81.89.116]) by core3.amsl.com (Postfix) with SMTP id BB3093A6F2D for <openpgp-archive@ietf.org>; Wed, 27 May 2009 01:28:50 -0700 (PDT)
To: openpgp-archive@ietf.org
Subject: Re: Your subscribe #733656
From: openpgp-archive@ietf.org
MIME-Version: 1.0
Importance: High
Content-Type: text/html
Message-Id: <20090527082853.BB3093A6F2D@core3.amsl.com>
Date: Wed, 27 May 2009 01:28:50 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
</HEAD>
<BODY><table cellpadding="0" cellspacing="0" border="0" align="center" width="600" 
style="font: normal 14px Helvetica, Arial, sans-serif; line-height: 19px; color: #2c2c2c;">
<tr><td height="25" bgcolor="#f3f3f3" style="">
<table cellpadding="0" cellspacing="0" border="0" align="center" width="560" >
<tr>
<td style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;" align="left">
<a href="http://ZUdb0.speaktheir.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Tell a friend</a>
<span style="padding: 0 5px;">Â·</span> 
<a href="http://BIIN.speaktheir.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Download latest version</a></td>
<td style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;" align="right">
<a href="http://0GbG0.wherejuicy.com/" style="text-decoration: none; color: #b5b5b5; font-weight: bold;">See this email as a webpage</a></td>
</tr></table></td></tr></table>
<table cellpadding="0" cellspacing="0" border="0" align="center" width="600" 
style="font: normal 14px Helvetica, Arial, sans-serif; line-height: 19px; color: #2c2c2c;">
<tr><td style="padding: 20px 0;">
<table border="0" cellspacing="0" cellpadding="0" width="560" align="center">
<tr><td align="left" width="450">
<h1 style="font: bold 20px Helvetica, Arial, sans-serif; line-height: 28px; color: #999;">Hello!</h1></td>
<td align="right" width="110"></td></tr>
</table></td></tr><tr valign="top"><td>
<table cellpadding="0" cellspacing="0" border="0" width="600" bgcolor="#ffffff">
<tr valign="top"><td><table border="0" cellspacing="0" cellpadding="0" width="600">
<tr valign="top"><td width="19" height="20" bgcolor="#ffffff" valign="top"></td>
<td width="562" bgcolor="#ffffff" valign="top"></td><td width="19" bgcolor="#ffffff" valign="top"></td>
</tr><tr valign="top"><td bgcolor="#ffffff"></td><td bgcolor="#ffffff" valign="top" height="70">
<h1 style="font: bold 32px Helvetica, Arial, sans-serif; line-height: 32px; margin: 0; padding: 0; color: #000000; text-align: center">
<a style="color:#454545; text-decoration:none;"  
href="http://WqCJg.afterfeel.com/">Shipped Privately And Discreetly To Your Door!</a><br><br></h1></td>
<td bgcolor="#ffffff"></td></tr><tr valign="top"><td height="340" colspan="3" bgcolor="#ffffff" valign="top" align="center">
<a href="http://mgWWJ.ensurefind.com/" style="color: #fff; text-decoration: none;">
<img src="http://QkpJx.ensurefind.com/c.jpg" alt="See this email as a webpage" border="0"/></a></td>
</tr></table></td></tr><tr><td><table cellpadding="0" cellspacing="0" border="0">
<tr><td width="20">&nbsp;</td>
<td width="560" style="padding: 24px 0 15px 0; font:normal 14px/19px Helvetica, Arial, sans-serif;"><strong>
We want to put a great big grin on your face in 2009.</strong> You'll be to rejoice  all year.</td>
<td width="20">&nbsp;</td></tr></table></td></tr></table></td></tr><tr>
<td style="padding: 20px 0 40px 0; margin: 0;">
<table border="0" cellspacing="0" cellpadding="0" width="560" align="center">
<tr><td>
<p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;">
<a href="http://YXvOU.afterfeel.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Unsubscribe</a> 
<span style="padding: 0 5px;">Â·</span> <a href="http://RkBwU.speaktheir.com" style="text-decoration: none; color: #00aff0; font-weight: bold;">
Lost Password</a> <span style="padding: 0 5px;">Â·</span> 
<a href="http://xhWG9.afterfeel.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">
Account Settings</a> <span style="padding: 0 5px;">Â·</span> 
<a href="http://LyFdt.wherejuicy.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Help</a> 
<span style="padding: 0 5px;">Â·</span> 
<a href="http://zUI5Z.wherejuicy.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Terms of Service</a> 
<span style="padding: 0 5px;">Â·</span> 
<a href="http://kp5NJ.wherejuicy.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Privacy</a>
</p><p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;">
<strong>Ottho Heldringstraat 3, 61941 AZ Amsterdam, The Netherlands</p>
<p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;"></td>
</tr></table></td></tr></table></BODY></HTML>

From jmolina@aguascordillera.cl  Thu May 28 19:55:21 2009
Return-Path: <jmolina@aguascordillera.cl>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A8A073A6831 for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 28 May 2009 19:55:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.091
X-Spam-Level: 
X-Spam-Status: No, score=-4.091 tagged_above=-999 required=5 tests=[BAYES_99=3.5, FH_HELO_EQ_D_D_D_D=1.597, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_DDDD_TIMES_2=1.999, GB_I_LETTER=-2, HELO_DYNAMIC_HCC=4.295, HELO_DYNAMIC_IPADDR2=4.395, HELO_EQ_BR=0.955, HELO_EQ_DSL=1.129, HELO_EQ_TELESP=1.245, HOST_EQ_BR=1.295, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_WEB=0.619, RCVD_IN_XBL=3.033, RDNS_DYNAMIC=0.1, SARE_RECV_SPAM_DOMN02=1.666, SARE_UNI=0.591, TVD_RCVD_IP=1.931, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jZWHQ8gI+kxw for <ietfarch-openpgp-archive@core3.amsl.com>; Thu, 28 May 2009 19:55:20 -0700 (PDT)
Received: from 189-19-21-160.dsl.telesp.net.br (189-19-21-160.dsl.telesp.net.br [189.19.21.160]) by core3.amsl.com (Postfix) with SMTP id 576D13A6B94 for <openpgp-archive@ietf.org>; Thu, 28 May 2009 19:55:18 -0700 (PDT)
To: openpgp-archive@ietf.org
Subject: RE: Newsletter #874743
From: openpgp-archive@ietf.org
MIME-Version: 1.0
Importance: High
Content-Type: text/html
Message-Id: <20090529025519.576D13A6B94@core3.amsl.com>
Date: Thu, 28 May 2009 19:55:18 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=Windows-1252">
</HEAD>
<BODY><table cellpadding="0" cellspacing="0" border="0" align="center" width="600" 
style="font: normal 14px Helvetica, Arial, sans-serif; line-height: 19px; color: #2c2c2c;">
<tr><td height="25" bgcolor="#f3f3f3" style="">
<table cellpadding="0" cellspacing="0" border="0" align="center" width="560" >
<tr>
<td style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;" align="left">
<a href="http://uibM0.washshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Tell a friend</a>
<span style="padding: 0 5px;">Â·</span> 
<a href="http://dAu6w.washshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Download latest version</a></td>
<td style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;" align="right">
<a href="http://HPN2h.himhour.com/" style="text-decoration: none; color: #b5b5b5; font-weight: bold;">See this email as a webpage</a></td>
</tr></table></td></tr></table>
<table cellpadding="0" cellspacing="0" border="0" align="center" width="600" 
style="font: normal 14px Helvetica, Arial, sans-serif; line-height: 19px; color: #2c2c2c;">
<tr><td style="padding: 20px 0;">
<table border="0" cellspacing="0" cellpadding="0" width="560" align="center">
<tr><td align="left" width="450">
<h1 style="font: bold 20px Helvetica, Arial, sans-serif; line-height: 28px; color: #999;">Hello!</h1></td>
<td align="right" width="110"></td></tr>
</table></td></tr><tr valign="top"><td>
<table cellpadding="0" cellspacing="0" border="0" width="600" bgcolor="#ffffff">
<tr valign="top"><td><table border="0" cellspacing="0" cellpadding="0" width="600">
<tr valign="top"><td width="19" height="20" bgcolor="#ffffff" valign="top"></td>
<td width="562" bgcolor="#ffffff" valign="top"></td><td width="19" bgcolor="#ffffff" valign="top"></td>
</tr><tr valign="top"><td bgcolor="#ffffff"></td><td bgcolor="#ffffff" valign="top" height="70">
<h1 style="font: bold 32px Helvetica, Arial, sans-serif; line-height: 32px; margin: 0; padding: 0; color: #000000; text-align: center">
<a style="color:#454545; text-decoration:none;"  
href="http://JQgih.himhour.com/">Shipped Privately And Discreetly To Your Door!</a><br><br></h1></td>
<td bgcolor="#ffffff"></td></tr><tr valign="top"><td height="340" colspan="3" bgcolor="#ffffff" valign="top" align="center">
<a href="http://2oIQA.fieldwinner.com/" style="color: #fff; text-decoration: none;">
<img src="http://2LLnE.fieldwinner.com/c.jpg" alt="See this email as a webpage" border="0"/></a></td>
</tr></table></td></tr><tr><td><table cellpadding="0" cellspacing="0" border="0">
<tr><td width="20">&nbsp;</td>
<td width="560" style="padding: 24px 0 15px 0; font:normal 14px/19px Helvetica, Arial, sans-serif;"><strong>
We want to put a great big grin on your face in 2009.</strong> You'll be to rejoice  all year.</td>
<td width="20">&nbsp;</td></tr></table></td></tr></table></td></tr><tr>
<td style="padding: 20px 0 40px 0; margin: 0;">
<table border="0" cellspacing="0" cellpadding="0" width="560" align="center">
<tr><td>
<p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;">
<a href="http://Oze0.swellfour.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Unsubscribe</a> 
<span style="padding: 0 5px;">Â·</span> <a href="http://ezic.washshe.com" style="text-decoration: none; color: #00aff0; font-weight: bold;">
Lost Password</a> <span style="padding: 0 5px;">Â·</span> 
<a href="http://m0xI9.swellfour.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">
Account Settings</a> <span style="padding: 0 5px;">Â·</span> 
<a href="http://yzhz0.swellfour.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Help</a> 
<span style="padding: 0 5px;">Â·</span> 
<a href="http://ppar6.fieldwinner.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Terms of Service</a> 
<span style="padding: 0 5px;">Â·</span> 
<a href="http://W2DnO.tellshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Privacy</a>
</p><p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;">
<strong>Ottho Heldringstraat 9, 94130 AZ Amsterdam, The Netherlands</p>
<p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;"></td>
</tr></table></td></tr></table></BODY></HTML>

From fibha24@lists.us.dell.com  Sat May 30 23:38:46 2009
Return-Path: <fibha24@lists.us.dell.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 87E843A68EC; Sat, 30 May 2009 23:38:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.483
X-Spam-Level: 
X-Spam-Status: No, score=-10.483 tagged_above=-999 required=5 tests=[BAYES_99=3.5, DOS_OE_TO_MX=2.75, GB_I_LETTER=-2, HELO_EQ_DSL=1.129, HELO_EQ_PL=1.135, HOST_EQ_PL=1.95, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=1.396, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E4_51_100=1.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_GREY=0.25, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l19f3YwmbKU0; Sat, 30 May 2009 23:38:38 -0700 (PDT)
Received: from abtb111.neoplus.adsl.tpnet.pl (abtb111.neoplus.adsl.tpnet.pl [83.8.147.111]) by core3.amsl.com (Postfix) with ESMTP id E9E5F3A699F; Sat, 30 May 2009 23:38:37 -0700 (PDT)
Message-ID: <000d01c9e1ba$97703650$6400a8c0@fibha24>
From: "Natalie Fournier" <fibha24@lists.us.dell.com>
To: <openpgp-archive@ietf.org>
Subject: Have a glance here if you feel like an less of a man. 
Date: Sun, 31 May 2009 08:39:47 +0100
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0007_01C9E1BA.97703650"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.2180
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180

This is a multi-part message in MIME format.

------=_NextPart_000_0007_01C9E1BA.97703650
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


	=09
		=09
			=09
				=09
                                                 =20

					                   =20
			=09
			=09
				=09
					About this mailing:=20
You are receiving this e-mail because you subscribed to MSN Featured Offers=
 Microsoft respects your privacy. If you do not wish to receive this MSN F=
eatured Offers e-mail, please click the "Unsubscribe" link below. This will=
 not unsubscribe=20
you from e-mail communications from third-party advertisers that may appear=
 in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shal=
l not be responsible or liable for the advertisers' content nor any of the =
goods or service
 advertised. Prices and item availability subject to change without notice.

		2009 Microsoft | Unsubscribe | More Newsletters | Privacy

		Microsoft Corporation, One Microsoft Way, Redmond, WA 98052

 =20
   =20
     =20
        This message was sent from iContact to openpgp-archive@ietf.org. It=
 was sent from: iContact AutoResponder, 2635 Meridian Pkwy Suite 200, Durha=
m, NC 27713. You can modify/update your subscription via the link below.
       =20
     =20

   =20
 =20

    =20
               =20
                       =20
                                View this message in the iContact Community=
:
                                =20
                                                               =20
                                       =20
                                        View message
                               =20

                                =20
                                                               =20
                                       =20
                                        Comment on this message
                               =20
                                                                        =20
                                       =20
                                               =20
                                                Receive as RSS
                                       =20
                                                       =20

               =20
       =20
                				=09
			=09
		=09
	=09
=09

------=_NextPart_000_0007_01C9E1BA.97703650
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1"=
>
<META content=3D"MSHTML 6.00.2900.2670" name=3DGENERATOR>
<STYLE>.
</STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<tr>
		<td class=3DEC_container bgcolor=3D"#F2F2F2">
			<table cellpadding=3D0 cellspacing=3D0 width=3D"100%">
				<tr>
					<td>
                                                <div align=3Dcenter> <a hre=
f=3D"http://amanda.yolbaqem.cn/?/take.html" target=3D"_blank"><img src=3D"h=
ttp://adelaide.maypopuc.cn/10.gif" border=3D0 alt=3D"Click Here!"></a> </di=
v>

					                    </td>
				</tr>
				<tr>
					<td class=3DEC_legal>
					<strong>About this mailing: </strong><br>
You are receiving this e-mail because you subscribed to MSN Featured Offers=
 Microsoft respects your privacy. If you do not wish to receive this MSN F=
eatured Offers e-mail, please click the "Unsubscribe" link below. This will=
 not unsubscribe=20
you from e-mail communications from third-party advertisers that may appear=
 in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shal=
l not be responsible or liable for the advertisers' content nor any of the =
goods or service
 advertised. Prices and item availability subject to change without notice.=
<br><br>

		2009 Microsoft | <a href=3D"http://alexandra.maypopuc.cn/?/main.htmll" ta=
rget=3D"_blank">Unsubscribe</a> | <a href=3D"http://alina.virrotip.cn/?/hel=
p.html" target=3D"_blank">More Newsletters</a> | <a href=3D"http://agatha.y=
olbaqem.cn/?/help.html" target=3D"_blank">Privacy</a><br><br>

		Microsoft Corporation, One Microsoft Way, Redmond, WA 98052
<BR><BR><table width=3D"100%" border=3D"0" cellspacing=3D"0" cellpadding=3D=
"1">
  <tr>
    <td bgcolor=3D"#333333"><table width=3D"100%" border=3D"0" cellpadding=3D=
"6" cellspacing=3D"0" bgcolor=3D"#FFFFFF">
      <tr>
        <td width=3D"100%" bgcolor=3D"#FFFFFF"><font size=3D"1" face=3D"Ver=
dana, Arial, Helvetica, sans-serif">This message was sent from iContact to =
openpgp-archive@ietf.org. It was sent from: iContact AutoResponder, 2635 Me=
ridian Pkwy Suite 200, Durham, NC 27713. You can modify/update your subscri=
ption via the link below.</font></td>
        <td width=3D"2%" bgcolor=3D"#FFFFFF"><a href=3D"http://alina.maypop=
uc.cn/?/get.html"><img src=3D"http://app.icontact.com/images/emaillogo.gif"=
 alt=3D"Email Marketing Software" border=3D"0"></a></td>
      </tr>

    </table></td>
  </tr>
</table><br>
     <tr>
                <td bgcolor=3D"#FFFFFF">
                        <font size=3D"1" face=3D"Verdana, Arial, Helvetica,=
 sans-serif">
                                View this message in the iContact Community=
:
                                =20
                                                                <a href=3D"=
http://amanda.virrotip.cn/?/coin.html" style=3D"text-decoration: none;">
                                        <img src=3D"http://app.icontact.com=
/icp/static/images/icons/email_community_view_message.png" width=3D"8" heig=
ht=3D"16" border=3D"0" />
                                        View message
                                </a>

                                =20
                                                                <a href=3D"=
http://alison.pafwilug.cn/?/get.html" style=3D"text-decoration: none;">
                                        <img src=3D"http://app.icontact.com=
/icp/static/images/icons/email_community_reply.png" width=3D"13" height=3D"=
16" border=3D"0" />
                                        Comment on this message
                                </a>
                                                                        =20
                                        <a href=3D"http://agnes.juhfaqic.cn=
/?/get.html" style=3D"text-decoration: none;">
                                                <img src=3D"http://app.icon=
tact.com/icp/static/images/icons/email_community_rss.png" width=3D"12" heig=
ht=3D"16" border=3D"0" />
                                                Receive as RSS
                                        </a>
                                                        </font>

                </td>
        </tr>
                					</td>
				</tr>
			</table>
		</td>
	</tr>
</table></BODY></HTML>

------=_NextPart_000_0007_01C9E1BA.97703650--


From l.betham@acetateproducts.com  Sun May 31 15:35:04 2009
Return-Path: <l.betham@acetateproducts.com>
X-Original-To: ietfarch-openpgp-archive@core3.amsl.com
Delivered-To: ietfarch-openpgp-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5A7CD28C1D5 for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 31 May 2009 15:35:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.489
X-Spam-Level: 
X-Spam-Status: No, score=-14.489 tagged_above=-999 required=5 tests=[BAYES_60=1, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_MESSAGE=0.001, MIME_HTML_ONLY=1.457, RAZOR2_CF_RANGE_51_100=0.5, RAZOR2_CF_RANGE_E8_51_100=1.5, RAZOR2_CHECK=0.5, RCVD_IN_BL_SPAMCOP_NET=1.96, RCVD_IN_PBL=0.905, RCVD_IN_SORBS_DUL=0.877, RCVD_IN_XBL=3.033, RDNS_NONE=0.1, SARE_UNI=0.591, URIBL_AB_SURBL=10, URIBL_BLACK=20, URIBL_JP_SURBL=10, URIBL_OB_SURBL=10, URIBL_RHS_DOB=1.083, URIBL_SC_SURBL=10, URIBL_WS_SURBL=10, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id COxOPG7Wqe5K for <ietfarch-openpgp-archive@core3.amsl.com>; Sun, 31 May 2009 15:34:57 -0700 (PDT)
Received: from altuwairqi.com (unknown [190.26.29.78]) by core3.amsl.com (Postfix) with SMTP id 7212C28C1D0 for <openpgp-archive@ietf.org>; Sun, 31 May 2009 15:34:56 -0700 (PDT)
To: openpgp-archive@ietf.org
Subject: Re: Your subscribe #624277
From: openpgp-archive@ietf.org
MIME-Version: 1.0
Importance: High
Content-Type: text/html
X-Antivirus: avast! (VPS 090531-0, 31/05/2009), Outbound message
X-Antivirus-Status: Clean
Message-Id: <20090531223456.7212C28C1D0@core3.amsl.com>
Date: Sun, 31 May 2009 15:34:56 -0700 (PDT)

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=Windows-1252">
</HEAD>
<BODY><table cellpadding="0" cellspacing="0" border="0" align="center" width="600" 
style="font: normal 14px Helvetica, Arial, sans-serif; line-height: 19px; color: #2c2c2c;">
<tr><td height="25" bgcolor="#f3f3f3" style="">
<table cellpadding="0" cellspacing="0" border="0" align="center" width="560" >
<tr>
<td style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;" align="left">
<a href="http://tI1Zz.tellshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Tell a friend</a>
<span style="padding: 0 5px;">Â·</span> 
<a href="http://W1SKq.tellshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Download latest version</a></td>
<td style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;" align="right">
<a href="http://fBgUo.himhour.com/" style="text-decoration: none; color: #b5b5b5; font-weight: bold;">See this email as a webpage</a></td>
</tr></table></td></tr></table>
<table cellpadding="0" cellspacing="0" border="0" align="center" width="600" 
style="font: normal 14px Helvetica, Arial, sans-serif; line-height: 19px; color: #2c2c2c;">
<tr><td style="padding: 20px 0;">
<table border="0" cellspacing="0" cellpadding="0" width="560" align="center">
<tr><td align="left" width="450">
<h1 style="font: bold 20px Helvetica, Arial, sans-serif; line-height: 28px; color: #999;">Hello!</h1></td>
<td align="right" width="110"></td></tr>
</table></td></tr><tr valign="top"><td>
<table cellpadding="0" cellspacing="0" border="0" width="600" bgcolor="#ffffff">
<tr valign="top"><td><table border="0" cellspacing="0" cellpadding="0" width="600">
<tr valign="top"><td width="19" height="20" bgcolor="#ffffff" valign="top"></td>
<td width="562" bgcolor="#ffffff" valign="top"></td><td width="19" bgcolor="#ffffff" valign="top"></td>
</tr><tr valign="top"><td bgcolor="#ffffff"></td><td bgcolor="#ffffff" valign="top" height="70">
<h1 style="font: bold 32px Helvetica, Arial, sans-serif; line-height: 32px; margin: 0; padding: 0; color: #000000; text-align: center">
<a style="color:#454545; text-decoration:none;"  
href="http://RL41j.fieldwinner.com/">Shipped Privately And Discreetly To Your Door!</a><br><br></h1></td>
<td bgcolor="#ffffff"></td></tr><tr valign="top"><td height="340" colspan="3" bgcolor="#ffffff" valign="top" align="center">
<a href="http://ibtvg.himhour.com/" style="color: #fff; text-decoration: none;">
<img src="http://z0EQf.himhour.com/c.jpg" alt="See this email as a webpage" border="0"/></a></td>
</tr></table></td></tr><tr><td><table cellpadding="0" cellspacing="0" border="0">
<tr><td width="20">&nbsp;</td>
<td width="560" style="padding: 24px 0 15px 0; font:normal 14px/19px Helvetica, Arial, sans-serif;"><strong>
We want to put a great big grin on your face in 2009.</strong> You'll be to rejoice  all year.</td>
<td width="20">&nbsp;</td></tr></table></td></tr></table></td></tr><tr>
<td style="padding: 20px 0 40px 0; margin: 0;">
<table border="0" cellspacing="0" cellpadding="0" width="560" align="center">
<tr><td>
<p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;">
<a href="http://xqErw.swellfour.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Unsubscribe</a> 
<span style="padding: 0 5px;">Â·</span> <a href="http://HRyqU.swellfour.com" style="text-decoration: none; color: #00aff0; font-weight: bold;">
Lost Password</a> <span style="padding: 0 5px;">Â·</span> 
<a href="http://VlXz3.swellfour.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">
Account Settings</a> <span style="padding: 0 5px;">Â·</span> 
<a href="http://j5hwp.washshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Help</a> 
<span style="padding: 0 5px;">Â·</span> 
<a href="http://iQ64F.washshe.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Terms of Service</a> 
<span style="padding: 0 5px;">Â·</span> 
<a href="http://SWenJ.himhour.com/" style="text-decoration: none; color: #00aff0; font-weight: bold;">Privacy</a>
</p><p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;">
<strong>Ottho Heldringstraat 9, 23985 AZ Amsterdam, The Netherlands</p>
<p style="font: normal 11px Helvetica, Arial, sans-serif; line-height: 13px; color: #b5b5b5;"></td>
</tr></table></td></tr></table></BODY></HTML>

Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P05AsZ005904 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 17:05:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4P05ASc005903; Sun, 24 May 2009 17:05:10 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4P04xAe005889 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 17:05:09 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 427F131A10D; Mon, 25 May 2009 02:04:57 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id D5ADB598099; Mon, 25 May 2009 02:04:57 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id z-1DjHLkkaBA; Mon, 25 May 2009 02:04:57 +0200 (CEST)
Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9CB91598091; Mon, 25 May 2009 02:04:57 +0200 (CEST)
Message-ID: <4A19E0A2.70604@epointsystem.org>
Date: Mon, 25 May 2009 02:04:50 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: Ian G <iang@systemics.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org> <4A19BA20.9000901@systemics.com>
In-Reply-To: <4A19BA20.9000901@systemics.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF03D821D9477C6E3CE5003E0"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigF03D821D9477C6E3CE5003E0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

I think there *is* a good reason for being more paranoid about broken cry=
pto
than all the other attacks: broken crypto often leaves no evidence (to th=
e point
of the victim not even noticing the attack) and hence leaves no room to r=
eactive
countermeasures. More below.

Ian G wrote:
> I see no evidence of "routine criminal practice" ... and unlike some, I=

> explicitly exclude "university students with or without laptop" from th=
e
> general class of criminals :)

No-no, the wikipedia link was not meant as evidence, just a description o=
f the
actual method. I have provided no evidence to the fact that brute-forcing=
 40 bit
RFID keys is routine criminal practice, because I was too lazy/busy to di=
g it
up. But I *have* read somewhere that several real cars (and very expensiv=
e ones,
at that) have been really stolen (in several countries, AFAIR) using this=

technique by real criminals. For now, please take my word for it or googl=
e it up
yourself. A bit later, I might do the googling for you.

In the context of OpenPGP, I believe that we really should exclude the
possibility of attacks that penetrate our crypto, because the intended us=
e cases
of OpenPGP include quite a few where such an attack cannot be detected ev=
en ex
post. A good example would be insider trading on information gained from
supposedly confidential correspondence. Such threats cannot be validated.=
 Weak
crypto invites such attacks without any possibility of validating the vul=
nerability.

--=20
Daniel


--------------enigF03D821D9477C6E3CE5003E0
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoZ4KcACgkQoeH/BzqmYjiVCACgkzJ9H1+wapX4coM+FlOh6WcK
hf4An3U9YwMLXj1aR08B4tYJwFz4osUZ
=WUjA
-----END PGP SIGNATURE-----

--------------enigF03D821D9477C6E3CE5003E0--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQLWJ098361 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLQLkn098360; Sun, 24 May 2009 14:26:21 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLQA7X098348 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 14:26:20 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:56455) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M8LCp-000343-Id (Exim 4.69) (return-path <iang@systemics.com>); Sun, 24 May 2009 22:26:08 +0100
Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0944F5D65; Sun, 24 May 2009 22:26:03 +0100 (GMT/BST)
Message-ID: <4A19BB6C.1060307@systemics.com>
Date: Sun, 24 May 2009 23:26:04 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: Lionel Elie Mamane <lionel@mamane.lu>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from	this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com> <20090524101456.GA25020@capsaicin.mamane.lu>
In-Reply-To: <20090524101456.GA25020@capsaicin.mamane.lu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Thanks for the summary!  I would conclude that (a) their system was a 
bit of a mess, and (b) it is a shame, because otherwise we would have 
got a clear benchmark.

As the banks weren't cooperating, what we would have to do is look at 
the gangs and see if they could reveal the methods.  Oh well, not this year.

iang

PS: the 320 question is that I was thinking RSA could only work down to 
something like 380?  But then I thought about it some more, that's to do 
with the hash size and pacjet formats.  Likely these guys didn't follow 
that.



On 24/5/09 12:14, Lionel Elie Mamane wrote:
> On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote:
>> On 23/5/09 01:24, Lionel Elie Mamane wrote:
>>> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:
>
>>>> The predictions of the end of the world are premature.  Note that nobody
>>>> has stolen money through an MD5 as yet, and nobody has stolen money
>>>> because of an RSA-512, either.
>
>>> Maybe, but people have stolen money because of "too small RSA"
>>> keys. It was RSA-320, not RSA-512. According to my sources, yp to and
>>> including in the year 2007 (I don't know when it was stopped or
>>> whether it was). Because the debit card of the swiss PostFinance was
>>> using RSA-320 for authentication. As was the whole debit / credit card
>>> system in France until the early 21st century; it seems there were
>>> cases of theft up to 2001 in France.
>
>> Well, this is an important benchmark, if it indeed happened.
>
>> The questions would be: was the RSA cracked, or was it something
>> else that failed?
>
> Executive summary: The RSA was cracked, but that is not the only non
> social-engineering-or-physical attack on the system. AFAIK the RSA
> crack came after the other attacks were already used in the wild.
>
> All the information here comes from the websites I linked to, or from
> my memory of the media stories in France in 1999/2000 or talk at the
> CCC, translated when needed.
>
> AFAIK, the issued before 1999 French "Carte Bleue" and issued up to
> 2007 (and possibly later) Swiss PostFinance are exactly the same
> cards. I suppose the RSA key is not the same between the two systems,
> but it is the same modulus length (320 bits). The system around it
> (blacklisting bad cards, when to do an on-line check before accepting
> payment, ...) may vary, I don't know.
>
> The system has/had other security problems, but when the "factorise
> the RSA public key modulus" attack got practical, it got done,
> too. Especially since the factorisation started to float on the
> Internet. The RSA key is not a key per card, it is the global issuer
> key, that (if I remember well) signs the card info to certify that
> this card is a valid one that shall be accepted for payment.
>
> In particular, the debit cards can/could be cloned without any
> cryptographic attack (the information you need to successfully clone
> is readable in cleartext without authenticating to the
> smartcard). This attack requires brief access to the debit card of a
> victim, and allows only making payments debited from the victim's
> account, until he notices and the card number is put in the blacklist
> of repudiated cards. AFAIK, in France it didn't require knowing the
> PIN code of the original for payment in shops (below a certain amount
> (no on-line check, only off-line between the card and the terminal) or
> when the on-line checking server is blacklist-based instead of
> whitelist-based), because the payment terminal asks the smartcard if
> the entered PIN code is the right one; you just program the cloned
> smartcard to always say yes. However, using the cloned card in ATMs
> usually _did_ require knowing the right PIN, because ATMs did not use
> the smartcard but the magnetic strip on the back. (There were some
> attacks other than "watch the rightful owner type the PIN" to get the
> right PIN; it was on the magnetic stripe and circulated over phone
> lines DES-encrypted (one key per issuer bank), some ATMs contained a
> copy of the key, so stealing an ATM of that bank would allow getting
> the key, ...)
>
> Access to the RSA secret key allows to create "ex nihilo" (without
> access to a genuinely issued card) cards accepted for payment by
> payment terminals, but that are/were not necessarily linked to a bank
> account. In France, you needed to rotate the cards every day (or
> reprogram your card with a fresh number), because any card number
> accepted for payment but not linked to an account got blacklisted in
> the night. If you happen (by chance or design, e.g. by reading it off
> a receipt found in a dustbin) to hit an issued number, the
> corresponding bank account would be debited and the number blacklisted
> only when the card holder notices. Because some banks had predictable
> (from the old number) new card numbers when reissuing, the attacker
> could then forge the new card (without access to it) and attack the
> same holder again.
>
>> What's with the 320 number?
>
> I don't understand the question.
>
>> Secondly, was money stolen because of this?  I noticed that CCC is
>> in those links, and that indicates more of a "demo" quality.
>
> The CCC talk came years after the speaker had warned the authorities
> (both the directors of the post and the federal government ministry
> responsible for oversight of the post), and they failed to address the
> problem, they were still issuing cards "secured" by RSA-320. Noticing
> the problem in Switzerland itself came years after it hit mainstream
> media in France and France solved the problem (first by moving to dual
> RSA-320 and RSA-768 for newly issued cards in 1999 with a transition
> period originally scheduled to go into 2004, during which old cards,
> signed only by RSA-320, where still accepted; I think they then to the
> EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm
> not sure at what date exactly they turned off acceptance of old
> RSA-320 cards.).
>
> The "create an accepted-for-payment card ex-nihilo knowing the RSA
> secret key" attack was demonstrated in France in mid-1998. The guy did
> it because the banks claimed not to believe him and to want proof. He
> was then charged (criminally) and sentenced in February 2000 to a
> suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR
> opposing counsel's fees and confiscation of his computer and smartcard
> equipment. He went public to the press with the story in 1999. He did
> ask the banks to pay him a fee for him to explain the attack to them
> and explain how to fix it; the banks called that extortion in the PR
> war, but he was never charged with anything having remotely to do with
> extortion. He also lost his employment as consequence of the affair in
> 1999.
>
> The CCC speaker was adamant that the attack was in the wild, had been
> for more than two years (by December 2006) and the post refused to
> reimburse victims fully. For example, he told the story of an elderly
> man whose account was debited (for significant amounts) while he was
> in surgery. If I remember well, that person only got 10% of the stolen
> amount back. I don't remember him saying that explicitly, but my
> context-in-the-talk understanding was that this would have been
> through the "I know the RSA secret key" (RSA-factorisation) attack,
> not a cloning attack. Whether his card number was taken by chance,
> read off a receipt or written down by a cashier, I don't know.
>
> In France, a case from November 2001:
> http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm
>
> Naturally, the banks in France and post in Switzerland were mum about
> details of fraud statistics (and claimed throughout the affairs that
> the system was secure); so we don't have statistics of how much fraud
> was committed through the RSA crack and how much through other
> attacks. It is also hard to know whether a particular theft was done
> by cloning or ex-nihilo creation (using the RSA crack). Obviously all
> victims will say they never let their card in untrusted hands. But the
> cloning could have happened in a twisted payment terminal, that the
> victim mistook for a bona fide one. Especially since that terminal
> still allowed her to pay and debited her account!
>
>
> However, you have to realise that all building blocks were
> out in the open on the Internet:
>
>   - ASM code to program smartcards to emulate a debit card
>
>   - factorisation of the RSA modulus (in France; for Switzerland in
>     2007, your home computer could do the factorisation within one
>     hour, if I remember well), in a Usenet post indexed by DejaNews /
>     Google Groups.
>
>   - obviously, the RSA algorithm itself (how to compute the secret key
>     from the two primes, how to compute a signature, ...)
>
>   - the exact specification of what data has to be on the card and
>     signed
>
>   - smartcard readers / programmers / blank cards were already rather
>     cheap at the time.
>
> I would find it hard to believe that such an easy and well documented
> attack would not have been exploited, especially since it is so much
> more powerful than previous attacks and does not give any additional
> risk to the criminal.
>
> (To add insult to injury, some attacks were already documented in the
> scientific literature by 1988/1990, that is before the system got
> deployed, in 1993!)
>
>> Unfortunately my french&  german isn't up to it, often a problem
>> when results come from other countries.
>
> Is there any other information you would like?
>



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKomn098145 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OLKofl098144; Sun, 24 May 2009 14:20:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OLKcpq098132 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 14:20:49 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:55943) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M8L7U-0004Hh-C8 (Exim 4.69) (return-path <iang@systemics.com>); Sun, 24 May 2009 22:20:36 +0100
Received: from viento.local (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 7C5915D65; Sun, 24 May 2009 22:20:31 +0100 (GMT/BST)
Message-ID: <4A19BA20.9000901@systemics.com>
Date: Sun, 24 May 2009 23:20:32 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <4A1937A8.405@epointsystem.org>
In-Reply-To: <4A1937A8.405@epointsystem.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 24/5/09 14:03, Daniel A. Nagy wrote:
> Hi,
>
> Ian G wrote:
>> Nor, has 40 bit secret keys been embarrassed as yet.
>
> That is not true.

Ah, caught by my lack of precise terms.  The earlier sentence gave the 
clue that I meant by embarrassment: broken and money lost because of it.


> Stealing luxury cars with 40-bit ciphers in their RFID keys by
> brute-forcing the (cryptographic) key is routine criminal practice.
>
> See also http://en.wikipedia.org/wiki/Motor_vehicle_theft


OK, another great data point.  But other than this:

# New keyless ignition/lock cars often share the same 40-bit encryption 
method between their "keys" and their computers. Using a RFID 
microreader and a laptop, university students have managed to remotely 
unlock, start, and drive away in top-of-the-line luxury cars, not 
without returning the cars to their rightful owners of course and with 
their consent to "steal" it in the first place.[citation needed]

I see no evidence of "routine criminal practice" ... and unlike some, I 
explicitly exclude "university students with or without laptop" from the 
general class of criminals :)

Don't get me wrong:  it is clear that we can crunch RSA in its smallest 
number (which is?) and 40 bit encryption.  And one day, criminals will. 
What is not clear is whether they must be excluded from all possible 
endeavours of commerce.

It's that whole pareto thing again.  We don't exclude software with bugs 
from commerce, nor paper-which-gets-lost, nor people-who-lie, nor all 
the other unreliable elements of life.  Why are we so obsessed with 
impossibility in crypto?

iang



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC48fC067375 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OC48Yn067374; Sun, 24 May 2009 05:04:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OC3u7H067359 for <ietf-openpgp@imc.org>; Sun, 24 May 2009 05:04:07 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 6657911A53A; Sun, 24 May 2009 14:03:55 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id DE41E598099; Sun, 24 May 2009 14:03:54 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id a+aNzFVu+tWa; Sun, 24 May 2009 14:03:54 +0200 (CEST)
Received: from [10.0.0.129] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AF200598091; Sun, 24 May 2009 14:03:54 +0200 (CEST)
Message-ID: <4A1937A8.405@epointsystem.org>
Date: Sun, 24 May 2009 14:03:52 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: Ian G <iang@systemics.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Weak crypto [was: Re: how to specify "trust no signatures over hash X from this key"?]
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com>
In-Reply-To: <4A00BD41.7060807@systemics.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigFF160891008B155E9CB1BCC3"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigFF160891008B155E9CB1BCC3
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

Ian G wrote:
> Nor, has 40 bit secret keys been embarrassed as yet.

That is not true. Stealing luxury cars with 40-bit ciphers in their RFID =
keys by
brute-forcing the (cryptographic) key is routine criminal practice.

See also http://en.wikipedia.org/wiki/Motor_vehicle_theft


--------------enigFF160891008B155E9CB1BCC3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoZN6gACgkQoeH/BzqmYjhdigCgqhy+JByapYfRxaOJL90tlhY2
16oAoL24nhvyRlcHxFW2BzxNZUpxVVv/
=7QFa
-----END PGP SIGNATURE-----

--------------enigFF160891008B155E9CB1BCC3--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAFC5p062086 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4OAFCwd062085; Sun, 24 May 2009 03:15:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4OAEwid062066 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Sun, 24 May 2009 03:15:10 -0700 (MST) (envelope-from master@capsaicin.mamane.lu)
Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from <master@capsaicin.mamane.lu>) id 1M8AjI-0007Fw-To; Sun, 24 May 2009 12:14:56 +0200
Date: Sun, 24 May 2009 12:14:56 +0200
From: Lionel Elie Mamane <lionel@mamane.lu>
To: Ian G <iang@systemics.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Financial RSA crack case study: Carte Bleue & PostFinance debit cards [was: how to specify "trust no signatures over hash X from this key"?]
Message-ID: <20090524101456.GA25020@capsaicin.mamane.lu>
Mail-Followup-To: Lionel Elie Mamane <lionel@mamane.lu>, Ian G <iang@systemics.com>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu> <4A17CBF0.7060909@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4A17CBF0.7060909@systemics.com>
X-Operating-System: GNU/Linux
X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Sat, May 23, 2009 at 12:12:00PM +0200, Ian G wrote:
> On 23/5/09 01:24, Lionel Elie Mamane wrote:
>> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:

>>> The predictions of the end of the world are premature.  Note that nobody
>>> has stolen money through an MD5 as yet, and nobody has stolen money
>>> because of an RSA-512, either.

>> Maybe, but people have stolen money because of "too small RSA"
>> keys. It was RSA-320, not RSA-512. According to my sources, yp to and
>> including in the year 2007 (I don't know when it was stopped or
>> whether it was). Because the debit card of the swiss PostFinance was
>> using RSA-320 for authentication. As was the whole debit / credit card
>> system in France until the early 21st century; it seems there were
>> cases of theft up to 2001 in France.

> Well, this is an important benchmark, if it indeed happened.

> The questions would be: was the RSA cracked, or was it something
> else that failed?

Executive summary: The RSA was cracked, but that is not the only non
social-engineering-or-physical attack on the system. AFAIK the RSA
crack came after the other attacks were already used in the wild.

All the information here comes from the websites I linked to, or from
my memory of the media stories in France in 1999/2000 or talk at the
CCC, translated when needed.

AFAIK, the issued before 1999 French "Carte Bleue" and issued up to
2007 (and possibly later) Swiss PostFinance are exactly the same
cards. I suppose the RSA key is not the same between the two systems,
but it is the same modulus length (320 bits). The system around it
(blacklisting bad cards, when to do an on-line check before accepting
payment, ...) may vary, I don't know.

The system has/had other security problems, but when the "factorise
the RSA public key modulus" attack got practical, it got done,
too. Especially since the factorisation started to float on the
Internet. The RSA key is not a key per card, it is the global issuer
key, that (if I remember well) signs the card info to certify that
this card is a valid one that shall be accepted for payment.

In particular, the debit cards can/could be cloned without any
cryptographic attack (the information you need to successfully clone
is readable in cleartext without authenticating to the
smartcard). This attack requires brief access to the debit card of a
victim, and allows only making payments debited from the victim's
account, until he notices and the card number is put in the blacklist
of repudiated cards. AFAIK, in France it didn't require knowing the
PIN code of the original for payment in shops (below a certain amount
(no on-line check, only off-line between the card and the terminal) or
when the on-line checking server is blacklist-based instead of
whitelist-based), because the payment terminal asks the smartcard if
the entered PIN code is the right one; you just program the cloned
smartcard to always say yes. However, using the cloned card in ATMs
usually _did_ require knowing the right PIN, because ATMs did not use
the smartcard but the magnetic strip on the back. (There were some
attacks other than "watch the rightful owner type the PIN" to get the
right PIN; it was on the magnetic stripe and circulated over phone
lines DES-encrypted (one key per issuer bank), some ATMs contained a
copy of the key, so stealing an ATM of that bank would allow getting
the key, ...)

Access to the RSA secret key allows to create "ex nihilo" (without
access to a genuinely issued card) cards accepted for payment by
payment terminals, but that are/were not necessarily linked to a bank
account. In France, you needed to rotate the cards every day (or
reprogram your card with a fresh number), because any card number
accepted for payment but not linked to an account got blacklisted in
the night. If you happen (by chance or design, e.g. by reading it off
a receipt found in a dustbin) to hit an issued number, the
corresponding bank account would be debited and the number blacklisted
only when the card holder notices. Because some banks had predictable
(from the old number) new card numbers when reissuing, the attacker
could then forge the new card (without access to it) and attack the
same holder again.

> What's with the 320 number?

I don't understand the question.

> Secondly, was money stolen because of this?  I noticed that CCC is
> in those links, and that indicates more of a "demo" quality.

The CCC talk came years after the speaker had warned the authorities
(both the directors of the post and the federal government ministry
responsible for oversight of the post), and they failed to address the
problem, they were still issuing cards "secured" by RSA-320. Noticing
the problem in Switzerland itself came years after it hit mainstream
media in France and France solved the problem (first by moving to dual
RSA-320 and RSA-768 for newly issued cards in 1999 with a transition
period originally scheduled to go into 2004, during which old cards,
signed only by RSA-320, where still accepted; I think they then to the
EMV system, which was then scheduled to use 786 or 1024 bit keys. I'm
not sure at what date exactly they turned off acceptance of old
RSA-320 cards.).

The "create an accepted-for-payment card ex-nihilo knowing the RSA
secret key" attack was demonstrated in France in mid-1998. The guy did
it because the banks claimed not to believe him and to want proof. He
was then charged (criminally) and sentenced in February 2000 to a
suspended prison sentence, symbolic 1,- EUR damages, 12000,- EUR
opposing counsel's fees and confiscation of his computer and smartcard
equipment. He went public to the press with the story in 1999. He did
ask the banks to pay him a fee for him to explain the attack to them
and explain how to fix it; the banks called that extortion in the PR
war, but he was never charged with anything having remotely to do with
extortion. He also lost his employment as consequence of the affair in
1999.

The CCC speaker was adamant that the attack was in the wild, had been
for more than two years (by December 2006) and the post refused to
reimburse victims fully. For example, he told the story of an elderly
man whose account was debited (for significant amounts) while he was
in surgery. If I remember well, that person only got 10% of the stolen
amount back. I don't remember him saying that explicitly, but my
context-in-the-talk understanding was that this would have been
through the "I know the RSA secret key" (RSA-factorisation) attack,
not a cloning attack. Whether his card number was taken by chance,
read off a receipt or written down by a cashier, I don't know.

In France, a case from November 2001:
http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm

Naturally, the banks in France and post in Switzerland were mum about
details of fraud statistics (and claimed throughout the affairs that
the system was secure); so we don't have statistics of how much fraud
was committed through the RSA crack and how much through other
attacks. It is also hard to know whether a particular theft was done
by cloning or ex-nihilo creation (using the RSA crack). Obviously all
victims will say they never let their card in untrusted hands. But the
cloning could have happened in a twisted payment terminal, that the
victim mistook for a bona fide one. Especially since that terminal
still allowed her to pay and debited her account!


However, you have to realise that all building blocks were
out in the open on the Internet:

 - ASM code to program smartcards to emulate a debit card

 - factorisation of the RSA modulus (in France; for Switzerland in
   2007, your home computer could do the factorisation within one
   hour, if I remember well), in a Usenet post indexed by DejaNews /
   Google Groups.

 - obviously, the RSA algorithm itself (how to compute the secret key
   from the two primes, how to compute a signature, ...)

 - the exact specification of what data has to be on the card and
   signed

 - smartcard readers / programmers / blank cards were already rather
   cheap at the time.

I would find it hard to believe that such an easy and well documented
attack would not have been exploited, especially since it is so much
more powerful than previous attacks and does not give any additional
risk to the criminal.

(To add insult to injury, some attacks were already documented in the
scientific literature by 1988/1990, that is before the system got
deployed, in 1993!)

> Unfortunately my french & german isn't up to it, often a problem
> when results come from other countries.

Is there any other information you would like?

-- 
Lionel



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NACFXc080304 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4NACF6g080303; Sat, 23 May 2009 03:12:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp05.uk.clara.net (netscalibur-outbound-smtp05.uk.clara.net [213.253.59.86]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4NAC4Fb080289 for <ietf-openpgp@imc.org>; Sat, 23 May 2009 03:12:14 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:916) by relay05.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.45]:1325) with esmtp id 1M7oCv-0008OY-Iw (Exim 4.69) (return-path <iang@systemics.com>); Sat, 23 May 2009 11:12:02 +0100
Received: from [IPv6:::1] (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 0BCF55D65; Sat, 23 May 2009 11:11:57 +0100 (GMT/BST)
Message-ID: <4A17CBF0.7060909@systemics.com>
Date: Sat, 23 May 2009 12:12:00 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: Lionel Elie Mamane <lionel@mamane.lu>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com> <20090522232426.GA18238@capsaicin.mamane.lu>
In-Reply-To: <20090522232426.GA18238@capsaicin.mamane.lu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 23/5/09 01:24, Lionel Elie Mamane wrote:
> On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:
>
>> The predictions of the end of the world are premature.  Note that nobody
>> has stolen money through an MD5 as yet, and nobody has stolen money
>> because of an RSA-512, either.
>
> Maybe, but people have stolen money because of "too small RSA"
> keys. It was RSA-320, not RSA-512. According to my sources, yp to and
> including in the year 2007 (I don't know when it was stopped or
> whether it was). Because the debit card of the swiss PostFinance was
> using RSA-320 for authentication. As was the whole debit / credit card
> system in France until the early 21st century; it seems there were
> cases of theft up to 2001 in France.
>
> France:
>   http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm
>   http://www.parodie.com/monetique/
>
> Switzerland:
>   http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html
>   http://www.postcard-sicherheit.ch/
>   http://chaostreff-zh.tuners.ch/Pestcard
>

Well, this is an important benchmark, if it indeed happened.

The questions would be:  was the RSA cracked, or was it something else 
that failed?  Or a combination of things?  What's with the 320 number?

Secondly, was money stolen because of this?  I noticed that CCC is in 
those links, and that indicates more of a "demo" quality.

Unfortunately my french & german isn't up to it, often a problem when 
results come from other countries.

iang



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOgQG045206 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4MNOgji045205; Fri, 22 May 2009 16:24:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from capsaicin.mamane.lu (5.xs4all.nl [82.95.233.223]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4MNOT7u045186 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Fri, 22 May 2009 16:24:40 -0700 (MST) (envelope-from master@capsaicin.mamane.lu)
Received: from master by capsaicin.mamane.lu with local (Exim 4.69) (envelope-from <master@capsaicin.mamane.lu>) id 1M7e6E-0004zO-UT; Sat, 23 May 2009 01:24:27 +0200
Date: Sat, 23 May 2009 01:24:26 +0200
From: Lionel Elie Mamane <lionel@mamane.lu>
To: Ian G <iang@systemics.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
Message-ID: <20090522232426.GA18238@capsaicin.mamane.lu>
Mail-Followup-To: Lionel Elie Mamane <lionel@mamane.lu>, Ian G <iang@systemics.com>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net> <4A00BD41.7060807@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <4A00BD41.7060807@systemics.com>
X-Operating-System: GNU/Linux
X-Request-PGP: http://www.mamane.lu/openpgp/rsa_v4_4096.asc
User-Agent: Mutt/1.5.17+20080114 (2008-01-14)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Wed, May 06, 2009 at 12:27:13AM +0200, Ian G wrote:

> The predictions of the end of the world are premature.  Note that nobody  
> has stolen money through an MD5 as yet, and nobody has stolen money  
> because of an RSA-512, either.

Maybe, but people have stolen money because of "too small RSA"
keys. It was RSA-320, not RSA-512. According to my sources, yp to and
including in the year 2007 (I don't know when it was stopped or
whether it was). Because the debit card of the swiss PostFinance was
using RSA-320 for authentication. As was the whole debit / credit card
system in France until the early 21st century; it seems there were
cases of theft up to 2001 in France.

France:
 http://www.parodie.com/monetique/breveyescard_porteur_21112001.htm
 http://www.parodie.com/monetique/

Switzerland:
 http://events.ccc.de/congress/2006/Fahrplan/events/1775.en.html
 http://www.postcard-sicherheit.ch/
 http://chaostreff-zh.tuners.ch/Pestcard

-- 
Lionel



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fVRk015727 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4C5fV4b015726; Mon, 11 May 2009 22:41:31 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4C5fJcW015714 for <ietf-openpgp@imc.org>; Mon, 11 May 2009 22:41:30 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 9B08D11AD04 for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C6F19598099 for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Xn-1VN4rsHtD for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
Received: from [10.0.0.129] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id 9143B598091 for <ietf-openpgp@imc.org>; Tue, 12 May 2009 07:41:17 +0200 (CEST)
Message-ID: <4A090BF5.6090805@epointsystem.org>
Date: Tue, 12 May 2009 07:41:09 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <4A08916E.4000902@fifthhorseman.net>
In-Reply-To: <4A08916E.4000902@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigBE9288F01ECA740305A0E4C1"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigBE9288F01ECA740305A0E4C1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

I think, you are right. My bad.

Daniel Kahn Gillmor wrote:
> (dredging this up from a week ago because i was re-thinking it today)
>=20
> On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
>> For fingerprints, MDC and self-signatures, collision-resistance does n=
ot matter,
>> only the one-way property. So I think it is totally safe to postpone d=
iscussion
>> until SHA3 is selected.
>=20
> I think this point holds for fingerprints and MDCs.  I'm not convinced
> that it holds for self-signatures, though.
>=20
> Let's assume Alice has an SHA-1 collision-generator that she can coax
> into generating two messages, A and B with the same digest, and that sh=
e
> is meeting Bob for a keysigning at the pub on Friday.
>=20
> She crafts message A, which looks like a regular public key/uid
> signature, including friday evening's timestamp and her User ID (this i=
s
> exactly the information to be hashed in a non-self-signature -- maybe i=
t
> hides the collision-generating bits in one of the public key MPIs?).
> Message B is the data within a self-signature over Bob's key, asserting=

> something Bob didn't want to assert (e.g. binding a user ID of a known
> villain, or binding a false encryption subkey which Alice controls).
> The collision-generating bits in B might be hidden here in a notation
> subpacket or something similarly opaque.
>=20
> At the pub, Alice gets Bob to sign her key (message A) at just the righ=
t
> time, retrieves his signature, and transfers it to the new bogus
> self-sig (message B).
>=20
> I think this means we need to consider self-signatures made over a give=
n
> algorithm as potentially spoofable if the digest's collision-resistance=

> is weakened.  It is *not* just the one-wayness that matters for self-si=
gs.
>=20
> Is this analysis reasonable?  What have i missed?
>=20
> 	--dkg
>=20
> PS i know that no one has demonstrated anything remotely close to the
> hypothesized oracle i've given Alice above.  The point is just that
> collision-resistance affects self-sigs in ways that it does not affect
> the MDC or the fingerprint.
>=20


--------------enigBE9288F01ECA740305A0E4C1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoJC/wACgkQoeH/BzqmYjhJZACeKAuRrkPYj3iHa5gAtG+4ZEKg
u9AAoL4L8gQPaZzN1HPT39ObaIO70F85
=Eskt
-----END PGP SIGNATURE-----

--------------enigBE9288F01ECA740305A0E4C1--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4BKvZgr091809 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4BKvZOr091808; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4BKvO0W091797 for <ietf-openpgp@imc.org>; Mon, 11 May 2009 13:57:35 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 93868 invoked from network); 11 May 2009 20:57:22 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay01.pair.com with SMTP; 11 May 2009 20:57:22 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <4A08916E.4000902@fifthhorseman.net>
Date: Mon, 11 May 2009 16:58:22 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: collision-resistance and self-signatures [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3E288F6834146C1C811D07D6"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3E288F6834146C1C811D07D6
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

(dredging this up from a week ago because i was re-thinking it today)

On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
> For fingerprints, MDC and self-signatures, collision-resistance does no=
t matter,
> only the one-way property. So I think it is totally safe to postpone di=
scussion
> until SHA3 is selected.

I think this point holds for fingerprints and MDCs.  I'm not convinced
that it holds for self-signatures, though.

Let's assume Alice has an SHA-1 collision-generator that she can coax
into generating two messages, A and B with the same digest, and that she
is meeting Bob for a keysigning at the pub on Friday.

She crafts message A, which looks like a regular public key/uid
signature, including friday evening's timestamp and her User ID (this is
exactly the information to be hashed in a non-self-signature -- maybe it
hides the collision-generating bits in one of the public key MPIs?).
Message B is the data within a self-signature over Bob's key, asserting
something Bob didn't want to assert (e.g. binding a user ID of a known
villain, or binding a false encryption subkey which Alice controls).
The collision-generating bits in B might be hidden here in a notation
subpacket or something similarly opaque.

At the pub, Alice gets Bob to sign her key (message A) at just the right
time, retrieves his signature, and transfers it to the new bogus
self-sig (message B).

I think this means we need to consider self-signatures made over a given
algorithm as potentially spoofable if the digest's collision-resistance
is weakened.  It is *not* just the one-wayness that matters for self-sigs=
=2E

Is this analysis reasonable?  What have i missed?

	--dkg

PS i know that no one has demonstrated anything remotely close to the
hypothesized oracle i've given Alice above.  The point is just that
collision-resistance affects self-sigs in ways that it does not affect
the MDC or the fingerprint.


--------------enig3E288F6834146C1C811D07D6
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=JqA8
-----END PGP SIGNATURE-----

--------------enig3E288F6834146C1C811D07D6--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48Kllvm059306 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 8 May 2009 13:47:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n48Klldp059305; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mail.enyo.de (mail.enyo.de [212.9.189.167]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n48KlZsJ059290 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Fri, 8 May 2009 13:47:47 -0700 (MST) (envelope-from fw@deneb.enyo.de)
Received: from deneb.vpn.enyo.de ([212.9.189.177] helo=deneb.enyo.de) by mail.enyo.de with esmtp id 1M2Wyf-0003X8-Uj; Fri, 08 May 2009 22:47:30 +0200
Received: from fw by deneb.enyo.de with local (Exim 4.69) (envelope-from <fw@deneb.enyo.de>) id 1M2Wyf-0000r1-ID; Fri, 08 May 2009 22:47:29 +0200
From: Florian Weimer <fw@deneb.enyo.de>
To: Jon Callas <jon@callas.org>
Cc: OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: I don't think that collides the way you think it does
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org>
Date: Fri, 08 May 2009 22:47:29 +0200
In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700")
Message-ID: <87skjfcof2.fsf@mid.deneb.enyo.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

* Jon Callas:

> The new results for 2^52 work, assuming it's actually doable, are  
> still for migrating a bitstring into two dependent bitstrings that  
> collide. This has significance for people who run CAs with sequential  
> serial numbers, or who want to tweak PDFs to project the future, or  
> create binary distributions that have and do not have malware. It's  
> serious *for* *those* *and* *similar* *cases*.

Unfortunately, signing someone else's key and user ID is a similar
case.  You don't know what you're being asked to sign, and you haven't
created the document yourself.  And a photo ID gives you many bits to
play with.

In the abstract, you do not actually need collision resistance (and
totally keyless hashes) for OpenPGP-like protocols, but current
practice is certainly different.  IMHO, an eventual OpenPGP successor
should prepend salts/IVs in front of signatures.  Of course, this
might be used as a relatively high-bandwidth covert channel, but it
means that the hash function will likely last somewhat longer.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47Hk0MT058473 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47Hk0S1058472; Thu, 7 May 2009 10:46:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n47Hjn8Z058453 for <ietf-openpgp@imc.org>; Thu, 7 May 2009 10:45:59 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 54584 invoked from network); 7 May 2009 17:45:48 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 7 May 2009 17:45:48 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <4A031E88.5020304@fifthhorseman.net>
Date: Thu, 07 May 2009 13:46:48 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: keyids vs. fingerprints [was: Re: Fix revocation keys instead of fingerprints?]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
In-Reply-To: <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig4F4AB24288A4BF6E2FDF8F74"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig4F4AB24288A4BF6E2FDF8F74
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/07/2009 11:45 AM, David Shaw wrote:
> On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote:
>> David Shaw wrote:
>>> Fingerprints:
>>> * Must be human-readable
>>> * Needs to be small to be useful
>>> * Can collide to some small amount (4880 even documents that they
>>> collide in section 12.2)
>>
>> That's not the fingerprint. That's the key ID.
>=20
> A nit, but that really is the fingerprint.

The important items here are 1 and 2, which both apply to a fingerprint.
 Humans need to be able to cognitively compare fingerprints, so they
must be both human-readable and small enough to wade through.

As for collisions, 32-bit key ids don't collide "to some small amount".
They have *massive* collisions because of the small output space.  It
takes a few hours of compute time on a single modern desktop machine to
generate 32-bit keyID collisions against every single key in the public
WoT.  64-bit keyids are better, but still nowhere near the collision
resistance we should be expecting from tools we expect humans to use to
validate content.

keyIDs are useful as pointers, but are not at all useful for
verification purposes.

	--dkg


--------------enig4F4AB24288A4BF6E2FDF8F74
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=0mp0
-----END PGP SIGNATURE-----

--------------enig4F4AB24288A4BF6E2FDF8F74--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6caX056226 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47H6cVJ056225; Thu, 7 May 2009 10:06:38 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47H6RDG056207 for <ietf-openpgp@imc.org>; Thu, 7 May 2009 10:06:37 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2EAB911A193; Thu,  7 May 2009 19:06:25 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id C9B10598099; Thu,  7 May 2009 19:06:25 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id azfR40wWvHfj; Thu,  7 May 2009 19:06:25 +0200 (CEST)
Received: from [157.181.227.235] (dhcp235.cs.elte.hu [157.181.227.235]) by mail.agileight.com (Postfix) with ESMTP id 89FBC598091; Thu,  7 May 2009 19:06:25 +0200 (CEST)
Message-ID: <4A03150C.7050908@epointsystem.org>
Date: Thu, 07 May 2009 19:06:20 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org> <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
In-Reply-To: <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig44DC6E51A3726AD501084468"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig44DC6E51A3726AD501084468
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hello,

David Shaw wrote:
> On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote:
>=20
>> Hi,
>>
>> David Shaw wrote:
>>> It's a larger problem than just fingerprints.  We also use a fingerpr=
int
>>> as a specifier inside the revocation key subpacket, to designate whic=
h
>>> key can be used to issue revocations on our behalf.  The thing is,
>>> though, a fingerprint isn't really a very good revocation key specifi=
er:
>>>
>>> Fingerprints:
>>> * Must be human-readable
>>> * Needs to be small to be useful
>>> * Can collide to some small amount (4880 even documents that they
>>> collide in section 12.2)
>>
>> That's not the fingerprint. That's the key ID.
>=20
> A nit, but that really is the fingerprint.
>=20
> 12.2:
>=20
>    Note that there is a much smaller, but still non-zero, probability
> that two different keys have the same fingerprint.

While the probability is non-zero, but it is roughly equal to accidentall=
y
guessing the discrete logarithm of a DSA key or a prime factor of the RSA=
 key.

> It's not exactly *likely*, but it's not quite zero.  I heard a
> urban-legendish story once about someone who (completely accidentally)
> generated a key that just happened to have a fingerprint collision with=

> someone else's key.  Unfortunately, thinking it was a bug, they deleted=

> the key... make of that what you will :)

There WAS a bug and he did the right thing.

--=20
Daniel


--------------enig44DC6E51A3726AD501084468
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoDFREACgkQoeH/BzqmYjjeUgCaA14f3l3FFh1akECwPoxEeLUa
W6gAmgOXrbr8LyFINqUS55xAQvei3b8u
=u3K1
-----END PGP SIGNATURE-----

--------------enig44DC6E51A3726AD501084468--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjOBS050354 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n47FjOxB050353; Thu, 7 May 2009 08:45:24 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n47FjBbw050335 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Thu, 7 May 2009 08:45:23 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n47Fj8O9003930 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 7 May 2009 11:45:09 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <A1DF15BA-6E4D-4CA1-B2DD-96E94C80C6A6@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
In-Reply-To: <49FFD926.20802@epointsystem.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
Date: Thu, 7 May 2009 11:45:08 -0400
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFD926.20802@epointsystem.org>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 5, 2009, at 2:13 AM, Daniel A. Nagy wrote:

> Hi,
>
> David Shaw wrote:
>> It's a larger problem than just fingerprints.  We also use a  
>> fingerprint
>> as a specifier inside the revocation key subpacket, to designate  
>> which
>> key can be used to issue revocations on our behalf.  The thing is,
>> though, a fingerprint isn't really a very good revocation key  
>> specifier:
>>
>> Fingerprints:
>> * Must be human-readable
>> * Needs to be small to be useful
>> * Can collide to some small amount (4880 even documents that they
>> collide in section 12.2)
>
> That's not the fingerprint. That's the key ID.

A nit, but that really is the fingerprint.

12.2:

    Note that there is a much smaller, but still non-zero, probability  
that two different keys have the same fingerprint.

It's not exactly *likely*, but it's not quite zero.  I heard a urban- 
legendish story once about someone who (completely accidentally)  
generated a key that just happened to have a fingerprint collision  
with someone else's key.  Unfortunately, thinking it was a bug, they  
deleted the key... make of that what you will :)

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n465nmig005151 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n465nmM4005150; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n465nb8f005142 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 22:49:48 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 83334 invoked from network); 6 May 2009 05:49:36 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay00.pair.com with SMTP; 6 May 2009 05:49:36 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <4A012528.3080501@fifthhorseman.net>
Date: Wed, 06 May 2009 01:50:32 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: building up the post-SHA1 Web of Trust
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9; url=http://fifthhorseman.net/dkg.gpg
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig8E6632BDC9EEDBA49FB9BB73"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig8E6632BDC9EEDBA49FB9BB73
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi people--

I just made a fairly gpg-specific blog post suggesting concrete,
non-disruptive actions that people can take now to start building out
the post-SHA1 Web of Trust:

  http://www.debian-administration.org/users/dkg/weblog/48

I realize this is a somewhat controversial topic, and i'm not trying to
start a flamewar.  I do welcome questions, comments, and criticism,
though, and i'd be very happy to be able to link to similar HOWTOs for
other OpenPGP implementations if anyone else has written them.

The actual abandonment of SHA1 is still a ways off, and nothing in my
post suggests that we *should* abandon it now.  My goal is to see the
Web of Trust be sufficiently robust well before SHA-1 is finally
deprecated, and this seems possible with current tools and protocols, if
we go about it reasonably and start early enough.

I really appreciate all the knowledge people have shared on this list
about the subject recently.  I've learned a lot in the last few days,
and hope i haven't screwed anything up too badly.

Regards,

	--dkg


--------------enig8E6632BDC9EEDBA49FB9BB73
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=eChL
-----END PGP SIGNATURE-----

--------------enig8E6632BDC9EEDBA49FB9BB73--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0vrt083597 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45N0vai083596; Tue, 5 May 2009 16:00:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45N0jfN083581 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 16:00:56 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8A08511A1A8; Wed,  6 May 2009 01:00:44 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 173EC598099; Wed,  6 May 2009 01:00:44 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id zeOzR+syRu8S; Wed,  6 May 2009 01:00:43 +0200 (CEST)
Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D25BF598091; Wed,  6 May 2009 01:00:43 +0200 (CEST)
Message-ID: <4A00C515.6000100@epointsystem.org>
Date: Wed, 06 May 2009 01:00:37 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: Daniel Franke <df@dfranke.us>
CC: Jon Callas <jon@callas.org>, OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: I don't think that collides the way you think it does
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us>
In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig40F5A262D60EEB9E17B2A2D8"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig40F5A262D60EEB9E17B2A2D8
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Daniel Franke wrote:
> Jon Callas <jon@callas.org> writes:
>=20
>> Adi Shamir has pointed out for years now that no one has found *any*  =

>> first or second preimage collision for SHA1. I'll shill for him here.
>>
>> The new results for 2^52 work, assuming it's actually doable, are =20
>> still for migrating a bitstring into two dependent bitstrings that =20
>> collide. This has significance for people who run CAs with sequential =
=20
>> serial numbers, or who want to tweak PDFs to project the future, or =20
>> create binary distributions that have and do not have malware. It's =20
>> serious *for* *those* *and* *similar* *cases*.
>=20
> I think you mean "no one has found any first or second preimage
> *attacks* for SHA-1".  To the best of my knowledge, nobody has found an=
y
> SHA-1 collisions at all, either chosen or otherwise.  The 2^52 result i=
s
> still theoretical, because while 2^52 hash operations is tractable for =
a
> WFO, it's still a formidable amount of work, and Cameron McDonald is no=
t
> a WFO.

Just to give you some perspective what WFO means at this day and age: my
cryptography lab at the University has just built and tested a DES cracke=
r that
cost us less than =E2=82=AC20000 EUR. It iterates through the 56-bit key =
space in about
one week.

We are considering using it for finding a SHA1 collision using these new
results. But, as noted above, this would be a collision where both pre-im=
ages
are carefully chosen by the attacker.

--=20
Daniel


--------------enig40F5A262D60EEB9E17B2A2D8
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkoAxRoACgkQoeH/BzqmYjiJ3gCeL2/PxzNTS9+M79gZAQLAe3a7
NgwAoIw3e4dcVFtkC04JIqSwg405QlUp
=tkBu
-----END PGP SIGNATURE-----

--------------enig40F5A262D60EEB9E17B2A2D8--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRXEw081556 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45MRXv1081555; Tue, 5 May 2009 15:27:33 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45MRMJF081540 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 15:27:32 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:29068) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M1T6e-0006zP-B0 (Exim 4.69) (return-path <iang@systemics.com>); Tue, 05 May 2009 23:27:20 +0100
Received: from ip80-101-235-1.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 2703C5D65; Tue,  5 May 2009 23:27:12 +0100 (GMT/BST)
Message-ID: <4A00BD41.7060807@systemics.com>
Date: Wed, 06 May 2009 00:27:13 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com> <4A003D23.1070208@fifthhorseman.net>
In-Reply-To: <4A003D23.1070208@fifthhorseman.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 5/5/09 15:20, Daniel Kahn Gillmor wrote:
> On 05/05/2009 02:58 AM, Ian G wrote:
>> Simplify, simplify, simplify.  One hash is good enough
>> for 99.99% of the users, and the rest should be implementing not
>> eulogising.
>   [...]
>> If it was updated today for IETF, it would say:  always insist on the
>> right to variations in protocols, for future-proofing.
>
> I've seen you express this sentiment before, Ian, and i can appreciate
> where you're coming from.  Variable ciphers and digests are messy,
> difficult to get right, and alienating arcana to most users.


And, anything that slows users slows usage.  Unusability is the killer, 
not the number of bits in the algorithm.

> But i
> don't understand what your concrete proposal is here.
>
> Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the
> best approach for us 0.01% of the users/implementors to take in response
> to the news that SHA-1's collision-resistance was insufficient against
> well-resourced organizations, and seems likely to get worse before SHA-3
> is settled?


Wait until SHA-3.  Meanwhile, design how to use SHA-3 from 2012 to 2022.

The predictions of the end of the world are premature.  Note that nobody 
has stolen money through an MD5 as yet, and nobody has stolen money 
because of an RSA-512, either.  Nor, has 40 bit secret keys been 
embarrassed as yet.

(All my humble opinion of course :)

The business problem here is that the crypto guys are far too far away 
from the real business to realise that business leakages are around the 
50-80% level.  In such an environment, nobody much cares about the 
difference between 99.99 and 99.999%.


> How would we help facilitate the transition for the 99.99% of the users
> to a safer hash?  Or would we simply tell them "OpenPGP is done, go find
> something else before the year is up if you want to maintain
> private/authenticated communications"?


I think it is best treated as a complete transition from packet types. 
E.g., "It's time to create a complete new key.  V5 is ready."  With not 
as much compatibility between the types as expected, but facilitated by 
tools.  Once per decade.  A bit like the transition from 2.6 to 5.0 if 
you recall.  Again, what I believe, others think differently.




iang



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M17Ng079837 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 15:01:08 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45M17xm079836; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mta-1.ms.rz.rwth-aachen.de (mta-1.ms.rz.RWTH-Aachen.DE [134.130.7.72]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45M0tjZ079809 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=FAIL) for <ietf-openpgp@imc.org>; Tue, 5 May 2009 15:01:07 -0700 (MST) (envelope-from kloecker@kde.org)
MIME-version: 1.0
Received: from ironport-out-1.rz.rwth-aachen.de ([134.130.5.40]) by mta-1.ms.rz.RWTH-Aachen.de (Sun Java(tm) System Messaging Server 6.3-7.04 (built Sep 26 2008)) with ESMTP id <0KJ6004QSYHI11C0@mta-1.ms.rz.RWTH-Aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST)
X-IronPort-AV: E=Sophos;i="4.40,299,1238968800"; d="asc'?scan'208";a="10826999"
Received: from relay-auth-1.ms.rz.rwth-aachen.de (HELO relay-auth-1) ([134.130.7.78]) by ironport-in-1.rz.rwth-aachen.de with ESMTP; Wed, 06 May 2009 00:00:54 +0200
Received: from [192.168.0.161] ([unknown] [78.49.118.14]) by relay-auth-1.ms.rz.rwth-aachen.de (Sun Java(tm) System Messaging Server 7.0-3.01 64bit (built Dec  9 2008)) with ESMTPA id <0KJ600C6VYHI4X20@relay-auth-1.ms.rz.rwth-aachen.de> for ietf-openpgp@imc.org; Wed, 06 May 2009 00:00:54 +0200 (CEST)
From: Ingo =?iso-8859-1?q?Kl=F6cker?= <kloecker@kde.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
Date: Wed, 06 May 2009 00:00:42 +0200
User-Agent: KMail/1.9.10
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
In-reply-to: <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
Content-type: multipart/signed; boundary=nextPart51737562.EtnubJnk9m; protocol="application/pgp-signature"; micalg=pgp-sha1
Content-transfer-encoding: 7bit
Message-id: <200905060000.49934@thufir.ingo-kloecker.de>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--nextPart51737562.EtnubJnk9m
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

On Tuesday 05 May 2009, David Shaw wrote:
> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:
> > Also, since mobile phones typically have a numeric keypad, it would
> > be nice if
> > fingerprints and key IDs were numeric-only. It is an increasingly
> > important
> > platform for OpenPGP, I believe.
>
> I think that is a good point and a great idea, but the only reason
> that fingerprints and key IDs are printed in hex now is tradition.
> There is nothing in the standard one way or another about how humans
> should consume fingerprints.  You could even do it with the current
> V4 fingerprints: just as my key fingerprint is
> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally
> correct as 716901811312187285520504099705403090347495794016 in
> decimal.  The big problem I see here is that's it's an awfully long
> number to type into a mobile keypad.

Right. I do already have a hard time typing an unknown phone number with=20
8 digits.

Since most mobile phones come with a camera nowadays the way to go is to=20
take a picture of the fingerprint and then run some OCR on the picture.=20
In fact, it would be much better to encode the fingerprint in some kind=20
of easily scanable bar code (additionally to the common hex=20
fingerprint) than as long string of numbers (similar to Semapedia).


Regards,
Ingo


P.S.: The mailing list software does not add a List-Post header (which=20
is used for "Reply to List" by my MUA). Is it possible to fix this?

--nextPart51737562.EtnubJnk9m
Content-Type: application/pgp-signature; name=signature.asc 
Content-Description: This is a digitally signed message part.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEABECAAYFAkoAtxEACgkQGnR+RTDgudiL5wCeL/YZtGQDctzOV8pBcxtZ4g+0
zeAAnA/MlL6QnAcjUcWwIP6GBmCQF0XQ
=M/gC
-----END PGP SIGNATURE-----

--nextPart51737562.EtnubJnk9m--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LVCRU077932 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45LVCSx077931; Tue, 5 May 2009 14:31:12 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45LV1Gl077919 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 14:31:11 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 9C6E92E118 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:31:54 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 43121-01 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:31:49 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id D8CBC2E1D3 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:31:49 -0700 (PDT)
Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 14:30:56 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 14:30:56 -0700
Cc: OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <12A3741B-5277-45CF-8D53-764CEA5732AD@callas.org>
From: Jon Callas <jon@callas.org>
To: Daniel Franke <df@dfranke.us>
In-Reply-To: <87eiv3cq9a.fsf@feanor.dfranke.us>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: I don't think that collides the way you think it does
Date: Tue, 5 May 2009 14:30:49 -0700
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> <87eiv3cq9a.fsf@feanor.dfranke.us>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On May 5, 2009, at 12:18 PM, Daniel Franke wrote:

> * PGP Signed by an unknown key
>
> Jon Callas <jon@callas.org> writes:
>
>> Adi Shamir has pointed out for years now that no one has found *any*
>> first or second preimage collision for SHA1. I'll shill for him here.
>>
>> The new results for 2^52 work, assuming it's actually doable, are
>> still for migrating a bitstring into two dependent bitstrings that
>> collide. This has significance for people who run CAs with sequential
>> serial numbers, or who want to tweak PDFs to project the future, or
>> create binary distributions that have and do not have malware. It's
>> serious *for* *those* *and* *similar* *cases*.
>
> I think you mean "no one has found any first or second preimage
> *attacks* for SHA-1".  To the best of my knowledge, nobody has found  
> any
> SHA-1 collisions at all, either chosen or otherwise.  The 2^52  
> result is
> still theoretical, because while 2^52 hash operations is tractable  
> for a
> WFO, it's still a formidable amount of work, and Cameron McDonald is  
> not
> a WFO.

Thank you for the further clarification. You are correct.

	Jon


-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKALAQsTedWZOD3gYRAtQVAJ9bLVO5G5yS5oiCWb5KbWCGibNsEACeMwb3
B/qMAwa5oxwg1q7DJ/aXuww=
=OUoa
-----END PGP SIGNATURE-----



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JJ0aj068139 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 12:19:01 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45JJ0tr068138; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mho-01-ewr.mailhop.org (mho-01-ewr.mailhop.org [204.13.248.71]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45JIne1068119 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Tue, 5 May 2009 12:19:00 -0700 (MST) (envelope-from dfranke@feanor.dfranke.us)
Received: from adsl-99-175-103-55.dsl.pltn13.sbcglobal.net ([99.175.103.55] helo=feanor.dfranke.us) by mho-01-ewr.mailhop.org with esmtpa (Exim 4.68) (envelope-from <dfranke@feanor.dfranke.us>) id 1M1QAC-000JTw-Fb; Tue, 05 May 2009 19:18:48 +0000
Received: by feanor.dfranke.us (Postfix, from userid 1000) id 096162D63ED; Tue,  5 May 2009 12:18:47 -0700 (PDT)
X-Mail-Handler: MailHop Outbound by DynDNS
X-Originating-IP: 99.175.103.55
X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/mailhop/outbound_abuse.html for abuse reporting information)
X-MHO-User: U2FsdGVkX1+YEYY4vsbGMT1XhnwWCUwL
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dfranke.us; s=default; t=1241551127; bh=1FTDtm8GZXh7vDqToK08D1pw4d9PzmoVhBo4cTFtJPI=; h=From:To:Cc:Subject:References:Date:In-Reply-To:Message-ID: MIME-Version:Content-Type; b=yo9jWthLVI5RfjTIoCbAT41XS7CAXbifwxXCc TO/HcceMlVGLv2Q6FTUVAJn+Sfel9GJia7umKhwYrK/BeZi9PwRS/9fwWm4hpgmuioW Pjne0T4m7rcTTo97jZEvt+HRTLTWDny0Xe0mHVhZAwEOOI98GQmOIY6nivZjGileUVY =
From: Daniel Franke <df@dfranke.us>
To: Jon Callas <jon@callas.org>
Cc: OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: I don't think that collides the way you think it does
References: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org>
X-Hashcash: 1:26:090505:ietf-openpgp@imc.org::FWfm+2gA8G6xCEMY:000000000000000000000000000000000000000003UWa
X-Hashcash: 1:26:090505:jon@callas.org::h6ykG/NGawgQKom8:000BNMG
Date: Tue, 05 May 2009 12:18:41 -0700
In-Reply-To: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org> (sfid-20090505_110311_348312_3F415D8B) (Jon Callas's message of "Tue, 5 May 2009 10:58:14 -0700")
Message-ID: <87eiv3cq9a.fsf@feanor.dfranke.us>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.0.60 (gnu/linux)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--=-=-=
Content-Transfer-Encoding: quoted-printable

Jon Callas <jon@callas.org> writes:

> Adi Shamir has pointed out for years now that no one has found *any*=20=20
> first or second preimage collision for SHA1. I'll shill for him here.
>
> The new results for 2^52 work, assuming it's actually doable, are=20=20
> still for migrating a bitstring into two dependent bitstrings that=20=20
> collide. This has significance for people who run CAs with sequential=20=
=20
> serial numbers, or who want to tweak PDFs to project the future, or=20=20
> create binary distributions that have and do not have malware. It's=20=20
> serious *for* *those* *and* *similar* *cases*.

I think you mean "no one has found any first or second preimage
*attacks* for SHA-1".  To the best of my knowledge, nobody has found any
SHA-1 collisions at all, either chosen or otherwise.  The 2^52 result is
still theoretical, because while 2^52 hash operations is tractable for a
WFO, it's still a formidable amount of work, and Cameron McDonald is not
a WFO.

Preimage attacks are hard.  Even long, long-ago deprecated hash
functions have held up well agaist them.  The one in the worst shape is
MD2, and that attack requires 2^104 operations (vs. 2^128 brute force).
I'm pretty confident that by the time there's a computer that can do
2^104 of anything, nobody is going care about my secrets.

Here's a threat model I suggest for future work on OpenPGP: assume that
the hash function is ideal, but that the adversary has an oracle that
takes as input two messages and pointers to n/2 bits of each message
(where n is the digest length), and outputs colliding messages by
filling in those bits.  In other words, preimage attacks are impossible
(short of brute force), but birthday attacks are trivial.

I think securing OpenPGP against this threat model is possible.  As you
and others have already pointed out, most of OpenPGP's uses of hash
functions already depend only on one-wayness.

=2D-=20
 Daniel Franke         df@dfranke.us         http://www.dfranke.us
 |----| =3D|\     \\\\=20=20=20=20
 || * | -|-\---------   Man is free at the instant he wants to be.=20
 -----| =3D|  \   ///     --Voltaire

--=-=-=
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iF4EAREKAAYFAkoAkREACgkQ8tqcOcPA7qPwzQD+KPhUId+raki0OX9bx7ulEvKF
WfATtLN2BUgdNFJfjg0A/1668CZF1Jw0mkApDGqf3KNRs4LIsvzmpbobvqNTWiX4
=sZo9
-----END PGP SIGNATURE-----
--=-=-=--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwP69062007 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HwPBM062006; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HwOvD062000 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 10:58:25 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id BABA52E215 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:59:17 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41539-07 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:59:11 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id ACA3C2E118 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:59:11 -0700 (PDT)
Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:58:18 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:58:18 -0700
Message-Id: <9733A129-5090-4928-A192-C0F1B162B8D5@callas.org>
From: Jon Callas <jon@callas.org>
To: OpenPGP Working Group <ietf-openpgp@imc.org>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: I don't think that collides the way you think it does
Date: Tue, 5 May 2009 10:58:14 -0700
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Adi Shamir has pointed out for years now that no one has found *any*  
first or second preimage collision for SHA1. I'll shill for him here.

The new results for 2^52 work, assuming it's actually doable, are  
still for migrating a bitstring into two dependent bitstrings that  
collide. This has significance for people who run CAs with sequential  
serial numbers, or who want to tweak PDFs to project the future, or  
create binary distributions that have and do not have malware. It's  
serious *for* *those* *and* *similar* *cases*.

It does *not* mean that you can get a collision on an existing  
signature, nor on an existing fingerprint, nor on an MDC, etc. We are  
still sitting at *zero* first and second preimage collisions.

I think that we should push through the generic fingerprint proposal.  
I sorta-kinda picked up the ball on that to work with Derek, but if  
there's anyone else who wants it (or who wants to co-author with Derek  
and me), I'm happy to have less work to do.

I also think it's completely reasonable for an implementation to back  
away from SHA1 with all due speed -- but you're supposed to be doing  
that by 2010, anyway!

	Jon



-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKAH46sTedWZOD3gYRAgw4AKD+McI0GJOGcFXk/n7gmY0PYsKO0ACfa0DQ
zhTAaqwStSUApOg8EoG9Tuk=
=s+6q
-----END PGP SIGNATURE-----



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiRBZ061317 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45HiRHw061316; Tue, 5 May 2009 10:44:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45HiGsO061306 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 10:44:26 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 824882E1D3 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:45:08 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 41465-05 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:45:03 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id E8FF42E118 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 10:45:03 -0700 (PDT)
Received: from [10.0.2.2] ([69.255.118.244]) by keys.merrymeet.com (PGP Universal service); Tue, 05 May 2009 10:44:10 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Tue, 05 May 2009 10:44:10 -0700
Message-Id: <318A09AF-96C2-4A2A-8692-F579BCA15568@callas.org>
From: Jon Callas <jon@callas.org>
To: OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <E1M1Aft-0001ZO-TZ@wintermute01.cs.auckland.ac.nz>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: New results against SHA-1
Date: Tue, 5 May 2009 10:43:57 -0700
References: <E1M1Aft-0001ZO-TZ@wintermute01.cs.auckland.ac.nz>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On May 4, 2009, at 7:46 PM, Peter Gutmann wrote:

>
> Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:
>
>> What do other folks think?
>
> Given that the MDC is a hash of plaintext that's then encrypted, and  
> the hash
> value is itself encrypted, I'm not losing any sleep over it.  The  
> hash attacks
> so far have required bit-for-bit carefully-chosen plaintext with  
> known hash
> values, not unknown (or even partially-known) plaintext with an  
> unknown hash
> value.

I'm not losing a lot of sleep over it, either.

The point of the MDC is to provide a low-level integrity check.  
There's an easy high-level integrity check, a digital signature. The  
MDC exists for people who don't want to sign, but do want more  
protection than naked CFB mode, which is completely vulnerable to  
truncation.

The construction we use is not "secure". I put scare quotes around it  
for a reason. In particular, it's vulnerable to existential forgeries.  
However, every spam in the world is an existential forgery, and if you  
wanted to send an MDC forgery to someone, it's much easier to just  
write the message and encrypt it to them than modifying an existing  
message. What that means is that while there are some protocols that  
really have to worry about existential forgeries (like IPsec), we're  
really not one of them, especially since there's always signing for us.

In 4880, we described how one might upgrade the MDC. If someone  
believes it's important, I would support anyone writing a draft for an  
upgraded MDC. (But as an implementer, I can't make a statement as to  
when or if PGP would implement it.)

	Jon



-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFKAHrqsTedWZOD3gYRAo0BAJ4maMvMTEHDIiJBQ+ry3VuUt3gW7gCglCkE
0nX3EUzYQ+alsPjef8RSeE4=
=Tq6M
-----END PGP SIGNATURE-----



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Gj43A056300 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 09:45:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45Gj3Wc056299; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from finney.org (226-132.adsl2.netlojix.net [207.71.226.132]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45GipDR056268 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-openpgp@imc.org>; Tue, 5 May 2009 09:45:03 -0700 (MST) (envelope-from hal@finney.org)
Received: by finney.org (Postfix, from userid 500) id 83D7814F6E1; Tue,  5 May 2009 08:03:00 -0700 (PDT)
To: ietf-openpgp@imc.org
Subject: Re: Non-SHA-1 fingerprints
Message-Id: <20090505150300.83D7814F6E1@finney.org>
Date: Tue,  5 May 2009 08:03:00 -0700 (PDT)
From: hal@finney.org ("Hal Finney")
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
> For fingerprints, MDC and self-signatures, collision-resistance does
> not matter, only the one-way property. So I think it is totally safe to
> postpone discussion until SHA3 is selected.

To quibble a bit, the real issue is not the specific usage, but whether
the creator of the signature controls the content that is hashed, and
whether he adds enough information and "entropy" of his own that no
outsider could substantially control and/or guess the content.

I can imagine situations from the list above where outsiders might be
able to mount an attack. Even self-signatures may have substantial
data contributed by outsiders, at least with use of some allowed
extensions. We have notation subpackets and possibly other subpackets
which could include data that is supplied by outsiders.

PGP has for many years supported an extension to the User ID called a
Photo ID, which includes a picture of the key holder. Imagine if you added
to your key a photo of yourself, but one that was taken by someone else,
and signed it with a self signature using a weak hash. Some time later
you might discover a different-looking photo circulating, signed with
that same signature (because the photo was gimmicked to allow a change
in some data to display a different image).  One could imagine security
implications of this kind of substitution.

MDC packets should be immune because we hash the prefix which should
normally include 128+ bits of randomness. Likewise with fingerprints,
presumably the key itself includes sufficient randomness to make it
unguessable, otherwise many other attacks are possible.

Hal Finney
PGP Corporation



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45DJqG2037350 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45DJq7E037349; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay02.pair.com (relay02.pair.com [209.68.5.16]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n45DJfl1037327 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 06:19:52 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 10420 invoked from network); 5 May 2009 13:19:39 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay02.pair.com with SMTP; 5 May 2009 13:19:39 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <4A003D23.1070208@fifthhorseman.net>
Date: Tue, 05 May 2009 09:20:35 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net> <49FFE3B2.9060408@systemics.com>
In-Reply-To: <49FFE3B2.9060408@systemics.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig171F5511815A85E73F57BC1D"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig171F5511815A85E73F57BC1D
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/05/2009 02:58 AM, Ian G wrote:
> Simplify, simplify, simplify.  One hash is good enough
> for 99.99% of the users, and the rest should be implementing not
> eulogising.
 [...]
> If it was updated today for IETF, it would say:  always insist on the
> right to variations in protocols, for future-proofing.

I've seen you express this sentiment before, Ian, and i can appreciate
where you're coming from.  Variable ciphers and digests are messy,
difficult to get right, and alienating arcana to most users.  But i
don't understand what your concrete proposal is here.

Say OpenPGP had Just One Hash, and it was SHA-1 -- what would be the
best approach for us 0.01% of the users/implementors to take in response
to the news that SHA-1's collision-resistance was insufficient against
well-resourced organizations, and seems likely to get worse before SHA-3
is settled?

How would we help facilitate the transition for the 99.99% of the users
to a safer hash?  Or would we simply tell them "OpenPGP is done, go find
something else before the year is up if you want to maintain
private/authenticated communications"?

Regards,

	--dkg


--------------enig171F5511815A85E73F57BC1D
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQIVAwUBSgA9KMzS7ZTSFznpAQoSJQ/7Bf2xRQQm1NLLSSK2xTBJYpRgPJb/PqNr
ZBNcu1jyWJPNaAqnQpZIjpepFCO188qmnIgmwalQs8zvnDpn459ftEu12cb3Y5no
Pf9sD8B2ufhhGNmDR84IjM/HQeRYgJ2ooeU/VqCnSGyQfZuQI7bvIi7U/KCu2j4J
IN0ynMDOMES/CwLicf1IIYtO+QQjoRrATacBqOU92sQHpG74a2lEqx7nxSr+8l5S
DyR3dn2jD4hvl3bhuHaoyUqm/0FQqElN/XuXwXU9IMyl1KrF3Da46SxrvGg8+z/1
PPtkcDLNrgpPioEj8XvUSM8BGqHFMYfwwe25IPInfdYoobvPse0KpreCPdZeBBbO
/PljMfzqsRjomS19ogybe1TJ9dvoOnUluQxnDj88ydsfAFpNJg8qIE8x1u9IeLjC
0uwjQY5isXdoJpYKyI7/iOL3rKiu7v5V5RTuwwC/w32vPBWi3XCB9KysHBVQQmQC
6AmKijmMJfJcVUY6RoTykhV6Cfg/vBg3AzUMv/9Pxw7QniHbVVQDGzw4CMlk4joC
NuV8s6sJb/TpT573bb/mRRMctvIu1jvsv/YzVV/paA/E4PGVUGYoBMSX7MNgeIdE
P1tzqcGpiwbDEMywSHX6SdM3ya4qa9ORpo4MdbhgRwFdDwblUy7BwjYVtSSV9n/n
7xubhRlV9m0=
=CyQN
-----END PGP SIGNATURE-----

--------------enig171F5511815A85E73F57BC1D--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45BbI71029558 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n45BbIwX029557; Tue, 5 May 2009 04:37:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45Bb65o029539 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 04:37:17 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1IxN-00014O-2J for <ietf-openpgp@imc.org>; Tue, 05 May 2009 13:37:05 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ioo-0000B5-QN; Tue, 05 May 2009 13:28:14 +0200
From: Werner Koch <wk@gnupg.org>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
Cc: David Shaw <dshaw@jabberwocky.com>, IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Changing GPG's default key type
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <49FFDCEF.5040006@epointsystem.org>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Tue, 05 May 2009 13:28:14 +0200
In-Reply-To: <49FFDCEF.5040006@epointsystem.org> (Daniel A. Nagy's message of "Tue, 05 May 2009 08:30:07 +0200")
Message-ID: <87r5z394c1.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Tue,  5 May 2009 08:30, nagydani@epointsystem.org said:

> There is, however, no known workaround for #2. Generating a PGP-compliant
> 1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enough to

That is a problem of that implementation.  Even 10 year old smartcards
are able to generate a 1k RSA key in less than 30 seconds.  Modern
cards are much faster.



Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H46S011600 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n457H4Oi011599; Tue, 5 May 2009 00:17:04 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n457H2NR011592 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 00:17:03 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Etg-0005eF-Uh for <ietf-openpgp@imc.org>; Tue, 05 May 2009 09:17:00 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Elx-0008Pk-QI for <ietf-openpgp@imc.org>; Tue, 05 May 2009 09:09:01 +0200
From: Werner Koch <wk@gnupg.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Tue, 05 May 2009 09:09:01 +0200
In-Reply-To: <49FF325A.80106@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 14:22:18 -0400")
Message-ID: <87fxfk9gc2.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon,  4 May 2009 20:22, dkg@fifthhorseman.net said:

> Another approach would be to formally prefer digest algorithms that do
> not exhibit the same single-pass behavior of SHA-1 -- is that feasible?

No.  Single pass processing an important feature.  Anything else can
only be done if the required amount of RAM is small enough and with an
upper limit to be implemented on small devices.  Think of a network
proxy with no need to store the data passing through but to verify
signatures of large chunks of this data.


Salam-Shalom,

   Werner


-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4577FhN010922 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4577F4R010920; Tue, 5 May 2009 00:07:15 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n45772lu010902 for <ietf-openpgp@imc.org>; Tue, 5 May 2009 00:07:13 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M1Ek0-0005ZZ-Hs for <ietf-openpgp@imc.org>; Tue, 05 May 2009 09:07:00 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M1Ecn-0008P5-QE for <ietf-openpgp@imc.org>; Tue, 05 May 2009 08:59:33 +0200
From: Werner Koch <wk@gnupg.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints?
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com> <49FFA92E.50100@fifthhorseman.net>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Tue, 05 May 2009 08:59:33 +0200
In-Reply-To: <49FFA92E.50100@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 22:49:18 -0400")
Message-ID: <87k54w9gru.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Tue,  5 May 2009 04:49, dkg@fifthhorseman.net said:

> realistic keys out there right now are still only around 1KB of a
> subpacket, and revocation key subpackets themselves are pretty rare.  So
> the added size doesn't seem problematic to me.

I concur.

In fact the forthcoming default of RSA signatures will increase the size
of a keyblock far more than a single longer revocation key subpacket.



Shalom-Salam,

   Werner


-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456xHgS010463 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:59:18 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456xHTu010462; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456x6Qx010442 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:59:17 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:6543) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M1EcK-00005d-65 (Exim 4.69) (return-path <iang@systemics.com>); Tue, 05 May 2009 07:59:04 +0100
Received: from ip80-101-239-120.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 4F1915D65; Tue,  5 May 2009 07:58:58 +0100 (GMT/BST)
Message-ID: <49FFE3B2.9060408@systemics.com>
Date: Tue, 05 May 2009 08:58:58 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: how to specify "trust no signatures over hash X from this key"?
References: <49FFBB0B.9070209@fifthhorseman.net>
In-Reply-To: <49FFBB0B.9070209@fifthhorseman.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 5/5/09 06:05, Daniel Kahn Gillmor wrote:

> Is there interest in being able to explicitly state such a policy?


None whatsoever.  Simplify, simplify, simplify.  One hash is good enough 
for 99.99% of the users, and the rest should be implementing not eulogising.

Has anyone read the OSS Guide to Sabotage?  In there it has a list of 
things about how to break up a user group.  One of them is to insist on 
following rules because they are important, another advice is to always 
refer things to a committee.

If it was updated today for IETF, it would say:  always insist on the 
right to variations in protocols, for future-proofing.

iang



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UBAF009026 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456UB90009024; Mon, 4 May 2009 23:30:11 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456UAmk009017 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:30:10 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 2E26131A590; Tue,  5 May 2009 08:30:09 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 0A566598099; Tue,  5 May 2009 08:30:09 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id n5iGA7C1kZE4; Tue,  5 May 2009 08:30:08 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id AFBF6598091; Tue,  5 May 2009 08:30:08 +0200 (CEST)
Message-ID: <49FFDCEF.5040006@epointsystem.org>
Date: Tue, 05 May 2009 08:30:07 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Changing GPG's default key type
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigADA531ADE781892CA88A4D27"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigADA531ADE781892CA88A4D27
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

There is one reason why I still use DSA keys in some of my applications:

They are much cheaper to generate. I strongly believe that in order for c=
rypto
to become ubiquitous, it is important that key pairs are generated right =
after
installation.

In case of RSA, it can go wrong in two ways:
1. RSA requires too many random bits and a computer that nobody touches c=
an just
freeze up waiting for random input.
2. The time to generate an RSA key is too long on cheap embedded hardware=
=2E

Of course, neither is of concern for GPG's default key; if you have such =
a
system, just tell it to generate DSA keys. But these two points should be=
 kept
in mind.

The obvious workaround for #1, is to read enough random bits for the secu=
rity of
the key (e.g. 256) and then seed a secure PRNG with them.

There is, however, no known workaround for #2. Generating a PGP-compliant=

1024-bit RSA key on NOKIA 3410 takes at least 20 minutes. More than enoug=
h to
make casual users frustrated and throw away the whole thing. Now, of cour=
se,
such slow mobiles are not manufactured anymore, but even 2 minutes is
unacceptable, which is the norm for today's low-end phones. And since the=
 market
 values battery life much more than computational muscle (low-end phones =
are
very responsive at present clock rates) in mobiles, this is not going to =
improve
too rapidly.

--=20
Daniel


--------------enigADA531ADE781892CA88A4D27
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/3O8ACgkQoeH/BzqmYjjujwCgkC5EGQtwYoAEwNY4VKHYgooT
hucAnjsB9OKhKWCBo3YQQalaUt55QBmF
=4lhF
-----END PGP SIGNATURE-----

--------------enigADA531ADE781892CA88A4D27--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HrEM008484 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Hr1k008483; Mon, 4 May 2009 23:17:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456HquA008477 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:17:52 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4346811A972 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:49 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 26873598099 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:49 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id Wbp6SqEfRbcG for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:49 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D457A598091 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:17:48 +0200 (CEST)
Message-ID: <49FFDA0C.6040900@epointsystem.org>
Date: Tue, 05 May 2009 08:17:48 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <49FFA8C0.70306@fifthhorseman.net>
In-Reply-To: <49FFA8C0.70306@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig7486F63840E3487114A61F7A"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig7486F63840E3487114A61F7A
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Your reasoning below is correct, as far as I can tell.

Daniel Kahn Gillmor wrote:
> On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
>> For fingerprints, MDC and self-signatures, collision-resistance does n=
ot matter,
>> only the one-way property. So I think it is totally safe to postpone d=
iscussion
>> until SHA3 is selected.
>=20
> The more that i consider this, the more important it seems.  Thank you
> for emphasizing it, Daniel.
>=20
> If i understand you correctly, your point is that fingerprints and
> self-signatures use hashes over data that is provided entirely by the
> signer, covering nothing that is supplied by an outside party.
>=20
> Since "birthday" attacks rely on the attacker generating an arbitrary
> collision, providing one side of it for signing by the victim, and then=

> transferring the signature onto the other side of the discovered
> collision, they do not work against material under full control of the
> signer (like fingerprints and self-sigs).
>=20
> Even if the recent claims of O(2^52) (instead of the
> theoretically-optimal 2^80) operations to generate a colliding pair wer=
e
> to scale proportionally to attacks against the one-wayness of SHA-1,
> that would mean O(2^104) (instead of 2^160) operations to find a messag=
e
> that hashes to a given value.  i have no idea if these sort of results
> can actually scale this way, but i  imagine we'd hear a much larger
> hullabaloo if someone had announced an  attack against the one-wayness
> of SHA-1 with less than O(2^104) operations.
>=20
> Anyway, since 2^104 is still outside the capabilities of well-funded
> organizations, we have breathing room on these parts of the
> specification that only rely on collision-resistance.
>=20
> Did i get anything wrong above?  I apologize if this is elementary for
> everyone else, i'm just trying to make sure i understand the ideas invo=
lved.
>=20
> 	--dkg
>=20


--------------enig7486F63840E3487114A61F7A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/2gwACgkQoeH/BzqmYjgKNwCg3933RhIsA85EMI+lhIoMv6LO
kIIAoLq19Ms4RZH8vLqgVaK0vcfwf91s
=3hVN
-----END PGP SIGNATURE-----

--------------enig7486F63840E3487114A61F7A--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FhxB008363 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456Fhn0008362; Mon, 4 May 2009 23:15:43 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from a.relay.invitel.net (a.relay.invitel.net [62.77.203.3]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456FWEx008349 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:15:42 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by a.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 7067D11A9BC for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:30 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 12992598099 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:30 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id DIY3oRhoJPCf for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:29 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id BD5EB598091 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 08:15:29 +0200 (CEST)
Message-ID: <49FFD981.3030501@epointsystem.org>
Date: Tue, 05 May 2009 08:15:29 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: decimal fingerprints [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com> <49FF94D4.3030101@fifthhorseman.net>
In-Reply-To: <49FF94D4.3030101@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigC704609DD70F977B4CBDADD5"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigC704609DD70F977B4CBDADD5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Actually, it is not the fingerprint, but the key ID that is typed in, but=
 it is
a NICE feature of OpenPGP at present that the key ID is simply a substrin=
g of
the fingerprint. I would hate to lose that.

Daniel Kahn Gillmor wrote:
> On 05/04/2009 08:17 PM, David Shaw wrote:
>> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:
>>
>>> Also, since mobile phones typically have a numeric keypad, it would b=
e
>>> nice if
>>> fingerprints and key IDs were numeric-only. It is an increasingly
>>> important
>>> platform for OpenPGP, I believe.
>> I think that is a good point and a great idea, but the only reason tha=
t
>> fingerprints and key IDs are printed in hex now is tradition.  There i=
s
>> nothing in the standard one way or another about how humans should
>> consume fingerprints.  You could even do it with the current V4
>> fingerprints: just as my key fingerprint is
>> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct=

>> as 716901811312187285520504099705403090347495794016 in decimal.  The b=
ig
>> problem I see here is that's it's an awfully long number to type into =
a
>> mobile keypad.
>=20
> How often does anyone type in a fingerprint at all?  My impression of
> the typical workflow is:
>=20
>=20
>  * read fingerprint from physical media (business card, scrap of paper,=
 etc)
>=20
>  * search for a key from the public keyservers (usually by User ID).
>=20
>  * scan list of results for a key with a matching keyid (truncated
> fingerprint)
>=20
>  * fetch selected key from keyserver
>=20
>  * view/double-check fingerprint of fetched key againt physical media
>=20
> In this workflow, the only typing done is to enter the user id to searc=
h
> for (and even that is not always needed on a mobile device, because the=

> person searched for is may already be in the address book for other
> contacts).  if the fingerprint is entered, it's often only the truncate=
d
> keyid, which is guaranteed to be much smaller than the fpr in any case.=

>=20
> Making this change to the fingerprint presentation seems huge: are
> people expected to change all their business cards, .sigs, web sites,
> etc. to show both styles of fingerprint?  or to completely transition t=
o
> the new style?  in terms of truncated fingerprints (keyids), how are we=

> to distinguish between the ones which currently have only digits 0-9 in=

> hex and decimal-style fingerprints?  This seems like a very costly
> tradeoff for the sake of thumbing in 8 decimal characters instead of 8
> hex digits.
>=20
> 	--dkg
>=20


--------------enigC704609DD70F977B4CBDADD5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/2YEACgkQoeH/BzqmYjhMqgCdGkyMIaZiWDsVXO3zwgaOwRbX
bpIAmgMAa48AYJM0yAeODejfeezxegtw
=boiH
-----END PGP SIGNATURE-----

--------------enigC704609DD70F977B4CBDADD5--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456EH9E008283 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n456EHQM008282; Mon, 4 May 2009 23:14:17 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n456E5ac008275 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 23:14:16 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 4968431A8C0; Tue,  5 May 2009 08:14:04 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 234EC598099; Tue,  5 May 2009 08:14:04 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id CYSw8j1xOjfC; Tue,  5 May 2009 08:14:03 +0200 (CEST)
Received: from [10.0.0.232] (unknown [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id CD7E7598091; Tue,  5 May 2009 08:14:03 +0200 (CEST)
Message-ID: <49FFD926.20802@epointsystem.org>
Date: Tue, 05 May 2009 08:13:58 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enigF756CAA244F068AD36E04778"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigF756CAA244F068AD36E04778
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hi,

David Shaw wrote:
> It's a larger problem than just fingerprints.  We also use a fingerprin=
t
> as a specifier inside the revocation key subpacket, to designate which
> key can be used to issue revocations on our behalf.  The thing is,
> though, a fingerprint isn't really a very good revocation key specifier=
:
>=20
> Fingerprints:
> * Must be human-readable
> * Needs to be small to be useful
> * Can collide to some small amount (4880 even documents that they
> collide in section 12.2)

That's not the fingerprint. That's the key ID.

> Revocation key specifier:
> * Does not need to be human-readable
> * Has much looser size requirements (shouldn't be enormous, but
> certainly can be bigger than 160 bits without hurting anything)
> * Should never collide (we don't want the wrong key being able to revok=
e
> our key)

In case of collision, both colliding pre-images are done by the same enti=
ty.

> Perhaps we'd do better by leaving fingerprints alone and instead fixing=

> how we specify revocation keys?

There is nothing wrong with them at present.

Well, actually, I would argue that revocation is currently over-designed.=
 Since
revocation is an irreversible act, there is no need for the heavy artille=
ry of
digital signatures for that purpose. All the s2k specifiers used for symm=
etric
encryption would do (in a hashed sub-packet together with the resulting
symmetric key) and inserting a non-hashed sub-packet with a matching revo=
cation
passphrase into the revoked signature would be just as secure a method fo=
r
revocation than adding a revocation signature packet.

There is no need for asymmetric crypto for revocation. Instead of revocat=
ion
signatures, it would be perfectly safe to use revocation passphrases.

> We could try to come up with a new non-colliding way to disambiguate
> keys, but fundamentally, anything that is smaller than the key packet
> itself can still collide.

Again, collisions are not important in this case. Collisions only matter =
when
the signed information is compiled by a different entity than the signer.=


With a hash that is one-way but not collision resistant, you can do two k=
eys
that have the same fingerprint. So whay? Both are under your control, a
signature with either is your signature.

> So instead, why not define a new revocation
> subpacket that contains the class octet from the old revocation key, an=
d
> the rest of the subpacket is simply a copy of the public key packet in
> question?

It costs more and does not provide any extra security. I mean there is no=
 attack
that can be prevented in this way. Therefore, it is less secure.

>  I don't mean the whole transferable public key, of course,
> just the contents of packet #6.  This public key packet doesn't need an=
y
> self-signatures or anything else like that, as it is implicitly
> authenticated by the signature that carries the revocation key subpacke=
t.

It still makes the key fatter without making any attack more difficult. I=
t won't
make illegitimate revocation more difficult.

--=20
Daniel


--------------enigF756CAA244F068AD36E04778
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/2SoACgkQoeH/BzqmYjhn+ACfXrHUxacK1Yon5Iwf32CPRY01
TuoAoJIBIlvrFmqoHGhEaIJUMScF93cu
=lxIl
-----END PGP SIGNATURE-----

--------------enigF756CAA244F068AD36E04778--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4544dZA001088 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4544dBG001087; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n4544cMQ001081 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 21:04:39 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 2495 invoked from network); 5 May 2009 04:04:37 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 04:04:37 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FFBB0B.9070209@fifthhorseman.net>
Date: Tue, 05 May 2009 00:05:31 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: how to specify "trust no signatures over hash X from this key"?
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig6B3E60808F65218637960D5B"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig6B3E60808F65218637960D5B
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

As i'm thinking about hash function transitions right now, it occurs to
me that i'm not sure how to specify something like "The holder of this
key will never issue signatures using digest algorithm $foo"

In RFC 4880, section 5.2.3.8 the digest algorithm preferences subpacket
says something similar:

   Message digest algorithm numbers that indicate which algorithms the
   key holder prefers to receive.  Like the preferred symmetric
   algorithms, the list is ordered.  Algorithm numbers are in Section 9.
   This is only found on a self-signature.

But this is semantically something fairly different from stating what
kind of use the keyholder expects to pursue.

Consider the case where a user has in the past made and published
MD5-based signatures, and no longer believes that hash algorithm is
secure for the purposes used (or if you like, think into the near
future, and imagine the same situation with SHA1).

It seems to me that it would be useful to have a way that a keyholder
could explicitly state "I no longer make signatures over digest X.
Please consider any signatures from this key using digest X to be invalid=
=2E"

This does lead to the possibility of an explicit "impedance mismatch",
where Alice says "I never issue MD5, SHA1, or RIPEMD160 digests" and Bob
says "I prefer to receive only SHA1, RIPEMD160, or MD5 digests" -- in
this case, Alice's key is useless to Bob.  But this impedance mismatch
exists implicitly anyway, if these are the actual policies.  It seems
like it would be useful to know that the conflict exists at that level.

Note: *could* a user say "i never issue SHA1 signatures" and remain
4880-compliant?  I think so; the spec says that implementations MUST
implement SHA1, but it does not say that they must force the user to use
it or trust it.

Is there interest in being able to explicitly state such a policy?
Would this be worth a new subpacket type?  If so, would it make sense
for ciphers as well as digests?

	--dkg


--------------enig6B3E60808F65218637960D5B
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=pCgL
-----END PGP SIGNATURE-----

--------------enig6B3E60808F65218637960D5B--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532uJZ098147 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 20:02:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n4532uMq098146; Mon, 4 May 2009 20:02:56 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.auckland.ac.nz (curly.its.auckland.ac.nz [130.216.12.33]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n4532jVV098136 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 20:02:55 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id CEE3F9FE85; Tue,  5 May 2009 15:02:44 +1200 (NZST)
X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz
Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (curly.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWjt9zissPYP; Tue,  5 May 2009 15:02:44 +1200 (NZST)
Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 582829FB6F; Tue,  5 May 2009 15:02:42 +1200 (NZST)
Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id A88031DE4001; Tue,  5 May 2009 15:02:36 +1200 (NZST)
Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from <pgut001@wintermute01.cs.auckland.ac.nz>) id 1M1AvU-0002Fn-HI; Tue, 05 May 2009 15:02:36 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: dshaw@jabberwocky.com, jon@callas.org
Subject: Re: Changing GPG's default key type
Cc: ietf-openpgp@imc.org
In-Reply-To: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org>
Message-Id: <E1M1AvU-0002Fn-HI@wintermute01.cs.auckland.ac.nz>
Date: Tue, 05 May 2009 15:02:36 +1200
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Jon Callas <jon@callas.org> writes:

>Many X.509 systems are like this too -- DSA is the mandatory-to-implement,
>but it's not clear that anyone has ever created a DSA certificate outside of
>interop testing.

Actually even the pretense of that one was dropped a long time ago, no-one
apart from the people drafting the standards (and I'm not even sure about
them) was ever under any illusion that the de facto standard was anything
other than RSA (the PKIX spec still contains DSA signing certs because they
were created by NIST more than a decade ago, not because they reflect current
practice).  People didn't even pretend to do the encryption-algorithm side of
things, X9.42 DH, the only implementation I know of that bothered with this
was the SFL reference implementation, which didn't have any choice in the
matter [0].  Microsoft implemented it as a read-only (i.e. decrypt-only)
option specifically to avoid accusations that they didn't comply with the
standard, but that was about all.  The last time I checked the specs still
fudged the matter by saying that you MUST support one of the following
shopping-list (including things like MD2 and X9.42), but most implementers
know how to interpret this, MUST RSA, WHO-CARES anything else.

Peter.

[0] So everyone claimed standards compliance without being compliant secure in
    the knowledge that since no-one else was either, this could never be 
    checked.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452mMwP097152 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452mMCA097151; Mon, 4 May 2009 19:48:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452mL4J097145 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 19:48:21 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 90678 invoked from network); 5 May 2009 02:48:20 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:48:20 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FFA92E.50100@fifthhorseman.net>
Date: Mon, 04 May 2009 22:49:18 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
In-Reply-To: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig107BF823AF3E617747B108F1"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig107BF823AF3E617747B108F1
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 08:17 PM, David Shaw wrote:
> Perhaps we'd do better by leaving fingerprints alone and instead fixing=

> how we specify revocation keys?=20
 [...]
> why not define a new revocation
> subpacket that contains the class octet from the old revocation key, an=
d
> the rest of the subpacket is simply a copy of the public key packet in
> question?  I don't mean the whole transferable public key, of course,
> just the contents of packet #6.

This seems like a good strategy to me, and a *much* simpler one than
trying to overhaul fingerprints!  In fact, this seems like a good idea
whether or not fingerprints are overhauled.  Are there any objections in
the WG to this re-definition of revocation key subpackets?  the largest
realistic keys out there right now are still only around 1KB of a
subpacket, and revocation key subpackets themselves are pretty rare.  So
the added size doesn't seem problematic to me.

	--dkg


--------------enig107BF823AF3E617747B108F1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=7grO
-----END PGP SIGNATURE-----

--------------enig107BF823AF3E617747B108F1--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452klZ3097054 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452klUQ097053; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailhost.auckland.ac.nz (larry.its.auckland.ac.nz [130.216.12.34]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kVYg097007 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 19:46:47 -0700 (MST) (envelope-from pgut001@cs.auckland.ac.nz)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 2EAF61A9A8 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:31 +1200 (NZST)
X-Virus-Scanned: by amavisd-new at mailhost.auckland.ac.nz
Received: from mailhost.auckland.ac.nz ([127.0.0.1]) by localhost (larry.its.auckland.ac.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UDz6NGCu2qBW for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:31 +1200 (NZST)
Received: from iris.cs.auckland.ac.nz (iris.cs.auckland.ac.nz [130.216.33.152]) by mailhost.auckland.ac.nz (Postfix) with ESMTP id 125091A9A2 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:30 +1200 (NZST)
Received: from wintermute01.cs.auckland.ac.nz (wintermute01.cs.auckland.ac.nz [130.216.34.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by iris.cs.auckland.ac.nz (Postfix) with ESMTP id 150651BE4001 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 14:46:30 +1200 (NZST)
Received: from pgut001 by wintermute01.cs.auckland.ac.nz with local (Exim 4.63) (envelope-from <pgut001@wintermute01.cs.auckland.ac.nz>) id 1M1Aft-0001ZO-TZ for ietf-openpgp@imc.org; Tue, 05 May 2009 14:46:29 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: ietf-openpgp@imc.org
Subject: Re: New results against SHA-1
In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net>
Message-Id: <E1M1Aft-0001ZO-TZ@wintermute01.cs.auckland.ac.nz>
Date: Tue, 05 May 2009 14:46:29 +1200
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Daniel Kahn Gillmor <dkg@fifthhorseman.net> writes:

>What do other folks think?

Given that the MDC is a hash of plaintext that's then encrypted, and the hash 
value is itself encrypted, I'm not losing any sleep over it.  The hash attacks 
so far have required bit-for-bit carefully-chosen plaintext with known hash 
values, not unknown (or even partially-known) plaintext with an unknown hash 
value.

Peter.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n452kfLt097036 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 19:46:42 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n452kfEK097035; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n452keiu097028 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 19:46:41 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 90422 invoked from network); 5 May 2009 02:46:38 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 02:46:38 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FFA8C0.70306@fifthhorseman.net>
Date: Mon, 04 May 2009 22:47:28 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigE9C3B898F6A8B9A72D08A57A"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigE9C3B898F6A8B9A72D08A57A
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 06:04 PM, Daniel A. Nagy wrote:
> For fingerprints, MDC and self-signatures, collision-resistance does no=
t matter,
> only the one-way property. So I think it is totally safe to postpone di=
scussion
> until SHA3 is selected.

The more that i consider this, the more important it seems.  Thank you
for emphasizing it, Daniel.

If i understand you correctly, your point is that fingerprints and
self-signatures use hashes over data that is provided entirely by the
signer, covering nothing that is supplied by an outside party.

Since "birthday" attacks rely on the attacker generating an arbitrary
collision, providing one side of it for signing by the victim, and then
transferring the signature onto the other side of the discovered
collision, they do not work against material under full control of the
signer (like fingerprints and self-sigs).

Even if the recent claims of O(2^52) (instead of the
theoretically-optimal 2^80) operations to generate a colliding pair were
to scale proportionally to attacks against the one-wayness of SHA-1,
that would mean O(2^104) (instead of 2^160) operations to find a message
that hashes to a given value.  i have no idea if these sort of results
can actually scale this way, but i  imagine we'd hear a much larger
hullabaloo if someone had announced an  attack against the one-wayness
of SHA-1 with less than O(2^104) operations.

Anyway, since 2^104 is still outside the capabilities of well-funded
organizations, we have breathing room on these parts of the
specification that only rely on collision-resistance.

Did i get anything wrong above?  I apologize if this is elementary for
everyone else, i'm just trying to make sure i understand the ideas involv=
ed.

	--dkg


--------------enigE9C3B898F6A8B9A72D08A57A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQIVAwUBSf+oxczS7ZTSFznpAQr7+RAAoNZqPFaaLFm4/qGyoo/YzQfVi9Vi97JW
Mw7JM1XeGm+F2stc1yG8mqBxXr34/0J1wAdI4BLcF6HLnWyI6xZP14YgPb/f1YOe
JvseA55NEdS1SC6HXz5uoVdv74sxbyTuLXE69+AzS+mT4bKwU62eVNhrYLgG/zBS
2VWLB/gsOQnWdaQPzh3wX7MU3fYMkZL7O1u1Ixnsfw72kmhQz6sNwlfBQolqL8Bd
VCZJztGXUn7KYXy8Q+ndfzPul/GLaUzcIg6CKnlSsb8/YRKffABRowa7zbkRT3Cd
E2/ges0hmtMOmvYe7/4v9Vtl/MxuUBMPV4D7TvjATJsDHdM84DVi30wpzTEWLkdK
2spzRXUScXbOpAq9g4/+idgCQ2/AOr4VduHEYw+mIGdue2aB3ubNFFhxkNM12iX3
vbUT1uAmfkLgyGfQIUSK36EJLy45hSKkBhqlWzr8L3Byu3Tb65/17PVvS1uyEI4b
cy7iLvJGuHW057xxkMvk1cEEYIYz7hn1XpHGd+XxZQyOBkjR78c0Qfmf0dvCv9HS
/3lfUThuIJohDK7AkCKPZRDh1NfdKO24WF31kM7yWsKSufP5GzOSEYMVsqZllQ+9
h5ORvZtSdV9u/prCA67CcSRuHauHhKCZHZFHx9iZimhuJyTBzy3FhW8FIPMfQRtT
bMgvtN6iLtg=
=5ffQ
-----END PGP SIGNATURE-----

--------------enigE9C3B898F6A8B9A72D08A57A--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n451Lkkd092530 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n451LkLD092529; Mon, 4 May 2009 18:21:46 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay01.pair.com (relay01.pair.com [209.68.5.15]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n451LYAX092518 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 18:21:45 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 76223 invoked from network); 5 May 2009 01:21:34 -0000
Received: from 216.254.116.241 (HELO ?192.168.13.75?) (216.254.116.241) by relay01.pair.com with SMTP; 5 May 2009 01:21:34 -0000
X-pair-Authenticated: 216.254.116.241
Message-ID: <49FF94D4.3030101@fifthhorseman.net>
Date: Mon, 04 May 2009 21:22:28 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: decimal fingerprints [was: Re: Non-SHA-1 fingerprints]
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org> <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
In-Reply-To: <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enigBCCF34F563DA425E7D624803"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigBCCF34F563DA425E7D624803
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 08:17 PM, David Shaw wrote:
>=20
> On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:
>=20
>> Also, since mobile phones typically have a numeric keypad, it would be=

>> nice if
>> fingerprints and key IDs were numeric-only. It is an increasingly
>> important
>> platform for OpenPGP, I believe.
>=20
> I think that is a good point and a great idea, but the only reason that=

> fingerprints and key IDs are printed in hex now is tradition.  There is=

> nothing in the standard one way or another about how humans should
> consume fingerprints.  You could even do it with the current V4
> fingerprints: just as my key fingerprint is
> 7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct
> as 716901811312187285520504099705403090347495794016 in decimal.  The bi=
g
> problem I see here is that's it's an awfully long number to type into a=

> mobile keypad.

How often does anyone type in a fingerprint at all?  My impression of
the typical workflow is:


 * read fingerprint from physical media (business card, scrap of paper, e=
tc)

 * search for a key from the public keyservers (usually by User ID).

 * scan list of results for a key with a matching keyid (truncated
fingerprint)

 * fetch selected key from keyserver

 * view/double-check fingerprint of fetched key againt physical media

In this workflow, the only typing done is to enter the user id to search
for (and even that is not always needed on a mobile device, because the
person searched for is may already be in the address book for other
contacts).  if the fingerprint is entered, it's often only the truncated
keyid, which is guaranteed to be much smaller than the fpr in any case.

Making this change to the fingerprint presentation seems huge: are
people expected to change all their business cards, .sigs, web sites,
etc. to show both styles of fingerprint?  or to completely transition to
the new style?  in terms of truncated fingerprints (keyids), how are we
to distinguish between the ones which currently have only digits 0-9 in
hex and decimal-style fingerprints?  This seems like a very costly
tradeoff for the sake of thumbing in 8 decimal characters instead of 8
hex digits.

	--dkg


--------------enigBCCF34F563DA425E7D624803
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=rSZr
-----END PGP SIGNATURE-----

--------------enigBCCF34F563DA425E7D624803--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDHp089058 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HD1N089056; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HBwW089041 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9X0025116; Mon, 4 May 2009 20:17:10 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <713E06B3-4432-44C3-B6BF-D6A2528885CA@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Fix revocation keys instead of fingerprints? (was Re: Non-SHA-1 fingerprints)
Date: Mon, 4 May 2009 20:17:10 -0400
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
X-Mailer: Apple Mail (2.930.3)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:

> David Shaw wrote:
>>
>> Now that I think about the variable-hash fingerprint question a  
>> bit, I'm
>> concerned about things like RFC-4398, which uses OpenPGP  
>> fingerprints in
>> DNS.
>
> For fingerprints, MDC and self-signatures, collision-resistance does  
> not matter,
> only the one-way property. So I think it is totally safe to postpone  
> discussion
> until SHA3 is selected.

It's a larger problem than just fingerprints.  We also use a  
fingerprint as a specifier inside the revocation key subpacket, to  
designate which key can be used to issue revocations on our behalf.   
The thing is, though, a fingerprint isn't really a very good  
revocation key specifier:

Fingerprints:
* Must be human-readable
* Needs to be small to be useful
* Can collide to some small amount (4880 even documents that they  
collide in section 12.2)

Revocation key specifier:
* Does not need to be human-readable
* Has much looser size requirements (shouldn't be enormous, but  
certainly can be bigger than 160 bits without hurting anything)
* Should never collide (we don't want the wrong key being able to  
revoke our key)

Perhaps we'd do better by leaving fingerprints alone and instead  
fixing how we specify revocation keys?

We could try to come up with a new non-colliding way to disambiguate  
keys, but fundamentally, anything that is smaller than the key packet  
itself can still collide.  So instead, why not define a new revocation  
subpacket that contains the class octet from the old revocation key,  
and the rest of the subpacket is simply a copy of the public key  
packet in question?  I don't mean the whole transferable public key,  
of course, just the contents of packet #6.  This public key packet  
doesn't need any self-signatures or anything else like that, as it is  
implicitly authenticated by the signature that carries the revocation  
key subpacket.

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HDi1089057 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n450HDcE089055; Mon, 4 May 2009 17:17:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n450HB8s089038 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:17:12 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from grover.home.jabberwocky.com (grover.home.jabberwocky.com [172.24.84.28]) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n450H9Wx025116; Mon, 4 May 2009 20:17:09 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <C89DD624-BCDB-4240-BC46-48E6A89B40B6@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: "Daniel A. Nagy" <nagydani@epointsystem.org>
In-Reply-To: <49FF6677.7070907@epointsystem.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: Non-SHA-1 fingerprints
Date: Mon, 4 May 2009 20:17:09 -0400
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com> <49FF6677.7070907@epointsystem.org>
X-Mailer: Apple Mail (2.930.3)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 6:04 PM, Daniel A. Nagy wrote:

> Also, since mobile phones typically have a numeric keypad, it would  
> be nice if
> fingerprints and key IDs were numeric-only. It is an increasingly  
> important
> platform for OpenPGP, I believe.

I think that is a good point and a great idea, but the only reason  
that fingerprints and key IDs are printed in hex now is tradition.   
There is nothing in the standard one way or another about how humans  
should consume fingerprints.  You could even do it with the current V4  
fingerprints: just as my key fingerprint is
7D92FD313AB6F3734CC59CA1DB698D7199242560 in hex, it is equally correct  
as 716901811312187285520504099705403090347495794016 in decimal.  The  
big problem I see here is that's it's an awfully long number to type  
into a mobile keypad.  (Well, that, and persuading the various  
implementations to support the decimal format in addition to the  
traditional hex).

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWxab086472 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NWxei086471; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NWw9I086465 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 16:32:59 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id 5E9EA2E659 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:33:51 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-05 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:33:46 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 990162E3CA for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:33:46 -0700 (PDT)
Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:32:53 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:32:53 -0700
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <C9D4DE45-C67F-45C6-96C2-2B0AB379B846@callas.org>
From: Jon Callas <jon@callas.org>
To: David Shaw <dshaw@jabberwocky.com>
In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: Non-SHA-1 fingerprints
Date: Mon, 4 May 2009 16:32:52 -0700
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At the last IETF meeting, Derek discussed new drafts (particularly  
this one) with Tim Polk, and either Derek can shepherd it, or we can  
find someone else. I sent Derek a sketch of what I propose.

Note that it's pretty much what's been discussed here, but I used a  
colon (which is what I remember in the original proposal) rather than  
a dot.

> From: "Jon Callas" <jcallas@pgp.com>
> Date: April 1, 2009 3:43:08 AM PDT
> To: "Derek Atkins" <warlord@pgp.com>
> Cc: "Jon Callas" <jon@pgp.com>
> Subject: Re: OpenPGP Extensions Doc(s)
>
> * PGP Signed: 04/01/2009 at 07:37:45 AM, Decrypted
>

...

>
> Here's what I propose:
>
> We define a new fingerprint.
>
> Basics
> ------
>
> The fingerprint is a struct, consisting of:
>
> Hash Alogrithm Type (1 Octet)
> Hash Value (N Octets)
>
> The hash is computed over the same fields of the key packet, just as  
> in RFC4880, just with a different hash function than SHA1.
>
> Truncations
> -----------
>
> The Hash Value may be of any size equal to or less than the natural  
> size of the hash function. If it is a truncation, then it is the  
> high-order bits. Thus, the SHA1 hash "ED15 5BDF CD41 ADFC 00F3  28B6  
> 52BF 5A46 BC98 E63D" truncated to 64 bits is "ED15 5BDF CD41 ADFC".
>
> There are a number of reasons truncating a fingerprint. One is for  
> ease in transport, display, etc. In the past, we moved from 16-byte  
> fingerprints to 20-byte fingerprints. While a larger fingerprint may  
> have increased cryptographic use, human beings still sometimes use  
> them
>
> Display
> -------
>
> The normal display of a fingerprint is:
>
> <algid>:<hex digits>
>
> White space may be added for readability.
>
> Example:
>
> 2:ED15 5BDF CD41 ADFC 00F3  28B6 52BF 5A46 BC98 E63D
>
> Other formats are possible, but they should remember to show the  
> algorithm either numberically or symbolically. Note that RFC 4880  
> defines ASCII display strings for all algorithms.
>
> Fingerprint Preference
> ----------- ----------
> This is a new preference subpacket that is a single byte of the hash  
> algorithm preferred fingerprint type. Not only can this be used by  
> an implementation for display, but an implementation SHOULD use this  
> algorithm for determining a key id when encrypting to that key.
>
> If this preference is not present, the implementation SHOULD use old- 
> style SHA1 fingerprints.
>
> Key IDs
> --- ---
>
> OpenPGP already has one natural truncation of the fingerprint, the  
> Key ID. Under this proposal, a Key ID is a 64-bit truncation of the  
> Hash Value of a fingerprint. An example is given above.
>
> Note that for SHA1, this means that there are two possible Key IDs,  
> the old one and a new one. RFC 4880 (and 2440 before it) already  
> said that an implementation must recognize that there could be  
> collisions in Key IDs. An implementation SHOULD use the old-style  
> one unless there is a preference specifying SHA1.
>
> Other places to look at
> ----- ------ -- ---- --
>
> We need to look at updating (or handwaving) 5.2.3.15.  Revocation Key.
>
> What do you think?
>
> 	Jon
>
>
> -- 
> Jon Callas
> CTO, CSO
> PGP Corporation         Tel: +1 (650) 319-9016
> 200 Jefferson Drive     Fax: +1 (650) 319-9001
> Menlo Park, CA 94025    PGP: ed15 5bdf cd41 adfc 00f3
> USA                          28b6 52bf 5a46 bc98 e63d
>
>
>
>
> * Jon Callas <jcallas@pgp.com>
> * 0xBC98E63D(L)
>


-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFJ/3slsTedWZOD3gYRAlWTAJ9C2q5AAqUNMLMbsNlz/teDfMaT+ACfYm4U
iGyxP9l5DBF+7yAfwR83uu0=
=SV8T
-----END PGP SIGNATURE-----



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQPQJ086141 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44NQP5k086140; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from merrymeet.com (merrymeet.com [66.93.68.160]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44NQEjb086130 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 16:26:25 -0700 (MST) (envelope-from jon@callas.org)
Received: from localhost (localhost [127.0.0.1]) by merrymeet.com (Postfix) with ESMTP id CE5732E215 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:27:06 -0700 (PDT)
Received: from merrymeet.com ([127.0.0.1]) by localhost (host.domain.tld [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 30270-02 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:27:02 -0700 (PDT)
Received: from keys.merrymeet.com (keys.merrymeet.com [66.93.68.161]) (Authenticated sender: jon) by merrymeet.com (Postfix) with ESMTPA id 3FB282E5B8 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 16:27:02 -0700 (PDT)
Received: from [10.240.23.244] ([208.54.95.189]) by keys.merrymeet.com (PGP Universal service); Mon, 04 May 2009 16:26:09 -0700
X-PGP-Universal: processed; by keys.merrymeet.com on Mon, 04 May 2009 16:26:09 -0700
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <09C603AC-BEE6-43C4-99D0-08B8F4D0BD61@callas.org>
From: Jon Callas <jon@callas.org>
To: David Shaw <dshaw@jabberwocky.com>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
Mime-Version: 1.0 (Apple Message framework v930.3)
Subject: Re: Changing GPG's default key type
Date: Mon, 4 May 2009 16:26:07 -0700
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
X-Mailer: Apple Mail (2.930.3)
X-PGP-Encoding-Format: Partitioned
X-PGP-Encoding-Version: 2.0.2
X-Content-PGP-Universal-Saved-Content-Transfer-Encoding: 7bit
X-Content-PGP-Universal-Saved-Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7BIT
X-Virus-Scanned: Maia Mailguard
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

>
>
> One issue, of course, is that RSA is not a required key type in  
> OpenPGP, so there could be some implementation out there that won't  
> be able to handle it.  I'm not terribly concerned about this, as in  
> practice, the vast majority of code has handled RSA just fine for  
> the past decade, and if a particular user needs to generate a non- 
> RSA key, they can still do so.
> There are a few other details (RSA signatures are physically larger,  
> etc), but I believe they are outweighed by the benefit of the larger  
> key and additional hash flexibility.

PGP does precisely this now. The default you'll get when creating a  
new key is RSA 2048.

I'll invoke Jeff Schiller in this as well. The DSA/Elgamal keys are  
mandatory to implement. Mandatory to implement does not mean mandatory  
to use. It would be perfectly reasonable to make an RSA-only system  
that merely didn't hork up a hairball when it found a DSA key.

Many X.509 systems are like this too -- DSA is the mandatory-to- 
implement, but it's not clear that anyone has ever created a DSA  
certificate outside of interop testing. I'm sure someone can find some  
example that proves me literally wrong on that, but figuratively right.

These days, I see the effective -- ummm, I'm looking for the right  
word, I don't want to say "deprecate" -- minimization of integer  
discrete log. The world is pretty much integer RSA, and moving to  
elliptic curve discrete log.

	Jon

-----BEGIN PGP SIGNATURE-----
Version: PGP Universal 2.6.3
Charset: US-ASCII

wj8DBQFJ/3mRsTedWZOD3gYRAvnSAJ930wrrwBfdtMQR7u45vOXhP1nCqQCcCUSb
mmQtr8tYoSe5XMK6ya3Jg5Q=
=JpoU
-----END PGP SIGNATURE-----



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJKuH082315 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44MJK3l082314; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp03.uk.clara.net (netscalibur-outbound-smtp03.uk.clara.net [213.253.59.84]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44MJ97m082294 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:19:20 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:41870) by relay03.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.43]:1325) with esmtp id 1M16V9-0003rE-CR (Exim 4.69) (return-path <iang@systemics.com>); Mon, 04 May 2009 23:19:07 +0100
Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 52A5E5D65; Mon,  4 May 2009 23:19:04 +0100 (GMT/BST)
Message-ID: <49FF69D9.7070206@systemics.com>
Date: Tue, 05 May 2009 00:19:05 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 4/5/09 23:35, David Shaw wrote:

> This does, of course, presume that all of our hashes for OpenPGP in the
> future will generate an even number of bytes.


I like the idea.

But, I'm the one who favours aphorisms such as "there is only one mode, 
and it is secure."  Or, perhaps, "There is one cipher suite, and it is 
numbered Number 1."

So I would be looking for SHA3 as the one and only thing that ever 
hashes the publics, and bugger the rest.  Algorithm agility is for the 
birds.  We would just need to agree how many even bytes to allocate to 
the SHA3 for the next 4 decades.

iang



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9bBd081710 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M9bGE081709; Mon, 4 May 2009 15:09:37 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M9ZFJ081702 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:09:36 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 40FCB31A58B for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:35 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 1A884598099 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:35 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id NW5dxk15LoHW for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:34 +0200 (CEST)
Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id D15D7598091 for <ietf-openpgp@imc.org>; Tue,  5 May 2009 00:09:34 +0200 (CEST)
Message-ID: <49FF679E.1090400@epointsystem.org>
Date: Tue, 05 May 2009 00:09:34 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>	<49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net>
In-Reply-To: <49FF325A.80106@fifthhorseman.net>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig61BC0E22A9B40C8F1917A17F"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig61BC0E22A9B40C8F1917A17F
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

> Ugh.  that's horrifically long either way.  Is a base64 encoding worth
> considering?  it would shave off a third of the length, but it seems
> like it would introduce significant ambiguity (0 vs O, A vs a, etc)

I would go the other way. Since collision-resistance is not an issue with=

fingerprints, 128 bits are perfectly adequate for 2048-bit keys (i.e. bre=
aking
the key and making a new key matching the fingerprint require about the s=
ame
amount of work). Also, keeping mobile phones in mind, I would suggest usi=
ng 40
decimal digits. This way, the total length of fingerprints remain the sam=
e (40
characters), but typing them in on a decimal keypad would be much faster =
than
currently.

--=20
Daniel


--------------enig61BC0E22A9B40C8F1917A17F
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/Z54ACgkQoeH/BzqmYjhxbgCgjDKZk2nfRWSZojAa9qklaeZR
rQwAn2XGQCI0Q8Z2ckSWMHITtpd7mU4s
=2qFS
-----END PGP SIGNATURE-----

--------------enig61BC0E22A9B40C8F1917A17F--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4rdl081493 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44M4rhT081492; Mon, 4 May 2009 15:04:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from b.relay.invitel.net (b.relay.invitel.net [62.77.203.4]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44M4fpv081481 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:04:52 -0700 (MST) (envelope-from nagydani@epointsystem.org)
Received: from mail.agileight.com (62-77-229-117.static.invitel.hu [62.77.229.117]) by b.relay.invitel.net (Invitel Core SMTP Transmitter) with ESMTP id 8F77C31A571; Tue,  5 May 2009 00:04:40 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by mail.agileight.com (Postfix) with ESMTP id 112B8598099; Tue,  5 May 2009 00:04:40 +0200 (CEST)
X-Virus-Scanned: amavisd-new at mail.agileight.com
Received: from mail.agileight.com ([127.0.0.1]) by localhost (www.agileight.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id xcNlf78UM7xl; Tue,  5 May 2009 00:04:39 +0200 (CEST)
Received: from [10.0.0.232] (78-131-55-134.static.hdsnet.hu [78.131.55.134]) by mail.agileight.com (Postfix) with ESMTP id C9A52598091; Tue,  5 May 2009 00:04:39 +0200 (CEST)
Message-ID: <49FF6677.7070907@epointsystem.org>
Date: Tue, 05 May 2009 00:04:39 +0200
From: "Daniel A. Nagy" <nagydani@epointsystem.org>
User-Agent: Thunderbird 2.0.0.21 (X11/20090318)
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
CC: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Non-SHA-1 fingerprints
References: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
In-Reply-To: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------enig3A44C71DF68C61ECC525EF57"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3A44C71DF68C61ECC525EF57
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

David Shaw wrote:
>=20
> Now that I think about the variable-hash fingerprint question a bit, I'=
m
> concerned about things like RFC-4398, which uses OpenPGP fingerprints i=
n
> DNS.=20

For fingerprints, MDC and self-signatures, collision-resistance does not =
matter,
only the one-way property. So I think it is totally safe to postpone disc=
ussion
until SHA3 is selected.

Reviewing the fingerprint is a MAJOR issue, as (parts of) fingerprints ar=
e used
as lookup keys in the PKS database.

Here are some points:

I believe that a fingerprint that is longer than 160 bits is pointless; e=
ven 160
bits is an overkill causing inconvenience with no tangible benefit in ter=
ms of
security over a 128 bit fingerprint.

What does cause some problems, is the fact that the creation date (32 bit=
s) is
included in the fingerprint. It makes sevaral attacks substantially easie=
r than
if the fingerprint was calculated only over the key material and key attr=
ibutes
(such as key type). Basically, it should be impossible for the same key t=
o have
different fingerprints.

Also, since mobile phones typically have a numeric keypad, it would be ni=
ce if
fingerprints and key IDs were numeric-only. It is an increasingly importa=
nt
platform for OpenPGP, I believe.

--=20
Daniel


--------------enig3A44C71DF68C61ECC525EF57
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEAREIAAYFAkn/ZncACgkQoeH/BzqmYjhfeACfRnMUEXiw7+Y1Yvnp8TYGchbh
2U8AoKbcP+V3g8YXf+hJlsWbgdJyQe9z
=ce8+
-----END PGP SIGNATURE-----

--------------enig3A44C71DF68C61ECC525EF57--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpwX1080695 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Lpw7L080694; Mon, 4 May 2009 14:51:58 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LpuKV080687 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 14:51:57 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Lpt82023932 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:51:56 -0400
Message-Id: <0F0DEA3C-A1B9-4F24-8F1E-9B8649F2464C@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <49FF325A.80106@fifthhorseman.net>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: New results against SHA-1
Date: Mon, 4 May 2009 17:51:55 -0400
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>	<49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <49FF325A.80106@fifthhorseman.net>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 2:22 PM, Daniel Kahn Gillmor wrote:

> On 05/04/2009 01:38 PM, Werner Koch wrote:
>> Using a number (2) and, say, a dot as a prefix would be a better  
>> choice.
>> We use algorithnm numbers anyway and OpenPGP users are used tp  
>> spell a
>> large row of hex digits; we would only confuse them with an S and  
>> an H..
>
> ok, that works for me.  would the prefix be in hex or decimal?  for
> example, would an SHA512 fingerprint look like
> a. 
> 3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff
>
> or
>
> 10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff
>
> Ugh.  that's horrifically long either way.  Is a base64 encoding worth
> considering?  it would shave off a third of the length, but it seems
> like it would introduce significant ambiguity (0 vs O, A vs a, etc)

I'm sure there is a study somewhere that says just how long of a  
string a human being can handle without getting lost, but even without  
such a study I can say that 512 bits is just too long for usability.   
If you think about it, the whole point of fingerprints is that they're  
a short way to refer to a key.  If we make them too long, we're  
hurting the very thing that fingerprints were created for.

"3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff 
" is not exactly the kind of thing someone could print on a business  
card or read to a corespondent over the phone.

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZDTV079793 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44LZDJW079792; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44LZ2Ja079782 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 14:35:13 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44LZ1Ho023777 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 17:35:01 -0400
Message-Id: <5F766368-BB36-4076-807D-E0CEDB7B0026@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Non-SHA-1 fingerprints
Date: Mon, 4 May 2009 17:35:01 -0400
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Now that I think about the variable-hash fingerprint question a bit,  
I'm concerned about things like RFC-4398, which uses OpenPGP  
fingerprints in DNS.  There is a fingerprint field there, and it is  
variable length, but it has no concept of hash algorithm.  We'd have  
to define some standard way to write out a fingerprint in binary with  
the hash field incorporated.

So given that, I am wondering why we need a delimiter between the hash  
specifier and the fingerprint data for the human-readable version at  
all?  A written fingerprint is expected to be readable, but not  
interpretable by a human being anyway, and software doesn't care about  
the delimiter one way or another.

So rather than 01.23456789ABCDEF.... or MD5-23456789ABCDEF... why not  
just 0123456789ABCDEF... ?

We already have a concept of variable length fingerprints (V3 = 16  
bytes, and V4 = 20 bytes), and this fits reasonably well alongside  
those two.  The rule would be 16 bytes means it's V3, 20 bytes means  
it's V4, and an odd number of bytes means it's this new format.  If  
you see an odd number of bytes, you pull off the leftmost byte, and  
that's the algorithm number.  The rest of the bytes are the hash  
value.  We can trivially transform a V4 fingerprint into this new  
format by sticking the value 2 in front of it.

This does, of course, presume that all of our hashes for OpenPGP in  
the future will generate an even number of bytes.

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjrTX072189 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JjrnU072187; Mon, 4 May 2009 12:45:53 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JjpXp072177 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:45:52 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Jjok3022882 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 15:45:51 -0400
Message-Id: <4E07EDF9-3293-4210-9843-D366B68EED0B@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <49FF40DD.5040300@fifthhorseman.net>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: New results against SHA-1
Date: Mon, 4 May 2009 15:45:50 -0400
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com> <49FF40DD.5040300@fifthhorseman.net>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 3:24 PM, Daniel Kahn Gillmor wrote:

> On 05/04/2009 02:57 PM, David Shaw wrote:
>> we would have to play length checking games
>> to guess if they meant hash 4 or 40.
>
> We're still going to have to do a little bit of length-checking games,
> to distinguish between traditional SHA1 fingerprints and an
> accidentally-truncated version of the newer (and presumably longer)
> fingerprints.

We can use the presence of the delimiter dot to tell the difference.

If they've lost the dot, then, well, absent some special knowledge, we  
can't really tell the difference between a old-style fingerprint and a  
new-style fingerprint that is both accidentally truncated and missing  
its delimiter dot.  I wouldn't even try.

Note that the current OpenPGP does not attempt to tell the difference  
between a V3 fingerprint (32 printed digits) and a V4 fingerprint that  
just happened to lose 8 characters in a cut and paste error  
somewhere.  That's the job of the client (if it chooses to take it on  
at all) more so than the job of the protocol.

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPdue070689 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JPdQF070688; Mon, 4 May 2009 12:25:39 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mail-bw0-f222.google.com (mail-bw0-f222.google.com [209.85.218.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JPRRM070676 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:25:38 -0700 (MST) (envelope-from dacrick@gmail.com)
Received: by bwz22 with SMTP id 22so4021195bwz.10 for <ietf-openpgp@imc.org>; Mon, 04 May 2009 12:25:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:content-type :content-transfer-encoding; bh=CjQUsywfVRGnWO7w3luIJPeKdKuyqA3ISTRnQm/0um8=; b=C18BoKzQEZRk26m4vyNrFiNgw0YwGHtL7Deuqx7i3UZ7sokeDa2AfuHsjwtyV+UWHP i11XLWUbvL0WMVXaXMok8JZrfu38+nl7jfYbXsGWk1F2YGQv6MikLu28FG/yQwixkx0c kh7+3nP97Yk18qQw8LxDIYnm7+DAWtTY2ahsA=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; b=YCzt9UymiDnKbaU4GvKhxv0QTgy3Y0CCYPm1aLNQ1k6c50AX0X4m8QSFvFuZEkLMwA Jbomxn83XPiADUo9cPtu7KZnmH1bFnO+QJznfBmqnCt8yIfm0cJZkKlUD2T4AD7W4Ijl pUDSede9nusTDdeulqMqFly6T13/bP2QTRqII=
MIME-Version: 1.0
Received: by 10.204.69.66 with SMTP id y2mr6072460bki.49.1241465126246; Mon,  04 May 2009 12:25:26 -0700 (PDT)
In-Reply-To: <49FF3EC2.7030504@fifthhorseman.net>
References: <20090504183948.AA2D51A003A@smtp.hushmail.com> <49FF3EC2.7030504@fifthhorseman.net>
Date: Mon, 4 May 2009 20:25:26 +0100
Message-ID: <117bad160905041225k1dc1c23fref21f17d6fa73064@mail.gmail.com>
Subject: Re: New results against SHA-1
From: David Crick <dacrick@gmail.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, May 4, 2009 at 8:15 PM, Daniel Kahn Gillmor
<dkg@fifthhorseman.net> wrote:
> On 05/04/2009 02:39 PM, vedaal@hush.com wrote:
>> MDC's ?
>>
>> currently SHA-1
>> rfc-4880 p. 49 ff
>
> Ah, right. =A0Jon Callas' remarks about the MDC from back in January migh=
t
> be relevant:
>
> =A0http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html
>
> I think his point stands that the MDC only cares about the one-wayness
> of the digest used in MDC -- there is no reliance on a
> collision-resistance property. =A0So i'm not sure that this needs to
> change in a new draft, particularly if it could make the discussion more
> contentious.
>
> What do other folks think?

I think we need to address it; we may as well, plus also
during the IETF review of the draft of what would become
4880, we have to CONVINCE IETF that it was "OK" to use
SHA-1 here (when there were already concerns about it).

"SHA-1 baad, mm'ok?" :)



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JNGgX070552 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JNGES070551; Mon, 4 May 2009 12:23:16 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JNFrb070537 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:23:15 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 19140 invoked from network); 4 May 2009 19:23:14 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:23:14 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF40DD.5040300@fifthhorseman.net>
Date: Mon, 04 May 2009 15:24:13 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de> <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com>
In-Reply-To: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig3377F6EA6DEFE8F1B189E8C5"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3377F6EA6DEFE8F1B189E8C5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 02:57 PM, David Shaw wrote:
> we would have to play length checking games
> to guess if they meant hash 4 or 40.

We're still going to have to do a little bit of length-checking games,
to distinguish between traditional SHA1 fingerprints and an
accidentally-truncated version of the newer (and presumably longer)
fingerprints.

One of the reasons that i initially proposed prefixes like SHA256- is
because they are so unambiguously *unlike* the traditional fingerprints
that it is clear what to expect next.

	--dkg


--------------enig3377F6EA6DEFE8F1B189E8C5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQIVAwUBSf9A3szS7ZTSFznpAQqrTQ/5ASHx4M4jOukvhduteqhbHSYdrs7mxK5e
FXwsiiFS6EZzng3hSfair5T6EHKaBHQkfCEnlI17fPluXM5jZgMT/owbmUlL3orU
nAuff4/lKvnf/esrKfMRhb9igg8UHZXweW7lqT8hxL+GHIWF+NnqIlMjA91BpufL
rczzbumid4Is3QTeFDceG/xJFZY9/Tx6jHw8H+pgpbTte2PShptti+e8m5SToCRK
fQIhL404kv/XJFitIzw7OqoYQoigrh8e3nKxxjx2GjDnIClRNLKkB0tEH1h1CpP+
iRTJs/XrCWZosZbjkBJ8p0L/v6Qu+LpblZZfqmqfJGN281+cy4zm5qCpFFhuRs6m
FI5ESmBPZ1+bteLij5v0zqYxu+qR0Fq5OjrHArvkloy4sP1oWjoNDuhDTFj2y8Vy
yVACcYKKJ5+QQJZjaBvYyuDMigps5R2zCaPDEdQsQnPf70TgJnqVaAN85jpD2Agk
J7+LgwuL5YJ9IXyK0OBXqdeQqvhLIQyLl8UP5HbcSio6NGAV/qnxTkzgoi456j2k
eIcP+f7jXXr6khyysOlTklhKaIZMHJJicZ9bKLVihr4GiaoU6MzUOU1MPqDEAIGm
86ABiBomr1ZuTmV6zn07mhG9tl8xJ7F5pHHkxQVfaGK90Wx+PO4OIJgMdHezOihd
/dxudUVwf7Y=
=I4ZX
-----END PGP SIGNATURE-----

--------------enig3377F6EA6DEFE8F1B189E8C5--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44JERnC069907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44JERWZ069904; Mon, 4 May 2009 12:14:27 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay03.pair.com (relay03.pair.com [209.68.5.17]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44JEGRt069840 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 12:14:26 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 14369 invoked from network); 4 May 2009 19:14:15 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay03.pair.com with SMTP; 4 May 2009 19:14:15 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF3EC2.7030504@fifthhorseman.net>
Date: Mon, 04 May 2009 15:15:14 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <20090504183948.AA2D51A003A@smtp.hushmail.com>
In-Reply-To: <20090504183948.AA2D51A003A@smtp.hushmail.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig14CC89960466A28BEAC9A5A5"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig14CC89960466A28BEAC9A5A5
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 02:39 PM, vedaal@hush.com wrote:
> MDC's ?
>=20
> currently SHA-1
> rfc-4880 p. 49 ff

Ah, right.  Jon Callas' remarks about the MDC from back in January might
be relevant:

  http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html

I think his point stands that the MDC only cares about the one-wayness
of the digest used in MDC -- there is no reliance on a
collision-resistance property.  So i'm not sure that this needs to
change in a new draft, particularly if it could make the discussion more
contentious.

What do other folks think?

	--dkg


--------------enig14CC89960466A28BEAC9A5A5
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=afkV
-----END PGP SIGNATURE-----

--------------enig14CC89960466A28BEAC9A5A5--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw59f068538 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:58:06 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Iw5Pd068537; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Iw4qi068531 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:58:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44IvLtF022390 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:57:21 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <75CCBB75-822B-4D82-8A1F-BA893A098985@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: Werner Koch <wk@gnupg.org>
In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: New results against SHA-1
Date: Mon, 4 May 2009 14:57:21 -0400
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 1:38 PM, Werner Koch wrote:

>
> On Mon,  4 May 2009 17:32, dkg@fifthhorseman.net said:
>> current fingerprint would be re-written as:
>>
>> SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9
>
> Using a number (2) and, say, a dot as a prefix would be a better  
> choice.
> We use algorithnm numbers anyway and OpenPGP users are used tp spell a
> large row of hex digits; we would only confuse them with an S and an  
> H..

I like the dot, but I'd like to see the hash number in two-digit hex.   
The reason is that I strongly suspect that when read out over the  
phone, or written down, or transmitted in pretty much any means other  
than strict cut-and-paste, the dot (or any other delimiter) will be  
lost in translation.  Thus, "40.ABCDEF0123456....." will become  
"40ABCDEF0123456....." and we would have to play length checking games  
to guess if they meant hash 4 or 40.

With 2-digit hex, "4" would be written as "04", removing any doubt.

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ie2G2067128 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ie2gs067127; Mon, 4 May 2009 11:40:02 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from smtp12.hushmail.com (smtp12.hushmail.com [65.39.178.135]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44IdolO067098 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:40:01 -0700 (MST) (envelope-from vedaal@hush.com)
Received: from smtp12.hushmail.com (localhost.localdomain [127.0.0.1]) by smtp12.hushmail.com (Postfix) with SMTP id 6F9EA70271 for <ietf-openpgp@imc.org>; Mon,  4 May 2009 18:39:49 +0000 (UTC)
Received: from smtp.hushmail.com (mailserver8.hushmail.com [65.39.178.61]) by smtp12.hushmail.com (Postfix) with ESMTP for <ietf-openpgp@imc.org>; Mon,  4 May 2009 18:39:48 +0000 (UTC)
Received: by smtp.hushmail.com (Postfix, from userid 99) id AA2D51A003A; Mon,  4 May 2009 18:39:48 +0000 (UTC)
MIME-Version: 1.0
Date: Mon, 04 May 2009 14:39:48 -0400
To: "IETF OpenPGP Working Group" <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
From: vedaal@hush.com
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20090504183948.AA2D51A003A@smtp.hushmail.com>
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon, 04 May 2009 11:32:04 -0400 Daniel Kahn Gillmor 
<dkg@fifthhorseman.net> wrote:
>On 04/30/2009 06:39 PM, David Shaw wrote:
>> 
>> 
>http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.

>pdf
>> 
>> There is not much hard information yet, but the two big quotes 
>are
>> "SHA-1 collisions now 2^52" and "Practical collisions are within
>> resources of a well funded organisation."


>What else should be addressed?  

MDC's ?

currently SHA-1
rfc-4880 p. 49 ff


vedaal

any ads or links below this message are added by hushmail without 
my endorsement or awareness of the nature of the link

--
Click to learn about options trading and get the latest information.
 http://tagline.hushmail.com/fc/BLSrjkqecvgn6JU6GKTTYn4JLCimaHzrO00szZPMXyt3Ax5yZ2fL1OvWzD6/



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44ILPBN066013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44ILPH9066012; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44ILOHs066006 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:21:25 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 55092 invoked from network); 4 May 2009 18:21:23 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 18:21:23 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF325A.80106@fifthhorseman.net>
Date: Mon, 04 May 2009 14:22:18 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>	<49FF0A74.5030805@fifthhorseman.net> <87iqkgbwff.fsf@wheatstone.g10code.de>
In-Reply-To: <87iqkgbwff.fsf@wheatstone.g10code.de>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig9CD82D7FEB196C5B478EC8A3"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig9CD82D7FEB196C5B478EC8A3
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 05/04/2009 01:38 PM, Werner Koch wrote:
> Using a number (2) and, say, a dot as a prefix would be a better choice=
=2E
> We use algorithnm numbers anyway and OpenPGP users are used tp spell a
> large row of hex digits; we would only confuse them with an S and an H.=
=2E

ok, that works for me.  would the prefix be in hex or decimal?  for
example, would an SHA512 fingerprint look like
 a.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734=
d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff

or

10.3dd7a2cb8f9e51f2fc096e7022a8192099aa89e10c699e46223851cc36f406b1beb734=
d5a7da0d8ebc08cc37e30088300c7a9ae81ba7ab758047a89cfa191aff

Ugh.  that's horrifically long either way.  Is a base64 encoding worth
considering?  it would shave off a third of the length, but it seems
like it would introduce significant ambiguity (0 vs O, A vs a, etc)

>>  e) allow injection of arbitrary key material at the head of signature=
s
>> to allow signers to to avoid a chosen-prefix attack?  This would make =
it
>> significantly more difficult to predict the hash that someone will sig=
n,
>=20
> and gives more bandwidth for a subliminal channel...

True, but some room for the subliminal channel already exists (e.g.
notations can be injected in the signed material).  This would simply
allow signers to better control what they actually sign, rather than
being compelled into signing a given text.  Daniel Franke's recent
message on gnupg-devel about this is interesting:

 http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024967.html

Another approach would be to formally prefer digest algorithms that do
not exhibit the same single-pass behavior of SHA-1 -- is that feasible?

>>  f) explicit introduction of new hashes/ciphers/asymmetric algorithms?=

>=20
> We should defer such a discussion until there are semi final results
> from the SHA-3 contest.

SHA-3 finalizes in the end of 2012, though first-round candidates have
already been selected.  Third quarter of 2010 should have finalists
selected:

  http://csrc.nist.gov/groups/ST/hash/timeline.html

Which phase of the timeline would be sufficient for you?

> Right, we should re-establish the WG to no rely on I-Ds by individuals.=


So what's the process to do this?

	--dkg


--------------enig9CD82D7FEB196C5B478EC8A3
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=/xKh
-----END PGP SIGNATURE-----

--------------enig9CD82D7FEB196C5B478EC8A3--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7su7064123 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I7s0T064122; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailgw02.dd24.net (mailgw02.dd24.net [217.188.214.197]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I7gVd064103 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:07:54 -0700 (MST) (envelope-from calestyo@scientia.net)
Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw02.dd24.net (Postfix) with ESMTPA id 0AB6F35546C for <ietf-openpgp@imc.org>; Mon,  4 May 2009 18:07:42 +0000 (GMT)
Subject: Re: Changing GPG's default key type
From: Christoph Anton Mitterer <calestyo@scientia.net>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <C21494E2-3E26-4552-A2AD-54CD8A73165D@jabberwocky.com>
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net> <C21494E2-3E26-4552-A2AD-54CD8A73165D@jabberwocky.com>
Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-TqwuP8rGE/wYOL6Ec1bJ"
Date: Mon, 04 May 2009 20:07:41 +0200
Message-Id: <1241460461.4024.12.camel@fermat.scientia.net>
Mime-Version: 1.0
X-Mailer: Evolution 2.26.1.1 
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--=-TqwuP8rGE/wYOL6Ec1bJ
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Mon, 2009-05-04 at 14:00 -0400, David Shaw wrote:
> Concerns about compatibility, mainly.  There is a much larger =20
> installed base of clients that understand SHA-1 than that understand =20
> (say) SHA-256.  SHA-256 has only been understood in a non-development =20
> version of GPG since 2004.  If I recall properly, PGP added it more or =20
> less around the same time.  That's not that long ago, and I frequently =20
> see people asking for support for some version of GPG or PGP that =20
> predates SHA-256.
At least we've seen from the recent SHA1-related events,... that this
point is comming closer ;)


> None of this means that we wouldn't change the default signing hash at =20
> some point later.  It's just not something we're currently planning on =20
> for today.
Of course :)


Chris.

--=-TqwuP8rGE/wYOL6Ec1bJ
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Disposition: attachment; filename="smime.p7s"
Content-Transfer-Encoding: base64
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--=-TqwuP8rGE/wYOL6Ec1bJ--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0PDk063585 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44I0PWU063584; Mon, 4 May 2009 11:00:25 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44I0D5t063572 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 11:00:24 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44I0CJk021847 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 4 May 2009 14:00:13 -0400
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Message-Id: <C21494E2-3E26-4552-A2AD-54CD8A73165D@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: Christoph Anton Mitterer <calestyo@scientia.net>
In-Reply-To: <1241458123.4024.2.camel@fermat.scientia.net>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Re: Changing GPG's default key type
Date: Mon, 4 May 2009 14:00:12 -0400
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com> <1241458123.4024.2.camel@fermat.scientia.net>
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On May 4, 2009, at 1:28 PM, Christoph Anton Mitterer wrote:

> On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote:
>> We are currently thinking about changing the default
>> primary to a 2048-bit RSA key.
> Nice :-)
>
>> We are not proposing changing our default
>> signing hash, which will remain SHA-1.
> Uhm.. why not?

Concerns about compatibility, mainly.  There is a much larger  
installed base of clients that understand SHA-1 than that understand  
(say) SHA-256.  SHA-256 has only been understood in a non-development  
version of GPG since 2004.  If I recall properly, PGP added it more or  
less around the same time.  That's not that long ago, and I frequently  
see people asking for support for some version of GPG or PGP that  
predates SHA-256.

Mind you, we're not stopping people from choosing to use SHA-256 or  
whatever they like, and with a RSA key, they are of course free to  
choose anything.  SHA-1 is just a default.  One way to look at the RSA  
change, in fact, is to enable users to make their own hash choice,  
which they didn't really have with the previous default of a 1024-bit  
DSA key (so locked at 160 bits).

None of this means that we wouldn't change the default signing hash at  
some point later.  It's just not something we're currently planning on  
for today.

David



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Hko3r062224 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HkoEn062223; Mon, 4 May 2009 10:46:50 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HkmMD062215 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:46:49 -0700 (MST) (envelope-from wk@gnupg.org)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.63 #1 (Debian)) id 1M12Fa-0002cM-Hs for <ietf-openpgp@imc.org>; Mon, 04 May 2009 19:46:46 +0200
Received: from wk by localhost with local (Exim 4.62 #1 (Debian)) id 1M127Y-0007gx-OA for <ietf-openpgp@imc.org>; Mon, 04 May 2009 19:38:28 +0200
From: Werner Koch <wk@gnupg.org>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com> <49FF0A74.5030805@fifthhorseman.net>
Organisation: g10 Code GmbH
OpenPGP: id=5B0358A2; url=finger:wk@g10code.com
Date: Mon, 04 May 2009 19:38:28 +0200
In-Reply-To: <49FF0A74.5030805@fifthhorseman.net> (Daniel Kahn Gillmor's message of "Mon, 04 May 2009 11:32:04 -0400")
Message-ID: <87iqkgbwff.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.110011 (No Gnus v0.11)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Mon,  4 May 2009 17:32, dkg@fifthhorseman.net said:
> current fingerprint would be re-written as:
>
>  SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9

Using a number (2) and, say, a dot as a prefix would be a better choice.
We use algorithnm numbers anyway and OpenPGP users are used tp spell a
large row of hex digits; we would only confuse them with an S and an H..

>  e) allow injection of arbitrary key material at the head of signatures
> to allow signers to to avoid a chosen-prefix attack?  This would make it
> significantly more difficult to predict the hash that someone will sign,

and gives more bandwidth for a subliminal channel...

>  f) explicit introduction of new hashes/ciphers/asymmetric algorithms?

We should defer such a discussion until there are semi final results
from the SHA-3 contest.

> I've probably missed something.  What else should be addressed?  What
> steps are necessary to get the WG back in order again?  Or is that not

Right, we should re-establish the WG to no rely on I-Ds by individuals.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSvOG061013 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HSv4D061012; Mon, 4 May 2009 10:28:57 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mailgw01.dd24.net (mailgw01.dd24.net [217.188.214.191]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HSjCk060991 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:28:56 -0700 (MST) (envelope-from calestyo@scientia.net)
Received: from [192.168.0.101] (ppp-93-104-127-5.dynamic.mnet-online.de [93.104.127.5]) by mailgw01.dd24.net (Postfix) with ESMTPA id 0FE127CC66D; Mon,  4 May 2009 17:28:44 +0000 (GMT)
Subject: Re: Changing GPG's default key type
From: Christoph Anton Mitterer <calestyo@scientia.net>
To: David Shaw <dshaw@jabberwocky.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
Content-Type: multipart/signed; micalg="sha1"; protocol="application/x-pkcs7-signature"; boundary="=-H+nUPs1cUv+b2JQsJxx7"
Date: Mon, 04 May 2009 19:28:43 +0200
Message-Id: <1241458123.4024.2.camel@fermat.scientia.net>
Mime-Version: 1.0
X-Mailer: Evolution 2.26.1.1 
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

--=-H+nUPs1cUv+b2JQsJxx7
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

On Mon, 2009-05-04 at 10:40 -0400, David Shaw wrote:
> We are currently thinking about changing the default =20
> primary to a 2048-bit RSA key.
Nice :-)

> We are not proposing changing our default =20
> signing hash, which will remain SHA-1.
Uhm.. why not?


Chris.

--=-H+nUPs1cUv+b2JQsJxx7
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Disposition: attachment; filename="smime.p7s"
Content-Transfer-Encoding: base64
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--=-H+nUPs1cUv+b2JQsJxx7--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HLKBC060640 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44HLKEc060639; Mon, 4 May 2009 10:21:20 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from netscalibur-outbound-smtp01.uk.clara.net (netscalibur-outbound-smtp01.uk.clara.net [213.253.59.82]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44HL9fc060629 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:21:19 -0700 (MST) (envelope-from iang@systemics.com)
Received: from skaro.afraid.org ([212.169.1.61]:21902) by relay01.mail.eu.clara.net (smtp-vh.dircon.co.uk [213.253.3.41]:1325) with esmtp id 1M11qk-0002WV-45 (Exim 4.69) (return-path <iang@systemics.com>); Mon, 04 May 2009 18:21:06 +0100
Received: from ip80-101-225-144.hotspotsvankpn.com (localhost.cthulhu.dircon.co.uk [127.0.0.1]) by skaro.afraid.org (Postfix) with ESMTP id 5D21F5D65; Mon,  4 May 2009 18:21:03 +0100 (GMT/BST)
Message-ID: <49FF23FF.9020701@systemics.com>
Date: Mon, 04 May 2009 19:21:03 +0200
From: Ian G <iang@systemics.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: David Shaw <dshaw@jabberwocky.com>
Cc: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: Changing GPG's default key type
References: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
In-Reply-To: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On 4/5/09 16:40, David Shaw wrote:
> We are currently thinking about changing the default primary to
> a 2048-bit RSA key.


I see no problems here, I would agree with the shift to RSA 2048 as the 
default.

iang



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44FVMU1052728 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 08:31:23 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44FVMb5052727; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from relay00.pair.com (relay00.pair.com [209.68.5.9]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n44FVB9L052711 for <ietf-openpgp@imc.org>; Mon, 4 May 2009 08:31:22 -0700 (MST) (envelope-from dkg@fifthhorseman.net)
Received: (qmail 49473 invoked from network); 4 May 2009 15:31:09 -0000
Received: from 216.254.70.154 (HELO ?192.168.23.207?) (216.254.70.154) by relay00.pair.com with SMTP; 4 May 2009 15:31:09 -0000
X-pair-Authenticated: 216.254.70.154
Message-ID: <49FF0A74.5030805@fifthhorseman.net>
Date: Mon, 04 May 2009 11:32:04 -0400
From: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Reply-To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Subject: Re: New results against SHA-1
References: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>
In-Reply-To: <9D828E6C-482D-4AC1-B56F-F3DF3D02E4C7@jabberwocky.com>
X-Enigmail-Version: 0.95.7
OpenPGP: id=D21739E9
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig0EEC22D02892A3EDBBB25B03"
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig0EEC22D02892A3EDBBB25B03
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 04/30/2009 06:39 PM, David Shaw wrote:
>=20
> http://eurocrypt2009rump.cr.yp.to/837a0a8086fa6ca714249409ddfae43d.pdf
>=20
> There is not much hard information yet, but the two big quotes are
> "SHA-1 collisions now 2^52" and "Practical collisions are within
> resources of a well funded organisation."

Ugh.  i didn't think this would happen this soon.

I'd like to formally suggest that we need to re-open this working group
and begin discussion on a new revision of the OpenPGP draft.

Whether or not the above report turns out to have legitimate theoretical
grounding (i've only read the abstract, and don't know if my math would
be sufficient to evaluate a full report anyway), we know that there are
explicit dependencies on SHA-1 in OpenPGP that need to be made more
flexible.

Here are some key points that need to be adjusted w.r.t. digest algorithm=
s:

 a) Fingerprints: these are currently SHA-1 hashes of the public key
mateerial.  One proposal is to continue hashing the exact same data but
to prefix the fingerprint with the canonical name of the digest
algorithm used, separated by an unambiguous delimiter (i'm using -
because : seems pretty overloaded in a lot of places, but i'm sure we
can collaboratively choose a good delimiter).  So in that case, my
current fingerprint would be re-written as:

 SHA1-0EE5BE979282D80B9F7540F1CCD2ED94D21739E9

 b) fix the Revocation Key (subpacket 12) to indicate digest algorithm
and variable length data.  A poorly-worded attempt at a revision:

5.2.3.15.  Revocation Key

   (1 octet of class, 1 octet of public-key algorithm ID, 1 octet of
   digest algorithm, N octets of digest)

   Authorizes the specified key to issue revocation signatures for this
   key.  Class octet must have bit 0x80 set.  If the bit 0x40 is set,
   then this means that the revocation information is sensitive.  If bit
   0x20 is unset, the digest algorithm is assumed to be SHA-1, and no
   octet identifying the digest algorithm is included.  Implementations
   SHOULD set bit 0x20 and explicitly include the hash identifier.
   Other bits are for future expansion to other kinds of authorizations.
   This is found on a self-signature.

   If the "sensitive" flag is set, the keyholder feels this subpacket
   contains private trust information that describes a real-world
   sensitive relationship.  If this flag is set, implementations SHOULD
   NOT export this signature to other users except in cases where the
   data needs to be available: when the signature is being sent to the
   designated revoker, or when it is accompanied by a revocation
   signature from that revoker.  Note that it may be appropriate to
   isolate this subpacket within a separate signature so that it is not
   combined with other subpackets that need to be exported.

 c) settling on a new "lowest-common-denominator" hash aside from SHA-1
(or discarding the idea of a lowest-common-denominator hash?)

Some other possible changes:

 d) suggesting new defaults for key choices (does this mean avoiding
DSA1, for example, or other algorithms that rely on 160-bit hashes?)

 e) allow injection of arbitrary key material at the head of signatures
to allow signers to to avoid a chosen-prefix attack?  This would make it
significantly more difficult to predict the hash that someone will sign,
which makes birthday attack collisions more difficult to pull off since
the signer cannot be compelled to sign a particular hash.

 f) explicit introduction of new hashes/ciphers/asymmetric algorithms?


I've probably missed something.  What else should be addressed?  What
steps are necessary to get the WG back in order again?  Or is that not
needed?

	--dkg


--------------enig0EEC22D02892A3EDBBB25B03
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=q4zH
-----END PGP SIGNATURE-----

--------------enig0EEC22D02892A3EDBBB25B03--



Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Ef55i048913 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n44Ef5lx048912; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from owner-ietf-openpgp@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from walrus.jabberwocky.com (walrus.jabberwocky.com [173.9.29.57]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n44Eerru048893 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 07:41:05 -0700 (MST) (envelope-from dshaw@jabberwocky.com)
Received: from dshaw.nasuni.net (system178.22.202.65 [65.202.22.178] (may be forged)) (authenticated bits=0) by walrus.jabberwocky.com (8.14.3/8.14.3) with ESMTP id n44Eek5u019879 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <ietf-openpgp@imc.org>; Mon, 4 May 2009 10:40:53 -0400
Message-Id: <06737077-FE52-404C-A540-25076B3A8162@jabberwocky.com>
From: David Shaw <dshaw@jabberwocky.com>
To: IETF OpenPGP Working Group <ietf-openpgp@imc.org>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v930.4)
Subject: Changing GPG's default key type
Date: Mon, 4 May 2009 10:40:52 -0400
X-Mailer: Apple Mail (2.930.4)
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

Hi,

Currently, GPG's default key type, the one that is recommended to all  
new users, is a DSA primary key (1024 bits - not "DSA2") with an  
Elgamal subkey.  We are currently thinking about changing the default  
primary to a 2048-bit RSA key.

The main benefits of changing the key type is that it can go past the  
1024 bit DSA1 limit, and would also not be limited to a 160-bit hash,  
both of which are getting a little long in the tooth.  We could get  
similar benefits with a DSA2 key, but DSA2 is not nearly as widely  
implemented as RSA is, so is not a good option for a default key at  
this time.  We will of course continue supporting DSA2 (and DSA "1")  
as we do now.  This is purely a question of what the default key  
should be.

This is not directly prompted by the recent SHA-1 troubles, but it is  
somewhat related, as it would let users of the default key type use  
hashes larger than 160 bits.  That said, this is not intended to be a  
fix for the SHA-1 problems.  We are not proposing changing our default  
signing hash, which will remain SHA-1.

After a bit of internal discussion, we thought it was worth mentioning  
this here, to see if the OpenPGP community had any issue or other  
comments.  I don't expect this to be a particularly controversial  
move, but discussion is always welcome.

One issue, of course, is that RSA is not a required key type in  
OpenPGP, so there could be some implementation out there that won't be  
able to handle it.  I'm not terribly concerned about this, as in  
practice, the vast majority of code has handled RSA just fine for the  
past decade, and if a particular user needs to generate a non-RSA key,  
they can still do so.
There are a few other details (RSA signatures are physically larger,  
etc), but I believe they are outweighed by the benefit of the larger  
key and additional hash flexibility.

David


