
From coruus@gmail.com  Fri Dec 13 07:10:06 2013
Return-Path: <coruus@gmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC2AF1AE309 for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 07:10:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.693
X-Spam-Level: 
X-Spam-Status: No, score=-0.693 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, TRACKER_ID=1.306] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6ri_Hz3M1N2I for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 07:10:03 -0800 (PST)
Received: from mail-yh0-x229.google.com (mail-yh0-x229.google.com [IPv6:2607:f8b0:4002:c01::229]) by ietfa.amsl.com (Postfix) with ESMTP id D4CE31AE2FC for <openpgp@ietf.org>; Fri, 13 Dec 2013 07:10:02 -0800 (PST)
Received: by mail-yh0-f41.google.com with SMTP id f11so1554814yha.14 for <openpgp@ietf.org>; Fri, 13 Dec 2013 07:09:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:from:to:subject:content-type; bh=SWJ0bGEDiB9bd9wTkyiWs0nHtQY+ikaz3tPCcCj/5nc=; b=IV10gNvCs/EPsGgVAiQGvCOuTk2r7+IDh4PSw51Q4dCjN0VxoB346tvXUYSTwYSs87 HfZNsZ7N06s1jaTJ+XpnJ50s2Jt5fGfWBYmQtGYpc3y6rjbqowQjRpOCqRHgVssJzfAj JbfVW1ZGkjjAeBxwaaJY1XgBYp0m3rAJyK1HVH1448d38NWTCoPq5y5rwDxIjF4yt4tC FvrJ0TxvnQnTRtBJglO8miHvXRTtPq+DvLvoaxf7VVP0KbRGxM3Qh7EPpNs0P0m2+uyl Sb5ZFwNeFjuiVyQXOnvBERPaZKBTPJhBDUhbxeOxDtI2AJq/aX0YuTalJMX78C9lI/TH ikDA==
X-Received: by 10.236.74.73 with SMTP id w49mr2350632yhd.87.1386947396399; Fri, 13 Dec 2013 07:09:56 -0800 (PST)
Received: from [127.0.0.1] (ec2-54-235-159-173.compute-1.amazonaws.com. [54.235.159.173]) by mx.google.com with ESMTPSA id q9sm3374272yhk.16.2013.12.13.07.09.54 for <openpgp@ietf.org> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 13 Dec 2013 07:09:54 -0800 (PST)
MIME-Version: 1.0
X-Mailer: Nodemailer (0.5.0; +http://www.nodemailer.com/)
Date: Fri, 13 Dec 2013 07:09:54 -0800 (PST)
Message-Id: <1386947394098.1ce462e@Nodemailer>
X-Orchestra-Oid: A3585368-D800-488D-B2DA-70A3354DAE24
X-Orchestra-Sig: d35218fdb449df693fe47f2049f42726fd47e0a7
X-Orchestra-Thrid: 2CC1C56A-9B07-438F-B466-5CF568B63221
X-Orchestra-Thrid-Sig: 90c8b86650b00295cfe9e66f45916fe5e6c31cde
X-Orchestra-Account: 2e69a42e147f7448f0fa7f704338c45814ddae8d
From: "David Leon Gil" <coruus@gmail.com>
To: openpgp@ietf.org
Content-Type: multipart/alternative; boundary="----Nodemailer-0.5.0-?=_1-1386947394654"
X-Mailman-Approved-At: Fri, 13 Dec 2013 09:13:15 -0800
Subject: [openpgp] OpenPGPv4 long keyid collision test cases?
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Dec 2013 15:12:34 -0000

------Nodemailer-0.5.0-?=_1-1386947394654
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


I recently needed a pair of OpenPGPv4 keys that collided on long key id. So=
 far as I could tell, there aren't any test-cases around. (Maybe I'm =
missing something somewhere=3F)


In any event, I thought that developers of OpenPGPv4-implementing software =
might find these useful as test-cases for correct behavior in the presence =
of 64-bit key id collisions. (It's not clear to me, for example, that =
GnuPG's current behavior is correct, or its output particularly useful when=
 faced with such a collision.)


(These have valid self-certifications of a UID, and so should be importable=
 even by GnuPG.)




Fingerprint: 9E669861368BCA0BE42DAF7D *DDA252EBB8EBE1AF*


- -----BEGIN PGP PUBLIC KEY BLOCK-----

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=3DfDJ8
- -----END PGP PUBLIC KEY BLOCK-----


Fingerprint: A55120427374F3F7AA5F1166 *DDA252EBB8EBE1AF*


- -----BEGIN PGP PUBLIC KEY BLOCK-----

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=3DOEw/
- -----END PGP PUBLIC KEY BLOCK-----


The keys, in binary form, will shortly be available at https://github.=
com/coruus/cooperpair


(Another few colliding pairs, somewhat less lovely, will also be available =
there eventually with the private key parameters, in case anyone would like=
 to generate more complex test-cases; 64-bit issuer ids are used so =
commonly that I suspect it would be useful to test some edge cases that =
arise as a result.)


Apologies if this is otious and I am missing some obvious source of =
examples of these. (I noted many comments online that generating 32-bit =
preimages was 'embarassingly easy'; but no one seems to have bothered to =
make the time/space tradeoff.)


Cheers,


dlg


(Based on current AWS spot prices for a system similar to the one these =
were generated on, it costs << 0.05USD to generate 64-bit key id collisions=
. I arrived at the strategy used to generate these independently, but dkg =
suggested it in an earlier message on this list. Props, as the young folk =
today say.)
-----BEGIN PGP SIGNATURE-----


iQIcBAEBCAAGBQJSqyKgAAoJELU0F64QAAAArqoP/jaJX11UEcCG+mrVzyWHrX19RLdKbyWCsR6=
5
FudC9mltMXDN9aZQmqOnfjbX3lAncyzpG8rbMJsh7d5D+sKEVdbeU7vVKbf5KlZLO061Bl54g6e=
e
1gKBBwOu2WeFHBX0AJgLeBMdvZWEZnOu+VkGcmbn2NYVk4ZXmQP0HtZcd7Iu3W2JBnJyrJSZUB9=
t
vGamu5YYJccsbsRwtoiQepS6VALFNtgSk+z39ySxCGGL3pUOGZExhPzW+3/TLmPwZCZfFKJG1H5=
p
rR/4kt4VVuRo8IZ30D9A5qwP5wlbHJhwH+iwJjh/vgKxnG0EWl9fnuEX3hF2fBXoD82zIWQjGIg=
K
IYARJVAk3rf2zJRLf0TPdx5X9XvyG0n1dc9DtSMfYD9RSHF2EIq40N1UxslDaKOhjbkm1tqFqal=
V
Gs2I6goJrRMDe79cHRZFYA4mSX96ElZXS3IyB+VG/VQQLJDGP5Z+q/NjqY/L27R0ltFSAasbWuM=
p
pCouHdXuQqfRD03FhllSlwRvF/rop58PqLec02/vRHZLAsb6wwzEGKyxh+cD0Bemt63FuGhBN4S=
e
WOCcDVUx9luIt90iKkIZvqZc7Wh74GPyqh76N6Y+88X2xefh+zoOdYd8pC2mzaZYW2wnansH4pX=
8
NtxsgVo092D9TXn4dbCsNy427CGiz/ah/y84zFHq
=3Dm8t9


-----END PGP SIGNATURE-----



=E2=80=94
Sent from Mailbox for iPad
------Nodemailer-0.5.0-?=_1-1386947394654
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE html PUBLIC =22-//W3C//DTD HTML 4.0 Transitional//EN=22 =
=22http://www.w3.org/TR/REC-html40/loose.dtd=22>
<html><body>
<div>
<div>-----BEGIN PGP SIGNED MESSAGE-----</div>
<div>Hash: SHA256</div>
<div><br></div>
<div>I recently needed a pair of OpenPGPv4 keys that collided on long key =
id. So far as I could tell, there aren't any test-cases around. (Maybe I'm =
missing something somewhere=3F)</div>
<div><br></div>
<div>In any event, I thought that developers of OpenPGPv4-implementing =
software might find these useful as test-cases for correct behavior in the =
presence of 64-bit key id collisions. (It's not clear to me, for example, =
that GnuPG's current behavior is correct, or its output particularly useful=
 when faced with such a collision.)</div>
<div><br></div>
<div>(These have valid self-certifications of a UID, and so should be =
importable even by GnuPG.)</div>
<div><br></div>
<div><br></div>
<div>Fingerprint: 9E669861368BCA0BE42DAF7D *DDA252EBB8EBE1AF*</div>
<div><br></div>
<div>- -----BEGIN PGP PUBLIC KEY BLOCK-----</div>
<div><br></div>
<div>mQINBFJtd/UBEACpw/psXoGNM8RHczviD7FnGdjMQPEJQ+nuWQ2AEGYouulg5hFv</div>=

<div>0ChuSQVLiqQht2k5K2liyW1MeXoJ8tr9nSn/Zi9nttc0Wo6K7pvrDD40r2HNg305</div>=

<div>qLCzItr5st3x8cq2cIXvN4LOm2rqpBLZ/sqMmNiW2Y7/aAQqV1xtR35joHqamWHD</div>=

<div>UPOmzBMs07YSUjXgC1EMx8kWQSV6cuARj93kxWj8R6eoYHHfrWCEGR313wov6QST</div>=

<div>zIfVU7FqQqOmdLW3LaPHxcrI/TjsnkUN99qdlpjJH/YW925LDPJHAkliqPP5AvhU</div>=

<div>F9KbY2F8mcIZBCDd8TH+xXynuN3BbIU4kCwVbdx/tcpO1npuJcKB1Go/udyow/Ei</div>=

<div>Z3nHzJsCVkezvopek77wnwPaP0nAb7f4iIY3gJCoGirOx6N075TgF6MBe00q9oFE</div>=

<div>y4rvnUnU9/QzOOes95eUMhM+9eK1cuLFEV5t47DfxRdq+fQip3FJ2l6v19sZvQ0G</div>=

<div>j06pjYqg0of273rG8oXcDrFjb1Zqhj8x1mLl6u7d/ide5wTm9HylBWcYKQjIJJAi</div>=

<div>WIScxEPIOINDJKgsKTuKtoyNvISJ3xUeS1yzxiIb3YGLIyPgFFx0vFyqJfbkXq70</div>=

<div>m1n2xnJlkTidfzbZvc6EA7vRGSDYK6FqqhlGhc7UypUEVW8FM/jZNAOS6QARAUGt</div>=

<div>tCg5RTY2OTg2MTM2OEJDQTBCRTQyREFGN0REREEyNTJFQkI4RUJFMUFGiQI3BBMB</div>=

<div>CgAhBQJSg/uTAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEN2iUuu46+Gv</div>=

<div>+Z0P+wQhkLwm+WGcEsS98Lei9O7hit/k4g/VkLUUQV7BOR3n8uRZIFkdOtpvrFU3</div>=

<div>aKf246uCy6GM48Oh+1U2cv5InX/WEuKaFo5uF6t79wyt18BUn1weDcU+DQdOSG4f</div>=

<div>fSnNa55wkN0l0svW4fGIthjmDTz6HZFntYD+9A20wZAqpPIs+vyG9Jp+e9E9Y/W/</div>=

<div>EFQbNlxHHb9+BMT2+DtNP+HSl3MPFlQPKOLZxyLAU5uzT0Sa0LxhrQy5FgkW6Jog</div>=

<div>sbAJVM9z0pZw+grzGPciM66ZW1rxeICvbYsdWLytRjqxpY8GS8XudyseUGd+dZim</div>=

<div>ptarsrE5yfSMg2gW5Z1PTc0tEMXJLUwtpyzQjpFpbb7dPuo2TUp09LgZKX63WCbS</div>=

<div>Nb1RTaGfkeYudOTo2rh4Jfg+Tb/JRpO6clo0rxAq8nPH2WmG+9TB8Zbb7YRzGWuV</div>=

<div>/e5SeVNR+zY8tXZKnmUIH1HIprc+BtT6Bupdvd0CT14Mg9MmsFvUXofwHLa4gahr</div>=

<div>8/iG9y3uHSA6Rhz++yOpyOmNvO1LDxsYNaRCIXQJbqgNwF5YNYlMPsEeY/CG7FOb</div>=

<div>Afv7rHiYtRRQfz2P4OF900DJO7QL9gdNXJ1+Hajy/5Lvvl7qwqMG4GvVQEsgFc5O</div>=

<div>jjFCUhE2i20j2kEMxvA5RLBH/fOoGARn87tiKSfb+pqLNZQb</div>
<div>=3DfDJ8</div>
<div>- -----END PGP PUBLIC KEY BLOCK-----</div>
<div><br></div>
<div>Fingerprint: A55120427374F3F7AA5F1166 *DDA252EBB8EBE1AF*</div>
<div><br></div>
<div>- -----BEGIN PGP PUBLIC KEY BLOCK-----</div>
<div><br></div>
<div>mQINBFKD+38BEADSv5l4xOx9hCRJVcybq6yK5hTpGSFf3xo1bkhoMvyC62ehb4jD</div>=

<div>MDLwwNRyzCBEWQJLbq/LLizPFN2qXFJpXJcsuqsHNYRtDqDBEjtriRQwSqHnqTXt</div>=

<div>c0K46FYHldCJQ4/tBXxPI+WwtXjcNRWaV7n2BvR/Jk+B5e4Zz3LPnN0C4w5vORHs</div>=

<div>hN1jil8A3Hs/F+OmlQYrU8ZtNwTpSo2EXxe2fVgSDCsKRyNsPZj++OyujPzW+yaN</div>=

<div>lJ9I/q6s9gvX9o9o7nwZbqBETipWsdRK6RfBdTKpnyLNordbWwWTk6GxN8T5Ppit</div>=

<div>P6a3UlQ71VuflcswCTmEQ1pEfZrlRFKa9psBOW+cZLNxT9h0jGFMh6/B3w48Sag+</div>=

<div>cFcPBFWParC+cAXBIURDxT9G6bzNLogg7YKoaPsyiXnLDH2VJUCXs27D2wPJL24Q</div>=

<div>S7npvsg63MPPssWgG5cauLznmNR4y5pQi6oH/C10v0zrUJy6FPJzQhYRhWOvhtz6</div>=

<div>j88RGMrFNNCdB2VACtn699D+ixu3nRlXHIKCT+xLSfgslVYifmJOCNljBLGHOQ1e</div>=

<div>FJxQuNVpmmxjvk/8kqK+pHLB9Qn6M1ZYzip7OyUL3OAWabCabgEw2bQmUhiBWD3u</div>=

<div>buv0WAVOJEAFvBCAeYNQzrQMY+Rc3RnvynG4pI6Tbo8wC6/IJcDOw516JwARASB3</div>=

<div>tChBNTUxMjA0MjczNzRGM0Y3QUE1RjExNjZEREEyNTJFQkI4RUJFMUFGiQI3BBMB</div>=

<div>CgAhBQJSg/uTAhsDBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEN2iUuu46+Gv</div>=

<div>9L0P/3tFu0LOZ/dAPjUNfKJCZqcIuVnD5xShMTsUbVx+QoXMy7rt4iRLD7ofGi/I</div>=

<div>vTAZehxk3sk/Slx5nbews+3NItyw6mcaP9HlmwKNr6k7BC2kJHcCxH4DNzhmIx1H</div>=

<div>3T/CggtHX42JBYKlGf22y+M8jAbvsPOUfTznx96mYNrOY6s1dJyn0kRleqJ8+tGj</div>=

<div>/5+0y90iZnGCa0FtacQkKUPkXwVodeZVxk8z5OEipShYKc+8dl+5WsvOzHqLC/KY</div>=

<div>xCGRb4JaqEMwouLNg8dTNAXXUvFGqJNDX4+andggogmI1hdD9xExfSU9cAGegg2t</div>=

<div>vvveC4S+CCHd+zt88iK5ze6F61RxwYhhNbkuFGjdgNGCpHtG/BQhKnYJuKEbq3oi</div>=

<div>mgNyxJERlfgaWXveiMG0AmACXN+jCkTtqZjQnsg2N2QDL3tjY7usmuiwRL1aVOFG</div>=

<div>Kw5/Cc+2nDeANS3Xi1403Ni269b1c6kNSoLe4zd0WsbO3Kouds8F8EQfeheXQe97</div>=

<div>ZxuvBOMsR9wHC3f0sl/vfxCGdUC+khmKk5taKnUeUFJmVmh5ghlVy8FySHGB0QHO</div>=

<div>zd8GUl59rFpQJNpNFQW2YKDhrcjxIr2AeJrdoDI6NsQ02+Qtep/bbq53hqtAD4jF</div>=

<div>t3S8vBbTXtRk6g2qn4ojF4SOIc8SAiZcURgVFuSJX8ngFbO4</div>
<div>=3DOEw/</div>
<div>- -----END PGP PUBLIC KEY BLOCK-----</div>
<div><br></div>
<div>The keys, in binary form, will shortly be available at https://github.=
com/coruus/cooperpair</div>
<div><br></div>
<div>(Another few colliding pairs, somewhat less lovely, will also be =
available there eventually with the private key parameters, in case anyone =
would like to generate more complex test-cases; 64-bit issuer ids are used =
so commonly that I suspect it would be useful to test some edge cases that =
arise as a result.)</div>
<div><br></div>
<div>Apologies if this is otious and I am missing some obvious source of =
examples of these. (I noted many comments online that generating 32-bit =
preimages was 'embarassingly easy'; but no one seems to have bothered to =
make the time/space tradeoff.)</div>
<div><br></div>
<div>Cheers,</div>
<div><br></div>
<div>dlg</div>
<div><br></div>
<div>(Based on current AWS spot prices for a system similar to the one =
these were generated on, it costs &lt;&lt; 0.05USD to generate 64-bit key =
id collisions. I arrived at the strategy used to generate these =
independently, but dkg suggested it in an earlier message on this list. =
Props, as the young folk today say.)</div>
<div>-----BEGIN PGP SIGNATURE-----</div>
<div><br></div>
<div>iQIcBAEBCAAGBQJSqyKgAAoJELU0F64QAAAArqoP/jaJX11UEcCG+mrVzyWHrX19RLdKby=
WCsR65</div>
<div>FudC9mltMXDN9aZQmqOnfjbX3lAncyzpG8rbMJsh7d5D+sKEVdbeU7vVKbf5KlZLO061Bl=
54g6ee</div>
<div>1gKBBwOu2WeFHBX0AJgLeBMdvZWEZnOu+VkGcmbn2NYVk4ZXmQP0HtZcd7Iu3W2JBnJyrJ=
SZUB9t</div>
<div>vGamu5YYJccsbsRwtoiQepS6VALFNtgSk+z39ySxCGGL3pUOGZExhPzW+3/TLmPwZCZfFK=
JG1H5p</div>
<div>rR/4kt4VVuRo8IZ30D9A5qwP5wlbHJhwH+iwJjh/vgKxnG0EWl9fnuEX3hF2fBXoD82zIW=
QjGIgK</div>
<div>IYARJVAk3rf2zJRLf0TPdx5X9XvyG0n1dc9DtSMfYD9RSHF2EIq40N1UxslDaKOhjbkm1t=
qFqalV</div>
<div>Gs2I6goJrRMDe79cHRZFYA4mSX96ElZXS3IyB+VG/VQQLJDGP5Z+q/NjqY/L27R0ltFSAa=
sbWuMp</div>
<div>pCouHdXuQqfRD03FhllSlwRvF/rop58PqLec02/vRHZLAsb6wwzEGKyxh+cD0Bemt63FuG=
hBN4Se</div>
<div>WOCcDVUx9luIt90iKkIZvqZc7Wh74GPyqh76N6Y+88X2xefh+zoOdYd8pC2mzaZYW2wnan=
sH4pX8</div>
<div>NtxsgVo092D9TXn4dbCsNy427CGiz/ah/y84zFHq</div>
<div>=3Dm8t9</div>
<div><br></div>
<div>-----END PGP SIGNATURE-----</div>
</div>
<div><br></div>
<div class=3D=22mailbox=5Fsignature=22>&mdash;<br>Sent from <a =
href=3D=22https://www.dropbox.com/mailbox=22>Mailbox</a> for iPad</div>
</body></html>

------Nodemailer-0.5.0-?=_1-1386947394654--

From nicholas.cole@gmail.com  Fri Dec 13 10:19:21 2013
Return-Path: <nicholas.cole@gmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26F4F1AE6E9 for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 10:19:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SM970xby0Czb for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 10:19:19 -0800 (PST)
Received: from mail-ee0-f54.google.com (mail-ee0-f54.google.com [74.125.83.54]) by ietfa.amsl.com (Postfix) with ESMTP id DD5961AE6E8 for <openpgp@ietf.org>; Fri, 13 Dec 2013 10:19:18 -0800 (PST)
Received: by mail-ee0-f54.google.com with SMTP id e51so878245eek.27 for <openpgp@ietf.org>; Fri, 13 Dec 2013 10:18:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=bvhV3+II+ZrX0HkMfsvDhxSWZtspKHJqeCc5/qlRHYQ=; b=VLSZ0wM0paK/MEVOHkezNE8kJ/vJyD/UcDtpo+CX4eNL6JwZkioyzqRw7fMf4YNbhQ BHtb+PwQAJBVN8fiGtar+FIJNnIlMbGoIIOrigrSlL3KXOMlntOEhvXqjpNolQc88DRs y66rNy4PVmdVqsD3tPzbS16SadCf0YKPEbnyzYx3pL1gkNmhkGZrrr03xV1orpgBF4tE jX9wBsTIjWtBQJhRTimrYgkw+oxlGGzh6fL3CfIJ6r7ZzO4Ee6V49qKVuByK7T1EmamJ M2+s81qTCEQpUYDiqYjgMNVg6ayJrSq99x/MvXCDNVAogaKQXWAHHvWeUmcJAnySprQS EUww==
MIME-Version: 1.0
X-Received: by 10.15.109.205 with SMTP id cf53mr4387443eeb.30.1386958717052; Fri, 13 Dec 2013 10:18:37 -0800 (PST)
Received: by 10.14.115.8 with HTTP; Fri, 13 Dec 2013 10:18:36 -0800 (PST)
In-Reply-To: <1386947394098.1ce462e@Nodemailer>
References: <1386947394098.1ce462e@Nodemailer>
Date: Fri, 13 Dec 2013 18:18:36 +0000
Message-ID: <CAAu18hfipgtcg6+EJvqoX6Bn7apNz=aQ8=8gHjMJqcg6PFUfGw@mail.gmail.com>
From: Nicholas Cole <nicholas.cole@gmail.com>
To: David Leon Gil <coruus@gmail.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: openpgp@ietf.org
Subject: Re: [openpgp] OpenPGPv4 long keyid collision test cases?
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Dec 2013 18:19:21 -0000

On Fri, Dec 13, 2013 at 3:09 PM, David Leon Gil <coruus@gmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> I recently needed a pair of OpenPGPv4 keys that collided on long key id. So
> far as I could tell, there aren't any test-cases around. (Maybe I'm missing
> something somewhere?)

Very interesting.  I can't actually import those keys on GnuPG 2.0.20.
 I get the error "Doesn't match our copy" when I try.

Should you forward your original mail to the gpg developers' list?

N.

From wk@gnupg.org  Fri Dec 13 13:41:08 2013
Return-Path: <wk@gnupg.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E483C1AE1B2 for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 13:41:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oEqBblkjhy7q for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 13:41:05 -0800 (PST)
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [217.69.77.222]) by ietfa.amsl.com (Postfix) with ESMTP id 44CE41AE052 for <openpgp@ietf.org>; Fri, 13 Dec 2013 13:41:05 -0800 (PST)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.80 #2 (Debian)) id 1VraTi-0000A6-4R for <openpgp@ietf.org>; Fri, 13 Dec 2013 22:40:58 +0100
Received: from wk by vigenere.g10code.de with local (Exim 4.80 #3 (Debian)) id 1VraMr-0005LW-35; Fri, 13 Dec 2013 22:33:53 +0100
From: Werner Koch <wk@gnupg.org>
To: "David Leon Gil" <coruus@gmail.com>
References: <1386947394098.1ce462e@Nodemailer>
Organisation: g10 Code GmbH
X-message-flag: Mails containing HTML will not be read! Please send only plain text.
OpenPGP: id=1E42B367; url=finger:wk@g10code.com
Date: Fri, 13 Dec 2013 22:33:53 +0100
In-Reply-To: <1386947394098.1ce462e@Nodemailer> (David Leon Gil's message of "Fri, 13 Dec 2013 07:09:54 -0800 (PST)")
Message-ID: <87eh5gmo5a.fsf@vigenere.g10code.de>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Cc: openpgp@ietf.org
Subject: Re: [openpgp] OpenPGPv4 long keyid collision test cases?
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Dec 2013 21:41:09 -0000

On Fri, 13 Dec 2013 16:09, coruus@gmail.com said:

> In any event, I thought that developers of OpenPGPv4-implementing
> software might find these useful as test-cases for correct behavior in
> the presence of 64-bit key id collisions. (It's not clear to me, for
> example, that GnuPG's current behavior is correct, or its output
> particularly useful when faced with such a collision.)

Thanks, that is useful stuff for regression tests.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


From adam@cypherspace.org  Fri Dec 13 13:55:07 2013
Return-Path: <adam@cypherspace.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 685E01ADF6C for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 13:55:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4dcnvb3QZYoU for <openpgp@ietfa.amsl.com>; Fri, 13 Dec 2013 13:55:05 -0800 (PST)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.194]) by ietfa.amsl.com (Postfix) with ESMTP id ADD5D1AE3AB for <openpgp@ietf.org>; Fri, 13 Dec 2013 13:55:05 -0800 (PST)
Received: from netbook (184-94-60-58.dedicated.allstream.net [184.94.60.58]) by mrelay.perfora.net (node=mrus4) with ESMTP (Nemesis) id 0MS65a-1VxkZQ18Q6-00Sp6o; Fri, 13 Dec 2013 16:54:58 -0500
Received: by netbook (Postfix, from userid 1000) id 239CC2E49D9; Fri, 13 Dec 2013 22:54:49 +0100 (CET)
Received: by flare (hashcash-sendmail, from uid 1000); Fri, 13 Dec 2013 22:54:43 +0100
Date: Fri, 13 Dec 2013 22:54:42 +0100
From: Adam Back <adam@cypherspace.org>
To: David Leon Gil <coruus@gmail.com>
Message-ID: <20131213215442.GA28709@netbook.cypherspace.org>
References: <1386947394098.1ce462e@Nodemailer> <87eh5gmo5a.fsf@vigenere.g10code.de>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Disposition: inline
In-Reply-To: <87eh5gmo5a.fsf@vigenere.g10code.de>
User-Agent: Mutt/1.5.21 (2010-09-15)
X-Hashcash: 1:20:131213:coruus@gmail.com::jgbOSpJy5LOQUbbE:0KfSs
X-Hashcash: 1:20:131213:openpgp@ietf.org::XlhcwM/ojvw0Shgh:0E6Nm
X-Hashcash: 1:20:131213:adam@cypherspace.org::VF5J8Pljf0oAQV08:00000000000000000 0000000000000000000000003qF3
X-Provags-ID: V02:K0:60eZNGbsPUeXzbCvV/1/qhw18aJaAMTSgZznBN8eDvb 7TfP3W/lqyJtvqENxlxd5fHGG7StVMpXBj0Hfye21GDUVC9s5h inJd5tDh8yQ0Lx2HW3xnyaMpc+q2B8Q2sThbTlk7qQx0d6FCbW ZXIqz3UK5CJvYimerZ9/LIBq2OKF7hmFbwsdiaB2eHfWDvROiW ZhMTtlhWM9Df+xQSmb582J1T0NOzwOMwfupwHA1g5R/MQUanOq CXW+A6i2rD5B2uwNms29KIgM2HIkHlJQCKcuJd9FHJFM7TvK9N 1uinqMDivqde5KkCR7SEtihL8G/Ix90zQ8ymuvfk6RhqOfT8+b ovFtoZBuogBIE/a/6yLSfNtBpN9SwoZ6dnf9D4is5
Cc: openpgp@ietf.org, Adam Back <adam@cypherspace.org>
Subject: Re: [openpgp] OpenPGPv4 long keyid collision test cases?
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Dec 2013 21:55:07 -0000

Out of interest, I presume you made it via a birthday collision?

Adam

On Fri, Dec 13, 2013 at 10:33:53PM +0100, Werner Koch wrote:
>On Fri, 13 Dec 2013 16:09, coruus@gmail.com said:
>
>> In any event, I thought that developers of OpenPGPv4-implementing
>> software might find these useful as test-cases for correct behavior in
>> the presence of 64-bit key id collisions. (It's not clear to me, for
>> example, that GnuPG's current behavior is correct, or its output
>> particularly useful when faced with such a collision.)
>
>Thanks, that is useful stuff for regression tests.
