struggling with potential keyid conflicts

Jim Hurd jimh at datagrove.com
Tue Jan 27 11:36:06 CET 2004


Thanks! I didn't realize that 64 bit ids and fingerprints are accepted interchangeably with 32 bit ids.

Do you know where keyservers are with this issue? I tried:

gpg --keyserver pgp.mit.edu --recv-key  0x5BD18B6A42B9247EF79214B7F87A2B53DEADBEEF

And it gives the same result as

gpg --keyserver pgp.mit.edu --recv-key  0xDEADBEEF

So either GPG or pgp.mit.edu is peeling off the lower 32 bits and calling it good enough. I suppose no harm is done, since if I know the fingerprint I want there is no serious harm in loading the extraneous keys.

Jim

----- Original Message ----- 
From: "David Shaw" <dshaw at jabberwocky.com>
To: <gnupg-users at gnupg.org>
Sent: Tuesday, January 27, 2004 10:22 AM
Subject: Re: struggling with potential keyid conflicts


> On Tue, Jan 27, 2004 at 09:01:15AM -0500, Jim Hurd wrote:
> 
> > But is this a reasonable way to proceed? Am I missing some part of
> > the design idea here? I am writing documentation for GPG use for a
> > group of organizations where it makes some sense to use keyservers
> > to distribute keys, but the threat of forged keyid's is a concern.
> 
> The part you are missing is that key IDs are not 32 bits long - they
> are 64 bits long.  GnuPG displays only the 8 character (32 bit) key ID
> for convenience, but internally it uses all 64 bits.  If you happen to
> have a 32 bit collision, use the full 64 bits.
> 
> $ gpg --list-keys 0xdeadbeef
> pub   1024D/DEADBEEF 2001-01-21 Preston Wilson <pres at palmjunkie.com>
> uid                             Imad R. Faiad
> sub   2048g/27D72110 2001-06-24
>  
> pub   2048R/DEADBEEF 1999-08-03 Imad R. Faiad
>  
> pub   1024R/DEADBEEF 1995-09-28 Prime Rib Lovers
> 
> Three keys with the same keyids?  Nope:
> 
> $ gpg --list-keys 0xF87A2B53DEADBEEF
> pub   1024D/F87A2B53DEADBEEF 2001-01-21
> uid                          Preston Wilson <pres at palmjunkie.com>
> uid                          Imad R. Faiad
> sub   2048g/A9452D5227D72110 2001-06-24
> 
> $ gpg --list-keys 0xA2061199DEADBEEF
> pub   2048R/A2061199DEADBEEF 1999-08-03
> uid                          Imad R. Faiad
> 
> $ gpg --list-keys 0xA69AB99CDEADBEEF 
> pub   1024R/A69AB99CDEADBEEF 1995-09-28
> uid                          Prime Rib Lovers
> 
> It is "difficult" (i.e. nearly impossible) to create a 64-bit keyid
> collision with OpenPGP keys.  If the impossible happens, and there is
> a 64-bit keyid collision, use the whole fingerprint:
> 
> gpg --list-keys 0x5BD18B6A42B9247EF79214B7F87A2B53DEADBEEF
> 
> Note that all this applies to OpenPGP (v4) keys.  The old PGP 2.x (v3)
> keys have trivially forgeable keyids and fingerprints.  There is no
> way to really secure against that, as it is inherent in the key
> format.  Don't use them.
> 
> David
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users



More information about the Gnupg-users mailing list