Making it simple
Brian M. Carlson
karlsson@hal-pc.org
Sat May 11 07:59:01 2002
--yNb1oOkm5a9FJOVX
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Fri, May 10, 2002 at 06:07:49PM -0400, David Shaw wrote:
> On Fri, May 10, 2002 at 02:35:58PM -0700, Steve Butler wrote:
> > Finally looked the preferences on all the public keys from the folks wi=
th
> > whom we exchange data. Most of them did not have any preference for HA=
SH
> > and COMPRESS methods. What will gpg use?
>=20
> No preference for hash means "SHA1". No preference for compress means
> "ZIP, Uncompressed".
>=20
> Hash doesn't matter much, since nobody uses the hash preference yet.
Hash is supposed to be used if you're say, sending a signed+encrypted email
to somebody, you can choose a hash the recipient can use. The items listed =
in
preferences are supposed to be treated as if they were the only ones the
target implementation supports.
=20
> > And, those two folks having RSA keys have no preferences whatsoever! W=
hat
> > is the default for this case?
>=20
> It depends if they have v3 (PGP2-style) or v4 self-sigs. If the
> self-sig is v4, they have the same default preferences as any v4 key:
> 3DES for cipher, SHA1 for hash, and ZIP+Uncompressed for compression.
> If they have a v3 self-sig, they have no preferences at all, but
> generally this is interpreted as IDEA for cipher, MD5 for hash and ZIP
> for compression.
That is, if the v3 sig is on a v3 key. If the v3 sig is on a v4 key, a
compliant implementation MUST use 3DES, SHA1, and ZIP+Uncompressed if there
are no preferences.
=20
> At least this is GnuPG's behavior. PGP seems to ignore the compress
> preference completely and uses ZIP for everything.
Which is technically permitted, because the specification says that an
implementation may use any method to choose an algorithm in the intersectio=
n.
That is, it's ok as long as the preference is not just Uncompressed.
> > I've set our preferences to be:
> > Cipher: CAST5, AES, AES192, AES256, 3DES
> > Hash: SHA1, RIPEMD160, MD5
> > Compression: ZLIB, ZIP
> >=20
> > PGP 7.0.1 on a Unix box had problems when our preference list was empty=
. As
> > an interim measure I had set our preferences at CAST5, 3DES, SHA1,
> > RIPEMD160, ZIP, ZLIB until earlier today when it was expanded since one
> > client was sending to us using AES (even though it wasn't in our list).
>=20
> This client is violating the standard. Ah well. It doesn't actually
> hurt you since you can decrypt AES (though GnuPG will warn you that
> someone is using a cipher that isn't in your preferences).
>=20
> > Is there a utility that I can use to quickly cycle down through all the
> > encrypted files we have received and report back the Cipher, Hash, and
> > Compression actually used?
>=20
> You might be able to script something with gpg --list-packets, but the
> problem is that the data you need is usually inside the encrypted
> block. You have to decrypt the message to see them.
pgpdump is nice, too.
--=20
Brian M. Carlson
<karlsson@hal-pc.org>
OpenPGP: 0x351336B2DCA1913A
--yNb1oOkm5a9FJOVX
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
Comment: Ubi libertas, ibi patria.
iQEVAwUBPNyzheWR/8lWBVPnAQMi+Af/ZVUB1yKt+fb9ExSvBcPD9cloHk9+Oi67
jImcYvdNu6P+emUuYVoLKsNLrEP6YLAN0Cc3IdM4tGlkMhOBNK4uWL72GlmtFkMG
mS00EMZ4+qZFtYcH6O8pDqe0p0yKeVxiqZEU3zWlFhnnug1mrbOXgdbK/aFwyN0z
rlfcdLf6IaSPCwPawIzEjL088MH64IcjbJSV4Kjf+cKAxswbRUgFV5tebm9zIxXV
yO7/0UK0Koc85D+FutZOJZfHQPRJ91dz8MD3EmzM8x7H5bvDxwaL6ld5VlHxTlTh
NIdYNLmohc9fnHJmeGowHensOjRTFqn0BJfemjP/vRhSgIYs7jFhRQ==
=b+k4
-----END PGP SIGNATURE-----
--yNb1oOkm5a9FJOVX--