Key Transition Letter 2009-05-21

gpg2.20.maniams at dfgh.net gpg2.20.maniams at dfgh.net
Sun May 24 04:43:33 CEST 2009


Dear Robert

On Sun, May 24, 2009 at 6:42 AM, Subu <gpg2.20.maniams at dfgh.net> wrote:

>
>
> On Sun, May 24, 2009 at 6:15 AM, Robert J. Hansen - rjh at sixdemonbag.org
> <+gpg2+maniams+ba4eefb302.rjh#sixdemonbag.org at spamgourmet.com> wrote:
>
>> gpg2.20.maniams at dfgh.net wrote:
>> > What are the algos that are compromised ? or NOT to be used ? If this is
>> > too long a list
>>
>> Sorry to be so late to the party --
>>
>> As of this writing, no algorithm supported by GnuPG has been
>> compromised.  Even MD5 is still on its feet.
>>
>> That said, the SHA-1 and MD5 algorithms are both looking a little shaky,
>> and generally the recommendation seems to be to move away from those
>> algorithms.
>>
>> All other algorithms supported by GnuPG are in good shape.
>>
>> > I understand that choosing the key size and algo is something personal
>> > and others cant decide..... but I'm trying to know the choice ....
>>
>> Please don't do this.  The defaults are the defaults for a very good
>> reason: they're good defaults.  With the exception of "move away from
>> SHA1", please do not mess around with the defaults more than you
>> absolutely have to.
>>
>


>
>
>
> Thanks for the reply and advice. I shall follow the same
>
> Regards
> maniams
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20090524/e10b09a6/attachment.htm>


More information about the Gnupg-users mailing list