howto secure older keys after the recent attacks
Philippe Cerfon
philcerf at googlemail.com
Thu Sep 10 23:38:58 CEST 2009
On Thu, Sep 10, 2009 at 5:08 PM, David Shaw <dshaw at jabberwocky.com> wrote:
> The real headache here is (as always) the practical - what to do with
> existing keys and such. I suspect that removing SHA1 would effectively mean
> a new key type for OpenPGP (again, not a disaster - we're on our 4th key
> type today).
Ok,.. but then people would "loose" all their collected signatures on
their keys and to other keys :-(
> That isn't to say there aren't differences between systems - the FreeBSD
> PRNG (which seems to have been inherited by OSX) is of a fairly different
> construction than the Linux one, which has led to some mild controversy in
> the past. Notably, the Linux one blocks if you run out of gathered entropy,
> and the FreeBSD one does not. FreeBSD /dev/random is similar to Linux's
> /dev/urandom.
So I better use Linux and not FreeBSD ;)
> I'm not exactly sure what you mean by "hash algorithm armor". RSA in
> OpenPGP does have a additional protection (usually called a "hash firewall")
> that DSA lacks. This gives some protection against hash substitution
> attacks, but it's not a major deal either way.
Yeah,.. that's the issue I've meant...
> It's true that NIST's guidelines say that to truly get the maximum juice out
> of a 512-bit hash, you should use a 15360-bit key, but that doesn't mean you
> must. That overall strength of the system is the weakest point, so as long
> as that weakest point is strong enough, you're fine.
*still cannot believe, that I've remembered the exact number :-O *
Thanks,
Philippe.
More information about the Gnupg-users
mailing list