Infrastructure support for GnuPG post-quantum keys
have at anonymous.sex
have at anonymous.sex
Tue Jan 7 05:09:52 CET 2025
On Mon, 06 Jan 2025 09:09:28 +0100, Werner Koch <wk at gnupg.org> wrote
(quotes rearranged):
>For initail key discovering (lookup) there are better methods:
Thanks for the tips.
>- Send the key with your initial may and start to build up trust.
>(after all there must be some reason that you trust a mail address)
A question of netiquette: Is it acceptable to do this on a first post
to a public list?
To the end stated in OP, I have taken the liberty of hereby attaching a
LibrePGP key with hybrid post-quantum encryption subkey and with the OCB
feature flag enabled. But I would not ordinarily send a key to a
list—not even once (and especially not when FIPS 205/SPHINCS+ with its
large signatures is implemented and used for long-term identity
certification [C] keys). It was my primary motive for attempting the
keyserver.
When cold-contacting a stranger, I habitually attach one or more PGP
keys as MIME type application/pgp-keys. Users of some mail clients may
need to be cautious about a wrong MIME type.
>-[...more suggestions...]
>
>- Distribute the key along with your mail address using the Web Key
>directory.
What is the best practice for using WKD to distribute multiple keys for
the same mail address, potentially with different PGP version bytes
(v4/v5) during a time when early adopters of a new version want to
continue supporting an obsolete version for awhile? In preparation
maybe to set up a WWW site, I’ve been intending to write a separate
thread about that... here goes:
§ 3.1 of WKD (draft 19) states that a keyserver “may” return a revoked
key and a new key in a single request as “concatenated key blocks”.
However, it does not address the cases of:
* Multiple valid keys.
* WKD client acceptance of a key in a recognized version, when it is
concatenated (prepended or appended) with a key is in an unrecognized
version. (It is presumed here that the packet formats are the same “New
Format Packet” as defined in RFC4880/LibrePGP § 4.2; otherwise, it looks
like binary garbage and packet lengths cannot be parsed.)
* Prioritization of keys. Prefer first? Last? Highest version? Best
crypto?
As a practical matter, in-the-wild client behavior needs to be tested.
It’s a nontrivial problem; one of the major WKD clients is a “web app”
which cannot be installed and scripted in a controlled test environment
without an account on a remote server.
GnuPG’s behavior should also be tested by concatenating a v4/v5 key with
a key in a nonexistent packet version, say v255. If I take this up
sometime, I will post to -devel.
I hope that I can find some automagical way for WKD to make all
correspondents use the best key for me that they support, until I fully
deprecate v4 keys.
Not-quite-OT:
>The concept of public keyservers is dead. It worked well in a past
>Internet with mostly friendly inhabitants. But we are not anymore in
>the 90ies and DoS is a major concern. There is also the false
>assumption of many users that keys from a keyserver are in any way
>trustworthy.
And we are not anymore in the 90ies when the zeroth rule of security was
not to run network-loaded executable code, most tech-savvy people
disabled javascript and java in their WWW browsers (duh), people did not
hide their mail addresses (good), mailservers accepted mail from
friendly strangers without a stupid robot passing judgment on whether it
should be silently junked (good), nobody except plan9 had proper UTF-8
support (bad), timestamps were absolute and not relative time (good),
SSL was only for shopping (bad), PGP users blithely documented their
social graphs via Web of Trust (bad; thanks for GnuPG’s TOFU mode), the
future author of NaCl had also not yet invented the term “post-quantum
crypto” :-(, and people cared enough to have RSA tattoos and blue
ribbons and such.
Did you know that early Hotmail worked in Lynx? (Without PGP, of
necessity for a few months when I was young and had limited options for
Net access.) Their frameset was tricky to navigate in Lynx, but it did
work.
Not to put too fine a point on it, but I think getting more in-the-wild
user PQ keys for the first major \*PGP implementation with usable PQ
encryption would be consistent with the spirit of the Net. GnuPG 2.5.1
30 days after NIST final FIPS-203 = write code, protect users.
--
# Remember these on Wednesday, January 15, 2025:
https://web.archive.org/web/19971024171609/http://www.eff.org/blueribbon.html
https://web.archive.org/web/19971114041230/http://www.eff.org/pub/Legal/Cases/ACLU_v_Reno/19970626_eff_cda.announce
https://www.supremecourt.gov/search.aspx?filename=/docket/docketfiles/html/public/23-1122.html
-------------- next part --------------
A non-text attachment was scrubbed...
Name: have-post-quantum-anonymous-sex.asc
Type: application/pgp-keys
Size: 3106 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20250107/4732a382/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 297 bytes
Desc: not available
URL: <https://lists.gnupg.org/pipermail/gnupg-users/attachments/20250107/4732a382/attachment.sig>
More information about the Gnupg-users
mailing list