Reading new key packages
Andrew Gallagher
andrewg at andrewg.com
Fri Jan 19 15:11:54 CET 2024
On 19 Jan 2024, at 08:47, Werner Koch via LibrePGP-discuss <librepgp-discuss at librepgp.org> wrote:
>
> If we would implement that we need to do this
>
> if (signature version < 5 or is 6 and has meta data)
> Print warning that meta data is not protected
That sounds reasonable to me, if the metadata is populated with something. In crypto-refresh, it is recommended that the literal packet filename and timestamp fields are not populated, so in practice this warning should not be triggered very often with v6 sigs.
> Further the presence of a signature salt would also render the signature
> bad given that GnuPG tries to help organizations to protect their
> communication also from insiders by minimizing covert channels.
How do you currently tackle data leakage in signatures, e.g. via hashed-area subpackets? Would any of these techniques be more broadly applicable?
> The involved complexity for the above check is not that high so, thus it
> might eventually be done.
Would you be willing to accept a patch for this?
Thanks,
A
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <https://librepgp.org/pipermail/librepgp-discuss/attachments/20240119/9b84d66a/attachment.sig>
More information about the LibrePGP-discuss
mailing list