Reading new key packages

Andrew Gallagher andrewg at andrewg.com
Fri Jan 19 15:11:54 CET 2024


On 19 Jan 2024, at 08:47, Werner Koch via LibrePGP-discuss <librepgp-discuss at librepgp.org> wrote:
> 
> If we would implement that we need to do this
> 
> if (signature version < 5 or is 6 and has meta data)
>  Print warning that meta data is not protected

That sounds reasonable to me, if the metadata is populated with something. In crypto-refresh, it is recommended that the literal packet filename and timestamp fields are not populated, so in practice this warning should not be triggered very often with v6 sigs.

> Further the presence of a signature salt would also render the signature
> bad given that GnuPG tries to help organizations to protect their
> communication also from insiders by minimizing covert channels.

How do you currently tackle data leakage in signatures, e.g. via hashed-area subpackets? Would any of these techniques be more broadly applicable?

> The involved complexity for the above check is not that high so, thus it
> might eventually be done.

Would you be willing to accept a patch for this?

Thanks,
A

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <https://librepgp.org/pipermail/librepgp-discuss/attachments/20240119/9b84d66a/attachment.sig>


More information about the LibrePGP-discuss mailing list