On Tue, Mar 04, 2014 at 08:10:47PM +0100, Ondrej Surý wrote: > On Mon, Mar 3, 2014, at 19:13, Gunnar Wolf wrote: > > As keyring maintainers, we no longer consider 1024D keys to be > > trustable. We are not yet mass-removing them, because we don't want to > > hamper the project's work, but we definitively will start being more > > aggressively deprecating their use. 1024D keys should be seen as > > brute-force vulnerable nowadays. Please do migrate away from them into > > stronger keys (4096R recommended) as soon as possible. > > I am not sure what's the timeframe for GnuPG 2.1.0[1] release, but would > it be possible to skip the RSA and go directly for ECDSA, before we > start deprecating DSA? Or at least have an option to do so? (Well, > unless GnuPG 2.1 release is too much far in the future.)
Do you have any idea which curves and/or signature algorithms are supported? I think I would like to see EdDSA in that case. I would also like to see that they get started on PGP v5. Kurt -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140304225640.ga11...@roeckx.be