On Wed, Feb 20, 2013 at 01:34:57AM +0100, Stefan Behte wrote:
> > 2. root key & signing subkey of EITHER: 2.1. DSA, 1024 or 2048 bits
> > 2.2. RSA, >=2048 bits
...
> 1024 DSA keys seem pretty short to me. Surely it might be inconvenient
> for some (2-3? please write a mail here!) people with smart cards. But
> then again, especially people going through the hell of using a
> physical token would understand the need for decent crypto. ;)
A physical token defends against a different method of attack than a
longer key. Simply having a longer key isn't going to help you if store
the key on the laptop and it gets compromised: presuming the attacker
extracts your secret key and passphrase). In such a case, the smartcard
at worst limits him to doing some number of signatures only, or even
better if the reader has a hardwired pinpad, he gets nowhere at all.

Also, if there is a Well-Funded-Organization attacking Gentoo, there are
MUCH more effective ways for them to compromise us. Any perceived gains
in that field from requiring DSA2048 and blocking DSA1024 should be
examined very closely.

> I think key rotation is overdoing it and pretty annoying. Better use a
> non-annoying, long key from the start?
NOWHERE did I require key rotation. Why do you think that I did?
My own key is more than a decade old. I need to see about replacing it
soon, but I've been trying to hold out for the OpenPGP standard to have
ECC included, before I repeat getting my extremely large web-of-trust.

> > 4. If you intend to sign on a slow alternative-arch, you may find 
> > adding a DSA1024 subkey significantly speeds up the signing.
> How slow is that actually? Does it make signing very inconvenient?
> Maybe someone with a slow machine can write about performance and the
> "annoyence-factor"... ;)
Some benchmark results from hake.hppa.dev.g.o, 552Mhz PA-RISC box.

Average of running clearsign ~100 times, for various signature types.
The gpg.conf was set as in my initial post.

DSA1024 0.059830s
DSA2048 0.158800s
DSA3072 0.274850s
RSA1024 0.060020s
RSA2048 0.173070s
RSA4096 0.896480s

For reasons of time, while I wanted to create the keys on the host as
well for timing, I gave up after the first key, DSA1024, took more than
3 minutes (I did ensure that /dev/random was not the blocking factor).

If somebody from MIPS or m68k wants to chime in, I think they probably
have the slowest hardware around presently.

-- 
Robin Hugh Johnson
Gentoo Linux: Developer, Trustee & Infrastructure Lead
E-Mail     : robb...@gentoo.org
GnuPG FP   : 11ACBA4F 4778E3F6 E4EDF38E B27B944E 34884E85

Reply via email to