On May 4, 2009, at 1:40 PM, Christoph Anton Mitterer wrote:

On Sun, 2009-05-03 at 22:56 -0400, David Shaw wrote:
It's important to remember that this isn't a completely SHA-1 free
key, as that is not currently possible in the OpenPGP protocol, but it
is possible to make a "use as little SHA-1 as possible key".
Is there anything else than the fingerprint for the revocation
signatures and MDC?

I believe that's it. Fingerprints, revocation signatures (which use fingerprints internally), and the MDC.

The end result will be a key that does not use SHA-1 either in its
internal construction or in signatures it makes elsewhere.  Keep in
mind that there are some clients out there that simply cannot cope
with this key and will reject it with one failure message or another.
The most recent versions of either PGP or GPG can handle it just fine.
What would you suggest for existing RSA/DSA2 keys that always used SHA1
for their self-sigs and cert-sigs on other keys?
Should those be recreated with the "better" hash algo?

While I would start (did start, actually, a few years ago) using SHA-256 to certify other people's keys, I wouldn't bother re-issuing older SHA-1 certifications.

Re-issuing your self-sigs is more or less harmless. The keyservers never delete anything, so they'll end up with both the old and new. Assuming all works properly, the newer clients should end up using the newer selfsig, and the older clients should keep using the old one (as they won't be able to verify the new one). If you're distributing your key outside of the keyservers, then you can go further and strip off the old SHA-1 selfsig. If you do this, you can end up breaking compatibility with some non-zero percentage of the community. The exact amount of breakage depends on your particular circle of correspondents and how often they upgrade, etc.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to