my gpg key does not conform to rfc4880?

2013-10-10 Thread Brian J. Murrell
I was told by a developer of a piece of software that my key does not
conform to rfc4800.  He said:

  According to http://tools.ietf.org/html/rfc4880#section-5.2.2
  signatures of version 3 don't have subpackets, which are only
  available in version 4.

  Looks like your key from 1998 is not compliant to RFC4880.

Do I have any recourse other than to generate a new key?

Cheers,
b.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: my gpg key does not conform to rfc4880?

2013-10-10 Thread Daniel Kahn Gillmor
On 10/10/2013 01:45 PM, Brian J. Murrell wrote:
> I was told by a developer of a piece of software that my key does not
> conform to rfc4800.  He said:
> 
>   According to http://tools.ietf.org/html/rfc4880#section-5.2.2
>   signatures of version 3 don't have subpackets, which are only
>   available in version 4.
> 
>   Looks like your key from 1998 is not compliant to RFC4880.
> 
> Do I have any recourse other than to generate a new key?

your key 0x9771109462F2B970 appears to be an OpenPGPv4 key, not an
OpenPGPv3 key, so i'm not sure what the person you were talking to was
talking about.

that said, 0x9771109462F2B970 claims to have been generated on
1998-02-16, and is a 1024-bit DSA key.  This is a weak key by today's
standards, and the fact that it has been in use for over 15 years makes
me think that you should probably generate a new primary key anyway.

You don't have to revoke your old key immediately, of course, but you
probably want to move to something stronger sooner rather than later.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: my gpg key does not conform to rfc4880?

2013-10-10 Thread David Shaw
On Oct 10, 2013, at 1:45 PM, "Brian J. Murrell"  wrote:

> I was told by a developer of a piece of software that my key does not
> conform to rfc4800.  He said:
> 
>  According to http://tools.ietf.org/html/rfc4880#section-5.2.2
>  signatures of version 3 don't have subpackets, which are only
>  available in version 4.
> 
>  Looks like your key from 1998 is not compliant to RFC4880.
> 
> Do I have any recourse other than to generate a new key?

Probably, but without seeing the key it is hard to be completely sure.  Most 
likely, you could just strip the poison signature from your key and keep using 
it.  If it's a self-signature, you'll have to make another one.  If it's a 
signature from someone else, you can either disregard it, or ask them to 
re-sign your key.

Can you say what the software that rejected your key is?  If you think about 
it, rejecting a key because of a bad signature could lead to an denial of 
service attack - just upload a signature that is noncompliant enough to cause 
the key to be rejected, but compliant enough to make it onto a keyserver.  Is 
your key with the bad signature on a keyserver?

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: my gpg key does not conform to rfc4880?

2013-10-10 Thread Brian J. Murrell
On 13-10-10 02:02 PM, Daniel Kahn Gillmor wrote:
> 
> your key 0x9771109462F2B970 appears to be an OpenPGPv4 key, not an
> OpenPGPv3 key, so i'm not sure what the person you were talking to was
> talking about.

Ahh.  Interesting.  I will point that out to him.

> that said, 0x9771109462F2B970 claims to have been generated on
> 1998-02-16, and is a 1024-bit DSA key.  This is a weak key by today's
> standards, and the fact that it has been in use for over 15 years makes
> me think that you should probably generate a new primary key anyway.

Yeah.  I have considered both of those things also.  I guess the only
thing that was holding me back was that the existing key has an
investment in signatures on it though.  What I am unclear about is how
the authenticity and trustibility of my new key will be regarded in
relation to the existing key with all of the signatures on it.

Cheers,
b.






signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: my gpg key does not conform to rfc4880?

2013-10-10 Thread Daniel Kahn Gillmor
On 10/10/2013 03:12 PM, Brian J. Murrell wrote:

> Yeah.  I have considered both of those things also.  I guess the only
> thing that was holding me back was that the existing key has an
> investment in signatures on it though.  What I am unclear about is how
> the authenticity and trustibility of my new key will be regarded in
> relation to the existing key with all of the signatures on it.

none of the above concerns should keep you from creating a new, stronger
key and starting to gather certifications on it.  You can still keep
your old key for places where more certifications matter, and start
using your new key in places where stronger keys matter.  Do this until
you feel comfortable that your new key has gathered enough
certifications to be useful in both places, at which point you can
revoke your old key.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


First steps with GPG, am I off to a good start?

2013-10-10 Thread Robin Kipp
Hello all,
I'd like to get started using GPG on a regular basis, e.g. to sign my EMail 
messages and exchange encrypted messages with a few people. So, I just 
generated my first keys in this manner:
1. Booted to a secure system.
2. invoked GPG using the following command:
gpg --expert --gen-key
3. Generated an RSA key with signing and certification capabilities and 2048 
bits in length.
4. Edited the key using gpg --edit-key in order to add all required UIDs.
5. Invoked addkey to generate a 2048 bit RSA sub key, with encryption and 
signing capabilities.
6. Exported all secret and public keys to a secure medium, also exported the 
secret sub keys.
7. Rebooted to my production system, imported the public keys and the secret 
subkeys.
The listing now looks as follows.
For public keys:
MacBook-Pro:~ robin$ gpg --list-keys DC329876
pub   2048R/DC329876 2013-10-10
uid  Robin Kipp 
uid  Robin Kipp 
uid  Robin Kipp 
sub   2048R/77DFFF08 2013-10-10 [expires: 2013-11-09]

For secret keys:
MacBook-Pro:~ robin$ gpg --list-secret-keys DC329876
sec#  2048R/DC329876 2013-10-10
uid  Robin Kipp 
uid  Robin Kipp 
uid  Robin Kipp 
ssb   2048R/77DFFF08 2013-10-10 [expires: 2013-11-09]

I'm signing this message using this subkey - and since this may not be widely 
available on keyservers just yet, the public key is at the end of this message.
Could someone on this list perhaps be so kind and see if I've made any 
mistakes? I set the subkey to expire in a month just incase something went 
wrong with it, as I'd like to get it right before starting to effectively use 
it…
Many thanks for any help!
Robin

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG/MacGPG2 v2.0.20 (Darwin)
Comment: GPGTools - https://gpgtools.org
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Re: First steps with GPG, am I off to a good start?

2013-10-10 Thread Robert J. Hansen
On 10/10/2013 7:25 PM, Robin Kipp wrote:
> 2. invoked GPG using the following command:
> gpg --expert --gen-key

Leave off the 'expert' flag and just use the defaults.  Seriously, the
defaults are reasonable and don't need tweaking.  :)



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: First steps with GPG, am I off to a good start?

2013-10-10 Thread Hauke Laging
Am Fr 11.10.2013, 01:25:50 schrieb Robin Kipp:

> Invoked addkey to generate a 2048 bit RSA sub key, with
> encryption and signing capabilities.

It seems to me that the more accepted recommendation here is to have separate 
subkeys for signing and encryption.


> 6. Exported all secret and public keys
> to a secure medium, also exported the secret sub keys. 7. Rebooted to my
> production system, imported the public keys and the secret subkeys.

> For public keys:
> MacBook-Pro:~ robin$ gpg --list-keys DC329876
> pub   2048R/DC329876 2013-10-10
> uid  Robin Kipp 
> uid  Robin Kipp 
> uid  Robin Kipp 
> sub   2048R/77DFFF08 2013-10-10 [expires: 2013-11-09]

I know of no good reason for creating a mainkey without expiration date.

Furthermore it would be nice to have a UID without email address but with a 
comment which explains the security of the key. Something like

   "Robin Kipp (normal security level subkeys with offline mainkey)"

This should be explained in more detail in a key policy which you should make 
publicly available and put its URL into the self signatures (see --set-policy-
url) for the UIDs (and maybe even the subkeys). You should also set your 
preferred key server in the selfsigs (--default-keyserver-url).


> since this may not be widely available on keyservers just yet

> Could someone on this list perhaps be so kind and see if I've
> made any mistakes?

One may call that the best sequence of steps but one... ;-)


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/bekannte/
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: First steps with GPG, am I off to a good start?

2013-10-10 Thread Daniel Kahn Gillmor
On 10/10/2013 09:32 PM, Hauke Laging wrote:
> Am Fr 11.10.2013, 01:25:50 schrieb Robin Kipp:
> 
>> Invoked addkey to generate a 2048 bit RSA sub key, with
>> encryption and signing capabilities.
> 
> It seems to me that the more accepted recommendation here is to have separate 
> subkeys for signing and encryption.

This is absolutely correct.  You should not be re-using the same RSA key
for two different usages if at all possible.  See, for example
https://www.schneier.com/paper-chosen-protocol.html

You can fix this by simply revoking this subkey and adding two new
subkeys, one for encryption and one for signing.  GnuPG will
automatically select the right one to use for whichever purpose.

> I know of no good reason for creating a mainkey without expiration date.

I also agree with this.  An expiration date of 3 years is reasonable.
If you're using the key actively and you do not believe it has been
compromised two years later, it should not be much extra work to extend
your expiration date for another two years.

The expiration date on your primary key gives you a failsafe endpoint in
the event that you lose all copies of your secret key material and your
revocation certificate.  (you do have a revocation certificate generated
and stored someplace safe, right?  i didn't notice that in your list of
steps)

You can resolve the lack of expiry on your primary key just by setting
an expiration date directly with:

 gpg --edit-key 0x22581BA6DC329876 expire

You can make your revocation certification with:

  gpg --gen-revoke 0x22581BA6DC329876

store it in a safe place!

> Furthermore it would be nice to have a UID without email address but with a 
> comment which explains the security of the key. Something like
> 
>"Robin Kipp (normal security level subkeys with offline mainkey)"
> 
> This should be explained in more detail in a key policy which you should make 
> publicly available and put its URL into the self signatures (see --set-policy-
> url) for the UIDs (and maybe even the subkeys). You should also set your 
> preferred key server in the selfsigs (--default-keyserver-url).

I disagree with these last recommendations from hauke.  Take that as you
will.

I don't think such policy information in the User ID is particularly
useful to other people (i'd be interested to hear of a situation where
that communication actually changes peoples actions and where it can
only be made through the User ID as opposed to, say, on a web page, a
blog post, in-person communication during keysigning, etc), and adding
comments like this to the User ID makes it more difficult for others to
decide whether to certify your key (since they may not be able to verify
the claim you're asking them to assert).

Implementing and abiding by nuanced policy documents that you set
forward in your policy-url also doesn't seem worth the labor, complexity
and maintenance involved, since the advantages it provides (either for
yourself or for others) are not clear.  Questions to ask yourself: Have
you ever checked someone else's policy URLs?  what would you do
differently if you could check them?  have you ever audited the claims
of someone's policy URL in any way?

Lastly, do you even have a preferred keyserver?  if not, setting
--default-keyserver-url doesn't make any sense in the first place, and
you should just use the global pool.  Even if you do have a preferred
keyserver, including such a keyserver URL in your self-sig is in some
senses equivalent to a "web bug": you're asking the user of the key to
make a call to your preferred server when they access your key.  People
who do not want to have their activity tracked will probably set
no-honor-keyserver-url in their ~/.gnupg/gpg.conf, and will expect to
get updates from arbitrary members of the public keyserver network, or
from their own preferred private, non-logging or otherwise
privacy-preserving server that is peered to the public keyserver network.

i hope this analysis is helpful,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: First steps with GPG, am I off to a good start?

2013-10-10 Thread Robert J. Hansen
On 10/10/2013 11:25 PM, Daniel Kahn Gillmor wrote:
> 
> (a lot of stuff snipped)
> 

... Or, you know, you could just stick with the defaults.  :)

IMO, new users should be encouraged to use the defaults.  This gets them
using GnuPG and developing their skills with it.  If, once they develop
their skills, they decide that their needs are not well-met by the
defaults they can always create a new certificate that's fine-tuned how
they like.

GnuPG already has a learning curve like the Matterhorn.  Let's give some
thought to that before we start advising new users to tweak every knob
and dial on GnuPG's controls.  :)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


standardized security levels

2013-10-10 Thread Hauke Laging
Hello,

a few mails ago dkg asked what the use of key policy documents was. That is 
obviously limited for several reasons. But the conclusion cannot be that we do 
completely without anything like that. It must be that we solve the problem in 
a reasonable way. If we don't then we seriously limit the quantity and quality 
of crypto usage.

I have been considering this a problem for years and yesterday I finally made 
my first step in solving it:

http://www.crypto-fuer-alle.de/wishlist/securitylevel/

The text is in German, though. But have some fun with the Google translator if 
you like... :-)

http://translate.google.com/translate?sl=de&tl=en&js=n&prev=_t&hl=de&ie=UTF-8&u=http%3A%2F%2Fwww.crypto-fuer-alle.de%2Fwishlist%2Fsecuritylevel%2F&act=url

The idea is to reduce the complex multi-dimensional security of a system to a 
limited number (about 10) of typical and useful cases. This should allow 
people who do not consider IT as one of their hobbies to much better assess 
the situation of their IT and their data.

My OpenPGP specific aim is that such a standardized list would be implemented 
in OpenPGP applications, probably as a signature notation. The typical user 
would have several keys (for the same address) at different security levels. 
Thus the sender could select the security need of the data to be sent and the 
system could automatically select the most suitable key (or fail if none such 
is available).

This may sound like making IT even more complex but I am convinced that the 
opposite it true. Achieving the same situation is much more difficult today. 
In fact these considerations are simply ignored by most people today. And then 
they are surprised that their money is stolen via online banking...


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/bekannte/
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users