Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Daniel Kahn Gillmor
On 07/10/2012 06:15 PM, Robert J. Hansen wrote: > Right now, only random collisions can be generated. That's not any use > in forging a signature, which requires a preimage collision. If the attacker can convince you to sign a chosen text (perhaps one that looks reasonable), then a failure in the

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Robert J. Hansen
You're arguing two different contradictory things here: > I'm not saying these attacks exist practically today against SHA1 (i > don't know if they do), but collision-resistance is the relevant > property, not resistance to pre-image attacks. And then: > The places where it is thoroughly "baked

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Hauke Laging
Am Mi 11.07.2012, 23:13:00 schrieb vedaal: > (A clever, malicious attacker could backdate the clock, > and have a forgery of something you did in the past, > when you couldn't claim: > > "Hey, that's an obvious forgery! > I'm on record as saying I would never use SHA1 to sign anything anymore!")

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Robert J. Hansen
On 7/11/2012 11:36 PM, Robert J. Hansen wrote: > want to know. What I do know is that there are a surprising number of > ways a SHA-1 preimage attack can screw over even people who have never > used SHA-256. s/SHA-256/SHA-1/ Apologies for the typo. signature.asc Description: OpenPGP digital

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Robert J. Hansen
On 7/11/2012 9:23 PM, brian m. carlson wrote: > Really? I'm pretty sure that I'm not generating SHA-1 signatures. This is not necessarily relevant. Here's a thought experiment for you. Someone creates a DSA-1k key and uses --cert-digest-algo SHA256 and --enable-dsa2. This creates 160-bit trunc

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread vedaal
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 7/11/2012 9:23 PM, brian m. carlson wrote: >>> If I use MD5, even for one message, that allows a moderately >>> determined attacker to replay that signature on what is likely to >>> become a fairly large set of messages. I'd rather avoid that,

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread brian m. carlson
On Tue, Jul 10, 2012 at 08:15:32PM -0400, Robert J. Hansen wrote: > There tends to be a lot of scaremongering in the world of crypto. I > think it's generally wise to be careful in our declarations. It is > enough to say SHA-1 is known to not meet its design specifications and > that some fairly

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Nicholas Cole
On Wed, Jul 11, 2012 at 11:25 AM, Werner Koch wrote: > On Wed, 11 Jul 2012 07:56, r...@sixdemonbag.org said: > >> V5 discussions will not kick off in earnest until NIST announces the new >> hash standard, or so I've heard people from the working group say. > > And even then it will take 5 years or

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Werner Koch
On Wed, 11 Jul 2012 21:41, r...@sixdemonbag.org said: > History has not been kind to the Merkle-Damgård construction. The fact > OpenPGP only contains Merkle-Damgårds has always bothered me: I'd feel > much better if WHIRLPOOL had been standardized and included in the list. On Phil’s request we

Re: Intro.

2012-07-11 Thread Robert J. Hansen
On 7/11/2012 9:50 AM, Healer 1 wrote: > I am a retired doc 65 and a scrunch,a Master Bard & Priest to the > Sanctuary of the Healers' Heart, and due to necessity I am becoming > involved in signing and encryption... You may also be interested in joining the Enigmail users mailing list: ht

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Robert J. Hansen
On 7/11/2012 11:51 AM, Werner Koch wrote: > But only because RIPEMD160 does not get as much attention as SHA-1. True, but I'm not certain I believe SHA256 is much better. Let's look over the history of Merkle-Damgård hashes: MD2 (broken 1997, preimages 2004) MD4 (broken 1991, preimages 2008, can

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Kristian Fiskerstrand
On 2012-07-11 17:46, Sam Smith wrote: > Thanks. The clearsign "test" worked. > > What does "cert-digest-algo" do? I read the description in the GnuPG > manual and what you quoted, but I still don't understand. Could > someone explain to me what cert-digest-algo does and how it differs > from digest

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Kristian Fiskerstrand
On 2012-07-11 17:57, Sam Smith wrote: > > For clearsigned messages, yes, for a message sent to someone else > while using their public key, > > it will depend on the capabilities specified in their preference. > > which command states this preference for when a message is sent to > someone using th

Re: scope of standard authority (was: Re: How to "activate" gpg.conf entries?)

2012-07-11 Thread Hauke Laging
Am Mi 11.07.2012, 13:57:58 schrieb David Shaw: > For signing, it's not as simple - for example, there is > no explicit recipient (and therefore no preference list) when signing > without encrypting, such as is done on a mailing list. Is there any reason why known recipients should not be consider

Re: scope of standard authority (was: Re: How to "activate" gpg.conf entries?)

2012-07-11 Thread David Shaw
On Jul 11, 2012, at 11:09 AM, Hauke Laging wrote: > Am Mi 11.07.2012, 16:54:27 schrieb Kristian Fiskerstrand: > >> Note that as per RFC4880 this will still not remove SHA1[0: 13.3.2.] >> or 3DES[0: 13.2.], as these are appended tacitly to be able to ensure >> a matching set between implementation

Re: cert-digest-algo clarification

2012-07-11 Thread David Shaw
On Jul 11, 2012, at 1:06 PM, Sam Smith wrote: > To make sure I understand correctly: > > 1) cert-digest-algo SHA256 = will use SHA256 to sign KEYS with regardless of > what preferences the key holder has stipulated > > 2) digest-algo SHA256 = will use SHA256 to sign MESSAGES with regardless of

cert-digest-algo clarification

2012-07-11 Thread Sam Smith
To make sure I understand correctly: 1) cert-digest-algo SHA256 = will use SHA256 to sign KEYS with regardless of what preferences the key holder has stipulated 2) digest-algo SHA256 = will use SHA256 to sign MESSAGES with regardless of what preferences the recipient of the message has stipula

Re: scope of standard authority

2012-07-11 Thread Hauke Laging
Am Mi 11.07.2012, 11:13:46 schrieb Robert J. Hansen: > The entire point of a standard is to allow interoperation. That means > there has to be some final fallback mode. IMHO the second sentence effectively rewrites the first to: "The entire point of a standard is to ENFORCE interoperation." I

RE: How to "activate" gpg.conf entries?

2012-07-11 Thread Sam Smith
> For clearsigned messages, yes, for a message sent to someone else while using their public key, > it will depend on the capabilities specified in their preference. which command states this preference for when a message is sent to someone using their public key? the "default-pre

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Werner Koch
On Wed, 11 Jul 2012 17:11, r...@sixdemonbag.org said: > I would suggest "SHA256 RIPEMD160", myself. There are no known attacks > on RIPEMD160, and if you're in a situation that requires the use of a But only because RIPEMD160 does not get as much attention as SHA-1. I doubt that RIPEMD160 is in

Re: scope of standard authority

2012-07-11 Thread Robert J. Hansen
On 7/11/2012 11:09 AM, Hauke Laging wrote: > Does it make sense that a standard overrides a user's decision to prefer > security over compatibility (sure, you can still check afterwards what has > happened but that can be difficult especially if gpg is not used directly but > called by a MUA e.g

RE: How to "activate" gpg.conf entries?

2012-07-11 Thread Sam Smith
Thanks. The clearsign "test" worked. What does "cert-digest-algo" do? I read the description in the GnuPG manual and what you quoted, but I still don't understand. Could someone explain to me what cert-digest-algo does and how it differs from digest-algo when placed in gpg.conf? so "personal-

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Robert J. Hansen
On 7/11/2012 10:09 AM, Sam Smith wrote: > 1) to use stronger hash when supported by others, I added this line = > *personal-digest-preferences SHA256* I would suggest "SHA256 RIPEMD160", myself. There are no known attacks on RIPEMD160, and if you're in a situation that requires the use of a 160-b

scope of standard authority (was: Re: How to "activate" gpg.conf entries?)

2012-07-11 Thread Hauke Laging
Am Mi 11.07.2012, 16:54:27 schrieb Kristian Fiskerstrand: > Note that as per RFC4880 this will still not remove SHA1[0: 13.3.2.] > or 3DES[0: 13.2.], as these are appended tacitly to be able to ensure > a matching set between implementations. Does it make sense that a standard overrides a user's

On signatures, enforcement and authentication

2012-07-11 Thread Robert J. Hansen
First: This is not legal advice. I am not a lawyer. Consult a lawyer in your jurisdiction if you have specific questions. This is the rantings of a semi-informed layman. One of the big elephants in the room when talking about digital signatures is that we conflate several different things under

Re: How to "activate" gpg.conf entries?

2012-07-11 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 2012-07-11 16:09, Sam Smith wrote: > I've added the following 3 lines to my gpg.conf file: > > 1) to use stronger hash when supported by others, I added this line > = *personal-digest-preferences SHA256* > > 2) to use the SHA256 hash when I Sign

How to "activate" gpg.conf entries?

2012-07-11 Thread Sam Smith
I've added the following 3 lines to my gpg.conf file: 1) to use stronger hash when supported by others, I added this line = personal-digest-preferences SHA256 2) to use the SHA256 hash when I Sign a message, I added this line = cert-digest-algo SHA256 3) to change what is used when a new key

Intro.

2012-07-11 Thread Healer 1
Good Day Folks, I am a retired doc 65 and a scrunch,a Master Bard & Priest to the Sanctuary of the Healers' Heart, and due to necessity I am becoming involved in signing and encryption I am somewhere in the mid range of computer skills better with Linux than Winblow$. I am a total noobe with both t

RE: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Sam Smith
> I'd much rather fail to generate a signature than generate > one using an algorithm which is very weak. My feelings as well. Date: Tue, 10 Jul 2012 23:59:45 + From: sand...@crustytoothpaste.net To: gnupg-users@gnupg.org Subject: Re: why is SHA1 used? How do I get SHA256 to be used? On T

Re: very cautious :-)

2012-07-11 Thread Werner Koch
On Wed, 11 Jul 2012 01:22, mailinglis...@hauke-laging.de said: > gpg --options /dev/null --keyserver hkp://keys.gnupg.net --search-keys ... > gpg: external program calls are disabled due to unsafe options file > permissions Use --no-options instead. Salam-Shalom, Werner -- Die Gedanken si

Re: why is SHA1 used? How do I get SHA256 to be used?

2012-07-11 Thread Werner Koch
On Wed, 11 Jul 2012 07:56, r...@sixdemonbag.org said: > V5 discussions will not kick off in earnest until NIST announces the new > hash standard, or so I've heard people from the working group say. And even then it will take 5 years or so until it it has been deployed widely. Even GnuPG 1.2 is s

Re: keytocard: bad secret key

2012-07-11 Thread Roman
Am 10.07.2012 21:22, schrieb bo...@z1p.biz: > I'm trying to save a 4096 bit RSA key to my OpenPGP smartcard v2.0 but I get > an error about a "bad secret key". > > I use Ubuntu 10.04 with a self-compiled GnuPG 2.0.19 > > Verbose-mode doesn't tell more details and according to Google I am the onl

apache https gnupg

2012-07-11 Thread Ted Byers
I searched the above combination of keywords on http://marc.theaimsgroup.com/ and got nothing. I assume, then, that this group has no messages dealing with the question of whether or not I can use GnuPG to create certificates that I can use to support https on Apache. The more general sear