Does it make sense to pipe yescrypt/Argon2id as passphrase for gpg?

2021-08-13 Thread Philippe Cerfon via Gnupg-users
Dear list members. I would like to use gpg's symmetric encryption feature but with passphrase hashing from either yescrypt or Argon2id. Neither of them seem to be natively supported, so I wondered whether the following would actually work out as I have it in mind. To my understanding a KDF lik

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
On Fri, Sep 11, 2009 at 12:39 AM, Robert J. Hansen wrote: > That's three examples of things that will unexpectedly break if SHA-1 > falls.  A complete laundry list would go for pages and pages and pages. >  I'd suggest reading comp.risks; they might have something on point. Thanks,.. got what you

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
On Thu, Sep 10, 2009 at 10:21 PM, Robert J. Hansen wrote: > I understood him to mean the "key ID" as the fingerprint of the > certificate's primary signing key, rather than checking each bit of the > certificate's primary signing key individually. I meant the fingerprint, yes. But now that you sa

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
Hello Daniel. On Thu, Sep 10, 2009 at 6:22 PM, Daniel Kahn Gillmor wrote: > The Key ID is a substring (either the last 8 or 16 hex chars) of the Key > Fingerprint (which is 40 hex chars).  The Key ID is used nowhere in the > internals of the OpenPGP specification, from what i can tell. I think

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
On Thu, Sep 10, 2009 at 5:08 PM, David Shaw wrote: > The real headache here is (as always) the practical - what to do with > existing keys and such.  I suspect that removing SHA1 would effectively mean > a new key type for OpenPGP (again, not a disaster - we're on our 4th key > type today). Ok,..

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
Hi Robert. On Thu, Sep 10, 2009 at 4:54 PM, Robert J. Hansen wrote: > Probably.  However, if SHA-1 gets totally broken we'll have a lot bigger > things to worry about than OpenPGP. What specifically do you mean? Crypto-stuff in banking etc.? > As soon as you find an attack, then we can discu

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
Hi Robert. On Thu, Sep 10, 2009 at 3:59 PM, Robert J. Hansen wrote: > Not really.  If there were good reasons to believe OpenBSD's entropy > collector was better than Linux's, the Linux crew would fix the code, > maybe even borrowing OpenBSD's entropy collector. Ah,.. right... it was the other

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
On Thu, Sep 10, 2009 at 3:45 AM, David Shaw wrote: > Yes, but it won't actually go away completely.  SHA1 is special in OpenPGP. >  Unlike the other hashes, SHA1 is required to be supported.  Removing SHA1 > from an OpenPGP preference list doesn't actually remove it, but instead > effectively puts

Re: howto secure older keys after the recent attacks

2009-09-10 Thread Philippe Cerfon
Hi Robert. On Thu, Sep 10, 2009 at 3:05 AM, Robert J. Hansen wrote: > Add these lines to your gpg.conf file: > > personal-digest-preferences SHA256 SHA224 SHA384 SHA512 RIPEMD160 > personal-cipher-preferences AES128 3DES > [...] And you think this is enough? Not removing and recreating and olde

howto secure older keys after the recent attacks

2009-09-09 Thread Philippe Cerfon
Hi. Now something more realistic and pracitcal. I'm using gpg for anonymous but secured communication together with some of my friends for some years now Recently I've read on severa attacks on SHA1 and AES256 that could also affect gpg and its keys. So waht I'd like to see is some step by s