Re: Creating a key bearing no user ID

2012-01-23 Thread Robert J. Hansen
> Keyserver SPAM is a straw-man argument. Yes, it's possible for an > address to be pulled from the key on a keyserver, in fact, I'm > convinced harvesting probably takes place. As am I. However, it should be pointed out that this is no reason to avoid using the keyservers. One of the best way

1.4.12 beta installer for Windows

2012-01-23 Thread Werner Koch
Hi, I created a pre-release of an GnuPG 1.4.12 installer for Windows: ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-w32cli-1.4.12-git51c1e84.exe ftp://ftp.gnupg.org/gcrypt/alpha/gnupg/gnupg-w32cli-1.4.12-git51c1e84.exe.sig Sources are in the same directory. This version is built using a newer

Re: Using Root CAs as a Trusted 3rd Party

2012-01-23 Thread Kara
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Reference: Subject: Re: Using root CAs as a trusted 3rd party Date: Sat, 21 Jan 2012 13:49:20 -0800 From: Ken Hagler To: Aaron Toponce CC: gnupg-users@gnupg.org > On Jan 21, 2012, at 10:12 AM, Aaron T

Re: Creating a key bearing no user ID

2012-01-23 Thread Holger
2012-01-22T23:33:38-06:00, John Clizbe: > Holger wrote: > > 2012-01-22T16:11:14-08:00, Doug Barton: > > > On 01/22/2012 10:05, Holger wrote: > > > > I intend to use gpg only for receiving encrypted e-mail, not signing > > > > my outgoing e-mail. Because I don't want my name or e-mail address > > >

Re: Using root CAs as a trusted 3rd party

2012-01-23 Thread Mark H. Wood
On Sat, Jan 21, 2012 at 01:49:20PM -0800, Ken Hagler wrote: > On Jan 21, 2012, at 10:12 AM, Aaron Toponce wrote: > > > What are your thoughts on using root CAs as a trusted 3rd party for > > trusting that a key is owned by whom it claims? Of course, this is merely > > for casual checking, but it s

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread Chris Poole
On Sun, Jan 22, 2012 at 4:02 AM, Robert J. Hansen wrote: >  A 1024-bit key has about an 80-bit keyspace, which is a factor of 16 million > larger.  Given the advances in supercomputing in the last decade it is > reasonable to believe 1024-bit keys are either breakable now or will be in the > near

Re: Creating a key bearing no user ID

2012-01-23 Thread Holger
2012-01-23T03:09:55-05:00, Robert J. Hansen: > > Keyserver SPAM is a straw-man argument. Yes, it's possible for an > > address to be pulled from the key on a keyserver, in fact, I'm > > convinced harvesting probably takes place. > > As am I. However, it should be pointed out that this is no rea

Re: Using root CAs as a trusted 3rd party

2012-01-23 Thread Milo
On 01/23/2012 03:24 PM, Mark H. Wood wrote: > On Sat, Jan 21, 2012 at 01:49:20PM -0800, Ken Hagler wrote: > > (...) > > I guess that the lesson is: don't assume. Find out for yourself > whether a CA is worthy of your trust, before trusting. Well, that could be a big challenge. In addition consi

Re: Creating a key bearing no user ID

2012-01-23 Thread Robert J. Hansen
On 01/23/2012 10:35 AM, Holger wrote: > I'm not a fan of comparisons at all All argument from analogy is intellectual fraud, but they can be useful to illuminate arguments. :) > but I'd say my e-mail address feels more like my postal address, thus > I tend to handle them similarly. So, you keep

Re: Creating a key bearing no user ID

2012-01-23 Thread Hubert Kario
On Monday 23 of January 2012 16:35:45 Holger wrote: > 2012-01-23T03:09:55-05:00, Robert J. Hansen: > > > Keyserver SPAM is a straw-man argument. Yes, it's possible for an > > > address to be pulled from the key on a keyserver, in fact, I'm > > > convinced harvesting probably takes place. > > > > As

Re: Creating a key bearing no user ID

2012-01-23 Thread Robert J. Hansen
On 1/23/12 11:34 AM, Hubert Kario wrote: > And there's a very good reson why you shouldn't be a fan of such > comparisions: Unlike physical security, properly implemented > cryptography is unbreakable at this time. This, of course, handwaves the fact that cryptography more or less *can't* be imple

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread brian m. carlson
On Mon, Jan 23, 2012 at 02:18:54PM +, Chris Poole wrote: > If the only purpose of the primary key (in my case, where I have subkeys for > signing and encryption) is to sign the subkeys, why not simply make it > stupidly > large? Equivalent to 256 bits with a symmetric cipher, or 512 bits? Bec

Re: Creating a key bearing no user ID

2012-01-23 Thread Hubert Kario
On Monday 23 of January 2012 18:18:35 Robert J. Hansen wrote: > On 1/23/12 11:34 AM, Hubert Kario wrote: > > And there's a very good reson why you shouldn't be a fan of such > > comparisions: Unlike physical security, properly implemented > > cryptography is unbreakable at this time. > > This, of c

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread Robert J. Hansen
On 1/23/12 9:18 AM, Chris Poole wrote: > If the only purpose of the primary key (in my case, where I have subkeys for > signing and encryption) is to sign the subkeys How do you enforce that? If it is technically possible to sign a document with your primary key, then good luck telling a judge "n

Re: Creating a key bearing no user ID

2012-01-23 Thread Robert J. Hansen
On 1/23/12 12:52 PM, Hubert Kario wrote: >>> And there's a very good reson why you shouldn't be a fan of such >>> comparisions: Unlike physical security, properly implemented >>> cryptography is unbreakable at this time. > > I didn't claim that any crypto is properly implemented. This is not wh

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread Chris Poole
On Mon, Jan 23, 2012 at 6:16 PM, Robert J. Hansen wrote: > You may say the only purpose of the primary key is to sign the subkeys, > but if it's technically possible for the primary key to sign documents > then the purpose of the primary key is to sign documents. > > This is why I think it's kind

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread Chris Poole
On Mon, Jan 23, 2012 at 4:52 PM, brian m. carlson wrote: > Because it's also used to sign other people's keys.  Using a very large > key (for 256-bit equivalence, ~15kbits) makes verification so slow as to > be unusable.  You have to not only verify signatures on other keys but > also the signatu

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread John Clizbe
Chris Poole wrote: > On Mon, Jan 23, 2012 at 4:52 PM, brian m. carlson > wrote: > >> Because it's also used to sign other people's keys. Using a very large >> key (for 256-bit equivalence, ~15kbits) makes verification so slow as to >> be unusable. You have to not only verify signatures on other

Re: 1024 key with 2048 subkey: how affected?

2012-01-23 Thread Robert J. Hansen
On 1/23/12 4:08 PM, John Clizbe wrote: > Depending on the source, a consensus seems to be forming that beyond > a 2048 or 3072 bit modulus for DSA2 or RSA, folks need to switch to > ECC. Emphatic agreement -- this is clarification, not dispute: A lot of people like to refer to _Applied Cryptograp

Re: Creating a key bearing no user ID

2012-01-23 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Monday 23 January 2012 at 3:04:45 PM, in , Holger wrote: > Please simply accept that it's an issue for me as well > as many others. Harvesting is supereasy: full keydumps > are readily available. It sounds like you value the flavour of pri

Re: Protecting IDs at a key signing party

2012-01-23 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Saturday 21 January 2012 at 10:01:51 PM, in , Robert J. Hansen wrote: > If they want to mess with you, they don't need your > permission. As is, you've explicitly asked them, > "would you please sign certificate 0xDEADBEEF, > fingerprint s

Re: Creating a key bearing no user ID

2012-01-23 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/23/12 6:23 PM, MFPA wrote: > Suggestions like this tend to get lambasted because they do not > enhance security, and privacy appears to be seen as unimportant. Not in the slightest. The idea is certainly worthwhile. It's just that there's no

Re: Protecting IDs at a key signing party

2012-01-23 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 1/23/12 5:52 PM, MFPA wrote: >> If they want to mess with you, they don't need your permission. >> As is, you've explicitly asked them, "would you please sign >> certificate 0xDEADBEEF, fingerprint so-and-so, here's my >> credentials." > > True