Re: Announcing paperbackup.py to backup keys as QR codes on paper

2017-02-23 Thread Gerd v. Egidy
Hi Peter, > The certificate (aka public key) includes all signatures, all the data > on the keyserver. It's data you don't really need to back up since it is > public, and it can be huge. My key.asc file is 137,424 bytes following > your instructions. Seems you are trusted by much more people tha

Re: Announcing paperbackup.py to backup keys as QR codes on paper

2017-02-23 Thread Gerd v. Egidy
> I'm a little > surprised that your code is as large as it is, too: using an alternate > pipeline you might be able to significantly reduce code size. > > (a) use Python 3's gpg module to export the secret key > (b) paperkey --output-type raw --secret-key key.gpg --output key.raw I want paperbac

Re: Announcing paperbackup.py to backup keys as QR codes on paper

2017-02-23 Thread Thomas Jarosch
Hi Daniel, On Wednesday, 22 February 2017 15:50:21 CET Daniel Kahn Gillmor wrote: > On Wed 2017-02-22 10:10:51 -0500, Thomas Jarosch wrote: > > I've tried paperkey with Gnupg 2.1.13 and it had trouble parsing the > > secret > > key data. May be the internal packet format changed or needs adaption.

Re: Announcing paperbackup.py to backup keys as QR codes on paper

2017-02-23 Thread Gerd v. Egidy
> You might consider using a font designed for OCR rather than the current > font. I tried to change to OCR-B or Inconsolata http://stackoverflow.com/questions/316068/what-is-the-ideal-font-for-ocr but getting that to work with enscript is not easy, as you have to find and install afm and pfb i

Re: Problems with cert validation via CRL

2017-02-23 Thread David Gray
Thanks very much for getting back to me - I really appreciate your help. I have been able to get the validation to work by adding the trusted root certificate to the "trusted-certs" folder under the gnupg directory on my windows box. The directory wasn't there but I was able to add it and as l

Re: Announcing paperbackup.py to backup keys as QR codes on paper

2017-02-23 Thread NdK
Il 23/02/2017 11:00, Gerd v. Egidy ha scritto: > If we are talking centuries, I'd worry about the availability of gnupg as > much > as qrcodes. Both are publicly available standards, but I don't know if they > are still available and understandable by then. I'd recommend going to > plaintext o

SHA1 collision found

2017-02-23 Thread sivmu
Today was announced that SHA1 is now completely broken https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html A few weeks back it was mentioned that there is a new proposal for a openpgp standart including a new algorithm for pgp fingerprints. As this is currently not applic

Re: SHA1 collision found

2017-02-23 Thread Peter Lebbing
On 23/02/17 19:24, si...@web.de wrote: > As this is currently not applicable in practice, I would like to know > what this new development means for pgp-gnupg and the use of SHA1 for > key identification. I already answered that here[1]. The use of SHA-1 in fingerprints is not susceptible to a col

RE: SHA1 collision found

2017-02-23 Thread Robert J. Hansen
> Today was announced that SHA1 is now completely broken > https://security.googleblog.com/2017/02/announcing-first-sha1- > collision.html SHA-1 is broken *for some purposes*. That's scary enough, trust me. Let's not overstate things. For the last ten years I've been saying, "The smoke alarm ha

Re: SHA1 collision found

2017-02-23 Thread sivmu
Am 23.02.2017 um 19:48 schrieb Peter Lebbing: > On 23/02/17 19:24, si...@web.de wrote: >> After researching how the fingerprint is generated, I think it would >> be easy to include a new option in gnupg to print a fingerprint using >> sha256. Would that be something that will/can be included in fut

Re: Announcing paperbackup.py to backup keys as QR codes on paper

2017-02-23 Thread Daniel Kahn Gillmor
On Thu 2017-02-23 03:54:12 -0500, Thomas Jarosch wrote: > In the interest of humanity and the cause of science, I've just tried again > with a throwaway key :) This time it worked just fine. The "only" thing > that's > changed is that I've upgraded from Fedora 22 to Fedora 25 since I last tried.

RE: SHA1 collision found

2017-02-23 Thread Robert J. Hansen
(I originally sent this off-list by mistake. Peter was kind enough to respond off-list and to suggest we take it back on-list. This email is a distillation of three different emails: my original, Peter's response, and a response to Peter.) = > I already answered that here[1]. The use of

Re: SHA1 collision found

2017-02-23 Thread vedaal
On 2/23/2017 at 1:27 PM, si...@web.de wrote:Today was announced that SHA1 is now completely broken https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html A few weeks back it was mentioned that there is a new proposal for a openpgp standart including a new algorithm for pgp

OpenPGP third-party certifications do not imply trust [was: Re: Announcing paperbackup.py to backup keys as QR codes on paper]

2017-02-23 Thread Daniel Kahn Gillmor
[ not on-topic for this thread, hence the subject change ] On Thu 2017-02-23 05:00:54 -0500, Gerd v. Egidy wrote: >> The certificate (aka public key) includes all signatures, all the data >> on the keyserver. It's data you don't really need to back up since it is >> public, and it can be huge. My

Re: SHA1 collision found

2017-02-23 Thread sivmu
Am 23.02.2017 um 20:09 schrieb ved...@nym.hush.com: > The Openpgp standards group is working on this. Yes but who know how many years it will take until a new standard is accepted... > > The link you give for the collision used 2 PDF's. > Using a PDF is sort-of 'cheating', and does not extrapolat

Re: SHA1 collision found

2017-02-23 Thread Christoph Anton Mitterer
On Thu, 2017-02-23 at 13:58 -0500, Robert J. Hansen wrote: > > "Migrating to SHA256" > section in > the FAQ? What I always kinda wonder is, why crypto or security experts, at least in some sense never seem to learn. When MD5 got it's first scratches, some people started to demanded for it's ASAP r

Re: SHA1 collision found

2017-02-23 Thread Leo Gaspard
On 02/23/2017 09:00 PM, Robert J. Hansen wrote: > [...] > > To which I said, "Create two keys with the same fingerprint. Sign a contract > with one, then renege on the deal. When you get called into court, say "I > never signed that, Your Honor!" and present the second key. This collision > p

Re: SHA1 collision found

2017-02-23 Thread Robert J. Hansen
> What I always kinda wonder is, why crypto or security experts, at least > in some sense never seem to learn. You kidding me? MD5 hashes are still the standard tool of computer forensics. It's appalling. The reasons why are fascinating, though: it's largely for judicial reasons, not technical