Re: [gentoo-dev] First release of Gentoo Keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 01/13/2015 05:58 AM, Andrew Savchenko wrote: On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand wrote: On 01/12/2015 07:29 PM, Rich Freeman wrote: On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand k...@gentoo.org wrote: One issue with DSA/ElGamal is the requirement for a random k value while signing/encrypting, Thanks - that was very informative. I guess the thing that makes me more concerned about RSA is that Shor's algorithm makes it quite possible that it will be defeated at some point in the future, perhaps without public disclosure. Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. Why not to use post-quantum signing together with a traditional one? app-crypt/codecrypt is already in tree and provides an GnuPG-like solution based on post-quantum cryptography. My opinion is that it would only increase the complexity of things, in particular requiring a double set of trust paths / WoT. When such a shift becomes a prudent move (my interpretation of that is that it is advocated by people far more knowledgeable about crypto than I am) a lattice-based primitive (McEliece as used by this tool is part of this class) is likely to be brought into OpenPGP as an encryption algorithm by form of extension to RFC4880 (or part of an updated V5 key format). It would be no harm to use this solution together with GnuPG, e.g. have two detached signatures: a traditional RSA-4096 and a post-quantum one. The harm would be overhead, both computationally and not the least operationally to establish valid trust paths. Keep in mind that if it is to be any use, several steps would need to be fulfilled including that operational security perimeters would need to match the requirements, so all devs would need lattice-based keys in additional to classical keys, and probably make adjustments to their overall life to match such a key requirement. - -- Kristian Fiskerstrand Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUtNt/AAoJEPw7F94F4Tag2HcP+wZTK1vLR1q0fYlGTAUi7I8G 3cWMrSAAVXqpfzezb7x/PYUm99y0G6gE9lmfkKQNG9sX6u/LsJDd7x6t92w99nI/ aJzYZi6WX5LKX7o22mFsSp8CjzJJwoNpdngKySjiTnFkMcsRmBANZnktsvxjKTS3 bgusId9LsT1w/hcXmIxmBUaM7hudffrV53XYdJtnlFPCCx6iLM4vQcjKxCQ60v67 LU11PWNw3Z7/M2UFHkWULMPYfezAUclTqdcMLTWNlWHugF2GJ8CTyrCTErV+ABKA f3awAB2rga2+gIwHiBtqPcepw8e0iFfzG3/NmQh2Q3+q6FwAgUyQL5NUzZI9GBqX xcwFJ2Y1OtMKvlJapHntZSXrwcj8uZvGC1DG+Srf0b+LF5JZUslp1F/aNPwHgpq/ GxM32EXtCHCN9w1BMlqrQSr1RE9NVKdcy43XEYSMA8D865+YqkHBnjylPrz5o+Q3 +r4iumNTBeyts7m4wWCcBHaFQCJJGsuy/JLcWQVTmq2zX3Y17atQh5UX83dzphP+ L8t3A0DXKdpJrbt0TcaxaYOaMcSp6eP+Two9UBRH3lJQzjydO70s2+YzyO55buJJ pjMZ1OAX/VH5NpNPWQlLUPWuZO9FlOarjYbg91DZtIEXf1d1/rTQ8edM/tbtq75Q pUPjmePbp6rw3y2AI4WF =MLZo -END PGP SIGNATURE-
Re: [gentoo-dev] First release of Gentoo Keys
On Tue, 13 Jan 2015 13:36:01 +0100 Chí-Thanh Christopher Nguyễn wrote: Andrew Savchenko schrieb: On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand wrote: Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. Why not to use post-quantum signing together with a traditional one? Indeed. Problem is that so-called post-quantum cryptosystems are sometimes not even secure against non-quantum computers. I remember back when NTRU was the latest hotness, and the breaking and fixing ping-pong that security researchers played between conferences with it, particularly with the signature part. I think this is a problem of all new crypto solutions: they are likely to have flaws at both theory/model and implementation. But using them as addition (on AND basis) doesn't hurt security. However, as was pointed out in another reply, management overhead (second keypair, signature and web of trust) is considered as too much now. None of these has stood the test of time like RSA or DLP-based crypto. If post-quantum signing is desired, I agree that it should be strongly considered using it in addition to traditional signing. Best regards, Andrew Savchenko pgpD1IRDdSo0M.pgp Description: PGP signature
Re: [gentoo-dev] First release of Gentoo Keys
On Tue, 13 Jan 2015 12:10:47 +0100 Andreas K. Huettel wrote: Am Dienstag 13 Januar 2015, 07:54:16 schrieb Andrew Savchenko: Are you sure? The simplest Shor's factorisation machine was already built and published in open press: http://arxiv.org/abs/quant-ph/0112176 This was done 14(!!) years ago. I don't doubt there was a significant progress in this field thereafter. But it is likely that results are classified. Lieven's paper 2001 was a milestone but the technology in this case fundamentally didn't scale. So, while there certainly have been advances, they aren't directly based on it, but on completely different experimental approaches. http://web.physics.ucsb.edu/~martinisgroup/ If there's any place to look for technological advances, then ^ here. (No, not d-wave either. IMHO.) Thanks for the link, I'll study it. Best regards, Andrew Savchenko pgpfGCqqpShox.pgp Description: PGP signature
Re: Re: [gentoo-dev] First release of Gentoo Keys
Am Dienstag 13 Januar 2015, 07:54:16 schrieb Andrew Savchenko: On Mon, 12 Jan 2015 18:48:41 + Ciaran McCreesh wrote: On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand k...@gentoo.org wrote: Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. We're not post-quantum, Are you sure? The simplest Shor's factorisation machine was already built and published in open press: http://arxiv.org/abs/quant-ph/0112176 This was done 14(!!) years ago. I don't doubt there was a significant progress in this field thereafter. But it is likely that results are classified. Lieven's paper 2001 was a milestone but the technology in this case fundamentally didn't scale. So, while there certainly have been advances, they aren't directly based on it, but on completely different experimental approaches. http://web.physics.ucsb.edu/~martinisgroup/ If there's any place to look for technological advances, then ^ here. (No, not d-wave either. IMHO.) -- Dr. Andreas K. Huettel Institute for Experimental and Applied Physics University of Regensburg D-93040 Regensburg Germany tel. +49 151 241 67748 (mobile) e-mail andreas.huet...@ur.de http://www.akhuettel.de/ http://www.physik.uni-r.de/forschung/huettel/
Re: [gentoo-dev] First release of Gentoo Keys
Andrew Savchenko schrieb: On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand wrote: Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. Why not to use post-quantum signing together with a traditional one? Indeed. Problem is that so-called post-quantum cryptosystems are sometimes not even secure against non-quantum computers. I remember back when NTRU was the latest hotness, and the breaking and fixing ping-pong that security researchers played between conferences with it, particularly with the signature part. None of these has stood the test of time like RSA or DLP-based crypto. If post-quantum signing is desired, I agree that it should be strongly considered using it in addition to traditional signing. Best regards, Chí-Thanh Christopher Nguyễn
Re: [gentoo-dev] First release of Gentoo Keys
On Mon, Jan 12, 2015 at 1:48 PM, Ciaran McCreesh ciaran.mccre...@googlemail.com wrote: On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand k...@gentoo.org wrote: Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. We're not post-quantum, and if we were no-one knows how anything would do anyway... Why not stick to threats that actually exist? For the same reason that we don't deploy 1024-bit RSA keys? Also, you wouldn't necessarily know if we were post-quantum or not. Nobody made the claim that nobody should ever use RSA, just that this is an area of concern. -- Rich
Re: [gentoo-dev] First release of Gentoo Keys
On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand wrote: On 01/12/2015 07:29 PM, Rich Freeman wrote: On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand k...@gentoo.org wrote: One issue with DSA/ElGamal is the requirement for a random k value while signing/encrypting, Thanks - that was very informative. I guess the thing that makes me more concerned about RSA is that Shor's algorithm makes it quite possible that it will be defeated at some point in the future, perhaps without public disclosure. Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. Why not to use post-quantum signing together with a traditional one? app-crypt/codecrypt is already in tree and provides an GnuPG-like solution based on post-quantum cryptography. It would be no harm to use this solution together with GnuPG, e.g. have two detached signatures: a traditional RSA-4096 and a post-quantum one. Best regards, Andrew Savchenko pgpPekacU63L_.pgp Description: PGP signature
Re: [gentoo-dev] First release of Gentoo Keys
On Mon, 12 Jan 2015 18:48:41 + Ciaran McCreesh wrote: On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand k...@gentoo.org wrote: Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. We're not post-quantum, Are you sure? The simplest Shor's factorisation machine was already built and published in open press: http://arxiv.org/abs/quant-ph/0112176 This was done 14(!!) years ago. I don't doubt there was a significant progress in this field thereafter. But it is likely that results are classified. And Yale university have annonced a serious progress in errors correction recently: http://news.yale.edu/2013/01/11/new-qubit-control-bodes-well-future-quantum-computing and if we were no-one knows how anything would do anyway... Why not stick to threats that actually exist? They are exist. No agency will announce that they broke RSA regardless of the key length. This information will be kept top secret as long as possible, so one should prepare today and beforehand. There are post-quantum solutions and implementations, see app-crypt/codecrypt. Best regards, Andrew Savchenko pgpgUJFDhMuDa.pgp Description: PGP signature
Re: [gentoo-dev] First release of Gentoo Keys
On Sun, 11 Jan 2015 18:37:36 -0800 Brian Dolbec wrote: When you add a signing subkey, that subkey then becomes the default key used for signing with. If you have more than one signing subkey, the default can be set in gnupg.conf without editing the key. Otherwise you must specify which key to sign with. It is much easier to revoke that signing subkey and add a new one, without the need to create an entirely new key, losing all the key signatures it is signed with. If you revoke a primary key, all subkeys it contains are revoked as well. In that article the author describes how to generate the subkeys and remove the original (master) keypair for installation on a laptop, desktop, etc. (separate subkeys for each machine) which may be stolen. You keep the original(master) keypair in a secure location (eg: bank safe deposit box, etc.) If the laptop is stolen, the thieves do not have access to modify the gpg keys (even if they have the password), and those specific subkeys can be easily revoked, without losing your entire gpg key and the signatures it has accumulated. Using your master keypair you generate new subkeys for installation on your replacement laptop, and continue... I still don't understand why requirement of a separate signing subkey is mandatory in GLEP:63. I solves such a corner case where other solutions are possible meanwhile, e.g. encrypt your laptop's HDD, use a LUKS partition on top of it, store password-protected secret key there. In fact the most dangerous attack is in-memory breach when key is being stolen from memory without any trace (Heltzner hosting breach comes to my mind here) and a separate signing subkey wouldn't help here at all. While this requirement may improve security a bit, it should go to recommendations and not to bare minimum stuff. Even document referenced by GLEP:63: RiseUp.net OpenPGP best practices [https://we.riseup.net/riseuplabs+paow/openpgp-best-practices] points out that a separate signing subkey is only an optional bonus: (bonus) Have a separate subkey for signing, and keep your primary key entirely offline. Meanwhile link above is outdated and the following should be used instead: https://help.riseup.net/en/security/message-security/openpgp/best-practices On the other hand GLEP:63 allows weak algos like DSA-2048, which makes me shivers. Yes, DSA-2048 is not officially broken yet, but with RSA-1024 already broken in open media I don't trust 2048 algos, especially when they have numerous design flaws (like good entropy requirement for every signing) and implementations weakness are likely to be there. Agencies are always a few steps ahead, so this should be taken into account. Best regards, Andrew Savchenko pgpuc0hBaMw1y.pgp Description: PGP signature
Re: [gentoo-dev] First release of Gentoo Keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 01/12/2015 02:55 AM, Rich Freeman wrote: On Sun, Jan 11, 2015 at 8:34 PM, Brian Dolbec dol...@gentoo.org wrote: But for the rest, yes, you don't need gkeys to create your key, It is just most people seem to know little about using gpg, so creating the template where you just filled out name, email, password, makes it easy. Makes sense. I can always create a new account, create a key, export/import, and delete the account. That will avoid messing with config files and such. From the above, it looks like you also need to create a signing subkey with a preferred 1 yr. expiry. But it can be 5 years max. too. You may also want to add an encryption subkey for encrypted email and such. From docs I was reading it sounds like a signing and encryption subkey are created by default (two keys total). Is there any difference between a main key and a subkey? I have to admit that I haven't kept up with gpg features over the years. By default GnuPG only create a primary key with SC flags (sign certification) and an encryption subkey. In this case you'll want to add a signing subkey using the addkey command of --edit-key to make a compliant key. - -- Kristian Fiskerstrand Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUtAvMAAoJEPw7F94F4TagBsEQALMRpYPlAsVm/J/3cqA57BYH +mcCFA9sNVd8zwGp2fAybGl7Umj0oCTU/c5R/YICPtmuzu8hxYjhvPpKc1gF3UBb QzjCeqMEHNXz1hEsfbmQyqw10Jc9xxiJZmUVESB8tC1l/OTmDOHjgfU5APWzAIg/ 4scM91Y1lbtKoeJsTpfW0Tv9ROC75PuWudHhEx/3RKJvygACeWGbeLZX9tmdKZbz Zc+Iv3je0XCabC4G0vviuAddpeyNMj0ck5d9lrPLM+MxdJDSkeAT0/+aMBhiQOqt jZImJ4eZq48sEdh0wUqt7EeLuKL6w5rO9N8DTHPCfDhJ9mhFmxPgozVkRmzhTrTX Twac69fSklDzEcQZHr/kPynYdp1ZTN97MxcLxNMXNhWTIG51sFfNK4is+kdmBVUk 9wAuMQbWdeeC7oFy60h8sIak7yNeh7L34C7XrYIN7urT9W9zw0tQttRmPbY82yBU K/w8OvdpcwkYNGoAkFfpCL1aqJjwfrWqyWglNGgbaWgw5hkKQ5f+Ljvou9sdfiVc 1e4Vu5Tiblz1Ucs5JZRoioXwsW9EAxUYg7wAxnjHyEgE4opFpvVwgq4beWMzgbG9 1f2YVxrrakLfpuJ5WneDZJBToaDeVDpMInERiF9xlJDb8vvZeUtKzEElAOF0Ptg4 6b9fY0tzc1eAd4uuYPj2 =v+RL -END PGP SIGNATURE-
Re: [gentoo-dev] First release of Gentoo Keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 01/12/2015 02:34 AM, Brian Dolbec wrote: On Sun, 11 Jan 2015 12:06:18 -0500 Rich Freeman ri...@gentoo.org wrote: On Sun, Jan 11, 2015 at 11:43 AM, Brian Dolbec dol...@gentoo.org wrote: Of the remaining devs, only 16 keys total pass the GLEP 63 requirements. More info can be found in the First-Use wiki page [4] If you just create a gpg key with 5yr expiry and otherwise-default options, typing a larger number into the keysize prompt, do you get a compliant key? The guides talk about editing your gpg.conf, and it looks like the tool does it for you, but is any of that necessary to generate a compliant key? I'd prefer raw gpg commands and not a script that automates everything. Would this work: gpg --gen-key option 2 - DSA and Elgamal size 3072 (the max) expires 5y Enter your name, email, and passphrase. I've been putting off generating a new key until this all settles down, and would prefer to mess with it as infrequently as possible. Most likely I'll just switch to Gentoo-dedicated key for the tree. Wait for Kristian to reply about the algorythm choice. GnuPG defaults to 2048 bit RSA primary key with 2048 bit RSA encryption subkey. DSA and ElGamal have not been the default for a while for a few reasons. For those interested in a bit more technical details read further. One issue with DSA/ElGamal is the requirement for a random k value while signing/encrypting, i.e. there is a requirement for a random source for all signatures and encryption, not only while generating the key, and the lack of proper randomness can cause private key leakage (in the case of signatures). This can be mitigated by the use of RFC6979 Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) , however this is only introduced in libgcrypt 1.6. Another issue is that DSA key sizes 1024 bits are part of what is commonly referred to as DSA2-standard, so this is less interoperable with older versions. Newer versions of GnuPG (in the 2.1 branch) won't give algorithm choice at all unless --full-gen-key is used but generate using the defaults. - -- Kristian Fiskerstrand Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUtA0/AAoJEPw7F94F4TagGMIP/31V+VrAvB3PtEYeS+jhNc+D 1a020/Zo8rnrHKElK4+WDg+M+Dvw6UoQEpTvAu/ViZkGoCkDCE2iSo1Pv35NkwhB 7wVzJJU4yoK/qdxwi9hjZSXTjuLjGRvxOvHLRJ0bChMDbgPs4O3pODlvTf4Uyqxx dUkfLblntJeFYEEMnx3ryFxpLpbKSc27cQLg+DlXvASMTMulbhb2wRi5HfCJ1zfj 14FzSQFPuolkgLbuRJGvntq8uDAD03nTTnuAX9QiTOaT8GxRxw6RLIWa35E1tctq jBPPfGn+SyrPEHx5Gqgzo7Q8PfFTk6X60Fkzau+1qPd6sE0G8EA54CG/sFydoZEr N8XKPYOM+lw51kVHNR6GSjgFitc53Adqx0yHzzm1l+hYVmk3ZKitjmyCf+pyTS+a wkFxcNd/N1pfhfBs3LVSqvKPjw1NUaengt5eeC2YGkhYXs1qT0e1aO9uUzBAhsCc aH+6oTIG8fm0RClFUuuNVOv4STDPOpNtiOvOboO9ICHE6nwYaGUblKxCSvQ8gz/Q wEpqZ0rXDz9dJKBGBXMNIb0jxLejWvoiUb6V6oWYS5xHMWdiM+JpVInmNs7OZ9ks Yn65z5Ffi54X2fc6qAFUaTpMZ7NVIq5f6D96Mx7SZD3VCOzIhgWh8fbEnWqqCkVE Qf0hbsyzeHZXyxQWQNwb =Odoa -END PGP SIGNATURE-
Re: [gentoo-dev] First release of Gentoo Keys
On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand k...@gentoo.org wrote: One issue with DSA/ElGamal is the requirement for a random k value while signing/encrypting, Thanks - that was very informative. I guess the thing that makes me more concerned about RSA is that Shor's algorithm makes it quite possible that it will be defeated at some point in the future, perhaps without public disclosure. Granted, forging Gentoo commit signatures isn't really a high-profile target for somebody who has a secret quantum computer at their disposal (which they'd presumably like to remain secret). -- Rich
Re: [gentoo-dev] First release of Gentoo Keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 01/12/2015 07:29 PM, Rich Freeman wrote: On Mon, Jan 12, 2015 at 1:06 PM, Kristian Fiskerstrand k...@gentoo.org wrote: One issue with DSA/ElGamal is the requirement for a random k value while signing/encrypting, Thanks - that was very informative. I guess the thing that makes me more concerned about RSA is that Shor's algorithm makes it quite possible that it will be defeated at some point in the future, perhaps without public disclosure. Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. - -- Kristian Fiskerstrand Public PGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUtBYdAAoJEPw7F94F4TagA0cP/1fUOfyn+goHBJUPsrqNBt72 tkEShCRRtdqwknPf5XYR5oM3jRpG9QZ4L89vjXC/3SklIT1wz+IFLkUgJHbfg33k rbmr6oMXbQaqHami3l646DMjoqItLl1Nlnd5sqTVSBEB16KiJGE3oCVTAX6KisFW 72chafJh+4x9Cbbt48PL1FjCiLDunokCOHPtbXthkL2NJaPnIJh7HHCQk2CtgFZX tER2gXai7VsQMMQdO9VuwNvrFS1svWFK97Eba1xgQx7tMg4hxWJadQphlwMKMEj+ uvZZ0HE708AUYBah+VCNJRFbJpyoND+7prUR19MnleUfehLWZHNUaOc1G8PK8X2b GhH6fe2wft05e8jrfMgV0acECqdvsb82zvfYQRVksQbtxdhTB3ObPcBLYveG6tQU IKLv47imTGAIW+Hwqk7EYQpLAMCcNhLmnwOdIe3CT+pvnluiGKZ55O67DJvE5QPS goPkh8nmSRIcLdCYyJxU0X+nODQLUNi0sb1b8ryKM1OLz2jSq2vhehet0jZ8vu2T 0FpHKKo0dK7QTQQMmaoQ4Opfe3fff3kROhq3o0h6XMEg6niyzObg87ULecqKq59w CfeYHq6RIKnc3Yfn0flzcAlKXVlW+dpcHS1hXHiaLrO6iVtvtfZxBG4mAUZuqWyi k4FfOwRIvhFN5nTvM/TF =yIog -END PGP SIGNATURE-
Re: [gentoo-dev] First release of Gentoo Keys
On Mon, 12 Jan 2015 19:44:46 +0100 Kristian Fiskerstrand k...@gentoo.org wrote: Shor's would be effective against discrete logs (including ECC) as well, so wouldn't be applicable to this selection. For post-quantum asymmetric crypto we'd likely need e.g a lattice based primitive. We're not post-quantum, and if we were no-one knows how anything would do anyway... Why not stick to threats that actually exist? -- Ciaran McCreesh signature.asc Description: PGP signature
Re: [gentoo-dev] First release of Gentoo Keys
On Sun, Jan 11, 2015 at 11:43 AM, Brian Dolbec dol...@gentoo.org wrote: Of the remaining devs, only 16 keys total pass the GLEP 63 requirements. More info can be found in the First-Use wiki page [4] If you just create a gpg key with 5yr expiry and otherwise-default options, typing a larger number into the keysize prompt, do you get a compliant key? The guides talk about editing your gpg.conf, and it looks like the tool does it for you, but is any of that necessary to generate a compliant key? I'd prefer raw gpg commands and not a script that automates everything. Would this work: gpg --gen-key option 2 - DSA and Elgamal size 3072 (the max) expires 5y Enter your name, email, and passphrase. I've been putting off generating a new key until this all settles down, and would prefer to mess with it as infrequently as possible. Most likely I'll just switch to Gentoo-dedicated key for the tree. -- Rich
Re: [gentoo-dev] First release of Gentoo Keys
There is a short, First USE intro to using gkeys [4] in our wiki. Notes: Not all devs have seeds in the gentoo-devs.seeds file downloaded during the install of gkeys. The log stating the devs with bad info in LDAP can be viewed here [1]. There were 19 devs with conflicting or missing information. Of the devs with gpg key seeds created, 1 dev has incorrect fingerprint data in LDAP and fails to install his key properly. Of the remaining devs, only 16 keys total pass the GLEP 63 requirements. More info can be found in the First-Use wiki page [4] You can find us for help in #gentoo-keys IRC channel to help fix your keys, or deal with any issues you have running gkeys or gkeys-gen. There is also several wiki pages (more to come, help appreciated) [3] and the First-Use page (to be expanded) here [4]. Please keep in mind this is the initial release. We have disabled a few sub-commands which were not yet ready and will be in later releases. Plus there are several more features on our TODO list. But the primary functionality is there. Please report bugs in bugzilla [2], project: Gentoo-keys [1] http://dev.gentoo.org/~dolsen/gkey-logs/ [2] http://bugs.gentoo.org/ [3] https://wiki.gentoo.org/wiki/Project:Gentoo-keys [4] https://wiki.gentoo.org/wiki/Project:Gentoo-keys/Fisrt-Use -- Brian Dolbec dolsen
Re: [gentoo-dev] First release of Gentoo Keys
Rich Freeman wrote: Would this work: gpg --gen-key option 2 - DSA and Elgamal Watch that entropy. //Peter
Re: [gentoo-dev] First release of Gentoo Keys
On Sun, 11 Jan 2015 12:06:18 -0500 Rich Freeman ri...@gentoo.org wrote: On Sun, Jan 11, 2015 at 11:43 AM, Brian Dolbec dol...@gentoo.org wrote: Of the remaining devs, only 16 keys total pass the GLEP 63 requirements. More info can be found in the First-Use wiki page [4] If you just create a gpg key with 5yr expiry and otherwise-default options, typing a larger number into the keysize prompt, do you get a compliant key? The guides talk about editing your gpg.conf, and it looks like the tool does it for you, but is any of that necessary to generate a compliant key? I'd prefer raw gpg commands and not a script that automates everything. Would this work: gpg --gen-key option 2 - DSA and Elgamal size 3072 (the max) expires 5y Enter your name, email, and passphrase. I've been putting off generating a new key until this all settles down, and would prefer to mess with it as infrequently as possible. Most likely I'll just switch to Gentoo-dedicated key for the tree. Wait for Kristian to reply about the algorythm choice. But for the rest, yes, you don't need gkeys to create your key, It is just most people seem to know little about using gpg, so creating the template where you just filled out name, email, password, makes it easy. From the above, it looks like you also need to create a signing subkey with a preferred 1 yr. expiry. But it can be 5 years max. too. You may also want to add an encryption subkey for encrypted email and such. I added a little more info to the First-Use wiki page, I included a link to a great webpage about setting up gpg keys. https://alexcabal.com/creating-the-perfect-gpg-keypair/ there are lots more, but I like that one, it is clear, concise,... -- Brian Dolbec dolsen
Re: [gentoo-dev] First release of Gentoo Keys
On Sun, 11 Jan 2015 20:55:29 -0500 Rich Freeman ri...@gentoo.org wrote: On Sun, Jan 11, 2015 at 8:34 PM, Brian Dolbec dol...@gentoo.org wrote: I added a little more info to the First-Use wiki page, I included a link to a great webpage about setting up gpg keys. https://alexcabal.com/creating-the-perfect-gpg-keypair/ there are lots more, but I like that one, it is clear, concise,... From that site: By default GPG creates one signing subkey (your identity) and one encryption subkey (how you receive messages intended for you)...Use GPG to add an additional signing subkey to your keypair. This new subkey is linked to the first signing key. Now we have three subkeys. But, whatever. If we want a total of three keys in the key then I don't really have a problem with that. I'm not sure what it buys you other than lots of confusion about how to sign the right thing with the right key. :) Ok, the original text: 1. Create a regular GPG keypair. By default GPG creates one signing subkey (your identity) and one encryption subkey (how you receive messages intended for you). That looks like a slight error in the authors wording. It create one primary key with signing, authorization capability, and a one encryption sub-key. When you add a signing subkey, that subkey then becomes the default key used for signing with. If you have more than one signing subkey, the default can be set in gnupg.conf without editing the key. Otherwise you must specify which key to sign with. It is much easier to revoke that signing subkey and add a new one, without the need to create an entirely new key, losing all the key signatures it is signed with. If you revoke a primary key, all subkeys it contains are revoked as well. In that article the author describes how to generate the subkeys and remove the original (master) keypair for installation on a laptop, desktop, etc. (separate subkeys for each machine) which may be stolen. You keep the original(master) keypair in a secure location (eg: bank safe deposit box, etc.) If the laptop is stolen, the thieves do not have access to modify the gpg keys (even if they have the password), and those specific subkeys can be easily revoked, without losing your entire gpg key and the signatures it has accumulated. Using your master keypair you generate new subkeys for installation on your replacement laptop, and continue... -- Brian Dolbec dolsen
Re: [gentoo-dev] First release of Gentoo Keys
On Sun, 11 Jan 2015 18:37:36 -0800 I forgot to mention: You enter the primary key fingerprint and keyid into LDAP, not the signing subkey. The subkeys information will be imported along with the primary key. Even if you change signing subkey later, there should be no need to edit LDAP with the new key provided it belongs to the same primary key. Updates like that will be taken care of whenever a gpg --refresh-key ... or gkeys-refresh-key -C gentoo-devs operation is done on the keyring. -- Brian Dolbec dolsen
Re: [gentoo-dev] First release of Gentoo Keys
On Sun, Jan 11, 2015 at 8:34 PM, Brian Dolbec dol...@gentoo.org wrote: But for the rest, yes, you don't need gkeys to create your key, It is just most people seem to know little about using gpg, so creating the template where you just filled out name, email, password, makes it easy. Makes sense. I can always create a new account, create a key, export/import, and delete the account. That will avoid messing with config files and such. From the above, it looks like you also need to create a signing subkey with a preferred 1 yr. expiry. But it can be 5 years max. too. You may also want to add an encryption subkey for encrypted email and such. From docs I was reading it sounds like a signing and encryption subkey are created by default (two keys total). Is there any difference between a main key and a subkey? I have to admit that I haven't kept up with gpg features over the years. I added a little more info to the First-Use wiki page, I included a link to a great webpage about setting up gpg keys. https://alexcabal.com/creating-the-perfect-gpg-keypair/ there are lots more, but I like that one, it is clear, concise,... From that site: By default GPG creates one signing subkey (your identity) and one encryption subkey (how you receive messages intended for you)...Use GPG to add an additional signing subkey to your keypair. This new subkey is linked to the first signing key. Now we have three subkeys. But, whatever. If we want a total of three keys in the key then I don't really have a problem with that. I'm not sure what it buys you other than lots of confusion about how to sign the right thing with the right key. :) -- Rich