Re: Long Term Key Management With Hardware Tokens

2021-06-26 Thread Valtteri Vuorikoski
Brandon Anderson via Gnupg-users  writes:

> Thanks for posting about the PivApplet project. I was looking for
> something like that for either the basic cards or java cards as I
> wanted to tinker around with them. Do you have a specific Java card
> model you are using?

You'll want something that implements at least JavaCard 3.0.4, since
that's the first version with useful EC operations. This came out in
2011 but because smartcards move at a glacial place there are still a
lot of 2.x cards on the market.

The NXP J3H145 appears to be a popular and widely available
dual-interface card. There is some discussion regarding cards on the
SmartPGP applet issue tracker:
https://github.com/ANSSI-FR/SmartPGP/issues/17 .

I haven't tried other Javacards besides the J3H145. They work well,
though a caveat is that they are quite slow compared to for example a
Yubikey 5: operations take approximately twice as long. The J2H145
should be pretty much identical but lacks the contactless interface and
is a bit cheaper. The newer J3R180 is supposedly quite a bit faster.

Unless you're buying large quantities and are prepared to deal with
weighty NDAs, make sure that the seller performs card
initialization/pre-personalization. GlobalPlatform tools won't be able
to access the card before this step. Most stores that sell single cards
will do this by default, but eBay/Aliexpress sellers might not.

 -Valtteri
 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Long Term Content Protection

2021-06-26 Thread Andrew Gallagher via Gnupg-users

> On 26 Jun 2021, at 08:26, LisToFacTor via Gnupg-users  
> wrote:
> 
> Once a message reaches
> the recipient's operational environment, it should be decrypted,
> and its further protection is best addressed as part and parcel
> of the protection of that complete environment.

But this is not the way many people use email now. It is quite common to use 
multiple “operational environments” to access a common user mailbox, and that 
mailbox may not be under the user’s sole control. Any security model must take 
into account how people lready behave in practice… otherwise they will use 
insecure workarounds. 

A
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Long Term Content Protection

2021-06-26 Thread LisToFacTor via Gnupg-users

There is, perhaps, a wider perspective on the problem discussed
in this thread.

GPG is a reasonable tool for the protection and verification of
content exchanged between two parties. Once a message reaches
the recipient's operational environment, it should be decrypted,
and its further protection is best addressed as part and parcel
of the protection of that complete environment. After all, a message
of any consequence will likely result on secondary content
generated by and on the recipient's computer, that needs as much
(or more) protection as the message content in transit.

There are many tools and techniques for achieving that, but their
use and best practices are beyond the scope of this list.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users