Re: [gentoo-dev] [PATCH v3 08/12] glep-0063: Allow ECC curve 25519 keys

2018-07-06 Thread Kristian Fiskerstrand
On 07/06/2018 07:49 AM, Ulrich Mueller wrote:
>> On Thu, 5 Jul 2018, Jonas Stein wrote:
> 
>>> b. RSA, >=2048 bits (OpenPGP v4 key format or later only)
>>>
>>> +   c. ECC curve 25519
>>> +
>>> 4. Key expiry: 5 years maximum
>>> 5. Upload your key to the SKS keyserver rotation before usage!
> 
>> I think we should ensure first that everything works fine with ECC.
>> Last time I checked, ECC was a nightmare.
> 
>> Some SKS server could not handle ECC... and so on.
> 
> IIRC, it has also been pointed out that ECC is not part of the OpenPGP
> standard (yet)?
> 

Right, the NIST curves prime curves are defined in RFC6637 but
Curve25519/EdDSA is only implemented in GnuPG and part of the draft
rfc4880bis (WG isn't currently active, so not expected a v5 any time soon).

ECC is also only implemented in gnupg >=2.1 , so as mentioned earlier,
gnupg 1.4 (which is still maintained and often used for smaller
footprint or backwards compat to v3 keys) will not be able to use it.

> Maybe we should better omit it. It shouldn't be too complicated for
> developers to add a dedicated RSA signing key for Gentoo if necessary
> (especially, since someone using ECC could be considered an advanced
> GnuPG user).

If the primary key is ECC, clients not supporting it won't be able to
use the key material even if the signing subkey is RSA.

> 
> Ulrich
> 


-- 
Kristian Fiskerstrand
OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3



signature.asc
Description: OpenPGP digital signature


Re: [gentoo-dev] [PATCH v3 08/12] glep-0063: Allow ECC curve 25519 keys

2018-07-05 Thread Ulrich Mueller
> On Thu, 5 Jul 2018, Jonas Stein wrote:

>> b. RSA, >=2048 bits (OpenPGP v4 key format or later only)
>> 
>> +   c. ECC curve 25519
>> +
>> 4. Key expiry: 5 years maximum
>> 5. Upload your key to the SKS keyserver rotation before usage!

> I think we should ensure first that everything works fine with ECC.
> Last time I checked, ECC was a nightmare.

> Some SKS server could not handle ECC... and so on.

IIRC, it has also been pointed out that ECC is not part of the OpenPGP
standard (yet)?

Maybe we should better omit it. It shouldn't be too complicated for
developers to add a dedicated RSA signing key for Gentoo if necessary
(especially, since someone using ECC could be considered an advanced
GnuPG user).

Ulrich


pgpJ4mpPSONpb.pgp
Description: PGP signature


Re: [gentoo-dev] [PATCH v3 08/12] glep-0063: Allow ECC curve 25519 keys

2018-07-05 Thread Jonas Stein
> b. RSA, >=2048 bits (OpenPGP v4 key format or later only)
>  
> +   c. ECC curve 25519
> +
>  4. Key expiry: 5 years maximum
>  5. Upload your key to the SKS keyserver rotation before usage!

I think we should ensure first that everything works fine with ECC. Last
time I checked, ECC was a nightmare.

Some SKS server could not handle ECC... and so on.

It would be great if a ECC user could sum up in a list where we still
need some progress.

-- 
Best,
Jonas



signature.asc
Description: OpenPGP digital signature


[gentoo-dev] [PATCH v3 08/12] glep-0063: Allow ECC curve 25519 keys

2018-07-05 Thread Michał Górny
Optionally allow using ECC curve 25519 keys.  We already have
developers using those keys, and given that they are supported
by GnuPG 2.2, there's probably no reason to ban them.  However, they're
not recommended due to interoperability issues.
---
 glep-0063.rst | 4 
 1 file changed, 4 insertions(+)

diff --git a/glep-0063.rst b/glep-0063.rst
index 60b68ca..f6f2959 100644
--- a/glep-0063.rst
+++ b/glep-0063.rst
@@ -33,6 +33,8 @@ v1.1
   The larger recommendation was unjustified and resulted in people
   unnecessarily replacing their RSA-2048 keys.
 
+  Minimal specification has been amended to allow for ECC keys.
+
 Motivation
 ==
 
@@ -67,6 +69,8 @@ not be used to commit.
 
b. RSA, >=2048 bits (OpenPGP v4 key format or later only)
 
+   c. ECC curve 25519
+
 4. Key expiry: 5 years maximum
 
 5. Upload your key to the SKS keyserver rotation before usage!
-- 
2.18.0