Re: [openpgp] Fingerprints

Phillip Hallam-Baker <phill@hallambaker.com> Wed, 06 May 2015 01:34 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F0EF1A89BB for <openpgp@ietfa.amsl.com>; Tue, 5 May 2015 18:34:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.278
X-Spam-Level:
X-Spam-Status: No, score=-1.278 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FR8_Tlkjh7zo for <openpgp@ietfa.amsl.com>; Tue, 5 May 2015 18:34:58 -0700 (PDT)
Received: from mail-lb0-x232.google.com (mail-lb0-x232.google.com [IPv6:2a00:1450:4010:c04::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFB851A89FC for <openpgp@ietf.org>; Tue, 5 May 2015 18:34:57 -0700 (PDT)
Received: by lbcga7 with SMTP id ga7so142222325lbc.1 for <openpgp@ietf.org>; Tue, 05 May 2015 18:34:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=1USYm1oSOh7ex1nWYDbvV+WR+b/KvKQzSM35xOApAg8=; b=vv4AbSrBEfoay8elTP8/zxmNrxdrhe4kUcDEKqYa50AFA1CKReRodsWBlnzAvdWzsZ fzdSz53Lr8hlvpF7wqZmAe0z28x/BIrONW92DnLPITfDdQfsnAetNt+bNj1bKs99hYZr QArom9NhlG0kuf4nXeliDDiIRFZi93sRtnMK1lvB4gXTbuofveTRn4Q4g4My28syIC8M 2T5tWt8k2IjGUPwO4dN0rvSemmNzY/ChH88olbuhtf4zyeDr98P/1UT/9Mugpw42xFeh SrfU9odseUQomqZpJIotKmkCTZa/bmoZpITnwWxDvJhHo6penaH9G9+sN3u9ajAOCIcd Tv2w==
MIME-Version: 1.0
X-Received: by 10.152.178.193 with SMTP id da1mr16950312lac.58.1430876096417; Tue, 05 May 2015 18:34:56 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.203.163 with HTTP; Tue, 5 May 2015 18:34:56 -0700 (PDT)
In-Reply-To: <1430869683.28399.109.camel@scientia.net>
References: <CAMm+LwhbB+-MnGRBCvprgAGOuu+5CJ2rgod7EBGOQR5UNVrspQ@mail.gmail.com> <87d232lkb6.fsf@alice.fifthhorseman.net> <sjmlhhmakxp.fsf@securerf.ihtfp.org> <871tiupupe.fsf@littlepip.fritz.box> <1430869683.28399.109.camel@scientia.net>
Date: Tue, 05 May 2015 21:34:56 -0400
X-Google-Sender-Auth: otIgDP5pguIM4Bs2pKyS6NYiPog
Message-ID: <CAMm+LwgE0eOD1JgLYUwA_4Gh+pm-vGGd9hPX9KoUqQ9=RHBygg@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Christoph Anton Mitterer <calestyo@scientia.net>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/AYXNEiiYRRPd0Dmq1QcKbBGcro4>
Cc: IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 May 2015 01:34:59 -0000

On Tue, May 5, 2015 at 7:48 PM, Christoph Anton Mitterer
<calestyo@scientia.net> wrote:
> On Tue, 2015-05-05 at 23:26 +0200, Vincent Breitmoser wrote:
>> I would like to pick up on this point again: What's wrong with 160 bit
>> fingerprints?  The bit length seems more than sufficient to cover any
>> Mooreian doubts, a more relevant issue would be weaknesses in the
>> hashing algorithm itself,

The problem isn't the bit length, it is the fact that it is really
hard for the IETF to endorse use of SHA-1 in some places but not
others. There is really no reason to think that the current attacks
make SHA-1 risky in the WebPKI but we are having to swap it out
anyway.

At some level, the cost of explaining why SHA-1 is safe for a
particular use outweighs the benefits of keeping it.

> Hmm but if it can be easily done, is there anything that speaks against?

I don't think so. Particularly if we are going to Base32 encoding and
make sure that there is no confusion between the legacy SHA-1
fingerprints and the new ones.

> I think hashes up to 512 bit are still commonly "accepted" (even with
> just hex encoding)... and I see no strong reason why we couldn't move to
> e.g. RFC 4648 base32.
> Actually others do similar things as well (e.g. OpenSSH).

Which is why I would like to move to a fingerprint format that can be
used with any protocol. Do it once, do it right and we don't have to
do it again.

> And if it doesn't hurt, I rather go for the stronger, even if it should
> never become necessary.

We do not even need to decide on a strength. Just make is so that the
number of significant bits is however many bits that are provided. We
can all use SHA-2-512 or SHA-3-512 and truncate to 125, 150, 250...
bits as the application requires.