Re: [openpgp] Summary v5 fingerprint proposal
Werner Koch <wk@gnupg.org> Thu, 23 March 2017 16:53 UTC
Return-Path: <wk@gnupg.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48FB612999F for <openpgp@ietfa.amsl.com>; Thu, 23 Mar 2017 09:53:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QF3OKn_s0JoE for <openpgp@ietfa.amsl.com>; Thu, 23 Mar 2017 09:53:15 -0700 (PDT)
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [IPv6:2001:aa8:fff1:100::22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DC71129A8E for <openpgp@ietf.org>; Thu, 23 Mar 2017 09:53:12 -0700 (PDT)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.84_2 #1 (Debian)) id 1cr5z3-0002Dt-UE for <openpgp@ietf.org>; Thu, 23 Mar 2017 17:53:09 +0100
Received: from wk by wheatstone.g10code.de with local (Exim 4.84 #3 (Debian)) id 1cr5vN-0002ds-Qp; Thu, 23 Mar 2017 17:49:21 +0100
From: Werner Koch <wk@gnupg.org>
To: "HANSEN, TONY L" <tony@att.com>
Cc: "openpgp@ietf.org" <openpgp@ietf.org>
References: <8737e4o2e4.fsf@wheatstone.g10code.de> <CAAu18hcEGGaDjKXtXpPbzxKm-8T4PWQBFq6AmbRXLUwi_z=0XQ@mail.gmail.com> <728801D2-CB96-4584-8A79-C93278B0437F@att.com>
Organisation: The GnuPG Project
X-message-flag: Mails containing HTML will not be read! Please send only plain text.
OpenPGP: url=https://k.gnupg.net/80615870F5BAD690333686D0F2AD85AC1E42B367
Mail-Followup-To: "HANSEN\, TONY L" <tony@att.com>, "openpgp\@ietf.org" <openpgp@ietf.org>
Date: Thu, 23 Mar 2017 17:49:21 +0100
In-Reply-To: <728801D2-CB96-4584-8A79-C93278B0437F@att.com> (TONY L. HANSEN's message of "Thu, 23 Mar 2017 14:00:45 +0000")
Message-ID: <87poh8kkfi.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=high_security_Dateline_computer_terrorism_Majic_secure_64_Vauxhall=C"; micalg="pgp-sha256"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/AdlJehCiKPqvzs9v0QZlyTYxHpE>
Subject: Re: [openpgp] Summary v5 fingerprint proposal
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Mar 2017 16:53:17 -0000
On Thu, 23 Mar 2017 15:00, tony@att.com said: > I’m with Jon on this one – if you’re going to do truncation, then use > a scheme that’s DESIGNED to generate a truncated value. And the only > one that’s been discussed that meets that criteria is SHA2-512/t. OpenPGP has always used a truncated hash for the keyid. The change is that with v5 we will use use the leftmost 64 bits instead of the rightmost 64 bit. I explained in the original proposal the reasons why truncating certain uses of the fingerprint makes sense. Jon's suggestion of using SHA2-512/t does not work: if we ever need to switch to the full fingerprint for the two signature subpackets, we would need to define a v6 key format because the fingerprint changes by using a different t with SHA2-512/t. What we put into the signature subpackets is an abbreviation of the fingerprint and this can be changed easily by introducing new signature subpackets. This would be the same as our migration from the /Issuer/ to the /Issuer Fingerprint/ subpacket. This is an non-intrusive change to fix the problems with the use of the 64 bit truncated fingerprint in the /Issuer/ subpacket. > But I also find Derek’s desire to use SHA2-256 to be compelling because of performance. Noted. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
- [openpgp] Summary v5 fingerprint proposal Werner Koch
- Re: [openpgp] Summary v5 fingerprint proposal Nicholas Cole
- Re: [openpgp] Summary v5 fingerprint proposal HANSEN, TONY L
- Re: [openpgp] Summary v5 fingerprint proposal Werner Koch
- Re: [openpgp] Summary v5 fingerprint proposal Jon Callas
- Re: [openpgp] Summary v5 fingerprint proposal Werner Koch
- Re: [openpgp] Summary v5 fingerprint proposal Vincent Breitmoser