Re: [openpgp] Summary v5 fingerprint proposal

Werner Koch <wk@gnupg.org> Thu, 23 March 2017 16:53 UTC

Return-Path: <wk@gnupg.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48FB612999F for <openpgp@ietfa.amsl.com>; Thu, 23 Mar 2017 09:53:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QF3OKn_s0JoE for <openpgp@ietfa.amsl.com>; Thu, 23 Mar 2017 09:53:15 -0700 (PDT)
Received: from kerckhoffs.g10code.com (kerckhoffs.g10code.com [IPv6:2001:aa8:fff1:100::22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7DC71129A8E for <openpgp@ietf.org>; Thu, 23 Mar 2017 09:53:12 -0700 (PDT)
Received: from uucp by kerckhoffs.g10code.com with local-rmail (Exim 4.84_2 #1 (Debian)) id 1cr5z3-0002Dt-UE for <openpgp@ietf.org>; Thu, 23 Mar 2017 17:53:09 +0100
Received: from wk by wheatstone.g10code.de with local (Exim 4.84 #3 (Debian)) id 1cr5vN-0002ds-Qp; Thu, 23 Mar 2017 17:49:21 +0100
From: Werner Koch <wk@gnupg.org>
To: "HANSEN, TONY L" <tony@att.com>
Cc: "openpgp@ietf.org" <openpgp@ietf.org>
References: <8737e4o2e4.fsf@wheatstone.g10code.de> <CAAu18hcEGGaDjKXtXpPbzxKm-8T4PWQBFq6AmbRXLUwi_z=0XQ@mail.gmail.com> <728801D2-CB96-4584-8A79-C93278B0437F@att.com>
Organisation: The GnuPG Project
X-message-flag: Mails containing HTML will not be read! Please send only plain text.
OpenPGP: url=https://k.gnupg.net/80615870F5BAD690333686D0F2AD85AC1E42B367
Mail-Followup-To: "HANSEN\, TONY L" <tony@att.com>, "openpgp\@ietf.org" <openpgp@ietf.org>
Date: Thu, 23 Mar 2017 17:49:21 +0100
In-Reply-To: <728801D2-CB96-4584-8A79-C93278B0437F@att.com> (TONY L. HANSEN's message of "Thu, 23 Mar 2017 14:00:45 +0000")
Message-ID: <87poh8kkfi.fsf@wheatstone.g10code.de>
User-Agent: Gnus/5.13 (Gnus v5.13)
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=high_security_Dateline_computer_terrorism_Majic_secure_64_Vauxhall=C"; micalg="pgp-sha256"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/AdlJehCiKPqvzs9v0QZlyTYxHpE>
Subject: Re: [openpgp] Summary v5 fingerprint proposal
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Mar 2017 16:53:17 -0000

On Thu, 23 Mar 2017 15:00, tony@att.com said:

> I’m with Jon on this one – if you’re going to do truncation, then use
> a scheme that’s DESIGNED to generate a truncated value. And the only
> one that’s been discussed that meets that criteria is SHA2-512/t.

OpenPGP has always used a truncated hash for the keyid.  The change is
that with v5 we will use use the leftmost 64 bits instead of the
rightmost 64 bit.

I explained in the original proposal the reasons why truncating certain
uses of the fingerprint makes sense.

Jon's suggestion of using SHA2-512/t does not work: if we ever need to
switch to the full fingerprint for the two signature subpackets, we
would need to define a v6 key format because the fingerprint changes by
using a different t with SHA2-512/t.

What we put into the signature subpackets is an abbreviation of the
fingerprint and this can be changed easily by introducing new signature
subpackets.  This would be the same as our migration from the /Issuer/
to the /Issuer Fingerprint/ subpacket.  This is an non-intrusive change
to fix the problems with the use of the 64 bit truncated fingerprint in
the /Issuer/ subpacket.

> But I also find Derek’s desire to use SHA2-256 to be compelling because of performance.

Noted.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.