Re: [openpgp] Fingerprints and their collisions resistance

Jon Callas <jon@callas.org> Sun, 06 January 2013 03:19 UTC

Return-Path: <jon@callas.org>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BE0E21F8444 for <openpgp@ietfa.amsl.com>; Sat, 5 Jan 2013 19:19:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b5U2tC6Tx7mh for <openpgp@ietfa.amsl.com>; Sat, 5 Jan 2013 19:19:48 -0800 (PST)
Received: from mail.merrymeet.com (merrymeet.com [173.164.244.100]) by ietfa.amsl.com (Postfix) with ESMTP id 223AA21F8443 for <openpgp@ietf.org>; Sat, 5 Jan 2013 19:19:47 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail.merrymeet.com (Postfix) with ESMTP id 6EC9618A222C; Sat, 5 Jan 2013 19:19:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at merrymeet.com
Received: from mail.merrymeet.com ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qnRkG04zM3Mr; Sat, 5 Jan 2013 19:19:46 -0800 (PST)
Received: from keys.merrymeet.com (keys.merrymeet.com [173.164.244.97]) by mail.merrymeet.com (Postfix) with ESMTPSA id 5BE4218A221D; Sat, 5 Jan 2013 19:19:44 -0800 (PST)
Received: from [10.0.23.28] ([173.164.244.98]) by keys.merrymeet.com (PGP Universal service); Sat, 05 Jan 2013 19:19:46 -0800
X-PGP-Universal: processed; by keys.merrymeet.com on Sat, 05 Jan 2013 19:19:46 -0800
Mime-Version: 1.0 (Apple Message framework v1283)
From: Jon Callas <jon@callas.org>
In-Reply-To: <50E8B59C.4010807@fifthhorseman.net>
Date: Sat, 05 Jan 2013 19:19:43 -0800
Message-Id: <A2C78934-AD29-47AF-84D8-A48B0A081D50@callas.org>
References: <50E530D6.6020609@brainhub.org> <50E5494E.6090905@iang.org> <50E60748.3040103@brainhub.org> <50E60F7A.8000001@fifthhorseman.net> <50E61BF7.4020905@brainhub.org> <50E88141.1030907@iang.org> <87vcbb9qpu.fsf@vigenere.g10code.de> <50E8B59C.4010807@fifthhorseman.net>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
X-Mailer: Apple Mail (2.1283)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Cc: Werner Koch <wk@gnupg.org>, openpgp@ietf.org, Jon Callas <jon@callas.org>, ianG <iang@iang.org>
Subject: Re: [openpgp] Fingerprints and their collisions resistance
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 06 Jan 2013 03:19:48 -0000

On Jan 5, 2013, at 3:22 PM, Daniel Kahn Gillmor wrote:

> iirc, there was a rough consensus within this working group that this
> was probably a mistake in RFC 4880, and any future revision of the draft
> should place the full key material into the revocation key subpacket
> instead of the key's fingerprint.

I was about to comment that if we move on shifting to ECC keys as per Andrey's work on them, we could just about eliminate fingerprints and just use the keys.

Also, the point compression patent expired last year.

	Jon