Re: [openpgp] Fingerprints

Vincent Breitmoser <look@my.amazin.horse> Wed, 06 May 2015 11:49 UTC

Return-Path: <look@my.amazin.horse>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AB391A88F7 for <openpgp@ietfa.amsl.com>; Wed, 6 May 2015 04:49:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9uFSajgSRqRM for <openpgp@ietfa.amsl.com>; Wed, 6 May 2015 04:49:23 -0700 (PDT)
Received: from mail.mugenguild.com (mugenguild.com [5.135.189.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F6E01A88F5 for <openpgp@ietf.org>; Wed, 6 May 2015 04:49:22 -0700 (PDT)
Received: from localhost (gate.ibr.cs.tu-bs.de [134.169.34.1]) by mail.mugenguild.com (Postfix) with ESMTPSA id 4B9635FAA9; Wed, 6 May 2015 13:46:40 +0200 (CEST)
References: <CAMm+LwhbB+-MnGRBCvprgAGOuu+5CJ2rgod7EBGOQR5UNVrspQ@mail.gmail.com> <87d232lkb6.fsf@alice.fifthhorseman.net> <sjmlhhmakxp.fsf@securerf.ihtfp.org> <871tiupupe.fsf@littlepip.fritz.box> <1430869683.28399.109.camel@scientia.net> <CAMm+LwgE0eOD1JgLYUwA_4Gh+pm-vGGd9hPX9KoUqQ9=RHBygg@mail.gmail.com> <87y4l2noqd.fsf@littlepip.fritz.box> <87wq0mt1si.fsf@vigenere.g10code.de>
From: Vincent Breitmoser <look@my.amazin.horse>
To: Werner Koch <wk@gnupg.org>
Date: Wed, 06 May 2015 13:36:40 +0200
In-reply-to: <87wq0mt1si.fsf@vigenere.g10code.de>
Message-ID: <87wq0mncy0.fsf@littlepip.fritz.box>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/dB3mQBtpiTwkuiPuelOimJYAOHM>
Cc: Christoph Anton Mitterer <calestyo@scientia.net>, Phillip Hallam-Baker <phill@hallambaker.com>, IETF OpenPGP <openpgp@ietf.org>
Subject: Re: [openpgp] Fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 May 2015 11:49:25 -0000

On 6 May 2015, Werner Koch wrote:
> To be future proof we should get away from SHA-1 for fingerprints
> and use SHA-256 (or SHA-512) instead.

I have no quarrel with changing the hash algo.  If it improves security
at no cost of usability or complexity - go for it.

> The external representation and even the internal use in OpenPGP is a
> different issue and I am all in favor for truncating it to 32 bytes
> for internal use and printing only up to 20 bytes.  This avoids extra
> work and SHA-256 is anyway required.

Sounds good to me.  I'm just afraid that if "something stronger" is
available, people are going to use it.  Design decisions and established
culture on top of the standard tend to be maximum conservative.  Sort of
if you don't use the "full fingerprint" you're not doing "everything you
can" and people will use all 32 bytes no matter if it was ever intended
that way.  That's not a huge deal, we just need to keep it in mind.

I would leave the fingerprint length at 20 bytes in the standard, if an
implementation chooses to use more internally that's up to them.
Defining the fingerprint to be 32 bytes, then adding "for printing, it
SHOULD be truncated to 20 bytes" seems silly.

 - V