Re: [openpgp] Followup on fingerprints

Derek Atkins <derek@ihtfp.com> Tue, 04 August 2015 13:08 UTC

Return-Path: <derek@ihtfp.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2732F1A9084 for <openpgp@ietfa.amsl.com>; Tue, 4 Aug 2015 06:08:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AjFVcGu7iH_h for <openpgp@ietfa.amsl.com>; Tue, 4 Aug 2015 06:08:21 -0700 (PDT)
Received: from mail2.ihtfp.org (mail2.ihtfp.org [IPv6:2001:4830:143:1::3a11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C09F61A9086 for <openpgp@ietf.org>; Tue, 4 Aug 2015 06:08:12 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 2F8E5E2035; Tue, 4 Aug 2015 09:08:11 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 15648-09; Tue, 4 Aug 2015 09:08:09 -0400 (EDT)
Received: from securerf.ihtfp.org (unknown [IPv6:fe80::ea2a:eaff:fe7d:235]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mocana.ihtfp.org", Issuer "IHTFP Consulting Certification Authority" (verified OK)) by mail2.ihtfp.org (Postfix) with ESMTPS id 645B1E2034; Tue, 4 Aug 2015 09:08:09 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ihtfp.com; s=default; t=1438693689; bh=CUZ0dI9Pn3gvHpB8Rgk7g/5jAKQaiG8IybxGgC0b02Q=; h=From:To:Cc:Subject:References:Date:In-Reply-To; b=cF4Vu2449abmNmxpMkfW+3rsBEcg/1kZ+ap+eEFwL64+teFgPFNt8aBEWNPBPgN7s l0YaNuyMAQMuOMTraU3cJXMMQm/2yEL0ZO3+NJpT43bGFwap1/1hinxjs0WcUZYsjS 0gvVXVTtQheH3WSYWDNALBNrUXPrrzyfeLq8xWcU=
Received: (from warlord@localhost) by securerf.ihtfp.org (8.14.8/8.14.8/Submit) id t74D88QH015974; Tue, 4 Aug 2015 09:08:08 -0400
From: Derek Atkins <derek@ihtfp.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
References: <CAMm+LwgTcn8CY+Zk-f9gzXQtMJezG97T+kx2=C7PR5g7zFer_A@mail.gmail.com> <87twsn2wcz.fsf@vigenere.g10code.de> <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com> <87zj2ecmv8.fsf@alice.fifthhorseman.net> <CAMm+LwgKmcTes=V7uS3MjCQixWCo-i7PY=VE7eCHSqt3Ho3OSg@mail.gmail.com> <87a8udd4u6.fsf@alice.fifthhorseman.net> <sjm61503182.fsf@securerf.ihtfp.org> <CAMm+LwgEVySpfL-iN2uzX-4tu7R+isDkHE9D8uAeLTxxd4VxqQ@mail.gmail.com> <sjmwpxc1kbv.fsf@securerf.ihtfp.org> <CAAS2fgR6LYck+km5Ze6S9z65ZgsR61d8md2CqojDaceZ0OrZrw@mail.gmail.com> <9c2c8c5df67c83925d7e3c21fe943483.squirrel@mail2.ihtfp.org> <CAMm+LwjJ3mdawz92obKRz3NRhbc4veJFgW-u9gvO6sudem=ABg@mail.gmail.com>
Date: Tue, 04 Aug 2015 09:08:08 -0400
In-Reply-To: <CAMm+LwjJ3mdawz92obKRz3NRhbc4veJFgW-u9gvO6sudem=ABg@mail.gmail.com> (Phillip Hallam-Baker's message of "Mon, 3 Aug 2015 16:22:15 -0400")
Message-ID: <sjmoainyzev.fsf@securerf.ihtfp.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/mmk8khYNlwtMps9w-S5bSdIsQZQ>
Cc: Gregory Maxwell <gmaxwell@gmail.com>, IETF OpenPGP <openpgp@ietf.org>, Derek Atkins <derek@ihtfp.com>, Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Subject: Re: [openpgp] Followup on fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2015 13:08:27 -0000

Phillip Hallam-Baker <phill@hallambaker.com> writes:

>     Luckily my computations (which you unfortunately cut out) were based on 30
>     million attempts per second, so my results (the attack taking over a year)
>     is still correct!  Indeed, your numbers are still 3x slower than my
>     computation estimates.
>
> Your original assertion was broken. I don't think it very likely that someone
> is going to spend more than a machine year to generate a vanity key unless they
> can get someone else to pay for the time.

Phill, it was *your* proposal that I was talking to, Mallet creating
keys M1 and M2 to attack some open source project using PGP Signatures.
So thank you for acknowledging that your original assertion was broken!
My point was that particular notion isn't viable; nobody is going to
expend that much effort just to be able to spoof a broken source control
system.  And moreover, a non-broken system (that uses the full
fingerprint) is still out of reach even for stronger adversaries.

> A hundred machine years for creating a key collision attack is completely
> viable.

It's only a hundred machine years for a 100-bit collision.  A 160-bit
collision is much much further out!

> Also when we are talking about PGP Key fingerprint, the fingerprint is over the
> key binding and not just the key and so it is malleable. 

I don't see how that helps (today) with SHA1 or SHA2.

> I can well imagine someone making use of all that Bitcoin hardware for some
> mischief. Hence a reason to go for SHA-2-512.
>
> Again, this is only a security consideration that has to be noted.
>  

-derek

-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant