Re: [openpgp] Followup on fingerprints

Phillip Hallam-Baker <phill@hallambaker.com> Fri, 07 August 2015 01:20 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA6251AD37C for <openpgp@ietfa.amsl.com>; Thu, 6 Aug 2015 18:20:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.277
X-Spam-Level:
X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PRxEYL9RaH86 for <openpgp@ietfa.amsl.com>; Thu, 6 Aug 2015 18:20:15 -0700 (PDT)
Received: from mail-la0-x22f.google.com (mail-la0-x22f.google.com [IPv6:2a00:1450:4010:c03::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 203A91AD377 for <openpgp@ietf.org>; Thu, 6 Aug 2015 18:20:14 -0700 (PDT)
Received: by labkb6 with SMTP id kb6so37494410lab.2 for <openpgp@ietf.org>; Thu, 06 Aug 2015 18:20:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=iK2lbyj4i5skSVAI0ll0qZtsP5ShDfcp1Jh7yOJEniE=; b=G67NJuAapNRpdjWPxq/jrVyw9+4ckZGGm3+QMZ58nmZEUHETHqYXlT5oEL1PrMOpcC f6WiDcXQ+HFrhZO+C5z3Lrrzp9bqlpbGl/n3WTc8LN/N4bt+CEO6iLn6WCwlw5CsWk1z LlVtOiUYQw38Bi573/q7XUyyMAqGDyZN40utgVtNr0PZnyhmGUg/TZoJlj0hKdL/xFJ3 IB5w/xwXRlv8JC8slR1JZ3dTRdWwZthGN0QxfWhxM6Eg3kS9LaRNV/3w9j0b5r6OhT72 qRr+Ze7NFz3voQmNrh+OANA0pHwfrtd3YxUcbZ2OPnqmsP3bz06GhKtPp+GJN6HiUvnv 7UsQ==
MIME-Version: 1.0
X-Received: by 10.152.2.2 with SMTP id 2mr5193559laq.58.1438910412439; Thu, 06 Aug 2015 18:20:12 -0700 (PDT)
Sender: hallam@gmail.com
Received: by 10.112.203.163 with HTTP; Thu, 6 Aug 2015 18:20:12 -0700 (PDT)
In-Reply-To: <87lhdow7gj.fsf@alice.fifthhorseman.net>
References: <87twsn2wcz.fsf@vigenere.g10code.de> <CAMm+LwgRJX-SvydmpUAJMmN3yysi4zzGSpO2yY4JAMhD-9xLgQ@mail.gmail.com> <87zj2ecmv8.fsf@alice.fifthhorseman.net> <CAMm+LwgKmcTes=V7uS3MjCQixWCo-i7PY=VE7eCHSqt3Ho3OSg@mail.gmail.com> <87a8udd4u6.fsf@alice.fifthhorseman.net> <sjm61503182.fsf@securerf.ihtfp.org> <CAMm+LwgEVySpfL-iN2uzX-4tu7R+isDkHE9D8uAeLTxxd4VxqQ@mail.gmail.com> <sjmwpxc1kbv.fsf@securerf.ihtfp.org> <CAAS2fgR6LYck+km5Ze6S9z65ZgsR61d8md2CqojDaceZ0OrZrw@mail.gmail.com> <9c2c8c5df67c83925d7e3c21fe943483.squirrel@mail2.ihtfp.org> <20150803173231.GG3067@straylight.m.ringlet.net> <2439a89a6c4eb70044e144406a732482.squirrel@mail2.ihtfp.org> <87io8v7uqt.fsf@littlepip.fritz.box> <87h9of7p0e.fsf@littlepip.fritz.box> <87wpxbtuwk.fsf@vigenere.g10code.de> <CAAu18hez49oVhTwRLqv=3rifbg5q5+EqsSvBO0c-ezq+M_Qmyw@mail.gmail.com> <87614u4u7q.fsf@alice.fifthhorseman.net> <55C3836D.2040104@iang.org> <87d1z0763m.fsf@littlepip.fritz.box> <CAAu18hcnjnZjwZn-uPO936CHDABn_HmqOibtsrBC7Ya7b-93Lg@mail.gmail.com> <87lhdow7gj.fsf@alice.fifthhorseman.net>
Date: Thu, 06 Aug 2015 21:20:12 -0400
X-Google-Sender-Auth: 9gMbHW2v0zy1JuMK9-o1AbDH8iY
Message-ID: <CAMm+LwhKfEnRRoWGkR0+AAAd+5CGJa-VKPtyqM53ZVDPEW30TA@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
To: Daniel Kahn Gillmor <dkg@fifthhorseman.net>
Content-Type: multipart/alternative; boundary="089e013c6470ff47b3051cae6fe1"
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/u6XV97qa9riJY5Q3PAcOSo0eL04>
Cc: "openpgp@ietf.org" <openpgp@ietf.org>, Nicholas Cole <nicholas.cole@gmail.com>, Vincent Breitmoser <look@my.amazin.horse>, ianG <iang@iang.org>
Subject: Re: [openpgp] Followup on fingerprints
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Aug 2015 01:20:16 -0000

On Thu, Aug 6, 2015 at 3:19 PM, Daniel Kahn Gillmor <dkg@fifthhorseman.net>
wrote:

> On Thu 2015-08-06 12:12:48 -0400, Nicholas Cole wrote:
> > There's actually just a more basic, practical problem. Most gpg tools
> > assume unique fingerprints. Is it even possible to specify one key rather
> > than another if both have the same fingerprint?
>
> but what are the consequences of this?  If there's a specifically
> troubling scenario that puts other people at risk, we should be able to
> describe it.
>
> If there isn't, then this suggests that actually using two keys with the
> same fingerprint is a problem only for the person who holds the two
> keys, right?
>
> But that person has an easy (much cheaper in fact) way to proceed
> without the problem: don't make a fingerprint collision in the first
> place!
>

Dan,

The problem is that the person who is potentially at risk is not the key
holder but the relying party who verifies the key.

As with 'Domain Separation' it is a case where most of us prefer to be
conservative unless there is a good reason to try the bleeding edge.
Doubling the length of a printed fingerprint is clearly a problem. Having a
big internal fingerprint isn't.

Here, 100, 125 or 150 bits seem fine for a printed fingerprint and 256 bits
is comfortable for an internal one. Do we really need to go further? My
original goal was to avoid having to go into this explanation at last call.