Re: [openpgp] New fingerprint: to v5 or not to v5
Nicholas Cole <nicholas.cole@gmail.com> Sun, 11 October 2015 09:02 UTC
Return-Path: <nicholas.cole@gmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB76A1A6F9F for <openpgp@ietfa.amsl.com>; Sun, 11 Oct 2015 02:02:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.1
X-Spam-Level:
X-Spam-Status: No, score=-0.1 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HZCHz9lYfs4t for <openpgp@ietfa.amsl.com>; Sun, 11 Oct 2015 02:02:41 -0700 (PDT)
Received: from mail-wi0-x22b.google.com (mail-wi0-x22b.google.com [IPv6:2a00:1450:400c:c05::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 885E71A6F62 for <openpgp@ietf.org>; Sun, 11 Oct 2015 02:02:40 -0700 (PDT)
Received: by wicgb1 with SMTP id gb1so17710856wic.1 for <openpgp@ietf.org>; Sun, 11 Oct 2015 02:02:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=CS80X7I9PLbdL8FhNrjIZpRCvvBfFs1p3+pwmX5bquU=; b=aqfHeP7ifaeaN5B3XQAKIMbEuGNaaPFzMjJwlkocI70Qqj7w8/aKGZu//GsoXtMZeh oBlhUuMfuE1LKP0wAggE2BS8dyXgBE1lv+AV7dYHSCVt000dDjor1S52b2ZJTGf/0U7a Ci0K7Ag7jHGz+28vTZlFl+c5KV9Vjr2TruyzXFDlEZRKKKI8kvRVCnzY3LnZHw4OWFDg Jbtkunu1Jj8Fxc3GIvOY0S0fV92uZh4rmOp3ALIGEMNv7mni1NoCz/2m+Fb0nZ/EwNMi HQhQZiL+0vMTW4Pw9NfNyDcoUn5NtHhUf+1m3qa7jAU1bBr+Rln4EJ3ORdrgPORkpObI nOQw==
MIME-Version: 1.0
X-Received: by 10.181.8.72 with SMTP id di8mr8588457wid.62.1444554158877; Sun, 11 Oct 2015 02:02:38 -0700 (PDT)
Received: by 10.28.24.75 with HTTP; Sun, 11 Oct 2015 02:02:38 -0700 (PDT)
In-Reply-To: <20151010103549.GZ26454@earth.li>
References: <878u84zy4r.fsf@vigenere.g10code.de> <87fv1xxe5w.fsf@alice.fifthhorseman.net> <87r3lgcup8.fsf@vigenere.g10code.de> <CACsn0c=-LKagSqTbgOV1W4Gu4u-f6vpVq82-nWSLGogjoeFKeg@mail.gmail.com> <CAMm+LwjeKDKnN2ZAisbKhWVS4kwCEm_VvcZ1MtftYzEJQpGdhg@mail.gmail.com> <87y4fi5wa9.fsf@vigenere.g10code.de> <9A043F3CF02CD34C8E74AC1594475C73F4B278ED@uxcn10-5.UoA.auckland.ac.nz> <8737xp5z45.fsf@vigenere.g10code.de> <56128637.6030504@iang.org> <87wpuvx4o1.fsf@alice.fifthhorseman.net> <20151010103549.GZ26454@earth.li>
Date: Sun, 11 Oct 2015 10:02:38 +0100
Message-ID: <CAAu18hcWqYvT3HcvxPqGh_Q3PZN50vGbHfBjXCUu_4Bo_7Ln1w@mail.gmail.com>
From: Nicholas Cole <nicholas.cole@gmail.com>
To: "openpgp@ietf.org" <openpgp@ietf.org>
Content-Type: multipart/alternative; boundary="001a1134cdee7fb6180521d079c3"
Archived-At: <http://mailarchive.ietf.org/arch/msg/openpgp/xQl96SDpfOm8mofmik6H-S_wJ4Y>
Subject: Re: [openpgp] New fingerprint: to v5 or not to v5
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Oct 2015 09:02:42 -0000
On Saturday, 10 October 2015, Jonathan McDowell <noodles@earth.li> wrote: > On Fri, Oct 09, 2015 at 02:44:46PM -0400, Daniel Kahn Gillmor wrote: > > a) don't include any key creation time at all; signatures themselves > > have a creation time, which is sufficient. > > > > b) include key creation time in the material certified only for > > self-sigs (certifications issued by the key itself). Do not include > > any key creation time in the material certified by third-parties. > > > > c) Include creation time of the certified key in the material certified > > for all certifications -- first-party or third-party. > > > > I'm tempted by the simplicity of (a), to be honest. > > > > (b) sounds doable, but i don't know how useful it is to have assertions > > from the key of when the key was created, or what to do with situations > > where some self-sigs assert a different key creation time than others. > > Should we reject or ignore some of them? if so, which ones? > > > > (c) sounds like trouble -- you'll get self-signed assertions of key > > creation time that don't match third-party assertions of key creation > > time. What does that mean? how should it be represented to the user? > > I think this is the issue that Werner was hinting at. > > > > what are the downsides of (a)? What are the advantages of having a key > > creation time at all? Is it simply that it provides a universally-known > > temporal boundary when to accept signatures made by that key? > > I've certainly used key creation time as a separate piece of information > to "most recent self-signature". The latter indicates how recently the > key can be seen as still in use / maintained, but the former gives an > idea of how long it's been around and can help when making a decision > about which of multiple keys to use for an individual. I think having > that in the self-sig would work ok (i.e. option b). In general is the > most recent self-sig not the one that should be trusted, with perhaps a > warning if any of the previous ones have a different creation time > listed? > > For what it is worth, I think that a secure creation time is probably useful to some, and should be preserved if possible. If it can be included in the hashed material for the key (as it currently is) in a way that does not help people to forge keys, then I think it should be -- including it only as a piece of signed data is going to allow key owners to manipulate it.
- [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 vedaal
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 ianG
- Re: [openpgp] New fingerprint: to v5 or not to v5 Simon Josefsson
- Re: [openpgp] New fingerprint: to v5 or not to v5 Daniel Kahn Gillmor
- Re: [openpgp] New fingerprint: to v5 or not to v5 ianG
- Re: [openpgp] New fingerprint: to v5 or not to v5 Daniel A. Nagy
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: which hash algo (w… Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Watson Ladd
- Re: [openpgp] New fingerprint: to v5 or not to v5 Phillip Hallam-Baker
- Re: [openpgp] New fingerprint: which hash algo (w… Tom Ritter
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Mark D. Baushke
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: to v5 or not to v5 ianG
- Re: [openpgp] New fingerprint: to v5 or not to v5 ianG
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: which hash algo (w… Simon Josefsson
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: which hash algo ianG
- Re: [openpgp] New fingerprint: which hash algo vedaal
- Re: [openpgp] New fingerprint: which hash algo Steve Pointer
- Re: [openpgp] New fingerprint: which hash algo Alessandro Barenghi
- Re: [openpgp] New fingerprint: which hash algo Robert J. Hansen
- Re: [openpgp] New fingerprint: to v5 or not to v5 Daniel Kahn Gillmor
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: to v5 or not to v5 Jonathan McDowell
- Re: [openpgp] New fingerprint: to v5 or not to v5 Nicholas Cole
- Re: [openpgp] New fingerprint: to v5 or not to v5 Vincent Breitmoser
- Re: [openpgp] New fingerprint: which hash algo Daniel A. Nagy
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: to v5 or not to v5 Peter Gutmann
- Re: [openpgp] New fingerprint: to v5 or not to v5 Watson Ladd
- Re: [openpgp] New fingerprint: to v5 or not to v5 Werner Koch
- Re: [openpgp] New fingerprint: which hash algo Phillip Hallam-Baker
- Re: [openpgp] New fingerprint: which hash algo ianG
- Re: [openpgp] New fingerprint: which hash algo Daniel Kahn Gillmor
- Re: [openpgp] New fingerprint: which hash algo Phillip Hallam-Baker