Re: Interesting real world short ID collision

2012-02-15 Thread Werner Koch
On Wed, 15 Feb 2012 05:32, ds...@jabberwocky.com said:

 It seems the owner of one went to a keysigning party, and an attendee was 
 rather surprised to find two keys coming back from the keyserver for that 
 ID...

At the FSFE we had this surprise regulary with 76B8337A which is used by
one of our office folks.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Interesting real world short ID collision

2012-02-14 Thread David Shaw
As pointed out in Debian bug 659905, on the keyservers, the primary key 
171CAA4A (dated 2002) collides (presumably naturally) with a subkey on primary 
key 1C8BB5A7 (dated 2000).

It seems the owner of one went to a keysigning party, and an attendee was 
rather surprised to find two keys coming back from the keyserver for that ID...

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659905

David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2012-01-06 Thread John Clizbe
Dan McGee wrote:
  On Thu, Dec 29, 2011 at 2:18 AM, John Clizbe j...@enigmail.net wrote:
  Jerry wrote:
 
  It would seem, and this is strictly my own opinion, that if the old
  pksd servers are dead then there is no logical reason to continue to
  support them. Just my 2¢.
 
  If only all software support decisions were that cut and dried. Oh well...
 
  David Shaw committed patches to the 1.4, 2.0,  2.1 branches of GnuPG
yesterday
  afternoon (28-Dec). The change will be in the next release of each branch.
 
  Just discovered keyservers are still totally crappy on this front.
  Check this out when using a subkey ID to try to fetch a key; the
  following is a request produced by GPGME gpgme_get_key() that returns
  no matches (note that this is a subkey ID):
 
  Subkey lookup, broken in first URL:
 
http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0x22AD5874F39D989Fexact=on
  vs.
 
http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0xF39D989Fexact=on
 
  Public key lookup, both work:
 
http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0x6D1A9E70E19DAA50exact=on
  vs.
 
http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0xE19DAA50exact=on
 
  This is totally unacceptable in my opinion, why do we have such broken
  infrastructure that it cannot support a simple lookup like this?
thread reference:
http://lists.gnupg.org/pipermail/gnupg-users/2012-January/043495.html

Thanks for the patch, Dan. Tested with short  long key IDs and fpr of my
encryption and authentication subkeys on OpenPGP card key 0x435BD034.

[Signature key : E2B8 43E8 E65E EF41 27AF  A222 2313 315C 435B D034

 Encryption key: 8C87 E7D8 63B4 0BA0 CE62  BA8B ABFE 8362 C97A C237

 Authentication key: 8841 2F18 79D5 34B8 FA3E  CC56 6D59 9CFB B850 79AD]

http://keyserver.gingerbear.net:11371/pks/lookup?op=indexoptions=mrsearch=0x8C87E7D863B40BA0CE62BA8BABFE8362C97AC237exact=on

http://keyserver.gingerbear.net:11371/pks/lookup?op=indexoptions=mrsearch=0xABFE8362C97AC237exact=on

http://keyserver.gingerbear.net:11371/pks/lookup?op=indexoptions=mrsearch=0x88412F1879D534B8FA3ECC566D599CFBB85079ADexact=on

http://keyserver.gingerbear.net:11371/pks/lookup?op=indexoptions=mrsearch=0x6D599CFBB85079ADexact=on

Works fine.

The patch will be in the next release of SKS and until then the patched source
may be pulled from:

hg clone https://code.google.com/r/johnclizbe-sks-keyserver/

Thanks again for the patch.

-John

-- 
John P. Clizbe  Inet: John (a) GingerBear DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

   Cowboy Haiku -- Reflections on Rodeo
So many Cowboys. / Round Wrangler butts drive me nuts. / Never enough rope.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2012-01-05 Thread Dan McGee
On Thu, Dec 29, 2011 at 2:18 AM, John Clizbe j...@enigmail.net wrote:
 Jerry wrote:

 It would seem, and this is strictly my own opinion, that if the old
 pksd servers are dead then there is no logical reason to continue to
 support them. Just my 2¢.

 If only all software support decisions were that cut and dried. Oh well...

 David Shaw committed patches to the 1.4, 2.0,  2.1 branches of GnuPG 
 yesterday
 afternoon (28-Dec). The change will be in the next release of each branch.

Just discovered keyservers are still totally crappy on this front.
Check this out when using a subkey ID to try to fetch a key; the
following is a request produced by GPGME gpgme_get_key() that returns
no matches (note that this is a subkey ID):

Subkey lookup, broken in first URL:

http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0x22AD5874F39D989Fexact=on
vs.

http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0xF39D989Fexact=on

Public key lookup, both work:

http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0x6D1A9E70E19DAA50exact=on
vs.

http://pgp.mit.edu:11371/pks/lookup?op=indexoptions=mrsearch=0xE19DAA50exact=on

This is totally unacceptable in my opinion, why do we have such broken
infrastructure that it cannot support a simple lookup like this?

-Dan

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2012-01-05 Thread John Clizbe
Dan McGee wrote:
 On Thu, Dec 29, 2011 at 2:18 AM, John Clizbe j...@enigmail.net wrote:
 Jerry wrote:

 It would seem, and this is strictly my own opinion, that if the old
 pksd servers are dead then there is no logical reason to continue to
 support them. Just my 2¢.

 If only all software support decisions were that cut and dried. Oh well...

 David Shaw committed patches to the 1.4, 2.0,  2.1 branches of GnuPG 
 yesterday
 afternoon (28-Dec). The change will be in the next release of each branch.
 
 Just discovered keyservers are still totally crappy on this front.
 Check this out when using a subkey ID to try to fetch a key; the
 following is a request produced by GPGME gpgme_get_key() that returns
 no matches (note that this is a subkey ID):

I guess you don't know the degree that SKS from its outset stripped much of the
crappy from PKSD. The few flecks of fecal implementation were needed at the
time for interoperability -- a nasty practicality of which software writers on
the Internet have to be mindful.

As for being still totally crappy, the problem only came up in discussion about
a week ago. Do you expect us to pull a fix out of our behinds and have it
magically applied to all existing keyservers in a week? BTW, it's being
discussed on the GnuPG-* lists. NO ONE has opened an issue on SKS


snip
 
 This is totally unacceptable in my opinion, why do we have such broken
 infrastructure that it cannot support a simple lookup like this?

I'm sorry, did you mean to attach a patch fixing this to this message?

Supply a patch, help test it, and shepherd it into a release, or you're just
being part of the problem, IMO.

Patches for SKS are accepted at sks-de...@nongnu.org. (subscribe first)

SKS source is available from:

hg clone https://code.google.com/p/sks-keyserver/

(sub)Keys are indexed on short key ID. This was for historical compatibility
with PKSD, as this was the lookup mechanism in place at the time. The patch
allowing longer lookup IDs has _just_ been applied to Gnupg's git repository --
it's NOT even in the wild yet and you're screaming about SKS not making the
change yet.

For most of us, this work we do is an unpaid second job, pay us for support and
you can adopt your tone of it it being Unacceptable IMO. Until then,
contribute or, IMNSHO, plug it.

You may wish to glance at http://sks-keyservers.net/status/.  The frst release
that could have this change in it would be 1.1.3. After almost four months, 14
(actually 12 -- two of those are my public facing development machines out of
five) out of almost 80 have converted. You may expect to see similar slow
adoption rates with this fix (and other things in 1.1.3).


-- 
John P. Clizbe  Inet: John (a) GingerBear DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

   Cowboy Haiku -- Reflections on Rodeo
So many Cowboys. / Round Wrangler butts drive me nuts. / Never enough rope.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2011-12-29 Thread John Clizbe
Jerry wrote:
 
 It would seem, and this is strictly my own opinion, that if the old
 pksd servers are dead then there is no logical reason to continue to
 support them. Just my 2¢.

If only all software support decisions were that cut and dried. Oh well...

David Shaw committed patches to the 1.4, 2.0,  2.1 branches of GnuPG yesterday
afternoon (28-Dec). The change will be in the next release of each branch.

-- 
John P. Clizbe  Inet: John ( a ) Enigmail DAWT org
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

Q:Just how do the residents of Haiku, Hawai'i hold conversations?
A:An odd melody / island voices on the winds / surplus of vowels

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Short ID Collision

2011-12-28 Thread Jerry
Did anyone read about this reported problem with GnuPG and short keys?
I found this on SlashDot this morning:

http://yro.slashdot.org/story/11/12/27/0044242/gnupg-short-id-collision-has-occurred?utm_source=headlinesutm_medium=email

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2011-12-28 Thread Robert J. Hansen
On 12/28/11 6:13 AM, Jerry wrote:
 Did anyone read about this reported problem with GnuPG and short
 keys?

There is no problem.  We've known for quite a long time that short key
ID collisions are possible: that's why you can't rely on a short key ID
as a fingerprint.

There's room for some healthy debate on whether GnuPG should be sending
full fingerprints to query for keys, but honestly, calling this a
problem is really overstating things.  There's some behavior that some
users find less than optimal, but that's not the same as saying there's
a bug in GnuPG that can cause crashes, reveal your data, or anything
else like that.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2011-12-28 Thread David Shaw
On Dec 28, 2011, at 6:13 AM, Jerry wrote:

 Did anyone read about this reported problem with GnuPG and short keys?
 I found this on SlashDot this morning:
 
 http://yro.slashdot.org/story/11/12/27/0044242/gnupg-short-id-collision-has-occurred?utm_source=headlinesutm_medium=email

The proper title of the article should have been Easy method for making a 
OpenPGP short collision re-discovered.  Again.  To his credit, the original 
blog poster more or less says that.  Unfortunately, as various other sites 
picked it up, the issue and focus mutated a bit.

Short key ID collisions are nothing new.  They're obvious, and handling them is 
built into the system.  It's also not hard to make one - just generate keys 
over and over until you get a collision.  On a fast system, that won't take 
very long at all.

Now to the bug, such as it is.  Using the key from the blog post, if I do:

  gpg --recv-keys 70096AD1

I'll get two keys.  The reason for that is that I am requesting something 
ambiguous.  There are two keys with that short key ID, so the server 
(correctly) returns both.  It's up to the caller (me) to decide which is the 
right one, using the web of trust, or whatever means I want to verify keys.  
The keyserver is just a database, and does not say that a given key is right or 
wrong.  That's not the problem.

However, if I do:

  gpg --recv-keys EC4B033C70096AD1

I'll also get two keys.  Even though I gave enough information to specify one 
of the keys in particular, I still got both.  The reason why is due to the 
history of PGP keyservers.  When the GPG side of the keyserver code was 
written, the server side (a program called pksd) was not capable of 
understanding anything *other* than the short key ID.  Because of this, GPG 
intentionally truncates all key IDs to their short representation when 
requesting keys from that type of keyserver.  Other keyservers (LDAP) did not 
have that limitation, and so the longest possible representation is used there.

Since that code was written, time has moved on, and the old pksd server is dead 
and replaced by the sks server, which is capable of understanding more than the 
short key ID.  So given that there aren't any pksd servers to support any 
longer, it has been suggested (see https://bugs.g10code.com/gnupg/issue1340) 
that we should do like we do for LDAP, which never had this limitation in the 
first place, and send the longest key ID we can.  It's a reasonable thing to do 
- if the user gives us 64 bits, use all 64 bits.

So is this a security problem?  No, for many reasons, most of which were 
mentioned in the responses to the blog post.  Allow me to add one more reason: 
keyservers aren't capable of saying if a key is the right one or not.  They're 
just a searchable database that anyone can submit to.  A person who trusts a 
particular key is correct just because they found it on a keyserver is fooling 
themselves.  That's what we have a web of trust and/or fingerprint checking for.

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Short ID Collision

2011-12-28 Thread Jerry
On Wed, 28 Dec 2011 11:57:40 -0500
David Shaw articulated:

 On Dec 28, 2011, at 6:13 AM, Jerry wrote:
 
  Did anyone read about this reported problem with GnuPG and short
  keys? I found this on SlashDot this morning:
  
  http://yro.slashdot.org/story/11/12/27/0044242/gnupg-short-id-collision-has-occurred?utm_source=headlinesutm_medium=email
 
 The proper title of the article should have been Easy method for
 making a OpenPGP short collision re-discovered.  Again.  To his
 credit, the original blog poster more or less says that.
 Unfortunately, as various other sites picked it up, the issue and
 focus mutated a bit.
 
 Short key ID collisions are nothing new.  They're obvious, and
 handling them is built into the system.  It's also not hard to make
 one - just generate keys over and over until you get a collision.  On
 a fast system, that won't take very long at all.
 
 Now to the bug, such as it is.  Using the key from the blog post,
 if I do:
 
   gpg --recv-keys 70096AD1
 
 I'll get two keys.  The reason for that is that I am requesting
 something ambiguous.  There are two keys with that short key ID, so
 the server (correctly) returns both.  It's up to the caller (me) to
 decide which is the right one, using the web of trust, or whatever
 means I want to verify keys.  The keyserver is just a database, and
 does not say that a given key is right or wrong.  That's not the
 problem.
 
 However, if I do:
 
   gpg --recv-keys EC4B033C70096AD1
 
 I'll also get two keys.  Even though I gave enough information to
 specify one of the keys in particular, I still got both.  The reason
 why is due to the history of PGP keyservers.  When the GPG side of
 the keyserver code was written, the server side (a program called
 pksd) was not capable of understanding anything *other* than the
 short key ID.  Because of this, GPG intentionally truncates all key
 IDs to their short representation when requesting keys from that type
 of keyserver.  Other keyservers (LDAP) did not have that limitation,
 and so the longest possible representation is used there.
 
 Since that code was written, time has moved on, and the old pksd
 server is dead and replaced by the sks server, which is capable of
 understanding more than the short key ID.  So given that there aren't
 any pksd servers to support any longer, it has been suggested (see
 https://bugs.g10code.com/gnupg/issue1340) that we should do like we
 do for LDAP, which never had this limitation in the first place, and
 send the longest key ID we can.  It's a reasonable thing to do - if
 the user gives us 64 bits, use all 64 bits.
 
 So is this a security problem?  No, for many reasons, most of which
 were mentioned in the responses to the blog post.  Allow me to add
 one more reason: keyservers aren't capable of saying if a key is the
 right one or not.  They're just a searchable database that anyone can
 submit to.  A person who trusts a particular key is correct just
 because they found it on a keyserver is fooling themselves.  That's
 what we have a web of trust and/or fingerprint checking for.

It would seem, and this is strictly my own opinion, that if the old
pksd servers are dead then there is no logical reason to continue to
support them. Just my 2¢.

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users