Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-06-01 Thread MFPA
Hi


On Wednesday 30 May 2012 at 10:30:56 PM, in
mid:4fc69190.5000...@sixdemonbag.org, Robert J. Hansen wrote:

 
 And if the planting *is* coordinated, why in the world
 would you ever need a 1 in 6 penetration rate? 

 
Whilst it would be *possible* for the various different departments
and agencies mentioned by the OP to coordinate their efforts, that
seemed so far-fetched to me as to not merit consideration.


-- 
Best regards

MFPAmailto:expires2...@rocketmail.com

No man ever listened himself out of a job


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-30 Thread MFPA
Hi


On Monday 28 May 2012 at 3:12:24 AM, in
mid:4fc2df08.4020...@sixdemonbag.org, Robert J. Hansen wrote:


 The problem isn't the fraction of the population.  The
 problem is command and control.

That will always be a problem if the planting is uncoordinated. 

As a thought experiment, what happens when all the real protesters
have gone on to something else and plants from various agencies make
up 100%?


-- 
Best regards

MFPAmailto:expires2...@rocketmail.com

When it comes to humility, I'm the greatest. 


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-30 Thread Robert J. Hansen
On 05/30/2012 04:14 PM, MFPA wrote:
 That will always be a problem if the planting is uncoordinated. 

And if the planting *is* coordinated, why in the world would you ever
need a 1 in 6 penetration rate?  I'm sorry, but this is rapidly
descending down the rabbit-hole of conspiracy theory -- where every plea
for sanity and rationality is met by an expansion of the conspiracy
theory in order to explain why sanity and rationality don't work in this
particular case.

The world is not _The Illuminatus! Trilogy_.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-30 Thread Jean-David Beyer
MFPA wrote:
 Hi
 
 
 On Monday 28 May 2012 at 3:12:24 AM, in
 mid:4fc2df08.4020...@sixdemonbag.org, Robert J. Hansen wrote:
 
 
 The problem isn't the fraction of the population.  The
 problem is command and control.
 
 That will always be a problem if the planting is uncoordinated. 
 
 As a thought experiment, what happens when all the real protesters
 have gone on to something else and plants from various agencies make
 up 100%?
 
 
My mother once told me that it was easy in the late 1930s and 1940s for
Communist Party members to identify the FBI informants. The informants
were the only ones who paid their dues. Real communists could not afford it.

-- 
  .~.  Jean-David Beyer  Registered Linux User 85642.
  /V\  PGP-Key: 9A2FC99A Registered Machine   241939.
 /( )\ Shrewsbury, New Jerseyhttp://counter.li.org
 ^^-^^ 17:40:01 up 1 day, 2:00, 4 users, load average: 1.26, 1.36, 1.35

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-30 Thread Hubert Kario
On Wednesday 30 of May 2012 21:14:42 MFPA wrote:
 Hi
 
 
 On Monday 28 May 2012 at 3:12:24 AM, in
 
 mid:4fc2df08.4020...@sixdemonbag.org, Robert J. Hansen wrote:
  The problem isn't the fraction of the population.  The
  problem is command and control.
 
 That will always be a problem if the planting is uncoordinated.
 
 As a thought experiment, what happens when all the real protesters
 have gone on to something else and plants from various agencies make
 up 100%?

Ahh, the Memoirs Found in a Bathtub! Well written book, quite captivating.
-- 
Hubert Kario
QBS - Quality Business Software
02-656 Warszawa, ul. Ksawerów 30/85
tel. +48 (22) 646-61-51, 646-74-24
www.qbs.com.pl

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-28 Thread Benjamin Donnachie
On 22 May 2012 09:58, tim.kac...@gmail.com wrote:

 I think it should be okay to dredge up this topic ever couple years.  From
 what I am reading, links below,  I do not feel comfortable with the key
 length and algorithmic security offered by GPG's defaults.


Use this patch to increase the maximum keysize in gpg2 to 8192 when using
the --expert option - intended for v2.0.17 but should be good for later
versions too.

--- g10/keygen.c2011-01-15 16:32:30.0 +
+++ g10/keygen.c2011-01-15 16:32:42.0 +
@@ -1774,7 +1774,7 @@
 static unsigned
 ask_keysize (int algo, unsigned int primary_keysize)
 {
-  unsigned int nbits, min, def = DEFAULT_STD_KEYSIZE, max=4096;
+  unsigned int nbits, min, def = DEFAULT_STD_KEYSIZE, max=8192;
   int for_subkey = !!primary_keysize;
   int autocomp = 0;



*--expert*

Allow the user to do certain nonsensical or silly things like signing an
expired or revoked key, or certain potentially incompatible things like
generating unusual key types. This also disables certain warning messages
about potentially incompatible actions. As the name implies, this option is
for experts only. If you don't fully understand the implications of what it
allows you to do, leave this off. --no-expert disables this option.


It's generally accepted that a big key is a silly thing so seems perfect
for inclusion in the expert option.

Ben
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-28 Thread Sam Whited
On Mon, May 28, 2012 at 12:27 PM, Benjamin Donnachie
benja...@py-soft.co.uk wrote:
 On 22 May 2012 09:58, tim.kac...@gmail.com wrote:

 I think it should be okay to dredge up this topic ever couple years.  From
 what I am reading, links below,  I do not feel comfortable with the key
 length and algorithmic security offered by GPG's defaults.


 Use this patch to increase the maximum keysize in gpg2 to 8192 when using
 the --expert option - intended for v2.0.17 but should be good for later
 versions too.

If you're going to add it to the --expert option it almost seems silly
to restrict it to 8192. Might as well pick an arbitrarily large number
since the point is to account for silly and/or experimental use
cases anyways.

2^32 should more than cover it (while we're being silly)
I read a paper a while back discussing key size in which they
generated extremely large keys on large clusters for some reason...
I'll have to see if I can dig it out.

—Sam


 --- g10/keygen.c        2011-01-15 16:32:30.0 +
 +++ g10/keygen.c        2011-01-15 16:32:42.0 +
 @@ -1774,7 +1774,7 @@
  static unsigned
  ask_keysize (int algo, unsigned int primary_keysize)
  {
 -  unsigned int nbits, min, def = DEFAULT_STD_KEYSIZE, max=4096;
 +  unsigned int nbits, min, def = DEFAULT_STD_KEYSIZE, max=8192;
    int for_subkey = !!primary_keysize;
    int autocomp = 0;



 --expert

 Allow the user to do certain nonsensical or silly things like signing an
 expired or revoked key, or certain potentially incompatible things like
 generating unusual key types. This also disables certain warning messages
 about potentially incompatible actions. As the name implies, this option is
 for experts only. If you don't fully understand the implications of what it
 allows you to do, leave this off. --no-expert disables this option.


 It's generally accepted that a big key is a silly thing so seems perfect
 for inclusion in the expert option.

 Ben



-- 
Sam Whited
pub 4096R/EC2C9934

SamWhited.com
s...@samwhited.com
404.492.6008

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-27 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Tuesday 22 May 2012 at 6:10:05 PM, in
mid:4fbbc86d.30...@sixdemonbag.org, Robert J. Hansen wrote:


 Not even Nicolai Ceaucescu's Romania or Erich
 Honecker's German Democratic Republic were able to get
 one in six people to serve as informers.

Planted informers numbering 1 in 6 of the protesters would still be
a statistically negligible percentage of the population at large.


- --
Best regards

MFPAmailto:expires2...@rocketmail.com

Never interrupt me when I'm trying to interrupt you.
-BEGIN PGP SIGNATURE-

iQCVAwUBT8Ko+qipC46tDG5pAQq4VwQAwKtRlBkhlH50FC3Qx/dp6Qv4mAh3+bjb
xepFNDP3enfgt60RDCarrAqoi0HbZgeyk/zayLxbdLdRkE1u+3TPbkKLmX1iIJLF
9RkvTD0gtG8ExPou6HbHGZEKXbMjf7Tm+S0QVjHOMP5KxSFp0bpPcK8GM2hX65I/
ictKd01Eb2w=
=uOM8
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-27 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 5/27/12 6:21 PM, MFPA wrote:
 Planted informers numbering 1 in 6 of the protesters would still 
 be a statistically negligible percentage of the population at
 large.

That's actually not the problem.  The problem is that if 1 in 6 people
is a plant, then you're going to have endless amounts of embarrassing
blue-on-blue -- one plant decides to do X to prove to his handlers that
he can Get Things Done(tm) and is worth the money he's getting paid, and
one plant, upon hearing that oh my God, this guy is planning on doing
X!, does everything possible to block X in order to prove to *his*
handlers that he's preventing major incidents and is worth the money
he's getting paid.

The problem isn't the fraction of the population.  The problem is
command and control.


-BEGIN PGP SIGNATURE-

iFYEAREIAAYFAk/C3wgACgkQI4Br5da5jhDmeQDgvcd0Sk0jvTFUqpY/o3dRCQWc
5CkyxhKJj30dFwDeJWwhWPxiMSPh2pk/hBJme6duMcRWi6J8QmrVsA==
=W90A
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-23 Thread da...@gbenet.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 22/05/12 19:40, Robert J. Hansen wrote:
 On 5/22/12 2:26 PM, Hauke Laging wrote:
 Given the frequency of this discussion and the amount of effort takes by the 
 participants: Wouldn't it make sense to make this a FAQ entry?
 
 I think so, yes.  The question is who's going to write it?  I suspect Werner 
 doesn't
 have the time.  If he wants, I would be happy to take a stab at writing it.
 
 
 ___ Gnupg-users mailing list 
 Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
 
A good idea Robert!

David


- -- 
“See the sanity of the man! No gods, no angels, no demons, no body. Nothing of 
the
kind.Stern, sane,every brain-cell perfect and complete even at the moment of 
death. No
delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJPvKNjAAoJEOJpqm7flRExCLwH/RkpUwsTVZhXog8abFgosJqe
th4H1d3yejkbO1fxytyxwufQEZmzruz4SPpoWT2TcZ71SmznoSWXqWm5rQ53K1sD
WoRvGdutOiVRTghR1wS3bvsR+BcH2lUXQqvWqqiu0WYkEvKierEpR+rw+p5vrEsS
P2CQ8GqKDwNeipZn+7zcx5ZE2jykSk/Yzc47ptEv9PrKuIA4R7Gs8FqZ3Hbr4gCM
wWPz+YmjIlvl3YSncMOOWnMbFD2HqJhVB6kQN/9rGVUy3H09aqhbQSYFUwwns/tE
1AnrZ8VytiMJGUGt8il0KWZtTtHkqs1Rzn6nOrtHo2agxb0ELpECXDqFTnI1fLs=
=yP71
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread tim . kachao
I think it should be okay to dredge up this topic ever couple years.  From 
what I am reading, links below,  I do not feel comfortable with the key 
length and algorithmic security offered by GPG's defaults.

I have not been able to figure out how to get keylengths greater than 3072 
for DSA/elgmal or 4094 rsa, so I conclude that generating them is 
unsupported by GPG although GPG can use them.  I have seen many people 
saying that these types of key lengths are way more than anyone could 
reasonably need, but I am skeptical.

I am involved in a local Occupy (bet you thought occupy was kaput eh?  well 
as it were known it is but that's another story) and frankly we aren't 
just up against one intelligence agency, but all intel agencies put 
together.  An entire global class of people.  You can argue that they may 
be uninterested in me, however I don't buy that argument at all because 
they have spent (possibly a lot) more than a thousand dollars at least on 
me personally at this point I am sure in policing costs to try to 
survielle and intimidate me, after you divide down. 

 The eviction alone at my occupy cost (probably greatly) in excess of 
$16,000 to arrest 8 people, and involved almost 200 cops for 4 hours.  
There are also estimates made that in the US 1 in 6 protestors is 
actually a government agent of one sort or another, dept of defense, 
homeland security, fbi what have you.  And that exludes any thugs the 
bankers put in the crowd as privately hired types.

Secondly I want my communications to remain unread into the relatively 
distant future.  Given the sort of crap the 1% do wrt murdering and 
maiming vast quantites of people for a couple extra bucks I would not be 
the least bit surprised if 20 years from now they dissapeared me 
because I passed our some pamphlets that said end class war now. 

 An enemy is an enemy, and enemies must be smooshed, right?  Why take risks 
like letting an innocent person live if they might concievable scratch 
your gravy train at some point in the future? Abductions and bullets 
aren't that expensive once you got everything all set up, it's a good 
investement.


I'm 23 now and I take various modest precautions to ensure that I have the 
best chance I can to remain in good health when I am 43. Or 63.  A couple 
hundred extra milliseconds of decryption/encryption time per message for 
a key longer than 3072 or 4092 sounds like a good choice frankly.  Is 
that not what we are looking at?

And yes I recognize that it would be a lot easier for them to plant spyware 
on my computers than break the keys, however they can't plant spyware on 
everone's computer. without people noticing  They do slurp up and 
probably store indefinitely all text -and many other- communications on 
the internet (carnivore etc.).  In the future, data they don't have they 
can't use.  There is always a substantial probability that they will not 
get my keys with spyware, and I would like capitalize (If you'll pardon 
me) on that.

Fourthly a little safety margin never hurt.

I think it should be easier to pick longer keys.  Also info should be 
included in the compendium regarding practical aspects of key choice, 
like a table that shows how long it takes to encrypt a symmetric key with 
2048, 4092 etc.  Or event just a table in which you select your 
adversary, then your time horizon, and it tells you what key lengths are 
suitable, with due warnings and notes regarding the possibility of 
quantum computers, mathematical advances etc.

I understand that no matter how long the keys are it's still only a 
relatively small part of the equation.  However I thought it was the norm 
to pick something that basically eliminated concern about the encryption 
being broken, so one could forget about that part and focus on the 
rest.of your security worries.

My trust in GPG has been disturbed by this state of affairs.  I thought I 
could just trust the defaults but I am finding that they may not really 
include the safety margin that people desire. I shudder to think of 
people who are doing more serious stuff in the class war than little ol' 
me (which isn't hard).

Links:
http://en.wikipedia.org/wiki/RSA_%28algorithm%29
-http://www.schneier.com/essay-368.html  note that this was written in 1998
http://www.rsa.com/rsalabs/node.asp?id=2004  this one in particular makes 
it clear that it is not unreasonable for someone in my position to choose 
a 4096 bit key.


http://en.wikipedia.org/wiki/Key_length wikipedia says the U.S. Government 
requires 192 or 256-bit AES keys for highly sensitive data.  A 3072 bit 
RSA or elGamal key is about equivalent to 128 bit symmetric key, right?  
And a 256 bit key length equivalent public key is abut 15,387 bits..  I 
think if people want to use the same level of encryption for their data 
that the government uses shouldn't that be supported at least in command 
line mode?
http://www.win.tue.nl/~klenstra/aes_match.pdf good paper on equivalencies 
in 

Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Jerry
On Tue, 22 May 2012 04:58:48 -0400
tim.kac...@gmail.com articulated:

{snip}

sarcasm

Interesting! I once worked for a secret government agency. We had a
working theory that anyone using encryption for other than normal
business operations was an obvious enemy of the state. I guess we must
have missed you. We will be coming soon.

/sarcasm

Seriously, have you forgotten to take your meds today?

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__

if all you have is a hammer, everything looks like a nail

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 8:12 AM, Jerry wrote:
 Seriously, have you forgotten to take your meds today?

Let's not be mean.

I will be the absolute first person demanding the right to criticize
ideas as harshly as I want.  I'll happily call an idea stupid,
ill-informed, wrong, or anything else.  I do this with a clear
conscience because I know that I'm not my ideas, just like nobody else
is theirs.

But I don't ever want to the the first person to be calling *people*
those things.  People are special, precious, and often fragile.  Our
community is made up of these rare commodities, and it behooves us to
treat other people with dignity and respect and consideration.

Let's not be mean.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread da...@gbenet.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 22/05/12 13:12, Jerry wrote:
 On Tue, 22 May 2012 04:58:48 -0400 tim.kac...@gmail.com articulated:
 
 {snip}
 
 sarcasm
 
 Interesting! I once worked for a secret government agency. We had a working 
 theory that
 anyone using encryption for other than normal business operations was an 
 obvious enemy
 of the state. I guess we must have missed you. We will be coming soon.
 
 /sarcasm
 
 Seriously, have you forgotten to take your meds today?
 

Knock! Knock!

I think that here in the UK the intelligence services have always considered 
that the real
enemy of the state was the people!

I take a dispersible Aspirin every day - keeps the spooks away! Ha!

David

- -- 
“See the sanity of the man! No gods, no angels, no demons, no body. Nothing of 
the
kind.Stern, sane,every brain-cell perfect and complete even at the moment of 
death. No
delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJPu5ZMAAoJEOJpqm7flRExQbQH/RpzFyB5fZ4wWvds+L09MHfS
0mnw+8PNfIXEOczswWGRkzMmbHcqTfhH2k669VppcQx1UXCYcJseTquRArlcxVl/
Et/I8cBIJu0TnkDvJmbzEacJAJpM6LRSqfZtjzIS4BTFnaJCsrNg1Z+mXAH0qaNT
6oL1VTOUTVsQuLytNeZSUCTppIlt6UtSB38c3HqxOZufJmH2GQK7bzYUnbPbvODo
mLJ/psupfAEBmk81wAinIe0JxX2d+enVGYsZyOk0cvCLe2JY+4JBpMJx2Iydhv+N
Zc4ee4kkbTvMHjEBxHQ6UcK+A2c515F/xmmaBgo8/fUw1VOTYuG3Wd8BbLp9JjY=
=xXwi
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 4:58 AM, tim.kac...@gmail.com wrote:
 I am involved in a local Occupy (bet you thought occupy was kaput eh?
 well as it were known it is but that's another story) and frankly we
 aren't just up against one intelligence agency, but all intel
 agencies put together.

You might want to re-think talking about this in a public forum.  This
mailing list is open to everyone, including the very people you're
talking about.  The first rule of good operational security is, don't
draw attention to yourself or your organization.

 Secondly I want my communications to remain unread into the
 relatively distant future.

A 3072-bit key will do that today.  Breaking a 3K key would require such
technological advances that it would be indistinguishable from science
fiction.  There's no point in going past a 3K key because if a 3K key
were to ever fall we'd have to reconsider the mathematical foundations
of cryptography.

 I'm 23 now and I take various modest precautions to ensure that I
 have the best chance I can to remain in good health when I am 43. Or
 63.  A couple hundred extra milliseconds of decryption/encryption
 time per message for a key longer than 3072 or 4092 sounds like a
 good choice frankly.  Is that not what we are looking at?

No, it's not.

Imagine an automobile.  You might say, well, I'd like an additional
hundred horsepower so I want to put a V-8 engine in my automobile: why
doesn't my automobile support this?  But if your car is a Fiat 500,
well, there's simply not the room for such a large engine, nor is the
transmission or powertrain ready for that.  For that matter, even the
wheels would have to be redesigned: sustained high-speed driving on your
average Goodyears will cause them to delaminate and come apart, so you'd
need H-rated sport wheels or Pirelli PZero Neros.

Changing one component requires changes to a lot of other components.
That's what we're facing with changing the maximum key length.  The
mobile experience would be impacted, the embedded market would be
impacted, and even interoperability with other OpenPGP applications
would be impacted (since as far as I know none of them save for PGP
6.5.8ckt support such large keys).

It's all right to ask for larger keys to be supported, but there are
tradeoffs to be made here.

 Fourthly a little safety margin never hurt.

That safety margin is already present.

 I understand that no matter how long the keys are it's still only a 
 relatively small part of the equation.  However I thought it was the
 norm to pick something that basically eliminated concern about the
 encryption being broken, so one could forget about that part and
 focus on the rest.of your security worries.

Yes, and 128-bit crypto is plenty sufficient for that.

 http://en.wikipedia.org/wiki/Key_length wikipedia says the U.S.
 Government requires 192 or 256-bit AES keys for highly sensitive
 data.

Quoting from that page, 128 bits is currently thought, by many
observers, to be sufficient for the foreseeable future.

The Wikipedia page is also in error.  Per the publicly-available NSA
Suite B documents, AES128 is considered sufficient for SECRET data.
There is no AES192 requirement in Suite B.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Christoph Anton Mitterer
Hi.

This pops up over and over again...

From a technical point of view that seems to be not only a intended
limitation,... at least it's not enough to change the max size in the
code,... there seem to be several buffers one would need to enlarge in
order to make bigger keys.

Personally I'd prefer if gpg wouldn't have that limitation.

I know all the arguments against larger keys which is why I'd
suggest to enable larger sizes only when --expert is given and even then
warn.


Most people will get quickly distracted from large key sizes anyway when
they see how long their generation takes ;)


Nevertheless I guess it could even help to find awkward bugs or other
issues that may not appear with the moderate key sizes.



Cheers,
Chris.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Peter Lebbing
On 22/05/12 15:39, Christoph Anton Mitterer wrote:
 Nevertheless I guess it could even help to find awkward bugs or other
 issues that may not appear with the moderate key sizes.

Or bugs only affecting large keys are not found because so few people use it,
and it becomes an attack vector affecting only those using large keys.

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://wwwhome.cs.utwente.nl/~lebbing/pubkey.txt

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Werner Koch
On Tue, 22 May 2012 10:58, tim.kac...@gmail.com said:

 on my computers than break the keys, however they can't plant spyware on 
 everone's computer. without people noticing  They do slurp up and 

Are you sure?  Did you looked at the GnuPG code so closely to come up
with such a strong statement?  I should feel honored that you put that
much trust into us GnuPG authors and the few white hats who closely
reviewed the code.  However there is more to it than GnuPG.  Do you put
the same trust into the gcc and glibc maintainers, Linux kernel hackers,
the Windows hackers at Microsoft and elsewhere, the hardware guys at
Intel or AMD, the support chip vendors?  There are a lot of ways to
compromise a system, hidden backdoors in other systems have already been
revealed in the past.

 2048, 4092 etc.  Or event just a table in which you select your 
 adversary, then your time horizon, and it tells you what key lengths are 
 suitable, with due warnings and notes regarding the possibility of 

Any such table would to some extend be the result of applying black
magic.  GnuPG is just a tool and not a cover all security solution.  For
such a solution you need to come up with a threat analysis, evaluate
countermeasures, policies, training, more software, and likely
additional hardware (walls, locks, barbed wire).

 to pick something that basically eliminated concern about the encryption 
 being broken, so one could forget about that part and focus on the 
 rest.of your security worries.

Right, we are doing just that.  As of now 2048 bit RSA is a pretty good
default.  Before you use a longer key, my suggestion would be to first
install a random generator which holds up with such a key.

 http://www.win.tue.nl/~klenstra/aes_match.pdf good paper on equivalencies 
 in computation and cost of public key vs. symmetric.

That is pure cryptography and as such good hint on how to select
defaults for a general purposes system - but not a absolute truth.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 11:50 AM, Werner Koch wrote:
 There are a lot of ways to compromise a system, hidden backdoors in
 other systems have already been revealed in the past.

It's worth bringing out Vint Cerf's estimate that between a sixth and a
quarter of all desktop PCs have been completely compromised and are
under the control of botnet operators [1].  That was from five years
ago: the numbers are probably worse today.

And that only covers people targeted randomly!  For those people
unfortunate enough to be targeted for surveillance by an even
semi-competent crew, it's far worse.  Your front door is no obstacle to
someone who's learned how to pick a lock -- or someone smart enough to
look around for a fake plastic rock nearby in which you've placed your
backup key.  I have no doubt whatsoever that a good crew could gain
access, enter, compromise the target's PC and be out of there in under
five minutes without the target ever knowing about it.

So, yes.  If anyone is the target of a serious surveillance campaign
(legal or extralegal, state actors or non-state actors, whatever),
well... you have your work cut out for you defending against that.
GnuPG will not save you, not even with a 16K keypair.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Jerry
On Tue, 22 May 2012 09:23:36 -0400
Robert J. Hansen articulated:

On 5/22/12 8:12 AM, Jerry wrote:
 Seriously, have you forgotten to take your meds today?

Let's not be mean.

I will be the absolute first person demanding the right to criticize
ideas as harshly as I want.  I'll happily call an idea stupid,
ill-informed, wrong, or anything else.  I do this with a clear
conscience because I know that I'm not my ideas, just like nobody else
is theirs.

But I don't ever want to the the first person to be calling *people*
those things.  People are special, precious, and often fragile.  Our
community is made up of these rare commodities, and it behooves us to
treat other people with dignity and respect and consideration.

Let's not be mean.

Sorry, I did not mean it to sound that way. I have worked with people
that when they forget to take their medication are absolutely paranoid
beyond belief. You have no doubt heard the phase, Only sick people
take drugs; therefore, if I don't take drugs I am not sick. Many
paranoid, schizophrenics rationalize skipping their medication on just
that sort of logic. What really amazed me though was that the OP wants
security and yet he uses GMail. GMail and security are
diametrically opposed concepts.

Now if you will excuse me, I have to put new aluminum foil up on my
windows.

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 12:28 PM, Robert J. Hansen wrote:
 under the control of botnet operators [1].

Whoops.

[1] http://news.bbc.co.uk/2/hi/business/6298641.stm

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
I apologize in advance if any of this sounds snarky.  It's not intended
as such.  Everything I've written here is sincere.

 I am involved in a local Occupy (bet you thought occupy was kaput eh?  well 
 as it were known it is but that's another story) and frankly we aren't 
 just up against one intelligence agency, but all intel agencies put 
 together.

Did you know that in the United States, the Fish and Wildlife Service is
an intelligence agency?  Check their jobs postings and you'll see a good
number of them say a security clearance is required.

Your claim may lead people to writing off your movement on the grounds
that one of two things are true.  Either:

- They're a bunch of crazies who think that even the park
   rangers are after them,
- Or, holy Toledo, even the park rangers are after them!

It seems unlikely to me that either one will engender much support.  If
people think the former, then the movement is crazy and can be written
off.  If people think the latter, then it's incredibly dangerous to
stand too close to you and no one will show up to your protests.

 There are also estimates made that in the US 1 in 6 protestors is 
 actually a government agent of one sort or another, dept of defense, 
 homeland security, fbi what have you.

Not even Nicolai Ceaucescu's Romania or Erich Honecker's German
Democratic Republic were able to get one in six people to serve as
informers.

 I'm 23 now and I take various modest precautions to ensure that I have the 
 best chance I can to remain in good health when I am 43. Or 63.  A couple 
 hundred extra milliseconds of decryption/encryption time per message for 
 a key longer than 3072 or 4092 sounds like a good choice frankly.  Is 
 that not what we are looking at?

No, it's not what we're looking at.

If we take you seriously, if we really believe what you say, then what
we're looking at is:

- If we help you, we're likely going to get disappeared,
  either now or in twenty years
- Your group is completely penetrated/compromised
- Your group has no effective methods of policing itself
  to detect and expel infiltrators
- There's an excellent chance *you yourself* are a mole.
  After all, there's no better way to deflect suspicion than
  to be looking for moles -- ask Aldrich Ames or Robert Hanssen
- And yet, you believe that if GnuPG supports larger key
  sizes that your security will be substantially improved.

 Fourthly a little safety margin never hurt.

If what you say is true, then just by coming onto this list and asking
for help you have put everyone on this list in jeopardy.  Your obsession
with a little safety margin seems rather hypocritical.

There are really only two possibilities here.  Either your claims are
substantially true, or they are substantially false.  I believe they are
substantially false, and I encourage you to re-think them.  A correct
estimation of your situation and what sorts of security threats you're
facing will do you infinitely more good than a larger GnuPG key.

And with that, I'm done with this thread.  I wish you luck.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Hubert Kario
On Tuesday 22 of May 2012 12:33:03 Jerry wrote:
 What really amazed me though was that the OP wants
 security and yet he uses GMail. GMail and security are
 diametrically opposed concepts.

Since when the security of encryption is dependant on the 
carrier/communication channel?

Did I miss some memo?

Regards,
-- 
Hubert Kario
QBS - Quality Business Software
02-656 Warszawa, ul. Ksawerów 30/85
tel. +48 (22) 646-61-51, 646-74-24
www.qbs.com.pl

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Hubert Kario
On Tuesday 22 of May 2012 13:34:20 da...@gbenet.com wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 On 22/05/12 09:58, tim.kac...@gmail.com wrote:
  I think it should be okay to dredge up this topic ever couple years. 
  From what I am reading, links below,  I do not feel comfortable with
  the key length and algorithmic security offered by GPG's defaults.
  
  I have not been able to figure out how to get keylengths greater than
  3072 for DSA/elgmal or 4094 rsa, so I conclude that generating them is
  unsupported by GPG although GPG can use them.  I have seen many people
  saying that these types of key lengths are way more than anyone could
  reasonably need, but I am skeptical.
  
  I am involved in a local Occupy (bet you thought occupy was kaput eh? 
  well as it were known it is but that's another story) and frankly we
  aren't just up against one intelligence agency, but all intel agencies
  put together.  An entire global class of people.  You can argue that
  they may be uninterested in me, however I don't buy that argument at
  all because they have spent (possibly a lot) more than a thousand
  dollars at least on me personally at this point I am sure in policing
  costs to try to survielle and intimidate me, after you divide down.
  
   The eviction alone at my occupy cost (probably greatly) in excess of
  
  $16,000 to arrest 8 people, and involved almost 200 cops for 4 hours.
  There are also estimates made that in the US 1 in 6 protestors is
  actually a government agent of one sort or another, dept of defense,
  homeland security, fbi what have you.  And that exludes any thugs the
  bankers put in the crowd as privately hired types.
  
  Secondly I want my communications to remain unread into the relatively
  distant future.  Given the sort of crap the 1% do wrt murdering and
  maiming vast quantites of people for a couple extra bucks I would not be
  the least bit surprised if 20 years from now they dissapeared me
  because I passed our some pamphlets that said end class war now.
  
   An enemy is an enemy, and enemies must be smooshed, right?  Why take
   risks 
  like letting an innocent person live if they might concievable scratch
  your gravy train at some point in the future? Abductions and bullets
  aren't that expensive once you got everything all set up, it's a good
  investement.
  
  
  I'm 23 now and I take various modest precautions to ensure that I have
  the best chance I can to remain in good health when I am 43. Or 63.  A
  couple hundred extra milliseconds of decryption/encryption time per
  message for a key longer than 3072 or 4092 sounds like a good choice
  frankly.  Is that not what we are looking at?
  
  And yes I recognize that it would be a lot easier for them to plant
  spyware on my computers than break the keys, however they can't plant
  spyware on everone's computer. without people noticing  They do slurp
  up and probably store indefinitely all text -and many other-
  communications on the internet (carnivore etc.).  In the future, data
  they don't have they can't use.  There is always a substantial
  probability that they will not get my keys with spyware, and I would
  like capitalize (If you'll pardon me) on that.
  
  Fourthly a little safety margin never hurt.
  
  I think it should be easier to pick longer keys.  Also info should be
  included in the compendium regarding practical aspects of key choice,
  like a table that shows how long it takes to encrypt a symmetric key
  with
  2048, 4092 etc.  Or event just a table in which you select your
  adversary, then your time horizon, and it tells you what key lengths are
  suitable, with due warnings and notes regarding the possibility of
  quantum computers, mathematical advances etc.
  
  I understand that no matter how long the keys are it's still only a
  relatively small part of the equation.  However I thought it was the
  norm
  to pick something that basically eliminated concern about the encryption
  being broken, so one could forget about that part and focus on the
  rest.of your security worries.
  
  My trust in GPG has been disturbed by this state of affairs.  I thought
  I
  could just trust the defaults but I am finding that they may not really
  include the safety margin that people desire. I shudder to think of
  people who are doing more serious stuff in the class war than little ol'
  me (which isn't hard).
  
  Links:
  http://en.wikipedia.org/wiki/RSA_%28algorithm%29
  -http://www.schneier.com/essay-368.html  note that this was written in
  1998 http://www.rsa.com/rsalabs/node.asp?id=2004  this one in
  particular makes it clear that it is not unreasonable for someone in my
  position to choose a 4096 bit key.
  
  
  http://en.wikipedia.org/wiki/Key_length wikipedia says the U.S.
  Government requires 192 or 256-bit AES keys for highly sensitive data. 
  A 3072 bit RSA or elGamal key is about equivalent to 128 bit symmetric
  key, right? And a 256 bit key length 

Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Christoph Anton Mitterer
On Tue, 2012-05-22 at 17:50 +0200, Peter Lebbing wrote:
 Or bugs only affecting large keys are not found because so few people use it,
 and it becomes an attack vector affecting only those using large keys.
While this could happen, I'd guess it would be rather vice versa

And eventually larger key sizes may become common (as it always happened
so far) and then we'd stumble across such problems anyway... better now,
where larger key sizes are not yet needed


Chris.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread John Clizbe
tim.kac...@gmail.com wrote:
 I think it should be okay to dredge up this topic ever couple years.  From 
 what I am reading, links below,  I do not feel comfortable with the key 
 length and algorithmic security offered by GPG's defaults.

[I think I write this same email on one list or another at least once per year]

That is your right. Come back with the math if you wish to convince many of us
of your position.

 I have not been able to figure out how to get keylengths greater than 3072 
 for DSA/elgmal or 4094 rsa, so I conclude that generating them is 
 unsupported by GPG although GPG can use them.  I have seen many people 
 saying that these types of key lengths are way more than anyone could 
 reasonably need, but I am skeptical.

You do what has been done in the past, you hack the source. BTW, the NSA whose
second primary mission is securing the communication of the US Gov't says
2048-3072 is as far as that technology goes. At that length the switch should
be made to ECC. NIST who sets the standards for the rest of the Gov't and much
of business agree.
 
 
 I'm 23 now and I take various modest precautions to ensure that I have the 
 best chance I can to remain in good health when I am 43. Or 63.  A couple 
 hundred extra milliseconds of decryption/encryption time per message for 
 a key longer than 3072 or 4092 sounds like a good choice frankly.  Is 
 that not what we are looking at?

Pssst, they're not going to try to break your encryption, they have easier
methods of stalking and watching you.

 And yes I recognize that it would be a lot easier for them to plant spyware 
 on my computers than break the keys, however they can't plant spyware on 
 everone's computer. without people noticing  They do slurp up and 
 probably store indefinitely all text -and many other- communications on 
 the internet (carnivore etc.).  In the future, data they don't have they 
 can't use.  There is always a substantial probability that they will not 
 get my keys with spyware, and I would like capitalize (If you'll pardon 
 me) on that.
 
 Fourthly a little safety margin never hurt. 

Except when they're are easier ways to achieve equal or better security
 
 I think it should be easier to pick longer keys.  Also info should be 
 included in the compendium regarding practical aspects of key choice, 
 like a table that shows how long it takes to encrypt a symmetric key with 
 2048, 4092 etc.  Or event just a table in which you select your 
 adversary, then your time horizon, and it tells you what key lengths are 
 suitable, with due warnings and notes regarding the possibility of 
 quantum computers, mathematical advances etc.

4092 bit keys will never come into vogue except among a small group of people
who think they are better.

 I understand that no matter how long the keys are it's still only a 
 relatively small part of the equation.  However I thought it was the norm 
 to pick something that basically eliminated concern about the encryption 
 being broken, so one could forget about that part and focus on the 
 rest.of your security worries.
 
 My trust in GPG has been disturbed by this state of affairs.  I thought I 
 could just trust the defaults but I am finding that they may not really 
 include the safety margin that people desire. I shudder to think of 
 people who are doing more serious stuff in the class war than little ol' 
 me (which isn't hard).

The defaults in GnuPG are quite safe. You're understanding of them needs a bit
of work.

 Links:
 http://en.wikipedia.org/wiki/RSA_%28algorithm%29
 -http://www.schneier.com/essay-368.html  note that this was written in 1998
 http://www.rsa.com/rsalabs/node.asp?id=2004  this one in particular makes 
 it clear that it is not unreasonable for someone in my position to choose 
 a 4096 bit key.

Specific predictions about Cryptography far in the future should be taken with
a LARGE grain of salt. Most of the RSA 8192 ideas come from Schneier's Applied
Crypotograthy. Bruce Schneier has done a lot of great work, but relying on
14-year-old advice for RSA key sizes ignores current work and best practice
thought in cryptography Over the summer (2010), readers of the [Cryptography]
mailing list were reminded that in 1993 folks thought that 1024-bit RSA
'should be ok (safe from key-factoring attacks) for a few decades.' 1.75
decades later it's essentially history.


 http://en.wikipedia.org/wiki/Key_length wikipedia says the U.S. Government 
 requires 192 or 256-bit AES keys for highly sensitive data.  A 3072 bit 
 RSA or elGamal key is about equivalent to 128 bit symmetric key, right?  
 And a 256 bit key length equivalent public key is abut 15,387 bits..  I 
 think if people want to use the same level of encryption for their data 
 that the government uses shouldn't that be supported at least in command 
 line mode?
 http://www.win.tue.nl/~klenstra/aes_match.pdf good paper on equivalencies 
 in computation and cost of public key vs. symmetric.

past RSA key sizes of 

Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread da...@gbenet.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 22/05/12 18:23, Hubert Kario wrote:
 On Tuesday 22 of May 2012 13:34:20 da...@gbenet.com wrote:
 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
 
 On 22/05/12 09:58, tim.kac...@gmail.com wrote:
 I think it should be okay to dredge up this topic ever couple years. From 
 what I am
 reading, links below,  I do not feel comfortable with the key length and
 algorithmic security offered by GPG's defaults.
 
 I have not been able to figure out how to get keylengths greater than 3072 
 for
 DSA/elgmal or 4094 rsa, so I conclude that generating them is unsupported 
 by GPG
 although GPG can use them.  I have seen many people saying that these types 
 of key
 lengths are way more than anyone could reasonably need, but I am skeptical.
 
 I am involved in a local Occupy (bet you thought occupy was kaput eh? well 
 as it
 were known it is but that's another story) and frankly we aren't just up 
 against
 one intelligence agency, but all intel agencies put together.  An entire 
 global
 class of people.  You can argue that they may be uninterested in me, 
 however I
 don't buy that argument at all because they have spent (possibly a lot) 
 more than a
 thousand dollars at least on me personally at this point I am sure in 
 policing 
 costs to try to survielle and intimidate me, after you divide down.
 
 The eviction alone at my occupy cost (probably greatly) in excess of
 
 $16,000 to arrest 8 people, and involved almost 200 cops for 4 hours. There 
 are
 also estimates made that in the US 1 in 6 protestors is actually a 
 government
 agent of one sort or another, dept of defense, homeland security, fbi what 
 have
 you.  And that exludes any thugs the bankers put in the crowd as privately 
 hired
 types.
 
 Secondly I want my communications to remain unread into the relatively 
 distant
 future.  Given the sort of crap the 1% do wrt murdering and maiming vast 
 quantites
 of people for a couple extra bucks I would not be the least bit surprised 
 if 20
 years from now they dissapeared me because I passed our some pamphlets 
 that said
 end class war now.
 
 An enemy is an enemy, and enemies must be smooshed, right?  Why take risks 
 like
 letting an innocent person live if they might concievable scratch your 
 gravy train
 at some point in the future? Abductions and bullets aren't that expensive 
 once you
 got everything all set up, it's a good investement.
 
 
 I'm 23 now and I take various modest precautions to ensure that I have the 
 best
 chance I can to remain in good health when I am 43. Or 63.  A couple 
 hundred extra
 milliseconds of decryption/encryption time per message for a key longer 
 than 3072
 or 4092 sounds like a good choice frankly.  Is that not what we are looking 
 at?
 
 And yes I recognize that it would be a lot easier for them to plant spyware 
 on my
 computers than break the keys, however they can't plant spyware on everone's
 computer. without people noticing  They do slurp up and probably store 
 indefinitely
 all text -and many other- communications on the internet (carnivore etc.).  
 In the
 future, data they don't have they can't use.  There is always a substantial 
 probability that they will not get my keys with spyware, and I would like
 capitalize (If you'll pardon me) on that.
 
 Fourthly a little safety margin never hurt.
 
 I think it should be easier to pick longer keys.  Also info should be 
 included in
 the compendium regarding practical aspects of key choice, like a table that 
 shows
 how long it takes to encrypt a symmetric key with 2048, 4092 etc.  Or event 
 just a
 table in which you select your adversary, then your time horizon, and it 
 tells you
 what key lengths are suitable, with due warnings and notes regarding the
 possibility of quantum computers, mathematical advances etc.
 
 I understand that no matter how long the keys are it's still only a 
 relatively
 small part of the equation.  However I thought it was the norm to pick 
 something
 that basically eliminated concern about the encryption being broken, so one 
 could
 forget about that part and focus on the rest.of your security worries.
 
 My trust in GPG has been disturbed by this state of affairs.  I thought I 
 could
 just trust the defaults but I am finding that they may not really include 
 the
 safety margin that people desire. I shudder to think of people who are 
 doing more
 serious stuff in the class war than little ol' me (which isn't hard).
 
 Links: http://en.wikipedia.org/wiki/RSA_%28algorithm%29 
 -http://www.schneier.com/essay-368.html  note that this was written in 1998
 http://www.rsa.com/rsalabs/node.asp?id=2004  this one in particular makes 
 it clear
 that it is not unreasonable for someone in my position to choose a 4096 bit 
 key.
 
 
 http://en.wikipedia.org/wiki/Key_length wikipedia says the U.S. Government 
 requires
 192 or 256-bit AES keys for highly sensitive data. A 3072 bit RSA or 
 elGamal key is
 about equivalent to 128 

Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Peter Lebbing
On 22/05/12 19:10, Robert J. Hansen wrote:
 Your claim may lead people to writing off your movement on the grounds
 that one of two things are true.  Either:
 
   - They're a bunch of crazies who think that even the park
  rangers are after them,
   - Or, holy Toledo, even the park rangers are after them!
 
 It seems unlikely to me that either one will engender much support.  If
 people think the former, then the movement is crazy and can be written
 off.  If people think the latter, then it's incredibly dangerous to
 stand too close to you and no one will show up to your protests.

This presupposes that people will equate the whole movement with this single
individual. This is definitely not unlikely, though :-) [1]

Peter.

[1] After all, *all* people generalise! ;)

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://wwwhome.cs.utwente.nl/~lebbing/pubkey.txt

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Peter Lebbing
On 22/05/12 20:00, da...@gbenet.com wrote:
 On 22/05/12 18:23, Hubert Kario wrote: [...snip...]

David and Hubert, could you please trim the quotes in your replies? I'm typing
this with one hand because my scroll finger is cramping... ;) j/k

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://wwwhome.cs.utwente.nl/~lebbing/pubkey.txt

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Hauke Laging
Given the frequency of this discussion and the amount of effort takes by the 
participants: Wouldn't it make sense to make this a FAQ entry?


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814

signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread da...@gbenet.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 22/05/12 19:09, Peter Lebbing wrote:

chain sawed 


Oh all right :) Ha! Ha!

David - no offence meant btw :) just so funny :)

- -- 
“See the sanity of the man! No gods, no angels, no demons, no body. Nothing of 
the
kind.Stern, sane,every brain-cell perfect and complete even at the moment of 
death. No
delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJPu9dwAAoJEOJpqm7flRExb0oH/Alv+svuTQ2P+b1XfT05ke1u
c62vV/LXL4n8XM9WmSd0DRm9qjpmJ77KdRR4cn5RCsz9CdiaFTQGVuB44EGWkudt
RYTxiSnirn+hpZ31PWnvT6SNNN06xJFevTLpNt33oF1POC7Jfuz618LAi6VIWK3U
6IBY7QLqx+BxcJmRWpayXYcvCBCP0NBN2wi1ay5mwnHcXiaxHs7pg2M+sXaWXeun
Iiiiz7MmnJGIzeBhvp8jO4gqoJ68LpnBRAH43D0DQ33EA/T2AkVxGVUQwTxLtIdp
ful2lQbA3q3oOnWD61pMz+nlCDQeMHo8lc+YU468DD0vT7Ds2cd03gc7fbewBds=
=A1dH
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 2:26 PM, Hauke Laging wrote:
 Given the frequency of this discussion and the amount of effort takes by the 
 participants: Wouldn't it make sense to make this a FAQ entry?

I think so, yes.  The question is who's going to write it?  I suspect
Werner doesn't have the time.  If he wants, I would be happy to take a
stab at writing it.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Kevin Kammer
On Tue, May 22, 2012 at 08:26:14PM +0200 Also sprach Hauke Laging:
 Given the frequency of this discussion and the amount of effort takes by the 
 participants: Wouldn't it make sense to make this a FAQ entry?

Honestly now, do you think having a FAQ entry stops this topic
resurrecting every few months?  Either someone will take issue with
what is said in the FAQ, or they (most likely) do not read it at all. 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread John Clizbe
tim.kac...@gmail.com wrote:
 I think it should be okay to dredge up this topic ever couple years.  From 
 what I am reading, links below,  I do not feel comfortable with the key 
 length and algorithmic security offered by GPG's defaults.
 
 I have not been able to figure out how to get keylengths greater than 3072 
 for DSA/elgmal or 4094 rsa, so I conclude that generating them is 
 unsupported by GPG although GPG can use them.  I have seen many people 
 saying that these types of key lengths are way more than anyone could 
 reasonably need, but I am skeptical.
 
 I am involved in a local Occupy (bet you thought occupy was kaput eh?  well 
 as it were known it is but that's another story) and frankly we aren't 
 just up against one intelligence agency, but all intel agencies put 
 together.  An entire global class of people.  You can argue that they may 
 be uninterested in me, however I don't buy that argument at all because 
 they have spent (possibly a lot) more than a thousand dollars at least on 
 me personally at this point I am sure in policing costs to try to 
 survielle and intimidate me, after you divide down. 
 
I was wondering... Does your group communicate with one another using cell
phones? I ask not because of the irony of protesting globalization on cell
phones, but because of the cell phone industry's woefully poor record on
ecryption technology.

What about WiFi? Do the public Access Points you all use use encryption? Is it
stronger than WEP? what about someone plugging in a Snooper in the wiring
closet of that StarBucks or McDonald's?

_IF_ THEY are /really/ watching you, they've used cameras to watch you type in
your passphrase, and windows and Gmail passwords. They may have used a
weakness in CIFS to copy your keyrings.

All this and you're worried about overkill on the one place they WON'T attack?
No one attacks the crypto. They're are too many easier routes. If you're
/really/ worried about privacy and security, get your priorities straightened
out.  bin Laden didn't use cell phones, not because he was a techno-Luddite,
but because he understood the risks of using them. You need to get a handle on
all the risks of all the technology you use.

-John

PS: Leave the tinfoil hat at home, it draws undue attention to you.

-- 
John P. Clizbe  Inet: John (a) Gingerbear DAWT net
SKS/Enigmail/PGP-EKP  or: John ( @ ) Enigmail DAWT net
FSF Assoc #995 / FSFE Fellow #1797  hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=HELP

Q:Just how do the residents of Haiku, Hawai'i hold conversations?
A:An odd melody / island voices on the winds / surplus of vowels

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 3:10 PM, Avi wrote:
 Didn't you already write a pretty good one one, Robert?
 http://sixdemonbag.org/cryptofaq.xhtml

It's hubris for an author to refer to his own work.  :)  Also, that FAQ
is in desperate need of a rewrite.  Nothing in it is wrong, per se, but
it needs a rewrite.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Avi
On Tue, May 22, 2012 at 1:50 PM,  gnupg-users-requ...@gnupg.org wrote:
 -- Forwarded message --
 From: Robert J. Hansen r...@sixdemonbag.org
 To: gnupg-users@gnupg.org
 Cc:
 Date: Tue, 22 May 2012 14:40:07 -0400
 Subject: Re: Some people say longer keys are silly. I think they should be 
 supported by gpg.
 On 5/22/12 2:26 PM, Hauke Laging wrote:
 Given the frequency of this discussion and the amount of effort takes by the
 participants: Wouldn't it make sense to make this a FAQ entry?

 I think so, yes.  The question is who's going to write it?  I suspect
 Werner doesn't have the time.  If he wants, I would be happy to take a
 stab at writing it.


Didn't you already write a pretty good one one, Robert?
http://sixdemonbag.org/cryptofaq.xhtml

--Avi


User:Avraham

pub 3072D/F80E29F9 1/30/2009 Avi (Wikimedia-related key) avi.w...@gmail.com
   Primary key fingerprint: 167C 063F 7981 A1F6 71EC ABAA 0D62 B019 F80E 29F9

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Jerry
On Tue, 22 May 2012 13:48:26 -0500
John Clizbe articulated:

All this and you're worried about overkill on the one place they WON'T
attack? No one attacks the crypto. They're are too many easier routes.
If you're /really/ worried about privacy and security, get your
priorities straightened out.  bin Laden didn't use cell phones, not
because he was a techno-Luddite, but because he understood the risks
of using them. You need to get a handle on all the risks of all the
technology you use.

Interestingly enough, Khalid Sheikh Mohammed turned on his cell phone
for the first time in nearly a year and the NSA was able to pinpoint
his location and arrest him in Rawalpindi, Pakistan, in March 2003.

-- 
Jerry ♔

Disclaimer: off-list followups get on-list replies or get ignored.
Please do not ignore the Reply-To header.
__


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Hauke Laging
Am Di 22.05.2012, 14:46:03 schrieb Kevin Kammer:
 On Tue, May 22, 2012 at 08:26:14PM +0200 Also sprach Hauke Laging:
  Given the frequency of this discussion and the amount of effort takes by
  the participants: Wouldn't it make sense to make this a FAQ entry?
 
 Honestly now, do you think having a FAQ entry stops this topic
 resurrecting every few months?

No, but I don't see that as a problem. I think the question / proposal would 
come up at about the same frequency but would end in one reply pointing at the 
FAQ entry instead of now (do you want to count...?) emails.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814

signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Werner Koch
On Tue, 22 May 2012 20:40, r...@sixdemonbag.org said:

 I think so, yes.  The question is who's going to write it?  I suspect
 Werner doesn't have the time.  If he wants, I would be happy to take a
 stab at writing it.

Please go ahead.  Plain text optionally with org-mode formatting.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 22-05-2012 12:33, Jerry escribió:
...
 that sort of logic. What really amazed me though was that the OP
 wants security and yet he uses GMail. GMail and security are 
 diametrically opposed concepts.

  Why? If I send an encrypted message, it doesn't matter if I use
gmail, ISP-expensive-crap-mail or any other provider, the message
would still be encrypted end-to-end. Of course I'm not talking about
composing a message in the webmail editor and then encrypting it, but
about using a MUA, like Thunderbird, or maybe composing the message on
a text editor, encrypting it and pasting it on the message body (or
attaching the encrypted text file).

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJPvD0yAAoJEMV4f6PvczxA0BAH/A2prkdtv6LcIC6U1PQcId3v
BBbeLL8VeqBZq+XDYqBM1GP56BLH1CFWOXaSrEiIhPsLtaF6TkJLHfA5GEbSwQ+j
RkyI5MN1M88ZyTlvbdvm0uSiLzFXEmp9Jtqlwr58C29oTvI1JFwD9SxVKXmOwnSP
GHRgG7HBwSiBDFbSnjALE9nW6cDD1J6LwJaGvkD4tmKkJLqPzimoBnJ+o8P3TbdB
/AnhGlwaxlQQd0+5cxCiGBZ1NfZAZGmMWqD/1IE3bZMIs3hp/JkA4MDUwP5E8z25
N/nQPgoNb9iaFy0yozycZLEq4qDBHQxvLQNK79tSBe5+B2QJmPEYglxzserNfXA=
=o2WG
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 22-05-2012 8:34, da...@gbenet.com escribió:
...
 Some say that all the power of the universe - and all the time its
 been in existence will not crack a 2048 bit key with a secure
 passphrase. So by the time the universe is well and

  That is about if you secret key falls in the hands of somebody
wanting to use it. But factoring your public key to obtain a working
copy of your secret key is certainly something that may be done before
the end of time, and won't require dyson spheres to power the machine.
We know one day RSA 2048 will be broken... BUT, the question is: will
it matter to us when it happens?. Maybe I will say Finally! I will
be able to revoke that orphan key I uploaded to keyservers when I was
learning how to use GPG... if I could remember the UID it had.

  We can use RSA 2048 and wait until something stronger is available,
or we can go RSA 3072 and be even safer. Or we can even go RSA 4096,
and people will say that's an overkill!!!, all that without
modifying GnuPG.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJPvEA5AAoJEMV4f6PvczxAMwoH+wWn0YnqWTjBYe3NIvYaGQyW
oIvUsAQu5B9xVRP1wN7f0OJFKoPevcaI0pU5erAs6RGpiHmd35oLYzxGEpsCWE26
YJ37m3mBJCGRk0aOkthT6ugDJ4fEHsm5toj2si9ItJNLq2374+8GMoz++c6Vpbf/
b/y/LaWO3eeZXhtdBCC8OSYKdZiUQ1DYBBFT6WAickgYQJ+hYtRhiq2JQq9SicCA
KkWEj/NVB7esOMVoVcrQzAxbivgqKwUyGjpOVTmPlnz2lx19t3j5TAucM9Vhrsab
wfY3u4dW6T6X24Pv6WEZmyb14JgEAsK8elehU4dyRTKA+OzOAZr1ihcNOODC/Yg=
=I24B
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Robert J. Hansen
On 5/22/12 9:41 PM, Faramir wrote:
 [F]actoring your public key to obtain a working copy of your secret
 key is certainly something that may be done before the end of time,
 and won't require dyson spheres to power the machine.

I'm not so optimistic.  Factoring is a hard problem.  We may never
develop the technology to factor extremely large composites.  Doing so
would require either (a) the development of extremely large-scale
quantum computing, (b) a mathematical proof of P=NP, or (c) classical
computers that run close to the thermodynamic limits of the universe.
There are no guarantees we will ever develop any of those three
technologies.

That said, no one has ever proven that the only way to break RSA is to
factor large composites.  That's wholly conjecture, and there's some
evidence that it's not true.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Some people say longer keys are silly. I think they should be supported by gpg.

2012-05-22 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 22-05-2012 4:58, tim.kac...@gmail.com escribió:
...
 There are also estimates made that in the US 1 in 6 protestors is
  actually a government agent of one sort or another, dept of
 defense, homeland security, fbi what have you.  And that exludes
 any thugs the bankers put in the crowd as privately hired types.

  If that's the case, it is very likely you will send your messages
encrypted to the Super-Secure 32.768 bits RSA key belonging to
infiltrated agent... which of course won't have to break the key to
read it, because he already has the key.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJPvEXKAAoJEMV4f6PvczxAcLkH/3dOjOpou//Auk4bIwizLodI
u6PvxBYW8P0rrdg3/1QUDWoj2mXA6AoaihbPe5LcmXH3fTgA06Y3i1zndzAfAPrD
7IGve7Km08ew6muutPmKnq0jk8nHhLJ6b1P1llD8ePky5nsppBVH0kT9gNFDQzbv
oRXLs4hcKS3DIs49BQnQswE8upgl72HcR9ozU95ptTsayewv1n57PZg+cj8o0dNT
N56kZ1YfJqZqx8uImV1fT8Oh658V5HDn3Fvx58s6M5r6WVbGynN9ZyPeL3uFNYpQ
wtZNHKK4Zc7XE/7n87IUy6/D8bH+rQTvbHWBiYa0rhs7H5JJqejEnkZMRSCPUsg=
=yKPa
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users