On Wed, Mar 06, 2024 at 09:43:00AM +0100, Werner Koch wrote:
> On Tue, 5 Mar 2024 11:15, Bruce Walzer said:
>
> > So just to be clear, I am not complaining that GnuPG implemented the
> > LibrePGP version of OCB. I am complaining that GnuPGP did #2 and #3
> > before implementation was close to
On Tue, 5 Mar 2024 11:15, Bruce Walzer said:
> So just to be clear, I am not complaining that GnuPG implemented the
> LibrePGP version of OCB. I am complaining that GnuPGP did #2 and #3
> before implementation was close to universal and did not clearly spell
Sorry, this is not true. OCB mode is
It seems to me that there are at least 3 decisions to make when
considering the implementation a new block cipher mode:
1. If your implementation will receive the block mode. Receiving a
block mode does not cause an interoperability problem. If anything,
this improves interoperability.
2.
Hi!
On Tue, 5 Mar 2024 12:39, Tobias Leupold said:
> Sorry for asking another thing about this. For sure, I didn't want to set off
> an avalanche, and I still don't want to. But from a user's perspective, this
> is simply very confusing and also unsettling.
You are right. What I can do is to
Sorry for asking another thing about this. For sure, I didn't want to set off
an avalanche, and I still don't want to. But from a user's perspective, this
is simply very confusing and also unsettling.
I think that somewhere, there should be some documentation, FAQ or whatever,
as a definitive
On Mon, 4 Mar 2024 19:05, Tobias Leupold said:
> IMO interoperability with GnuPG is crucial for this project. Most
> people using that on their phones will come from Linux, or they will
Actually most users will come from Windows ;-)
Salam-Shalom,
Werner
--
The pioneers of a warless
On Tue, 5 Mar 2024 00:16, Vincent Breitmoser said:
> The packet format referred to here is GnuPG-specific. In November
Vincent, please stop spreading wrong facts.
That is not a GnuPG specific but an agreed upon format by the
participants of the OpenPGP WG and implemented by all major
Hi Vincent!
Thanks a lot for this insight!
When it comes to encryption, I would consider myself a "power user", but
still a user. I never heard of all this until now. What I, from the
perspective of an end-user, saw was: I generate a new key. And then:
"Pass no work on me phone anymore,
Hey list,
OpenKeychain maintainer here. As Werner chose to omit some details here
that seem pertinent, I will add:
No, it is not because you are delaying the deployment of new and a much
faster algorithm mode.
The packet format referred to here is GnuPG-specific. In November 2023,
GnuPG
Hey Bruce,
On 04.03.24 21:53, Bruce Walzer wrote:
* https://articles.59.ca/doku.php?id=pgpfan:noae_shame
There is more if you search for it:
https://kagi.com/search?q=gpg+%22packet+type+20%22=no_region=HeSUA3hoI5SeCuA2TTrNig
Cheers
- V
___
> Ah... That question leads to an awkward discussion these days. There
> was a IETF standards process that led to the OCB mode now supported by
> GnuPG and others. GnuPG (and others) implemented it before the new
> standard was officially released (there seemed to be consensus). That
> standards
On Mon, Mar 04, 2024 at 12:03:41PM +0100, Tobias Leupold via Gnupg-users wrote:
[...]
> After some research, I found
>
> https://github.com/open-keychain/open-keychain/issues/2886 ,
>
> describing this exact issue.
That would be the cipher block mode proliferation issue.
> As a possible
Hi Werner,
thanks for the clarification!
> All the major implementers (Ribose RNP, GnuPG, BouncyCastle, OpenPGP.js)
> took great care to first deploy the software with support for the new
> mode before actually creating keys with a preference for that mode [1].
> Unfortunately a small group of
On Mon, 4 Mar 2024 12:03, Tobias Leupold said:
> So: Is it wise and/or necessary to disable that for new GnuPG generated keys,
> for the sake of interoperability? Or will the others catch up and implement
No, it is not because you are delaying the deployment of new and a much
faster algorithm
14 matches
Mail list logo