On 5. 3. 2014, at 5:54, peter green <plugw...@p10link.net> wrote: >> >> I am not sure what's the timeframe for GnuPG 2.1.0[1] release, but would >> it be possible to skip the RSA and go directly for ECDSA, before we >> start deprecating DSA? Or at least have an option to do so? (Well, >> unless GnuPG 2.1 release is too much far in the future.) > IMO we need to phase out 1024 bit RSA/DSA keys as soon as reasonablly > practical. Even if gnupg 2.1 was released tomorrow we would still have the > problem of Debian stable releases and other distros carrying older versions.
You have convinced me :). Even though the attack surface is lowered by the fact that you would (probably) notice the malicious upload with your compromised key. But the reputation harm would still be there. > Also ECDSA shares with DSA the serious disadvantage over RSA that making > signatures on a system with a broken RNG can reveal the key. Care to share a source? I thought that RSA would be vulnerable to poor RNG as well. O. -- Ondřej Surý <ond...@sury.org> Knot DNS (https://www.knot-dns.cz/) – a high-performance DNS server