On Dec 12, 2010, at 11:21 AM, Robert J. Hansen wrote:

> On 12/12/2010 10:23 AM, Daniel Kahn Gillmor wrote:
>> What part of OpenPGP certificates require SHA-1?
> 
> ... At first blush, V4 certificate checksums, symmetrically encrypted
> integrity protected data packets, the MDC system in general, certificate
> fingerprints, etc.  I just grepped through the RFC looking for any
> hardcoded SHA-1; David is probably a much better reference than I am on
> this.
> 
> Probably the most annoying -- to me, at least -- is the fingerprint
> requirement.  If a preimage collision is discovered in SHA-1 then it's
> all over.  I can take your signature on my enemy's key, graft it onto my
> own impersonator of my enemy's key, and then get others to believe it.

Yes.  The other uses of SHA-1 are not nearly as significant as the fingerprint 
(and thus key ID).  For example, it's true that the MDC uses SHA-1, but no big 
deal - just make a new MDC that uses whatever you like, and repeat as needed.  
Virtually all deployed code will handle this correctly (for example, a feature 
flag indicating the existence of the "mdc2" capability), and use it only when 
all participants can handle it.

The fingerprint issue is more than just making a new packet for a new MDC or 
revocation subpacket, though.  There is no concept in OpenPGP of a flag telling 
an implementation how to calculate the fingerprint - or rather there IS a flag: 
the version field, but its hardcoded :)

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to