On 06/21/2012 04:38 PM, Daniel Kahn Gillmor wrote: > unfortunately, this is indeed the case. v3 keys have a serious > vulnerability in that their fingerprint mechanism is trivially gamable, > so long keyid collisions are easy.
It's quite a bit worse than that, really. If I understand things correctly, the news media and antivirus companies are reporting that the Flame malware used an MD5 collision to get their malware to report that it had been signed by Microsoft. If true, that's a clear sign that MD5-based signatures of all sorts are now suspect. I wish I could say that this puts the final nail in PGP 2.6's coffin, but the reality is there's a huge installed userbase that won't change for love or money. All we can do is encourage people to not join them. _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users