Re: Is the OpenPGP model still useful?

2011-07-23 Thread Robert J. Hansen
On 7/23/11 2:36 PM, Marcio B. Jr. wrote:
> Secrecy sharing constitutes sort of a "symmetric fact" when more than
> one instance is involved and you ask me for a citation?

Yes.  I am quite certain that if, say, Daniel Gillmor were to assert
"the Earth is round" and I were to ask him for a citation, he would
refer me to Eratosthenes's trigonometric analysis of the angles of
sunlight incidence in Syene and Alexandria, and would not find my
request to be in the slightest bit unusual.

There is no fact, however obvious, which is guaranteed to be obvious to
everyone.  When people ask for citations for "obvious facts," the only
thing it means is it is not obvious to them.  The courteous and genteel
thing to do is to provide a citation, so that the person in question
might learn.

What you're saying is at odds with everything I've come to learn about
DHKEA.  What you're saying is extremely nonobvious to me.  Please
present a citation for your assertion that DHKEA shares secrets more
than another competing protocol.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-23 Thread Marcio B. Jr.
Hi Robert.

Secrecy sharing constitutes sort of a "symmetric fact" when more than
one instance is involved and you ask me for a citation?

I resumed this thread in order to clarify whether Kopete's OpenPGP
plugin was really superior, compared to the OTR one, and all people
say is OTR and its Diffie-Hellman algo are great, but no comparison is
ever made because choice depends on threat model. Come on, this is not
an academic seminar.

It would be simpler to put some hypothetical situation in which you'd
choose one of the options, and explain the reason behind that choice.

What can I say? My situation is a regular one. Privacy and/or
authenticity are needed in varying degrees.


Regards,



On Sat, Jul 23, 2011 at 2:16 PM, Robert J. Hansen  wrote:
> On 7/23/11 1:04 PM, Marcio B. Jr. wrote:
>> You know, secrets are shared. 100% increase (at least) in "exposing"
>> risks.
>
> I need to see a citation for this.  What you're claiming is at odds with
> everything I've ever learned about how DHKEA operates.
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-23 Thread Daniel Kahn Gillmor
On 07/23/2011 07:04 PM, Marcio B. Jr. wrote:
> On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen  wrote:
>>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>>> Diffie-Hellman key exchange method with block ciphers.
>>
>> Why is this a problem?
> 
> You know, secrets are shared. 100% increase (at least) in "exposing" risks.

I am struggling with how to respond to your messages since i find them
confusing.

Are you aware that the purpose of OTR is to allow two parties to
communicate confidentially?

In a confidential communication, a secret message is sent from party A
to party B.  The entire purpose is to share the secret between the two
parties.  They have to share the key to the cipher in order to share the
secret.

OpenPGP itself uses this sort of symmetric encryption to encrypt
messages with a random session key, and only uses asymmetric encryption
to encrypt the session key itself.

If you research other popular encryption standards (e.g. TLS), you'll
find this "hybrid" approach is quite common.  If there's a serious
downside or risk to it, could you outline the sort of attack you're
concerned about?

Thanks,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: IM encryption options [was: Re: Is the OpenPGP model still useful?]

2011-07-23 Thread Marcio B. Jr.
Hi Aron,
you are somewhat arrogant.

Please read what I wrote till completion.


Regards,



On Fri, Jul 22, 2011 at 9:17 PM, Aaron Toponce  wrote:
> On Fri, Jul 22, 2011 at 07:56:42PM -0300, Marcio B. Jr. wrote:
>> Hello Daniel,
>> sorry for such a delay; this has been a wild JULY.
>>
>>
>> On Wed, Jul 6, 2011 at 4:09 PM, Daniel Kahn Gillmor wrote:
>> > On 07/06/2011 01:28 PM, Marcio B. Jr. wrote:
>> >> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> >> Diffie-Hellman key exchange method with block ciphers.
>> >
>> > Why does this seem unjustifiable to you?  DH and block ciphers are
>> > widely-reviewed parts of the standard crypto toolkit.  Do you have
>> > reason to believe they're generally bad?
>>
>> It seems unjustifiable because there exists an option in which secret
>> keys need not to take risks. And if there's any security concern and
>> one's to choose between zero risk and any other positive-value risk,
>> it's reasonable to pick the former.
>
> Are you familiar with the DH key exchange? It doesn't seem that you are.
> There is no risk in sharing the private key between the two parties. It
> basically goes like this:
>
> Step 1: A generates the private key.
> Step 2: A encrypts the private key with a one-time session key.
> Step 3: A sends the encrypted private key to B.
> Step 4: B encrypts the encrypted private key with his 1-time key.
> Step 5: B sends the doubly-encrypted private key to A.
> Step 6: A decrypts what he can with his one-time session key.
> Step 7: A sends the resulting encrypted key to B.
> Step 8: B decrypts the private key with his 1-time key.
>
> B now has the private key.
>
> The one-time session keys are never shared, but stored locally on the
> machine. Once the DH key exchange finished, the session keys are destroyed.
> No where in the exchange is there any risk of the private key being
> compromised. A MITM can grab all the packets he likes. Unless he has one or
> both session keys, he's not getting the private key.
>
> --
> . o .   o . o   . . o   o . .   . o .
> . . o   . o o   o . o   . o o   . . o
> o o o   . o .   . o o   o o .   o o o
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-23 Thread Robert J. Hansen
On 7/23/11 1:04 PM, Marcio B. Jr. wrote:
> You know, secrets are shared. 100% increase (at least) in "exposing"
> risks.

I need to see a citation for this.  What you're claiming is at odds with
everything I've ever learned about how DHKEA operates.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-23 Thread Marcio B. Jr.
Hello Robert.


On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen  wrote:
>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> Diffie-Hellman key exchange method with block ciphers.
>
> Why is this a problem?


You know, secrets are shared. 100% increase (at least) in "exposing" risks.


Regards,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users



Re: gpg-agent automatically use passphrase for signing subkey?

2011-07-23 Thread Chris Poole
2011/7/23 Ingo Klöcker :

> There is already the option --ignore-cache-for-signing (curiously the
> corresponding option for decryption is missing, i.e. it's not possible to use
> the cache for signing but not for decryption), so why not add another option
> like --share-signing-and-decryption-cache? (I guess, if I really wanted this I
> should provide a patch. :-) )

That was precisely my point; if anything, entering the passphrase twice is more
of a security risk than storing it for 2 subkeys at the same time (risk of being
overlooked, etc.).


Cheers


Chris Poole
[PGP BAD246F9]

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Primary Key Security, Old DSA Key

2011-07-23 Thread Robert J. Hansen
On 7/23/11 10:19 AM, Edmond wrote:
> But since AFAIK both 1024 bit DSA and SHA1 hashes are not recommended
> for use anymore (at least in new systems), I was wondering if I should
> issue a new primary key.

This is impossible to answer, since we don't know exactly what threats
you're facing.  However, it's worth pointing out that you're correct:
most of us no longer recommend DSA-1K or SHA-1 *for new systems*.

Speaking personally, just for myself, I have not seen any instances
where I thought someone who used DSA-1K needed to switch algorithms
immediately.

It's probably a good idea to migrate to a new certificate *sometime*.
If right now is a convenient time for you to do it, then sure, go for
it.  But there's no rush.

With respect to which algorithms to use... use GnuPG's defaults (RSA-2K
right now, I believe).  You don't need to tweak GnuPG in order to get a
very high level of assurance from it.  :)

> I.e., the worst thing that could happen is that someone
> issues new subkeys that claim to belong to my primary key when they
> actually don't. Is that correct?

Almost.  The worst that could happen is someone could issue signatures
and pretend they're from you.  But if SHA-1 falls that far, well, we're
all going to have a whole lot of problems above and beyond just that.  :)





signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Primary Key Security, Old DSA Key

2011-07-23 Thread Edmond
Hello everyone,

one of my keys (the one I'm signing this message with) was created a
while back and uses a 1024 bit DSA primary key. For encryption I'm using
a 4096 bit RSA subkey, and for singing a 2048 bit DSA subkey (due to the
smaller signature).

gpg2 --list-packets for my primary key and the encryption subkey spawns:

iter+salt S2K, algo: 3, SHA1 protection, hash: 2, salt: ...
protect count: 96

and for my signing key:

iter+salt S2K, algo: 3, SHA1 protection, hash: 2, salt: ...
protect count: 161

The 'protect count' of my signing key is higher as it was created using
a relatively new version of GnuPG 2 on a newer CPU.

An OpenPGP S2K count of 96 implies 65536 rounds. On my mobile computer,

gpg-connect-agent 'getinfo s2k_count' /bye

calculates 1102848 rounds; and on my desktop computer the number is
almost four times as big. Hence I will soon increase the number of
protection rounds to improve my secret key security, or even move those
keys to a smartcard.

But since AFAIK both 1024 bit DSA and SHA1 hashes are not recommended
for use anymore (at least in new systems), I was wondering if I should
issue a new primary key. What would you recommend? I have no signatures
collected on my primary key (except my own).

Since my encryption subkey is using a current algorithm/key length, my
enrypted messages should be save regardless of the primary key's
security, right? I.e., the worst thing that could happen is that someone
issues new subkeys that claim to belong to my primary key when they
actually don't. Is that correct?

Thanks,

Edmond



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg-agent automatically use passphrase for signing subkey?

2011-07-23 Thread Richard
As far as I know every subkey holds its own passphrase (per default,
they are all identical for a given primary key). This means that
passphrase requests are actually not action-based, but key-based.

Please correct me if I'm wrong. :)

Richard

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg-agent automatically use passphrase for signing subkey?

2011-07-23 Thread Ingo Klöcker
On Friday 22 July 2011, Charly Avital wrote:
> Chris Poole
> 
> 
> wrote on 7/22/11 10:38:39 AM:
> > On Thu, Jul 21, 2011 at 5:30 PM, Charly Avital  
wrote:
> >> When your passphrase has been cached for each of those *actions*,
> >> it will remain in gpg-agent's "memory" for the duration of the
> >> cache set in your home directory ~/.gnupg/gpg-agent.conf
> > 
> > That's a shame, but thanks.
> 
> Shame?
> I find it very convenient.

You think it's convenient that you have to enter the same passphrase 
twice, once when you want to sign something and then again when you want 
to decrypt something?

There are surely use cases for this, but for someone like me who is 
using gpg on a computer (resp. account) nobody else has (physical) 
access to it's just an annoyance (albeit a minor one).

There is already the option --ignore-cache-for-signing (curiously the 
corresponding option for decryption is missing, i.e. it's not possible 
to use the cache for signing but not for decryption), so why not add 
another option like --share-signing-and-decryption-cache? (I guess, if I 
really wanted this I should provide a patch. :-) )


Regards,
Ingo


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users