Re: Changing default digest algo

2013-11-03 Thread Daniel Kahn Gillmor

On 11/04/2013 12:45 AM, Chuck Peters wrote:

I added the following to gpg.conf:
personal-digest-preferences SHA512
cert-digest-algo SHA512
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES
CAST5 ZLIB BZIP2 ZIP Uncompressed

I changed the preferences:
gpg> setpref SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB
BZIP2 ZIP Uncompressed

And verified:
gpg> showpref
[ultimate] (1). Charles F. Peters II (Chuck) 
  Cipher: AES256, AES192, AES, CAST5, 3DES
  Digest: SHA512, SHA384, SHA256, SHA224, SHA1
  Compression: ZLIB, BZIP2, ZIP, Uncompressed
  Features: MDC, Keyserver no-modify


these steps look right to me, though i don't see the updated preferences 
on the public keyserver network yet.



When I check the keys, it still shows SHA1:
$ gpg --export-options export-minimal --export 23E9EB24 | gpg
--list-packets |grep -A 2 signature|grep 'digest algo 2,'
 digest algo 2, begin of digest a3 6e
 digest algo 2, begin of digest 3b 34
 digest algo 2, begin of digest f2 3e
 digest algo 2, begin of digest ae 58
 digest algo 2, begin of digest 67 fa
 digest algo 2, begin of digest e6 39



your key has four signing-capable subkeys and two encryption-capable 
subkeys.  It also has two user IDs.  This means that there should be 
eight self-signatures (4 + 2 + 2 = 8).  Above, you're only showing 6 
self-sigs with SHA-1.  I suspect that your User IDs (where the 
preference subpackets are stored) are actually being certified with a 
stronger digest, but your subkey binding signatures have not been adjusted.


I just tested with an example profile using configuration options 
similar to the ones you've described above, and found that newly-created 
subkeys (after the config change) are bound with a subkey binding 
signature over the preferred cert-digest-algo.  so one approach (if 
there are no other suggestions for re-creating new subkey binding 
signatures on the existing subkeys) is that you could generate new 
subkeys and revoke the old ones.


hth,

--dkg

PS as an aside, having two 4096-bit encryption-capable subkeys is 
probably not useful.  Your peers who encrypt traffic to you will need to 
choose one to encrypt to, and they will just choose the most recent one. 
 I recommend revoking all but the most recent.  If you have a good 
reason for keeping all 4 signing-capable subkeys (e.g. you are 
distributing signing-capable subkeys to separate devices which you want 
to be able to revoke if those devices become compromised), that's fine. 
 If that's not the case, you probably want to revoke most of those 
signing-capable subkeys too.


PPS you may be interested in:

 http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/024986.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing default digest algo

2013-11-03 Thread Chuck Peters

I generated some new keys in Sept and would like to convert the digest
from SHA1 to SHA512.

I added the following to gpg.conf:
personal-digest-preferences SHA512
cert-digest-algo SHA512
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES
CAST5 ZLIB BZIP2 ZIP Uncompressed

I changed the preferences:
gpg> setpref SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB
BZIP2 ZIP Uncompressed
 
And verified:
gpg> showpref
[ultimate] (1). Charles F. Peters II (Chuck) 
 Cipher: AES256, AES192, AES, CAST5, 3DES
 Digest: SHA512, SHA384, SHA256, SHA224, SHA1
 Compression: ZLIB, BZIP2, ZIP, Uncompressed
 Features: MDC, Keyserver no-modify

When I check the keys, it still shows SHA1:
$ gpg --export-options export-minimal --export 23E9EB24 | gpg
--list-packets |grep -A 2 signature|grep 'digest algo 2,'
digest algo 2, begin of digest a3 6e
digest algo 2, begin of digest 3b 34
digest algo 2, begin of digest f2 3e
digest algo 2, begin of digest ae 58
digest algo 2, begin of digest 67 fa
digest algo 2, begin of digest e6 39

I tried a few things like changing the passphrase, signing my key and
gpg --s2k-digest-algo SHA512 --edit-key 23E9EB24 and nothing seems to
work.  How do I change the digest to SHA512?


Thanks,
Chuck

1. http://www.debian-administration.org/users/dkg/weblog/48
2, https://we.riseup.net/riseuplabs+paow/openpgp-best-practices


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm and expired certificates

2013-11-03 Thread Uwe Brauer
>> "Ingo" == Ingo Klöcker  writes:


   > I interpreted "especially because of all which was lately revealed about 
   > the NSA" 

No it was more of a general remark, concerning NSA malpractice of
reading everybody's (uncrypted) email unconditionally.

   > So, your point/hope probably was that a government based CA
   > wouldn't have such a business model and would instead offer this
   > service gratis to the people (so that more people would be
   > protected from the NSA reading their mail). If this was your point
   > then apparently I didn't see it when I first read your message.


That was *precisely* my point, thanks for clarifying it 

Uwe Brauer 


smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quotes from GPG users

2013-11-03 Thread Marko Randjelovic
On Wed, 30 Oct 2013 11:58:56 +0100
Sam Tuke  wrote:

> If you want to help us, send your own statement about why GPG is important to
> you. Please keep it less than or equal to 130 characters, so it can be used on
> social networks.
> 
> I'll collect them and pick the best for use now and in future.


I send five variants (but the best is all of them :) ):


I use GnuPG because I care and because I was taught it was a sin to open other 
people's letters.

I use GnuPG because there was a country where people used to say "OZNA comes to 
know anything".

I use GnuPG because ‎I don't trade with my independence.

I use GnuPG because ‎I don't trade with my freedom.

I use GnuPG because ‎I take critical attitude towards possibility of abuse of 
my data.


-- 
http://mr.flossdaily.org


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quotes from GPG users

2013-11-03 Thread Daniel Kahn Gillmor

On 10/30/2013 06:58 AM, Sam Tuke wrote:

If you want to help us, send your own statement about why GPG is important to
you. Please keep it less than or equal to 130 characters, so it can be used on
social networks.


As a Debian user, I rely on GnuPG to ensure that the software I install 
hasn't been tampered with.


--dkg



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users