Re: Should one really disable AEAD for recent GnuPG created PGP keys?

2024-03-05 Thread Tobias Leupold via Gnupg-users
Sorry for asking another thing about this. For sure, I didn't want to set off 
an avalanche, and I still don't want to. But from a user's perspective, this 
is simply very confusing and also unsettling.

I think that somewhere, there should be some documentation, FAQ or whatever, 
as a definitive source for the correct facts.

Because we have this statement:

> That is not a GnuPG specific but an agreed upon format by the participants
> of the OpenPGP WG and implemented by all major implementations.

Which does not match what others say (apart from Vincent's statement) ... e.g. 
I also asked for what to do on Stack Exchange:

https://security.stackexchange.com/questions/275883/should-one-really-disable-aead-for-recent-gnupg-created-pgp-keys

The answer started with:

> While authenticated encryption (AEAD) is good - especially for something
> like OpenPGP, which is an old and over-complicated standard that has a
> concerning large attack surface for vulnerabilities or simple implementation
> errors - I definitely can't recommend enabling a non-standardized
> compatibility-breaking feature by default, and frankly feel that GnuPG made
> a major error in doing so

from somebody with an impressive reputation on the network, for whom I suppose 
he knows what he's talking about.

So: Is this standardized, or is it not?

As said: I don't want to provoke a flame war. I'm just interested in objective 
facts ...



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Should one really disable AEAD for recent GnuPG created PGP keys?

2024-03-04 Thread Tobias Leupold via Gnupg-users

Hi Vincent!

Thanks a lot for this insight!

When it comes to encryption, I would consider myself a "power user", but 
still a user. I never heard of all this until now. What I, from the 
perspective of an end-user, saw was: I generate a new key. And then: 
"Pass no work on me phone anymore, OpenKeychain bad!" ;-)


This whole thing is awkward. As a normal user, you currently have no 
chance to even know this.


So, is what they propose in the Arch wiki the way to go to stick to 
non-embattled interoperable settings? (setpref AES256 AES192 AES SHA512 
SHA384 SHA256 SHA224 ZLIB BZIP2 ZIP)?


I see the rationale for a performant block cipher. But that's nothing I 
need for my use-case; there's simply no advantage at all. Most probably 
for most users. So if there's no broad consensus about this, such an 
option should be hidden behind some "expert" flag, for people knowing 
what they do, and who are willing to trade off interoperability for 
performance. It should not be a default setting letting users like me 
run into problems they can't grasp without deep research.


I don't want to join a "faction". I don't want to participate in a 
religious war. I just want to use encryption ...


I'll file a Gentoo bug about this and see what the devs/maintainers say.

Cheers, Tobias

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Should one really disable AEAD for recent GnuPG created PGP keys?

2024-03-04 Thread Tobias Leupold via Gnupg-users
> Ah... That question leads to an awkward discussion these days. There
> was a IETF standards process that led to the OCB mode now supported by
> GnuPG and others. GnuPG (and others) implemented it before the new
> standard was officially released (there seemed to be consensus). That
> standards process then dropped the GnuPG OCB mode and created 3 new
> modes. So currently, there are the two modes that the OpenPGP standard
> currently specifies and four proposed modes for a total of 6 modes,
> each completely incompatible with any other mode. So there is a
> potential for a interoperability disaster here.

> At this point I personally believe that everyone should step back from
> this potential war and stop generating new modes by default. As a user
> I can happily wait until an actual consensus is reached. Heck, I can
> happily wait past that. There is no hurry here.

Oh my. So the answer to my question "Should one really disable AEAD for recent 
GnuPG created PGP keys" (or OCB/AEAD or whatever) is maybe "yes" after all ... 
I mean, it's hard enough for most people to use public key encryption at all. 
Even if there are no interoperability issues.

Maybe, one should agree on the lowest common denominator here. I encrypt 
passwords, sign software releases and sometimes (rarely), I encrypt an email. 
A text email. Which is like 4 KB or such. So, for me, I see no performance 
problem for my use-case.

> The big usability problem now is that the implementations are not
> making all this clear. GnuPG for instance doesn't even have an entry
> in the FAQ about this problem. Most users will not be able to overcome
> this sort of issue and will have to just give up.

... like most of them do anyway, when it comes to public key cryptography.

> Anyway, I wrote a whole rant about this:
> 
> * https://articles.59.ca/doku.php?id=pgpfan:schism
> 
> I have added your Openkeychain references to my list of problems
> caused by new OpenPGP cipher block modes. Thanks.
> 
> * https://articles.59.ca/doku.php?id=pgpfan:noae_shame

Thanks for this reference!

Cheers, Tobias



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Should one really disable AEAD for recent GnuPG created PGP keys?

2024-03-04 Thread Tobias Leupold via Gnupg-users
Hi Werner,

thanks for the clarification!

> All the major implementers (Ribose RNP, GnuPG, BouncyCastle, OpenPGP.js)
> took great care to first deploy the software with support for the new
> mode before actually creating keys with a preference for that mode [1].
> Unfortunately a small group of people seem to sabotage this strategy by
> rejecting the new mode despite that it has been implemented by their
> crypto library.  Well, or your version on Android is too old - which
> would indicate a severe security problem anyway.

This is not about (my) Android (version), I think this is more about 
OpenKeychain (still) not having implemented this. For whatever reason.

However, I filed an issue for that:
https://github.com/open-keychain/open-keychain/issues/2900

IMO interoperability with GnuPG is crucial for this project. Most people using 
that on their phones will come from Linux, or they will at least be GnuPG 
users.

Let's hope for the best ...

> RSA has nothing to do with this.  You can safely switch to curve25519
> (ed25519/cv25519) for new keys - they are supported even longer than OCB
> mode (aka AEAD).

Good to know!




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Should one really disable AEAD for recent GnuPG created PGP keys?

2024-03-04 Thread Tobias Leupold via Gnupg-users
Hi all :-)

Apparently, there are some problems with the new defaults that are set when 
one creates a PGP key using a recent version of GnuPG (2.4).

I ran into this after generating a new ECC/ED25519 key to replace my "old" RSA 
one. The problem showed up when I re-encrypted my pass password store 
passwords with the new key: After transferring the key to my Android phone and 
importing it into OpenKeychain, I could not decrypt any passwords anymore.

After some research, I found

https://github.com/open-keychain/open-keychain/issues/2886 ,

describing this exact issue. As a possible fix, disabling the unsupported AEAD 
mechanism in the key itself was mentioned, the Arch folks write:

https://wiki.archlinux.org/title/GnuPG#Disable_unsupported_AEAD_mechanism

They also claim that "many downstreams attempt to remove this new default by 
patching the GnuPG sources".

I'm not that deep into cryptography. I'm not sure I completely grasp what AEAD 
and OCB mean.

So: Is it wise and/or necessary to disable that for new GnuPG generated keys, 
for the sake of interoperability? Or will the others catch up and implement 
it? Or is there a good reason not to do so? Should one keep using legacy RSA 
keys? Is it too early to switch to more modern ones?

Thanks to all cryptography experts for all clarification!

Cheers, Tobias



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users