duplicate keyid survey results
disastry@saiknes.lv.NO.SPaM.NET
disastry@saiknes.lv.NO.SPaM.NET
Mon Mar 4 09:13:02 2002
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160
Len Sassaman rabbi@quickie.net wrote:
> The thing that comes to mind immediately for me is that you should allow
> for a 64-bit key-ID search.
I think all (most?) keyservers allows this.
some even allows search by fingerprint.
> When 32-bit key ID collisions occur, you may want your key server to
> display a warning in the user-interface.
>
> Remember that 32-bit collisions could be accidental,
exactly. there are about 1600000 keys on server ( http://www.dtype.org/keyanalyze/ )
it's more than enough for birthday paradox.
81 keys with duplicate keyid are normal, some of them are DEADBEAFed of course.
> so not reporting them
> would prevent the distribution of legitimate keys. (And you mention the
> possibility of an intential DOS.)
>
> I personally think that public key servers should do little more than
> accept, store, and report data that it contains.
IMO, keyserver SHOULD NOT accept keys/userid that are not selfsigned.
> Preventing the display of
> keys with duplicate IDs steps over that line a bit too much for me.
> --Len.
>
> On Mon, 4 Mar 2002, Hironobu SUZUKI wrote:
> > > A current list of duplicate PGP keyids can be found on my website:
__
Disastry http://disastry.dhs.org/
http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon
^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH,
AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes)
-----BEGIN PGP SIGNATURE-----
Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1
iQA/AwUBPIMOtDBaTVEuJQxkEQNylgCg5AKPRlZf34gtxo+qlMHBWC5XjrEAoMhB
G53a/SmRE102mnuqgAE5OrKr
=baXx
-----END PGP SIGNATURE-----