Best Practices
David Shaw
dshaw at jabberwocky.com
Mon Dec 13 17:16:04 CET 2010
On Dec 12, 2010, at 11:50 PM, Daniel Kahn Gillmor wrote:
> Can you help me understand why a change in the choice of fingerprint
> technique and a change in the must-implement-digest-algorithm would
> require a change in the certificates themselves?
It doesn't work that way. If you want to make a proposal, I'm all ears, as are the folks on the IETF list, but it seems to me you are focusing on one specific part of the design (the secret key format), forcing it to remain unchanged, and (presumably) using changes elsewhere to accommodate this fixed point in the design (for example, doubled PKESK packets, one for each key ID).
As I see it, three major things need to happen to get OpenPGP using something other than SHA-1:
1) SHA-3 needs to exist: we will almost certainly use SHA-3, but even if we don't, we should wait until the SHA-3 reports are in. SHA-3 is a major amount of effort focused on hashing. It would be foolish to design something new involving hashing without using the latest research.
2) We need OpenPGP changes to incorporate the new hash in a way that works alongside the existing design. It's not as easy as "s/SHA-1/SHA-3/", especially given the deployed base of OpenPGP programs.
3) We need to roll out those changes in a way that won't break things. We're going to be running with SHA-1 and SHA-3 together for (at least) years.
Even if we assume that there will be no other unrelated changes at the same time (an assumption I'm not willing to make - everyone has the half-dozen fiddle things (like hard expiration dates) that they think could be better, but aren't really worth fixing unless there is a key version jump), I'm still not willing to go into the design process in step 2 with the assumption that changing the secret key format is somehow off-limits. (And mind you, we haven't even reached step 1 yet!)
David
More information about the Gnupg-users
mailing list