unofficial mirror of bug-guix@gnu.org 
 help / color / mirror / code / Atom feed
From: "Ludovic Courtès" <ludo@gnu.org>
To: Maxime Devos <maximedevos@telenet.be>
Cc: 57576@debbugs.gnu.org, 57599@debbugs.gnu.org,
	Zhu Zihao <all_but_last@163.com>,
	Andreas Enge <andreas.enge@inria.fr>
Subject: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves.
Date: Tue, 06 Sep 2022 22:02:55 +0200	[thread overview]
Message-ID: <87sfl4tgnk.fsf@gnu.org> (raw)
In-Reply-To: <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> (Maxime Devos's message of "Tue, 6 Sep 2022 18:10:15 +0200")

Hi,

(Cc’ing Andreas for extra advice.)

Maxime Devos <maximedevos@telenet.be> skribis:

> We disallow signing with SHA-1, because it is known to be vulnerable
> and as there are alternatives that are considered good, even if this
> limits what users can do with their OpenPGP keys.

Right, we know it’s affordable to break SHA-1 these days.

> In case of those curves, I'm not aware of any 'crytopgraphic proof'
> (*) that the curves are vulnerable (unlike for SHA-1), but as noted in
> ¹ and elsewhere, there are other kinds of evidence that something is
> wrong.

It’s different from SHA-1 though: ECDSA is not known to be vulnerable,
and AIUI we can’t tell that there’s a possibility NIST/NSA has a
backdoor as is the case for DualEC.  However, the whole NIST design
process is tainted.  So my understanding is that it’s really a gray
area.

> Except for the different nature of the evidence of vulnerability, it
> seems about the same situation to me. As such, I don't think we should
> support them (some nice error messages like 'This algorithm [...] is
> not supported yet’ or ‘This algorithm [...] is (likely/known to be)
> vulnerable’ would be good though!).

Yes, that we can improve.  :-)

> An alternative option would be to allow the channel
> .guix-authorization (of the previous commits, not the commit that is
> about to be verified!) to decide what's considered a 'good algorithm'
> (with some defaults) (with a field). Maybe we'll have to deprecate,
> say, RSA or SHA-3 eventually, it would be nice to have a migration
> method in place as early as possible, to minimise the risk of some
> people doing a "guix pull" from a Guix that does not support that
> field to a Guix or other channel that _does_ use that field.

It’s tempting, but I’d rather avoid introducing such mechanisms to keep
things as simple as possible.

Thanks,
Ludo’.




  reply	other threads:[~2022-09-06 20:04 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-09-04 11:53 bug#57576: Missing support for NIPT-P384 gpg algorithm in Guix channel authentication Zhu Zihao
2022-09-05 16:06 ` Ludovic Courtès
     [not found]   ` <20220905160929.21742-1-ludo@gnu.org>
     [not found]     ` <8735d4zpcf.fsf_-_@gnu.org>
2022-09-06 15:26       ` bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves Zhu Zihao
2022-09-06 16:10       ` Maxime Devos
2022-09-06 20:02         ` Ludovic Courtès [this message]
2022-09-07 10:34           ` Andreas Enge
     [not found]           ` <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be>
2022-09-07 12:02             ` Andreas Enge
2022-09-07 12:51               ` Ludovic Courtès
2022-09-07 15:27                 ` zimoun
2022-09-24  9:53                 ` Ludovic Courtès

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87sfl4tgnk.fsf@gnu.org \
    --to=ludo@gnu.org \
    --cc=57576@debbugs.gnu.org \
    --cc=57599@debbugs.gnu.org \
    --cc=all_but_last@163.com \
    --cc=andreas.enge@inria.fr \
    --cc=maximedevos@telenet.be \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).