From: "Ludovic Courtès" <ludo@gnu.org>
To: Maxime Devos <maximedevos@telenet.be>
Cc: 57576@debbugs.gnu.org, 57599@debbugs.gnu.org,
Zhu Zihao <all_but_last@163.com>,
Andreas Enge <andreas.enge@inria.fr>
Subject: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves.
Date: Tue, 06 Sep 2022 22:02:55 +0200 [thread overview]
Message-ID: <87sfl4tgnk.fsf@gnu.org> (raw)
In-Reply-To: <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> (Maxime Devos's message of "Tue, 6 Sep 2022 18:10:15 +0200")
Hi,
(Cc’ing Andreas for extra advice.)
Maxime Devos <maximedevos@telenet.be> skribis:
> We disallow signing with SHA-1, because it is known to be vulnerable
> and as there are alternatives that are considered good, even if this
> limits what users can do with their OpenPGP keys.
Right, we know it’s affordable to break SHA-1 these days.
> In case of those curves, I'm not aware of any 'crytopgraphic proof'
> (*) that the curves are vulnerable (unlike for SHA-1), but as noted in
> ¹ and elsewhere, there are other kinds of evidence that something is
> wrong.
It’s different from SHA-1 though: ECDSA is not known to be vulnerable,
and AIUI we can’t tell that there’s a possibility NIST/NSA has a
backdoor as is the case for DualEC. However, the whole NIST design
process is tainted. So my understanding is that it’s really a gray
area.
> Except for the different nature of the evidence of vulnerability, it
> seems about the same situation to me. As such, I don't think we should
> support them (some nice error messages like 'This algorithm [...] is
> not supported yet’ or ‘This algorithm [...] is (likely/known to be)
> vulnerable’ would be good though!).
Yes, that we can improve. :-)
> An alternative option would be to allow the channel
> .guix-authorization (of the previous commits, not the commit that is
> about to be verified!) to decide what's considered a 'good algorithm'
> (with some defaults) (with a field). Maybe we'll have to deprecate,
> say, RSA or SHA-3 eventually, it would be nice to have a migration
> method in place as early as possible, to minimise the risk of some
> people doing a "guix pull" from a Guix that does not support that
> field to a Guix or other channel that _does_ use that field.
It’s tempting, but I’d rather avoid introducing such mechanisms to keep
things as simple as possible.
Thanks,
Ludo’.
next prev parent reply other threads:[~2022-09-06 20:04 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-04 11:53 bug#57576: Missing support for NIPT-P384 gpg algorithm in Guix channel authentication Zhu Zihao
2022-09-05 16:06 ` Ludovic Courtès
[not found] ` <20220905160929.21742-1-ludo@gnu.org>
[not found] ` <8735d4zpcf.fsf_-_@gnu.org>
2022-09-06 15:26 ` bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves Zhu Zihao
2022-09-06 16:10 ` Maxime Devos
2022-09-06 20:02 ` Ludovic Courtès [this message]
2022-09-07 10:34 ` Andreas Enge
[not found] ` <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be>
2022-09-07 12:02 ` Andreas Enge
2022-09-07 12:51 ` Ludovic Courtès
2022-09-07 15:27 ` zimoun
2022-09-24 9:53 ` Ludovic Courtès
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://guix.gnu.org/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87sfl4tgnk.fsf@gnu.org \
--to=ludo@gnu.org \
--cc=57576@debbugs.gnu.org \
--cc=57599@debbugs.gnu.org \
--cc=all_but_last@163.com \
--cc=andreas.enge@inria.fr \
--cc=maximedevos@telenet.be \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).