René Engelhard <r...@rene-engelhard.de> writes:

> If you divert /usr/bin/gpg, IMHO you need to behave like gpg.

gpg doesn't behave like gpg.  Just look at all the version-specific
hacks in GPGME if you don't take my word for it.  Any code relying on a
specific behavior of gpg is broken.

> This includes accepting what gpg accepts.

What gpg accepts is unacceptable.  Just to provide some context, here is
the second paragraph of https://en.wikipedia.org/wiki/SHA-1

    Since 2005, SHA-1 has not been considered secure against well-funded
    opponents;[11] as of 2010 many organizations have recommended its
    replacement.[12][10][13] NIST formally deprecated use of SHA-1 in
    2011 and disallowed its use for digital signatures in 2013, and
    declared that it should be phased out by 2030.[14] As of 2020,
    chosen-prefix attacks against SHA-1 are practical.[6][8] As such, it
    is recommended to remove SHA-1 from products as soon as possible and
    instead use SHA-2 or SHA-3. Replacing SHA-1 is urgent where it is
    used for digital signatures.

It is sad that gpg let some LibreOffice contributor create a certificate
with SHA-1 binding signatures in 2017.  Saying any replacement must be
as lenient as the software that let this happen in the first place makes
it really hard for anyone to improve the status quo.

> Otherwise such surprises happen.

I disagree.  I have worked with many downstream test suites, and the
problem is having fixed cryptographic artifacts in them.  They will go
stale.  This is not a question of if, but when.  Preferably, test
artifacts with cryptographic artifacts should be created during the test
suite run.

However, one often wants to anchor the implementation using
pre-generated artifacts as well, and one needs to be careful not to let
them go stale (and, not generate artifacts that are bad in the first
place, like it happened here).


Best,
Justus

Attachment: signature.asc
Description: PGP signature

Reply via email to