Hi Thijs,

On 05/26/2009 05:51 AM, Thijs Kinkhorst wrote:
> I'm not so sure about this. I think you campaign to prepare us for SHA-1
> becoming too weak is definately useful.

Thanks, i'm glad you understand the goal here!

> However, caff does not set the
> cert-digest-algo for GnuPG anywhere explicitly. We just rely on gnupg's
> defaults.

Understood; however, i've set cert-digest-algo in ~/.gnupg/gpg.conf
(where i would expect to set it), and caff ignores that.

I understand technically *why* caff ignores that (it uses its own
GNUPGHOME) but i think it should either default to something post-SHA1,
or it should acknowledge and somehow adopt a user's stated preferences.

> The right solution to this issue seems to me to update GnuPG's
> default instead of applying a workaround at the caff level. Are you having
> any progress in getting GnuPG upstream to do such a thing?

gpg's upstream doesn't seem to be about to change the defaults, fwict,
but they've also implicitly declined to outline what specifically would
need to change to make them willing to change the defaults for
cert-digest-algo:

  http://lists.gnupg.org/pipermail/gnupg-devel/2009-May/025097.html

The main rationale given by upstream seems to be that there are clients
in the wild that do not support signatures made over digests from the
SHA-2 family.

Here's my rationale for why caff should change even if gpg's defaults
don't change in the near future:

 * caff (and signing-party) are currently primarily used by free
software developers establishing WoT connections to other free software
developers.  These particular users *do*  have access to implementations
which can handle certifications over SHA-2 digests.

 * We will ultimately need a functional WoT even if we discard all
certifications made over SHA-1.  Users who rely heavily on the WoT (e.g.
debian) need this post-SHA-1 WoT to be intact *before* SHA-1 is severely
compromised.

 * it would most likely help gnupg decide to change defaults if there is
a demonstrated movement away from SHA-1 by people who can responsibly
report interoperability problems that arise from the transition.  free
software developers are uniquely situated to do this, as they have
experience reporting problems and finding the root technical causes.




Another way that caff could address this besides changing the defaults
is to issue *two* certifications instead of one:

 0) an SHA-1 certification which all RFC-4880-compliant clients could
read, though it may be considered untrustworthy in the future, and

 1) if the certifying key is capable of it, a certification over an
SHA-2 digest. Some legacy clients will fail to comprehend this
certification, but it will have a longer shelf-life than the earlier
certification.

This is clumsier to implement in the current GnuPG API, though, since it
doesn't automatically allow a second certification on the same key.

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to