-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
32bit key ids are not secure to use #10
Comments
Whoops. This issue slipped through the cracks. I'll put in some serious "WARN" messages on that. As you mentioned with the evil32.com link, this is just as much an issue of education. As of right now the default behavior in gpg is still to display the 32bit id. This means for the average user they won't know the difference between their short id, long id, or full fingerprint. Speaking of that last point, I'm going to make sure that gpget will also support the full long fingerprint. |
It should also be noted that this is only relevant if the key id is specified with the Nonetheless, still good to call out. |
The use of GPG short ids is insecure is insecure. It is trivial to create a colliding short id with the use of inexpensive hardware. As GPG still uses short ids as their default behavior, it is important to meet users where they're at and while not causing things to break, we should inform and discourage users from this practice. Affects #10
Man, thank you for attention. I fully agree that the most users don't understand difference between the short ids, long ids and fingerprint. I also understand that GnuPG use short ids in CLI in most cases, but I believe that all the new GPG oriented software should take into insecurity 32bit ids. Yes, this issue - a special case. But it is possible to treat ALL security issues as theoretically and only for learning. |
After another month of thinking through this my opinions have evolved a bit. I'll summarize them as follows:
In light of this in the coming weeks I will be:
Any other commentary is welcome, and thanks @osminogin for bringing this up! |
Is really now very simple make collading short gpg ids (especially with videocard acceleration), is very simple make similar bitcoin address for donations and etc. Importantly it's now available even for script kiddies. It may look like an of paranoia attack, but my opinion of the whole modern GPG oriented software should proceed from current reality. Thank you again. |
I found examples of the use of 32 bit gpg key ids in the documentation and code. This is a bad behavior, because now it is very easy to generate a colliding 32bit key id with special software.
More information on trouble: https://evil32.com/
In my opinion, a good idea to specify in the documentation that short key ids are no longer safe.
Possible in gpget code is to completely eliminate processing of short ids. This is the current reality.
The text was updated successfully, but these errors were encountered: