95 entries in 0.692s
phf: asciilifeform: yours doesn't have any notion of
subkeys, so i'm not entirely sure "how" it worked.
a111: Logged on 2017-12-23 00:02 joecool: correct, for whatever reason this smartcard would not allow me to import my other
subkeys joecool: so i have two encryption
subkeys on my uid
joecool: correct, for whatever reason this smartcard would not allow me to import my other
subkeys ☟︎ Framedragger: mircea_popescu: this then is a critique of sks keyservers, strictly. there was a thread on their ML, they rejected the idea of rejecting such
subkeys (...)
Framedragger: import
subkeys with no valid self-sig? or am i misreading what is stated in the article? because to me those statements (in the broader context) are rendered into that meaning precisely.
Framedragger: asciilifeform: apologies if i am mistaken here, but iirc phuctor was reported to have cracked some pgp keys when at that point in time none of the keys cracked had valid self-sigs. the presentation from tmsr (trilema/phuctor) to me appeared to have overstated the results, so to speak. (but then later
subkeys with valid selfsigs were found, iirc). this isn't a technical point, i suppose.
Framedragger: one practical consideration re you signing my
subkeys: what if you really trusted my main key but then i later decided to move that key to offline storage for security, and derive a subkey - one may argue that gpg provides just this kind of means of streamlining the process - i sign my new subkey or whatever, and there's that, no need for you to meet me in person again. otherwise doesn't scale at all, if 1000 people wanted to trust my su
mircea_popescu: if gpg was intended as a sort of otr, "user creates
subkeys forever", it's shockingly poorly implemented.
mircea_popescu: "
subkeys" are ~equivalent to "domain names" and various attempts to weaken bitcoin that were quashed historically. "wouldn't you like some wool over your eyes ???"
Framedragger: btw i'd choose self-sigs over "trust sks keyservers not to include fake
subkeys" any time of the year. obvs the point is to disassemble this false dichotomy. but short-term, self-sigs are not useless at all.
Framedragger: asciilifeform: is there a 'stable' algorithm / spec for deriving phuctor's hash / permalink? you'd mentioned before that it "includes the entire key - names, emails, ~all~
subkeys."
Framedragger: PeterL: gpg client should reject
subkeys not signed by master key or somesuch, was the argument i think
Framedragger: re. hanno: oh yeah? i had thought he had had a point, re. those broken
subkeys not being used anyway. but i guess the point is that phuctor found some *actually used* keys, etc.
Framedragger: asciilifeform: ah, right;
subkeys included. fair enough.
BingoBoingo: I don't think I covered any thing about the
subkeys in mine. One of the things passed around before that LOVED
subkeys.
assbot: Logged on 24-09-2015 06:18:08; mircea_popescu: <asciilifeform> mircea_popescu: one example of something which Must Die is '
subkeys' << absolutely. i have no fucking idea what chickenbrain thought that's a thing. "o hey, you know what this chevy is made out of ? chevys! because they didn;'t get me that lego set when i was nine and now im fucked in the head."
ben_vulpes: ;;later tell asciilifeform
subkeys ruining someone's day?
phf: i thought the matter of
subkeys, "automatic" key replacements or substituions was settled by hanbot's story. i really put too much faith in it as the b-a canon seems like
punkman: dunno, I worry more about someone refreshing his keyring and ending up with extra
subkeys under my main key, than a second main key appearing with same fingerprint, so I'm definitely setting my cert-digest-algo to sha512
assbot: Logged on 12-10-2015 22:51:13; punkman: btw if you don't want the signatures on your
subkeys being sha1, I think --cert-digest-algo is the option that needs changing
punkman: btw if you don't want the signatures on your
subkeys being sha1, I think --cert-digest-algo is the option that needs changing
☟︎ ascii_field: jurov, mircea_popescu: iirc mircea_popescu did not accept refreshed
subkeys either
assbot: Logged on 10-10-2015 11:50:17; mircea_popescu: asciilifeform agreed re
subkeys. tho i think we had agreed on this before.
PeterL: What is the point of
subkeys?
mircea_popescu: asciilifeform agreed re
subkeys. tho i think we had agreed on this before.
☟︎ assbot: Logged on 24-09-2015 03:18:40; asciilifeform: mircea_popescu: one example of something which Must Die is '
subkeys'
assbot: Logged on 09-10-2015 11:07:40; punkman: from same thread: "If Collision attacks become viable for SHA-1 fingerprints, then they would probably also become viable for
subkeys as well, and it might be possible for an attacker to generate a subkey with a collision for the cross-certifying signature, and be able to graft a false subkey onto a master key with a SHA-1 signature, which would definitely be a key compromise."
punkman: from same thread: "If Collision attacks become viable for SHA-1 fingerprints, then they would probably also become viable for
subkeys as well, and it might be possible for an attacker to generate a subkey with a collision for the cross-certifying signature, and be able to graft a false subkey onto a master key with a SHA-1 signature, which would definitely be a key compromise."
☟︎ mircea_popescu: <asciilifeform> mircea_popescu: one example of something which Must Die is '
subkeys' << absolutely. i have no fucking idea what chickenbrain thought that's a thing. "o hey, you know what this chevy is made out of ? chevys! because they didn;'t get me that lego set when i was nine and now im fucked in the head."
☟︎ punkman: shinohai: your master key hadn't signed the
subkeys? how does that happen?
punkman: revoke
subkeys every now and then, nobody will notice
fromphuctor: it's quite a large key with a few
subkeys, total upload size is around 13K
Apocalyptic: asciilifeform, by the way do you have any explanation as to why pgpdump skips the KeyID field on invalid
subkeys ?
Hasimir: if they're encryption subkey bits then maybe it's from backfired attempts to segregate the cert key from the
subkeys ...
trinque: do I understand correctly that you use a "signing key" to sign your various
subkeys, thus associating them with one identity?
BingoBoingo: mircea_popescu: tbh, someone has to explain this "
subkeys" retardation to me sometime. fucking pseudohierarchy devoid of meaning. << Within your big GPG keyblock you can have multiple keys, say a 4096 RSA for signing and another 4096 to encrypt to. Beyond that you can keep stuffing moar keys in there just because...
jurov: someone has to explain this "
subkeys" retardation << guess mr.zimmermann overengineered it and then left to rot
mircea_popescu: tbh, someone has to explain this "
subkeys" retardation to me sometime. fucking pseudohierarchy devoid of meaning.
Hasimir: do they all have
subkeys or not?
ascii_field: Hasimir: so far each of the cases i have examined in detail had -at least one- legit rsa modulus in
subkeys ascii_field: Hasimir: we only see it here if it had one or more rsa
subkeys.
Apocalyptic: ascii_field, of the 19 broken moduli so far how many are actually valid
subkeys ?
ascii_field: so, one of the recent phucked keys contains two
subkeys, both of which are phucked. and the self-sig is... valid.
mike_c: it was discussed on hacker news. looks like there are a handful of invalid
subkeys on the sks servers
mod6: how do you know they're
subkeys? did I miss this in the log?
mircea_popescu: what i don't get is, how exactly you reproduce this ? i can't seem to make sks server to accept extra, unsigned
subkeys from anyone.
mircea_popescu: asciilifeform i wonder if this is reproducible, make sks servers display random data as people's
subkeys.
assbot: Logged on 12-05-2015 22:03:27; mircea_popescu: so ascii_field from the above, am i correct in deducing that there have been at most 47728 - 31262-4584 = 11882 (out of 47728, or ~1/4) keys without any RSA
subkeys in them ?
mircea_popescu: so ascii_field from the above, am i correct in deducing that there have been at most 47728 - 31262-4584 = 11882 (out of 47728, or ~1/4) keys without any RSA
subkeys in them ?
☟︎ dignork: so if anybody has to deal with multiple
subkeys, proper syntax is "gpg -u 8334BB7B5BDFA126! --clearsign file" , notice the key>!< notation, seems to be not so documented
decimation: it seems to me that the cli for signing
subkeys is less straightforward than it could be as well
pankkake: all my
subkeys do signing xor decryption
pankkake: basically the main signing key is only needed to sign your
subkeys, and sign others' keys
mircea_popescu: TestingUnoDosTre
subkeys you generate off a main key aren't more anonymous than the main key.
benkay: can you sign with
subkeys?
pankkake: FYI you can create stronger
subkeys pankkake: you can only use
subkeys for example
thestringpuller: mircea_popescu: I thought you could just register the main and
subkeys to the WOT key list and just give out the fingerprint?
davout: might be an interesting addition, as, if i understand
subkeys correctly they make the master key very very hard to compromise
davout: mircea_popescu: quick question, does mpex work with gpg
subkeys?
gabridome: yeah..Beg your pardon. You should be tierd to answer question to newbies. I didn't check the
subkeys...