[pkg-gnupg-maint] gnupg2-revert-rfc4880bis.patch

Andreas Metzler ametzler at bebt.de
Sun Mar 31 13:15:10 BST 2024


On 2024-03-29 Daniel Kahn Gillmor <dkg at fifthhorseman.net> wrote:
> On Fri 2024-03-29 15:55:27 +0100, Andreas Metzler wrote:
[...]
> > 2 Should we patch gnupg >= 2.2.40 and 2.4 to ignore the setting for
> > AEAD/OCB preference when encrypting messages.  ("c")
> >
> > I would tend to say yes to 1 and no to 2.
[...]
> I think i disagree with you about (2): this behavior is precisely what
> caused the failures with thunderbird recently.  The version of librnp
> that thunderbird was using let users import a secret key/certificate
> that had been generated with a version of GnuPG that included the
> advertisement, and send mail with it, including the certificate.

> Then someone responded using a tool (like the proposed GnuPG version)
> which emitted packets, that Thunderbird then couldn't read.

> Do we want the debian packages to play into that dynamic?

Hello Daniel,

well on one hand we wouldn't want to push AEAD/OCB but OTOH
a) this could be be avoided by the key owner using correct settings and
b) ignoring the key-owner's setting is a big change compared to #1

Also I suspect that all current openpgp implementations could deal with
AEAD/OCB (Iirc I had tested sqop and rnp 0.17.0.), so thunderbird could
make this a non issue by upgrading rnp.

However I am convinced it is impossible to be perceived as neutral on
the whole matter.

Also the above should not be taken as a vote or veto I am simply
presenting the reasons for the stated preferrence.

>> I still do not what usecases break when with respect to "v5 wireformat",
>> i.e. when gpg 2.4 generates it. e.g. "gpg-2.4 --detach-sign -a ..."
>> (with a gpg 2.4 generated rsa key) generates a detached signature that
>> can be verified with "sqop verify ".

> This is a separate question from what you mentioned above, right?

Yes.

> Seems like you're asking about v5 signatures here, but you're saying
> that the proposed versions don't currently emit them by default.
> that's a good report to have!

FWIW I ran through most of the Compliance options of GnuPG 2.4.5
(--gnupg --openpgp --rfc4880 --rfc4880bis --rfc2440) when generating a
detached signature with a gnupg 2.4.4 RSA key, the SHA1 using variants
(--openpgp --rfc2440 --rfc4880) failed to verify with sqop, the others
worked.

A detached signature with key with generated with gnupg 2.4.5 defaults
(cv25519) was also verifyable with sqop.

cu Andreas
-- 
`What a good friend you are to him, Dr. Maturin. His other friends are
so grateful to you.'
`I sew his ears on from time to time, sure'



More information about the pkg-gnupg-maint mailing list