From unknown Sun Jun 22 03:47:24 2025 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Mailer: MIME-tools 5.509 (Entity 5.509) Content-Type: text/plain; charset=utf-8 From: bug#57576 <57576@debbugs.gnu.org> To: bug#57576 <57576@debbugs.gnu.org> Subject: Status: Missing support for NIPT-P384 gpg algorithm in Guix channel authentication. Reply-To: bug#57576 <57576@debbugs.gnu.org> Date: Sun, 22 Jun 2025 10:47:24 +0000 retitle 57576 Missing support for NIPT-P384 gpg algorithm in Guix channel a= uthentication. reassign 57576 guix submitter 57576 Zhu Zihao severity 57576 normal tag 57576 wontfix thanks From debbugs-submit-bounces@debbugs.gnu.org Sun Sep 04 08:14:56 2022 Received: (at submit) by debbugs.gnu.org; 4 Sep 2022 12:14:56 +0000 Received: from localhost ([127.0.0.1]:43647 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oUoWd-0007IO-IZ for submit@debbugs.gnu.org; Sun, 04 Sep 2022 08:14:55 -0400 Received: from lists.gnu.org ([209.51.188.17]:51122) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oUoWa-0007IF-10 for submit@debbugs.gnu.org; Sun, 04 Sep 2022 08:14:54 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:42910) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oUoWZ-0003ti-Sc for bug-guix@gnu.org; Sun, 04 Sep 2022 08:14:51 -0400 Received: from mail-m975.mail.163.com ([123.126.97.5]:5231) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1oUoWT-0002Uy-SA for bug-guix@gnu.org; Sun, 04 Sep 2022 08:14:49 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=From:Subject:Date:Message-ID:MIME-Version; bh=73Xk4 vPyJJxio0o4x9HrArY0X31nMfI5KVmowrdSVuQ=; b=WZTIRloHp4mQk7Oizc0Y4 3F8ZrIhv8SRh+hj/msFCQrzqPB3H1rZEsMWAF6WoEPepz9epOkO0M6oqNT0KzPNO 1e0exaA6arIBBibgz1bGkPGXrCrorrplNplD8smZL1QTEqmOMTx1iITz63LSS4x7 6a9RD7RM5udIDBqjtPjs6I= Received: from asus-laptop (unknown [27.38.249.43]) by smtp5 (Coremail) with SMTP id HdxpCgCHFCockxRjHdPtZg--.61537S2; Sun, 04 Sep 2022 19:59:26 +0800 (CST) User-agent: mu4e 1.8.9; emacs 29.0.50 From: Zhu Zihao To: bug-guix Subject: Missing support for NIPT-P384 gpg algorithm in Guix channel authentication. Date: Sun, 04 Sep 2022 19:53:28 +0800 Message-ID: <86v8q38i5i.fsf@163.com> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha384; protocol="application/pgp-signature" X-CM-TRANSID: HdxpCgCHFCockxRjHdPtZg--.61537S2 X-Coremail-Antispam: 1Uf129KBjvJXoWxGrWkXw47Jr18tF4rKw4xCrg_yoW5WFyfpa 18WF1SyryUJr45J3Wjkr1qqr47tr1UGry2qr4DG348Xr98WF1kKr1aya15Jr98AF1jgryj yrn5JrWDWF12y3JanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDUYxBIdaVFxhVjvjDU0xZFpf9x0zRZvt_UUUUU= X-Originating-IP: [27.38.249.43] X-CM-SenderInfo: pdoosuxxwbztlvw6il2tof0z/xtbBZh5yr1aEBqCPMwAAst Received-SPF: pass client-ip=123.126.97.5; envelope-from=all_but_last@163.com; helo=mail-m975.mail.163.com X-Spam_score_int: -20 X-Spam_score: -2.1 X-Spam_bar: -- X-Spam_report: (-2.1 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -2.4 (--) --=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable I'm working with my private channel, And I update my gpg key using NIPT-P384 algorithm. But `guix time-machine` complains that: Updating channel 'cireguix' from Git repository at '/home/citreu/gitrepos/c= ireguix'... Authenticating channel 'cireguix', commits 9b37ac0 to 6601a6a (1 new commit= s)... [##########################################################################= ###########################################################################= ###########################################################################= ###########]Backtrace: In guix/store.scm: 659:37 19 (thunk) In guix/status.scm: 815:4 18 (call-with-status-report _ _) In guix/store.scm: 1298:8 17 (call-with-build-handler # =E2=80=A6) In guix/inferior.scm: 904:34 16 (cached-channel-instance # =E2=80=A6) In guix/channels.scm: 523:7 15 (loop _ _) In guix/combinators.scm: 48:26 14 (fold2 # =E2=80=A6) In guix/channels.scm: 533:29 13 (_ #< name: cireguix url: "/home/citreu/gitre=E2=80= =A6> =E2=80=A6) 421:12 12 (latest-channel-instance # =E2=80=A6) In guix/git.scm: 290:7 11 (call-with-repository _ #) In guix/git-authenticate.scm: 442:22 10 (authenticate-repository # _ _ # =E2=80= =A6) In guix/progress.scm: 71:36 9 (call-with-progress-reporter _ _) In srfi/srfi-1.scm: 460:18 8 (fold # =E2=80=A6) In guix/git-authenticate.scm: 290:24 7 (_ # =E2=80=A6) 226:4 6 (authenticate-commit # # =E2=80=A6) 129:23 5 (commit-signing-key _ # =E2=80=A6) In guix/openpgp.scm: 562:26 4 (verify-openpgp-signature _ _ _) In gcrypt/pk-crypto.scm: 250:8 3 (key-type (unsupported-algorithm 19 #vu8(5 43 129 4 =E2=80=A6)= )) 202:27 2 (_ (unsupported-algorithm 19 #vu8(5 43 129 4 0 34 3 =E2=80=A6)= ) 0) In ice-9/boot-9.scm: 1685:16 1 (raise-exception _ #:continuable? _) 1685:16 0 (raise-exception _ #:continuable? _) ice-9/boot-9.scm:1685:16: In procedure raise-exception: In procedure struct-vtable: Wrong type argument in position 1 (expecting st= ruct): (unsupported-algorithm 19 #vu8(5 43 129 4 0 34 3 3 4 53 239 158 105 = 250 133 46 247 192 56 245 48 43 60 70 47 46 85 221 226 213 94 248 254 218 8= 5 176 252 233 119 26 85 65 191 47 159 193 86 129 155 186 183 151 233 81 178= 42 30 81 234 192 184 140 230 226 26 72 186 82 18 213 187 6 28 34 39 197 75= 37 138 226 98 216 187 185 223 222 126 181 122 255 104 171 201 51 254 7 235= 245 151 247 168 215 165 73 181)) Does Guix support NIPT-P384 key? =2D-=20 Retrieve my PGP public key: gpg --recv-keys 481F5EEEBA425ADC13247C76A6E672D981B8E744 Zihao --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iKsEARMJADMWIQQkZvBVi/S5Mr2eh+gobjKMmWV3qgUCYxSTGRUcYWxsX2J1dF9s YXN0QDE2My5jb20ACgkQKG4yjJlld6qXjwF/XKOJx8mQUfXAqM0mJjiWRI89Zscy SqSvtLgGIrBFIjBgfQbGLXwu1jzPh+TT1aSPAYC+VtNBbABeVJvGdPDrK5mOhBDe OgiZv6Zel2z0p0nNpLav51TZb0C7wOhaal/oZuA= =gtRp -----END PGP SIGNATURE----- --=-=-=-- From debbugs-submit-bounces@debbugs.gnu.org Mon Sep 05 12:06:11 2022 Received: (at 57576) by debbugs.gnu.org; 5 Sep 2022 16:06:12 +0000 Received: from localhost ([127.0.0.1]:48692 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVEbz-00034X-Ll for submit@debbugs.gnu.org; Mon, 05 Sep 2022 12:06:11 -0400 Received: from eggs.gnu.org ([209.51.188.92]:55660) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVEbx-00034C-Rk for 57576@debbugs.gnu.org; Mon, 05 Sep 2022 12:06:10 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:51920) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVEbs-0006ed-JV; Mon, 05 Sep 2022 12:06:04 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:In-Reply-To:Date:References:Subject:To: From; bh=UkGtCBty6Hh8uZqpIB3zuQvjVzG1PYNpmCMesm2ZtCw=; b=Bwh0Jkyu9zdO05MtdTHs 4S22q1IcVkf15HI3BttvdhF0/ixV10VieRENvv/QJChj+RFYVJAvuH6q5Grp8FgHX+n//MB03OyIt D7o7IC8b1CJfLRInUQgBJBRlWcL4wSRAIhyeEM1zbUbAwglb8HVCog+p45Ym4uhlZR9Yv3a5Ylayy yKlW4PTKI5QMYrRLx/Qp8Be2KyAa9om835NPXeoi4ogsen7ol8nzNsTF90T2J9wOcCD+PNifxv+8r Vs4wwNwv3Wz08cH0UjlXSnVm+TLLFX+JrI/BtsWhZcGMuMrFbYtHo0VQc+5zoCKGdkZ39BM2NGOOC VZsEv0POlLGMUw==; Received: from [2001:660:6102:320:e120:2c8f:8909:cdfe] (port=34280 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVEbr-0002on-Mx; Mon, 05 Sep 2022 12:06:04 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: Zhu Zihao Subject: Re: bug#57576: Missing support for NIPT-P384 gpg algorithm in Guix channel authentication. References: <86v8q38i5i.fsf@163.com> Date: Mon, 05 Sep 2022 18:06:01 +0200 In-Reply-To: <86v8q38i5i.fsf@163.com> (Zhu Zihao's message of "Sun, 04 Sep 2022 19:53:28 +0800") Message-ID: <87r10p3ixi.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi, Zhu Zihao skribis: > I'm working with my private channel, And I update my gpg key using > NIPT-P384 algorithm. But `guix time-machine` complains that: [...] > 226:4 6 (authenticate-commit # # =E2=80=A6) > 129:23 5 (commit-signing-key _ # =E2=80=A6) > In guix/openpgp.scm: > 562:26 4 (verify-openpgp-signature _ _ _) > In gcrypt/pk-crypto.scm: > 250:8 3 (key-type (unsupported-algorithm 19 #vu8(5 43 129 4 =E2=80= =A6))) > 202:27 2 (_ (unsupported-algorithm 19 #vu8(5 43 129 4 0 34 3 =E2=80= =A6)) 0) > In ice-9/boot-9.scm: > 1685:16 1 (raise-exception _ #:continuable? _) > 1685:16 0 (raise-exception _ #:continuable? _) > > ice-9/boot-9.scm:1685:16: In procedure raise-exception: > In procedure struct-vtable: Wrong type argument in position 1 (expecting = struct): (unsupported-algorithm 19 #vu8(5 43 129 4 0 34 3 3 4 53 239 158 10= 5 250 133 46 247 192 56 245 48 43 60 70 47 46 85 221 226 213 94 248 254 218= 85 176 252 233 119 26 85 65 191 47 159 193 86 129 155 186 183 151 233 81 1= 78 42 30 81 234 192 184 140 230 226 26 72 186 82 18 213 187 6 28 34 39 197 = 75 37 138 226 98 216 187 185 223 222 126 181 122 255 104 171 201 51 254 7 2= 35 245 151 247 168 215 165 73 181)) > > Does Guix support NIPT-P384 key? Nope! (That=E2=80=99s NIST-P384.) To add it, we need to adjust (guix openpgp) to support it (and ECDSA, the =E2=80=9C19=E2=80=9D we see above). I=E2=80=99ll follow up with a patc= h. Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Tue Sep 06 07:58:51 2022 Received: (at 57576) by debbugs.gnu.org; 6 Sep 2022 11:58:51 +0000 Received: from localhost ([127.0.0.1]:49947 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVXEB-0005xq-CK for submit@debbugs.gnu.org; Tue, 06 Sep 2022 07:58:51 -0400 Received: from eggs.gnu.org ([209.51.188.92]:50442) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVXEA-0005xZ-2s; Tue, 06 Sep 2022 07:58:50 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:39742) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVXE3-0007Dl-PV; Tue, 06 Sep 2022 07:58:44 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:In-Reply-To:Date:References:Subject:To: From; bh=xfzwpkeSOdAdAhf0VR9CTc0gCQCf2I/mpOHet9s52Ao=; b=ZZYtV9fVXo2LXYfxTY2U NRjMNkq8fcsR9iFHZggqD6nT321hqLGdM8qPmHYGAnKs0AK4GPmG0fVwTUDyZNl1IxZ3WObysGFgV ptzZONhLpah9pAJcs/qnobet/P9skt5FaqbRVJUxR+SZT0aBVL8WKKiM+Rk/dLyMY40ZesOvw9mPn gOGPa5+mxY3gRGI+uZ+j0K8ouZJ/a/84oNcxnvaSCEnpfLrv3ZlcN5RJcmjITuhOi7gsxhTHeCa+O uAUtFlPZQPm1fnfzJ4/pSPCDfddABCPSqLjIb0GbAiNRZYilVNHR9FypmfE6JLnKrc5ghP03hs46G 4MllZ5zbTr+yXw==; Received: from 91-160-117-201.subs.proxad.net ([91.160.117.201]:64957 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVXE3-0001bb-D2; Tue, 06 Sep 2022 07:58:43 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: 57599@debbugs.gnu.org Subject: Re: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> Date: Tue, 06 Sep 2022 13:58:40 +0200 In-Reply-To: <20220905160929.21742-1-ludo@gnu.org> ("Ludovic =?utf-8?Q?Cou?= =?utf-8?Q?rt=C3=A8s=22's?= message of "Mon, 5 Sep 2022 18:09:29 +0200") Message-ID: <8735d4zpcf.fsf_-_@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, Zhu Zihao X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi, ECDSA and the NIST curves (and in fact a large part of NIST=E2=80=99s crypto standardization work=C2=B9) are actually considered with skepticism by some: https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm#= Concerns That makes me wonder whether supporting them is a good idea, after all. Evidently they=E2=80=99re not widely used in OpenPGP and not supporting them hasn=E2=80=99t been much of a problem, it seems. On one hand, we don=E2=80= =99t want Guix=E2=80=99s OpenPGP implementation to limit what users do with their Ope= nPGP keys; on the other hand, we don=E2=80=99t want to encourage algorithms that bring little to the table at best and are suspicious at worst. What do people think? Ludo=E2=80=99. =C2=B9 https://blog.cr.yp.to/20220805-nsa.html From debbugs-submit-bounces@debbugs.gnu.org Tue Sep 06 11:29:13 2022 Received: (at 57576) by debbugs.gnu.org; 6 Sep 2022 15:29:14 +0000 Received: from localhost ([127.0.0.1]:52345 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVaVl-0006aa-KC for submit@debbugs.gnu.org; Tue, 06 Sep 2022 11:29:13 -0400 Received: from mail-m974.mail.163.com ([123.126.97.4]:1252) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVaVg-0006Zv-No; Tue, 06 Sep 2022 11:29:12 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=From:Subject:Date:Message-ID:MIME-Version; bh=Fyn3r DIjzP/OhzS8WpK4DqZ1UCdxft0XFgdRex8ac8s=; b=imHX3Nw45df3schALVJqi 86b31I6LT8LcpcVFhV+KjfWZyK45gRqaKnCJewX9MghjwWM9NcXaUaJY813hXKXM Ob++ZQ73+zO+cgNHQ/X2ctWakx4P4tic8MMAkxpnIcvDFvoONOEu5rccBEqoXdPW cC1rd4bxqisq/Bp16WcvIU= Received: from asus-laptop (unknown [27.46.84.97]) by smtp4 (Coremail) with SMTP id HNxpCgBnDOw4ZxdjHzAhaw--.3788S2; Tue, 06 Sep 2022 23:28:57 +0800 (CST) References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> User-agent: mu4e 1.8.9; emacs 29.0.50 From: Zhu Zihao To: Ludovic =?utf-8?Q?Court=C3=A8s?= Subject: Re: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. Date: Tue, 06 Sep 2022 23:26:19 +0800 In-reply-to: <8735d4zpcf.fsf_-_@gnu.org> Message-ID: <86sfl434lo.fsf@163.com> MIME-Version: 1.0 Content-Type: text/plain X-CM-TRANSID: HNxpCgBnDOw4ZxdjHzAhaw--.3788S2 X-Coremail-Antispam: 1Uf129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7v73 VFW2AGmfu7bjvjm3AaLaJ3UbIYCTnIWIevJa73UjIFyTuYvj4RYsjjUUUUU X-Originating-IP: [27.46.84.97] X-CM-SenderInfo: pdoosuxxwbztlvw6il2tof0z/xtbBoRl0r2I0UnTxRAAAsm X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, 57599@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) My opinion: Maybe NSA recommend NIST family because they know how to get around it. But they also have to believe foreign government can't break it easily. -- Retrieve my PGP public key: gpg --recv-keys 481F5EEEBA425ADC13247C76A6E672D981B8E744 Zihao From debbugs-submit-bounces@debbugs.gnu.org Tue Sep 06 12:10:22 2022 Received: (at 57576) by debbugs.gnu.org; 6 Sep 2022 16:10:22 +0000 Received: from localhost ([127.0.0.1]:52443 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVb9Z-00083a-Uo for submit@debbugs.gnu.org; Tue, 06 Sep 2022 12:10:22 -0400 Received: from albert.telenet-ops.be ([195.130.137.90]:54056) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVb9V-00082z-5q for 57576@debbugs.gnu.org; Tue, 06 Sep 2022 12:10:20 -0400 Received: from [IPV6:2a02:1811:8c09:9d00:5dba:d409:33f7:a16] ([IPv6:2a02:1811:8c09:9d00:5dba:d409:33f7:a16]) by albert.telenet-ops.be with bizsmtp id GgAF2800520ykKC06gAFQB; Tue, 06 Sep 2022 18:10:15 +0200 Message-ID: <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> Date: Tue, 6 Sep 2022 18:10:15 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Content-Language: en-US To: =?UTF-8?Q?Ludovic_Court=c3=a8s?= , 57599@debbugs.gnu.org References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> From: Maxime Devos Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. In-Reply-To: <8735d4zpcf.fsf_-_@gnu.org> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------m7iknZCG0iEaOGTxErBcZ11u" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telenet.be; s=r22; t=1662480615; bh=CaZWk/HYRi1BwYI5GjANeDmUXPVQK9CFMDH2jWdEV5U=; h=Date:To:Cc:References:From:Subject:In-Reply-To; b=NtB/OWXc2U2EtuyLhUKdobA9fe/q7pPIhzIW6h7uNQj7CzFo7xZ5iKEXgepQJqbMG es0vwXlsWsfEeUbN1wDrVt0ai5g+HZZZcxpOKCtjS1H+2wh74CNnbj9jgtujjT5FQl pMaPM/VWedMtS75E8Kh54uR0I3m7jKskDxsH57BOpRrRpPqOJBNrxMzM63eKO0UbSf JVa61qJFKOHezODeNkitwvuAdw+HDcAMimsePPAMYQW7DzwoAgyPs78RDJaJ2EZ9F0 9XvQv9IJnvV/xspSVnJ6nBYv4yR+ANsYQYovyfemtDReKg6do4nkNre42FPXsiqw6B GPN4mvIVNFCJQ== X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, Zhu Zihao X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------m7iknZCG0iEaOGTxErBcZ11u Content-Type: multipart/mixed; boundary="------------NEfq3g0Bo00qhIowsFRlWi8e"; protected-headers="v1" From: Maxime Devos To: =?UTF-8?Q?Ludovic_Court=c3=a8s?= , 57599@debbugs.gnu.org Cc: 57576@debbugs.gnu.org, Zhu Zihao Message-ID: <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> In-Reply-To: <8735d4zpcf.fsf_-_@gnu.org> --------------NEfq3g0Bo00qhIowsFRlWi8e Content-Type: multipart/mixed; boundary="------------JKmmq2Pb50Rib7bxkzOiEn0W" --------------JKmmq2Pb50Rib7bxkzOiEn0W Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64 DQpPbiAwNi0wOS0yMDIyIDEzOjU4LCBMdWRvdmljIENvdXJ0w6hzIHdyb3RlOg0KPiBIaSwN Cj4NCj4gRUNEU0EgYW5kIHRoZSBOSVNUIGN1cnZlcyAoYW5kIGluIGZhY3QgYSBsYXJnZSBw YXJ0IG9mIE5JU1TigJlzIGNyeXB0bw0KPiBzdGFuZGFyZGl6YXRpb24gd29ya8K5KSBhcmUg YWN0dWFsbHkgY29uc2lkZXJlZCB3aXRoIHNrZXB0aWNpc20gYnkgc29tZToNCj4NCj4gICAg aHR0cHM6Ly9lbi53aWtpcGVkaWEub3JnL3dpa2kvRWxsaXB0aWNfQ3VydmVfRGlnaXRhbF9T aWduYXR1cmVfQWxnb3JpdGhtI0NvbmNlcm5zDQo+DQo+IFRoYXQgbWFrZXMgbWUgd29uZGVy IHdoZXRoZXIgc3VwcG9ydGluZyB0aGVtIGlzIGEgZ29vZCBpZGVhLCBhZnRlciBhbGwuDQo+ IEV2aWRlbnRseSB0aGV54oCZcmUgbm90IHdpZGVseSB1c2VkIGluIE9wZW5QR1AgYW5kIG5v dCBzdXBwb3J0aW5nIHRoZW0NCj4gaGFzbuKAmXQgYmVlbiBtdWNoIG9mIGEgcHJvYmxlbSwg aXQgc2VlbXMuICBPbiBvbmUgaGFuZCwgd2UgZG9u4oCZdCB3YW50DQo+IEd1aXjigJlzIE9w ZW5QR1AgaW1wbGVtZW50YXRpb24gdG8gbGltaXQgd2hhdCB1c2VycyBkbyB3aXRoIHRoZWly IE9wZW5QR1ANCj4ga2V5czsgb24gdGhlIG90aGVyIGhhbmQsIHdlIGRvbuKAmXQgd2FudCB0 byBlbmNvdXJhZ2UgYWxnb3JpdGhtcyB0aGF0DQo+IGJyaW5nIGxpdHRsZSB0byB0aGUgdGFi bGUgYXQgYmVzdCBhbmQgYXJlIHN1c3BpY2lvdXMgYXQgd29yc3QuDQo+DQo+IFdoYXQgZG8g cGVvcGxlIHRoaW5rPw0KDQpXZSBkaXNhbGxvdyBzaWduaW5nIHdpdGggU0hBLTEsIGJlY2F1 c2UgaXQgaXMga25vd24gdG8gYmUgdnVsbmVyYWJsZSBhbmQgDQphcyB0aGVyZSBhcmUgYWx0 ZXJuYXRpdmVzIHRoYXQgYXJlIGNvbnNpZGVyZWQgZ29vZCwgZXZlbiBpZiB0aGlzIGxpbWl0 cyANCndoYXQgdXNlcnMgY2FuIGRvIHdpdGggdGhlaXIgT3BlblBHUCBrZXlzLg0KDQpJbiBj YXNlIG9mIHRob3NlIGN1cnZlcywgSSdtIG5vdCBhd2FyZSBvZiBhbnkgJ2NyeXRvcGdyYXBo aWMgcHJvb2YnICgqKSANCnRoYXQgdGhlIGN1cnZlcyBhcmUgdnVsbmVyYWJsZSAodW5saWtl IGZvciBTSEEtMSksIGJ1dCBhcyBub3RlZCBpbiDCuSBhbmQgDQplbHNld2hlcmUsIHRoZXJl IGFyZSBvdGhlciBraW5kcyBvZiBldmlkZW5jZSB0aGF0IHNvbWV0aGluZyBpcyB3cm9uZy4N Cg0KRXhjZXB0IGZvciB0aGUgZGlmZmVyZW50IG5hdHVyZSBvZiB0aGUgZXZpZGVuY2Ugb2Yg dnVsbmVyYWJpbGl0eSwgaXQgDQpzZWVtcyBhYm91dCB0aGUgc2FtZSBzaXR1YXRpb24gdG8g bWUuIEFzIHN1Y2gsIEkgZG9uJ3QgdGhpbmsgd2Ugc2hvdWxkIA0Kc3VwcG9ydCB0aGVtIChz b21lIG5pY2UgZXJyb3IgbWVzc2FnZXMgbGlrZSAnVGhpcyBhbGdvcml0aG0gWy4uLl0gaXMg bm90IA0Kc3VwcG9ydGVkIHlldOKAmSBvciDigJhUaGlzIGFsZ29yaXRobSBbLi4uXSBpcyAo bGlrZWx5L2tub3duIHRvIGJlKSANCnZ1bG5lcmFibGXigJkgd291bGQgYmUgZ29vZCB0aG91 Z2ghKS4NCg0KKCopIEkgbWVhbiBwcm9vZiwgbGlrZSBpbiBtYXRoZW1hdGljYWwgcHJvb2Zz LCBub3QgbWVyZWx5IGV2aWRlbmNlLg0KDQpBbiBhbHRlcm5hdGl2ZSBvcHRpb24gd291bGQg YmUgdG8gYWxsb3cgdGhlIGNoYW5uZWwgLmd1aXgtYXV0aG9yaXphdGlvbiANCihvZiB0aGUg cHJldmlvdXMgY29tbWl0cywgbm90IHRoZSBjb21taXQgdGhhdCBpcyBhYm91dCB0byBiZSB2 ZXJpZmllZCEpIA0KdG8gZGVjaWRlIHdoYXQncyBjb25zaWRlcmVkIGEgJ2dvb2QgYWxnb3Jp dGhtJyAod2l0aCBzb21lIGRlZmF1bHRzKSANCih3aXRoIGEgZmllbGQpLiBNYXliZSB3ZSds bCBoYXZlIHRvIGRlcHJlY2F0ZSwgc2F5LCBSU0Egb3IgU0hBLTMgDQpldmVudHVhbGx5LCBp dCB3b3VsZCBiZSBuaWNlIHRvIGhhdmUgYSBtaWdyYXRpb24gbWV0aG9kIGluIHBsYWNlIGFz IA0KZWFybHkgYXMgcG9zc2libGUsIHRvIG1pbmltaXNlIHRoZSByaXNrIG9mIHNvbWUgcGVv cGxlIGRvaW5nIGEgImd1aXggDQpwdWxsIiBmcm9tIGEgR3VpeCB0aGF0IGRvZXMgbm90IHN1 cHBvcnQgdGhhdCBmaWVsZCB0byBhIEd1aXggb3Igb3RoZXIgDQpjaGFubmVsIHRoYXQgX2Rv ZXNfIHVzZSB0aGF0IGZpZWxkLg0KDQpaaHUgWmloYW8gd3JvdGU6DQoNCj4gTXkgb3Bpbmlv bjogTWF5YmUgTlNBIHJlY29tbWVuZCBOSVNUIGZhbWlseSBiZWNhdXNlIHRoZXkga25vdyBo b3cgdG8gZ2V0DQo+IGFyb3VuZCBpdC4NCklmIHNvLCBJIGJlbGlldmUgdGhpcyBpcyBhbiBh cmd1bWVudCBhZ2FpbnN0IGFsbG93aW5nIHRoZXNlIGN1cnZlcywgdG8gDQphdm9pZCBhIG1l dGhvZCBOU0EgY291bGQgdXNlIGZvciBhdHRhY2tzLg0KPiBCdXQgdGhleSBhbHNvIGhhdmUg dG8gYmVsaWV2ZSBmb3JlaWduIGdvdmVybm1lbnQgY2FuJ3QgYnJlYWsNCj4gaXQgZWFzaWx5 Lg0KRm9yIHBlb3BsZSBvdXRzaWRlIHRoZSBVUywgdGhlIFVTIChvZiB3aGljaCB0aGUgTlNB IGlzIGFuIGFnZW5jeSkgX2lzXyBhIA0KZm9yZWlnbiBnb3Zlcm5tZW50LiBBcyBHdWl4IGlz IG5vdCBhbiBVUy1zcGVjaWZpYyBwcm9qZWN0LCBJIGRvIG5vdCANCnRoaW5rIHRoaXMgaXMg YW4gYXJndW1lbnQgZm9yIGFsbG93aW5nIHRoZSBjdXJ2ZXMuDQoNCkdyZWV0aW5ncywNCk1h eGltZS4NCj4gTHVkb+KAmS4NCj4NCj4gwrkgaHR0cHM6Ly9ibG9nLmNyLnlwLnRvLzIwMjIw ODA1LW5zYS5odG1sDQo+DQo+DQo= --------------JKmmq2Pb50Rib7bxkzOiEn0W Content-Type: application/pgp-keys; name="OpenPGP_0x49E3EE22191725EE.asc" Content-Disposition: attachment; filename="OpenPGP_0x49E3EE22191725EE.asc" Content-Description: OpenPGP public key Content-Transfer-Encoding: quoted-printable -----BEGIN PGP PUBLIC KEY BLOCK----- xjMEX4ch6BYJKwYBBAHaRw8BAQdANPb/d6MrGnGi5HyvODCkBUJPRjiFQcRU5V+m xvMaAa/NL01heGltZSBEZXZvcyA8bWF4aW1lLmRldm9zQHN0dWRlbnQua3VsZXV2 ZW4uYmU+wpAEExYIADgWIQTB8z7iDFKP233XAR9J4+4iGRcl7gUCX4ch6AIbAwUL CQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRBJ4+4iGRcl7japAQC3opZ2KGWzWmRc /gIWSu0AAcfMwyinFEEPa/QhUt2CogD/e2RdF4CYAgaRHJJmZ9WU7piKbLZ7llB4 LzgezVDHggzNJU1heGltZSBEZXZvcyA8bWF4aW1lZGV2b3NAdGVsZW5ldC5iZT7C kAQTFggAOBYhBMHzPuIMUo/bfdcBH0nj7iIZFyXuBQJf56ycAhsDBQsJCAcDBRUK CQgLBRYCAwEAAh4BAheAAAoJEEnj7iIZFyXujpQBAKV1SwDDl4f24rXciDlB9L8W ycZt30CgbewMSRQk4mvbAP9dFMbVVixYBd6C8cfhR+NsOBGiOJnQABlUmgNuqGFJ Dc44BF+HIegSCisGAQQBl1UBBQEBB0BOlzIWiJzgobMF6/cqwLaLk7jIcFSZ++c0 k9cCNT6YXwMBCAfCeAQYFggAIBYhBMHzPuIMUo/bfdcBH0nj7iIZFyXuBQJfhyHo AhsMAAoJEEnj7iIZFyXuMr0BAJc8cl5PGvVmVuSQVKjleNl4DK1/XAaPAYPe34AE fZJPAP9IqLCQhH/FeJanHqBP8gNdGNI2qn8RnnLVfRJgUjZ1BA=3D=3D =3DOVqp -----END PGP PUBLIC KEY BLOCK----- --------------JKmmq2Pb50Rib7bxkzOiEn0W-- --------------NEfq3g0Bo00qhIowsFRlWi8e-- --------------m7iknZCG0iEaOGTxErBcZ11u Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature" -----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQTB8z7iDFKP233XAR9J4+4iGRcl7gUCYxdw5wUDAAAAAAAKCRBJ4+4iGRcl7quU AQDjT/hlPANBwisnsDrSyWWIlc7j8BlKsqEmrLZrBvNZ0AEAlEP04v72+RVoFpSiVX3tFFs+AtXO T+O1kFl1bl8SQQ4= =dLJH -----END PGP SIGNATURE----- --------------m7iknZCG0iEaOGTxErBcZ11u-- From debbugs-submit-bounces@debbugs.gnu.org Tue Sep 06 16:03:16 2022 Received: (at 57576) by debbugs.gnu.org; 6 Sep 2022 20:03:16 +0000 Received: from localhost ([127.0.0.1]:52773 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVemx-0008Qq-JF for submit@debbugs.gnu.org; Tue, 06 Sep 2022 16:03:15 -0400 Received: from eggs.gnu.org ([209.51.188.92]:37460) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVemt-0008QV-BE; Tue, 06 Sep 2022 16:03:14 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:34830) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVemi-000255-S8; Tue, 06 Sep 2022 16:03:01 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:In-Reply-To:Date:References:Subject:To: From; bh=FI/Hw+31raAZJzl9Vtvb4jXJ/pU4+vp6FW1MIMkBhDA=; b=ZW6WF9JNLx0S5sI/srNt UFSRb+n/ay+g1kAHRzUXsSOOaNpFZMdzdGVRCZ/2lS+NnQv3XWomC8e5+ko0SXVQVrhbNVHeZZQMk GBHNIIO2rmmYb8XFXPDX5Kpv4AYCXwsi+NyixRvMA4tpZdiCZYX5XSLbNfTPZD1k5+2+bFKu1x2Ih piJHZ63yfSxHrUNHuahfN5UJW1q1vdMv+5oV+UV03YZOVX2h+564zDd8apl8WxA45DCDKysgUZ8oT wU1hw9YMZlkjJ1D9VzYKcmbKymTBz4/8CYc1nEZKJUgAHYT9wYuAErJlUP7NteIUWq+grECZaaZFl rAUdqwmz6FMbsQ==; Received: from 91-160-117-201.subs.proxad.net ([91.160.117.201]:59166 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVemg-00077x-Cv; Tue, 06 Sep 2022 16:03:00 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: Maxime Devos Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: =?utf-8?Q?D=C3=A9cadi?= 20 Fructidor an 230 de la =?utf-8?Q?R=C3=A9volution=2C?= jour de la Hotte X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Tue, 06 Sep 2022 22:02:55 +0200 In-Reply-To: <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> (Maxime Devos's message of "Tue, 6 Sep 2022 18:10:15 +0200") Message-ID: <87sfl4tgnk.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, 57599@debbugs.gnu.org, Zhu Zihao , Andreas Enge X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi, (Cc=E2=80=99ing Andreas for extra advice.) Maxime Devos skribis: > We disallow signing with SHA-1, because it is known to be vulnerable > and as there are alternatives that are considered good, even if this > limits what users can do with their OpenPGP keys. Right, we know it=E2=80=99s affordable to break SHA-1 these days. > In case of those curves, I'm not aware of any 'crytopgraphic proof' > (*) that the curves are vulnerable (unlike for SHA-1), but as noted in > =C2=B9 and elsewhere, there are other kinds of evidence that something is > wrong. It=E2=80=99s different from SHA-1 though: ECDSA is not known to be vulnerab= le, and AIUI we can=E2=80=99t tell that there=E2=80=99s a possibility NIST/NSA = has a backdoor as is the case for DualEC. However, the whole NIST design process is tainted. So my understanding is that it=E2=80=99s really a gray area. > Except for the different nature of the evidence of vulnerability, it > seems about the same situation to me. As such, I don't think we should > support them (some nice error messages like 'This algorithm [...] is > not supported yet=E2=80=99 or =E2=80=98This algorithm [...] is (likely/kn= own to be) > vulnerable=E2=80=99 would be good though!). Yes, that we can improve. :-) > An alternative option would be to allow the channel > .guix-authorization (of the previous commits, not the commit that is > about to be verified!) to decide what's considered a 'good algorithm' > (with some defaults) (with a field). Maybe we'll have to deprecate, > say, RSA or SHA-3 eventually, it would be nice to have a migration > method in place as early as possible, to minimise the risk of some > people doing a "guix pull" from a Guix that does not support that > field to a Guix or other channel that _does_ use that field. It=E2=80=99s tempting, but I=E2=80=99d rather avoid introducing such mechan= isms to keep things as simple as possible. Thanks, Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Wed Sep 07 06:34:11 2022 Received: (at 57576) by debbugs.gnu.org; 7 Sep 2022 10:34:11 +0000 Received: from localhost ([127.0.0.1]:53553 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVsNn-0005I4-Dx for submit@debbugs.gnu.org; Wed, 07 Sep 2022 06:34:11 -0400 Received: from hera.aquilenet.fr ([185.233.100.1]:35202) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVsNl-0005Ho-La; Wed, 07 Sep 2022 06:34:10 -0400 Received: from localhost (localhost [127.0.0.1]) by hera.aquilenet.fr (Postfix) with ESMTP id 50AEB1861; Wed, 7 Sep 2022 12:34:03 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at aquilenet.fr Received: from hera.aquilenet.fr ([127.0.0.1]) by localhost (hera.aquilenet.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UCs7ftoRkTry; Wed, 7 Sep 2022 12:34:02 +0200 (CEST) Received: from jurong (unknown [IPv6:2001:861:c4:f2f0:5c3:4f65:ddfe:6444]) by hera.aquilenet.fr (Postfix) with ESMTPSA id 9E0C7639; Wed, 7 Sep 2022 12:34:02 +0200 (CEST) Date: Wed, 7 Sep 2022 12:34:01 +0200 From: Andreas Enge To: Ludovic =?iso-8859-15?Q?Court=E8s?= Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. Message-ID: References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <87sfl4tgnk.fsf@gnu.org> X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 57576 Cc: 57599@debbugs.gnu.org, Maxime Devos , Zhu Zihao , 57576@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Hello, Am Tue, Sep 06, 2022 at 10:02:55PM +0200 schrieb Ludovic Courtès: > (Cc’ing Andreas for extra advice.) well, I agree with your analysis. There is no concrete evidence that the NIST curves may be flawed, and a general belief that not all crypto standards of NIST are flawed or backdoored... So it makes sense to accept the curves, but ultimately this is a political decision (and a personal decision about which type of key a user creates). Andreas From debbugs-submit-bounces@debbugs.gnu.org Wed Sep 07 07:13:33 2022 Received: (at 57576) by debbugs.gnu.org; 7 Sep 2022 11:13:33 +0000 Received: from localhost ([127.0.0.1]:53684 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVszt-0006MD-0o for submit@debbugs.gnu.org; Wed, 07 Sep 2022 07:13:33 -0400 Received: from xavier.telenet-ops.be ([195.130.132.52]:42226) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVszq-0006Lz-CN for 57576@debbugs.gnu.org; Wed, 07 Sep 2022 07:13:31 -0400 Received: from [IPV6:2a02:1811:8c09:9d00:5dba:d409:33f7:a16] ([IPv6:2a02:1811:8c09:9d00:5dba:d409:33f7:a16]) by xavier.telenet-ops.be with bizsmtp id GzDS2800120ykKC01zDSZM; Wed, 07 Sep 2022 13:13:27 +0200 Message-ID: <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> Date: Wed, 7 Sep 2022 13:13:25 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Content-Language: en-US To: =?UTF-8?Q?Ludovic_Court=c3=a8s?= References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> From: Maxime Devos Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. In-Reply-To: <87sfl4tgnk.fsf@gnu.org> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------vxO2IOjRaMvGCrzwO0kqEgv7" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telenet.be; s=r22; t=1662549207; bh=Wa7i7fBraxuc3QcIo7arPe6tkLRd8hbxJtbBcApRfSU=; h=Date:To:Cc:References:From:Subject:In-Reply-To; b=SV/xqw+pDNpFUFydU56U9tYBPbod+EqQrVy52YbrGIS+5Ug/YMqsc+kuf1cBLV9Ny 05AyU12kEMGdnCbNNb58KoehPm8xl9ITb6ueLwX1tcQ02vJLApOtu3WiFf2PO6vRCT ZxFOcn5M92yBme2Gh9heHVlAfBVCGk5HsUGKu7d0USDZePZhqwBW7YFZ5HG2WHxMku Ue2EqoCpvWAdKYtFRZ5QtfpeqH5UYDS/BVCjalMQAalgH9qfsqIQgxLf2C730hbJRH wZAVgGQAl8iIiAcGxQ7HA0kV3pICS/EyMS1Tb5GyVERp1+9GLn/cgOaQnDEJaKJgMJ 1kc7ao029RRKA== X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, 57599@debbugs.gnu.org, Zhu Zihao , Andreas Enge X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------vxO2IOjRaMvGCrzwO0kqEgv7 Content-Type: multipart/mixed; boundary="------------cFDrxenYhXsh0LHA4GXSeMAr"; protected-headers="v1" From: Maxime Devos To: =?UTF-8?Q?Ludovic_Court=c3=a8s?= Cc: 57599@debbugs.gnu.org, 57576@debbugs.gnu.org, Zhu Zihao , Andreas Enge Message-ID: <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> In-Reply-To: <87sfl4tgnk.fsf@gnu.org> --------------cFDrxenYhXsh0LHA4GXSeMAr Content-Type: multipart/mixed; boundary="------------jjuonHBb79lnUhTXlLB4ePyw" --------------jjuonHBb79lnUhTXlLB4ePyw Content-Type: multipart/alternative; boundary="------------kOafE7zO0Z0RGT7i08RXYr0L" --------------kOafE7zO0Z0RGT7i08RXYr0L Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64 DQpPbiAwNi0wOS0yMDIyIDIyOjAyLCBMdWRvdmljIENvdXJ0w6hzIHdyb3RlOg0KPj4gSW4g Y2FzZSBvZiB0aG9zZSBjdXJ2ZXMsIEknbSBub3QgYXdhcmUgb2YgYW55ICdjcnl0b3BncmFw aGljIHByb29mJw0KPj4gKCopIHRoYXQgdGhlIGN1cnZlcyBhcmUgdnVsbmVyYWJsZSAodW5s aWtlIGZvciBTSEEtMSksIGJ1dCBhcyBub3RlZCBpbg0KPj4gwrkgYW5kIGVsc2V3aGVyZSwg dGhlcmUgYXJlIG90aGVyIGtpbmRzIG9mIGV2aWRlbmNlIHRoYXQgc29tZXRoaW5nIGlzDQo+ PiB3cm9uZy4NCj4gSXTigJlzIGRpZmZlcmVudCBmcm9tIFNIQS0xIHRob3VnaDogRUNEU0Eg aXMgbm90IGtub3duIHRvIGJlIHZ1bG5lcmFibGUsDQo+IGFuZCBBSVVJIHdlIGNhbuKAmXQg dGVsbCB0aGF0IHRoZXJl4oCZcyBhIHBvc3NpYmlsaXR5IE5JU1QvTlNBIGhhcyBhDQo+IGJh Y2tkb29yIGFzIGlzIHRoZSBjYXNlIGZvciBEdWFsRUMuICBIb3dldmVyLCB0aGUgd2hvbGUg TklTVCBkZXNpZ24NCj4gcHJvY2VzcyBpcyB0YWludGVkLiAgU28gbXkgdW5kZXJzdGFuZGlu ZyBpcyB0aGF0IGl04oCZcyByZWFsbHkgYSBncmF5DQo+IGFyZWEuDQoNCkluIGNyeXB0b2dy YXBoeSAoYW5kIHNlY3VyaXR5KSwgYmVpbmcgYSBncmV5IGFyZWEgYW5kIG5vdCBrbm93biB0 byBiZSANCnZ1bG5lcmFibGUgaXMgbm90IHN1ZmZpY2llbnQgLS0gcmF0aGVyLCB0aGVyZSBo YXMgdG8gYmUgYSByZWFzb24gZm9yIA0KY29uZmlkZW5jZSB0aGF0IHRoYXQgdGhlIGNyeXB0 byBpcyBhY3R1YWxseSBnb29kIGFuZCBub3QtdnVsbmVyYWJsZSBmb3IgDQphIGRlY2VudCBh bW91bnQgb2YgdGltZS4NCg0KT3IsIGluIG90aGVyIHdvcmRzLCBpbiBjcnlwdG9ncmFwaHkg YW5kIHNlY3VyaXR5IHRoZXJlIGlzIG5vIGFzc3VtcHRpb24gDQpvZiBpbm5vY2VuY2UgLS0g cmF0aGVyLCBpdCBzdGFydHMgd2l0aCB0aGUgYXNzdW1wdGlvbiB0aGF0IGFueW9uZSBtaWdo dCANCmJlIGFuIGF0dGFja2VyIGFuZCB3aG9ldmVyIHByb3Bvc2VzIGEgY3J5cHRvIHRoaW5n IGhhcyB0byBjb252aW5jZSANCm90aGVycyB0aGF0IHRoZWlyIGNyeXB0byBpcyBzZWN1cmUs IGFuZCBhIGNvbW11bmljYXRpb24gcGFydHkgaGFzIHRvIA0KcHJvb2YgdG8gdGhlIG90aGVy IHBhcnR5IHRoYXQgdGhleSBhcmVuJ3QgYW4gaW1wb3N0ZXIgKHB1YmxpYyBrZXkgDQpzaWdu aW5nLCB3aXRoIGFuIHByZXZpb3VzbHkgYWdyZWVkIG9uIGtleSBhbmQgYWxnb3JpdGhtKS4N Cg0KQW5kcmVhcyB3cm90ZToNCg0KPiB3ZWxsLCBJIGFncmVlIHdpdGggeW91ciBhbmFseXNp cy4gVGhlcmUgaXMgbm8gY29uY3JldGUgZXZpZGVuY2UgdGhhdCB0aGUNCj4gTklTVCBjdXJ2 ZXMgbWF5IGJlIGZsYXdlZCwgYW5kIGEgZ2VuZXJhbCBiZWxpZWYgdGhhdCBub3QgYWxsIGNy eXB0bw0KPiBzdGFuZGFyZHMgb2YgTklTVCBhcmUgZmxhd2VkIG9yIGJhY2tkb29yZWQuLi4g U28gaXQgbWFrZXMgc2Vuc2UgdG8gYWNjZXB0DQo+IHRoZSBjdXJ2ZXMsIChhbmQgYSBwZXJz b25hbCBkZWNpc2lvbiBhYm91dCB3aGljaCB0eXBlIG9mIGtleSBhIHVzZXIgY3JlYXRlcyku DQpJIGZvbGxvd2VkIHlvdSByaWdodCB1bnRpbCB0aGUgY29uY2x1c2lvbiwgaXQgYXBwZWFy cyB0aGF0IHlvdSBhcmUgDQpzdGFydGluZyBmcm9tIGFuIGFzc3VtcHRpb24gb2YgaW5ub2Nl bmNlLCB3aGljaCBtaWdodCBleHBsYWluIG91ciANCmRpZmZlcmVudCBjb25jbHVzaW9ucz8N Cg0KQWxzbywgd2UgX2RvXyBoYXZlIGNvbmNyZXRlIGV2aWRlbmNlIHRoYXQgdGhlIGN1cnZl cyBhcmUgZmxhd2VkIC0tIHRoZSANCndlYnNpdGUgb24gdGhlIGxpbmsgbWVudGlvbnMgbWFu eSBpc3N1ZXMgaW4gdGhlIHByb2Nlc3MgYW5kIGl0IGhhcyBiZWVuIA0Kc2hvd24gaW4gdGhl IHBhc3QgdGhhdCB0aGUgTlNBIGlzIGluIHRoZSBoYWJpdCBvZiBzdWJ2ZXJ0aW5nIA0KY29t bXVuaWNhdGlvbnMgKCopLg0KDQooKikgSSBjYW4gZ2l2ZSBzb21lIHNvdXJjZXMgaWYgeW91 IGRvbid0IGtub3cgb2YgdGhlbSBhbHJlYWR5Lg0KDQpDaGFubmVscyBhcmUgZm9yIHNoYXJp bmcgdGhpbmdzIGJldHdlZW4gbXVsdGlwbGUgcGVvcGxlLsKgIFRoZSBrZXlzIGFyZSANCmZv ciBhdXRoZW50aWNhdGluZyBjaGFubmVscy7CoCBBcyBtdWx0aXBsZSBwZW9wbGUgYXJlIGlu dm9sdmVkIGZvciBhIA0KY2hhbm5lbCwgdGhpcyBzZWVtcyBiZSBiZSBhIG5vbi1wZXJzb25h bCBkZWNpc2lvbiBieSBkZWZpbml0aW9uLg0KDQpHcmVldGluZ3MsDQpNYXhpbWUuDQoNCg== --------------kOafE7zO0Z0RGT7i08RXYr0L Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable


On 06-09-2022 22:02, Ludovic Court=C3=A8= s wrote:
In case of those curves, I=
'm not aware of any 'crytopgraphic proof'
(*) that the curves are vulnerable (unlike for SHA-1), but as noted in
=C2=B9 and elsewhere, there are other kinds of evidence that something is=

wrong.
It=E2=80=99s different from =
SHA-1 though: ECDSA is not known to be vulnerable,
and AIUI we can=E2=80=99t tell that there=E2=80=99s a possibility NIST/NS=
A has a
backdoor as is the case for DualEC.  However, the whole NIST design
process is tainted.  So my understanding is that it=E2=80=99s really a gr=
ay
area.

In cryptography (and security), being a grey area and not known to be vulnerable is not sufficient -- rather, there has to be a reason for confidence that that the crypto is actually good and not-vulnerable for a decent amount of time.

Or, in other words, in cryptography and security there is no assumption of innocence -- rather, it starts with the assumption that anyone might be an attacker and whoever proposes a crypto thing has to convince others that their crypto is secure, and a communication party has to proof to the other party that they aren't an imposter (public key signing, with an previously agreed on key and algorithm).

Andreas wrote:

well, I agree with your an=
alysis. There is no concrete evidence that the
NIST curves may be flawed, and a general belief that not all crypto
standards of NIST are flawed or backdoored... So it makes sense to accept=

the curves, (and a personal decision about which type of key a user creat=
es).
I followed you right until the conclusion, it appears that you are starting from an assumption of innocence, which might explain our different conclusions?

Also, we _do_ have concrete evidence that the curves are flawed -- the website on the link mentions many issues in the process and it has been shown in the past that the NSA is in the habit of subverting communications (*).

(*) I can give some sources if you don't know of them already.
=

Channels are for sharing things between multiple people.=C2=A0 The= keys are for authenticating channels.=C2=A0 As multiple people are involved for a channel, this seems be be a non-personal decision by definition.

Greetings,
Maxime.

--------------kOafE7zO0Z0RGT7i08RXYr0L-- --------------jjuonHBb79lnUhTXlLB4ePyw Content-Type: application/pgp-keys; name="OpenPGP_0x49E3EE22191725EE.asc" Content-Disposition: attachment; filename="OpenPGP_0x49E3EE22191725EE.asc" Content-Description: OpenPGP public key Content-Transfer-Encoding: quoted-printable -----BEGIN PGP PUBLIC KEY BLOCK----- xjMEX4ch6BYJKwYBBAHaRw8BAQdANPb/d6MrGnGi5HyvODCkBUJPRjiFQcRU5V+m xvMaAa/NL01heGltZSBEZXZvcyA8bWF4aW1lLmRldm9zQHN0dWRlbnQua3VsZXV2 ZW4uYmU+wpAEExYIADgWIQTB8z7iDFKP233XAR9J4+4iGRcl7gUCX4ch6AIbAwUL CQgHAwUVCgkICwUWAgMBAAIeAQIXgAAKCRBJ4+4iGRcl7japAQC3opZ2KGWzWmRc /gIWSu0AAcfMwyinFEEPa/QhUt2CogD/e2RdF4CYAgaRHJJmZ9WU7piKbLZ7llB4 LzgezVDHggzNJU1heGltZSBEZXZvcyA8bWF4aW1lZGV2b3NAdGVsZW5ldC5iZT7C kAQTFggAOBYhBMHzPuIMUo/bfdcBH0nj7iIZFyXuBQJf56ycAhsDBQsJCAcDBRUK CQgLBRYCAwEAAh4BAheAAAoJEEnj7iIZFyXujpQBAKV1SwDDl4f24rXciDlB9L8W ycZt30CgbewMSRQk4mvbAP9dFMbVVixYBd6C8cfhR+NsOBGiOJnQABlUmgNuqGFJ Dc44BF+HIegSCisGAQQBl1UBBQEBB0BOlzIWiJzgobMF6/cqwLaLk7jIcFSZ++c0 k9cCNT6YXwMBCAfCeAQYFggAIBYhBMHzPuIMUo/bfdcBH0nj7iIZFyXuBQJfhyHo AhsMAAoJEEnj7iIZFyXuMr0BAJc8cl5PGvVmVuSQVKjleNl4DK1/XAaPAYPe34AE fZJPAP9IqLCQhH/FeJanHqBP8gNdGNI2qn8RnnLVfRJgUjZ1BA=3D=3D =3DOVqp -----END PGP PUBLIC KEY BLOCK----- --------------jjuonHBb79lnUhTXlLB4ePyw-- --------------cFDrxenYhXsh0LHA4GXSeMAr-- --------------vxO2IOjRaMvGCrzwO0kqEgv7 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature" -----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQTB8z7iDFKP233XAR9J4+4iGRcl7gUCYxh81QUDAAAAAAAKCRBJ4+4iGRcl7rPJ AP4xzgDD8QvWOgZucitONFTIc4HhSSLUsGTO4SmCDA5FIQD5AZ8BntUA5ld7RXYYYmdzySD2KI2N aRBspP2wxwUcHgU= =sbuj -----END PGP SIGNATURE----- --------------vxO2IOjRaMvGCrzwO0kqEgv7-- From debbugs-submit-bounces@debbugs.gnu.org Wed Sep 07 08:02:48 2022 Received: (at 57576) by debbugs.gnu.org; 7 Sep 2022 12:02:48 +0000 Received: from localhost ([127.0.0.1]:53731 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVtlY-0001I4-2H for submit@debbugs.gnu.org; Wed, 07 Sep 2022 08:02:48 -0400 Received: from hera.aquilenet.fr ([185.233.100.1]:60714) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVtlV-0001Ho-W7; Wed, 07 Sep 2022 08:02:46 -0400 Received: from localhost (localhost [127.0.0.1]) by hera.aquilenet.fr (Postfix) with ESMTP id 272501A11; Wed, 7 Sep 2022 14:02:40 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at aquilenet.fr Received: from hera.aquilenet.fr ([127.0.0.1]) by localhost (hera.aquilenet.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vcl_HYrs2wpP; Wed, 7 Sep 2022 14:02:39 +0200 (CEST) Received: from jurong (unknown [IPv6:2001:861:c4:f2f0:1ce9:67cd:7487:edd5]) by hera.aquilenet.fr (Postfix) with ESMTPSA id 285F9DF3; Wed, 7 Sep 2022 14:02:39 +0200 (CEST) Date: Wed, 7 Sep 2022 14:02:37 +0200 From: Andreas Enge To: Maxime Devos Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. Message-ID: References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-15 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, Ludovic =?iso-8859-15?Q?Court=E8s?= , 57599@debbugs.gnu.org, Zhu Zihao X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Am Wed, Sep 07, 2022 at 01:13:25PM +0200 schrieb Maxime Devos: > Also, we _do_ have concrete evidence that the curves are flawed -- the website > on the link mentions many issues in the process The website (you mean the blog by D. Bernstein?) also mentions the use of a hash function to arrive at the parameters. Maybe I overlooked something, but I did not find other mentions of the curves (but I did not read the page from A to Z). > past that the NSA is in the habit of subverting communications. But this is not concrete evidence that these curves are flawed. As far as is publicly known, there are a few weak (and sparse) classes of insecure elliptic curves, and the NIST curves do not belong to them. So the only way these curves could be flawed is that there is an unknown class of insecure curves, where the insecurity is known by the NSA. Then if this class is sufficiently dense, one could start with a random seed, hash the seed, and repeat until one obtains a weak instance; see this link by a well-known cryptologist https://miracl.com/blog/backdoors-in-nist-elliptic-curves/ and the link given there (to another post by Bernstein). This is possible, but speculation instead of evidence. Newer constructions are better, but not perfect; optimally one would want a process of "generation of public random numbers" as described here: https://eprint.iacr.org/2015/366 > Channels are for sharing things between multiple people.  The keys are for > authenticating channels.  As multiple people are involved for a channel, this > seems be be a non-personal decision by definition. I said "political", which fits well the setting of multiple people involved. And I meant this in opposition to "scientific", given the lack of evidence against the NIST curves. Andreas From debbugs-submit-bounces@debbugs.gnu.org Wed Sep 07 08:51:35 2022 Received: (at 57576) by debbugs.gnu.org; 7 Sep 2022 12:51:35 +0000 Received: from localhost ([127.0.0.1]:53927 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVuWl-0002eP-HF for submit@debbugs.gnu.org; Wed, 07 Sep 2022 08:51:35 -0400 Received: from eggs.gnu.org ([209.51.188.92]:53400) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVuWk-0002eA-GN; Wed, 07 Sep 2022 08:51:34 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:54310) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVuWe-0007kg-F6; Wed, 07 Sep 2022 08:51:28 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:In-Reply-To:Date:References:Subject:To: From; bh=jTcG5OrLi3uuo6aMRrRSmeGvvdON/wwQzNujj73VViU=; b=mFDBNhJmGQ/AwBqHiv5Z /eYw8K+/bWoCzr092QVZQPWmHaJASvrg9O23LZfyFCVecVEYAVmzjnfEXVBUzqf0GjO5zXCU8cVIT WvuHZx1/KkTIJHjC5tb9NMoAJ60VH8LkZfWhFHoF3ZHsJzSdB9/i0mgz2aMBmnIukn9wQR8dNLnlk z6bO843wAcbIX8K+lbxv9plNkVhddF/7Fnla8tG673EWE3qr5EOkBQh7UeiIXlTtlJUZu/vZ0eimW deHS/W3M0IvaEet4fiioP0rasO+dC5wBUU4acGVynRprTW7AceMjfPV6759+S6wyMqpHLd+0By8Ta bh/yb31+hGd0Hw==; Received: from 91-160-117-201.subs.proxad.net ([91.160.117.201]:56722 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oVuWd-0003Mh-OP; Wed, 07 Sep 2022 08:51:27 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: Andreas Enge Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: Primidi 21 Fructidor an 230 de la =?utf-8?Q?R=C3=A9v?= =?utf-8?Q?olution=2C?= jour de =?utf-8?Q?l'=C3=89glantier?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Wed, 07 Sep 2022 14:51:25 +0200 In-Reply-To: (Andreas Enge's message of "Wed, 7 Sep 2022 14:02:37 +0200") Message-ID: <87bkrrs5yq.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 57576 Cc: 57599@debbugs.gnu.org, Maxime Devos , Zhu Zihao , 57576@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi, Thanks a lot for the explanations, Andreas! As you write, the decision will be =E2=80=9Cpolitical=E2=80=9D as there=E2= =80=99s no scientific evidence to guide us. I=E2=80=99d like to see what other free software OpenPGP implementors decid= ed (primarily Sequoia; GnuPG/Libgcrypt implement them). Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Wed Sep 07 11:31:49 2022 Received: (at 57576) by debbugs.gnu.org; 7 Sep 2022 15:31:49 +0000 Received: from localhost ([127.0.0.1]:55854 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVx1o-000396-N2 for submit@debbugs.gnu.org; Wed, 07 Sep 2022 11:31:48 -0400 Received: from mail-wm1-f43.google.com ([209.85.128.43]:42522) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oVx1m-00038q-DJ; Wed, 07 Sep 2022 11:31:46 -0400 Received: by mail-wm1-f43.google.com with SMTP id d12-20020a05600c34cc00b003a83d20812fso9776371wmq.1; Wed, 07 Sep 2022 08:31:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:from:to:cc:subject:date; bh=q+hGDS2Z/j1bUf8GuCxpqFvln/Jtngbf2L4KtHD8erM=; b=VMc69XK0ivO2GxDJeFXlnzSDgxRjVTX3P0bG+XejvBP3pICN1cj85D+jqOpoCkaGCP R/rqRZzrofo2tPfwqc8W9F7Fn0ViSbAR32eN39xzsFCutCAVCbMmykpo8b+Y5XFhXWtI 44iaZm5HZmcONK+xL29pHncGlZ+f65gJ5W1nVTJ2UQZ2TPRupQTar+bSwPNhfOmyyXYz 3GWO7MA4G6GTqSqsTrE45YwSO24GQdaW/drn+lUYzx++4VesHcTuSSMm0fw1Fphkrf38 xGYTHxwb4DHPweDsTDZNmuKCUacwFk9sOVA53DHjfJBGDvEJgmnosCTDB3RJK8W09KIW UsSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date; bh=q+hGDS2Z/j1bUf8GuCxpqFvln/Jtngbf2L4KtHD8erM=; b=qbjtTvsdRivRB0aaIK6ejbpfH7gOx9SDm7/nC5yXv98CbVFUFbL2QVZIBIlFdh+W4E N44ZCFru/Y0JSrxl+oCLh6kpEGwJ5NiunnDAYYSSE9516C+DVS+aT4+r1R31UC+9ANM/ XrXx6Ks5Vf/+/GCiMkCyOvsJTrzCJEkQAMflWsUmdL/dIxLtRAumV+zNfmdhH0ntjalY uSoZN0xkWCzs36f2nAato+xTAvn+lSqBDwYrDRdEiEcvuQYnGJ4PpVcD+7L9ZWfLsYuI BjCVa0X1qGK2D62BWliNMepUdaMJj5hKaJEk8BgpWm0sU/aIHI4YPKVqUwbEWNXeepOv EmRg== X-Gm-Message-State: ACgBeo0ZBohXOhPG51ntYub2C3nqdaeYnGT4tgaAS3d4CtQMER2MDPpg tS9r7iP3W8YqfvnoUIUbdFtvGlJeP74= X-Google-Smtp-Source: AA6agR6hJRHSEQGrWU9UKWZUsTzY23GIIfMUcE2aJEBh67qFbPbBTqBxiRQh2uDsFj5Z4zOLF5xudw== X-Received: by 2002:a05:600c:3d93:b0:3a5:eb9b:b495 with SMTP id bi19-20020a05600c3d9300b003a5eb9bb495mr16797715wmb.91.1662564700355; Wed, 07 Sep 2022 08:31:40 -0700 (PDT) Received: from lili ([2a01:e0a:59b:9120:65d2:2476:f637:db1e]) by smtp.gmail.com with ESMTPSA id i18-20020a5d5592000000b0022878c0cc5esm12495778wrv.69.2022.09.07.08.31.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 07 Sep 2022 08:31:39 -0700 (PDT) From: zimoun To: Ludovic =?utf-8?Q?Court=C3=A8s?= , Andreas Enge Subject: Re: bug#57576: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. In-Reply-To: <87bkrrs5yq.fsf@gnu.org> References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> <87bkrrs5yq.fsf@gnu.org> Date: Wed, 07 Sep 2022 17:27:43 +0200 Message-ID: <86edwnyzkg.fsf@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -0.0 (/) X-Debbugs-Envelope-To: 57576 Cc: Maxime Devos , 57599@debbugs.gnu.org, Zhu Zihao , 57576@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Hi, On Wed, 07 Sep 2022 at 14:51, Ludovic Court=C3=A8s wrote: > I=E2=80=99d like to see what other free software OpenPGP implementors dec= ided > (primarily Sequoia; GnuPG/Libgcrypt implement them). Maybe related . Cheers, simon From debbugs-submit-bounces@debbugs.gnu.org Sat Sep 24 05:53:43 2022 Received: (at 57576) by debbugs.gnu.org; 24 Sep 2022 09:53:43 +0000 Received: from localhost ([127.0.0.1]:42357 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oc1qw-0004Ik-SV for submit@debbugs.gnu.org; Sat, 24 Sep 2022 05:53:43 -0400 Received: from eggs.gnu.org ([209.51.188.92]:49390) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1oc1qv-0004IV-Mn; Sat, 24 Sep 2022 05:53:42 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:47690) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oc1qo-0003DK-OD; Sat, 24 Sep 2022 05:53:34 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-Version:In-Reply-To:Date:References:Subject:To: From; bh=IPJLLxlP0kX9AfSf34u/PF0n+tQUOf4wBcIPuJPSoow=; b=UdYhl3Sn/Kntxf3+Tt1v 8txiNgad+M9zScd3r9NlWPDiEeDGxDqgO9zPuOPeDsLDed3RQ21X/qnRHv/FPag0gREBhftUML+BR XfMwD47/X0CVQZo82lsrTmkblwQxlrQMkGpxQI+rIF4GR2zBFaOtWfofe3O907Gc6W4SIUOmfYkz8 +3O1nbdsN5yf3OAzmfaqtMFH4RTjLLZG0/dkI0cY0YepLjYyS34uBPV94GO3B1EV4hHLlR79+O0Vo LA1ps1++6MTB9U/4Yr/vbSCJmevXOT61oHTX3+xOyNungKhjrY2t9/0OhiUaSR9vFBY9XvgEzvbI8 R7p0qH7NZ+b3LQ==; Received: from 91-160-117-201.subs.proxad.net ([91.160.117.201]:49396 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1oc1qo-0004Om-AL; Sat, 24 Sep 2022 05:53:34 -0400 From: =?utf-8?Q?Ludovic_Court=C3=A8s?= To: 57599-done@debbugs.gnu.org Subject: Re: bug#57599: [PATCH] openpgp: Add support for ECDSA with NIST curves. References: <87r10p3ixi.fsf@gnu.org> <20220905160929.21742-1-ludo@gnu.org> <8735d4zpcf.fsf_-_@gnu.org> <4b1f50af-9694-1439-2223-e9ef5ba7ecec@telenet.be> <87sfl4tgnk.fsf@gnu.org> <86368af7-152b-f943-4ee6-e1471d3cb20c@telenet.be> <87bkrrs5yq.fsf@gnu.org> Date: Sat, 24 Sep 2022 11:53:32 +0200 In-Reply-To: <87bkrrs5yq.fsf@gnu.org> ("Ludovic =?utf-8?Q?Court=C3=A8s=22'?= =?utf-8?Q?s?= message of "Wed, 07 Sep 2022 14:51:25 +0200") Message-ID: <877d1tcd43.fsf_-_@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: 57576 Cc: 57576@debbugs.gnu.org, Andreas Enge , Maxime Devos , Zhu Zihao X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) Hi! All things considered, I prefer to drop this patch. In the unlikely event that we=E2=80=99ll get more requests to support these curves, we can always revisit the issue. What we should do, though, is improve error reporting in case an unsupported curve or algorithm is encountered. Thanks, Ludo=E2=80=99. From debbugs-submit-bounces@debbugs.gnu.org Fri Oct 07 16:06:04 2022 Received: (at control) by debbugs.gnu.org; 7 Oct 2022 20:06:04 +0000 Received: from localhost ([127.0.0.1]:37475 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ogtbf-0006mC-PW for submit@debbugs.gnu.org; Fri, 07 Oct 2022 16:06:03 -0400 Received: from eggs.gnu.org ([209.51.188.92]:40944) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ogtbe-0006lL-89 for control@debbugs.gnu.org; Fri, 07 Oct 2022 16:06:02 -0400 Received: from fencepost.gnu.org ([2001:470:142:3::e]:60020) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1ogtbZ-0005UH-2u for control@debbugs.gnu.org; Fri, 07 Oct 2022 16:05:57 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=gnu.org; s=fencepost-gnu-org; h=MIME-version:Subject:From:To:Date:in-reply-to: references; bh=fa6TDe/9pKOo/9+Jd+YKBWQV0ZL3SMNq9HYQZe6hY3I=; b=WtOxlIGBM4UnC2 /6jtl6fuEO74KHvibPR2ZjUSPiDOpwvrKl8sUdwuD8XUTyOOeNNcCgOd/4tt/+Mb7CI8iNsPHzDSs 2tHzk+EZW+2KtrVuq+bgD92IMVxG/SIbzFhi1pBaCa16u9Rrvn86qbOcjryRXQN07s+b9e78aVn1i G55EvvXSshJwnmPPbrCoVPcosfFpV0PzA80qMg/cjYBEJLY5/rXfx8j1/inT+99/MK06caQfTBq01 UK8/zOUyJv4AHsN4yWN2w2hBNeguWvtPcDjwqhjllu2zrpJLJIy/XE/nEvnjpow7gd2LOjRmXgR3w LQAauFbc9zToTj86Yirw==; Received: from 91-160-117-201.subs.proxad.net ([91.160.117.201]:51494 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1ogtbY-0000VW-MB for control@debbugs.gnu.org; Fri, 07 Oct 2022 16:05:56 -0400 Date: Fri, 07 Oct 2022 22:05:55 +0200 Message-Id: <8735bz9z6k.fsf@gnu.org> To: control@debbugs.gnu.org From: =?utf-8?Q?Ludovic_Court=C3=A8s?= Subject: control message for bug #57576 MIME-version: 1.0 Content-type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Spam-Score: -2.3 (--) X-Debbugs-Envelope-To: control X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -3.3 (---) tags 57576 wontfix close 57576 quit From unknown Sun Jun 22 03:47:24 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Sat, 05 Nov 2022 11:24:09 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator