[Bug 220492] security/gnupg defaults are mad

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Wed Jul 5 17:10:13 UTC 2017


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220492

            Bug ID: 220492
           Summary: security/gnupg defaults are mad
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: adamw at FreeBSD.org
          Reporter: julien at tayon.net
          Assignee: adamw at FreeBSD.org
             Flags: maintainer-feedback?(adamw at FreeBSD.org)

I know the problem is not exactly RSA but a peculiar implementation

Still
http://thehackernews.com/2017/07/gnupg-libgcrypt-rsa-encryption.html


Default of PGP? RSA 1024.
Default of PGP for fingerprint SHA1

Changing it is a PITA

As an experience I tried to use SHA256/Curve259.

Try it yourself, and beat me if you find it intuitive after a 20minutes
googling the internet to go in full expert to choose a very strong algo in the
middle of NIST....

This software MIGHT be the best one in the world when it comes to cryptography,
when it comes to the User Interface even for beardy sysadmins that enjoy CLI is
a PAIN.

Leading us by default on the wrong choices.

I am really not an expert, but an exploit actually usable on RSA or SHA1 might
be discovered. And this day, should not we have a decent interface to change
our default in less than 1 hour (imagine the web is down)?

If our defaults are broken, isn't there a risk bigger that people exchange with
the illusion of safety data that are unsafe?

My proposition is to remove GpG to try to look cooler than openBSD.

It will probably surprise them, and we all hate using gpg anyway.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list