commit: 73ca4d974f8ec2683485d8865723d3f9d268a828
parent 1b62d0e8d9263113a3159a4384e9346737007e02
Author: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
Date: Thu, 7 Mar 2019 08:32:00 +0100
articles/Pretty Bad Privacy: GnuPG w/o broken ciphers note, mention tinyssh as example
Diffstat:
1 file changed, 1 insertion(+), 0 deletions(-)
diff --git a/articles/Pretty Bad Privacy.xhtml b/articles/Pretty Bad Privacy.xhtml
@@ -79,6 +79,7 @@ Implementations MUST implement SHA-1. Implementations MAY implement
other algorithms. MD5 is deprecated.</pre></blockquote>
<cite><a href="https://tools.ietf.org/html/rfc4880">RFC4880</a>, November 2007</cite>
<p>Some additionnal ciphers got added later on, but this basically mean that you cannot be sure that a OpenPGP message you sent wasn’t done in more-or-less plaintext. DES was broken by the EFF in 199x, 3DES is basically now on about the same size (NIST: 80 bits of security) but computing power got much better, SHA1 was probably still known as okay but could be better (as SHA2 was already a thing), DSA was probably not now enough as good to be hardcoded, no idea for Elgamal.</p><!-- FIXME -->
+<p>I tried few years ago to build a GnuPG without support for theses broken ciphers, and I failed doing so. One can note that SSH requires 3DES-CBC, but it can be disabled or non-implemented (<a href="https://tinyssh.org/">tinyssh</a>).</p>
<blockquote><pre>
13.4. Plaintext