Sign master key user IDs with a stronger hash algorithm than SHA-1
Task Info (Flyspray) | |
---|---|
Opened By | Jonas Witschel (diabonas) |
Task ID | 68501 |
Type | Bug Report |
Project | Keyring |
Category | Signatures |
Version | None |
OS | None |
Opened | 2020-11-02 11:02:13 UTC |
Status | Assigned |
Details
Two of the current master keys, namely AB19265E5D7D20687D303246BA1DFB64FFF979E7 (Allan McRae) and 0E8B644079F599DFC1DDC3973348882F6AC6A4C2 (Pierre Schmitz) use SHA-1 for the self-signature of the user ID. [1] Since this hash algorithm has been broken [2], the self-signature should be renewed using a stronger hash algorithm like SHA-512. This can be done using the following GnuPG command [3]:
gpg --expert --cert-digest-algo SHA512 --sign-key
The success of this operation can be checked e.g. using hopenpgp-tools from [community] by running the following command [4]:
hkt --export-pubkeys | hokey lint
The output of this commands should not have any red marks, both "Self-sig hash algorithms" and all "binding sig hash algorithms" and "cross-cert hash algorithms" should read "[SHA-512]".
[1] https://gitlab.com/sequoia-pgp/sequoia/-/issues/595#note_434331334 [2] https://shattered.io/ [3] Suggested to me by Wiktor Kwapisiewicz in private communication. [4] https://riseup.net/en/security/message-security/openpgp/best-practices#openpgp-key-checks