From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id AEAFA138334 for ; Sun, 8 Jul 2018 18:39:26 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 0EA8EE088F; Sun, 8 Jul 2018 18:39:11 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 0B82BE07E0 for ; Sun, 8 Jul 2018 18:39:09 +0000 (UTC) Received: from localhost.localdomain (d202-252.icpnet.pl [109.173.202.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: mgorny) by smtp.gentoo.org (Postfix) with ESMTPSA id B40BC335C71; Sun, 8 Jul 2018 18:39:07 +0000 (UTC) From: =?UTF-8?q?Micha=C5=82=20G=C3=B3rny?= To: gentoo-dev@lists.gentoo.org Cc: robbat2@gentoo.org, =?UTF-8?q?Micha=C5=82=20G=C3=B3rny?= Subject: [gentoo-dev] [PATCH v5 00/16] GLEP 63, once again Date: Sun, 8 Jul 2018 20:38:46 +0200 Message-Id: <20180708183902.30367-1-mgorny@gentoo.org> X-Mailer: git-send-email 2.18.0 Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-dev@lists.gentoo.org Reply-to: gentoo-dev@lists.gentoo.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Archives-Salt: 4343f10e-09fa-43bf-b7c2-2be9a4e4550d X-Archives-Hash: cfab3001269face0c01d7fefde3bb810 Hi, Here's another updated version of GLEP 63, taking more feedback into consideration. Changes since v4: - removed all gpg.conf bits (which proved obsolete), - added SHA-2 requirement on subkeys (this is in RISEUP and gnupg default, and we require SHA-2 output anyway, so it makes sense to extend it), - unified punctuation. Full text below. -- Best regards, Michał Górny Michał Górny (16): glep-0063: Use 'OpenPGP' as appropriate glep-0063: RSAv4 -> OpenPGP v4 key format glep-0063: 'Gentoo subkey' → 'Signing subkey' glep-0063: Root key → primary key glep-0063: Split out the signing subkey into a separate point glep-0063: Explain minimal & recommended sections glep-0063: Change the recommended RSA key size to 2048 bits glep-0063: Allow ECC curve 25519 keys glep-0063: Stop recommending DSA subkeys glep-0063: Update and unify expiration term glep-0063: Require renewal 2 weeks before expiration glep-0063: Disallow using DSA keys glep-0063: Remove whitespace from LDAP field glep-0063: Remove gpg.conf bits glep-0063: Extend SHA-2 requirement to self-signatures on subkeys glep-0063: Unify punctuation glep-0063.rst | 167 ++++++++++++++++++++++++-------------------------- 1 file changed, 81 insertions(+), 86 deletions(-) -- 2.18.0 --- GLEP: 63 Title: Gentoo OpenPGP policies Author: Robin H. Johnson , Andreas K. Hüttel , Marissa Fischer , Michał Górny Type: Standards Track Status: Final Version: 2 Created: 2013-02-18 Last-Modified: 2018-07-07 Post-History: 2013-11-10 Content-Type: text/x-rst --- Credits ======= Many developers and external sources helped in this GLEP. Abstract ======== This GLEP provides both a minimum requirement and a recommended set of OpenPGP key management policies for the Gentoo Linux distribution. Changes ======= v2 The distinct minimal and recommended expirations have been replaced by a single requirement. The rules have been simplified to use the same maximum time of 900 days for both the primary key and subkeys. An additional rule requesting key renewal 2 weeks before expiration has been added. This is in order to give services and other developers time to refresh the key. The usage of DSA keys has been disallowed. The ``gpgfingerprint`` LDAP field has been altered to remove optional whitespace. The ``gpg.conf`` contents have been removed as they were seriously outdated and decreased security over the modern defaults. The requirement of SHA-2 digest has been extended to apply to self- signatures made on subkeys. v1.1 The recommended RSA key size has been changed from 4096 bits to 2048 bits to match the GnuPG recommendations [#GNUPG-FAQ-11-4]_. The larger recommendation was unjustified and resulted in people unnecessarily replacing their RSA-2048 keys. Minimal specification has been amended to allow for ECC keys. The option of using DSA subkey has been removed from recommendations. The section now specifies a single recommendation of using RSA. Motivation ========== Given the increasing use and importance of cryptographic protocols in internet transactions of any kind, unified requirements for OpenPGP keys used in Gentoo Linux development are sorely needed. This document provides both a set of bare minimum requirements and a set of best practice recommendations for the use of GnuPG (or other OpenPGP providers) by Gentoo Linux developers. It is intended to provide a basis for future improvements such as, e.g., consistent ebuild or package signing and verifying by end users. Specifications for OpenPGP keys =============================== Bare minimum requirements ------------------------- This section specifies obligatory requirements for all OpenPGP keys used to commit to Gentoo. Keys that do not conform to those requirements can not be used to commit. 1. SHA-2 series output digest (SHA-1 digests internally permitted), at least 256-bit. All subkey self-signatures must use this digest. 2. Signing subkey that is different from the primary key, and does not have any other capabilities enabled. 3. Primary key and the signing subkey are both of type EITHER: a. RSA, >=2048 bits (OpenPGP v4 key format or later only), b. ECC curve 25519. 4. Expiration date on key and all subkeys set to no more than 900 days into the future. 5. Key expiration date renewed at least 2 weeks before the previous expiration date. 6. Upload your key to the SKS keyserver rotation before usage! Recommendations --------------- This section specifies the best practices for Gentoo developers. The developers should follow those practices unless there is a strong technical reason not to (e.g. hardware limitations, necessity of replacing their primary key). 1. Primary key and the signing subkey are both of type RSA, 2048 bits (OpenPGP v4 key format or later). 2. Key expiration renewed annually to a fixed day of the year. 3. Create a revocation certificate & store it hardcopy offsite securely (it's about ~300 bytes). 4. Encrypted backup of your secret keys. Gentoo LDAP =========== All Gentoo developers must list the complete fingerprint for their primary keys in the "``gpgfingerprint``" LDAP field. It must be exactly 40 hex digits, uppercase, without whitespace. The prior "``gpgkey``" field will be removed, as it is a subset of the fingerprint field. In any place that presently displays the "``gpgkey``" field, the last 16 hex digits of the fingerprint should be displayed instead. Backwards Compatibility ======================= There is no consistent standard for GPG usage in Gentoo to date. There is conflicting information in the Devmanual [#DEVMANUAL-MANIFEST]_ and the GnuPG Gentoo user guide [#GNUPG-USER]_. As there is little enforcement of Manifest signing and very little commit signing to date, there are no backwards compatibility concerns. External documentation ====================== Much of the above was driven by the following: * NIST SP 800-57 recommendations [#NISTSP800571]_, [#NISTSP800572]_, * Debian GPG documentation [#DEBIANGPG]_, * RiseUp.net OpenPGP best practices [#RISEUP]_, * ENISA Algorithms, Key Sizes and Parameters Report 2013 [#ENISA2013]_. References ========== .. [#GNUPG-FAQ-11-4] GnuPG FAQ: Why doesn’t GnuPG default to using RSA-4096? (https://www.gnupg.org/faq/gnupg-faq.html#no_default_of_rsa4096) .. [#DEBIANGPG] Debian GPG documentation (https://wiki.debian.org/Keysigning) .. [#EKAIA] Ana's blog: Creating a new GPG key (http://ekaia.org/blog/2009/05/10/creating-new-gpgkey/) .. [#RISEUP] RiseUp.net OpenPGP best practices (https://help.riseup.net/en/security/message-security/openpgp/best-practices) .. [#DEVMANUAL-MANIFEST] Gentoo Development Guide: Manifest (http://devmanual.gentoo.org/general-concepts/manifest/index.html) .. [#GNUPG-USER] GnuPG Gentoo User Guide (http://www.gentoo.org/doc/en/gnupg-user.xml) .. [#NISTSP800571] NIST SP 800-57: Recommendation for Key Management: Part 1: General (Revision 3) (http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf) .. [#NISTSP800572] NIST SP 800-57: Recommendation for Key Management: Part 2: Best Practices for Key Management Organization (http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part2.pdf) .. [#ISSUER-ANNOTATE] Including the entire fingerprint of the issuer in an OpenPGP certification (http://thread.gmane.org/gmane.mail.notmuch.general/3721/focus=7234) .. [#ENISA2013] ENISA Algorithms, Key Sizes and Parameters Report, 2013 recommendations, version 1.0 (October 2013) (https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/algorithms-key-sizes-and-parameters-report) Copyright ========= Copyright (c) 2013-2018 by Robin Hugh Johnson, Andreas K. Hüttel, Marissa Fischer, Michał Górny. This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/.