Gentoo Archives: gentoo-dev

From: "Michał Górny" <mgorny@g.o>
To: gentoo-dev@l.g.o
Cc: robbat2@g.o, "Michał Górny" <mgorny@g.o>
Subject: [gentoo-dev] [PATCH v4 14/14] glep-0063: Remove recommended gpg.conf
Date: Sat, 07 Jul 2018 06:02:59
Message-Id: 20180707055623.28603-15-mgorny@gentoo.org
In Reply to: [gentoo-dev] [PATCH v4 00/14] GLEP 63 update by "Michał Górny"
1 Requested-by: Richard Yao <ryao@g.o>
2 ---
3 glep-0063.rst | 54 +++++++--------------------------------------------
4 1 file changed, 7 insertions(+), 47 deletions(-)
5
6 diff --git a/glep-0063.rst b/glep-0063.rst
7 index 0792a5c..b20af61 100644
8 --- a/glep-0063.rst
9 +++ b/glep-0063.rst
10 @@ -42,6 +42,9 @@ v2
11 The ``gpgfingerprint`` LDAP field has been altered to remove optional
12 whitespace.
13
14 + The recommended ``gpg.conf`` contents have been removed as they were
15 + seriously outdated and decreased security over the modern defaults.
16 +
17 v1.1
18 The recommended RSA key size has been changed from 4096 bits
19 to 2048 bits to match the GnuPG recommendations [#GNUPG-FAQ-11-4]_.
20 @@ -102,58 +105,15 @@ The developers should follow those practices unless there is a strong
21 technical reason not to (e.g. hardware limitations, necessity of replacing
22 their primary key).
23
24 -1. Copy ``/usr/share/gnupg/gpg-conf.skel`` to ``~/.gnupg/gpg.conf``, append
25 - the following block::
26 -
27 - keyserver pool.sks-keyservers.net
28 -
29 - emit-version
30 -
31 - default-recipient-self
32 -
33 - # -- All of the below portion from the RiseUp.net OpenPGP best practices, and
34 - # -- many of them are also in the Debian GPG documentation.
35 -
36 - # when outputting certificates, view user IDs distinctly from keys:
37 - fixed-list-mode
38 -
39 - # long keyids are more collision-resistant than short keyids (it's trivial to make a key
40 - # with any desired short keyid)
41 - # NOTE: this breaks kmail gnupg support!
42 - keyid-format 0xlong
43 -
44 - # when multiple digests are supported by all recipients, choose the strongest one:
45 - personal-digest-preferences SHA512 SHA384 SHA256 SHA224
46 -
47 - # preferences chosen for new keys should prioritize stronger algorithms:
48 - default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 BZIP2 ZLIB ZIP Uncompressed
49 -
50 - # If you use a graphical environment (and even if you don't) you should be using an agent:
51 - # (similar arguments as https://www.debian-administration.org/users/dkg/weblog/64)
52 - use-agent
53 -
54 - # You should always know at a glance which User IDs gpg thinks are legitimately bound to
55 - # the keys in your keyring:
56 - verify-options show-uid-validity
57 - list-options show-uid-validity
58 -
59 - # include an unambiguous indicator of which key made a signature:
60 - # (see http://thread.gmane.org/gmane.mail.notmuch.general/3721/focus=7234)
61 - # (and http://www.ietf.org/mail-archive/web/openpgp/current/msg00405.html)
62 - sig-notation issuer-fpr@×××××××××××××××××××××××××××××××.net=%g
63 -
64 - # when making an OpenPGP certification, use a stronger digest than the default SHA1:
65 - cert-digest-algo SHA256
66 -
67 -2. Primary key and the signing subkey are both of type RSA, 2048 bits
68 +1. Primary key and the signing subkey are both of type RSA, 2048 bits
69 (OpenPGP v4 key format or later)
70
71 -3. Key expiration renewed annually to a fixed day of the year
72 +2. Key expiration renewed annually to a fixed day of the year
73
74 -4. Create a revocation certificate & store it hardcopy offsite securely
75 +3. Create a revocation certificate & store it hardcopy offsite securely
76 (it's about ~300 bytes).
77
78 -5. Encrypted backup of your secret keys.
79 +4. Encrypted backup of your secret keys.
80
81 Gentoo LDAP
82 ===========
83 --
84 2.18.0