gpg-1.4.6 and gpg-2.x

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



gpg folks fixed serious remotely exploitable security flaw that affects gpg
versions older than 1.4.6 and 2.0.2

http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html

For loop-AES users who use patched version of gpg to encrypt loop-AES key
files, the good news is that gpg-1.4.6 and gpg-2.x versions no longer
require patching to change default amount of passphrase iteration.

You can set this option in your options file ~/.gnupg/gpg.conf

 s2k-count 8388608


Or alternatively... You can use this gpg command line parameter:

 --s2k-count 8388608


Or alternatively... You can apply this source patch and recompile:

--- gnupg-1.4.6/g10/gpg.c.old	2006-12-03 17:37:45.000000000 +0200
+++ gnupg-1.4.6/g10/gpg.c	2006-12-06 21:58:07.000000000 +0200
@@ -1792,7 +1792,7 @@
     opt.cert_digest_algo = 0;
     opt.compress_algo = -1; /* defaults to DEFAULT_COMPRESS_ALGO */
     opt.s2k_mode = 3; /* iterated+salted */
-    opt.s2k_count = 96; /* 65536 iterations */
+    opt.s2k_count = 208; /* 8388608 byte count */
 #ifdef USE_CAST5
     opt.s2k_cipher_algo = CIPHER_ALGO_CAST5;
 #else


To test that your gpg is using more passphrase iterations, you can run these
commands:

$ echo x | gpg --symmetric >test1.gpg
$ gpg --decrypt -v -v <test1.gpg

Second gpg invocation should output a line like this:

        salt 41f21861d981248e, count 8388608 (208)
                                     ^^^^^^^

Salt value will be different on each symmetrically encrypted file.

Since the security flaw in older gpg versions also affects signature
verification, I decided to include MD5 of original tarball here as well.

ec8dc6df1bd83c1d7e1a1ea10653f9f4  gnupg-1.4.6.tar.bz2

-- 
Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9 DD

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux