Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#42774 - [gnupg] --enable-large-rsa broken due to missing build option

Attached to Project: Arch Linux
Opened by Vincent Brillault (Feandil) - Thursday, 13 November 2014, 13:41 GMT
Last edited by Gaetan Bisson (vesath) - Friday, 14 November 2014, 16:25 GMT
Task Type Feature Request
Category Packages: Testing
Status Closed
Assigned To Gaetan Bisson (vesath)
Architecture All
Severity Low
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Description:

When using --enable-large-rsa on gnupg-2.1.0, the following error message is shown:
''gpg: WARNING: gpg not built with large secure memory buffer. Ignoring --enable-large-rsa''


I've recompiled the package with --enable-large-secmem and the warning message is gone

Additional info:
* package version(s): 2.1.0-3 (testing)

Steps to reproduce:
- gpg --enable-large-rsa --full-gen-key
This task depends upon

Closed by  Gaetan Bisson (vesath)
Friday, 14 November 2014, 16:25 GMT
Reason for closing:  Won't fix
Additional comments about closing:  We rest on upstream defaults whenever possible.
Comment by Gaetan Bisson (vesath) - Thursday, 13 November 2014, 16:47 GMT
I'm a little reluctant to enable a recent option that upstream chose not to turn on by default. Could you elaborate on why --enable-large-secmem (or large RSA keys for that matter) are needed?
Comment by Vincent Brillault (Feandil) - Thursday, 13 November 2014, 17:38 GMT
"--enable-large-secmem" doubles the size of the 'secure memory buffer', from 32768 bytes to 65536 bytes.
(A larger pool a 'secure memory' is required because the key material is larger than before
It is strange that upstream now support a --enable-large-rsa option but does not compile by default with its support.

The real question is, as you said, 'do we want to support "large RSA keys"?' and I do not think I have the qualification (from a cryptography point of view) to discuss the reasons behind the arbitrary limits of 4/8k. ('large' RSA keys, as in gnupg-2.1.0, are 8k RSA keys while the current maximum is 4k)

I personally believe that it would be better to enable it as there are so many patches out there that "allow you to generate 8k RSA keys", but can forget to double the size of the secure memory, like this one: http://mywayonlinux.blogspot.fr/2014/01/generate-8192-bytes-key-arch-linux.html
(And I am using a 8k RSA key (with 4k subkeys, which are the ones really used))
Comment by Gaetan Bisson (vesath) - Friday, 14 November 2014, 01:55 GMT
I say 8k is complete madness. Users who are not cryptographers should simply trust the default key size GnuPG suggests during key generation.

If 8k RSA key generation is the only reason to enable large-secmem then I am unwilling to do it.
Comment by Vincent Brillault (Feandil) - Friday, 14 November 2014, 07:09 GMT
If you think this is not useful for the community, feel free to close this bug as WONTFIX

For the record, the change was introduced via http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=6cabb7a2a18f871b8c3d5de58bcdc5aaa5b201af
(which may be related to this recent restriction: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=03f0b51fe454f8dbe77c302897f7a5899c4c5380)

Loading...