Compare Revisions
Unsafe properties of OpenPGP keys might be ignored
Revision 242717:
Revision 242717 by firefox877 on
Revision 243256:
Revision 243256 by kaie on
Keywords:
Search results summary:
If Thunderbird unexpectedly reports that an OpenPGP key is expired, or isn't showing some expected properties, the key might have unsafe properties.
If Thunderbird unexpectedly reports that an OpenPGP key is expired, or isn't showing some expected properties, the key might have unsafe properties.
Content:
When processing OpenPGP keys, Thunderbird ignores key properties that were created using unsafe mechanisms.
Signatures created with outdated OpenPGP software may be based on unsafe algorithms. From version 91.8.0 onwards, Thunderbird no longer accepts OpenPGP signatures involving unsafe algorithms like the [https://en.wikipedia.org/wiki/SHA-1 SHA-1 hash algorithm] and created after 2019-01-15. This applies to signatures of OpenPGP messages as well as signatures of modified OpenPGP keys.
For example, if a key owner has updated the expiration date property of an OpenPGP key, the modification involves a signature that is added to the OpenPGP key. Thunderbird will ignore unsafe key signatures and may report the OpenPGP key as expired, or not show some properties of the key.
To address this problem, the key owner should update to the latest version of their OpenPGP software, repeat the key modifications, and then share the updated public key. Some software may require an updated configuration to ensure that modern algorithms are used when modifying keys.
When viewing the details of an OpenPGP key in Thunderbird, a warning might be shown that the key contains unsafe properties.
OpenPGP uses private and public keys, which contain meta data such as
usernames, email addresses, additional sub keys, validity and expiration
information, and more. This additional information on a key uses
digital signatures, to proof that these properties were really made by
the owner of the key, and not by someone else.
A digital signature uses cryptographic technology that combines multiple
algorithms, in order to produce a proof that cannot be easily falsified.
Because computers get more powerful over time, algorithms that were once
consided secure in the past, may no longer be considered secure today.
An example is the [https://en.wikipedia.org/wiki/SHA-1 SHA-1 hash algorithm]. Nowdays, it is recommended that it is no longer used, because certain attacks on the algorithm are possible.
Signatures created with outdated OpenPGP software or with an oudated configuration, may be based on unsafe algorithms. For example, if a key owner has updated the expiration date property of an OpenPGP key, the modification involves a signature that is added to the OpenPGP key
Thunderbird versions 91.8.0 and 91.8.1 contained a change that rejected a wide set of signatures that involved SHA-1. As a consequence, the affected keys were no longer usable in Thunderbird.
Because the number of affected Thunderbird users was higher than anticipated, Thunderbird version 91.9.0 has been changed to be less strict. It will continue to accept signatures based on SHA-1 in scenarios that are considered less critical, and which should allow most users to continue using their key for another while.
The Thunderbird developers still intend to deprecate the use of SHA-1 in OpenPGP keys, but we have learned that more time is required for a transition period, and that Thunderbird also should implement changes to assist users in the required transition.
Note that other OpenPGP software might already reject a key based on these unsafe properties, or might do so in the future. If you are managing your OpenPGP private key outside of Thunderbird, you should research how you can upgrade your key, and start distributing an upgraded public key that no longer relies on SHA-1.
If you are managing your OpenPGP secret key with Thunderbird, then a future version of Thunderbird will help you to upgrade your key.