[Autocrypt] usability and passphrase-less keys

holger krekel holger at merlinux.eu
Wed May 3 11:48:03 EDT 2017


Hi autocrypters,

here is my little subjective summary of usability and key length / passphrase discussions from last week which lead to maybe suprising results.  First, a little quiz with which Vincent put several of us to a test of our intuitions about key length: 

- how much CPU effort does it take to crack a 768-bit DSA (not even RSA) key?

- how many times harder is it to crack a 1024-bit key? 

- how many times harder is it to crack a 2048-bit key compared to 1024-bit? 

I leave these questions open for now if you want yourself to test your intuition and answer
and give an answer here. 

Second, regarding passphrases i remember Patrick, Vincent, Thomas and me sitting together at one point ... and not only seeing per-key passphrases as un-neccessary on android which does not allow an app to read keys from openkeychain ... but also questioning whether per-key passphrases make sense for desktop/enigmail/maildevelope situations: If someone can access a home directory then chances are this desktop machine is compromised, rendering per-key passphrases likely useless.  Moreover, many user-choices of passphrases are crackable for a determined attacker or the passphrase is so long that forgetting is likely.  Moreover, there are movements (debian IIRC) to let the pgp keychain run in a different read-protected user account and thus landing us in a similar situation as Android.  

The reason this was considered is that usability-wise passphrases are a nuisance.  In several situations you have to enter a passphrase often.  And not only many users but even crypto-programmers forget their passphrase, rendering their private key and thus decryption inaccessible.  We had a report from one crypto-party where after generating, cross-signing and uploading keys, one newcomer confessed he had already forgot the passphrase, destroying his previous work.  There are also "mental model mismatch" issues like "why do i have to enter my passphrase when sending email, shouldn't it just use the others public key to encrypt to the other side?" ...

Leaving further details aside (hope i didn't misrepresent anything) I eventually perceived us arriving at the conclusion that there is no good reason for defaulting to require passphrases when generating a key. and that "additionally protecting a single key" or so might be hidden in a config section which is not part of the default key setup.  It appears much saner to suggest a "keychain lock" work flow which locks a whole keychain and not just protects a single key.  And as far as data at rest is concerned, it's good practise to full-disk and/or home-directory encryption which protects a key (and many other useful data!) when a device is stolen.  Note that within Autocrypt we are talking about email encryption, not other usages like package signing.

comments?  Are there good reasons left to make passphrases part of a recommended workflow for autocrypt setups?

best,
holger



More information about the Autocrypt mailing list