-
-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revise use of GnuPG 1.4.x #296
Comments
The dependencies for Gnupg 2.x were quite large, especially when we were trying to fit entirely in the 4MB upper flash of the x230. Now that we've abandoned that goal and are using both chips (and on servers have upwards of 64 MB), it might be reasonable to revisit. I'm hesitant to use signify since it is a different tool than the "normal" gpg (and didn't support yubikey when I looked at it). Can you build the newer gnupg version and figure out how much space is required? |
I played with the build system somewhat, and was able to make it build. Unfortunately, libgcrypt is not cross-compiling correctly, and I don't know why.
It installs the following components:
|
I have some issues with gpg provided with Heads and i'm not sure if it is a problem with Nitrokey firmware or with GnuPG 1.4.21 per se, provided through Heads or Heads problem. Also, GnuPG 1.4.21 cannot generate 4096 keys nor take advantage of other crypto options. When calling:
Any thought? Can somebody confirm that generating keys from Heads works on a Yubikey? |
Having gpg2 would fit inside 8mb, permit use of recovery shell to generate his keys directly on the Nitrokey Pro v2/Librem Key/Yubikey Neo (4096 bits too instead of 2048 currently) or offline and move subkey/private key to the smartcard, all of it being done from a trustworthy environment, flashed from a reproducible build. Some users might want to generate their keys offline and move them inside Yubikey/Nitrokey. It is a more complicated process, documented at many places like this one . The user should not have to trust another computer to enroll his own computer. |
Actual passage to GnuPG2 is stopped because of pinentry not being called correctly. Any help welcomed. |
Merged. Needs size reduction though. |
It would be useful to have a newer version of GnuPG, or to include different options.
By using the latest stable series, we can make use of cv25519 keys, which have smaller key sizes for equivalent security as RSA-2048, and produce smaller signatures.
Some thoughts:
I understand there are problems in that there are more dependencies with GnuPG 2.x.
Other options might be:
The text was updated successfully, but these errors were encountered: