[02:26] paultag: that's awesome :) how many uninteresting keys did you generate before landing on that one? [02:28] gilbert: none, actually ;) (I had to implement huge chunks of OpenPGP though) [02:28] currently rewriting in C [02:30] you're writing your own pgp implementation? [02:31] Not for other people to use, I'm trying to learn more about OpenPGP / GPG in general [02:31] I do that by implementing RFCs [02:31] calming, really [02:31] paultag: ur always picking the craziest projects ;) [02:32] gilbert: ♥ :) [02:32] Yeah, totally [02:32] gilbert: with so many DDs changing their keys for some reason, I figure I should learn about the protocol, how some of this stuff works [02:32] you should name it pretty good paultag [02:32] perhaps PGP smartcards [02:32] those are neat. [02:32] bwaahahhahahahahahha [02:32] that's brilliant gilbert [02:33] hehe :) [02:33] btw, i can't stand reading RFCs. you're a better man than i... [02:33] Yeah, lota braindamage sometimes [02:34] much less implementing them... [02:34] but you do find fun corners of the spec that are prone to … abuse [02:34] such as that hash ;) [02:34] I'm good at homework :) [02:35] i see, so that was intentional... [02:35] yessir [02:35] urgh [02:35] perhaps my next one will be 0x00000042 [02:35] that's ripe for abuse [02:35] Yeah, asheesh abused this before me [02:35] he made a new 4096 key with the same short ID as his old key [02:35] eons ago [02:36] turns out we did it the same way [02:37] oh, i had assumed he did that by generating a bunch of random keys until he got the last 8 to match... [02:37] so under the hood it is, but there are some … tricks … to speed it up [02:37] without actually gen-key'ing [02:37] i see [02:38] I fear abuse [02:38] I think everyone does [02:38] since you can imagine someone doing this with every key in the keyservers [02:38] and even signing them in proper order too [02:39] paultag: u could be a hero by fixing the spec :) [02:39] (if its even possible) [02:39] sadly not [02:39] the real fix is to always use the full fingerprint [02:40] at least 16 bits of it [02:40] you mean 16 bytes, right? [02:40] erm [02:40] yes please [02:40] 0xFF ftw [02:41] erm [02:41] 0xFFFF [02:41] fuck I need sleep [02:41] so... we have a twitter now. [02:41] also, paultag - nice key ID. :) [02:41] thanks jrgifford :) [02:41] I wish I did 1BADD00D [02:41] in retrospect [02:41] perhaps I'll revoke it for a 0x00000042 [02:42] 1337D00D would also be nice :) [02:43] Oh! another good idea [02:43] 0xBAD1D3A5 [02:43] yes [02:44] Alright, back to the spec [02:44] I'm in the middle of breaking GPG [02:44] bad paultag [02:44] gpg: mpi larger than indicated length (0 bytes) [02:44] gpg: read_block: read error: invalid packet [02:44] later [02:44] welcome to my hell [02:45] i assume the same issue affects subkeys? [02:45] yeah [02:45] I could issue subkeys with cooked IDs too I think [02:46] I'd need to adjust a few things, I think [02:46] I'm still getting through the RFC, so I've not even touched subkeys yet [02:47] ok, for real, outie 5000 [02:47] much love [04:01] * skellat is still up, watching Tekzilla