[02:26] <gilbert> paultag: that's awesome :) how many uninteresting keys did you generate before landing on that one?
[02:28] <paultag> gilbert: none, actually ;) (I had to implement huge chunks of OpenPGP though)
[02:28] <paultag> currently rewriting in C
[02:30] <gilbert> you're writing your own pgp implementation?
[02:31] <paultag> Not for other people to use, I'm trying to learn more about OpenPGP / GPG in general
[02:31] <paultag> I do that by implementing RFCs
[02:31] <paultag> calming, really
[02:31] <gilbert> paultag: ur always picking the craziest projects ;)
[02:32] <paultag> gilbert: ♥    :)
[02:32] <paultag> Yeah, totally
[02:32] <paultag> gilbert: with so many DDs changing their keys for some reason, I figure I should learn about the protocol, how some of this stuff works
[02:32] <gilbert> you should name it pretty good paultag
[02:32] <paultag> perhaps PGP smartcards
[02:32] <paultag> those are neat.
[02:32] <paultag> bwaahahhahahahahahha
[02:32] <paultag> that's brilliant gilbert
[02:33] <gilbert> hehe :)
[02:33] <gilbert> btw, i can't stand reading RFCs.  you're a better man than i...
[02:33] <paultag> Yeah, lota braindamage sometimes
[02:34] <gilbert> much less implementing them...
[02:34] <paultag> but you do find fun corners of the spec that are prone to … abuse
[02:34] <paultag> such as that hash ;)
[02:34] <paultag> I'm good at homework :)
[02:35] <gilbert> i see, so that was intentional...
[02:35] <paultag> yessir
[02:35] <gilbert> urgh
[02:35] <paultag> perhaps my next one will be 0x00000042
[02:35] <gilbert> that's ripe for abuse
[02:35] <paultag> Yeah, asheesh abused this before me
[02:35] <paultag> he made a new 4096 key with the same short ID as his old key
[02:35] <paultag> eons ago
[02:36] <paultag> turns out we did it the same way
[02:37] <gilbert> oh, i had assumed he did that by generating a bunch of random keys until he got the last 8 to match...
[02:37] <paultag> so under the hood it is, but there are some … tricks … to speed it up
[02:37] <paultag> without actually gen-key'ing
[02:37] <gilbert> i see
[02:38] <paultag> I fear abuse
[02:38] <paultag> I think everyone does
[02:38] <paultag> since you can imagine someone doing this with every key in the keyservers
[02:38] <paultag> and even signing them in proper order too
[02:39] <gilbert> paultag: u could be a hero by fixing the spec :)
[02:39] <gilbert> (if its even possible)
[02:39] <paultag> sadly not
[02:39] <paultag> the real fix is to always use the full fingerprint
[02:40] <paultag> at least 16 bits of it
[02:40] <gilbert> you mean 16 bytes, right?
[02:40] <paultag> erm
[02:40] <paultag> yes please
[02:40] <paultag> 0xFF ftw
[02:41] <paultag> erm
[02:41] <paultag> 0xFFFF
[02:41] <paultag> fuck I need sleep
[02:41] <jrgifford> so... we have a twitter now.
[02:41] <jrgifford> also, paultag - nice key ID. :)
[02:41] <paultag> thanks jrgifford :)
[02:41] <paultag> I wish I did 1BADD00D
[02:41] <paultag> in retrospect
[02:41] <paultag> perhaps I'll revoke it for a 0x00000042
[02:42] <gilbert> 1337D00D would also be nice :)
[02:43] <paultag> Oh! another good idea
[02:43] <paultag> 0xBAD1D3A5
[02:43] <gilbert> yes
[02:44] <paultag> Alright, back to the spec
[02:44] <paultag> I'm in the middle of breaking GPG
[02:44] <gilbert> bad paultag
[02:44] <paultag> gpg: mpi larger than indicated length (0 bytes)
[02:44] <paultag> gpg: read_block: read error: invalid packet
[02:44] <gilbert> later
[02:44] <paultag> welcome to my hell
[02:45] <gilbert> i assume the same issue affects subkeys?
[02:45] <paultag> yeah
[02:45] <paultag> I could issue subkeys with cooked IDs too I think
[02:46] <paultag> I'd need to adjust a few things, I think
[02:46] <paultag> I'm still getting through the RFC, so I've not even touched subkeys yet
[02:47] <paultag> ok, for real, outie 5000
[02:47] <paultag> much love
[04:01]  * skellat is still up, watching Tekzilla