On Aug 28, 2009, at 2:37 AM, Faramir wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

David Shaw escribió:
...
Incidentally, there have been proposals to add forward security
extensions to OpenPGP.  See http://www.apache-ssl.org/openpgp-pfs.txt

 As a side note, I am not sure I like these proposals...

"Therefore when a public
   encryption key expires, an OpenPGP client MUST securely wipe the
   corresponding private key [4]."

 What if I want to be able to decrypt an old email message? If my
encryption key was compromised, and my messages were sniffed, I get no
advantage in deleting my copy of the key and the messages, the attacker
has his own copy of them, and surely won't delete them.

The idea of PFS is not one that works for all situations. For those that do want PFS semantics, the draft merely shows how to do it in the context of OpenPGP. Nobody is required to do this. It's strictly opt- in.

Not being able to decrypt an old message when using PFS is a feature, not a bug.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to