On Tue, Jan 03, 2006 at 07:59:08PM -0800, [EMAIL PROTECTED] wrote:
> 
> >Message: 8
> >Date: Tue, 3 Jan 2006 19:43:01 -0500
> >From: David Shaw <[EMAIL PROTECTED]>
> >Subject: Re: updating a key's self-signature
> 
> >Yes, but note that it's still possible for someone to get the old
> >self-sig from a keyserver.
> 
> what good would that do anyone once the old signature hash is no 
> longer trusted,
> and the key is updated with the new one ?

Remember than keys are merged on the keyservers, so you'll end up with
both self-sigs present.  To be sure, GPG will use the more recent,
stronger, self-sig, but the old one is still there.

If an attacker compromises the keyserver or in any way distributes
your key himself, he can remove the new self-sig, leaving the old one
behind.

It's not much of an attack.  I wouldn't lose sleep over it.

> >Despite the recent attacks, I'd use SHA-1.
> 
> i'd prefer whirpool, but settled for sha-256 ;-)

This is fine, but note that the key may not work in older versions of
PGP and GPG.

David

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to