Sounds like I should just regenerate a new 1024 bit RSA primary signing key
and copy it to the card (and an encryption subkey as well, of course).

Thank you for your help!


On 3/3/08 7:47 PM, "David Shaw" <[EMAIL PROTECTED]> wrote:

> On Mar 3, 2008, at 4:59 PM, Neal Dudley wrote:
> 
>> I have read that it is good practice to create a primary signing
>> key, and
>> then use subkeys on the card.  This is the recommended method for
>> setup of
>> the FSFE card, which is just a fancy skin on the OpenPGP card.  My
>> problem
>> is that now I have a DSA primary key on trusted media in a safe
>> location,
>> which I have to retrieve for any key signing I want to perform.  I
>> cannot
>> simply sign the keys with the signing subkey stored on my OpenPGP
>> card.
>> 
>> Are there any security implications for using the same signing key for
>> normal document signing *and* key signing?
> 
> There are only minor security implications to this.  The main reason
> why you use the primary key to sign keys (called "certification", by
> the way) is semantic.  Identity in OpenPGP is a key plus a user ID.
> That key, given the way keys are laid out, is the primary.  The
> primary is what certifies (self signs) the user ID.
> 
> It is mathematically possible to certify a user ID with a subkey, but
> semantically that subkey isn't part of your identity, so the
> certification is not used.
> 
>> This brings me to my last question.  Let us assume that I create a
>> primary
>> signing key with an expiration.  I then get that key signed by several
>> people.  When the expiration date is near, do I simply create a new
>> signing
>> key and sign it with the original key (before it expires, of
>> course)?  Is
>> the new key then considered just as trusted as the original key,
>> which has
>> all the signatures on it?  Is there any method for transferring the
>> signatures to the new key, or would the new key have to be resigned by
>> everyone that signed the original?  Using the default WoT model,
>> doesn't
>> this mean that every third time the key is renewed, it would not be
>> trusted
>> and would need to be resigned by everyone that signed the previous
>> key?
> 
> No, you do not need to make a new key or do anything like that.  If
> and when your key expires, you can simply extend the expiration date
> as needed.  OpenPGP has "soft" key expiration that can be changed at
> will by the keyholder.
> 
> David
> 


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to