Hi Bjoern--

On Sat 2016-05-28 18:04:13 -0400, Bjoern Kahl wrote:
>  Because I have *tons* of mails (and other archived data files) that
>  have been signed and / or encrypted with such keys and I (I have to
>  use such a strong word here) *insist* on being able to continue to
>  read these mails and files whenever the need arises.

So there are two things you might want to do with these mails: verify
their signatures and decrypt them.  Right?  Is it possible that
signature verification for old (likely weak, and quite possibly
compromised) keys isn't relevant?  If so, then the problem space becomes
focused on decryption.

I think there are serious usability risks to providing live decryption
capability for *new* material that is sent encrypted to known-weak keys,
but i can understand the use case you describe.

Perhaps the better approach is to have a one-time tool that can either
(a) translate your encrypted messages into a newer encrypted form
(e.g. replacing the PKESK packets with ones encrypted to a newer,
stronger key), or (b) extracting the session key from the encrypted
object and storing it in a separate lookup table, so that the old secret
key isn't relevant any longer.

Either of these approaches would also be useful to people who want to
destroy their old secret key material without losing access to their
data, while making it harder for people to start interacting with
bad/old keys.

        --dkg

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to