Re: bug-like: strange behaviour of addrevoker

2013-11-07 Thread Werner Koch
On Tue,  5 Nov 2013 23:13, mailinglis...@hauke-laging.de said:

 revokers. But that didn't work as expected. After entering the command 
 addrevoker I was asked to enter the user ID of the respective key. Why the 
 user ID and not the key ID or fingerprint? Does that make any sense?

You may use any way to specify a user id.  It is the same code as used
when you fire up gpg --key-edit USERID with the only restriction that
the key must have certify capability which is always the case for a
primary key.

 nor 0x1a571df5 works. Even worse: The email address doesn't work either (both 
 ha...@laging.de and ha...@laging.de).

If you have the two user IDs, gpg can't decide which to use.  Thus you
need to use the keyid or the fingerprint.  Please check again and if you
can't make it work, please create a test case for us.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


question about public keys

2013-11-07 Thread Smith, Cathy
Hi

A couple of years ago I created a gpg key for an account that is use to 
transfer documents with vendors.  It's worked fine.  We now have a new vendor 
that won't accept the public key because of the expiration date.  I don't see a 
way to create another public key for this account with the shorter expiration 
date.  Replacing the current public key will disrupt business with existing 
customers.  Is there a solution other than creating another account with its 
own gpg key?

Thanks


Cathy

---
Cathy L. Smith
IT Engineer

Pacific Northwest National Laboratory
Operated by Battelle for the
U.S. Department of Energy

Phone:  509.375.2687
Fax:    509.375.2330
Email:  cathy.sm...@pnnl.gov



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread Peter Lebbing
On 06/11/13 23:28, Leo Gaspard wrote:
 The fact that others could get just the same effect by twisting their WoT 
 parameters is not an issue to me. Firstly, because there are few trust 
 signatures (according to best practices I read, that said trust signatures 
 are mainly made for closed-system environments), so WoT rarely expands 
 outwards of one signature by someone you know.

Let's leave trust signatures out of the equation, it makes it a lot more
complicated and they are rarely used. I also don't see the relation between the
statements in this quote here.

 But mostly because signing is an attestion of your belief someone is who 
 (s)he is. Thus, if you believe someone is who the UID states (s)he is as
 much as if you met him/her in person and followed the whole verification
 process, I would not mind your exporting signatures of the key.

I get the feeling you're partly responding to my adamant statements earlier, but
you're confusing the situation I was responding to.

I think you're saying: Person X tells me their key is K1. I blindly trust person
X, and I know for a fact that person X was the one who told me K1 is his key.
That is, you were in the same room, or you recognised their voice on the
telephone, or something similar. This is acceptable to many people as a
verification.

But this is not the situation I was talking about. It's this:

Person X (having key K1) has signed key K2, asserting that it is held by Y.
Since you blindly trust X, you can assign him full (or hell, ultimate if you
prefer) ownertrust, and key K2 is valid for you. You don't need to sign K2
anymore, because it is already valid since you expressed your trust to GnuPG,
and GnuPG uses it to validate that it belongs to Y.

Now, what Stan Tobias appeared to want, is sign key K2 himself, probably to
express to others in the Web of Trust that he believes K2 to be valid. But this
doesn't add any additional verification of key validity to the Web of Trust,
it's noise. Because anyone else can look at the signature made by X, and decide:
I trust X fully as well. They assign full trust to X, and K2 becomes valid.

Let's get back to ownertrust: in the Web of Trust, ownertrust is an expression
of how well you think other people verify identities before they sign a key. If
you sign key K2 based on X's signature, you haven't verified Y's identity.
You've probably verified X's identity, but not Y's. So you shouldn't sign K2.

You might believe Y when he or she walks up to you and says: my name is Y and K2
is my key. But that is not what happened; X said: K2 is Y's key. Y didn't say
anything to you, let alone that you verified it was actually Y talking. That's
the absolutely necessary part of verification: you believe that it was actually
Y that told you K2 is theirs. Just believing K2 is Y's key is not verification;
it's key validity.

I'll give an example.

In the Web of Trust, key validity is a thing that can gradually build up until
it passes a certain point where we say: I have so much proof that it appears to
be valid, that I conclude it's, within reason, valid. This is why you have
completes needed, marginals needed, and max cert depth. The latter says:
once we pass a certain depth, my proof of identity becomes so indirect I don't
wish to trust that information anymore. I will paint a picture with the default
settings, completes 1, marginals 3, max depth 5.

Suppose A has signed B. There are three people C, D and E, who have full trust
in A. They do what I'm arguing against: they sign key B as well, based on their
trust of A.

Now I come along. I actually have key A valid as well, but quite indirectly: it
is at level 4. I know A, but ownertrust is very personal. I think A does an okay
job of verifying identities, but not to the rigorous level I personally demand.
I work with pretty sensitive stuff, and my standards are high (I'm painting a
picture here, not describing reality). So I assign him marginal ownertrust. Now
what I would expect, is that I need some more signatures, and B will become
valid at level 5, the level where I have configured GnuPG to say: okay, this is
deep enough, I will not take into account B's signatures on other keys because
the proof becomes too indirect.

However, I also know C, D and E, signed their keys and assigned them marginal
ownertrust because I was under the impression they also verify identities pretty
well. I don't know that they go around signing keys based on other people's
signatures.

C, D and E are thus at level 1 in my web. They all signed B's key, so I think:
that's reasonable proof that B is valid. Not only do I think that, so does
GnuPG. It leads to B's key being valid at level 2. B can have another few levels
of indirection before I consider the path too long. In fact, for signature paths
through B, it effectively just changed my max cert depth. B belongs at level
5, because the proof of validity is very indirect in my *own* web, but he's at
level 2, so my max cert depth has 

Re: question about public keys

2013-11-07 Thread David Smith
On 11/06/13 23:57, Smith, Cathy wrote:
 Hi
 
 A couple of years ago I created a gpg key for an account that is use to 
 transfer documents with vendors.  It's worked fine.  We now have a new vendor 
 that won't accept the public key because of the expiration date.  I don't see 
 a way to create another public key for this account with the shorter 
 expiration date.  Replacing the current public key will disrupt business with 
 existing customers.  Is there a solution other than creating another account 
 with its own gpg key?

You have a number of options:

1. Edit the expiration date of the existing key, and then re-circulate
it.  Vendors with the old key will be able to carry on working, the new
one can use the key with the shorter expiration date.  As it comes close
to expiration, you can re-edit the expiration date to extend it.
However, this might not suit your new client's requirements.

2. Generate a new keypair with the same email address as the old one,
and only send it to the new client.  However, if it gets circulated to
other clients, it might cause confusion over which key to use.  You can
generate a new keypair with gpg --gen-key.

3. Depending on what your new client's objections are, it might be
sufficient to generate a new encryption subkey within your existing
master key.  The new subkey can have a different expiration date to the
master key.  Most of your existing clients will continue using the
existing encryption subkey with a long expiration date; the new client
can specifically choose to use the new subkey with a shorter expiration
date.  When the new subkey expires, you can simply create another one
with a new expiration date.  You can add a subkey by running gpg
--edit-key key_id and then running the command addkey.

HTH...

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread Leo Gaspard
On Thu, Nov 07, 2013 at 11:48:07AM +0100, Peter Lebbing wrote:
 On 06/11/13 23:28, Leo Gaspard wrote:
  But mostly because signing is an attestion of your belief someone is who 
  (s)he is. Thus, if you believe someone is who the UID states (s)he is as
  much as if you met him/her in person and followed the whole verification
  process, I would not mind your exporting signatures of the key.
 
 I get the feeling you're partly responding to my adamant statements earlier, 
 but
 you're confusing the situation I was responding to.

Well... The answer to your previous message was in my first two paragraphs. The
rest of my answer, to which you answered, was mostly thinking over some debate
that aroused earlier, and whose authors I do not remember. Anyway, I think you
answered the most important part of my last message.

 I think you're saying: Person X tells me their key is K1. I blindly trust 
 person
 X, and I know for a fact that person X was the one who told me K1 is his key.
 That is, you were in the same room, or you recognised their voice on the
 telephone, or something similar. This is acceptable to many people as a
 verification.
 
 But this is not the situation I was talking about. It's this:
 
 Person X (having key K1) has signed key K2, asserting that it is held by Y.
 Since you blindly trust X, you can assign him full (or hell, ultimate if you
 prefer) ownertrust, and key K2 is valid for you. You don't need to sign K2
 anymore, because it is already valid since you expressed your trust to GnuPG,
 and GnuPG uses it to validate that it belongs to Y.
 
 Now, what Stan Tobias appeared to want, is sign key K2 himself, probably to
 express to others in the Web of Trust that he believes K2 to be valid. But 
 this
 doesn't add any additional verification of key validity to the Web of Trust,
 it's noise. Because anyone else can look at the signature made by X, and 
 decide:
 I trust X fully as well. They assign full trust to X, and K2 becomes valid.

Except they do not have to know X, nor that he makes perfectly reasonable
decisions in signing keys.

And I believe it's not noise. Let's make an example in the real world :
 * I would entrust X with my life
 * X would entrust Y with his life, without my knowing it
 * Thus, if I actually entrusted X with my life, why should I be frightened if X
   asked Y to take care of me ? Provided, of course, X told me he was letting Y
   take care of me. After all, I would entrust X with my life, so I should just
   agree to any act he believes is good for me.
(That's what I called blind trust. Somewhat more than full trust, I believe.)

 Let's get back to ownertrust: in the Web of Trust, ownertrust is an expression
 of how well you think other people verify identities before they sign a key. 
 If
 you sign key K2 based on X's signature, you haven't verified Y's identity.
 You've probably verified X's identity, but not Y's. So you shouldn't sign K2.

So, is a signature a matter of belief in the validity of the key or of actual
work to verify the key ?

 You might believe Y when he or she walks up to you and says: my name is Y and 
 K2
 is my key. But that is not what happened; X said: K2 is Y's key. Y didn't say
 anything to you, let alone that you verified it was actually Y talking. That's
 the absolutely necessary part of verification: you believe that it was 
 actually
 Y that told you K2 is theirs. Just believing K2 is Y's key is not 
 verification;
 it's key validity.
 
 I'll give an example.
 
 In the Web of Trust, key validity is a thing that can gradually build up until
 it passes a certain point where we say: I have so much proof that it appears 
 to
 be valid, that I conclude it's, within reason, valid. This is why you have
 completes needed, marginals needed, and max cert depth. The latter says:
 once we pass a certain depth, my proof of identity becomes so indirect I don't
 wish to trust that information anymore. I will paint a picture with the 
 default
 settings, completes 1, marginals 3, max depth 5.

If I understood correctly, the depth parameter you are talking about is useless,
except in case there are trust signature. And you agreed with me for them to be
taken out of the equation.

 Suppose A has signed B. There are three people C, D and E, who have full trust
 in A. They do what I'm arguing against: they sign key B as well, based on 
 their
 trust of A.
 
 Now I come along. I actually have key A valid as well, but quite indirectly: 
 it
 is at level 4. I know A, but ownertrust is very personal. I think A does an 
 okay
 job of verifying identities, but not to the rigorous level I personally 
 demand.
 I work with pretty sensitive stuff, and my standards are high (I'm painting a
 picture here, not describing reality). So I assign him marginal ownertrust. 
 Now
 what I would expect, is that I need some more signatures, and B will become
 valid at level 5, the level where I have configured GnuPG to say: okay, this 
 is
 deep enough, I will not take into 

Re: trust your corporation for keyowner identification?

2013-11-07 Thread Peter Lebbing

On 2013-11-07 17:09, Leo Gaspard wrote:

If I understood correctly, the depth parameter you are talking about
is useless, except in case there are trust signature. And you agreed 
with me for

them to be taken out of the equation.


Of course it's not useless. You seem to misunderstand the Web of Trust.

I'll give an example.

I know and trust the people A, B, C, D and E. A has signed B, B has 
signed C, C has signed D, D has signed E, and E has signed F. I meet up 
with A, verify their identity, and sign their key. I assign ownertrust 
to A, B, C, D and E. Et voilà, the keys A, B, C, D and E are all valid, 
without me needing to meet up with my other friends to verify their key 
details. A is at level 1, B at 2, C at 3, D at 4, and E at 5. 
Unfortunately, F won't get valid because it is at level 6.


Now suppose C signs F as well. F is now at level 4, so it becomes 
valid. However, I don't trust F, so even if F now signs G, G won't 
become valid.


Signatures indicate verification, not trust or belief. Trust is in your 
trust database or in trust signatures, but the latter are not commonly 
used. Belief is expressed in validity calculated from your trust 
database and signatures. I don't know if you can choose to disagree with 
GnuPG, that is, if you don't believe a key is valid even though GnuPG 
calculated that it is.


I could get back to all the other points you raise, but I think it's a 
waste of time when you have reasoned from the standpoint that to get a 
key to be valid, you need to sign it, and that is how it looks to me.


It's not much of a Web when you don't have any depth... it's more of 
two intertwined strands then ;).


HTH,

Peter.

PS: My ownertrust for E is useless for now, because he/she is at level 
5. However, if I get a shorter path to him or her later, it will become 
useful then.


--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at 
http://digitalbrains.com/2012/openpgp-key-peter


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread Daniel Kahn Gillmor

On 11/07/2013 11:09 AM, Leo Gaspard wrote:

Except they do not have to know X, nor that he makes perfectly reasonable
decisions in signing keys.

And I believe it's not noise. Let's make an example in the real world :
  * I would entrust X with my life
  * X would entrust Y with his life, without my knowing it
  * Thus, if I actually entrusted X with my life, why should I be frightened if 
X
asked Y to take care of me ? Provided, of course, X told me he was letting Y
take care of me. After all, I would entrust X with my life, so I should just
agree to any act he believes is good for me.
(That's what I called blind trust. Somewhat more than full trust, I believe.)


if we're talking about gpg's concept of ownertrust, please do not 
muddy the waters with entrust X with my life?  gpg's ownertrust is 
much more narrow than that: it says I am willing to rely on OpenPGP 
certifications made by the holder of this key.


entrust with my life is not simply a superset of all other trust.  I 
have friends who would take care of me if i was deathly ill.  I would 
place my life in their hands.  But they have never thought about how to 
do rigorous cryptographic identity certification, and I would not rely 
on their OpenPGP certifications.



Let's get back to ownertrust: in the Web of Trust, ownertrust is an expression
of how well you think other people verify identities before they sign a key. If
you sign key K2 based on X's signature, you haven't verified Y's identity.
You've probably verified X's identity, but not Y's. So you shouldn't sign K2.


So, is a signature a matter of belief in the validity of the key or of actual
work to verify the key ?


An OpenPGP certification says I believe that Key X belongs to the 
person identified by User ID U.  Most people would not want to make 
that statement publicly without having thought about it and convinced 
themselves somehow that it is true.  What it takes to convince each 
person may well vary, which is why we assign different ownertrust to 
different people.  When making a public assertion like an OpenPGP 
certification, it is also probably reasonable to ask what the parties 
involved (or the rest of the world) gains from making that statement. 
Just because you believe a statement to be true doesn't mean you need to 
make it publicly, with strong cryptographic assurances, and it may have 
bad consequences.


Also, consider that certifications are not necessarily forever.   If 
Alice relies solely on Carol's certification to believe that key X 
belongs to Bob, and Alice then certifies (Bob,X), what does Alice do if 
Carol revokes her certification?  If Alice doesn't pay attention and 
revoke her own certification, then she is announcing as fact to the 
world something that she should no longer believe to be true (assuming 
that she was relying only on Carol's certification for that belief). 
This sounds like an untenable maintenance situation I personally would 
rather avoid, which is why i do not make public certifications based 
solely on other people's certifications.



If I understood correctly, the depth parameter you are talking about is useless,
except in case there are trust signature. And you agreed with me for them to be
taken out of the equation.


The depth parameter is useful even without trust signatures.  Peter 
Lebbings response upthread describes the scenario.


Regards,

--dkg

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread Leo Gaspard
On Thu, Nov 07, 2013 at 07:21:28PM +0100, Peter Lebbing wrote:
 On 2013-11-07 17:09, Leo Gaspard wrote:
 If I understood correctly, the depth parameter you are talking about
 is useless, except in case there are trust signature. And you agreed with
 me for
 them to be taken out of the equation.
 
 Of course it's not useless. You seem to misunderstand the Web of Trust.
 
 I'll give an example.
 
 I know and trust the people A, B, C, D and E. A has signed B, B has signed
 C, C has signed D, D has signed E, and E has signed F. I meet up with A,
 verify their identity, and sign their key. I assign ownertrust to A, B, C, D
 and E. Et voilà, the keys A, B, C, D and E are all valid, without me needing
 to meet up with my other friends to verify their key details. A is at level
 1, B at 2, C at 3, D at 4, and E at 5. Unfortunately, F won't get valid
 because it is at level 6.

Indeed, I never thought someone would assign ownertrust without verifying the
key. Please accept my apologies.

However, I still believe that, under the condition any ownertrusted key has been
verified (which, I assumed, was commonplace, but I was apparently wrong), the
depth parameter is useless.

 Now suppose C signs F as well. F is now at level 4, so it becomes valid.
 However, I don't trust F, so even if F now signs G, G won't become valid.
 
 Signatures indicate verification, not trust or belief. Trust is in your
 trust database or in trust signatures, but the latter are not commonly used.
 Belief is expressed in validity calculated from your trust database and
 signatures. I don't know if you can choose to disagree with GnuPG, that is,
 if you don't believe a key is valid even though GnuPG calculated that it is.

I'm sorry, I think I gave too much importance to your earlier statement
(Signing is to be an attestation to the validity of the key.), incorrectly
deducing from it that signatures indicates that you should sign whenever you
believe a key is correct as much as if you met in person

 I could get back to all the other points you raise, but I think it's a waste
 of time when you have reasoned from the standpoint that to get a key to be
 valid, you need to sign it, and that is how it looks to me.
 
 It's not much of a Web when you don't have any depth... it's more of two
 intertwined strands then ;).

I think this time, you gave too much importance to some of my sentences. Or
maybe was I too bad at making myself understood.

Anyway, I meant I should sign a key whenever I believe a key to be valid as much
as if I met with the keyowner. Which, of course, does not equates with merely
believing a key is valid. Indeed, on the WoT, one is rarely sure of the quality
of signatures. (Indeed, I believe(d) full ownertrust must be quite rare., for
that same reason ; but I am probably wrong.)

And, now I know assigning ownertrust to not-personnally-checked keys is
relatively common, I know I should not sign keys based on other people's
verification.

However, to come back to the initial problem, I still believe the key change
problem (ie. owner of K1 switchs to K2) does not require re-verifying ownership
etc. (BTW, isn't this also why transition statements, like
https://we.riseup.net/assets/77263/key%20transition were written ?)

But I still wonder how one should deal with key duplication (ie. owner of K1 now
has a second key K2)...

 HTH,
 
 Peter.
 
 PS: My ownertrust for E is useless for now, because he/she is at level 5.
 However, if I get a shorter path to him or her later, it will become useful
 then.

Anyway, thanks for you detailed explanations about the WoT !

Cheers,

Leo

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread Leo Gaspard
On Thu, Nov 07, 2013 at 01:40:22PM -0500, Daniel Kahn Gillmor wrote:
 On 11/07/2013 11:09 AM, Leo Gaspard wrote:
 Except they do not have to know X, nor that he makes perfectly reasonable
 decisions in signing keys.
 
 And I believe it's not noise. Let's make an example in the real world :
   * I would entrust X with my life
   * X would entrust Y with his life, without my knowing it
   * Thus, if I actually entrusted X with my life, why should I be frightened 
  if X
 asked Y to take care of me ? Provided, of course, X told me he was 
  letting Y
 take care of me. After all, I would entrust X with my life, so I should 
  just
 agree to any act he believes is good for me.
 (That's what I called blind trust. Somewhat more than full trust, I believe.)
 
 if we're talking about gpg's concept of ownertrust, please do not muddy
 the waters with entrust X with my life?  gpg's ownertrust is much more
 narrow than that: it says I am willing to rely on OpenPGP certifications
 made by the holder of this key.
 
 entrust with my life is not simply a superset of all other trust.  I have
 friends who would take care of me if i was deathly ill.  I would place my
 life in their hands.  But they have never thought about how to do rigorous
 cryptographic identity certification, and I would not rely on their OpenPGP
 certifications.

Indeed, I thought of this case after having sent my email. Anyway, by blind
trust, I did mean a superset of all trusts related to keysigning.

 Let's get back to ownertrust: in the Web of Trust, ownertrust is an 
 expression
 of how well you think other people verify identities before they sign a 
 key. If
 you sign key K2 based on X's signature, you haven't verified Y's identity.
 You've probably verified X's identity, but not Y's. So you shouldn't sign 
 K2.
 
 So, is a signature a matter of belief in the validity of the key or of actual
 work to verify the key ?
 
 An OpenPGP certification says I believe that Key X belongs to the person
 identified by User ID U.  Most people would not want to make that statement
 publicly without having thought about it and convinced themselves somehow
 that it is true.  What it takes to convince each person may well vary, which
 is why we assign different ownertrust to different people.  When making a
 public assertion like an OpenPGP certification, it is also probably
 reasonable to ask what the parties involved (or the rest of the world) gains
 from making that statement. Just because you believe a statement to be true
 doesn't mean you need to make it publicly, with strong cryptographic
 assurances, and it may have bad consequences.
 
 Also, consider that certifications are not necessarily forever.   If Alice
 relies solely on Carol's certification to believe that key X belongs to Bob,
 and Alice then certifies (Bob,X), what does Alice do if Carol revokes her
 certification?  If Alice doesn't pay attention and revoke her own
 certification, then she is announcing as fact to the world something that
 she should no longer believe to be true (assuming that she was relying only
 on Carol's certification for that belief). This sounds like an untenable
 maintenance situation I personally would rather avoid, which is why i do not
 make public certifications based solely on other people's certifications.

Indeed. I just backed off in my answer to Peter, by understanding why it was not
needed. However, I believe that for the initial problem (ie. key change),
information provided by a signed message accompanied from a UID on the other key
is significant enough, and moreover definite, so I would not be bothered signing
such a new key (of course, also revoking the signature on the old key).

 If I understood correctly, the depth parameter you are talking about is 
 useless,
 except in case there are trust signature. And you agreed with me for them to 
 be
 taken out of the equation.
 
 The depth parameter is useful even without trust signatures.  Peter Lebbings
 response upthread describes the scenario.

Indeed. Thanks for your answer, clarifying once again what signatures mean ! (I
know, I'm slow to understand, but I think I'm OK no.)

Cheers,

Leo

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread Leo Gaspard
On Thu, Nov 07, 2013 at 08:10:11PM +0100, Leo Gaspard wrote:
 I'm sorry, I think I gave too much importance to your earlier statement
 (Signing is to be an attestation to the validity of the key.) [...]

Sorry again, just noticed it actually wasn't you statement, but Paul's !

So, double mistake...

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


question about public key usage

2013-11-07 Thread Smith, Cathy
Hi

Is it possible to have 2 public keys with different expiration dates for the 
same user?  I created a public key a couple of years ago to be used to exchange 
documents with vendors for a batch processing account.  That is working just 
fine.  A new vendor wants our public key but requires the key to have a shorter 
expiration date.  I don't want to distribute a new public key to existing 
customers.

Thank you.

Cathy
---
Cathy L. Smith
IT Engineer

Pacific Northwest National Laboratory
Operated by Battelle for the
U.S. Department of Energy

Phone:  509.375.2687
Fax:509.375.2330
Email:  cathy.sm...@pnnl.gov



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: question about public key usage

2013-11-07 Thread Smith, Cathy
Thank you

The earlier answer got caught at the firewall.  I apologize for posting twice.

Best regards,

Cathy
---
Cathy L. Smith
IT Engineer

Pacific Northwest National Laboratory
Operated by Battelle for the
U.S. Department of Energy

Phone:  509.375.2687
Fax:    509.375.2330
Email:  cathy.sm...@pnnl.gov


-Original Message-
From: Doug Barton [mailto:do...@dougbarton.us] 
Sent: Thursday, November 07, 2013 12:57 PM
To: Smith, Cathy; 'gnupg-users@gnupg.org'
Subject: Re: question about public key usage

On 11/07/2013 12:52 PM, Smith, Cathy wrote:
 Hi
 Is it possible to have 2 public keys with different expiration dates 
 for the same user?  I created a public key a couple of years ago to be 
 used to exchange documents with vendors for a batch processing 
 account.  That is working just fine.  A new vendor wants our public 
 key but requires the key to have a shorter expiration date.  I don't 
 want to distribute a new public key to existing customers.

Someone else already answered this question for you, but the answer effectively 
is yes, however you don't need to do that.

Edit the expiration date on the existing key to match the requirement for the 
new vendor, and then give them that version of the key. There is no reason to 
have multiple keys in this situation.

hope this helps,

Doug


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm and expired certificates

2013-11-07 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 7 November 2013 at 11:16:36 AM, in
mid:87txfotqaz@gilgamesch.quim.ucm.es, Uwe Brauer wrote:



 BTW, I see you switched back to pgp, but why do you use
 old inline mode and not pgpmine?

Because I prefer it. I like to see the pgp signature in the message
body instead of hidden away.




- --
Best regards

MFPAmailto:expires2...@ymail.com

Those who do not read are no better off than those who cannot.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlJ8BO5XFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5psUsD/iQhZWfXfzbDmVs/8vNg4nFRIZ5IXTb3LRU9
MbiKAdH6V6p55PMQ8/z/qJHBXHbnhacnKUMXPvyK71w5kKAnWb2gZfJivJj36axI
h0btBJjCA3d2899fuODBdON1y+q/VgZLfMA5Uj1ILN9AC8SnDrUHUqGDHzeH1xZm
OMbGJVaC
=5KUo
-END PGP SIGNATURE-


smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: question about public key usage

2013-11-07 Thread Doug Barton

On 11/07/2013 01:02 PM, Smith, Cathy wrote:

Thank you

The earlier answer got caught at the firewall.  I apologize for posting twice.


Np, it happens. :)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Signing keys on a low-entropy system

2013-11-07 Thread Johannes Zarl
Hi,

I'm currently thinking about using a raspberry pi as a non-networked stand-
alone system for signing keys. Since I haven't heard anything to the contrary, 
I'm pretty sure that entropy is relatively scarce on the pi.

How is GnuPG affected by such a low-entropy system? Will operations just take 
a bit longer, or can this affect the quality/security of generated keys or 
signatures?

I heard that low entropy or a bad entropy source is generall less of a problem 
for RSA. Is this true? Does this affect me in practice?

Cheers,
  Johannes

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing keys on a low-entropy system

2013-11-07 Thread Leo Gaspard
(Failed again to answer to list. I really ought to replace this shortcut...)

On Fri, Nov 08, 2013 at 12:11:38AM +0100, Johannes Zarl wrote:
 Hi,

 I'm currently thinking about using a raspberry pi as a non-networked stand-
 alone system for signing keys. Since I haven't heard anything to the contrary,
 I'm pretty sure that entropy is relatively scarce on the pi.

I heard haveged is quite good at gathering entropy from anywhere it can
(processor cycles, etc.)

 How is GnuPG affected by such a low-entropy system? Will operations just take
 a bit longer, or can this affect the quality/security of generated keys or
 signatures?

 I heard that low entropy or a bad entropy source is generall less of a problem
 for RSA. Is this true? Does this affect me in practice?

In theory, if /dev/random is configured to allow only random enough data to
pass, it should just mean operations would just take longer. However, I am not
absolutely sure of this -- but I know in theory /dev/random ensures some minimum
entropy, thus sometimes blocking reads.

Cheers  HTH,

Leo

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgsm and expired certificates

2013-11-07 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 7 November 2013 at 11:16:36 AM, in
mid:87txfotqaz@gilgamesch.quim.ucm.es, Uwe Brauer wrote:




 However it is not necessary I just export our signature
 as a pem file and import in under authorities. Still
 this is very uncomfortable...

I had to search for and import some more root certificates from the
Comodo website before I could encrypt to you using my mailer's
built-in s/mime.

Microsoft Crypto-API no use, even after your and comodo's certificates
imported into certmgr.msc. I'm probably doing something wrong there,
but it's not clear what to do.

For something that is supposed to be easier than OpenPGP, s/mime
doesn't seem easy to me.


- --
Best regards

MFPAmailto:expires2...@ymail.com

My mind works like lightning... one brilliant flash and it's gone
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlJ8IW9XFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5p2hIEAJuUrJYztL/8jLXZ525+nGHHzIkKtXDUOTDn
o1DtWyAYMd0UDhAaJsK4aZl5KeiyP+AwjPSAtQExFwz8pg4ywhMx0SUC/3PcmmEs
BlxHRXOhf31d71ndv0gTu1XFVi/2N1dfXZSlI4DO0iOICgnNqIWubwsxkuA8zzBd
3q/j95//
=V2Ln
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust your corporation for keyowner identification?

2013-11-07 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 7 November 2013 at 7:10:11 PM, in
mid:20131107191011.GF470@leortable, Leo Gaspard wrote:


 But I still wonder how one should deal with key
 duplication (ie. owner of K1 now has a second key
 K2)...

If the owner doesn't revoke one, you could always disable one.

One approach might be to contact the owner and ask which key to use.
Or use the newest available key. Or just pick at random. Or encrypt to
both. Or use whichever the owner seems to use themself.

But they might have multiple keys for a reason, such as purpose of
communication. Or one for their phone and another for their computer.


- --
Best regards

MFPAmailto:expires2...@ymail.com

Volvo, Video, Velcro. (I came, I saw, I stuck around.)
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlJ8KGhXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pP6QEALCiKSGC/EnSauln6vySoDer3fua90MUrsGN
ymE70UZ/f7tpe2GfPt7pMiMoLxXubxKXWRK0soSDk77E+FoQlN98jMVt9pwrd+dZ
BFvlIXCJHyIQml4njLn9cOtlnAqY4MAMkPKVMEbTNQOChZRokQylQIFfby4M+D7v
J6nj6a8O
=vTwh
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: unsubscribe

2013-11-07 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Wednesday 6 November 2013 at 7:46:50 AM, in
mid:aa96def1c0ebc54d989e760702dcae32013f23c9a...@stfmsx01.staff.cpce.hk,
Griffin Cheng [CLIB] wrote:



 [nothing]



I thought subscribe and unsubscribe and help requests went to
gnupg-users-requ...@gnupg.org



- --
Best regards

MFPAmailto:expires2...@ymail.com

If you are afraid to speak against tyranny, then you are already a slave.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlJ8KVVXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5p5dcD/2dPvtp9IU1WQfDKDIyjHk9G4yn3pj7dLglH
y9+oGbrBouymtRIA+sNiN67XobrZn3iFzsb3XdKYddTrda/T1ST+qZdR0TY8CGjo
lr0jnSvVgXqdobo2rOjfu7hg9BIa4pH85jtzyAuq1uy2yuUuiV0f+gKxkToA2Wxd
aJmk7s3y
=pY0R
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users