Renewing expiring key - done correctly?

Eric Poellinger epoellinger at yahoo.com
Wed Dec 4 03:32:53 CET 2013


First, thank you for taking the time to reply!

Regarding the steps I took to expire the keys (4A4DBDC7 is the primary key, 0C0305EC is the sub)
1. gpg --edit-key 4A4DBDC7 
1a. expire...2y
1b. enter passphrase
1c. quit and save

2. same as #1, but for the sub-key

I am not 100% sure what you mean by 'marking' the key - and I assume the 'quit and save' is saving the key ring



Regarding the "renewal" best practice I am thinking about scenarios where you have automated file transfers and how to minimize the coordination effort so as not to disrupt and data flows.  For example, if process runs every 10 minutes to encrypt, sign and send a file, do you just have to accept there is some 'downtime' while you update the key, send it to the trading partner and have them import it?  What if the trading partner requires lots of paperwork (e.g. banks) like faxes on top of emails?!

Thanks again for your support.



On Tuesday, December 3, 2013 5:44 PM, Hauke Laging <mailinglisten at hauke-laging.de> wrote:
 
Am Di 03.12.2013, 08:22:28 schrieb Eric Poellinger:

> PRIMARY QUESTIONS - I am uncertain about the sub-key.  When I attempt to
> 'expire' it the date does not seem to change.

What exactly did you do? Did you mark the subkey before and did you save the 
changes to the keyring after the expire command?

gpg> key 1

pub  3072R/0x711D8152  created: 2013-11-27  expires: 2014-11-27  usage: SCE 
                       trust: ultimate      validity: ultimate
sub* 2048R/0x48C7F0CD  created: 2013-11-27  expires: 2015-12-03  usage: S  

[...]

gpg> save


> Maybe you cannot expire a sub-key?

You can.



> SECONDARY QUESTION - is there documentation regarding 'best practices' on
> managing expiring keys and renewing via sub-keys --- my theory is that
> doing it this way minimizes the coordination necessary but I am not
> understanding how it works if you have multiple trading partners to
> coordinate with.

Expiration serves two purposes:
1) Passively revoke a key if you have lost access to the secret mainkey (i.e. 
to the key itself or to its passphrase).
2) Force your communication partners (people are lazy) to update your 
certificate from time to time (requires some understanding on their side).

The length of the validity period is a compromise between higher "security" 
and less inconvenience (your own, too).

I am not sure whether I understand correctly what you mean by "renewing". You 
can prolong the validity of subkeys and you can replace subkeys. It's not a 
big difference for your communication partners. Replacing subkeys for security 
reasons makes real sense only if you use a secure offline mainkey.

Usually you upload your certificate (public key) to a key server (or more) 
from where everyone can get updates of your certificate.


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
An HTML attachment was scrubbed...
URL: </pipermail/attachments/20131203/ebcdc0b7/attachment-0001.html>


More information about the Gnupg-users mailing list