Mon, 12 Jun 2000 15:06:41 -0700 (PDT)
-----BEGIN PGP SIGNED MESSAGE-----
On Mon, 12 Jun 2000, Stefan H. Holek wrote:
> On Thu, 8 Jun 2000, L. Sassaman wrote:
> > On Thu, 8 Jun 2000, Stefan H. Holek wrote:
> > > On Thu, 8 Jun 2000, L. Sassaman wrote:
> > >
> > > > The longer the lifetime of a key, the more likely the key is to be
> > > > compromised. If you chose to retire a key, be sure to link your new key
> > > > with the old by signing it with the old before the old key expires.
> > >
> > > Does this mean an expired key can still be used for computing trust?
> > Yes. Read RFC 2440 if you're really interested.
> This is gnupg-USERS, isn't it?
Sure. Which is why I wasn't about to get into the fine details... most
people wouldn't be interested, and the RFC answers all the questions you
might have in depth.
> Any user-level documentation on this?
None that I know of. There is the Gnu Privacy Handbook, which is kind of
spotty. I'm covering GnuPG in my upcoming email security book, but that's
not going to be available until next year.
> I obviously was missing that part
> and consider it valuable information, but knowing the packet formats does
> not help much. I am not planning to do an implementation in the near
Heh, I wasn't suggesting you pay attention to the packet formats... I
didn't mean to come across in the way that I apparently did. Sorry...
System Administrator | "If you chose not to decide,
Technology Consultant | you still have made a choice"
icq.. 10735603 |
pgp.. finger://ns.quickie.net/rabbi | --Rush
-----BEGIN PGP SIGNATURE-----
Comment: OpenPGP Encrypted Email Preferred.
-----END PGP SIGNATURE-----