Migrating keys

Neil Williams linux at codehelp.co.uk
Tue Nov 25 19:49:53 CET 2003


On Monday 24 Nov 2003 10:49 pm, Jens Kubieziel wrote:
> Hi,
>
> I'm planning to migrate to a new generated key (0x38CB4232). Currently i
> have lots of signatures on my recent key (0xEE0977E8). Therefore I'm
> planning to write all signees an signed and encrypted mail requesting for
> a signature to my new key. Because they verified my old key and I through
> signing with my old key I assure that also the new key belongs to me.
>
> Do you think that behaviour is appropriate or do I have an error in
> reasoning?

I've thought about that before and I've put a page on the DCLUG website that 
outlines what I hope is a decent method. Now's as good a time as any to ask 
if others think it'll work!
http://www.dclug.org.uk/linux_doc/gnupgsign.html#transfer

Can I transfer signatures to a new key?

If a key that has not been compromised needs to be revoked (or is due to 
expire soon), it is possible to transfer signatures onto a new key by sending 
encrypted details to each signatory, provided you still have the passphrase.

1.	Send an email warning / reminder about the imminent replacement of the key 
(signed with the old key because that's the key that people will recognise) 
to each signatory.
 
2.	Ask each signatory to send a SIGNED and encrypted reply to the OLD key 
containing some quote / random text. It's important that the reply is signed 
so that you can trust the quote / random text.
 
3.	Sign each key with your new key as the emails come in and make sure that 
all the recipient keys are updated on keyservers.
 
4.	Send an encrypted reply to each signatory, including the appropriate quote 
/ random text and the fingerprint of the new key and make sure that the reply 
email is signed with your NEW key. Don't revoke signatures made using the old 
key - they are still valid as long as the old key has not been compromised.
 
5.	Recipients can update their own keys from keyservers, verify that the new 
key signature is on their own key and check the fingerprint of your new key. 
Recipients can also revoke their signatures on your old key at this point. 
Many recipients would then be willing to sign the new key as there has been 
an encrypted transfer of data requiring both of the secret keys involved to 
be available to you alone.
 
6.	Once you've sent out all the replies to signatories, you can revoke the old 
key (or just let it expire). Don't delete it from your keyring or you'll lose 
the ability to read encrypted emails sent to you before the new key was 
generated.

I'll update the page if there are omissions.
I've used the method once with someone I know very well and it was our 
discussions that raised the idea for the page. I'd appreciate comments on how 
it'll work for signatories who are not in continued, regular, contact - 
people you met at expo's etc.

-- 

Neil Williams
=============
http://www.codehelp.co.uk/
http://www.dclug.org.uk/
http://www.isbn.org.uk/
http://sourceforge.net/projects/isbnsearch/

http://www.biglumber.com/x/web?qs=0x8801094A28BCB3E3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: signature
Url : /pipermail/attachments/20031125/cb6f7632/attachment.bin


More information about the Gnupg-users mailing list