Using GnuPG subkeys at two insecure locations

Raphaël Poss gnupg at raphael.poss.name
Mon Feb 27 14:06:57 CET 2006


Hi all,

I have read Adrian's tutorial at http://fortytwo.ch/gpg/subkeys and 
related documents, and I am yet unsure how to apply this technique to my 
situation where I have _two_ "insecure" locations instead of one.

You will find below: description of situation, my needs, how I did 
achieve something using Adrian's technique for my needs, tests, and 
additional questions. You can jump straight to the end if you are not 
interested by the details.


Here is the situation:

- laptop as main personal computer, carried around and therefore 
not-so-secure,

- windows workstation at work, not-so-secure as well,

- some other computer in "hidden" place, secure and not connected to the 
internet.


What I would like to:

- send encrypted email with the insecure computers,

- sign email with both insecure computers,

- send encrypted-to-self email from the windows workstation, that can be 
decrypted on the laptop

- sign other keys with the laptop

- read encrypted emails sent by other people to me on the laptop

- no private encryption key on the windows workstation

- have a subkey for "secure" communication attached to my primary key, 
so that people can send me stuff that can be read only on my secure computer


Here is what I did on the secure computer:

1. create a primary DSA key id# 0x5024FAE3

2. create a DSA signing subkey id# 0x66808804 for use on the windows 
workstation

3. create a DSA signing subkey id# 0xACD488B7 for use on the laptop

4. create an EL-Gamal encryption subkey id# 0xB8838617 for use on the laptop

5. create an El-Gamal encryption subkey id# 0x7FEFD6B8 for use on the 
secure computer

6. export public keys to file

7. backup everything

8. delete 0xACD488B7 0xB8838617 0x7FEFD6B8

9. export secret subkeys 0x66808804, import them on windows workstation 
with public keys

10. restore everything

11. mark 0xACD488B7 as able to sign other keys

12. delete  0x66808804  0x7FEFD6B8

13. export secret subkeys 0xACD488B7 0xB8838617, import them on laptop 
with public keys

14. restore everything


Here are the tests I did:

- send signed mail and verify them on either insecure computer or 
3rd-party with access to only public keys

- send encrypted mail with any computer and decrypt it on the laptop

- encrypt data using the secure key, decrypt it on the secure computer

Here are the tests I did not do yet (as of today, I don't have access to 
the secure computer):

- sign other keys, check signatures, etc.

- sign other keys on the laptop without access to the primary key,

- test everything with PGP




Now, questions:

Q1. how do you think other software (PGP, old GPG, ...) behave when they 
see multiple encryption public subkeys?

Q2. will signatures on other keys made with the laptop be recognised by 
other software? Is there anything I should care for w.r.t trust when I 
sign keys?

Q3. do you think it is better I do not entrust the laptop subkey to sign 
other keys?

For that last question I have to state the difference between the 
windows workstation and the laptop: the laptop is "more" secure than the 
workstation. If the laptop is compromised I would know about it 
immediately, and issue any relevant revocation certificates straight 
away. Any encrypted data on the laptop is deleted securely after I have 
decrypted it.

The windows workstation is quite secure (read: well-maintained 
configuration, good IT staff and workplace access control) but could be 
compromised at any time *by the company* without me knowing it, and data 
backups including my secret keyring will float around for several years. 
I will probably revocate company-related keys only when I leave the 
employment. Or maybe on a yearly basis. I don't know yet.

Therefore, any signature made with the laptop before the key is revoked 
should be trusted (as much as a signature made with the primary key), 
whereas any signature made with the windows workstation is valid only 
inside the company.

Q4. How can I mark my level of trust for the different subkeys using gnupg?


Thanks in advance for any enlightenment,

-- 
Raphaël Poss







-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: OpenPGP digital signature
Url : /pipermail/attachments/20060227/da012626/signature-0001.pgp


More information about the Gnupg-users mailing list