Possible bug: addkey can create certifying subkey
James P. Howard, II
jh at jameshoward.us
Mon Aug 31 19:24:44 CEST 2009
I am not sure if this is a bug, but given the documentation it is not
the expected behavior. I created new keys this weekend, due to a lost
USB drive. Replicating it here, if you specify --expert and create a
RSA subkey with all the options off, it will create a subkey with all
the options, including certification turned on. Here's a slightly
edited transcript:
howardjp at thermopylae:~$ gpg --expert --edit 0xE6602099
Secret key is available.
pub 4096R/0xE6602099 created: 2009-08-30 expires: never usage: C
trust: ultimate validity: ultimate
sub 2048R/0xFCB31625 created: 2009-08-30 expires: never usage: E
sub 2048R/0xA40883BA created: 2009-08-30 expires: never usage: A
sub 2048R/0x2C3602D7 created: 2009-08-30 expires: never usage: S
sub 2048R/0x3EE4249E created: 2009-08-30 expires: never usage: S
[ultimate] (1). James Patrick Howard, II
Command> addkey
Key is protected.
You need a passphrase to unlock the secret key for
user: "James Patrick Howard, II"
4096-bit RSA key, ID 0xE6602099, created 2009-08-30
Please select what kind of key you want:
(3) DSA (sign only)
(4) RSA (sign only)
(5) Elgamal (encrypt only)
(6) RSA (encrypt only)
(7) DSA (set your own capabilities)
(8) RSA (set your own capabilities)
Your selection? 8
Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions: Sign Encrypt
(S) Toggle the sign capability
(E) Toggle the encrypt capability
(A) Toggle the authenticate capability
(Q) Finished
Your selection? s
Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions: Encrypt
(S) Toggle the sign capability
(E) Toggle the encrypt capability
(A) Toggle the authenticate capability
(Q) Finished
Your selection? e
Possible actions for a RSA key: Sign Encrypt Authenticate
Current allowed actions:
(S) Toggle the sign capability
(E) Toggle the encrypt capability
(A) Toggle the authenticate capability
(Q) Finished
Your selection? q
RSA keys may be between 1024 and 4096 bits long.
What keysize do you want? (2048)
Requested keysize is 2048 bits
Please specify how long the key should be valid.
0 = key does not expire
<n> = key expires in n days
<n>w = key expires in n weeks
<n>m = key expires in n months
<n>y = key expires in n years
Key is valid for? (0)
Key does not expire at all
Is this correct? (y/N) y
Really create? (y/N) y
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
pub 4096R/0xE6602099 created: 2009-08-30 expires: never usage: C
trust: ultimate validity: ultimate
sub 2048R/0xFCB31625 created: 2009-08-30 expires: never usage: E
sub 2048R/0xA40883BA created: 2009-08-30 expires: never usage: A
sub 2048R/0x2C3602D7 created: 2009-08-30 expires: never usage: S
sub 2048R/0x3EE4249E created: 2009-08-30 expires: never usage: S
sub 2048R/0xB892F408 created: 2009-08-31 expires: never usage: SCEA
[ultimate] (1). James Patrick Howard, II
Command> quit
Save changes? (y/N) n
Quit without saving? (y/N) y
howardjp at thermopylae:~$ gpg --version
gpg (GnuPG/MacGPG2) 2.0.12
libgcrypt 1.4.4
Copyright (C) 2009 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA
Cipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128,
CAMELLIA192, CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
howardjp at thermopylae:~$
--
James P. Howard, II, MPA
jh at jameshoward.us
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20090831/f5aee472/attachment.pgp>
More information about the Gnupg-users
mailing list