Renewing expiring key - done correctly?

Hauke Laging mailinglisten at hauke-laging.de
Wed Dec 4 01:49:21 CET 2013


Am Di 03.12.2013, 19:26:09 schrieb Robert J. Hansen:

> Could you please share a realistic scenario by which an attacker could
> compromise a subkey without also having the ability to compromise the
> primary signing key?

That's really easy: In order to get access to the subkey which will sign this 
email you just need online access to the system on which I write this email. A 
system which is used to read a lot of email, for IM and for accessing the WWW.

It may (should) be harder to crack this system than it would be with the 
average system but it is without doubt possible (in the usual sense).

Compromising the respective mainkey is more difficult by several orders of 
magnitude. You would have to compromise at least the boot medium (CD/DVD) or 
the hardware I use.


> 	* There exist risk models in which an 'insecure system,' as
> 	  you would call it, is a perfectly reasonable place to
> 	  store a secret primary signing key

Of course. But these risk models are incompatible with the requirements of 
crypto usage in a business environment. They are even incompatible with a real 
Web of Trust.


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 572 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20131204/6ce60b24/attachment.sig>


More information about the Gnupg-users mailing list