[Feature Request] Multiple level subkey
Damien Goutte-Gattat
dgouttegattat at incenp.org
Sun Sep 10 19:47:07 CEST 2017
Hello,
On 09/09/2017 12:50 AM, lesto fante wrote:
> Tho achieve that, I think about a multilevel subkey system.
The OpenPGP specification already has some support for a hierarchical
system, in the form of "trust signatures".
(Hereafter, I will use "trust-sign" as a verb to refer to the act of
emitting a trust signature.)
For a 3-levels hierarchy as you describe, you could do the following:
a) You sign your level-3 key(s) with your level-2 key;
b) You trust-sign your level-2 key with your level-1 key, with a trust
depth of 1.
c) Your correspondents trust-sign your level-1 key, with a trust depth of 2.
If your level-1 key is compromised, you revoke it, generate a new one
and sign it with the level-2 key. The new level-1 key will be
automatically valid for your correspondents.
If your level-2 key is compromised, you revoke it, generate a new one,
tsign it with the level-1 key, and use it to re-sign your level-1 key
(although if the level-2 key is compromised, you may want to assume that
the level-1 key is compromised as well, and generate a new one). Again,
the new level-2 key will be valid and trusted by your correspondents,
since it bears a trust signature from the level-1 key.
The problem you may have with this method is that it depends on your
correspondents *trust-signing* your level-1 key. If they use a normal
signature instead (or a trust signature with a trust depth < 2), no
ownertrust will be assigned to the level-2 key and therefore the level-3
key will not be considered valid. So you have to tell your
correspondents to *trust-sign* your level-1 key, but you cannot force
them to do so.
This is kind of a design feature of OpenPGP, by the way: the user is
always free to choose whom he wants to trust, and to what extent. This
is by contrast with the X.509 world, where the fact that a certificate
can only be signed by *one* authority gave rise to an ecosystem of CAs
that are "too-big-to-fail" (or "too-big-to-choose-not-to-trust").
> Now the nice thing: i guess most of the people will use their phone
> to keep the level 2 key, but we know those are not the most secure
> stuff, especially when get old or wit some producer allergic to
> patch.
Slightly off-topic, but using a NFC-enabled token might be an easier way
to deal with that particular concern. I know of at least two such
tokens: the Yubikey NEO [1] and the Fidesmo Privacy Card [2].
Damien
[1] https://www.yubico.com/products/yubikey-hardware/yubikey-neo/
[2] http://shop.fidesmo.com/product/fidesmo-privacy
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20170910/50a67985/attachment.sig>
More information about the Gnupg-users
mailing list