Re: signature from "Thorsten Tpper <xxx@xxxxxxx>" is unknown trust

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



[2013-01-29 04:51:49 +0100] Karol Babioch:
> Am 29.01.2013 04:37, schrieb Gaetan Bisson:
> > Dave's answer certainly misses the real question of why Thorsten would
> > want an expiration date on his GPG key,
> 
> Because its good and common practice. There are several reasons for
> this, one of which is a compromise. When you got compromised and lose
> your revocation certificate, too, the key will expire at some point in time.

So instead of impersonating you for the rest of your life, the attacker
who compromised your key can only do so for a whole year? Well, only a
few hours generally suffice for them to cause terrible damage - that is
certainly true with Arch's package signing infrastructure.

Expiring keys trade ease-of-use for a fake sense of security, so better
avoid them and actually secure your key and revocation certificates. 

> I'm not sure about GPG, but in case of X.509 it also helps to keep the
> certificate revocations lists (CRL) short, as certificates, which are
> expired anyway, don't have to be listed here explicitly.

In my opinion, that's a moot technical point which does not concern GPG.

Cheers.

-- 
Gaetan

Attachment: pgpV_IPT0pjWQ.pgp
Description: PGP signature


[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux