On 08/13/2010 07:25 PM, Milan Kupcevic wrote:
> Chris Knadle wrote:
> 
>> If you look at the signatures of my key [0x6A9FDD74], I think
>> you'll see something interesting which will also likely answer your
>>  question.
> 
> Hm, the signature in question is valid exactly 5 years after the
> signing date.

yup, i'm currently making most of my certifications with a 5-year
expiration date.  This is a compromise between the commonly-used X.509
model (1-year certifications, regular renewals and hassles) and the
commonly-used OpenPGP model (no expiration, no real infrastructure to
ensure that a key remains under control of the certified party).

I did this by adding the ask-cert-expire flag to gpg.conf (in
particular, to ~/.caff/gnupghome/gpg.conf, since i use caff for most of
my OpenPGP certifications).  This is *not* the default for recent
versions of GnuPG.

I'm not convinced that my current approach is a great one, and i'd be
happy to discuss it with people who feel strongly one way or the other
(maybe gnupg-us...@gnupg.org would be a better forum than
debconf-discuss, though).

I suspect that we need better infrastructure, including tools which
alert the user when some of their own certifications are due to expire.
 If those alerts provided an easy way to do sensible things (e.g. follow
up in a standard manner with the keyholder, or directly re-issue the
cert if the user knows it to still be good), even better.

Regards,

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Debconf-discuss mailing list
Debconf-discuss@lists.debconf.org
http://lists.debconf.org/mailman/listinfo/debconf-discuss

Reply via email to