On Sun, 11 Jan 2015 18:37:36 -0800 Brian Dolbec wrote:
> When you add a signing subkey, that subkey then becomes the default key
> used for signing with.  If you have more than one signing subkey, the
> default can be set in gnupg.conf without editing the key.  Otherwise
> you must specify which key to sign with.  It is much easier to
> revoke that signing subkey and add a new one, without the need to
> create an entirely new key, losing all the key signatures it is signed
> with.  If you revoke a primary key, all subkeys it contains are revoked
> as well. In that article the author describes how to generate the
> subkeys and remove the original (master) keypair for installation on a
> laptop, desktop, etc. (separate subkeys for each machine) which may be
> stolen. You keep the original(master) keypair in a secure location (eg:
> bank safe deposit box, etc.) If the laptop is stolen, the thieves do not
> have access to modify the gpg keys (even if they have the password),
> and those specific subkeys can be easily revoked, without losing your
> entire gpg key and the signatures it has accumulated. Using your master
> keypair you generate new subkeys for installation on your replacement
> laptop, and continue...

I still don't understand why requirement of a separate signing
subkey is mandatory in GLEP:63. I solves such a corner case where
other solutions are possible meanwhile, e.g. encrypt your laptop's
HDD, use a LUKS partition on top of it, store password-protected
secret key there. In fact the most dangerous attack is in-memory
breach when key is being stolen from memory without any trace
(Heltzner hosting breach comes to my mind here) and a separate
signing subkey wouldn't help here at all. While this requirement
may improve security a bit, it should go to recommendations and not
to bare minimum stuff. Even document referenced by GLEP:63:
RiseUp.net OpenPGP best practices
[https://we.riseup.net/riseuplabs+paow/openpgp-best-practices]
points out that a separate signing subkey is only an optional bonus:

(bonus) Have a separate subkey for signing, and keep your primary
key entirely offline.

Meanwhile link above is outdated and the following should be used
instead:
https://help.riseup.net/en/security/message-security/openpgp/best-practices

On the other hand GLEP:63 allows weak algos like DSA-2048, which
makes me shivers. Yes, DSA-2048 is not officially broken yet, but
with RSA-1024 already broken in open media I don't trust 2048
algos, especially when they have numerous design flaws (like good
entropy requirement for every signing) and implementations weakness
are likely to be there. Agencies are always a few steps ahead, so
this should be taken into account.

Best regards,
Andrew Savchenko

Attachment: pgpuc0hBaMw1y.pgp
Description: PGP signature

Reply via email to