OK, since this is getting to be kind of a whole "thing", I've split it off.

This message is (or should be) signed. Hopefully using PGP/MIME, which,
if I understand Neil correctly, is what I'm supposed to do.

You all have undoubtedly realized by now that I have little experience
and less understanding of GPG keys and their proper use; I only have one
because last year (which is why the key is from 2004), I was
corresponding with someone who preferred encrypted email. Now that I've
got my reinstall relatively stable-- at the time of the key's creation,
I was using Gentoo, which I broke, and in the meantime, I'd switched to
SuSE, where I didn't use my backed-up keyrings at all, and back to
Gentoo-- and got Enigmail working again, I figure it's time to learn at
least how to use my keys properly. Even if I don't seem to have much use
for them now, you never know when it might come in handy.

I think I've pretty much got a handle on full encryption (not only did I
exchange several encrypted mails last year, but today I sent myself a
test mail, which I was able to decrypt), but the signing is kinda wiping
the floor with me, apparently.

OK, so Neil said:

Neil Bothwick schreef:
> On Fri, 24 Jun 2005 17:26:43 +0200, Holly Bostick wrote:
>
>>But this whole episode has at least gotten me to finally upload my own
>>key, so I've (hopefully) signed this message.
>
>
> Yes, but as an inline signature, not as a MIME message part, which is
> the preferred way of doing it.

Right.... that means, I think, that the default setting in Enigmail's
PGP/MIME settings-- "Allow PGP/MIME"-- should be set to "Always use
PGP/MIME". Is that correct? The point being-- as I understand it-- that
MIME parts have something to do with IMAP, which I don't use (yet), but
many others do, especially those likely to be desiring signed or
encrypted mail, so it's just better to use it by default? Fine, then let
me know if this message, transmitted using the new setting, arrived with
the signature correctly as a MIME message part.

Meanwhilst, Rumen said:

> Hi,
> Lately stopped using keyservers very much, but now just tried to
> search/check for your key, the result:
> 1.running: "gpg --keyserver subkeys.pgp.net --search-key Holly" gets this
<snip>
> (10)    Holly Bostick <[EMAIL PROTECTED]>
>           1024 bit DSA key 94456400, created: 2004-07-05
<snip>
> there are many more, reached till 123 and there's more ;)
> 2.running: "gpg --keyserver subkeys.pgp.net --search-key Holly" gets this
> ...BEGIN...
> gpg: searching for "Holly" from hkp server random.sks.keyserver.penguin.de
<snip me not winding up in the first 25 hits>
> ...END...
> Searching with '[EMAIL PROTECTED]' (on both) results the in same one
> entry above.
> This key is from 2004:
> (1)     Holly Bostick <[EMAIL PROTECTED]>
>           1024 bit DSA key 94456400, created: 2004-07-05

Which is my key, so it's out there somewhere. But I am wondering if it
is in some way incomplete or improperly aliased-- or was "Holly" too
general a search as opposed to "Bostick"? Yes, apparently so; replacing
--search-key Holly with --search-key Bostick comes up with me first on
both searches. Not so much that I'm hyped on being first, but at least
it means I'm easily found if someone's looking.

So that seems OK then, but I still have a few questions:

1) My key is set to never expire (afaik). Is that OK, or should I
generate a new key... I dunno, every 3 months or something? That seems
to negate the whole idea of having a key in the first place, but....
what do I know?

2) Do I need to create a digital certificate? Is it any good if it's
self-signed? Or should I go to the archives and find that site that will
 generate one for me?

3) On the same note, I don't have a "Web of Trust"; my key is unsigned
(naturally), and the keys I've collected from this list I have not dared
to specify trust levels for. Should I be concerned about this, and take
steps to rectify the situation with all due haste? If so, how would I go
about that? All I've heard of are key-signing parties, which seem
unlikely be a feasible option for me.

4) Clearly no one I am in contact with seems to really care if I sign my
emails by default, but should I protect them from themselves and do so
anyway? Are there any benefits to this good habit, especially since my
key is unsigned anyway?

5) If I take up the habit of signing my emails, is it unreasonably
dangerous to also set "No password for user" in the Enigmail options? I
know that if I have to dig up my complex and unique password every time
I send an email (in order to sign it), I'm not going to sign them, but
if not requiring the complex and unique password opens a high
possibility of compromising the key itself (because if I was hacked,
said miscreant could send signed emails "from me" because s/he doesn't
have to know the complex and unique password in order to do so), then I
suppose I'd have to just suck it up (assuming that there's some
overriding benefit in me taking up this habit in the first place).

Anyway, I know it's OT, and sorry for hijacking the thread in the second
place, but if there's anyone who'd like to explain this to me in
relatively simpler terms than man gpg or the GNUPG site, I'd appreciate it.

Holly

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to