On Jul 27, 2009, at 8:29 AM, Daniel Kahn Gillmor wrote:

And: You can only encrypt the files for one key. So only one user will have access to the files (owns the files), as long as you don't share the keys. For example you can introduce company wide keys or deparmtement keys and distribute
them to anyone, who should have access.

You actually can encrypt files to more than one OpenPGP key, so that
anyone holding any of the recipient keys can decrypt the data.  Maybe
this approach would be useful for the OP?

If, as IT administrator, you have the opportunity to configure your
users' ~/.gnupg/gpg.conf, you could add a line like

 recipient 0xDEADBEEFDEADBEEF

to specify that all encryptions will automatically be encrypted to a key that you retain for the kind of emergency recovery scenarios you describe.

I'd use "encrypt-to" instead of "recipient", but basically, yes, that will work. It's a reasonably common solution for the problem.

This is similar in effect to PGP.com's additional decryption key (the ADK has better granularity as it works on a per-key basis, but the concept is the same). However, note that this (and the ADK) both are only really effective with an honest user. If a user wants to manipulate their key to remove the ADK (which is trivial) or edit their gpg.conf to remove the extra encrypt-to line, then you'd need a more central (and not under user control) way to guard against trouble. For example, if we're just talking about email, you could tweak your mail server to check to see if the extra recipient was present and if not, reject the message, etc. I believe the PGP folks have some variant of this ability, but you'd have to ask them for the details.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to