On Dec 11, 2010, at 2:55 PM, Ben McGinnes wrote:

>> You can't actually turn on or off certify (which is to sign a key -
>> either your own or someone elses).  In OpenPGP, the primary key can
>> always certify (it may be able to encrypt/sign/authenticate as well,
>> but the only strict requirement is that it must be able to certify).
>> Without the ability to certify, you could never make a subkey, since
>> subkeys are signed by the primary key.
> 
> Cool.  On a tangential note, could this be used as a basis for
> applying a PKI/WoT model to certification of SSL keys, rather than
> relying on CAs?

Yes indeed.  See http://web.monkeysphere.info/ for a project using the WoT for 
both SSH and HTTPS.

>> Once you make that primary key, you just add subkeys for whatever
>> capabilities you desire.  Again, the defaults are recommended (they
>> are correct for virtually everyone).  I'd add a sign-only subkey and
>> an encrypt-only subkey.  GnuPG will automatically use the subkey for
>> signing over the primary key for signing.
> 
> I assume this means that if the primary key can sign & certify, that
> key will still be used to sign other keys even if there is a specific
> signing subkey for messages and files.  Right?

Right.  Since only the primary can certify, it will be automatically chosen 
whenever you try to sign another key.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to