On Fri, 07 Jun 2013 13:22:04 -0700
Doug Barton <do...@dougbarton.us> wrote:

> I'm not sure where you're getting this "15 years" number.

Up until now I've usually went with short-lived (1-2 years) keys. After
each period I'd simply replace them with completely new ones. Since
this can be a bit cumbersome, I wanted to set-up master key with a bit
longer validity period.

The 15 years felt good enough for me to have a nice longer-living trust
anchor without overdoing it (lots of X.509-based CAs out there have
validity of 20-25 years, but to me it feels a bit too long).

Of course, in case of some serious cryptographic attacks on RSA keys, I
may need to revoke the key long before those 15 years expire.

Truth be told, figuring out the validity of keys/certificates in PKI is
probably one of those things where you have to guess more than anything
else. In general, the way I see it it's a trade-off between convenience
and security (where security is actually very hard to figure out).

Best regards

-- 
Branko Majic
Jabber: bra...@majic.rs
Please use only Free formats when sending attachments to me.

Бранко Мајић
Џабер: bra...@majic.rs
Молим вас да додатке шаљете искључиво у слободним форматима.

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to