I think 4096 is enough for me, I don’t want to key of length 8192.

I was just suggesting that the key generation dialogue in gpg could
be improved.

Sandeep Murthy
s.mur...@mykolab.com

> On 5 Jan 2015, at 22:46, Nex6|Bill <n6gh...@yahoo.com> wrote:
> 
>> 
>> On Jan 5, 2015, at 7:54 AM, Sandeep Murthy <s.mur...@mykolab.com> wrote:
>> 
>> Hi
>> 
>> I have a couple of questions about key generation, subkeys and the 
>> documentation
>> on gnupg.org.
>> 
>> (FYI I have GnuPG/MacGPG (v. 2.0.26) on my Mac.)
>> 
>> 1. I just tried to generate an RSA keypair using `gpg` on the command line, 
>> and it
>> asks me to choose a key length between 1024 and 8192.  Here is the relevant 
>> output
>> from my terminal session:
>> 
>>    RSA keys may be between 1024 and 8192 bits long.
>>    What keysize do you want? (2048) 8192
>>    Requested keysize is 8192 bits
>> 
>> I thought the maximum was 4096?  For example, GPGKeychain (the GUI keychain
>> utility from the GPGTools suite which installs the GnuPG/MacGPG) doesnt’t 
>> allow
>> key sizes bigger than 4096.  In any case, choosing 8192 fails with `gpg`:
>> 
>>    gpg: keysize invalid; using 4096 bits
>> 
>> Shouldn’t this be changed to ensure that 4096 is the limit, or is it 
>> possible to have
>> an 8192 length RSA key or this limited by the current capabilities of the 
>> random
>> number generator?
>> 
>> 2. The key generation dialogue for v. 2.0.26 (started by `gpg —gen-key`) 
>> shows
>> the following list of options for keys:
>> 
>>    Please select what kind of key you want:
>>   (1) RSA and RSA (default)
>>   (2) DSA and Elgamal
>>   (3) DSA (sign only)
>>   (4) RSA (sign only)
>> 
>> As a user this is confusing to see, for example, RSA and RSA - of course I 
>> worked
>> out afterwards that this was going to generate two keypairs one for 
>> signatures (S),
>> the other for encryption (E), but at the moment it’s just confusing, even if 
>> have to
>> generate new keys again.  There is also no explanation that the public key 
>> itself is
>> a pair of keys, one which actually makes the signatures using the private 
>> key, and
>> the other (subkey) which others use to encrypt messages to you.
>> 
>> Also these subway codes S, E, and also C, A are not explained at all - I had 
>> to
>> lookup the source code (‘keyedit.c` in the `/g10/ subfolder of the source 
>> folder) to
>> guess at what they mean.
>> 
>> For example, here is the information provided by `gpg` for my keybase.io 
>> public key:
>> 
>> pub  4096R/9EAB92B4  created: 2014-12-30  expires: never       usage: SCEA
>>                     trust: ultimate      validity: ultimate
>> sub  2048R/238026C5  created: 2014-12-30  expires: 2022-12-28  usage: S
>> sub  2048R/66C9185A  created: 2014-12-30  expires: 2022-12-28  usage: E
>> [ultimate] (1). keybase.io/sandeepmurthy <sandeepmur...@keybase.io>
>> 
>> There should be an explanation surely of what S C E A mean: S (signatures),
>> E (encryption), C (creating a certificate) and A (authentication?).
>> 
>> 3. At the moment the documentation on gnupg.org - both the manuals and the
>> privacy handbook - are out of date for v. 2.x+), e.g. the privacy handbook
>> https://www.gnupg.org/gph/en/manual/c14.html showing the possible keypair
>> choices as
>> 
>>   (1) DSA and ElGamal (default)
>>   (2) DSA (sign only)
>>   (4) ElGamal (sign and encrypt)
>> 
>> which is obviously different from what the current one version allows.  
>> Perhaps
>> there should be a much better explanation of subways and the codes S, C, E, 
>> A,
>> because I don’t think it’s there right now.  Since the handbook is aimed at 
>> first
>> time users it seems these updates should be (and could be) made very quickly.
>> 
>> I use GnuPG but I would also like to contribute.  Would it be possible to 
>> clone
>> the repo and make a pull request or something like that?
>> 
>> Sandeep Murthy
>> s.mur...@mykolab.com
> 
> 
> I believe the recommendation from the GPG folks is a 2048 key pair. But I 
> have seen some of the more paranoid privacy folks doing 4096 key pairs.
> 
> Other than that most of the defaults are good.
> 
> Nex6

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to