On 31/10/17 01:08, Lachlan Gunn wrote:
> I'm not sure that this is 100% correct.  The first part is true, but 
> signatures
> of a key that has been revoked because it was superseded or lost are valid up 
> to
> the revocation date, whereas ROCA-affected keys are compromised to some degree
> and so all signatures are suspect; the revocation status should, ideally,
> reflect this.

Oh, I was talking about a ROCA-affected *subkey* but a clean primary key, where
the subkey was already revoked by the primary key. I think you are talking about
a ROCA-affected primary key.

A ROCA-affected primary key should be revoked as *compromised*, replaced and not
used in any capacity.

And yes, the subkey should also be revoked with reason "compromised", for the
reason you state.

To clarify, do you agree if I reword the paragraph you contest as:

But, I agree that the reverse is not true: a compromised subkey does not
compromise the primary key in any way I can think of. And systems
checking for ROCA should not reject a certificate because there is
something wrong with an already revoked subkey.

The only change is in the last word :-).

HTH,

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at <http://digitalbrains.com/2012/openpgp-key-peter>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to