On Thu, Nov 29, 2012 at 04:02:45PM -0500, Wietse Venema wrote:
> Bastian Blank:
> > Much worse, it is a PGPv3 RSA key. Such keys are not longer safe for use
> You're mistaken. It's from PGP5.

Maybe it was generated with PGP 5. This piece of software supports both
formats. The easiest to see clue is the finger print format. Also
"gpg --list-packets" can show all the informations about this key:

| :public key packet:
|         version 3, algo 1, created 1109621594, expires 0
|         pkey[0]: [2048 bits]
|         pkey[1]: [5 bits]
| :user ID packet: "Wietse Venema <wie...@porcupine.org>"
| :signature packet: algo 17, keyid 627B5F14C259C785
|         version 3, created 1179714190, md5len 5, sigclass 0x10
|         digest algo 2, begin of digest 41 68
|         data: [157 bits]
|         data: [151 bits]

A real v4 key looks like this:

| :public key packet:
|         version 4, algo 1, created 1316795861, expires 0
|         pkey[0]: [4096 bits]
|         pkey[1]: [17 bits]
| :user ID packet: "Greg Kroah-Hartman (Linux kernel stable release signing 
key) <g...@kroah.com>"
| :signature packet: algo 17, keyid 3147D40DDB2DFB29
|         version 4, created 1316796404, md5len 0, sigclass 0x10
|         digest algo 2, begin of digest b1 cf
|         hashed subpkt 2 len 4 (sig created 2011-09-23)
|         subpkt 16 len 8 (issuer key ID 3147D40DDB2DFB29)
|         data: [160 bits]
|         data: [160 bits]

Bastian

-- 
Hailing frequencies open, Captain.

Reply via email to