On Thu, Nov 29, 2012 at 04:02:45PM -0500, Wietse Venema wrote: > Bastian Blank: > > Much worse, it is a PGPv3 RSA key. Such keys are not longer safe for use > You're mistaken. It's from PGP5.
Maybe it was generated with PGP 5. This piece of software supports both formats. The easiest to see clue is the finger print format. Also "gpg --list-packets" can show all the informations about this key: | :public key packet: | version 3, algo 1, created 1109621594, expires 0 | pkey[0]: [2048 bits] | pkey[1]: [5 bits] | :user ID packet: "Wietse Venema <wie...@porcupine.org>" | :signature packet: algo 17, keyid 627B5F14C259C785 | version 3, created 1179714190, md5len 5, sigclass 0x10 | digest algo 2, begin of digest 41 68 | data: [157 bits] | data: [151 bits] A real v4 key looks like this: | :public key packet: | version 4, algo 1, created 1316795861, expires 0 | pkey[0]: [4096 bits] | pkey[1]: [17 bits] | :user ID packet: "Greg Kroah-Hartman (Linux kernel stable release signing key) <g...@kroah.com>" | :signature packet: algo 17, keyid 3147D40DDB2DFB29 | version 4, created 1316796404, md5len 0, sigclass 0x10 | digest algo 2, begin of digest b1 cf | hashed subpkt 2 len 4 (sig created 2011-09-23) | subpkt 16 len 8 (issuer key ID 3147D40DDB2DFB29) | data: [160 bits] | data: [160 bits] Bastian -- Hailing frequencies open, Captain.