Re: 'sign (and cert)' or just 'cert' on a master key with subkeus

2017-07-30 Thread Robert J. Hansen
> Would anyone know if there is some documented best practice ? The standard advice applies: stick with the defaults. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: 'sign (and cert)' or just 'cert' on a master key with subkeus

2017-07-30 Thread Andrew Gallagher
> On 30 Jul 2017, at 21:19, Dirk-Willem van Gulik wrote: > > I see a growing number of keys that have well managed & expired separate > subkeys for Signing, Encryption and Authentication switch from ‘SC’ on the > master key to just ‘C’ (all RSA, ignoring DSA). > > Would anyone know if there i

'sign (and cert)' or just 'cert' on a master key with subkeus

2017-07-30 Thread Dirk-Willem van Gulik
I see a growing number of keys that have well managed & expired separate subkeys for Signing, Encryption and Authentication switch from ‘SC’ on the master key to just ‘C’ (all RSA, ignoring DSA). Would anyone know if there is some documented best practice ? Dw __

Scripted reset of PINs on smartcards.

2017-07-30 Thread Dirk-Willem van Gulik
Am I right in understanding that, unless one wants to get into chat-expect and a fair bit of state logic behind a `fake’ pinentry — one cannot easily edit the PINs on a (fresh) smartcard by piping in a command sequence? And in order to do so - does one really have to talk to the scdaemon directl

caching of keys (passwords) during signing v.s. during --quick-add-subkey.

2017-07-30 Thread Dirk-Willem van Gulik
When I pre-cache a password of a fresh key: # Generate key gpg2 --batch --passphrase foo --quick-generate-key t...@test.com rsa4096 sign 5 .. extract keygrip of just regenated keys... # Precache password for next operations: gpg-preset-passphra

Re: gpgsm, keygrip

2017-07-30 Thread Dirk-Willem van Gulik
> On 30 Jul 2017, at 12:39, Dirk-Willem van Gulik wrote: > > Tools such as > > gpg-preset-passphrase > > require the 40 character keygrip. The manpage of gpg-preset-passphrase(1) > suggest that this is best extracted from > > gpgsm > > and that works nicely > > gpgsm --dump-

gpgsm, keygrip

2017-07-30 Thread Dirk-Willem van Gulik
Tools such as gpg-preset-passphrase require the 40 character keygrip. The manpage of gpg-preset-passphrase(1) suggest that this is best extracted from gpgsm and that works nicely gpgsm --dump-secret-key | grep keygrip: keygrip: 123456789012345678901234567890123456789