summaryrefslogtreecommitdiffstats
path: root/zarb-ml/mageia-dev/20110131/002398.html
diff options
context:
space:
mode:
Diffstat (limited to 'zarb-ml/mageia-dev/20110131/002398.html')
-rw-r--r--zarb-ml/mageia-dev/20110131/002398.html117
1 files changed, 117 insertions, 0 deletions
diff --git a/zarb-ml/mageia-dev/20110131/002398.html b/zarb-ml/mageia-dev/20110131/002398.html
new file mode 100644
index 000000000..53bc05c7b
--- /dev/null
+++ b/zarb-ml/mageia-dev/20110131/002398.html
@@ -0,0 +1,117 @@
+<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
+<HTML>
+ <HEAD>
+ <TITLE> [Mageia-dev] PGP keys and package signing
+ </TITLE>
+ <LINK REL="Index" HREF="index.html" >
+ <LINK REL="made" HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20PGP%20keys%20and%20package%20signing&In-Reply-To=%3C20110131191224.GM21938%40mars-attacks.org%3E">
+ <META NAME="robots" CONTENT="index,nofollow">
+ <META http-equiv="Content-Type" content="text/html; charset=us-ascii">
+ <LINK REL="Previous" HREF="002397.html">
+ <LINK REL="Next" HREF="002399.html">
+ </HEAD>
+ <BODY BGCOLOR="#ffffff">
+ <H1>[Mageia-dev] PGP keys and package signing</H1>
+ <B>nicolas vigier</B>
+ <A HREF="mailto:mageia-dev%40mageia.org?Subject=Re%3A%20%5BMageia-dev%5D%20PGP%20keys%20and%20package%20signing&In-Reply-To=%3C20110131191224.GM21938%40mars-attacks.org%3E"
+ TITLE="[Mageia-dev] PGP keys and package signing">boklm at mars-attacks.org
+ </A><BR>
+ <I>Mon Jan 31 20:12:24 CET 2011</I>
+ <P><UL>
+ <LI>Previous message: <A HREF="002397.html">[Mageia-dev] PGP keys and package signing
+</A></li>
+ <LI>Next message: <A HREF="002399.html">[Mageia-dev] PGP keys and package signing
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#2398">[ date ]</a>
+ <a href="thread.html#2398">[ thread ]</a>
+ <a href="subject.html#2398">[ subject ]</a>
+ <a href="author.html#2398">[ author ]</a>
+ </LI>
+ </UL>
+ <HR>
+<!--beginarticle-->
+<PRE>On Mon, 31 Jan 2011, Michael Scherer wrote:
+
+&gt;<i> Le lundi 31 janvier 2011 &#224; 18:26 +0100, nicolas vigier a &#233;crit :
+</I>&gt;<i> &gt; On Mon, 31 Jan 2011, Michael Scherer wrote:
+</I>&gt;<i> &gt;
+</I>&gt;<i> &gt; &gt; We can 1) have a long enough expiration date ( but EOL + 1y seems quite
+</I>&gt;<i> &gt; &gt; enough IMHO )
+</I>&gt;<i> &gt; &gt; 2) push unexpired keys before it is too late if needed ( I routinely
+</I>&gt;<i> &gt; &gt; push my key after extending the expiration date ).
+</I>&gt;<i> &gt;
+</I>&gt;<i> &gt; Pushing new unexpired keys also means we need to resign all old packages
+</I>&gt;<i> &gt; if we want them to be installable. So that's not something we want to do
+</I>&gt;<i> &gt; too often if it's not needed.
+</I>&gt;<i>
+</I>&gt;<i> Nope, I didn't say &quot;new unexpired key&quot;, but just push the same key, with
+</I>&gt;<i> the expiration date extended. That should be painless IIRC ( at least,
+</I>&gt;<i> it is for me ).
+</I>
+Oh, I misunderstood this as I imagined it was not possible to change
+expiration date on a key as it would be difficult to check if the change
+was done before expiration. But after checking, it is indeed possible,
+and it is even possible to do it after the expiration date.
+
+So we can do it, but we should remember that it does not protect against
+a key compromised after it has expired (as someone stealing the key
+can change the expiration date even after it has expired).
+
+So the only use of expiration date I see is to check that the key was
+updated from keyserver recently. Maybe we can set a short expiration
+time (15 days ?), and have something in cron to update it a few days
+before it expire ?
+
+&gt;<i> &gt; &gt; &gt; - I don't think using expiration date reduce the damage of a leaked
+</I>&gt;<i> &gt; &gt; &gt; key. If the key is leaked, we revoke it (or its signature) immediatly
+</I>&gt;<i> &gt; &gt; &gt; on all key servers, which should be faster than waiting for the key to
+</I>&gt;<i> &gt; &gt; &gt; expire. And replacing an expired key is not more simple than replacing
+</I>&gt;<i> &gt; &gt; &gt; a revoked key.
+</I>&gt;<i> &gt; &gt;
+</I>&gt;<i> &gt; &gt; The problem is not leaking the key, it is about cryptographic attacks
+</I>&gt;<i> &gt; &gt; about older keys.
+</I>&gt;<i> &gt; &gt;
+</I>&gt;<i> &gt; &gt; If in 10 years, there is some technology that allows people to get our
+</I>&gt;<i> &gt; &gt; private key by bruteforce on the public one, if it is expired, attackers
+</I>&gt;<i> &gt; &gt; will not be able to use it even if they have it. Since the plan is to
+</I>&gt;<i> &gt; &gt; say &quot;every key signed is valid&quot;, then we are potentially screwed if a
+</I>&gt;<i> &gt; &gt; old key is compromised offline.
+</I>&gt;<i> &gt;
+</I>&gt;<i> &gt; If in 10 years there is some technology to get our private key, then
+</I>&gt;<i> &gt; it's still possible to revoke the key at that time.
+</I>&gt;<i> &gt;
+</I>&gt;<i> &gt; Instead of deciding
+</I>&gt;<i> &gt; now that the key will expire in a few years, I would prefer that we look
+</I>&gt;<i> &gt; at it in a few years to decide if we want to revoke it.
+</I>&gt;<i>
+</I>&gt;<i> Wouldn't it be too late ?
+</I>
+Considering that it is possible to update expiration date even after it
+has expired, this expiration date doesn't protect against some technology
+that would allow people in the futur to bruteforce the private key.
+
+</PRE>
+
+
+
+<!--endarticle-->
+ <HR>
+ <P><UL>
+ <!--threads-->
+ <LI>Previous message: <A HREF="002397.html">[Mageia-dev] PGP keys and package signing
+</A></li>
+ <LI>Next message: <A HREF="002399.html">[Mageia-dev] PGP keys and package signing
+</A></li>
+ <LI> <B>Messages sorted by:</B>
+ <a href="date.html#2398">[ date ]</a>
+ <a href="thread.html#2398">[ thread ]</a>
+ <a href="subject.html#2398">[ subject ]</a>
+ <a href="author.html#2398">[ author ]</a>
+ </LI>
+ </UL>
+
+<hr>
+<a href="https://www.mageia.org/mailman/listinfo/mageia-dev">More information about the Mageia-dev
+mailing list</a><br>
+</body></html>