[SATLUG] XCSSA Pre-GPG Keysigning Party "To-Do Steps" (if you
want your key signed March 17th)
dkowis at shlrm.org
Mon Mar 3 11:01:23 CST 2008
Quoting ed <horned0wl93 at gmail.com>:
> I have a few questions and problem:
> 1. Apparently, per GPG setup instructions, I'd need a separate GPG key
> for each email account?
> 2. I've tested the setup using one of my email accounts, and have saved
> the fingerprint as a screen shot, but don't know how to access/print it
> any other way. Suggestions?
I recommend this document to follow for generating keys and such.
I also have some beef with the suggestions on the XCSSA site.
Particularly with the age of the keys and the encryption algorithms.
According to http://www.gnupg.org/gph/en/manual.html#AEN526 :
"It is almost always the case that you will not want the master key to
expire. There are two reasons why you may choose an expiration date.
First, you may intend for the key to have a limited lifetime. For
example, it is being used for an event such as a political campaign
and will no longer be useful after the campaign is over. Another
reason is that if you lose control of the key and do not have a
revocation certificate with which to revoke the key, having an
expiration date on the master key ensures that the key will eventually
fall into disuse.
Changing encryption subkeys is straightforward but can be
inconvenient. If you generate a new keypair with an expiration date on
the subkey, that subkey will eventually expire. Shortly before the
expiration you will add a new subkey and publish your updated public
key. Once the subkey expires, those who wish to correspond with you
must find your updated key since they will no longer be able to
encrypt to the expired key. This may be inconvenient depending on how
you distribute the key. Fortunately, however, no extra signatures are
necessary since the new subkey will have been signed with your master
signing key, which presumably has already been validated by your
Basically, unless you want your signing key to expire, it shouldn't.
That way you retain the signatures. However, you want your encryption
key to expire so that it's no longer used. The main factor of
encryption is how long the data is valid for. If it's extremely
important, but isn't useful after a week, encryption that can't be
brute-forced within a week (reasonably) is probably good enough.
Also I would reccomend using RSA encryption as opposed to El-Gamal. I
think there might be another algorithm, but I can't remember at the
moment. the 4096bit key length is good :)
Just my $0.02
> tweeks wrote:
> Hey all,
>> As promised, here is the list of steps that you MUST do NOW to
>> prepare for the
>> XCSSA March 17th, 2008 GPG Keysigning Party:
>> (permalink = http://xcssa.org/archives/XCSSA_2008-03-17.html#STEPS )
>> Please follow steps 1-3 NOW to prepare for the keysigning party or you will
>> not be able to participate or get your key signed by the group! :v(
>> If anyone has any questions or concerns, please feel free to send them to me
>> (tweeks-junk2 at theweeks d0t 0rg) and I'll try to answer them and get you
>> taken care of in time.
>> Take care, and we'll see you at the party!
>> XCSSA President
| www.ronpaul2008.com | www.sourcemage.org |
| Ron Paul for President! | SourceMage GNU/Linux |
More information about the SATLUG