[openpgp] Re: Encryption subkey selection
Andrew Gallagher <andrewg@andrewg.com> Thu, 10 April 2025 09:13 UTC
Return-Path: <andrewg@andrewg.com>
X-Original-To: openpgp@mail2.ietf.org
Delivered-To: openpgp@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id A3BB61A149AC for <openpgp@mail2.ietf.org>; Thu, 10 Apr 2025 02:13:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=andrewg.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WkY_SfITR_ly for <openpgp@mail2.ietf.org>; Thu, 10 Apr 2025 02:13:18 -0700 (PDT)
Received: from fum.andrewg.com (fum.andrewg.com [135.181.198.78]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id C6F631A1498D for <openpgp@ietf.org>; Thu, 10 Apr 2025 02:13:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=andrewg.com; s=andrewg-com; t=1744276397; bh=2bOb0PGWrI4ONuuTG6Eu94Ob1AJBjMegHZobfA9QJsU=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From; b=pOjEsHVRKD5JB27GcERdqUFIoHQKrUrePrTQ68zon3Q3MJw5V2m8LAwYuEZU8dGYH sAL96MmEdk0+fKg4RkbyfACEX5+80tM8abm1G0/lTWiO6nLKl8NObn96vnmMDPCfL0 B22Nn11phQNgeZXkfbc0jVDMF+BYDVNYWtFKKB6TPvkkDsFQ2oQmPXu+aIPdLkWNCN sZH93nUzDMkqZ2G1gGEQtEP7q+QYNKiwBok+6d29l+gnspGjzUes+NFZFMynFg2X5L na8KvvQ7rjHHTnODkNBauKQm22/k538aNEYOv77ucuQ+PXE9r3s9nX8JDsTUZb/jMC iXy2aO17Ro48w==
Received: from smtpclient.apple (serenity [IPv6:fc93:5820:7349:eda2:99a7::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by fum.andrewg.com (Postfix) with ESMTPSA id 6CFF65EDF7; Thu, 10 Apr 2025 09:13:17 +0000 (UTC)
Content-Type: multipart/signed; boundary="Apple-Mail=_5B2F8D3D-0EFF-47F1-95EA-459D4EDB5A67"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.9\))
From: Andrew Gallagher <andrewg@andrewg.com>
In-Reply-To: <98537b13-46af-4197-b60c-ce6265fcf6b4@mtg.de>
Date: Thu, 10 Apr 2025 10:12:58 +0100
Message-Id: <7987A36A-7225-4AB0-8622-491DEFBA0B05@andrewg.com>
References: <4460b180-8b55-4a5b-b631-657a1e8d8ed6@mtg.de> <625C7FAF-91F8-4864-8C44-4F4BC738A1FC@andrewg.com> <98537b13-46af-4197-b60c-ce6265fcf6b4@mtg.de>
To: Falko Strenzke <falko.strenzke@mtg.de>
X-Mailer: Apple Mail (2.3731.700.6.1.9)
Message-ID-Hash: DYVJ7W2IRAHCLFWZDHOSS6652PF3PZU4
X-Message-ID-Hash: DYVJ7W2IRAHCLFWZDHOSS6652PF3PZU4
X-MailFrom: andrewg@andrewg.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Andrew Gallagher <andrewg=40andrewg.com@dmarc.ietf.org>, Daniel Huigens <d.huigens=40protonmail.com@dmarc.ietf.org>, Justus Winter <justus@sequoia-pgp.org>, IETF OpenPGP WG <openpgp@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: Encryption subkey selection
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/5auQ00Tpi6dpF9jCTkDg2tOJvOw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
On 10 Apr 2025, at 08:57, Falko Strenzke <falko.strenzke@mtg.de> wrote: > > Section 6 currently says: "If there are no usable subkeys in the replacement certificate, then [...]" > I would write instead "If the subkeys in the replacement certificate are not useable, then [...]” I like this change; I will apply it now. Thanks! A
- [openpgp] Encryption subkey selection Justus Winter
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Bart Butler
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Andrew Gallagher
- [openpgp] Re: Encryption subkey selection Justus Winter
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Daniel Kahn Gillmor
- [openpgp] Re: Encryption subkey selection Falko Strenzke
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Daniel Huigens
- [openpgp] Re: Encryption subkey selection Johannes Roth
- [openpgp] Re: Encryption subkey selection Daniel Huigens