Re: V5 key packet format requirements

Adam Back <adam@cypherspace.org> Fri, 03 February 2006 17:17 UTC

Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1F54YN-0006jL-EM for openpgp-archive@megatron.ietf.org; Fri, 03 Feb 2006 12:17:09 -0500
Received: from above.proper.com (above.proper.com [208.184.76.39]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA21150 for <openpgp-archive@lists.ietf.org>; Fri, 3 Feb 2006 12:15:04 -0500 (EST)
Received: from above.proper.com (localhost.vpnc.org [127.0.0.1]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13CPV6J025205; Fri, 3 Feb 2006 04:25:31 -0800 (PST) (envelope-from owner-ietf-openpgp@mail.imc.org)
Received: (from majordom@localhost) by above.proper.com (8.12.11/8.12.9/Submit) id k13CPVhp025204; Fri, 3 Feb 2006 04:25:31 -0800 (PST)
X-Authentication-Warning: above.proper.com: majordom set sender to owner-ietf-openpgp@mail.imc.org using -f
Received: from mail.off.net (off.net [66.96.28.3]) by above.proper.com (8.12.11/8.12.9) with ESMTP id k13CPUAf025189 for <ietf-openpgp@imc.org>; Fri, 3 Feb 2006 04:25:30 -0800 (PST) (envelope-from adam@mail.off.net)
Received: by mail.off.net (Postfix, from userid 948) id 215AB770003; Fri, 3 Feb 2006 07:25:30 -0500 (EST)
Received: by bitchcake.off.net (hashcash-sendmail, from uid 948); Fri, 3 Feb 2006 07:25:26 -0500
Date: Fri, 03 Feb 2006 07:25:26 -0500
From: Adam Back <adam@cypherspace.org>
To: Ben Laurie <ben@algroup.co.uk>
Cc: "Daniel A. Nagy" <nagydani@epointsystem.org>, OpenPGP <ietf-openpgp@imc.org>, Adam Back <adam@cypherspace.org>
Subject: Re: V5 key packet format requirements
Message-ID: <20060203122526.GA21898@bitchcake.off.net>
References: <20060202160713.GB18144@epointsystem.org> <43E3443D.90609@algroup.co.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <43E3443D.90609@algroup.co.uk>
User-Agent: Mutt/1.4.2.1i
X-Hashcash: 1:20:060203:ben@algroup.co.uk::BVk/eKy1OPO67+UI:2xIy
X-Hashcash: 1:20:060203:nagydani@epointsystem.org::BkKmgj8ZA2YTVMq7:5Y44
X-Hashcash: 1:20:060203:ietf-openpgp@imc.org::J/WeZuXvRSkaORl1:8i8X
X-Hashcash: 1:20:060203:adam@cypherspace.org::voAGQ1DIKae4IhLn:CMZ
Sender: owner-ietf-openpgp@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-openpgp/mail-archive/>
List-Unsubscribe: <mailto:ietf-openpgp-request@imc.org?body=unsubscribe>
List-ID: <ietf-openpgp.imc.org>

On Fri, Feb 03, 2006 at 11:53:33AM +0000, Ben Laurie wrote:

> > 2. Scrap encrypted private keys. We already have a symmetrically
> > encrypted container format with sufficient integrity protection, so
> > there is no reason to maintain another one. Just put the
> > unencrypted private key packet into that container, if you need
> > encryption. This will reduce the number of things to worry about
> > and make the security of OpenPGP easier to assess and maintain.
> 
> Yes, please!

What if you want different password on different keys?

(Think eg long term signing key vs short term signing key -- no point
having separate signing keys unless have possibility to use different
password.)

Adam