lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 1 Oct 2011 07:05:19 -0700 From: Greg KH <greg@...ah.com> To: Linux Kernel Mailing List <linux-kernel@...r.kernel.org> Cc: "H. Peter Anvin" <hpa@...or.com> Subject: Re: kernel.org status: establishing a PGP web of trust On Fri, Sep 30, 2011 at 04:50:37PM -0700, H. Peter Anvin wrote: > 2. Create a new PGP/GPG key, and also generate a key revocation > certificate (but don't import it anywhere -- save it for the > future) for your new key. In the near future we are considering > setting up an escrow service for key revocation certificates. > > I recommend using a 4096-bit RSA key. Given how fast computers are > these days, there is no reason to use a shorter key. DSA keys > should be considered obsolete; substantial weaknesses have been > found in DSA. > > $ gpg --gen-key > $ gpg -u <key ID> -o <key ID>.revoke --gen-revoke I would recommend a physical access device for your new gpg key that you create. I've heard good things about this USB device: http://www.crypto-stick.org/ and am trying to have a bunch of them at the Kernel Summit this year to hand out to people if they want one. There are also lots of other smart-card form-factor devices that can be used to store GPG keys. Some places to purchase these can be found at links from the above site. thanks, greg k-h -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists