lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Sat, 17 Oct 2020 09:50:58 -0400
From:   Konstantin Ryabitsev <konstantin@...uxfoundation.org>
To:     Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>
Cc:     "Alexander A. Klimov" <grandmaster@...klimov.de>,
        Miguel Ojeda <miguel.ojeda.sandonis@...il.com>,
        linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: Backing up the PGP master key

On Thu, Oct 15, 2020 at 12:34:06AM +0300, Jarkko Sakkinen wrote:
> Konstantin, writing to you based on 'git blame' :-)
> 
> The maintainer guide recommends using paperkey for the PGP master key,
> which is a prefectly sane method.
> 
> I was just wondering that isn't a backup to a USB stick a reasonable
> option? E.g. get a few USB sticks (new, unweared), store your master key
> to each of them and put to safe.

Sure, it's an option as well. I believe the guide recommends three 
different backups:

1. thumb drive within reach for regular access
2. another drive in case the first one goes bad
3. paperkey backup in the vault

There's no reason why #2 above can't go into the vault as well, if 
you're inclined. I wouldn't skip paperkey, since I'm generally wary of 
putting anything long-term onto electronic media due to things like 
charge decay, cosmic rays, or other weird phenomena resulting in flipped 
bits.

-K

Powered by blists - more mailing lists