1 |
Requested-by: Richard Yao <ryao@g.o> |
2 |
--- |
3 |
glep-0063.rst | 54 +++++++-------------------------------------------- |
4 |
1 file changed, 7 insertions(+), 47 deletions(-) |
5 |
|
6 |
diff --git a/glep-0063.rst b/glep-0063.rst |
7 |
index 0792a5c..b20af61 100644 |
8 |
--- a/glep-0063.rst |
9 |
+++ b/glep-0063.rst |
10 |
@@ -42,6 +42,9 @@ v2 |
11 |
The ``gpgfingerprint`` LDAP field has been altered to remove optional |
12 |
whitespace. |
13 |
|
14 |
+ The recommended ``gpg.conf`` contents have been removed as they were |
15 |
+ seriously outdated and decreased security over the modern defaults. |
16 |
+ |
17 |
v1.1 |
18 |
The recommended RSA key size has been changed from 4096 bits |
19 |
to 2048 bits to match the GnuPG recommendations [#GNUPG-FAQ-11-4]_. |
20 |
@@ -102,58 +105,15 @@ The developers should follow those practices unless there is a strong |
21 |
technical reason not to (e.g. hardware limitations, necessity of replacing |
22 |
their primary key). |
23 |
|
24 |
-1. Copy ``/usr/share/gnupg/gpg-conf.skel`` to ``~/.gnupg/gpg.conf``, append |
25 |
- the following block:: |
26 |
- |
27 |
- keyserver pool.sks-keyservers.net |
28 |
- |
29 |
- emit-version |
30 |
- |
31 |
- default-recipient-self |
32 |
- |
33 |
- # -- All of the below portion from the RiseUp.net OpenPGP best practices, and |
34 |
- # -- many of them are also in the Debian GPG documentation. |
35 |
- |
36 |
- # when outputting certificates, view user IDs distinctly from keys: |
37 |
- fixed-list-mode |
38 |
- |
39 |
- # long keyids are more collision-resistant than short keyids (it's trivial to make a key |
40 |
- # with any desired short keyid) |
41 |
- # NOTE: this breaks kmail gnupg support! |
42 |
- keyid-format 0xlong |
43 |
- |
44 |
- # when multiple digests are supported by all recipients, choose the strongest one: |
45 |
- personal-digest-preferences SHA512 SHA384 SHA256 SHA224 |
46 |
- |
47 |
- # preferences chosen for new keys should prioritize stronger algorithms: |
48 |
- default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 BZIP2 ZLIB ZIP Uncompressed |
49 |
- |
50 |
- # If you use a graphical environment (and even if you don't) you should be using an agent: |
51 |
- # (similar arguments as https://www.debian-administration.org/users/dkg/weblog/64) |
52 |
- use-agent |
53 |
- |
54 |
- # You should always know at a glance which User IDs gpg thinks are legitimately bound to |
55 |
- # the keys in your keyring: |
56 |
- verify-options show-uid-validity |
57 |
- list-options show-uid-validity |
58 |
- |
59 |
- # include an unambiguous indicator of which key made a signature: |
60 |
- # (see http://thread.gmane.org/gmane.mail.notmuch.general/3721/focus=7234) |
61 |
- # (and http://www.ietf.org/mail-archive/web/openpgp/current/msg00405.html) |
62 |
- sig-notation issuer-fpr@×××××××××××××××××××××××××××××××.net=%g |
63 |
- |
64 |
- # when making an OpenPGP certification, use a stronger digest than the default SHA1: |
65 |
- cert-digest-algo SHA256 |
66 |
- |
67 |
-2. Primary key and the signing subkey are both of type RSA, 2048 bits |
68 |
+1. Primary key and the signing subkey are both of type RSA, 2048 bits |
69 |
(OpenPGP v4 key format or later) |
70 |
|
71 |
-3. Key expiration renewed annually to a fixed day of the year |
72 |
+2. Key expiration renewed annually to a fixed day of the year |
73 |
|
74 |
-4. Create a revocation certificate & store it hardcopy offsite securely |
75 |
+3. Create a revocation certificate & store it hardcopy offsite securely |
76 |
(it's about ~300 bytes). |
77 |
|
78 |
-5. Encrypted backup of your secret keys. |
79 |
+4. Encrypted backup of your secret keys. |
80 |
|
81 |
Gentoo LDAP |
82 |
=========== |
83 |
-- |
84 |
2.18.0 |