Marble Horse Project overview Team members Cryptography
|
Key Generation and Management Procedures Members of the Marble Horse Free Software Group (MHFSG) use the following procedures in creation of their DSA/ElGamal key pair using GNU Privacy Guard. This procedure is posted to aid others in identifying keys claiming to belong to MHFSG members which clearly do not, as well as to demonstrate the standard of quality the MHFSG applies in its dealings with cryptographic technologies. Only members of the MHFSG should utilize this procedure verbatim in key creation. Non-members are welcome to adapt this procedure to meet their own needs (we do ask that you omit the '[MH]' tag from your key information; we use this tag to more easily identify MHFSG member keys).
Key generation will be performed on a platform supported by GNU Privacy Guard (unsupported architectures and operating systems will not be used for key generation). Sources or binaries shall be obtained from a trusted source, such as the primary GNU Privacy Guard distribution site (http://www.gnupg.org). Sources and/or binaries will be validated against provided cryptographic signatures and hashes. Recent versions of GNU Privacy Guard will be used.
In the event that GNU Privacy Guard is being built from sources, the build will occur on a reasonably secure system and a proven toolchain will be employed. All provided tests will be executed to verify proper program function prior to use in key generation.
Key generation will be performed in an interactive manner. MHFSG members follow these 13 steps in generating their keys: 1. Execute the following command from the command-line:gpg --gen-key
Prior to real use of MHFSG member keys, the member shall generate and securely store a Key Revocation Certificate (KRC). Key Revocation Certificates are used to flag a key as inoperable or compromised; they must be generated prior to need (you need the passphrase and secret key to generate a KRC; people often use their KRC when the secret key or passphrase has been lost). Key Revocation Certificates shall be generated on a reasonably secure machine. The KRC file shall be printed and sealed in an envelope; the envelope will be placed in a physically secure location. Subsequent to printing of the KRC, the KRC file shall be destroyed. The following procedure shall be used for the generation of a Key Revocation Certificate. Further expected processing of this certificate has been discussed in the prior section and shall be omitted from this procedure. 1. Change directory to your home directory or other secure directory.
Backup procedures for both public and secret keys are left to the discretion of individual MHFSG members. All members are expected to have at least one backup of their secret key on durable medium (such as CD-ROM). All backups are to be stored in physically secure locations.
After key generation, key revocation certificate generation (and processing), and secret key backup, the keyholder shall notify other MHFSG members to the existance of this new key (so as that it may be added to their keyrings and updated information may be placed on the MHFSG website). This notification should occur through standard online means, such as e-mail and IRC, and may also occur via telephone or postal mail as needed.
After one or more other MHFSG members have examined your key and have determined it has been created properly based on this specification, it should be posted to the wwwkeys.pgp.net and www.keyserver.net public key servers. Posting of your key to keyservers helps to propogate your key information in a manner which helps to deter denial of service and damage to the public key infrastructure, as well as providing a simple mechanism others may use in obtaining your key. The following procedure may be used in posting your keys to a public key server (substitute the name of the desired keyserver for '{keyserver}'): 1. Obtain and note your key ID using the following command:
The members of the Marble Horse Free Software Group do not utilize the key recovery features of PGP and GNU Privacy Guard. As result, our keys do not contain Additional Decryption Keys (ADKs).
Questions or concerns regarding these procedures should be directed to Jacob Moorman at Last updated: 2000AUG24JM01 |
|
Content Copyright (c) 1999-2001 Marble Horse Free Software Group. All trademarks are property of their respective owners. |