Bitcoin Forum
May 03, 2024, 03:03:22 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: How to set up PGP 'Offline signing keys' and meaningfully verify them  (Read 19281 times)
marcoski711 (OP)
Newbie
*
Offline Offline

Activity: 15
Merit: 0



View Profile WWW
February 05, 2014, 11:28:15 AM
 #1

Alan Reiner of BitcoinArmory (fantastic program btw!) has an 'Offline signing key'

http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0x4AB16AEA98832223


I am inferring that this is a PGP private key on a 'cold storage' computer, with a different passphrase to his main 'hot' computer private key(s), that protects his electronic signature against keyloggers by using an air-gap, just like Armory does for bitcoins. Therefore a sig of a hash of a binary (eg Armory) is very difficult to impersonate with a malware binary.

However, I think that the above can only achieved by having a separate 'cold signing' keypair (but I'm not sure, hence this post).  I'm thinking this because:

  • Alan's key has only have one subkey within the public key he distributes (FF52507FDE6B2D74).  This means I can only validate against one key, which is presumably the same one used for receiving emails etc, ie on his main 'hot' computer...
  • Even if his cold-signing subkey was included, when I do gpg --verify filename, it only shows the main keyid, not the subkey, for example "gpg: Signature made Wed 25 Dec 17:06:03 2013 GMT using RSA key ID 98832223". Thus if the hot key's passphrase was compromised, then a hot-signed malware would still be indistinguishable from the cold-signed genuine binary.

I want to have a separate passphrase that I only use for signing on an air-gapped computer. Am I right in my thinking?  Or am I missing something? 

I'm doing this on OSX using gpg (GnuPG/MacGPG2) 2.0.22 by the way.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!