Skip to main content

Questions tagged [key-management]

Key management involves the entire key life-cycle: generation, exchange, storage, safeguarding, use, vetting, revocation, replacement and retirement.

1 vote
1 answer
126 views

I'm in the processes of setting up backups and recovery for my own personal system. Currently a basic tar of the system seems sufficient (in the future I might investigate incremental backups). As ...
Sam Coutteau's user avatar
4 votes
0 answers
114 views

I would like to import a gpg key that has expired cross signatures and be able to see those expired signatures with --list-sigs or --check-sigs. Gnupg seems to always filter them out however. How can ...
Jonathan Cross's user avatar
1 vote
2 answers
516 views

I have been contemplating how I should publish my PGP public key online recently. Being able to meet with someone physically is great, but that after all is a rare priviledge. Key-servers are a ...
Guanyuming He's user avatar
2 votes
1 answer
296 views

In my current pubring.kbx I found an old secret key with no expiry date set and its subkey, for that I have forgotten the passphrase. In the same file I have another better maintained key. I tried to ...
menuhin's user avatar
  • 121
1 vote
0 answers
174 views

About GPG and for the kbxutil command in the following page: 14.1.1 Scrutinizing a keybox file Has the following part To see statistics on the keybox in question, run it using ‘kbxutil --stats ~/....
Manuel Jordan's user avatar
1 vote
2 answers
290 views

About GPG and keys Each public key is stored in the ~/.gnupg/pubring.kbx file (correct me if it is not correct) Each public key normally has a pair of secret keys stored in the ~/.gnupg/private-keys-...
Manuel Jordan's user avatar
1 vote
1 answer
404 views

Question Do the public and private keys contain the ip address? Scenario Suppose "Computer I" as client has a IP as 192.168.1.A and is generated for SSH purposes its respective pair of ...
Manuel Jordan's user avatar
2 votes
1 answer
178 views

Introduction In SSH can be created a pair of keys as follows for example: id_rsa id_rsa.pub Where the first one is the private and the second is the public. Where both: Are located in the ~/.ssh ...
Manuel Jordan's user avatar
0 votes
0 answers
291 views

With VirtualBox is installed as guest Ubuntu Desktop 22.04.5 LTS x86_64 About gpg gpg --version gpg (GnuPG) 2.2.27 libgcrypt 1.9.4 ... Home: /home/manueljordan/.gnupg To remove some keys, I executed ...
Manuel Jordan's user avatar
1 vote
0 answers
114 views

We currently provide API keys to our users for authentication, but we do not support API key rotation (i.e., users must generate new keys manually).I’m trying to understand: Is it common for API ...
Sammy Chaouki's user avatar
1 vote
1 answer
673 views

I have an encrypted private key for OpenSSH that I need to crack the passphrase for. However, tools like ssh2john.py and openssl2john.py fail to parse the key. Here’s what I’ve tried so far: Key ...
Kostas Moisidis's user avatar
1 vote
0 answers
94 views

One of the benefits of using OpenPGP authentication subkeys instead of arbitrarily created SSH keyfiles, is key expiration and revocation. While there is plenty of documentation on how to use OpenPGP ...
awolf's user avatar
  • 11
4 votes
1 answer
731 views

In some contexts (PKCS#12) key management is done through human readable key aliases, where the alias uniquely identifies the key, in others, it is done through key IDs (JWK sets, GPG, ...) with non-...
earizon's user avatar
  • 141
1 vote
0 answers
97 views

I’m a student currently working on a project involving designing a new key management for iot-based Wireless Sensor Networks, with a focus on developing a self-healing mechanism and integrating AI in ...
green tea leaf's user avatar
1 vote
2 answers
276 views

Whether it be a private key for a TLS certificate, an SSH server, or a code signing cert, is it bad practice to use the same password across multiple? My assumption would be no, seeing as a key ...
security_paranoid's user avatar

15 30 50 per page
1
2 3 4 5
59