Questions tagged [key-management]
Key management involves the entire key life-cycle: generation, exchange, storage, safeguarding, use, vetting, revocation, replacement and retirement.
881 questions
1
vote
1
answer
126
views
Managing keys for encrypted system backups and recovery
I'm in the processes of setting up backups and recovery for my own personal system. Currently a basic tar of the system seems sufficient (in the future I might investigate incremental backups).
As ...
4
votes
0
answers
114
views
Import and show expired gpg certification signatures?
I would like to import a gpg key that has expired cross signatures and be able to see those expired signatures with --list-sigs or --check-sigs. Gnupg seems to always filter them out however.
How can ...
1
vote
2
answers
516
views
Why don't people publish their PGP public key in a GitHub repo?
I have been contemplating how I should publish my PGP public key online recently. Being able to meet with someone physically is great, but that after all is a rare priviledge.
Key-servers are a ...
2
votes
1
answer
296
views
Gpg key management - lost / forgotten keys
In my current pubring.kbx I found an old secret key with no expiry date set and its subkey, for that I have forgotten the passphrase. In the same file I have another better maintained key.
I tried to ...
1
vote
0
answers
174
views
GPG: How to clean/refresh the cache involved with the "pubring.kbx" file?
About GPG and for the kbxutil command in the following page:
14.1.1 Scrutinizing a keybox file
Has the following part
To see statistics on the keybox in question, run it using
‘kbxutil --stats ~/....
1
vote
2
answers
290
views
GPG: What is the file that represents the "secret keyring" concept?
About GPG and keys
Each public key is stored in the ~/.gnupg/pubring.kbx file (correct me if it is not correct)
Each public key normally has a pair of secret keys stored in the ~/.gnupg/private-keys-...
1
vote
1
answer
404
views
SSH: Do the public and private keys contain the ip address?
Question
Do the public and private keys contain the ip address?
Scenario
Suppose "Computer I" as client has a IP as 192.168.1.A and is generated for SSH purposes its respective pair of ...
2
votes
1
answer
178
views
GPG: trying to understand about of public and secret keys
Introduction
In SSH can be created a pair of keys as follows for example:
id_rsa
id_rsa.pub
Where the first one is the private and the second is the public.
Where both:
Are located in the ~/.ssh ...
0
votes
0
answers
291
views
GPG: Why "pubring.kbx" contains keys I removed?
With VirtualBox is installed as guest Ubuntu Desktop 22.04.5 LTS x86_64
About gpg
gpg --version
gpg (GnuPG) 2.2.27
libgcrypt 1.9.4
...
Home: /home/manueljordan/.gnupg
To remove some keys, I executed ...
1
vote
0
answers
114
views
Is it common for API providers to offer an endpoint to allow customers to make a key rotation using a secret? Are There Security Concerns?
We currently provide API keys to our users for authentication, but we do not support API key rotation (i.e., users must generate new keys manually).I’m trying to understand:
Is it common for API ...
1
vote
1
answer
673
views
Trouble Extracting Hash from PKCS#8 Encrypted Private Key for Cracking - OpenSSH
I have an encrypted private key for OpenSSH that I need to crack the passphrase for. However, tools like ssh2john.py and openssl2john.py fail to parse the key. Here’s what I’ve tried so far:
Key ...
1
vote
0
answers
94
views
Managing SSH authorized keys exported from OpenPGP keys
One of the benefits of using OpenPGP authentication subkeys instead of arbitrarily created SSH keyfiles, is key expiration and revocation.
While there is plenty of documentation on how to use OpenPGP ...
4
votes
1
answer
731
views
Key alias "vs" Key ID usage
In some contexts (PKCS#12) key management is done through human readable key aliases, where the alias uniquely identifies the key, in others, it is done through key IDs (JWK sets, GPG, ...) with non-...
1
vote
0
answers
97
views
self-healing key management in iot-based wsn
I’m a student currently working on a project involving designing a new key management for iot-based Wireless Sensor Networks, with a focus on developing a self-healing mechanism and integrating AI in ...
1
vote
2
answers
276
views
Is it bad practice to reuse a private key password across multiple keys?
Whether it be a private key for a TLS certificate, an SSH server, or a code signing cert, is it bad practice to use the same password across multiple?
My assumption would be no, seeing as a key ...