LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-05-2015, 09:58 AM   #1
royboy626
LQ Newbie
 
Registered: Jun 2007
Location: North Carolina, USA
Posts: 7

Rep: Reputation: 0
gnupg 1024 bit public key insecure - right?


If someone can confirm what I believe...
A key pair created last decade was 1024 bit. I created a subkey recently of 4096 bit. However the pub key is still 1024 bit. Do I need to export my 4096 bit subkey, and use gpg2 --key-gen with 4096 bits, then import the subkey to be secure (yes/no)?

I don't like littering the Internet with gpg keys, but I am thinking that is my only option to be more secure.

Thanks

partial output:
gpg --edit-key 12345678
pub 1024D/12345678 usage: SCA
sub 1024g/ABCDEDFG revoked usage: E
sub 4096R/1A2B3C4D usage: E

From public key server:
pub 1024D/12345678

sig sig3 12345678

sub 1024g/ABCDEDFG
sig sbind 12345678
sig revok 12345678

sub 4096R/1A2B3C4D
sig sbind 12345678
 
Old 06-05-2015, 10:51 AM   #2
joec@home
Member
 
Registered: Sep 2009
Location: Galveston Tx
Posts: 291

Rep: Reputation: 70
Keys are always created in pairs, so the old public key would not be able to be used in conjunction with the new private key.
 
Old 06-05-2015, 04:09 PM   #3
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
Revoke the old key and generate a new key. Remember that a different key is used for encrypting than for decrypting.
 
1 members found this post helpful.
Old 06-05-2015, 04:22 PM   #4
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,627

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
4096 is a bit of over kill ( except for the NEEDED!!! useage )

the nsa is using 2048 for almost all things
 
Old 06-05-2015, 07:27 PM   #5
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
I would recommend at least 2048-bit, and I think that's the usual recommendation nowadays.
 
Old 06-11-2015, 09:01 AM   #6
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,672
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
However, realistically, this is rather a "theoretical" vulnerability. Unless you are trying to defend against a government or a very determined attacker, 1024 bits are probably fine. Of more concern should be the overall infrastructure of key-management: how are the private keys being secured? Who's in the position to steal a key, and how likely is it that she might do so, and how likely is it that she might get caught? How is the issuing (and periodic replacement) of public keys being taken care of? What is the sensitivity of the data that is being secured, and how and where is that data being transmitted?

Someone who seriously wants to get their hands on a key is probably not going to "break" it. Instead, they'll probably just either try to steal the thing, or, ugh, to break you.

Last edited by sundialsvcs; 06-11-2015 at 09:03 AM.
 
Old 06-11-2015, 01:43 PM   #7
joec@home
Member
 
Registered: Sep 2009
Location: Galveston Tx
Posts: 291

Rep: Reputation: 70
Quote:
Originally Posted by sundialsvcs View Post
Someone who seriously wants to get their hands on a key is probably not going to "break" it. Instead, they'll probably just either try to steal the thing, or, ugh, to break you.
Agreed, personally I think SSL solutions are needed, but over rated and misunderstood. In most instances, SSL only encrypts data between two endpoints so that they can not be sniffed on the network. Most applications using SSL are storing the data decrypted. It is easier for a real hacker to break into a system than to break the SSL itself.
 
Old 06-12-2015, 03:46 AM   #8
veerain
Senior Member
 
Registered: Mar 2005
Location: Earth bound to Helios
Distribution: Custom
Posts: 2,524

Rep: Reputation: 319Reputation: 319Reputation: 319Reputation: 319
These days 2048 is the default. You can use a subkey with 4096 bits. And use the subkey for all signature and asymmetric crypto.
 
Old 06-12-2015, 02:37 PM   #9
metaschima
Senior Member
 
Registered: Dec 2013
Distribution: Slackware
Posts: 1,982

Rep: Reputation: 492Reputation: 492Reputation: 492Reputation: 492Reputation: 492
There are actually two separate keys one for encryption/decryption and one for signing as well. If you use the same one for both, the key will become vulnerable to attack.
 
  


Reply

Tags
gnupg, gpg, key, security



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Practical public-key cryptography with GnuPG, part 2 of 2 LXer Syndicated Linux News 0 12-13-2014 09:03 PM
GnuPG public key and RSA algorithm. bucovaina78 Linux - Security 7 10-03-2013 08:13 PM
GnuPG Exporting My Public Key carlosinfl Linux - Security 1 11-10-2008 10:43 PM
SSH public/private key authentication with GnuPG keys? thinksincode Linux - Security 1 02-25-2005 02:33 PM
elliptic curve public key for gnupg? iansworld Linux - Security 0 12-09-2004 12:12 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:40 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration