-
Notifications
You must be signed in to change notification settings - Fork 696
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider setting an expiry date for the Submission Key #1139
Comments
Given that the SecureDrop Application GPG Key (see #1138 for discussion of standardizing on unambiguous terminology) should never be published to keyservers, setting no expiration is more reasonable than the same practice would be for published personal keys. That said, I can see a reasonable limit of five years or so, which would open the door to a general recommendation that all GPG keys created during SecureDrop setup (for example, journalist GPG keys for email, admin GPG keys for OSSEC alerts and communicating with FPF staff) be set to the same limit. Mostly we've abstained from recommending a similar limit on the SecureDrop Application GPG Key to ease the maintenance burden for long-running instances, but encourage best practices in GPG use is probably a more appropriate goal for the docs. @garrettr, thoughts? |
I don't think it's wise to rely on this assumption. And in fact, it might even be good to have the admins sign the public key and push it so that sources can pre-encrypt things and maybe even somewhat verify the identity of the application server. We should tell people to set it to 1 or 2 years and specify that they need to update it occasionally. We have the endpoint that lets users download the key, and FPF could use to check that no keys are about to expire and if so send 30/15/7/3/2/1 day notices telling people to extend their key's life time. |
I agree with everyone else—better to have an expiration than none. |
I'm pretty skeptical about the value of introducing key expiry for the Submission Key:
As for the value of publishing the key in additional venues for pre-encryption, this is only likely to be used by a (perhaps vanishingly) small minority of sources. IMO the place to revisit this story is the discussion around end-to-end encryption (#92) or a shift away from GPG altogether. |
Closing per above, feel free to re-open if you want to make a strong counterargument. |
The SecureDrop Application GPG Key is not currently set to expire. Is that the right choice? It might be.
The text was updated successfully, but these errors were encountered: