FAQ Best Practice/Usage

This is a list of frequently asked questions about using GnuPG VS-Desktop® and GnuPG Desktop®.

There are further FAQs:

Regarding your own keypair

Are there any recommendations for creating a key pair?

:CUSTOM_ID: create-key

The default algorithms and strengths correspond to the current recommendations. Adjustments are usually not required.

Using stronger algorithms (e.g. RSA-4096 instead of RSA-3072) does not provide any relevant increase in security, but it may have disadvantages. Encryption and decryption with RSA-4096, for example, is significantly slower and there are smartcards that cannot handle such key lengths.

If you want to use OpenPGP keys on smartcards, you should consider choosing “ECDSA/EdDSA” (or brainpool) instead of RSA-3072 for better performance and security. However, this may lead to compatibility issues with outdated software that is not VS-NfD compliant. When communicating between different countries with different approved algorithms, you may sometimes have to find a common denominator. RSA is usually the least problematic here.

It is also possible to create several different algorithms in one certificate and thus meet the requirements of different recipients. However, in the VS-NfD context, all algorithms (for encryption and signature) must be VS compliant in order for the certificate to be accepted as VS-NfD compliant.

What is the recommended procedure for changing names or e-mail addresses?

Background information: A certificate can have one or more user IDs. These have the following form at the most: My Name (Comment) <email@address.test>

If the name or email address associated with an OpenPGP key changes, we recommend adding a new user ID to the key or certificate. This will automatically become the primary user ID and will be displayed more prominently.

The advantage of another new user ID over creating a new OpenPGP key is that the original fingerprint is retained, so that it does not have to be compared again by the communication partners during the certification of the new user ID. In addition, existing encrypted documents and mails can continue to be decrypted with the same key that is currently in use.

If necessary, you can revoke the old user ID, which makes sense if an old mail address is not redirected.

In the following example, the domain name of the mail address changes.

Adding a new user ID

Open Kleopatra.

Right-click on your own OpenPGP key in the certificate list and select "Add User ID".

UID-change_owner-1_de.png

Then enter the desired new name and the new e-mail address. Usually, the information from the previous user ID is used by default, so that only the domain name has to be changed in the example. After making the change, confirm with OK.

UID-change_owner-2_de.png UID-change_owner-3_de.png

Enter the password for the key in the “Passphrase” dialog box and confirm by clicking “OK”.

UID-change_owner-4_de.png

The new user ID is now displayed in the certificate list, but the old user ID is still listed in the certificate details:

UID-change_owner-5_de.png

Right-click on the certificate that has been modified in order to save it as a file. The suggested name always ends in "public.asc".

UID-change_owner-6_de.png

Then send the exported file to the communication partners in the way you have decided on. This can be done, for example, via a simple e-mail, since it is a public key.

Importing an updated certificate

There are several options for importing.

Normally, you can simply double-click on the received file to import it into Kleopatra. Or you can drag and drop it onto the Kleopatra window.

The following is the import method from within Kleopatra, with the certificate file located in the recipient's file system:

Open Kleopatra.

Click on “Import” in the toolbar.

UID-change_import-1_de.png

Select the certificate file you have received and confirm by clicking “Open”.

UID-change_import-2_de.png

If the "old" certificate was already present in the recipient's certificate list, no automatic prompt asking whether the certificate should be certified appears during the import.

Therefore, it is displayed as "non-compliant" (highlighted in red) after the import:

UID-change_after-import-1_de.png

Now the new user ID needs to be certified:

UID-change_after-import-2_de.png

Since the fingerprint of the old user ID has already been verified in the past, you now only need to check that the changed user ID is plausible before you carry out the certification:

UID-change_after-import-3_de.png

After certification, the certificate is displayed again as “VS-NfD compliant” (green background):

UID-change_after-import-4_de.png

I have a new key pair. What do I do with the old one?

You should not delete old keys, but keep them. Even if they have expired or been revoked, you can still use them to decrypt old data.

The same applies to other people's certificates: you can still use them to verify old signatures.

After what period of time should key pairs be replaced?

There are no guidelines as to when you should replace your key.

The BSI merely recommends that key pairs should have a maximum validity period of three years. If there is no reason to suspect that a key has been compromised, you can simply extend it (again and again) instead of creating a new one.

An expiration date ensures that a lost key will no longer be used after some time, even if it can no longer be revoked.

If you want to avoid having too much data encrypted with the same (sub)key, you can periodically add a new encryption subkey to your key and only extend the signature key. This is based on the assumption that an attacker gains knowledge of the key and password and that changing the encryption material then excludes the attacker from further access to the communication. This assumption and approach have a number of further implications that we cannot discuss here. If the key material is handled with care, this approach is not necessary.

Do the keys or algorithms used not age?

The key material does not age.

Current algorithms are not expected to be breakable by brute force methods even after thousands of years.

As long as the security of the algorithm used is not questioned by the security community, it can continue to be used. We and the BSI would of course provide information if an algorithm should no longer be used and new key pairs should be created.

Do changes to the key require a new exchange with all parties?

Yes, if the key is changed, the public key (= certificate) must be distributed to the communication partners, who then have to re-import it. This also applies if the expiry date is changed.

Only if the user ID has been changed, a new certification is required (see “Procedure for changing name or email”.)

How can you minimize the time and effort required for certifications?

There are several options.

Please take a look at our website at “GnuPG Infrastructure Services” and “GnuPG actium”.

We recommend either reading our whitepaper “Certificate management with GnuPG” on the subject or the document “Certification management with GnuPG VS-Desktop” (can be found in Kleopatra under Help -> More documentation). The latter focuses more on the practical part of the whitepaper.

You can then inquire about the procedure that seems most appropriate for your organization.

Working in teams

Use of function mailboxes / sharing a key

For functional email addresses, such as “info@…”, a secret key is shared between several users of this mailbox.

To do this, a user creates a key and a backup file of the secret key. (Kleopatra: “Create backup copy of secret key…”; CLI: gpg --export-secret-keys _NAME_)

The secret key file and the password used must be passed on to the other users in a secure manner (more on this below). They then only need to import the key.

Secure exchange of a shared key

One option is to copy the secret key onto a USB stick marked VS-NfD (RESTRICTED, FOR INTERNAL USE ONLY) and hand it over in person. Another possibility would be to send it by post with guaranteed personal delivery. We recommend that the corresponding password be handed over separately by a different method in this case.

You can also store the secret key encrypted in a shared folder in a way that complies with the German regulation for VS-NfD (RESTRICTED, FOR INTERNAL USE ONLY) or send it by email like other VS-NfD data. To do this, the people who need the key of the functional mailbox must also have their own OpenPGP key to which the secret key file is encrypted.

In this way, passwords for symmetrically encrypted files can also be distributed securely and easily instead of sending them by courier.

Sharing a key in the VS/RESTRICTED context

When dealing with VS data, the "need to know" principle must be observed.

For small internal groups, such as a functional mail address, it is admissible to share a secret key. However, the larger the group, the greater the risk that the secret key will be compromised.

Kleopatra groups for encryption in teams

For project groups, the use of the Kleopatra group function is usually recommended. The size of the group is (more or less) irrelevant. The data is encrypted for each of the participants when the group is selected as the recipient.

The groups are managed in Kleopatra. A group name should be given that corresponds to a team or project. If there is an email address for the project group, this should be used as the name. Then an email sent to this address is encrypted with all the certificates belonging to the group.

Care should be taken to ensure that one person is responsible for maintaining the group, so that only authorized persons are included in the group and that the new group definition is quickly made available to all participants when the list is changed.

Detailed documentation can be found in Kleopatra under "Help".