How to transition to a new PGP key
Introduction¶
This document is for project committers who wish to change the PGP key they use at Apache (for example to sign releases). It explains how to create a new PGP key and break it in, gradually having it replace the old key.
Contents
- Important note
- Why replace a key?
- Using a single keyring for two keys
- Exporting both new and old keys
- Fingerprinting new and old keys
Important note¶
If your key has been compromised, you must not use a transition period as described below. Revoke the compromised key immediately and create a new one. Consider all web of trust links signed by the old key as suspect. You must establish a completely new set of links.
Why replace a key?¶
When replacing one uncompromised key with a newer (typically longer) one, using a transition period when both keys are trustworthy and participate in the web of trust uses trust transitivity to use links to the old key to trust signatures and links created by the new key. During a transition, both keys are trustworthy but you only use the newer one to sign documents and certify links in the web of trust.
This document describes how to use GnuPG to create a new key and manage both keys during this transition period.
Using a single keyring for two keys¶
It is best to use a single keyring containing both keys.
Generate a new key¶
Generate the new key either:
- directly in the keyring containing the old key
- in a new keyring, and then transfer the new key to the keyring containing the old key
To generate a strong RSA key follow these instructions. If you use a separate keyring, follow these instructions to transfer it.
Both new and old keys should now be contained in the same keyring. Verify this by:
$ gpg --list-secret-keys
alice/secring.gpg
sec 1024D/AD741727 2009-08-20
uid Alice Example (EXAMPLE OF OLD KEY) <alice@example.org>
ssb 1024g/268883A9 2009-08-20
sec 4096R/E2B054B8 2009-08-20
uid Alice Example (EXAMPLE NEW KEY) <alice@example.org>
ssb 4096R/4A6D5217 2009-08-20
Both new and old keys should be listed.
Open interactive edit mode¶
You need to perform a number of operations on the new key. Though you can perform them individually, saving and closing after each one, it is more convenient to use interactive edit mode.
Start by opening an edit session on the new key, for example E2B054B8
$ gpg --edit-key E2B054B8
gpg (GnuPG) 1.4.9; Copyright (C) 2008 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Secret key is available.
pub 4096R/E2B054B8 created: 2009-08-20 expires: never usage: SC
trust: unknown validity: unknown
sub 4096R/4A6D5217 created: 2009-08-20 expires: never usage: E
[ unknown] (1). Alice Example (EXAMPLE NEW KEY) <alice@example.org>
Command>
Trust the new key¶
The new key needs to be marked as ultimately trusted in this keyring. This will ensure that the web of trust links signed by this key will be trusted automatically.
Command> trust
pub 4096R/E2B054B8 created: 2009-08-20 expires: never usage: SC
trust: unknown validity: unknown
sub 4096R/4A6D5217 created: 2009-08-20 expires: never usage: E
[ unknown] (1). Alice Example (EXAMPLE NEW KEY) <alice@example.org>
Please decide how far you trust this user to correctly verify other users' keys
(by looking at passports, checking fingerprints from different sources, etc.)
1 = I don't know or won't say
2 = I do NOT trust
3 = I trust marginally
4 = I trust fully
5 = I trust ultimately
m = back to the main menu
Your decision? 5
Do you really want to set this key to ultimate trust? (y/N) y
pub 4096R/E2B054B8 created: 2009-08-20 expires: never usage: SC
trust: ultimate validity: unknown
sub 4096R/4A6D5217 created: 2009-08-20 expires: never usage: E
[ unknown] (1). Alice Example (EXAMPLE NEW KEY) <alice@example.org>
Please note that the shown key validity is not necessarily correct
unless you restart the program.
Use the old key (AD741727, say) to sign the new key:
Command> sign AD741727
pub 4096R/E2B054B8 created: 2009-08-20 expires: never usage: SC
trust: ultimate validity: ultimate
Primary key fingerprint: FF96 6261 C995 1DDE BF34 5150 D5D2 BDB5 E2B0 54B8
Alice Example (EXAMPLE NEW KEY) <alice@example.org>
Are you sure that you want to sign this key with your
key "Alice Example (EXAMPLE OF OLD KEY) <alice@example.org>"
(AD741727)
Really sign? (y/N) y
You need a passphrase to unlock the secret key for
user: "Alice Example (EXAMPLE OF OLD KEY) <alice@example.org>"
1024-bit DSA key, ID AD741727, created 2009-08-20
Check preferences¶
Make sure you are avoiding SHA-1 in the key preferences of both the new and old keys.
Complete the edit¶
It is convenient to add secondary user ids for current email accounts at this point.
Then save your changes, which will exit you from edit mode:
Command> save
Whether to sign the old key with the new¶
Arguments can be made for and against signing the old key with the new. The old key is less trustworthy now and will be revoked in future, so signing with it may be misleading for those unaware of the potential weaknesses. However, without this signature, signers of the new key will not receive the transitive benefit of the links made from the old key. Anyone who chooses not to sign the old key with the new should made efforts to re-sign links made by the old key with the new key.
Set the default to the new key¶
Next, change the default key on the keyring to the new. This ensures that all future signatures use the new key. Though you could still use the old key for signing by explicitly specifying it, avoid this since the signatures will be weak.
To make the new key the default, set the default-key
in the gpg.conf
configuration file. For example, to set the default to E2B054B8
add:
default-key E2B054B8
This setting can be tested by creating a test signature:
$ gpg --detach-sig --armor document
You need a passphrase to unlock the secret key for
user: "Alice Example (EXAMPLE NEW KEY) <alice@example.org>"
4096-bit RSA key, ID E2B054B8, created 2009-08-20
Verify that the new key has been chosen by default.
Upload both keys¶
Finish the process by uploading the new and old keys to the keyserver:
$ gpg --send-keys E2B054B8 AD741727
Create backups¶
Follow these instructions.
Generate and store revocation certificates¶
Follow these instructions to create and securely store [generic revocation certificates](release-signing.html#revocation-cert" for the new key.
Update documents¶
The final stage in the process is to update documents containing references to the old key so that they contain both the new and old keys. For Apache documents, follow this checklist. Use the instructions for a transition when there is a choice.
For other documents:
- Update those that contain an export with a dual export.
- Update those that contain a fingerprint with both fingerprints.
Web of trust¶
Read this Guide to Apache use of the web of trust and make arrangements to include your new key at the earliest opportunity.
Exporting both new and old keys¶
During the transition period, use a single export containing both new and old public keys whenever you need an export.
To create a suitable export, supply both key IDs on the command line. For example, to export keys AD741727 (old) and E2B054B8 (new) to FILENAME use:
$ gpg --export --armor --output FILENAME AD741727 E2B054B8
This exports only the public keys, and so isn't confidential. Replace the old public key with this dual export everywhere it was published.
Fingerprinting new and old keys¶
During the transitions, use both fingerprints. For example, to fingerprint old key AD741727
and new key E2B054B8
, use:
$ gpg --fingerprint AD741727 E2B054B8
pub 1024D/AD741727 2009-08-20
Key fingerprint = CD0C 5281 D0A9 E963 19AF F365 AD81 612A AD74 1727
uid Alice Example (EXAMPLE OF OLD KEY) <alice@example.org>
sub 1024g/268883A9 2009-08-20
pub 4096R/E2B054B8 2009-08-20
Key fingerprint = FF96 6261 C995 1DDE BF34 5150 D5D2 BDB5 E2B0 54B8
uid Alice Example (EXAMPLE NEW KEY) <alice@example.org>
sub 4096R/4A6D5217 2009-08-20
So the fingerprints are:
CD0C 5281 D0A9 E963 19AF F365 AD81 612A AD74 1727
forAD741727
FF96 6261 C995 1DDE BF34 5150 D5D2 BDB5 E2B0 54B8
forE2B054B8
For every fingerprint, the last 8 digits are the key ID.
Copyright 2024, The Apache Software Foundation, Licensed under the Apache License, Version 2.0.
Apache® and the Apache feather logo are trademarks of The Apache Software Foundation.