From owner-freebsd-questions@FreeBSD.ORG Thu Jun 16 16:19:36 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1CF0716A41C for ; Thu, 16 Jun 2005 16:19:36 +0000 (GMT) (envelope-from tshadwick@goinet.com) Received: from mail.goinet.com (mail.goinet.com [208.207.72.15]) by mx1.FreeBSD.org (Postfix) with ESMTP id B715243D4C for ; Thu, 16 Jun 2005 16:19:35 +0000 (GMT) (envelope-from tshadwick@goinet.com) Received: from mail.goinet.com (localhost.goinet.com [127.0.0.1]) by mail.goinet.com (8.13.1/8.13.1) with ESMTP id j5GGJLK5077823; Thu, 16 Jun 2005 11:19:21 -0500 (CDT) (envelope-from tshadwick@goinet.com) Received: from localhost (tshadwick@localhost) by mail.goinet.com (8.13.1/8.13.1/Submit) with ESMTP id j5GGJJJu077813; Thu, 16 Jun 2005 11:19:19 -0500 (CDT) (envelope-from tshadwick@goinet.com) X-Authentication-Warning: mail.goinet.com: tshadwick owned process doing -bs Date: Thu, 16 Jun 2005 11:19:19 -0500 (CDT) From: Tony Shadwick To: Dan Nelson In-Reply-To: <20050616031022.GA14991@dan.emsphone.com> Message-ID: <20050616111512.L30082@mail.goinet.com> References: <20050615180436.Q30082@mail.goinet.com> <20050616031022.GA14991@dan.emsphone.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed X-Virus-Scanned: ClamAV version 0.85.1, clamav-milter version 0.85 on mail.goinet.com X-Virus-Status: Clean Cc: freebsd-questions@freebsd.org Subject: Re: GnuPG in the enterprise X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Jun 2005 16:19:36 -0000 On Wed, 15 Jun 2005, Dan Nelson wrote: > In the last episode (Jun 15), Tony Shadwick said: >> Are there any good documents out there on managing GnuPG in the >> enterprise? >> >> There are basic issues I need to be able to address, such as a >> situation when an employee leaves a company. The admin needs to have >> the rights to revoke that user's public key, and be able decrypt any >> old messages to that user, and be able to decrypt messages sent to >> that user that are now being redirected to someone else for handling. >> >> Are there established mechanisms for handling centralized key >> management in a company to where the Administrator has access to >> everything required? > > One solution is to make a copy of all keys (with known passphrases) > when they are created, and put the copy in a secure location. If an > employee leaves suddenly, you can retrieve the key to decrypt leftover > files and revoke the key. Pgp.com's Windows PGP software uses special > Revoker keys and Additional Decryption keys that get added when files > are signed, so files are always encrypted to multiple recipients and > keys are always revokable even if the original key no longer exists. > gpg doesn't recognize ADKs, though. Just so I'm following then, let's say I have gnupg installed on my server, and I'm creating all of my employee's secret keys there, then installing gnupg on their workstations so that they can use local mail clients to encrypt. What's to prevent them from chaning their secret key passphrase or revoking the key themselves and creating a new public key, then publishing that to the keyservers? (Other than knowing enough about gnupg in the first place to do any of this of course...) Not to mention I've always wondering how gnupg plays with multiple recipients or internal company mailing lists. For example if I send a message to VIP1, VIP2, and VIP3, and it is an important internal document that requires encryption, when I encrypt the message, won't it get encrypted with VIP'1 public key, thus VIP2 and VIP3 won't be able to open the message? Sorry to babble, but it really is important to me to get this down and documented. It is very frustrating that I have clients that use no encryption on e-mail, even if they are sending sensitive account information. (!!!!)