mirror of
https://codeberg.org/openpgp/notes.git
synced 2025-09-09 11:19:41 +02:00
ch6: write "Signature versions"
This commit is contained in:
parent
6cf4e07c7c
commit
ae59a9edf4
1 changed files with 10 additions and 5 deletions
|
@ -187,10 +187,15 @@ The recipient's hash algorithm preference is defined in metadata of their certif
|
|||
|
||||
In this workflow, the signed hash digest is created with a hash algorithm that follows the recipient's preferences, and its intersection with the sender's capabilities and preferences.
|
||||
|
||||
### Explore viability of having multiple signatures, e.g. v4+v6?
|
||||
### Signature versions
|
||||
|
||||
```{admonition} TODO
|
||||
:class: warning
|
||||
As described in the [RFC](https://www.ietf.org/archive/id/draft-ietf-openpgp-crypto-refresh-12.html#name-signature-packet-type-id-2), the version of a generated signature packet must conform to the version of the key that issues the signature.
|
||||
|
||||
C-R 5.2. says: An implementation MUST generate a version 6 signature when signing with a version 6 key. An implementation MUST generate a version 4 signature when signing with a version 4 key.
|
||||
```
|
||||
That is:
|
||||
|
||||
- OpenPGP version 6 keys must generate version 6 signature packets
|
||||
- OpenPGP version 4 keys must generate version 4 signature packets
|
||||
|
||||
Note that some historical version 3 signature packets may still be relevant for applications that handle old OpenPGP data[^sig-v3]. These version 3 signature packets will have been generated by version 4 keys.
|
||||
|
||||
[sig-v3]Version 4 signature packets were introduced in [RFC 2440](https://datatracker.ietf.org/doc/html/rfc2440#section-5.2) in 1998, which specifies that applications SHOULD generate v4 signature, however generation of v3 signature packets has remained allowed through [RFC 4880](https://www.rfc-editor.org/rfc/rfc4880.html#section-5.2).
|
Loading…
Add table
Add a link
Reference in a new issue