diff --git a/README.md b/README.md index 55f4b21..b19e6d4 100644 --- a/README.md +++ b/README.md @@ -343,7 +343,7 @@ export IDENTITY="YubiKey User " Or use any attribute which will uniquely identity the key (this may be incompatible with certain use cases): ```console -export IDENTITY="My Cool YubiKey - 2024" +export IDENTITY="My Cool YubiKey - 2025" ``` ## Key @@ -360,7 +360,7 @@ export KEY_TYPE=rsa4096 Determine the desired Subkey validity duration. -Setting a Subkey expiry forces identity and credential lifecycle management. However, setting an expiry on the Certify key is pointless, because it can just be used to extend itself. [Revocation certificates](https://security.stackexchange.com/questions/14718/does-openpgp-key-expiration-add-to-security/79386#79386) should instead be used to revoke an identity. +Setting a Subkey expiry forces identity and credential lifecycle management. However, setting an expiry on the Certify key is pointless, because it can just be used to extend itself.[^1] This guide recommends a two year expiration for Subkeys to balance security and usability, however longer durations are possible to reduce maintenance frequency. @@ -382,11 +382,11 @@ export EXPIRATION=2026-05-01 ## Passphrase -Generate a passphrase for the Certify key. This credential will be used infrequently to manage Subkeys and should be very strong. +Generate a passphrase for the Certify key. This credential will be used to manage identity Subkeys. To improve readability, this guide recommends a passphrase consisting only of uppercase letters and numbers. -The following commands will generate a strong[^1] passphrase while avoiding certain similar-looking characters: +The following commands will generate a strong[^2] passphrase while avoiding certain similar-looking characters: ```console export CERTIFY_PASS=$(LC_ALL=C tr -dc 'A-Z1-9' < /dev/urandom | \ @@ -452,7 +452,7 @@ Define an array containing additional uids. As this is bash syntax, each array e ```console declare -a additional_uids -additional_uids=("Super Cool YubiKey 2024" "uid 1 ") +additional_uids=("Super Cool YubiKey 2025" "uid 1 ") ``` Add the additional uids to the key: @@ -2279,4 +2279,5 @@ EOF * [Offline GnuPG Master Key and Subkeys on YubiKey NEO Smartcard (2014)](https://blog.josefsson.org/2014/06/23/offline-gnupg-master-key-and-subkeys-on-yubikey-neo-smartcard/) * [Creating the perfect GPG keypair (2013)](https://alexcabal.com/creating-the-perfect-gpg-keypair/) -[^1]: See [issue 477](https://github.com/drduh/YubiKey-Guide/issues/477) for NIST guideline discussion. +[^1]: [Revocation certificates](https://security.stackexchange.com/questions/14718/does-openpgp-key-expiration-add-to-security/79386#79386) should be used to revoke an identity. +[^2]: See [issue 477](https://github.com/drduh/YubiKey-Guide/issues/477) for NIST guideline discussion. diff --git a/config/gpg-agent.conf b/config/gpg-agent.conf index ffd789c..d2363db 100644 --- a/config/gpg-agent.conf +++ b/config/gpg-agent.conf @@ -4,6 +4,7 @@ enable-ssh-support ttyname $GPG_TTY default-cache-ttl 60 max-cache-ttl 120 +# Select a valid program path for PIN entry prompt pinentry-program /usr/bin/pinentry-curses #pinentry-program /usr/bin/pinentry-gnome3 #pinentry-program /usr/bin/pinentry-tty