(Hans-Dieter) Oliver Kaluzny
ok.gpg[ät]qyyp.de
18th Apr 2021 – V1.1
GnuGP Key Policy
In General The latest version and its signature can be found here:
https://qyyp.de/gnupg/oliver_kaluzny_0x84709B559B7EAE58/
All updates about my keys can be tracked here:
https://www.qyyp.de/gnupg/
Currently Valid Keys
For all gpg encrypted communication
the following Key with its Subkeys is used.
pub brainpoolP512r1/0x84709B559B7EAE58 2021-04-17 [SC] [expires: 2026-04-16]
Schl.-Fingerabdruck = 26E0 795E 58DC 6C56 7AD4 A481 8470 9B55 9B7E AE58
uid [ ultimativ ] Oliver Kaluzny [ok.gpg(ät)qyyp.de]
uid [ ultimativ ] Oliver Kaluzny
sub brainpoolP256r1/0x1899B9D1A3F9F2B5 2021-04-17 [E] [expires: 2023-04-17]
sub brainpoolP256r1/0x9F21C834CDA4797C 2021-04-17 [S] [expires: 2023-04-17]
Please kindly refrain using any other keys – especially not those generated
before 17th Apr 2021 – since Communication using any other keys than the
above cannot be handeled.
Invalid, Expired or Revoked Keys
Please do not use the following keys for communication anymore, which was formerly published on this Webspace:
brainpoolP512r1/0xC14303C5C50C609E 2019-03-28 [SC] [expired: 2021-03-27]
Fingerprint = A7EF 265C 1ABA AABE 8927 A95B C143 03C5 C50C 609E
brainpoolP256r1/0x0361D308E4F02CDA 2019-03-28 [S] [expired: 2020-03-27]
brainpoolP256r1/0x933DA7128E768025 2019-03-28 [E] [expired: 2020-03-27]
These Keys are not valid anymore.
Offline-Computer
Offline Computer in this Key policy means:
The OS- and Data-Partitions of the Offline-Computer are encrypted.
The Computer is kept offline all time after set up and is used for GPG and
other Certificates only.
Secret-Offline-Master-Key
The Secret-Offline-Master-Key was generated and is stored on a Offline-Computer only.
it won’t be moved to any unencrypted and network connected devices.
The Capabilities of the Offline-Master-Key is ’sign‘ and ‚certify‘ only,
never ‚encrypt‘ or ‚authenicate‘.
The ’sign‘ capability will be only used to sign a transition statement
in case the Offline-Master-Key or one of its Sub-Keys will be revoked
(see below at’Transition‘).
The ‚certify‘ capability is only used to create new sub-keys, UIDs or to
certify UIDs contained in others public keys.
Secret-Sub-Keys
The Secret-Sub-Keys are generated and stored as a copy in the same way as the
Offline-Master-Key. The Secret-Sub-Keys will be used only on a encrypted
offline computer or via a smartcard. For each capability a own Subkey is
created (’sign‘, ‚encrypt‘).
Self-Signature
The Signature of the Key contains the Webadress of this Webspace
Expiration
The Master-Key expires after 5 (five) and its Sub-Keys expire after 2 (two) years.
A new self signature with a new expiration date which is 1-3 (one to three) years in the
future will be created. The old self signature will be deleted and only the
new self signature will remain stored.
The updated Secret-Sub-Keys will be copied from the Offline-Computer
to a smartcard. The corresponding updated Public-Keys will be published on this Webspace. Sorry no public Keyservers will be used.
UIDs
For the email address which is currently active a UID is created by the
master key on the corresponding secure device (see at ‚Master Key‘ below).
As soon as an email associated with a UID becomes inactive it will be
revoked by the master key.
Public Keys
For transferring public keys from the secure device only a clean
USB stick is used.
The public keys can be found only on this Webspace.
Transission
In case the master key needs to be replaced, a transition statement will show, which
old key will be revoked and which new one will be used instead.
That transition statement will be signed with the old master key
and uploaded to:
https://www.qyyp.de/gnupg/transition
Revocation
When a sub key is considered insecure it will be revoked via revocation certificate.
Then a new sub key is generated as a replacement.
In case a master key is considered insecure all contained sub keys and the
master key itself will be revoked.
Afterwards the revocation certificates and the new public key are exported
to the USB stick, transfered to the internet-connected device and pushed to
the keyservers (see chapter ‚Public Key‘).
Revocation certificates will be stored at:
https://www.qyyp.de/gpg/revocations/.rev
Then the smartcard will be updated with the new keys.
Revoked keys (especially sub keys with the ‚encrypt‘ capability) are never
deleted so that content which was encrypted before revocation can still be
decrypted afterwards.
Key Signing
Certificates are at most valid for three years. In case the key to be
signed expires earlier the certificate expires at the same expiration date.
Please kindly accept and be aware that I only certify with level 3
and not less than level 3.
For level 3 certifications, there must be a meeting in person, where the
– keys main UID and fingerprint has to be provided on paper
– main UID has been validated with a passport, identity card or drivers license
After the meeting a signed email has to be send from every UID to be signed to
my primary UID. That is to have a small proof that the candidate owns those
email address(es).
In case a it gets certified with level 3.
Candidates will get a signed and encrypted email in reply. That has their
public key attached updated with my signature(s).
Key Server
Due to the risk of Spam and due to the fact that Fake-Keys and old Keys cannot be deleted, Keyservers are not used.
Key 0x84709B559B7EAE58 :
-----BEGIN PGP PUBLIC KEY BLOCK----- mJMEYHtq8BMJKyQDAwIIAQENBAMEDEUqT9NRloj7OHAReaWUFZwUZpR8Wmf3Ohmc WC8NvWWqxRJqgVFQyGz3fy0gFjWbDEuJdB7IV6Ca/DK/NjGMdDtmrXSuz/LKC9oA EWbgilo6q4Ty6nWvTdcSQXM1fEXbdKnLjkOgzm7PABhblyAS5Td+R1i0de6IHAMG kl7DGm60H09saXZlciBLYWx1em55IDxvay5ncGdAcXl5cC5kZT6JAQsEExMKAHMW IQQm4HleWNxsVnrUpIGEcJtVm36uWAUCYHtvpzkaaHR0cHM6Ly9xeXlwLmRlL2du dXBnL29saXZlcl9rYWx1em55XzB4ODQ3MDlCNTU5QjdFQUU1OC8CGwMFCQlmAYAE CwkIBwQVCgkIAhYAAh4BAheAAAoJEIRwm1Wbfq5Y3HACAKEDquLjdXoxAdn5VU7k 6QmLm7uNrE5VNUqlkvgn5zY69Nx5awcVDFDgpHs7eyZygUah9Trm9qab2jtkna8z WPAB/145Nuc8iWRU86Xc4XPSlOVvGOL/7IYhNBURq5U7+Q0UfBqN5k06x9yurc5J NOObCrogCJTntAGx1Zg5fWvIJrO0Dk9saXZlciBLYWx1em55iQELBBMTCgBzFiEE JuB5XljcbFZ61KSBhHCbVZt+rlgFAmB7b6c5Gmh0dHBzOi8vcXl5cC5kZS9nbnVw Zy9vbGl2ZXJfa2FsdXpueV8weDg0NzA5QjU1OUI3RUFFNTgvAhsDBQkJZgGABAsJ CAcEFQoJCAIWAAIeAQIXgAAKCRCEcJtVm36uWIGjAfsEvmLQEDKcD4n7IZ/fAhKy sOUY4cPxjoCtpevuwyY/w8QgEVMx/wkxEMqmCNkDFZb40szepwhmA55nb2USVHhh AgCchZ+JPWtXTZH7t66Obmq2EPQowWniEyGKyNsmGoMJRcRw0I13h3DSmfmVhSYC ICt72vbAlDFrzQ5qnLu48GNeuFcEYHt0LBIJKyQDAwIIAQEHAgMEDiYQUBIY6/Xe KL4t+wgyqnYu7cwsUJERymQyrHK5mlE6q4AjMG3celi/ZF93fVSFigLI27gOqhww h4tw7fDe1QMBCAeI+AQYEwoAYBYhBCbgeV5Y3GxWetSkgYRwm1Wbfq5YBQJge3Qs ORpodHRwczovL3F5eXAuZGUvZ251cGcvb2xpdmVyX2thbHV6bnlfMHg4NDcwOUI1 NTlCN0VBRTU4LwIbDAUJA8JnAAAKCRCEcJtVm36uWA4eAf98iSVV4xZACd7Mlqrj Cht75ACCbDRPi0aq/6JpsVeiqlpEgoIvDeFF6qouBBl0npRsyC3+02Ln4GM+MfcW 3bcUAf0eDj/nb2KigymDGApB+Fkzf9S/i9CYRVcLq6h1GAlyutQRZletsYr/AO2K RkQEgykwhnOgLg8L954Eexw/n2GRuFMEYHt0cRMJKyQDAwIIAQEHAgMEYb8OCShR 9uQmU4EzA5lOCf2UeNxKd42AR280Dw8zfY0T4lTaTy5M4PHIhi2IeamkiWZdZkUv yZHXMxl7Nu+BNIkBqQQYEwoAYBYhBCbgeV5Y3GxWetSkgYRwm1Wbfq5YBQJge3Rx ORpodHRwczovL3F5eXAuZGUvZ251cGcvb2xpdmVyX2thbHV6bnlfMHg4NDcwOUI1 NTlCN0VBRTU4LwIbAgUJA8JnAAC7CRCEcJtVm36uWLAgBBkTCgBXFiEEBTOwcfYw i+nS3TdknyHINM2keXwFAmB7dHE5Gmh0dHBzOi8vcXl5cC5kZS9nbnVwZy9vbGl2 ZXJfa2FsdXpueV8weDg0NzA5QjU1OUI3RUFFNTgvAAoJEJ8hyDTNpHl8KvYA/3Yd prKnfu+s+IZnCmw2YXefzwpckUJHaOEbtwKqOCbEAPsGqyK8NyTYMYz0wv5VpxCf arbtQQGKAFskHlpqB5lDM+5vAf937AAPkKVhAZQInd247AXCVSCRHDRUDenfF3wd OcGhEsxmf5Mt4RY7khSk3Si9tmWUZy5gqCRlG0696pC/sSfSAf4oNhddHr9zXZaI KG9hgPl/zehWdkKtJLMsEtNh5/M+sCOnHq3RFVKvpcrkgFXiSOqdfqSw+wr7rE+F Ig32s1uuuFMEYHt0qhMJKyQDAwIIAQEHAgMEW4QUDKwGTrYkLCUFxJTbgonmk+4x rVZPQGqk4SG6GyQ8eECvblw/LhqR2s/e9Lud5U6qXnyKeHhozUODEDCHNIj4BBgT CgBgFiEEJuB5XljcbFZ61KSBhHCbVZt+rlgFAmB7dKo5Gmh0dHBzOi8vcXl5cC5k ZS9nbnVwZy9vbGl2ZXJfa2FsdXpueV8weDg0NzA5QjU1OUI3RUFFNTgvAhsgBQkD wmcAAAoJEIRwm1Wbfq5YUIcCAKJ9R4JGiUeT/eVGHRH/D38mMeqg4La/e5gCRwVt ZSr1m9i5t1XxekswdH27XegE61jquFcramURpO4nZfBurukB/3/ycn+gizjUxOY4 sn5RX2nHLirdOT+erQVeCUTkom19b61MHUTj86ibmqgxB+xmI3B3nXgwzZbMmm+N XC73BXE= =ZGwb -----END PGP PUBLIC KEY BLOCK-----