McAfee MEJCAE-AM-DA Product Guide - Page 165

Flags, Key ID, User ID, indicates that the key has been revoked

Page 165 highlights

Understanding the key list display • A DH/DSS key displays 2 numbers; the first number represents the number of bits that make up the encryption key, and the second number represents the number of bits that make up the signing key. If there is no subkey, then the number displayed is the size of the signing key. • A new RSA key (RSA4) also shows 2 numbers, one for the encryption key and one for the signing key, but they are the same number. If there is no subkey, then the number displayed is the size of the signing key. • An RSA Legacy key has only one key for both encryption and signing. Flags There are 5 fields within the Flags column. Each of these fields represent specific key properties. • The symbols in the first field represent the key's validity: • a dash (-) indicates an invalid key. • v indicates a marginally valid key. • V indicates a valid key. • The symbols in the second field represent the key's trust setting: • a dash (-) indicates an untrusted key • t indicates a marginally trusted key • T indicates a trusted key • I indicates that you implicitly trust this key. • The symbols in the third field represent the status of the key-if the key is currently disabled or revoked: • a dash (-) indicates that the key is not disabled or revoked • D indicates that the key is currently disabled • R indicates that the key has been revoked • The symbols in the fourth field tell you if key is expired: • a dash (-) indicates that the key is not expired • E indicates that the key is expired • The symbols in the fifth field tell you if there's an Additional Decryption Key (ADK) present: • a dash (-) indicates that the key does not have an ADK • A indicates that there is an ADK present on the key Key ID Specifies the key ID, a legible code that uniquely identifies a key pair. Two key pairs may have the same user ID, but they will have different Key IDs. User ID Specifies the primary user ID, a text phrase that identifies a key pair. For example, one common format for a user ID is the owner's name and email address. The user ID helps users (both the owner and colleagues) identify the owner of the key pair. E-Business Server™ 8.6 Product Guide 163

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188

E-Business Server
8.6
Product Guide
163
Understanding the key list display
A DH/DSS key displays 2 numbers; the first number represents the number of bits that make up the
encryption key, and the second number represents the number of bits that make up the signing key. If
there is no subkey, then the number displayed is the size of the signing key.
A new RSA key (RSA4) also shows 2 numbers, one for the encryption key and one for the signing key,
but they are the same number. If there is no subkey, then the number displayed is the size of the signing
key.
An RSA Legacy key has only one key for both encryption and signing.
Flags
There are 5 fields within the
Flags
column. Each of these fields represent specific key properties.
The symbols in the first field represent the key’s validity:
a dash (
-
) indicates an invalid key.
v
indicates a marginally valid key.
V
indicates a valid key.
The symbols in the second field represent the key’s trust setting:
a dash (
-
) indicates an untrusted key
t
indicates a marginally trusted key
T
indicates a trusted key
I
indicates that you implicitly trust this key.
The symbols in the third field represent the status of the key—if the key is currently disabled or revoked:
a dash (
-
) indicates that the key is not disabled or revoked
D
indicates that the key is currently disabled
R
indicates that the key has been revoked
The symbols in the fourth field tell you if key is expired:
a dash (
-
) indicates that the key is not expired
E
indicates that the key is expired
The symbols in the fifth field tell you if there’s an Additional Decryption Key (ADK) present:
a dash (
-
) indicates that the key does not have an ADK
A
indicates that there is an ADK present on the key
Key ID
Specifies the key ID, a legible code that uniquely identifies a key pair. Two key pairs may have the same
user ID, but they will have different Key IDs.
User ID
Specifies the primary user ID, a text phrase that identifies a key pair. For example, one common format for
a user ID is the owner's name and email address. The user ID helps users (both the owner and colleagues)
identify the owner of the key pair.