<table cellspacing="0" cellpadding="0" border="0"><tr><td valign="top"><div id='yahoo__compose_area' style="background-color:white; display:block; font-family:HelveticaNeue-Regular,Helvetica;">Using the same key for signing as for encryption gets vastly weaker security guarantees (i.e., Gap-DH for EC).There is no excuse for a new cryptosystem/deployment to do this.<div><br>- dlg<br>Y!-e2e</div><div><br></div><div>PS. Is messaging@ still forging 'From:' headers?</div></div><div id='yahoo__original_message' class='yQTDBase'><br><blockquote style="margin:0 0 0 .8ex; border-left:1px #ccc solid; padding-left:1ex; ">At Feb 11, 2015, 7:18:40 AM, Mike Hearn<'mike@plan99.net'> wrote:<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote"><div class="yQTDBase yqt2334484429" id="yqtfd28654"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">Are you using the same key for signing as for encryption with
this<br clear="none">
setup, or does your S/MIME cert somehow have a separate signing key from<br clear="none">
an encryption key?</blockquote></div><div><br clear="none"></div><div>With the free Comodo certs you get one key. But sometimes for other setups you have two keys, one for signing and one for encryption.</div><div><br clear="none"></div><div>I think the idea behind this is that the signing key has no copies and this policy can be enforced by the HSM firmware that generates it. Because, if you lose a signing key, you can just revoke it and generate a new one. The encryption key is generated in a different way that would allow for backups and copies to be made. Thus signing with the encryption key gives you lower assurance, because someone might have stolen it from a backup. But with the signing/"non repudiation" key, there are no backups anywhere and thus it's safer.</div><div><br clear="none"></div><div>This can be enforced with key usage flags in the certificate.</div><div><br clear="none"></div><div>My gut feeling is that this complexity causes more
problems than it solves. Before the dreaded OS X Yosemite upgrade, my signing stick worked for encryption just fine. Post Yosemite now the OS seems to think it's only usable for signing. I suspect the key usage restrictions are somehow involved.</div></div></div></div><div></div></blockquote></div></html></td></tr></table>