Re: Setting up a new laptop - importing keyrings

2009-01-12 Thread Todd Zullinger
Anne Wilson wrote:
> I'm setting up a new netbook, and have copied into the .gnupg folder
> my keyrings and associated files from this laptop.  Kgpg lists the
> keys correctly, but all is not well.  When I try to set keys for
> signing and encryption I get the endless searching bar, as Chris
> described a few days ago.

I know nothing of Kpg, but perhaps we can determine whether the issue
is with gpg or Kgpg and that might narrow down where to look.

> I considered starting from an empty keyring and importing signatures
> as they arrive in kmail, but I think the problem is that I don't
> know how to get the secret key recognised.

Are your secret keys listed by "gpg --list-secret-keys" ?  If so, then
the problem isn't with the keyrings.  It could be with Kgpg or the
gpg-agent setup (IIRC, that was what the problem a few days ago was).

-- 
ToddOpenPGP -> KeyID: 0xBEAF0CE3 | URL: www.pobox.com/~tmz/pgp
~~
A hen is only an egg's way of making another egg.
-- Samuel Butler



pgprRr9gvvrsb.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question of using GNUPG on Win OS

2009-01-12 Thread Robert J. Hansen
Neil Yan wrote:
> 1. Where can I download a windows version of GNUPG? The files on GNUPG
> download ftp site seems all are Linux version.

ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.9.exe

> 2. How can I decrypt files by using GNUPG programmatic? Using some DLL
> API or call the command?

Calling the command.  You may find Perl to be very useful for this.

> 3. Are there any guid or documents for GNUPG windows version?

I assume you mean GUIs, as in Graphical User Interface.  (GUID is
another acronym: Globally Unique Identifier.)  Yes; Google for WinPT or
GPGshell.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Question of using GNUPG on Win OS

2009-01-12 Thread Neil Yan
Hi,

Currently i have a project need some data from PGP encrypted files. I need
to decrypt these files by program. I think GNUPG should be a greate tool for
my requirement. But I am really confused by the GNUPG version and usage
since I don't have many experience of Linux OS. My project will be executed
on Win OS. So, I have following questions need your help. Really appriciated
for any helps.

1. Where can I download a windows version of GNUPG? The files on GNUPG
download ftp site seems all are Linux version.

2. How can I decrypt files by using GNUPG programmatic? Using some DLL API
or call the command?

3. Are there any guid or documents for GNUPG windows version?

-- 
Thanks,
Neil
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Expire of elgamal sub

2009-01-12 Thread Patrick Matthäi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Faramir schrieb:
> Hello Patrick,
> 
>> A much more time later I saw, that my elgamal still has got an
>> expiration date and I can not find anything how I could change it.
> 
>  gpg -edit--key 7A5A6CC7 (press enter)
>  key 1 (press enter -this will select the subkey to edit)
>  expire (press enter -this will tell gpg you want to modify the
> expiration date)
> and then, select the new expiration time. 0 means it will never expire,
> (n)w means it will expire in n weeks... gpg will show you the available
> options.
>  Once everything is ok, use the 'save' command to save the changes, and
> all you need to do after that, is to send your public key to your
> friends (or to upload it again to keyservers) in order to let them know
> your subkey is not going to expire.

Hm the key 1 one was the right thing I searched weeks for!
I just thought I could select keys etc with 1,2,3 etc, with key I also
could select my elgamal :)


>> Then I added a new elgamal, the 2048g/610BB46C one.
>> Is this right so? Can I edit the expire of the elgamal? What would
> 
>   Well, you can always add more subkeys... but *never* delete them, even
> if they expire or are revoked... if you delete an encrypting subkey, you
> will be unable to decrypt anything encrypted to that subkey...
> 
>> happen *now* if the elgamal 2048g/D6395C9A has been expired?
> 
>   If that elgamal subkey expires, people (including you) will be unable
> to use it to encrypt messages. But since you already have another
> elgamal subkey with encryption capability, *I think* you would not
> notice anything strange (unless your friends don't have the updated
> public key containing the new subkey... if they don't have it, they
> won't be able to send you encrypted things). Anyway, old messages
> encrypted to the expired subkey can still be decrypted, as long as you
> don't delete the expired subkey.
> 
>> Please CC my while I am not subscribed and thanks. :-)
> 
>   Done... but maybe you would like to subscribe... I think the list
> always carries interesting stuff.
> 
>   Now, I will paste an example about how to edit the expiration date of
> your subkey. Unfortunately, the language is Spanish, but I think that
> won't be a big problem, since it's very few text... My comments go
> behind '//' signs:
> //this is a comment, not a command
> 
> Orden> gpg -edit--key 88EB95D7 //Orden = Command
> pub  1024D/0x88EB95D7  creado: 2009-01-07  caduca: nunca   uso: SCA
>confianza: absoluta  validez: absoluta
> sub  2048g/0xDEF0DD90  creado: 2009-01-07  caduca: nunca   uso: E
> sub  2048g/0x53AD1366  creado: 2009-01-07  caduca: 2009-01-14  uso: E
> [  absoluta ] (1). Tester3 (for test purposes) 
> //since the subkey I need to edit is the second one displayed,
> //I need to select the subkey number 2. I think you will need to select
> //your subkey number 1
> 
> Orden> key 2  //this will select it
> 
> pub  1024D/0x88EB95D7  creado: 2009-01-07  caduca: nunca   uso: SCA
>confianza: absoluta  validez: absoluta
> sub  2048g/0xDEF0DD90  creado: 2009-01-07  caduca: nunca   uso: E
> sub* 2048g/0x53AD1366  creado: 2009-01-07  caduca: 2009-01-14  uso: E
> [  absoluta ] (1). Tester3 (for test purposes) 
> //please note the '*' sign near the selected subkey. If you select the
> //wrong one, repeat the command to deselect it, and then select the
> //right one
> 
> Orden> expire
> Cambiando fecha de caducidad de subclave.
> Por favor, especifique el período de validez de la clave.
>  0 = la clave nunca caduca
> = la clave caduca en n días
>   w = la clave caduca en n semanas
>   m = la clave caduca en n meses
>   y = la clave caduca en n años
> ¿Validez de la clave (0)? 0
> //here I had to enter how much time I want to give it before
> //it expires. I entered 0 to set it to never expire
> La clave nunca caduca
> ¿Es correcto? (s/n) s
> 
> //gpg ask me if it is right to never expire it. I told it it was right
> 
> Necesita una frase contraseña para desbloquear la clave secreta
> del usuario: "Tester3 (for test purposes) "
> clave $s de $u bits, ID $s, creada el $s
> 
> pub  1024D/0x88EB95D7  creado: 2009-01-07  caduca: nunca   uso: SCA
>confianza: absoluta  validez: absoluta
> sub  2048g/0xDEF0DD90  creado: 2009-01-07  caduca: nunca   uso: E
> sub* 2048g/0x53AD1366  creado: 2009-01-07  caduca: nunca   uso: E
> [  absoluta ] (1). Tester3 (for test purposes) 
> 
> //gpg request the passphrasse in order to be able to make the changes
> 
> Orden> save
> //I gave the 'save' command to save the changes, and that's all
> 
> Best Regards

Okay now I understand it with the "key" cmd. Much thanks also for your
complete howto! :-)

- --
/*
Mit freundlichem Gruß / With kind regards,
Patrick Matthäi

E-Mail: patrick.matth...@web.de

Comment:
Always if we think we are right,
we were maybe wrong.
*/

-BEGIN PGP SIGN

Re: recover private key

2009-01-12 Thread jakse

Once again! Thanks you guys for helping me out!


Faramir-2 wrote:
> 
>   Yes, you can send messages to me, and I am sure other people here will
> volunteer to test encryption with you. 
> 
You are right, john and I already tested it, i had to send the public key to
him by mail though. He could find it on the key server... hmmm?! which is
strange since i think i uploaded it at some point in time.


Faramir-2 wrote:
> 
>   Well, when I install GPG, the keyrings are empty, so I don't think it
> comes with a "demo"...
> 

my private key starts with the following:
This is a test secret keyring simply stored by GNUPG so that it is easier to
make diff files.  

sec   /XXX 2003-12-31 Test one (pp=def)  
ssb   /XXX 2003-12-31  

sec   /XXX 2003-12-31 Test two (no pp)  
ssb   /XXX 2003-12-31  

sec   /XXX 2003-12-31 Test three (no pp)  

How come it has those example mails there?!


Faramir-2 wrote:
> 
>> gpg: WARNING: key ECABF51D contains preferences for unavailable
>> gpg:  algorithms on these user IDs:
>> gpg:  "Test three (no pp) ": preference for
>> cipher algorithm 1
>> gpg: it is strongly suggested that you update your preferences and
>> gpg: re-distribute this key to avoid potential algorithm mismatch
>> problems
> 
>   There are several problems:
> 1.- I downloaded the key ECABF51D from keyservers, and it doesn't have a
>  subkey for encryption purposes, so you can only sign and certify, but
> not encrypt/decrypt.
> 

Hm. I'm starting to think that i may be better of starting over again?!
Maybe it is easier if I just try to generate a new key!? I don't know what
went wrong when i uploaded to the keyserver?!

Faramir-2 wrote:
> 
> 2.- Also, the key lists in it's preferences, the encryption algorithm
> IDEA (cipher algorithm 1). And GPG doesn't include that algorithm,
> because it is not free. It seems it can be used for non-business
> purposes, but I am not really sure about that, so if somebody sends a
> message to you, and it is encrypted with IDEA, you would be unable to
> decrypt it (but I think that is not your worst problem, since as long as
> you don't get encryption capabilities -by adding a subkey capable of
> encryption- I *think* people won't be able to send encrypted messages to
> you).
> 
>You can download idea.dll and configure gpg to use it, but unless you
> are sure you are not breaking the copyright... I am NOT sure about that,
> I have read somewhere it was allowed to use it if you are not doing
> business, but I am not sure about the reliability of the place where I
> read that. Also, when I tried to find the company that is supposed to
> hold de copyright, I couldn't find it on internet... (and since I was
> just curious about it, I didn't keep searching).
> 
> 

do you all use IDEA?! if it is not commonly used i dont think i'll try and
get it. Enough work to get the standard algorithm working for me ;)


Faramir-2 wrote:
> 
>   Last words: I am not sure if you should add a subkey first, and edit
> preferences latter, or to edit pref first, and add the key latter...
> 

Again: do you think it would be better for me to just start over?!


And by the way... why do you all sign your messages here? I'm not sure i
have understood the signing idea completely? it is to make sure that the
reader knows the sender is the person he/she says he/she is!? right!?

hope you are all enjoying the weekend!

J

-- 
View this message in context: 
http://www.nabble.com/recover-private-key-tp21268023p21397920.html
Sent from the GnuPG - User mailing list archive at Nabble.com.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Setting up a new laptop - importing keyrings

2009-01-12 Thread Anne Wilson
I'm setting up a new netbook, and have copied into the .gnupg folder my 
keyrings and associated files from this laptop.  Kgpg lists the keys 
correctly, but all is not well.  When I try to set keys for signing and 
encryption I get the endless searching bar, as Chris described a few days ago.

I considered starting from an empty keyring and importing signatures as they 
arrive in kmail, but I think the problem is that I don't know how to get the 
secret key recognised.

I'm happy to delete everything and start again if there is a better way, but I 
need help to get this sorted.  Thanks

Anne


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


[Announce] GnuPG 2.0.10 released

2009-01-12 Thread Werner Koch
Hello!

We are pleased to announce the availability of a new stable GnuPG-2
release:  Version 2.0.10.

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication
and data storage.  It can be used to encrypt data, create digital
signatures, help authenticating using Secure Shell and to provide a
framework for public key cryptography.  It includes an advanced key
management facility and is compliant with the OpenPGP and S/MIME
standards.

GnuPG-2 has a different architecture than GnuPG-1 (e.g. 1.4.9) in that
it splits up functionality into several modules.  However, both
versions may be installed alongside without any conflict.  In fact,
the gpg version from GnuPG-1 is able to make use of the gpg-agent as
included in GnuPG-2 and allows for seamless passphrase caching.  The
advantage of GnuPG-1 is its smaller size and the lack of dependency on
other modules at run and build time.  We will keep maintaining GnuPG-1
versions because they are very useful for small systems and for server
based applications requiring only OpenPGP support.

GnuPG is distributed under the terms of the GNU General Public License
(GPL version 3).  GnuPG-2 works best on GNU/Linux or *BSD systems.


What's New
===

 * [gpg] New keyserver helper gpg2keys_kdns as generic DNS CERT
   lookup.  Run with --help for a short description.  Requires the
   ADNS library.

 * [gpg] New mechanisms "local" and "nodefault" for --auto-key-locate.
   Fixed a few problems with this option.

 * [gpg] New command --locate-keys.

 * [gpg] New options --with-sig-list and --with-sig-check.

 * [gpg] The option "-sat" is no longer an alias for --clearsign.

 * [gpg] The option --fixed-list-mode is now implicitly used and obsolete.

 * [gpg] New control statement %ask-passphrase for the unattended key
   generation.

 * [gpg] The algorithm to compute the SIG_ID status has been changed.

 * [gpgsm] Now uses AES by default.

 * [gpgsm] Made --output option work with --export-secret-key-p12.

 * [gpg-agent] Terminate process if the own listening socket is not
   anymore served by ourself.

 * [scdaemon] Made it more robust on W32.

 * [gpg-connect-agent] Accept commands given as command line arguments.

 * [w32] Initialized the socket subsystem for all keyserver helpers.

 * [w32] The sysconf directory has been moved from a subdirectory of
   the installation directory to %CSIDL_COMMON_APPDATA%/GNU/etc/gnupg.

 * [w32] The gnupg2.nls directory is not anymore used.  The standard
   locale directory is now used.  

 * [w32] Fixed a race condition between gpg and gpgsm in the use of
   temporary file names.

 * The gpg-preset-passphrase mechanism works again.  An arbitrary
   string may now be used for a custom cache ID.

 * Admin PINs are cached again (bug in 2.0.9).

 * Support for version 2 OpenPGP cards.

 * Libgcrypt 1.4 is now required.



Getting the Software


Please follow the instructions found at http://www.gnupg.org/download/
or read on:

GnuPG 2.0.10 may be downloaded from one of the GnuPG mirror sites or
direct from ftp://ftp.gnupg.org/gcrypt/gnupg/ .  The list of mirrors
can be found at http://www.gnupg.org/mirrors.html .  Note, that GnuPG
is not available at ftp.gnu.org.

On the FTP server and its mirrors you should find the following files
in the gnupg/ directory:

  gnupg-2.0.10.tar.bz2 (3736k)
  gnupg-2.0.10.tar.bz2.sig

  GnuPG source compressed using BZIP2 and OpenPGP signature.

  gnupg-2.0.9-2.0.10.diff.bz2 (264k)

  A patch file to upgrade a 2.0.9 GnuPG source tree.  This patch
  does not include updates of the language files.

Note, that we don't distribute gzip compressed tarballs for GnuPG-2. 


Checking the Integrity
==

In order to check that the version of GnuPG which you are going to
install is an original and unmodified one, you can do it in one of
the following ways:

 * If you already have a trusted version of GnuPG installed, you
   can simply check the supplied signature.  For example to check the
   signature of the file gnupg-2.0.10.tar.bz2 you would use this command:

 gpg --verify gnupg-2.0.10.tar.bz2.sig

   This checks whether the signature file matches the source file.
   You should see a message indicating that the signature is good and
   made by that signing key.  Make sure that you have the right key,
   either by checking the fingerprint of that key with other sources
   or by checking that the key has been signed by a trustworthy other
   key.  Note, that you can retrieve the signing key using the command

 finger wk ,at' g10code.com

   or using a keyserver like

 gpg --recv-key 1CE0C630

   The distribution key 1CE0C630 is signed by the well known key
   5B0358A2.  If you get an key expired message, you should retrieve a
   fresh copy as the expiration date might have been prolonged.

   NEVER USE A GNUPG VERSION YOU JUST DOWNLOADED TO CHECK THE
   INTEGRITY OF THE SOURCE - USE AN EXISTING GNUPG INSTALLATION!

 * If you are not able to u