Re: Gnupg Decryption Question

2015-07-24 Thread Nomen Nescio
David Carter wrote:

 We currently use Gnupg 1.4.10
 

 This is a sample of how we would call 
 gpg to encrypt a text file prior to transmission: 
 
 gpg -c -o DataFile.gpg --batch --compress-algo 1 --cipher-algocast5 
 --passphrase KeyValue DataFile.txt 


 The files that we receive share the same KeyValue,
 so we would appreciate some guidance on undoing 
 what was done above.




gpg --batch --decrypt --output DataFile.txt --passphrase KeyValue DataFile.gpg



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg Decryption Question

2015-07-24 Thread Werner Koch
On Thu, 23 Jul 2015 19:11, sbut...@fchn.com said:
 This is a snippet of the script I use to decrypt any file coming to me that 
 has my private key (or my companies private key)

   $DFLT gpg_pass2 \
   | gpg --homedir $homedir --quiet --passphrase-fd 0 --no-tty --skip-verify \
 --no-permission-warning --no-mdc-warning --batch  \
 --output $oname --decrypt $x  /dev/null 21

If you receive arbitrary data you may want to add

  --max-output SUITABLELARGENUMBEROFBYTES

to avoid a DoS using special crafted compression data.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Archaic PGP usage

2015-07-24 Thread Werner Koch
On Thu, 23 Jul 2015 23:13, r...@sixdemonbag.org said:

 1.  PGP 2.6 is *small*.  The original PGP specification (RFC1991) is a
 small fraction of the size of the modern OpenPGP specification
 (RFC4880).  When it comes to trustworthy code, small is beautiful.

FWIW, RFC-1991 is not a complete specification of PGP-2.  You can't
implement a compatible version based on this info.  You also need to
look into the PGP-2 documentation and finally you need to be able to
send questions to another person who can provide an answer based on the
PGP-2 source code (which is public but due copyright reasons one
better does not do it by oneself).


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Archaic PGP usage

2015-07-24 Thread vedaal

On 7/23/2015 at 2:58 PM, A.T. Leibson jupell...@riseup.net wrote:

Do people (other than John Young) still use PGP? Why would someone 
want to do that?
 
=

The only possible reasons I can think of are:

[1] Remailer use,  
Original remailers used PGP 2.x and even though some use GnuPG, others are 
reluctant to change anything.

[2] Large File Transfers
PGP 2.x can be used as a uuencode, and automatically split a signed and 
encrypted armored file into 100 smaller files ready to be emailed and 
reconstitued by the receiver.

The default for file splitting, is 720 armored lines, but have done it for much 
more, and successfully sent a 1 gb Truecrypt container and reconstituted it.

If you are thinking of looking at PGP 2.x, I would recommend Disastry's 
version, as it is not limited to MD5 and IDA but can use any HASH and any 
encryption algorithm except for Camelia.

http://www.spywarewarrior.com/uiuc/disastry/263multi.htm
 
(btw,
If anyone knows how to install this on 64 bit Ubuntu 14.04 please let me know.
It wouldn't compile on Ubuntu 12.x, but was able to install the linux 
executable PGP on a 32 bit system, but can't on 14.x  64 bit.)

TIA

vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: Gnupg Decryption Question

2015-07-24 Thread Steve Butler
-Original Message-
From: Werner Koch [mailto:w...@gnupg.org] 
Sent: Friday, July 24, 2015 4:24 AM

On Thu, 23 Jul 2015 19:11, sbut...@fchn.com said:
 This is a snippet of the script I use to decrypt any file coming to me that 
 has my private key (or my companies private key)

   $DFLT gpg_pass2 \
   | gpg --homedir $homedir --quiet --passphrase-fd 0 --no-tty --skip-verify \
 --no-permission-warning --no-mdc-warning --batch  \
 --output $oname --decrypt $x  /dev/null 21

If you receive arbitrary data you may want to add

  --max-output SUITABLELARGENUMBEROFBYTES

to avoid a DoS using special crafted compression data.


Shalom-Salam,

   Werner
===

I'll look into that.  We do IP filtering on the firewall so we do know who is 
getting to our SFTP box (on Aug 3 we will shut down port 21 and standard FTP).  
All who send data to us must sign a business agreement (HIPAA rules).  One such 
does send us encrypted files that approach 25 GB in size -- yikes!!  Thankfully 
that is once a month.


-- 
CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, 
is for the sole use of the intended recipient(s) and may contain 
confidential 
and privileged information. Any unauthorized review, use, disclosure or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users