Re: Gnupg Decryption Question
David Carter wrote: We currently use Gnupg 1.4.10 This is a sample of how we would call gpg to encrypt a text file prior to transmission: gpg -c -o DataFile.gpg --batch --compress-algo 1 --cipher-algocast5 --passphrase KeyValue DataFile.txt The files that we receive share the same KeyValue, so we would appreciate some guidance on undoing what was done above. gpg --batch --decrypt --output DataFile.txt --passphrase KeyValue DataFile.gpg ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Gnupg Decryption Question
On Thu, 23 Jul 2015 19:11, sbut...@fchn.com said: This is a snippet of the script I use to decrypt any file coming to me that has my private key (or my companies private key) $DFLT gpg_pass2 \ | gpg --homedir $homedir --quiet --passphrase-fd 0 --no-tty --skip-verify \ --no-permission-warning --no-mdc-warning --batch \ --output $oname --decrypt $x /dev/null 21 If you receive arbitrary data you may want to add --max-output SUITABLELARGENUMBEROFBYTES to avoid a DoS using special crafted compression data. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Archaic PGP usage
On Thu, 23 Jul 2015 23:13, r...@sixdemonbag.org said: 1. PGP 2.6 is *small*. The original PGP specification (RFC1991) is a small fraction of the size of the modern OpenPGP specification (RFC4880). When it comes to trustworthy code, small is beautiful. FWIW, RFC-1991 is not a complete specification of PGP-2. You can't implement a compatible version based on this info. You also need to look into the PGP-2 documentation and finally you need to be able to send questions to another person who can provide an answer based on the PGP-2 source code (which is public but due copyright reasons one better does not do it by oneself). Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Archaic PGP usage
On 7/23/2015 at 2:58 PM, A.T. Leibson jupell...@riseup.net wrote: Do people (other than John Young) still use PGP? Why would someone want to do that? = The only possible reasons I can think of are: [1] Remailer use, Original remailers used PGP 2.x and even though some use GnuPG, others are reluctant to change anything. [2] Large File Transfers PGP 2.x can be used as a uuencode, and automatically split a signed and encrypted armored file into 100 smaller files ready to be emailed and reconstitued by the receiver. The default for file splitting, is 720 armored lines, but have done it for much more, and successfully sent a 1 gb Truecrypt container and reconstituted it. If you are thinking of looking at PGP 2.x, I would recommend Disastry's version, as it is not limited to MD5 and IDA but can use any HASH and any encryption algorithm except for Camelia. http://www.spywarewarrior.com/uiuc/disastry/263multi.htm (btw, If anyone knows how to install this on 64 bit Ubuntu 14.04 please let me know. It wouldn't compile on Ubuntu 12.x, but was able to install the linux executable PGP on a 32 bit system, but can't on 14.x 64 bit.) TIA vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
RE: Gnupg Decryption Question
-Original Message- From: Werner Koch [mailto:w...@gnupg.org] Sent: Friday, July 24, 2015 4:24 AM On Thu, 23 Jul 2015 19:11, sbut...@fchn.com said: This is a snippet of the script I use to decrypt any file coming to me that has my private key (or my companies private key) $DFLT gpg_pass2 \ | gpg --homedir $homedir --quiet --passphrase-fd 0 --no-tty --skip-verify \ --no-permission-warning --no-mdc-warning --batch \ --output $oname --decrypt $x /dev/null 21 If you receive arbitrary data you may want to add --max-output SUITABLELARGENUMBEROFBYTES to avoid a DoS using special crafted compression data. Shalom-Salam, Werner === I'll look into that. We do IP filtering on the firewall so we do know who is getting to our SFTP box (on Aug 3 we will shut down port 21 and standard FTP). All who send data to us must sign a business agreement (HIPAA rules). One such does send us encrypted files that approach 25 GB in size -- yikes!! Thankfully that is once a month. -- CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users