Re: using with su/sudo

2016-10-17 Thread Daniel Kahn Gillmor
On Sat 2016-10-15 11:34:14 -0400, John Lane wrote:
>> 
>> Then, the command "updatestartuptty" can fix the situation.
>> 
>
> I tried this and it worked, in a su/sudo I had to do this:
>
> $ script -q -c '(gpg-connect-agent updatestartuptty /bye; ssh-add
> alice.subkey)'

so the use of script here is to allocate a new pseudoterminal, to get an
independent tty, right?

this seems like a pretty roundabout way to get the result the user is
naively looking for.  is it possible that we could offer some other
easier/simpler mechanism for users invoking gpg-agent for its ssh-agent
emulation across user accounts?

  --dkg

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Please develop even easier materials for complete novice type folks...

2016-10-17 Thread Don Saklad
Please develop even easier materials for complete novice type folks 
other than at
https://emailselfdefense.fsf.org/en/

and at
https://gnupg.org

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: regular update of all keys from a keyserver

2016-10-17 Thread Brian Minton


On 10/17/2016 11:41 AM, Daniel Kahn Gillmor wrote:
> On Mon 2016-10-17 06:31:16 -0400, Martin T wrote:
>
>> I am aware that one can update all the keys in local-keyring from a
>> keyserver using "gpg --refresh-keys". Are there any disadvantages to
>> simply put this command into user crontab and execute for example once
>> a day?
> The only disadvantages are if you don't want to reveal the contents of
> your keyring to the public keyservers, or to announce your presence on
> the network.
>
> If you prefer to do these things in an anonymized way, you might prefer
> a tool like parcimonie, 

I run a key server, which allows me to do as many key-retrieval queries
as I like, without giving any information away to the rest of the
world.  It also helps a little, but not completely, with the problem of
adding keys to the keyserver network, with respect to my social
network.  In particular, it's not easy for any keyserver to see which of
its peers' peers a given key or set of keys, originated from.  However, 
in theory, an attacker could track the progress of a given key across
the network of keyservers by quick querying, but it's a pretty small
window between the introduction of keys to a single member of the pool,
and it being shared to all the keyservers.





signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: Re: regular update of all keys from a keyserver

2016-10-17 Thread Stephan Beck
I forgot to send it to the list as well...


 Forwarded Message 
Subject: Re: regular update of all keys from a keyserver
Date: Mon, 17 Oct 2016 16:20:00 +
From: Stephan Beck 
Reply-To: st...@mailbox.org
To: Martin T 

Hi Martin,

Martin T:
> Hi,
> 
> I am aware that one can update all the keys in local-keyring from a
> keyserver using "gpg --refresh-keys". Are there any disadvantages to
> simply put this command into user crontab and execute for example once
> a day?

Yes. To protect you and your contacts from an eavesdropper (may it be
the ISP or someone else), you may refresh your keyring over the Tor
Network, using Parcimonie (1), which opens another circuit for every
single refreshing action (one refreshing action, one refreshed key),
thus slowly refreshing the whole keyring. Actually, it works with gpg
v1, I've never got it working with gpg2, though. If someone out there
knows how to adapt it for use with gpg2, go ahead and tell us!

Well, you don't tell us anything about your system or your gpg version,
but another way (with gpg 2.1.10 or later) is using the in-built support
for refreshing your keyring via Tor using --use-tor option.
Quote from the 2.1.10 announce mail (2):
 * dirmngr: New option --use-tor.  For full support this requires
   libassuan version 2.4.2 and a patched version of libadns
   (e.g. adns-1.4-g10-7 as used by the standard Windows installer).

If you do not use or do not want to use Tor, I'd recommend using at
least https in any case, retrieving the certificate of
sks-keyservers.netCA.pem first (3), verifying it and copying it into
your gnupg home directory, and adding it to the keyserver section in
gpg.conf.

I'd never refresh my keyring over plain http, because, yes, we "should
all have something to hide" (4), whatever the threats may be that are
already knocking on our doors and whoever might tell us that this battle
is lost or useless.

(1) https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/
(2) https://lists.gnupg.org/pipermail/gnupg-announce/2015q4/000381.html
(3) https://sks-keyservers.net/sks-keyservers.netCA.pe
(4) https://moxie.org/blog/we-should-all-have-something-to-hide/

Cheers

Stephan



0x4218732B.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: regular update of all keys from a keyserver

2016-10-17 Thread Daniel Kahn Gillmor
On Mon 2016-10-17 06:31:16 -0400, Martin T wrote:

> I am aware that one can update all the keys in local-keyring from a
> keyserver using "gpg --refresh-keys". Are there any disadvantages to
> simply put this command into user crontab and execute for example once
> a day?

The only disadvantages are if you don't want to reveal the contents of
your keyring to the public keyservers, or to announce your presence on
the network.

If you prefer to do these things in an anonymized way, you might prefer
a tool like parcimonie, or if you're a coder (or have ways to encourage
other coders to work on things you think are interesting), you might
want to to look into ways to try to address
https://bugs.gnupg.org/gnupg/issue1827

--dkg


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: regular update of all keys from a keyserver

2016-10-17 Thread Robert J. Hansen
> I am aware that one can update all the keys in local-keyring from a
keyserver
> using "gpg --refresh-keys". Are there any disadvantages to simply put this
> command into user crontab and execute for example once a day?

Not that I know of.  Some people will tell you that "an attacker listening
in on your network connection could discover your social graph!", but
honestly, if people are eavesdropping on my network connection they already
have so many ways to discover my social graph that one more just doesn't
matter.  This 'problem' has always struck me as much ado about nothing much.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


regular update of all keys from a keyserver

2016-10-17 Thread Martin T
Hi,

I am aware that one can update all the keys in local-keyring from a
keyserver using "gpg --refresh-keys". Are there any disadvantages to
simply put this command into user crontab and execute for example once
a day?


thanks,
Martin

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: SSH public key comment field and gpg-agent

2016-10-17 Thread John Lane
> 
> Agreed, that would be useful.  Feel free to open a bug report.
> 
raised https://bugs.gnupg.org/gnupg/issue2760


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: SSH public key comment field and gpg-agent

2016-10-17 Thread Justus Winter
Hi :)

John Lane  writes:
> If the key is in the agent because of the gpg keyring then it is known
> as "(none)". If I do "ssh-add -L" I will see "(none)" at the end of the
> output:
>
> ssh-rsa B3NzaC1yc2EDAQAHT...IfFoxh2j13b3 (none)
>
> The reason that I stumbled upon this was because I was debugging a ssh
> connection that used the gpg-agent and the ssh debugging output
> displayed the following misleading output:
>
> debug1: Offering RSA public key: (none)
>
> which means the public key called "(none)" rather than, as I initially
> interpreted it, no public key.
>
> It's also useful client-side to see who a public key belongs to.
>
> It would be good if the comment field reflected the key source, perhaps
> the short (or long) key id. For example:
>
> ssh-rsa B3NzaC1yc2EDAQAHT...IfFoxh2j13b3 (3A808C39)

Agreed, that would be useful.  Feel free to open a bug report.


Cheers,
Justus


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users