Re: Why would I want S/MIME?

2016-09-12 Thread Aaron Toponce
On Mon, Sep 12, 2016 at 01:31:38PM -0500, Anthony Papillion wrote:
> I understand what S/MIME is and that it's probably the easiest crypto
> solution for most email users. But why would someone comfortable with
> GnuPG use it? Does it offer any advantages over traditional PGP keys? If
> I understand correctly, it's a certificate that much like a SSL
> certificate. If that's the case, doesn't it suffer from the same
> weaknesses that SSL certs currently suffer from (like double issuance, etc)?
> 
> Why would I want to use S/MIME?

Are you comparing S/MIME to PGP/MIME and PGP/Inline? I assume so, with your
question regarding GnuPG. As such, S/MIME provides some advantages over
PGP/MIME, IMO:

* S/MIME ships the entire public key as part of the email.
* S/MIME certificates are usually created and managed by the organization.
* There as wide-spread MUA support for S/MIME (EG: Outlook).

PGP/MIME and PGP/Inline generally mean getting the public key separately.
Because PGP and OpenPGP are decentralized, trust is manual (versus CAs with SSL
certificates in S/MIME). There is not widespread support for OpenPGP public
keys in MUAs, such as Outlook and most web-based MUAs. OpenPGP keys must be
managed independently, and this has shown to be more work than most people are
willing to put in.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keysigning

2014-12-02 Thread Aaron Toponce
On Tue, Dec 02, 2014 at 01:57:13PM +0530, Robin Mathew Rajan wrote:
 Where can I get my keys signed? Does here anyone provide keysigning services
 through video conference? :)

Yes. You can get me through Tox. My Tox ID is:

76AC69FEB7DA042DFD75F30574CEE3C6498DF9DD766E1D78FC5CB4693CA10BD381F696

My key signing policy:
https://pthree.org/my-pgp-key-signing-policy/

I'm not as militant about key signing as some others in the community. I'll
take precautions, but I'll also make an attempt at getting more in the WoT.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp01mi7Zyja5.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keysigning

2014-12-02 Thread Aaron Toponce
On Tue, Dec 02, 2014 at 10:23:13AM -0700, Aaron Toponce wrote:
 Yes. You can get me through Tox. My Tox ID is:
 
 76AC69FEB7DA042DFD75F30574CEE3C6498DF9DD766E1D78FC5CB4693CA10BD381F696

Hmm. It seems to have been truncated in the paste. The actual Tox ID is:

30861A76AC69FEB7DA042DFD75F30574CEE3C6498DF9DD766E1D78FC5CB4693CA10BD381F696


-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpQMVurpvgBb.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Tweeting for GnuPG

2014-11-11 Thread Aaron Toponce
On Wed, Nov 05, 2014 at 09:21:14PM +0100, Werner Koch wrote:
 I am looking for one or two people who would like to fill the @gnupg
 Twitter account with some life.
 
 I am not one of those short message people but Twitter seems to be a big
 deal these days.  Thus if someone would be interested to post short
 stuff there on a regular base we can arrange for it.  We have 1400
 followers right now.  Anyone?

If there is still need for this, I don't mind stepping in. Most of my personal
tweets belong in the crypto topic. So long as guidelines and expectations are
established on what should be tweeted and when, I could probably fill this
role.

FYI.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpSReFnh7pus.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Update on USG, Software, and the First Amendment

2014-10-27 Thread Aaron Toponce
On Mon, Oct 27, 2014 at 03:51:04PM -0400, Robert J. Hansen wrote:
 I just don't want to ask my friend to put together something on the
 subject and then discover there's no interest in it -- it seems
 disrespectful to Professor Johnson.  :)

I think there will be great interest on the list for it. I am also very
interested. Maybe it's time for me to refresh my RSA export-a-crypto-system
sig?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp2HsClF_QzW.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Aaron Toponce
On Fri, Aug 22, 2014 at 12:46:38AM +0200, Gabriel Niebler wrote:
 On the contrary, IMO this sort of thing is fully encompassed by the
 word surveillance, at least as far as I have always understood it.
 Otherwise any surveillance camera installed in a public or publicly
 accessible place would not be one, by definition, since it is only
 gathering publicly available information.

Just to get pedantic, according to Wikipedia [1]:

Surveillance is the monitoring of the behavior, activities, or other
changing information, usually of people for the purpose of influencing,
managing, directing or protecting them. This can include observation from a
distance by means of electronic equipment (such as CCTV cameras), or
interception of electronically transmitted information (such as Internet
traffic or phone calls); and it can include simple, relatively no- or
low-technology methods such as human intelligence agents and postal
interception. The word surveillance comes from a French phrase for
watching over (sur means from above and veiller means to watch),
and is in contrast to more recent developments such as sousveillance. 

1- https://en.wikipedia.org/wiki/Surveillance

From that, I gather that surveillance is to gather information with the intent
of influencing, managing, directing, or protecting [people]. HACIENDA is
gathering public information, with the intent to plan intrusions into the
servers.

That seems pretty clear to me that HACIENDA is indeed a surveillance program.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpJuz0Q2iFPh.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Aaron Toponce
On Mon, Aug 18, 2014 at 09:59:33AM -0400, Mark H. Wood wrote:
 Perhaps it would be a start if sites providing SMTP would turn on
 STARTTLS.

STARTTLS does not encrypt mail. It only provides safe passage over the network.
It is also client/server encrypted and decrypted. Thus, an administrator with
root at an SMTP server can view the mail once the mail transfer is decrypted.
Also, many big mail vendors have already enabled SSL/TLS/STARTTLS, such as
Google, Yahoo, and Microsoft.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgprklDx6SXoi.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: It's time for PGP to die.

2014-08-18 Thread Aaron Toponce
On Mon, Aug 18, 2014 at 12:24:43PM -0400, Mark H. Wood wrote:
 Sure, it does encrypt mail.  My SMTP has mail from me to deliver.  It
 contacts an SMTP that it thinks can get the mail closer to its
 addressee.  My SMTP sends STARTTLS, the receiving SMTP agrees, they
 handshake, and the rest of the session, including MAIL FROM, RCPT TO,
 and my mailgram following the DATA, is encrypted over the wire.

The connection is encrypted, not the mail itelf. SSL/TLS behave like a tunnel.
The end result is the same, but the details are different. Much like on OpenSSH
tunnel, where SSH does not know anything of the data moving through the tunnel,
STARTTLS knows nothing about the data going through its tunnel.

 You mean those webmail thingies that I never use?  There's so much we
 don't know about their security practices that I wasn't even thinking
 about such services.  My remark was focused on the scenario above:
 there is a local MUA, a local MTA and a remote MTA.

No, I mean the POP3S/IMAPS/SMTPS/MAPIS protocols your MUA, and other SMTP MTAs
connects to. Not HTTPS.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp2Xw45OQOkz.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


ICMP (was: Re: keys.gnupg.net - Refresh all public keys never completes in) Enigmail, some servers down?

2014-08-15 Thread Aaron Toponce
On Thu, Aug 14, 2014 at 05:13:08PM +0100, OmegaPhil wrote:
 Fair point, although that would be a network misconfiguration as
 ping/ICMP is required for network troubleshooting, packet fragmentation
 stuff etc (for reference I'm testing from a dedicated line that I control).

Blocking ICMP is not a network misconfiguration at all. ICMP echo requests are
intentionally blocked to prevent a number of ICMP-related attacks:

* ICMP floods
* ICMP nukes
* ICMP smurfs
* ICMP ping of death

Also, most Cisco routers do not put priority on ICMP packets. It's very common
for Cisco to drop ICMP while processing other protocols on very busy networks.

The best way to troubleshoot a problem to a network server, is to use the
protocol you're having issues with, check BGP routes, ARP entries, DNS, etc.
While ping(1) is certainly a great tool to have, it should be only one of the
many tools in your network troubleshooting toolbox.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpOJr8Ww4Woi.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


public key E6602099 is 131772146 seconds newer than the signature

2014-06-18 Thread Aaron Toponce
As per my understanding of the gpg(1) manpage, '--ignore-time-conflicts' should
supress messages such as the one in the subject. However, that doesn't seem to
be the case: http://ae7.st/p/2u6. It appears that only when redirecting STDERR
to /dev/null is it supressed. Is this expected behavior, or am I missing
something?

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpoJVaHoMQGA.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: public key E6602099 is 131772146 seconds newer than the signature

2014-06-18 Thread Aaron Toponce
On Wed, Jun 18, 2014 at 07:28:32AM -0600, Aaron Toponce wrote:
 As per my understanding of the gpg(1) manpage, '--ignore-time-conflicts' 
 should
 supress messages such as the one in the subject.

Er, '--ignore-time-conflict'. Singular, not plural.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpmjklog_p4X.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg --with-fingerprint $FILE is not listing the keyfingerprint in some cases

2014-05-14 Thread Aaron Toponce
On Wed, May 14, 2014 at 11:32:07AM +1000, Fraser Tweedale wrote:
 This behaviour also occurs for me in 2.0.22.  Instead of exporting
 the key, you could use --list-keys, which works for me:

Yeah, I'm not interesting in running it from the keyring, as I am assuming that
the key is not imported, but only the file is available.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp0mJ31Mhuai.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg --with-fingerprint $FILE is not listing the keyfingerprint in some cases

2014-05-14 Thread Aaron Toponce
On Tue, May 13, 2014 at 11:30:21PM -0400, David Shaw wrote:
 Looks like a bug.  Note that on each of the keys that didn't work there is a
 direct signature on the key.  This is not very common, and is usually used
 for a designated revoker (i.e. I permit so-and-so to revoke my key for me).
 I suspect there is a bug printing the fingerprints on a key from a key file
 (rather than from a keyring) for keys with a direct signature.

Ah. Interesting. Should I file a proper bug against GnuPG then?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp7jybYnMPZM.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg --with-fingerprint $FILE is not listing the keyfingerprint in some cases

2014-05-14 Thread Aaron Toponce
On Wed, May 14, 2014 at 06:26:31PM +0200, Werner Koch wrote:
  Ah. Interesting. Should I file a proper bug against GnuPG then?
 
 Please do that.

Done. https://bugs.g10code.com/gnupg/issue1640

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpQCElNaRK6x.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpg --with-fingerprint $FILE is not listing the keyfingerprint in some cases

2014-05-13 Thread Aaron Toponce
I don't know if this is a bug, or if I am doing something wrong, so I might as
well ask here. I ran the following command from my terminal, and cannot
retrieve the fingerprint from the file:

$ gpg --output 0xBB065B251FF4945B.gpg --export 0xBB065B251FF4945B
$ gpg --with-colons --with-fingerprint 0xBB065B251FF4945B.gpg 
pub:-:2048:1:BB065B251FF4945B:2008-07-27:::f:
uid:Daniel T. Hagan dan...@kickidle.com:
sub:-:2048:1:6BA86443C0C6CDA2:2008-07-27
sub:-:2048:1:16C018D9B89B420A:2008-07-27

There should exist an ^fpr line in the output. Compare to:

$ gpg --output 0x4713D527ECE16009.gpg --export 0x4713D527ECE16009
$ gpg --with-colons --with-fingerprint 0x4713D527ECE16009.gpg 
pub:-:1024:17:4713D527ECE16009:2005-06-06:::f:George Hacker (GLS) 
ghac...@redhat.com:
fpr:8BFD3F436366D9820E9EAB2F4713D527ECE16009:
uid:George Hacker geor...@axian.com:
uid:George Hacker ghac...@axian.com:
uat:1 2493:
sub:-:1024:16:0D94CF6C0C8C2F1B:2005-06-06

Of the 453 keys in my public keyring, this happens on 8 of them (about 2%):

0x072DC7442B89BD45
0x14774C7B9958256C
0x4B2A4897D39DA0E3
0x63E42BD8C58C753A
0x677A7DE8CC9A6F67
0x6FA1B04BB6724E04
0x9710B89BCA57AD7C
0xBB065B251FF4945B

Any ideas what is going on?

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpjZIa4_wV0B.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ideal.dll // fixing thread breaking

2012-07-01 Thread Aaron Toponce
On Fri, Jun 29, 2012 at 01:45:17PM -0400, Robert J. Hansen wrote:
 IMO, if your client is showing correct PGP/MIME signatures on this list,
 you should file a defect report about your client.  The message has been
 changed in transit and is no longer in the exact same state as it was
 when the sender issued it.  The change may be trivial, but it's still a
 change, and IMO it is not the job of the MUA to try and fix the botchery
 inflicted by GNU Mailman.  The correct thing to do, IMO, is to report to
 the user the true state of affairs: the signature is not correct and
 the message appears to have been altered in transit.

I don't understand this. Mutt verifies the signature correctly, but Mutt is
calling GnuPG externally. If the message was signed with a space, and if
the space is being replaced by a tab character, then the signature should
fail. Because it is not failing, is telling me that it was initially a tab
when you signed the mail, and something either mangled it to be a space, or
your diff(1) is reading a text that mangled the tab to a space. I don't see
how this is the failure of the MUA, but GnuPG says the signature verifies.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpSYeACP6BFj.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ideal.dll

2012-06-27 Thread Aaron Toponce
On Mon, Jun 25, 2012 at 08:44:11PM +0200, Werner Koch wrote:
 On Mon, 25 Jun 2012 20:12, aaron.topo...@gmail.com said:
  So, if the system can be improved by removing support for PGP2, which
  includes cleaning up code, squashing bugs, and tightening security, then
  why is it still around? 20 years later?
 
 BTW, removing the v3 support will not make the code magically less
 complex.  Removing mature code may actually introduce more bugs than
 keeping it.

Thus, the reason I began with 'if'. :)

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpeCt33quAzm.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: idea.dll

2012-06-27 Thread Aaron Toponce
On Tue, Jun 26, 2012 at 01:12:12AM -0400, ved...@nym.hush.com wrote:
 it will be interesting to see if V4 keys will be gracefully 
 abandoned as SHA1 becomes as broken as MD5, 
 
 or if there will be die-hards holding onto they their V4 keys no 
 matter what ...

Please fix your client. I don't know if you can tell, but you are breaking
the threads. Your client should support the 'in-reply-to' and 'references'
header fields. Please see if this is the case, and make the necessary
adjustments to your MTA.

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpqIwjiSc54Y.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ideal.dll

2012-06-25 Thread Aaron Toponce
On Mon, Jun 25, 2012 at 12:11:57AM +0200, Werner Koch wrote:
 I am telling for more than a decade that PGP 2 should not be used
 anymore.  The rationale for this was that OpenPGP is a standard and
 fixes great many problems of PGP 2.  GnuPG supports PGP 2 only because
 this provides a way to migrate away from PGP 2.  But: We are now in 2012
 - 20 years after PGP 2.

So, if the system can be improved by removing support for PGP2, which
includes cleaning up code, squashing bugs, and tightening security, then
why is it still around? 20 years later?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpXLmXd5KptX.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ideal.dll

2012-06-22 Thread Aaron Toponce
On Fri, Jun 22, 2012 at 10:21:35AM -0400, ved...@nym.hush.com wrote:
 vulnerability in that their fingerprint mechanism is trivially 
 gamable,
 so long keyid collisions are easy.

[snip]

Please fix your mail client. It is breaking threads.

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp3tZjsBPsph.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG with GPUs

2012-06-18 Thread Aaron Toponce
On Sun, Jun 17, 2012 at 07:26:27PM +0200, Hauke Laging wrote:
 This are the result (with a caches passphrase, of course). It's the same for 
 a 
 zeros file and a urandom file. And this is on a power efficient CPU... 
 (E-450, 
 which I guess doesn't have AES acceleration) probably without parallelization.
 
 So there's obviously a serious problem with your setup. A problem slowing the 
 process down two to three orders of magnitude which will hardly be solved by 
 adding a GPU.

I'm not trying to troubleshoot a problem. I think this thread is getting a
bit off-topic. I'm only curious if work has been done is getting GPU
support into GnuPG. Nothing more.

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp9UAnUGPNRd.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG with GPUs

2012-06-17 Thread Aaron Toponce
On Sat, Jun 16, 2012 at 07:54:46PM +0200, Hauke Laging wrote:
 Are these files huge? It's hard for me to believe that this takes seconds. 
 What I would easily believe is that the system gets an entropy problem. The 
 delay would not be related to CPU performance then. So maybe a hardware RNG 
 improves your situation.

These files are about 200KB in size. We have a Perl script that handles the
encryption/decryption for us. It could be the RNG slowing the process down.
I won't disagree with that, but each time I need to encrypt the file, it
takes about 2s. This is on fairly modern hardware running Debian GNU/Linux
unstable. Intel Xeon quad-core with 6 GB DDR3 RAM.

Regardless, I would love to research and play with cryptogprahpy on GPUs,
so I'm curious what progress GnuPG has made in this area, if any. Things
like ECB mode or parallel stream ciphers.

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpBcbF6Tb7Bl.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GPG with GPUs

2012-06-16 Thread Aaron Toponce
I'm curious what progress, if any, has been made towards supporting GPUs
for encryption, decryption, signatures and verifications. I recently just
purchased two Zotac 32-bit PCI cards with 96 CUDA cores (I'm out of PCIe
slots) for the sole purpose of GPGPU research and sandboxing.

We use GPG at work for internal passwords. There are 3 XML files based on
the role that they employee fills at work (techs, domains, admins). With
about 50 exmployees' GPG keys, encrypting the 3 files is a bit daunting. It
takes a few seconds to complete. Not too terribly inconvenient, and it's
fully automated, but enough to be annoying when the XML files get updated a
lot.

There are other purposes I use GPG for, where the work that needs to be
done takes long enough to notice, such as signing 100 keys after a key
signing party, or generating a new throw-away symmetric key.

Anyway, just curious if offloading the work to the GPU is something that is
being considered, or has already been discussed.

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpVhFJcWJAJ9.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Testing GPG EMail encryption

2012-05-25 Thread Aaron Toponce
On Wed, May 23, 2012 at 08:07:54PM +0100, da...@gbenet.com wrote:
 Openpgp/enigmail does not support gpg2 unless one has installed gpg
 1.4.11 - but I no longer trust Openpgp/enigmail to do anything.

That's unfortunate. While I'm mostly a Mutt user these days, I have Debian
Icedove installed with Enigmal and GnuPG v2, and I personally haven't had
any problems. Then again, I have both v1 and v2 installed. In fact, I
highly recommend Enigmail. It's a fine piece of software.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: using this list

2012-03-27 Thread Aaron Toponce
On Tue, Mar 27, 2012 at 06:46:42AM +, auto15963...@hushmail.com wrote:
 I noticed that this list is also available on gmane as
 gmane.comp.encryption.gpg.user, which allows retrieving the
 messages in a newsreader in lieu of in email.  I prefer the
 newsreader format.  Is there any reason I cannot remain subscribed
 with this same email address as the user ID but stop having the
 emails sent to me, while instead start getting the messages with a
 newsreader and use the newsreader for continuing my correspondence
 so long as it is done with the same user ID? Does that work? On the
 other hand, can anyone send a message to the list from gmane while
 using any arbitrary ID? Thanks.

This is standard in Mailman. Login to the web interface with your
credentials, and turn off mail delivery. This will allow you to post,
without receiving. Then, you can use your favorite RSS/NNTP reader or
browser to subscribe to the posts on Gmane.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpDqZK09KaFP.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gnupg and excel sending email.

2012-03-22 Thread Aaron Toponce
On Thu, Mar 22, 2012 at 09:24:06AM -0600, Eric wrote:
 After installing gpg4win-2.1.0 the email button from excel (2003)
 will not send out mail.  It will put the mail in my Outlook inbox
 instead of sending it.
 Can't forward the email because it hammers the formatting.  Is there
 a fix or do I need to force my user to send the excel sheet as
 attachment direct from outlook.

 Note:After uninstalling gpg4win the excel function works again so
 it's something with the gnupg

Nope. Not GnuPG, Gpg4win is the culprit. According to:
http://www.gpg4win.org/about.html, the Gpg4win components are:

* GnuPG- the core
* Kleopatra- Cert manager for OpenPGP asd x.509
* GPA- Alt. cert manager
* GpgOL- A plugin for MS Outlook 2003 and 2007
* GpgEX- A plugin for MS Explorer 32bit
* Claws Mail- An MTA
* Gpg4win Compendium- Docs

So, it would appear to me that the culprit from what you have described is
the GpgOL plugin, and NOT GnuPG.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpu1zUb2wlKZ.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Using root CAs as a trusted 3rd party

2012-01-21 Thread Aaron Toponce
I just signed an OpenPGP key with cert level 0x12 (casual checking) given
the following scenario:

* A PGP key was signed by an SSL certificate that was signed by a root
  CA
* I verified that the signature was indeed from that root CA.
* I striped the signature, and imported the PGP key.
* I then signed the key, exported, and sent back.

What are your thoughts on using root CAs as a trusted 3rd party for
trusting that a key is owned by whom it claims? Of course, this is merely
for casual checking, but it seems to be good enough.

Thoughts?

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpmMdilzrAkw.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using root CAs as a trusted 3rd party

2012-01-21 Thread Aaron Toponce
On Sat, Jan 21, 2012 at 02:47:25PM -0500, Thomas Harning Jr. wrote:
 That process seems pretty reasonable, assuming the CA is reputable. Even
 better if you keep track of the SSL cert to keep track of breaches and the
 like.

The idea is only to casually trust that a key belongs to a person. If the
key is signed by a root CA certificate, then the person has established a
relationship of trust between themselves and the CA. So, if the PGP key is
signed by that cert, it seems to follow that the key is indeed owned by the
person who claims to own it.

 It seems akin to the PayPal 3rd party auth, just a different source.

Yes. That's all I'm after. I think the militant I _absolutely_ won't sign
any keys unless I verify their identification, face-to-face attitude is
hindering adoption. There must be a way to build the WOT, while still
allowing people to sign keys without meeting. Thus, the reasons for 0x10,
0x11, 0x12 and 0x13 in GnuPG for identifying how carefully you've verified
the owner of a key.

I'm looking for ways to build the WOT, without hindering adoption, by
taking advantage of various means to establish trust of key ownership. This
seems to be a method, I just want to make sure I have all my i's jotted and
my t's crossed.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgp4E4CNpjLIU.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quieten gpg-agent output?

2012-01-11 Thread Aaron Toponce
On Wed, Jan 11, 2012 at 01:56:58PM +0100, Werner Koch wrote:
 You should use the modern crypto implementaion of mutt.  You merely need
 to add

   set crypt_use_gpgme

 to ~/.muttrc.  This uses a now also 10 years old mode of mutt which far
 better integrates crypto than the old command based one.

How does this differ from set pgp_use_gpg_agent, if any?

  --no-tty

 will suppress all TTY output completely.

Perfect. I searched for STDOUT, STDERR and the like in hopes of finding
the necessary docs, without reading the full gpg(1) manual. Didn't think of
tty. Thanks.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpwo506vjOQ9.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Quieten gpg-agent output?

2012-01-10 Thread Aaron Toponce
On Fri, Dec 16, 2011 at 03:07:59PM +0100, Werner Koch wrote:
 On Thu, 15 Dec 2011 18:47, li...@chrispoole.com said:
  Is there a better way to get rid of these errors?

 Yes, use gpg2.  Using gpg and gpg-agent is just a kludge.  gpg2 requires
 gpg-agent and thus we don't need those messages there anymore.

I'm glad this was posted recently, because I'm just not getting bothered by
them. I'm using Mutt for my mail, hooked into gpg2 and the gpg-agent. THe
agent is running, and the pinentry comes up asking for my passphrase,
however, I still see tho following:

% gpg2 -qd file.gpg

You need a passphrase to unlock the secret key for
user: Aaron Toponce aaron.topo...@gmail.com
1792-bit ELG key, ID E7D41E4B, created 2004-09-18 (main key ID
8086060F)

The problem with Mutt, is the fact that when changing folders or accounts,
it brefly flashes what is on the terminal behind Mutt, and that message
appears a lot, seeing as though I'm storing my IMAP and SMTP passwords in
an encrypted file, and having Mutt use gpg2 to decrypt them.

How can I completely suppress that message? It doesn't appear to be writing
to STDOUT (fd 1) or STDERR (fd 2). I guess I should run strace(1) on it,
and see what I get. Thought I'd hit the list anyway, for archiving, in case
a solution is found, and someone else is searching.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How to sign my own public key?

2011-12-29 Thread Aaron Toponce
On Thu, Dec 29, 2011 at 02:57:01PM +0300, Stayvoid wrote:
 How to sign my own public key?
 I've read that this is important.
 Here is the link: http://www.heureka.clara.net/sunrise/pgpsign.htm

Whenever you make changes to your key, it's automatically signed by you.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: maximum passphrase for symmetric encryption ?

2011-12-28 Thread Aaron Toponce
On Wed, Dec 28, 2011 at 12:32:44AM +0100, Jerome Baum wrote:
 On 2011-12-28 00:27, Aaron Toponce wrote:
  On Tue, Dec 27, 2011 at 11:23:50PM +0100, Jerome Baum wrote:
  I can't tell for gpg specifically but it's not so much about
  characters. It's about entropy. Natural language is redundant, and
  diceware uses words from natural language.
 
  Yes, but each word in the diceware list contains about 12.9 bits of
  entropy, due to the random nature of rolling a fair D6.

 How is this in conflict with what I said?

It is not in conflict. I am only extending the discussion.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: maximum passphrase for symmetric encryption ?

2011-12-27 Thread Aaron Toponce
There may be some errors in my reply, so if so, please notify me.

On Tue, Dec 27, 2011 at 11:23:50PM +0100, Jerome Baum wrote:
 On 2011-12-27 23:14, ved...@nym.hush.com wrote:
  The approximate equivalent in brute force work is 20 diceware
  words.
  [ 7776^19  2^256  7776^20 ].
 
   A string of 15 diceware words is often more than 64 characters.

 I can't tell for gpg specifically but it's not so much about
 characters. It's about entropy. Natural language is redundant, and
 diceware uses words from natural language.

Yes, but each word in the diceware list contains about 12.9 bits of
entropy, due to the random nature of rolling a fair D6. So, for a
passphrase that is 20 diceware words, it contains roughly 258-bits of
entropy, as he identified.

It's easy to calculate entropy in a truly random environment:

H = L*log2(N)

where 'H' is the entropy value in binary bits, 'L' is the length of the
message, 'log2()' is the log base-2 function, and 'N' is the possible
number of characters the system can have. The only time when this equation
becomes more complicated, is when predictable patterns, such as can be
found in human language, are found.

 So don't measure characters, your upper bound is entropy, so 20 diceware
 words apparently contain 256 bits of entropy (based on your numbers).
 That means any more than 20 words isn't going to add for the case of
 AES-256.

And this is the point, right here. A passphrase that has more binary bits
of entropy, than the containing system, won't provide you with any
additional benefit, or security. So, in the case with a 20 word, diceware
passphrase, provided that the RNG building the AES 256-bit environment is
truly random data, any additional entropy in the passphrase, won't buy you
any additional security in the encrypted data.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG 2.1 beta 3 released

2011-12-21 Thread Aaron Toponce
On Tue, Dec 20, 2011 at 05:26:49PM +0100, Werner Koch wrote:
 Noteworthy changes already found in beta2:

  * ECC support for GPG as described by draft-jivsov-openpgp-ecc-06.txt.

Eager for this. Will we be seeing ECC support in 1.4.x?

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Who is doing S/MIME enveloping in KMail - gnupg2 or KMail?

2011-12-21 Thread Aaron Toponce
On Wed, Dec 21, 2011 at 10:48:35AM -0500, Nicholas Sushkin wrote:
 Hi, I think there is a bug in the way KMail is doing S/Mime envelop for signed
 but not encrypted messages. I'd like to follow through, but I am not sure if
 it's gnupg or KMail, which is the proper forum. Does anyone (Werner) know by
 any chance?

Can you explain more? I'm assuming you're using GnuPG 2.0, seeing as though
1.4.* does not support S/MIME. Or are you confusing S/MIME with PGP/MIME?
What errors are you seeing? What are you trying to do? Et cetera.

Thanks,

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keyserver spam

2011-12-17 Thread Aaron Toponce
On Fri, Dec 16, 2011 at 03:51:34PM +, gn...@lists.grepular.com wrote:
 I understand that once you've uploaded something to the keyservers, it
 can't be removed. Eg, if I sign someone elses key and upload that, it
 will be attached to their key permanently?

 What if someone were to generate say, 10,000 keypairs with offensive
 uid names, and then sign my key with each of them, and then upload that
 to the keyservers? Is there anything to stop that? Is there anything to
 stop a spammer generating a key with their URL in the uid name and then
 signing every key they can find and uploading that to the keyservers?

 Has anything like this happened before?

For spam to be truly effective, there needs to be a reward. Littering the
keyservers with bogus keys and signatures, at its current state, wouldn't
provide the desired result. Spamming email has shown to be an effective way
to make money. Where is the monetary reward here?

I guess Anonymous or LULZ Security, or the like, could do it out of sheer
entertainment, but it would die quickly, as the effort in maintaining the
noise outweighs the benefit of annoying users by several orders of
magnitude.

I'll pose the scenario differently: How can you trust that the photo
identification presented at a human-to-human keysigning party is
legitimate? It's not too terribly difficult to forge even government photo
identification, and pass it off as legitimate to the average user. I could
create a key, call myself Bruce Schneier, forge a photo identification
card that proves this is the case, and claim there are two of us in the
world- the famous cryptographer, and a lonely sysadmin from North Dakota.

After collecting enough signatures, I've created enough noise to cast doubt
on which key belongs to the famous security expert, and which doesn't. At
least to the casual eye, which we must admit, most of us don't scrutinize
our keys at all (when was the last time you did a key refresh, and paid
attention to expirations or revocations?).

More threatening, than just littering the keyservers with tens of thousands
of keys and signatures, are individual attacks, like the one I just
mentioned above. Again, there needs to be some good benefit to the cost of
doing something like this, other than just for the lulz, or it will die
off quickly. And to be honest, the only reasonable benefit I can conceive
of, is hoping to create enough confusion, as to intercept valuable data in
some sort of transaction from the person or organization you're attacking.
Because OpenPGP hasn't reached mass popularity, I think your initial
thoughts are trying to solve a problem, that doesn't exist.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: STEED - Usable end-to-end encryption

2011-10-17 Thread Aaron Toponce
On Mon, Oct 17, 2011 at 08:25:04PM +0200, Jerome Baum wrote:
 How about an opportunistic approach? This email should include the
 following header:

 OpenPGP: id=C58C753A;
   url=https://jeromebaum.com/pgp

 The MUA could recognize a header like this one and remember that there's
 a certificate -- so the next email we send will be encrypted. The first
 email couldn't be, but is that worse than no encryption at all?

 Basically something like Strict-Transport-Security.

 What do you think?

 Like I said this is based on a quick skimming of the paper. Sorry about
 the long message.

For the uninitiated, http://josefsson.org/openpgp-header/ explains the
'OpenPGP' header, and it's syntax. This was something new to me. A bit of
additional research on whether or not this was something Mutt was planning
on adding led me to http://marc.info/?l=mutt-devm=110227240028896w=2.

I've added it with my_hdr OpenPGP id=${pgp_sign_as}\;url= The only
question remaining, for me, is whether or not it should be X-OpenPGP or
OpenPGP as the header field name. I've heard various positions on this,
but nothing definitive.

At any rate, I would love to see more client-to-client encryption in email.
I've always wondered if there could be an OTR approach to mail, somehow,
so people don't need to generate and manage their own sets of keys, as that
seems to be the largest hinderence to widespread adoption. The only thing
the user should do, is compose the mail, hit send, and everything is
handled with very minimal user interaction.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Updating signature cert-level

2011-04-27 Thread Aaron Toponce
On Tue, Apr 26, 2011 at 01:12:00PM -0700, Doug Barton wrote:
 I think you can delsig, then sign again. The keyservers would have
 both, but hopefully client software (like gpg) would be smart enough
 to use the more recent? I would imagine that revoking a signature
 and then signing again would make it worse instead of better?

 Meanwhile, add ask-cert-level to your gpg.conf.

This is what I ended up doing. I deleted the signature, and resigned.
Further, I've added 'ask-cert-level' to my gpg.conf, for future signings.
And, out of curiosity, I checked the signatures on my own key, and found
them all to be cert level '0', which I was a bit bummed about. Oh well.

Thanks for the help!

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: A better way to think about passwords

2011-04-27 Thread Aaron Toponce
On Tue, Apr 26, 2011 at 07:47:55PM -0300, Faramir wrote:
   Indeed. In fact, I keep some passwords on paper, just in case I can't
 use my password manager (like the password to access the site where I
 stored the password manager database backup. It doesn't include the
 passphrase to open the backup, just in case).

https://passwordcard.org

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: A better way to think about passwords

2011-04-27 Thread Aaron Toponce
On Sun, Apr 17, 2011 at 03:49:58PM -0700, Doug Barton wrote:
 Summary: A 3-word password (e.g., quick brown fox) is secure against
 cracking attempts for 2,537 years.

 http://www.baekdal.com/tips/password-security-usability

I'm just going to drop this here:

http://www.troyhunt.com/2011/04/bad-passwords-are-not-fun-and-good.html

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Updating signature cert-level

2011-04-26 Thread Aaron Toponce
I signed a key, of which defaulted to cert-level 0 (I will not answer),
which must be the default. When signing the key, GunPG didn't ask me about
any checking. However, I would like to update the cert-level to 2 (I have
done casual checking), but I'm unaware of how to do this. Do I need to
revoke my signature, and re-sign, seeing as though GnuPG won't let my sign
the key if I've already signed it?

Thanks,

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: A better way to think about passwords

2011-04-24 Thread Aaron Toponce
On Sun, Apr 17, 2011 at 03:49:58PM -0700, Doug Barton wrote:
 Summary: A 3-word password (e.g., quick brown fox) is secure against
 cracking attempts for 2,537 years.

 http://www.baekdal.com/tips/password-security-usability

Yeah, I've read it. It sucks. If an author claims they know something about
password security, but don't define entropy, or at least explain it, then
the article is worth a grain of salt. The math is just bad. Very, very bad.

If you really want password security, coupled with massive amounts of
entropy, and 100% platform independence, then I would suggest
https://passwordcard.org.

My thoughts on the matter:
* Entropy: http://pthree.org/?p=1761.
* Password Card: http://pthree.org/?p=1564

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing a key (meaning)

2011-04-07 Thread Aaron Toponce
On Thu, Apr 07, 2011 at 10:31:24AM +0200, takethe...@gmx.de wrote:
 Definition: Signing a key means saying: I confirm the full name in
 the key's ID is the keyowner's right name. The email address in the ID
 is the one the keyowner put there, but I cannot guarantee it's
 his/hers.

Yes you can, and that's the whole point. You need to verify that the key
they claim is theirs, is actually indeed their key.

 The person I do the fingerprint-check
 with (let's call him Peter Hansen)
 doesn't put his, but Anna's email address (a...@web.com)
 in the key's ID, because he managed to get access to it (attack).
 I don't check the email address, but the Name in
 the ID and sign the key. The ID is now: Peter Hansen a...@web.com.
 Let's say Marie somehow get's this signed key. There are again two cases:

When verifying that the key belongs to the owner, you should be
establishing identity. This means if you don't know the person, you should
verify the name, fingerprint in the key, and verify some sort of
identification from the owner. So, if Peter Hansen stole Anna's key, it
should be obvious that the name in the key doesn't match the name on the
presented identification.

Further, if Anna setup her key, then her name and email are in the public
key. Signing the key doesn't automatically change her name to Peter
Hansen, just because Peter has the key, so I'm not exactly sure what
you're saying here.

 Marie wants to send Anna a message.
 Although she recognizes Anna's email address and
 my signature, she will not use the key, because there's
 Peter Hansen written in the ID.

No, she won't, which is where I'm confused. Marie will see Anna's name in
the key, not Peter's. Further, the encrypted message will go to Anna's
email account, not Peter's. And, even if Peter did some how intercept the
encrypted message, if he doesn't have Anna's private key, what good is it?

 Marie wants to send Peter Hansen an encrypted email. Then she will
 use the key and send it to a...@web.de and Peter
 will even receive it, since he has access.

What? How? By sniffing the packets sent between MTAs? If Peter has access
to Anna's mail, then fine. But if he doesn't, his only way to the mail in
transit is to sniff packets or break into Marie's account.

The point of key signing is to build a decentralized web of trust. For
every signature you apply to a public key, you are indeed saying that you
have done careful checking to ensure that the key does in fact belong to
the owner it claims. The more the signatures on the key, the stronger this
statement becomes.

Sure, you can't be 110% sure that the owner didn't steal a laptop, create
fake credentials, and steal the identity of the key owner, collecting
signatures. However, the key owner should have been smart enough, that when
he/she generated the key, that they also generated, and printed, the
revocation certificate, so should his laptop get stolen, he can revoke the
key, publish it to the servers, and start over. And you're a good citizen,
because you refresh your public keyring from the keyservers regularly, and
would have caught the revocation before signing the key.

100% sure? Probably not. 98% sure? Most likely.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Hi

2011-04-01 Thread Aaron Toponce
On Fri, Apr 01, 2011 at 08:15:44AM -0400, Jerry wrote:
 I think you are misunderstanding what I am inferring. For starters,
 that is the 5th account that I have heard or known of that was hacked
 in March alone. I am sure that the total is far higher based on a simple
 statistical accounting of the number of accounts using GMail. Happy
 Rob :)

 Personally, I consider Google's web e-mail application grossly
 insecure. I further do not trust them for one millisecond to not be
 scanning documents passing through their server(s). It would not
 surprise me a bit to find out that one of their employees is actively
 distributing confidential information on its subscribers.

 While I do not claim that any of the other large web based operations
 such as Yahoo or Hotmail are immune to problems; I honestly do not
 believe that they actively engage nefarious acts to the degree of GMail.

Interesting, but his account is from hotmail.co.uk, which is a Microsoft
address, not a Google one. At least we all know how you feel about Gmail
though.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Hi

2011-03-31 Thread Aaron Toponce
On Thu, Mar 31, 2011 at 07:25:20PM -0400, Jerry wrote:
 On Thu, 31 Mar 2011 15:41:57 -0600
 Aaron Toponce aaron.topo...@gmail.com articulated:
  http://passwordcard.org will fix that. :)

 Dumping GShit would have been my first choice.

Not sure what your problem is. His account got hacked, likely due to a poor
password, so I recommended a solution to a better password. In fact,
passwordcard.org can be applied to anything that needs passwords, including
the passphrase for your GPG key. It's randomly generated using a secure
PRNG, and the randomness in the chosen password from the card guarantees
enough entropy to secure your account against brute force attacks,
provided the length is sufficient.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG and PGP

2011-03-15 Thread Aaron Toponce
On Tue, Mar 15, 2011 at 10:22:45AM +0100, Werner Koch wrote:
 Yes.  Back in 1997 I implemented PGP 2 compatible code as the first
 towards GPG.  Obviously I needed IDEA and RSA for testing.  That is the
 reason why we have this code at all.  Later a lot of people demanded
 that IDEA and RSA should be added to GPG so that existing files could be
 decrypted.  The claim was that RSA is only patented in the U.S. and the
 IDEA patent is not valid in some European countries like Luxembourg and
 Denmark.

Three things-

1. The U.S. patent expires for IDEA on January 7, 2012.
2. IDEA has already been succeeded by IDEA NXT, another patented algo.
3. Both IDEA and IDEA NXT don't meet the rigor of many of today's open
   algos.

So, if you ask me, I don't see the need to support even the capability
of a module with GnuPG. PGP 2 is long since dead, and anyone still using
IDEA for whatever reason, should migrate to more robust, secure and open
algos.

Just my 2¢.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG and PGP

2011-03-15 Thread Aaron Toponce
On Tue, Mar 15, 2011 at 04:14:25PM +0100, Johan Wevers wrote:
 I don't know, but I do know that adding IDEA does not complicate or
 bloat GnuPG.

You're probably right. I guess I just don't understand supporting dead,
deprecated, proprietary technology, bloat or no bloat.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: RSA Versus DSA and EL GAMAL

2011-03-14 Thread Aaron Toponce
On 03/13/2011 09:21 PM, Jonathan Ely wrote:
 I apologise in advance if this is a stupid question to ask now or if
 people already asked it before I stepped on the scene, but which
 algorithm is more secure: DSA and EL GAMAL or RSA? I know the latter has
 undergone a ridiculous amount of scrutiny and is immensely popular. I
 also know it generates longer keys.

http://rdist.root.org/2010/11/19/dsa-requirements-for-random-k-value/

Fortunately, GnuPG ships with good PRNG support, so the value for k can
be guaranteed to be random enough to hold the security of DSA in
place. However, DSA is fragile enough that if for any reason, your PRNG
doesn't generate a good k, the private key can be generated.

RSA, afaict, doesn't suffer from this.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: For Windows

2011-03-13 Thread Aaron Toponce
On 03/13/2011 05:42 AM, Jerry wrote:
 Actually, it is a fine example of users/MUAs not correctly formatting
 e-mail messages thereby forcing the use of a deprecated method.

[citation required]

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: For Windows

2011-03-13 Thread Aaron Toponce
On 03/13/2011 06:56 AM, Brad Rogers wrote:
 On Sun, 13 Mar 2011 06:05:12 -0600
 Aaron Toponce aaron.topo...@gmail.com wrote:
 
 Hello Aaron,
 
 On 03/13/2011 05:42 AM, Jerry wrote:
 Actually, it is a fine example of users/MUAs not correctly formatting
 e-mail messages thereby forcing the use of a deprecated method.  
 [citation required]
 
 See the way Outlook Express treats PGP sigs, and the messages to which
 they're attached.

Are you implying that Outlook Express determines the support life cycle
of OpenPGP standards?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: For Windows

2011-03-13 Thread Aaron Toponce
On 03/13/2011 08:57 AM, Jerry wrote:
 Outlook Express has been replaced by Windows Mail, an improved e‑mail
 program with enhancements such as junk e‑mail filtering and protection
 against phishing messages.
 
 Why are we even discussing a product that in not and has not been
 available for quite some time. I heard, although have not confirmed,
 that it does not work on Windows 7 anyway which effectively means it is
 dead.

I'm just trying to figure out why people keep saying inline signatures
are deprecated, when no documented evidence has come forth showing the
fact. Further, I was trying to understand why (if the case at all)
Outlook Express would be the one to define what is and is not deprecated
out of RFC 4880.

I guess it's like the reoccurring Slashdot theme that BSD is dead
(deprecated) since the mid-'90s, year-after-year, decade-after-decade.
*Shrug*.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: For Windows

2011-03-11 Thread Aaron Toponce
On 03/11/2011 01:50 PM, Jonathan Ely wrote:
 Hello. I use Enigmail, so of course I have GnuPG installed. I use 1.4.9
 because [1] I can not find an executable for 2.0.17 for Windows, and [2]
 I do not know how to configure the GPG-agent. Can somebody please assist
 me with upgrading to 2.0.17 and configuring the agent? For about a week
 I have been searching everywhere but found nothing. I did install
 GPG4WIN then uninstalled it because I could not figure out how to use
 the agent and the GPA utility is not screen reader accessible. Thanks in
 advance for your help.
 
 PS. I am blind and use a screen reader. Everything must be 100% keyboard
 accessible.

I don't know about an official GnuPG agent for Windows, but Enigmail
ships with a passphrase caching setting. You can access it via the
keyboard with the following shortcuts:

ALT+n   (currently, the Events and Tasks menu is selected)
right arrow (now the OpenPGP menu is selected)
p   (this brings up the OpenPGP Preferences window)
TAB

You should now be in the Passphrase settings part of the Basic tab
of the OpenPGP Preferences. Your cursor is focused on a number for
remembering your passphrase for a certain length of time. The default is
5 minutes of idle time. You can change this to anything you want, up to
 minutes.

1 more TAB key press will allow you to select a checkbox for Never ask
for any passphrase. 3 more TAB key presses past that point will get you
to the OK button, to apply the settings.

Hope that helps.

On a side note, you may wish to re-evaluate your email signature.
Confidentiality notices are usually annoying to most recipients,
especially on mailing lists, where the email is publicly accessible on
the Internet for all to see.

If sensitive information must be sent over email, it should be
encrypted, with a note in the encrypted mail notifying the user of the
its sensitivity. Otherwise, they come across as elitist and
overprotective in nature, and there likely aren't many laws or legal
recourse you can take, should someone redistribute an email you sent, or
post it in a public forum.

FYI.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-28 Thread Aaron Toponce
On 02/27/2011 08:27 PM, Robert J. Hansen wrote:
 FM: [message]
 RM: Hey, that's not me!  I'm me.  See?  I've signed this with the same cert 
 I've used for everything else on this list.
 FM: No, I'm the real Martin.  I didn't sign up for this mailing list until 
 last week.  You signed up here a long time ago and posted messages pretending 
 to be me, so that when I came on the list you could falsely claim to be me!
 RM: But I'm the real Martin!  I've been posting here for months!
 FM: Prove it.  You can't!  Therefore, I'm the real Martin.
 RM: But you can't prove it either!

If RM has a substantial amount of signatures on his public key, and FM
doesn't, nor does he sign his mail, I'll be more likely to believe that
RM is the real deal. Isn't that the whole point of the Web of Trust, or
am I missing something here?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-28 Thread Aaron Toponce
On Mon, Feb 28, 2011 at 09:12:33AM -0500, David Shaw wrote:
 Unfortunately, barring the case where you have an actual trust path to either 
 Martin, key signatures don't tell you much.  After all, FM could easily make 
 up dozens of fake people keys and use them to sign his key.

Yes. Understood. I should have mentioned that. However, as you mentioned
in a previous subthread, it isn't difficult to parse the dates of the
signatures, identify where they've been held, and grab other metadata.
If a key has falsified signatures, it should be easy enough to find out.
At least the recursion of grabbing keys from keyservers will be rather
short for false sigs.

At any event, I digress.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-28 Thread Aaron Toponce
On Mon, Feb 28, 2011 at 11:58:02AM -0500, Robert J. Hansen wrote:
 On 2/28/11 10:13 AM, Aaron Toponce wrote:
  If a key has falsified signatures, it should be easy enough to find out.
 
 Why?
 
 I have never understood the tendency of people, particularly on this
 list, to assume that people who are technologically skilled and up to no
 good will not devote more than thirty seconds to coming up with
 effective methods of skulduggery.

Because all the signatures on the key will be falsified, that can be
verified by recursively extracing the signature keys from the
keyservers, and examining their signatures. Oh hey, look. The keys are
isolate from the rest of the world. Hmm.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-27 Thread Aaron Toponce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

David Tomaschik da...@systemoverlord.com wrote:

How about inline confuses users who don't know anything about
OpenPGP?

Meh. If anything, inline signatures sparked conversation.
- --
Sent from my Android phone with K-9 Mail. Please excuse my brevity.
-BEGIN PGP SIGNATURE-
Version: APG v1.0.8

iQFFBAEBCgAvBQJNaqYYKBxBYXJvbiBUb3BvbmNlIDxhYXJvbi50b3BvbmNlQGdt
YWlsLmNvbT4ACgkQznkRt/wECI/ixQf+OdKjfR/eeYJAYZ/lZg2YcImYg9fLZ3ih
9q8QklaOFLHRE3zts7B2KQG2lTZrEOZjO061MMbcooqaLWAkYT5lNCSpNNutqPv7
xmn7JBqSwJF3AYrf25nsLcTT0edytrneO+Wq6/TrzhoVgU20lG51DnznggPqQClX
3KpwM7rEZ5L9PKV4X211TTgifM2Jh+SxXGmoTOcaZFgpkoJVRj8wdgXdkUqQPWbl
ny5/YLhhIhYwIYB1M+J3aYnep+jUWqe2ykSjtBv28TCgB4NtBuel8DEt+eUQBd2N
znZtOA1Cd8x1Z5lbys2ZWlfzgVbtxBNoW7J6GtfiKAq5PItrj7XWHA==
=aVXF
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-27 Thread Aaron Toponce
On 02/27/2011 12:37 PM, Martin Gollowitzer wrote:
 I sign *all* my e-mail except for messages sent from my mobile (in that
 case, my signature tells the receiver why the message is not signed and
 offers the receiver to request a signed proof of authenticity later) or
 messages to people who can't receive signed messages (I had a case where
 e-mails arrived empty because of the MS Exchange/Antivirus/whatever
 combination at the receivers working place).

Not me. I only sign those that I'm willing to stand behind (which is the
vast majority), but If I want to go off-the-record, I encrypt the mail
with the recipients key and not sign it. I may change the from: header
and use Tor, depending on the sensitivity and the need to remain anonymous.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Android PGP/MIME test results

2011-02-27 Thread Aaron Toponce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Grant Olson k...@grant-olson.net wrote:

Provider: Boost
Manufacturer: Motorola
Model: I1
Droid version: 1.5

This phone has two mail applications by default, one called 'email' and
another called 'gmail'.  Both displayed PGP/MIME messages without any
trouble.  Neither verified sigs of course.

I see no easy way to determine the version number of either of these
apps.  If anyone has tips on how I can get this info, let me know.

--
-Grant

Look around! Can you construct some sort of rudimentary lathe?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

This mail reads fine on K9, the default mail client shipped with the HTC Evo, 
and Google's Gmail client. K9 can verify the signature due to the integration 
with APG. The other two cannot, but they can view the signature.asc text. FYI.

Provider: Sprint
Phone: HTC Evo 4g
Android: 2.2.1
- --
Sent from my Android phone with K-9 Mail. Please excuse my brevity.
-BEGIN PGP SIGNATURE-
Version: APG v1.0.8

iQFFBAEBCgAvBQJNaukpKBxBYXJvbiBUb3BvbmNlIDxhYXJvbi50b3BvbmNlQGdt
YWlsLmNvbT4ACgkQznkRt/wECI+fHQf/b2fpz0N4LKkHtNUPRbQJsGdmgzZ5AppI
GYrkmRNTL+6n09XRIffYFKURX+eYOR7HWIc+1dcNOIwPYDq+NhA56iYbdaxolYyz
Q8Aw6tCnrp7k356cg/3WZhd96GucUFe9n6GFCXVkBHXuNzjXAYY0abzdiFRah47d
lcvrYgZqrC8aRnfcDeZFR7SSABH2CZCHCDTN21fIlGFM7dM+yipRSH3et1PVsYl9
6f3oj5OIKhefSU8SNatzoKOOn/Cn90gfXkNi/4+cexWFyxVaEO63Jt/ShjJZmMnP
M8A17DCwZ44/3vskUWlMearEpXst9r40J/n8sI7AvQOvOZKDlwTR5g==
=1HpL
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-26 Thread Aaron Toponce
On 02/25/2011 08:46 PM, Robert J. Hansen wrote:
 On 2/25/11 10:27 PM, Aaron Toponce wrote:
 On 02/25/2011 07:39 PM, Robert J. Hansen wrote:
 Bruce himself recommends AES over TWOFISH.

 [citation needed]
 
 _Practical Cryptography_.  Read it.  Other people on this list can
 provide a page ref: I'm at a funeral in the middle of nowhere and don't
 have my books handy.
 
 I know that he's recommended AES-128 over AES-256, but I've not read
 where he's recommended AES over TWOFISH.
 
 Many times.  It's not hard to find these recommendations: Google is your
 friend.

I'm using Google. I'm not seeing it. I'll keep digging. Best I can find
is in 2008, he recommends Twofish over Blowfish: http://goo.gl/D3Diq

 Regardless, you really need to pay attention to the fine print.  First,
 the numbers you cite are for *two*-key 3DES, and OpenPGP specifies
 *three*-key 3DES be used.  3DES's meet-in-the-middle is at 112 bits of
 security -- plenty enough for almost any purpose.
 
 Second, that meet-in-the-middle on 3DES requires 2**32 known plaintexts,
 2**113 operations, 2**90 encryptions and 2**88 memory.  This is so
 unrealistic it deserves to be called fantasy.  Miss any of those and
 you're up to a work factor of 2**168.
 
 So, yeah.  3DES's effective security is 168 bits, unless you're up
 against the space aliens from Zarbnulax, in which case you're SOL no
 matter what algorithm you use.

Heh. I don't believe in aliens. So, good luck with that.

I'm not saying 3DES isn't practical, I just said I'm not interested in
using it, and I stated why. I'm also not interested in using SHA1 for my
signing hash, but for all _practical_ purposes, it fits the bill just fine.

Did you know OpenSSH uses SHA1 by default for their hash, and for the
MAC it's MD5 or SHA1! Then again, what's the _practicality_ of your
OpenSSH connection being broken by the baddies?

The fact of the matter is, GnuPG supports these stronger algorithms, so
why not use them? If you have the hardware that can do the math in
trivial time, I don't see why you shouldn't use 256-bit or 512-bit
crypto. I understand just looking at just key length for security is
retarded, but GnuPG ships solid, well researched, highly available,
strong crypto.

 3DES's history is instructive.  NIST has declared it dead in 20 years
 more often than Netcraft has declared BSD to be dying.[*]  At this
 point, I'm unaware of anyone who seriously believes 3DES will be gone in
 20 years.  Most people seem to be of the belief that in about fifteen
 years NIST will say, and 3DES is believed strong through 2050.

Great! If it has that sort of security, then maybe I'll give it a second
thought. I was always under the impression that due to DES being cracked
by the EFF in what, 9 months?, that 3DES, just using 3 of the same
56-bit key, wasn't long before we had the hardware to break it in 9
months also. I'll give reconsideration.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-26 Thread Aaron Toponce
On 02/26/2011 02:27 PM, Faramir wrote:
   Here he says Twofish has speed comparable with AES, without some
 vulnerabilities (but Serpent is considered even more secure). However,
 he says if AES fails, you won't be blamed for using it (so is the safest
 for your career). If you chose Twofish, and it is broken, you will be
 blamed for choosing it

Fortunately for me, this is my personal GnuPG preferences, and not those
of my employer. Blowfish is good crypto, and I still haven't found a
good reason to not using it. AES is the federal standard. Great. I'm not
the feds. :)

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-26 Thread Aaron Toponce
On 02/26/2011 02:27 PM, Faramir wrote:
   Here he says Twofish has speed comparable with AES, without some
 vulnerabilities (but Serpent is considered even more secure). However,
 he says if AES fails, you won't be blamed for using it (so is the safest
 for your career). If you chose Twofish, and it is broken, you will be
 blamed for choosing it

Thoughts?

http://eprint.iacr.org/2010/023.pdf

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-26 Thread Aaron Toponce
On 02/26/2011 04:37 PM, Faramir wrote:
   Because its author says you should move to Twofish?

Dammit! I meant Twofish, not Blowfish. I knew what I meant, but I didn't
type it.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-25 Thread Aaron Toponce
On 02/25/2011 03:22 PM, Ben McGinnes wrote:
 You shouldn't need to worry about changing the preferred order.  GPG
 will determine the most compatible combination of ciphers and hashes
 based on the keys used to encrypt messages.  For example, my preferred
 symmetric cipher is AES-256, but on a certain mailing list I'm on
 encrypted messages sent there use Triple-DES because of the
 preferences/limitations of other recipients' keys.  That's all the
 settings I listed were, an order of preference and not forcing one
 particular algorithm to the exclusion of all else.

Yeah. I'm not one that tends to break from default much, so if GnuPG has
a good sane default set of cipher, signing and compression preferences,
then who am I to argue? However, I did generate an RSA subkey, so I
could get those SHA2 signing algos, and I want to use them.

So, with that said, here's what I came up with for my own personal
preference:

Cipher: TWOFISH, CAMELLIA256, AES256, CAMELLIA192, AES192, CAMELLIA128,
AES, BLOWFISH, CAST5, 3DES
Digest: SHA512, SHA384, SHA256, SHA224, RIPEMD160, SHA1, MD5
Compression: BZIP2, ZLIB, ZIP, Uncompressed

I chose Twofish as my first 256-bit cipher, as I support Bruce Schneier
and it's shown to be a very robust and capable cipher, both in terms of
speed and memory usage. I then put Camellia over AES due to the low
power consumption. I don't trust 3DES, and I don't know much about CAST5
other than what Wikipedia has.

Also, my understanding on how the preferences are chosen by GnuPG is the
following:

1. User wishes to encrypt mail to me, so my cipher preferences in my
public key are pulled.
2. My first preference, Twofish, is used, only if the sender supports
the Twofish algorithm.
3. If not, the next cipher in my preference list, Camellia256, is then
chosen, so long as the sender also supports Camellia256.
4. Proceed inductively, until a matching cipher that can be agreed on
between the two parties is chosen.
5. Message is encrypted using the agreed algorithm.
6. The same is used for signatures and compression.

Is this accurate? Thoughts on the order of my prefs?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-25 Thread Aaron Toponce
On 02/24/2011 11:43 PM, Robert J. Hansen wrote:
 My problem is reproducible on a stock Droid X running 2.2.something --
 just got off a very long flight, funeral in the morning: I'll dig the
 precise version number tomorrow.

So, I've been doing some triaging to see if I can reproduce this on
other mail apps, and I'm coming up empty handed. So far, I've tested the
official Gmail app from Google, the K9 mail app, the builtin mail app on
my HTC Evo and the builtin mail app on the LG Optimus S. In every case,
a PGP/MIME mail displays the body of the text as it should. Sometimes,
the cryptographic signature is viewable, sometimes not.

So, that brings up the question- what mail app are you using on your
Droid X? We should definitely get a bug reported and get this worked on,
so we don't have to digress back to using inline signatures.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-25 Thread Aaron Toponce
On 02/25/2011 07:39 PM, Robert J. Hansen wrote:
 Bruce himself recommends AES over TWOFISH.

[citation needed]

I know that he's recommended AES-128 over AES-256, but I've not read
where he's recommended AES over TWOFISH.

 I don't trust 3DES
 
 Why?  Bruce himself has said that if speed isn't a concern, nothing else
 comes close to the trust level of 3DES.

Again, [citation needed]. 3DES has an effective security of only 80 bits
due to the meet-in-the-middle attack and known- or chosen-plaintext
attacks, and NIST is only willing to back the algo through 2030. The
cryptanalysis seems pretty strong, and it is a slow algo. To each their
own, but I'll pass.

 FWIW, I don't much care for the Cult of Schneier.  He's a good cryppie,
 a good writer, a top-notch communicator -- but the idea of supporting
 him is, IMO, a little crazy.

Okay, support might have been the wrong word. twofish performance is
fast, and his new Skein algorithm, based off threefish, is crazy fast.
That said, AES is comparable. twofish is implemented in a crazy amount
of crypto software as well. Cryptanalysis is minimal, and the open
license of the algorithm is commendable.

 A modified Borda count is used.

Ah. Okay. That works.

 With respect to your prefs, my standard advice applies: unless you know
 what you're doing and why, stick with the defaults.

Well, I wanted the defaults, but then I couldn't use the SHA2 signing
algorithms, now could I? :)

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Default hash

2011-02-24 Thread Aaron Toponce
Given the release of v1.4.10, the SHA256 hashing algorithm is preferred
over SHA1. Yet, after updating my default preferences with 'setpref' and
signing some text, SHA1 is still used as the default hashing algorithm.
Is there something else I need to do to ensure that I'm using SHA256 by
default for the hash?

Thanks,

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-24 Thread Aaron Toponce
On Thu, Feb 24, 2011 at 08:37:50PM +1100, Ben McGinnes wrote:
 On 24/02/11 8:03 PM, Doug Barton wrote:
  You're using a 1024 bit DSA key, which won't allow for 256 bit
  hashes.  RIPEMD-160 is the largest you can use, and works well for
  that kind of key.

Okay. That's understandable. That was why I generated a 2048-bit RSA
subkey, so I could take advantage of the SHA2 algorithms. For some
reason, I was thinking that with the update of GPG, my 1024-bit DSA key
now had access to them.

 Well, he can use SHA256 or SHA512, but like mine it will be truncated
 to 160 bits, as was explained to me on this list a couple of months ago.
 
 As I recall, I edited the key with setpref to this:
 
 Cipher: AES256, TWOFISH, CAMELLIA256, AES192, CAMELLIA192, AES,
 CAMELLIA128, 3DES, CAST5, BLOWFISH, IDEA
 Digest: SHA512, SHA384, SHA256, SHA224, RIPEMD160, SHA1, MD5
 Compression: BZIP2, ZLIB, ZIP, Uncompressed
 Features: MDC, Keyserver no-modify
 
 Then added this to gpg.conf:
 
 enable-dsa2
 default-preference-list S9 S10 S13 S8 S12 S7 S11 S2 S3 S4 S1 H10 H9 H8
 H11 H3 H2 H1 Z3 Z2 Z1 Z0
 personal-cipher-preferences S9 S10 S13 S8 S12 S7 S11 S2 S3 S4 S1
 personal-digest-preferences H10 H9 H8 H11 H3 H2 H1
 personal-compress-preferences Z3 Z2 Z1 Z0

I wanted to avoid breaking from default, which was the main reason for
my post, but it appears that it's not possible if I want to use the
stronger hashes, which is fine. As long as I know the limitations of my
keys, and don't force preferences when sending encrypted/signed mail to
others, I'm good.

 IDEA is only included because of one or two freaks I know who still
 use it.  Oh and some ancient stuff I encrypted around fifteen years
 ago, but have yet to convert.

Yeah, no interest in IDEA here. :)

Thanks for your help.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Rebuilding the private key from signatures

2011-02-24 Thread Aaron Toponce
I generated my key back in 2004, and I've been a very vocal and active
supporter of GnuPG, encrypting communications, and digitally signing
mail. However, I was in a discussion with a friend, and the topic came
up that it is theoretically possible to rebuild your private key if
someone had access to all your signed mail. We debated the size of
signatures and mail that would need to be collected for this to be
probable.

Is it?

What is the likelihood that an attacker could rebuild a private key from
a collections of signed mail, and would it depend on the hash used in
the algorithm?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-24 Thread Aaron Toponce
On Thu, Feb 24, 2011 at 10:32:11AM -0500, Daniel Kahn Gillmor wrote:
 On 02/24/2011 04:03 AM, Doug Barton wrote:
  You're using a 1024 bit DSA key, which won't allow for 256 bit hashes.
  RIPEMD-160 is the largest you can use, and works well for that kind of key.
 
 This isn't actually the case.  Aaron's primary key (0x8086060F) is
 indeed 1024-bit DSA, but his mail is signed with a 2048-bit RSA subkey
 (0xFC04088F), which is perfectly capable of using the stronger digests.

I just ran 'setpref' without any arguments, and it told me that SHA256
would be the default signing algorithm. So, when attempting at doing the
signatures, I found SHA1 was coming out.

In the past (and now future), I signed all my mail with SHA512, just
because I can. The message that started this thread, however, is signed
with SHA1, as I wanted to show what was happening (run 'gpg -v
--list-packets' on the sig). I didn't want to break from the defaults
that GnuPG provided.

Due to my 1024-bit DSA key, it appears that RIPEMD-160, SHA1 and MD5 are
my only options for signatures. So, with my 2048-bit RSA subkey, I can
use all the sHA2 hashes. I had just thought that with the recent update
of GnuPG, the SHA2 hashes were available to my DSA key as well.

No worries. I'll stick with the non-default prefs in my
~/.gnupg/gpg.conf.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default hash

2011-02-24 Thread Aaron Toponce
On Thu, Feb 24, 2011 at 08:37:50PM +1100, Ben McGinnes wrote:
 Cipher: AES256, TWOFISH, CAMELLIA256, AES192, CAMELLIA192, AES,
 CAMELLIA128, 3DES, CAST5, BLOWFISH, IDEA
 Digest: SHA512, SHA384, SHA256, SHA224, RIPEMD160, SHA1, MD5
 Compression: BZIP2, ZLIB, ZIP, Uncompressed
 Features: MDC, Keyserver no-modify
 
 Then added this to gpg.conf:
 
 enable-dsa2
 default-preference-list S9 S10 S13 S8 S12 S7 S11 S2 S3 S4 S1 H10 H9 H8
 H11 H3 H2 H1 Z3 Z2 Z1 Z0
 personal-cipher-preferences S9 S10 S13 S8 S12 S7 S11 S2 S3 S4 S1
 personal-digest-preferences H10 H9 H8 H11 H3 H2 H1
 personal-compress-preferences Z3 Z2 Z1 Z0

If I run 'setpref S9 S10 S13 ...' when editing my key, then is adding
all this to the gpg.conf file really necessary? I would think that
adding all this to the config would be only if you didn't want to change
the preferences in your key. Then again, now that I think about it, if
you don't set the preferences, then how is a sender supposed to know
what you support?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PGP/MIME considered harmful for mobile

2011-02-24 Thread Aaron Toponce
On Thu, Feb 24, 2011 at 08:22:03PM -0500, Robert J. Hansen wrote:
 On Android's mail application, PGP/MIME attachments are nigh-unusable.
 It won't render even the plaintext portions: it has to be downloaded and
 opened with a text reader.  If you're concerned about your mail being
 readable on a mobile device (which is increasingly important nowadays),
 you might want to consider switching to inline signatures.

I don't understand. I use PGP/MIME for all my signatures, and I've not
had a problem reading the mail on my Evo, nor reading others mail that
uses PGP/MIME. I do see at the top of the interface that there is a
View Attachments link, but the mail is still readable for me.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpgkey2ssh

2010-10-21 Thread Aaron Toponce
First, there is _ZERO_ documentation for this binary. No manual, no info
page, nothing under /usr/share/doc/, segfaults pasing -h or --help.
Short of digging through the source, this is unacceptable.

Second, and probably as a result, I can't get this working for the life
of me. Correct me if I'm wrong, but I should be able to add this
identity to the running SSH agent through ssh-add, no? Here's the
steps I've taken thus far, and still failing (SSH agent is already running):

$ echo $SSH_AUTH_SOCK
/tmp/keyring-tikvU1/ssh
$ gpgkey2ssh 8086060F  /tmp/gpg-ssh-key.txt
$ gpg --armor --export-secret-keys 8086060F  /tmp/gpg-private-ssh.txt
$ ssh-add /tmp/gpg-private-ssh.txt
Enter passphrase for /tmp/gpg-private-ssh.txt

At this point, I would expect the passphrase to be the private
passphrase that is protecting my private GPG key, no? Yet, it doesn't
take. At least, this is the way you would do it for OpenSSH keys. You
would add the private key to your running SSH agent.

However, let's go a different direction. Rather than dealing with my GPG
private key, let's just add the /tmp/gpg-ssh-key.txt (the public key) to
the ~/.ssh/authorized_keys file on the remote server, and see what happens:

$ ssh-copy-id -i /tmp/gpg-ssh-key.txt u...@server.tld
/usr/bin/ssh-copy-id: ERROR: No identities found

Of course it's not found, ssh-add -l doesn't show it listed, because
it hasn't been added to the agent. So, I get to copy it manually. So, I
do that.

Now, instead of using the SSH agent, what if I used the GPG agent
instead? So, I add enable-ssh-support to my ~/.gnupg/gpg-agent.conf,
and launch the agent:

$ gpg-agent --daemon
$ ssh u...@server.tld
Password:

Nope, didn't add the key to the running agent. Now, I don't see a
gpg-add, so I'm not entirely sure how to add my GPG identity to the
GPG agent, and I'm not entirely sure how the OpenSSH client will know
that it needs to find the identity in the GPG agent rather than the SSH
agent.

So, as you can see, I'm probably a bit confused. Can't blame me really,
due to the lack of documentation. The only thing I have to go off of is
a blog post:

http://goo.gl/wqAg and http://goo.gl/HA8q

So, help?

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpgkey2ssh

2010-10-21 Thread Aaron Toponce
On 10/21/2010 09:28 PM, Jameson Rollins wrote:
 Hi, Aaron.  You might be interested in some of the tools that come with
 the Monkeysphere [0] package, which deals with a lot of OpenPGP for SSH
 stuff.  It comes with the utility openpgp2ssh, which translates OpenPGP
 keys to SSH keys (and is well documented).  From openpgp2ssh(1):

[snip]

 It's available in Debian, Ubuntu, and some other distros [1].

Hmm. I would hope that GnuPG and OpenSSH would provide this
functionality natively. I don't know what the status is for Monkeysphere
on Red Hat-based systems (Fedora specifically), so I'll have a look at
it. But right now, I'm not keen on relying on yet another tool to make
this possible. If it's what needs to be done, then it's what needs to be
done, but I want to see if I can get it working with already
default-preinstalled tools.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users