Re: My Conclusions

2014-11-16 Thread Larry Brower
I have never had any issues moving keys between boxes. In fact I moved my
keys just last week to a box at work.

What exactly is the nature of the problem?

On Friday, November 14, 2014, da...@gbenet.com  wrote:

> Hi All,
>
> After spending 62 hours on what I thought would be a simple task namely to
> get a fully
> functioning gnupg mirror on my 64 bit Linux system - I realise this is an
> impossible task to
> do. In the past I've ended up creating a new set of certificates - but
> this time round I
> thought that I would apply some effort.
>
> My conclusion is It IS Impossible To Transfer Your Keys From The Same O/S
> To Another Machine.
>
> There is no one in the entire universe that has ever attempted it. And if
> they have THEY
> HAVE FAILED. Not one person on this list knows how to do it successfully.
> No one. NOT ONE OF
> YOU can transfer a mirror image of your .gnupg folder and expect it to
> work.
>
> This tells me what I have long suspected - yes it's good at encryption and
> signing but the
> programme is fundamentally flawed as to make it utter crap. My keys are
> PERFECT but the
> software is CRAP. Werner Koch knows it's crap. Every one knows it's crap.
>
> So, If I want to go on signing and encrypting my emails I HAVE TO CREATE
> ANOTHER SET A
> BLOODY KEYS
>
> I am not a happy bunny!!!
>
> David
>
>
>
>
> --
> “See the sanity of the man! No gods, no angels, no demons, no body.
> Nothing of the
> kind.Stern, sane,every brain-cell perfect and complete even at the moment
> of death. No
> delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org 
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Recommended key size for life long key

2013-09-01 Thread Larry Brower
On 09/01/2013 02:45 PM, Johan Wevers wrote:

> Why? What's the advantage of that? I replace keys after I they have a
> chance of being compromised, but not before. Same for my mail domain - I
> created a ssh certificate that is valid for 50 years (unlimited was not
> an option) and I'll replace it whan I fear intrusions or crypto
> breakthroughs make it unsecure. Not before.
> 

The longer a key is in use the greater the chance of compromise. Just
because you believe it has not been compromised doesn't make it so. By
regenerating keys every so often you drastically lessen the chances of a
key being compromised or of a possible compromise having as much effect
on you. There is a reason things like IPSEC keys are renegotiated after
so many minutes or after so many bytes are transmitted. :)





-- 



Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbro...@fedoraproject.org
http://www.fedoraproject.org/


0x0806CF8B.asc
Description: application/pgp-keys
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Why trust gpg4win?

2013-08-25 Thread Larry Brower
On 08/25/2013 08:24 AM, Josef Schneider wrote:
> I would suggest OpenBSD for that. If BSD is to exotic, then Debian Stable.
> Flas is known to have more security holes than one can count, so I
> would stay very far away from it!

BSD might have too high a learning curve for most ordinary people. A
custom BSD distro targeted at non-technical people would be useful here.
Perhaps one which took Security and Privacy into account as design goal.

Staying away from flash would be easier if all these people who think
they are web developers would stop using it.



-- 



Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbro...@fedoraproject.org
http://www.fedoraproject.org/


0x0806CF8B.asc
Description: application/pgp-keys
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Why trust gpg4win?

2013-08-25 Thread Larry Brower
On 08/24/2013 11:34 PM, mirimir wrote:
> Small flash cards are cheap enough to use once and then destroy.

This doesn't resolve the problem of the device being compromised as soon
as it is plugged into a compromised system. There is a lot of malware
that will copy itself to any disk that gets plugged in the instant it is
plugged in.



-- 



Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbro...@fedoraproject.org
http://www.fedoraproject.org/


0x0806CF8B.asc
Description: application/pgp-keys
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: No secret key on 1 file

2013-08-16 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 08/16/2013 07:56 AM, Steven Bonda wrote:
> --batch --passphrase

Have you tried to do this without --batch and --passphrase?

Is there any change?


- -- 



Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbro...@fedoraproject.org
http://www.fedoraproject.org/
-BEGIN PGP SIGNATURE-
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJSDjkmAAoJEDtLZtIIBs+LCu4H/i1DZgWHsbqFbpxgNaHsiPZ9
FsLmQSurt1HOAn/UEfK33FUN6BOS1Gk3G8s3AjqUoBvurpTb8SXuDNavTIvBBlRL
2gYnsukGMG769DifHvsgVCc0bWePxzGl08m97kZttO/MmFnpT7rJF7j3hgVUyhLB
/wfgOCVqmCnScy1L2KbLRydH4hfyuP+Wt7EtNHhE5Wh/gVfEQdaIHwPQNKIPtIZo
vBb/cya6SdFVii6YCZwT3/uq9YqqOqWv5VnboTW4FSwun//N5nCgRCudtxcRCuSA
RAaIueMzNwJUU932VqsAQOIorjl2KWKyTp+gZX7608TTmyvmNxSFySrZNKNcs6w=
=KcoN
-END PGP SIGNATURE-


0x0806CF8B.asc
Description: application/pgp-keys
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [#INN-651-31269]: Re: key management & APG

2013-08-04 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 08/04/2013 10:27 AM, TeamSpeak Piracy wrote:
> Hauke Laging,
> 
> Thank you for contacting us. This is an automated response confirming
> the receipt of your ticket. One of our agents will get back to you as
> soon as possible. For your records, the details of the ticket are listed
> below. When replying, please make sure that the ticket ID is kept in the
> subject line to ensure that your replies are tracked appropriately.
> 
>*Ticket ID: *INN-651-31269
>*Subject: *Re: key management & APG
>*Department: *Piracy [English]
>*Type: *Issue
>*Status: *Open
> 

What is with the helpdesk being a list member?



- -- 



Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbro...@fedoraproject.org
http://www.fedoraproject.org/
-BEGIN PGP SIGNATURE-
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBCgAGBQJR/riTAAoJEEP/g4ToY9/OF3sP/00gYsJuAS5Q/iZoCgpRx89G
0A+WVt9k56MY8x1LFqgZ9DnOXYoKEzzDxwDpvmTpq6gZPeFvDp1+pvcybfJi9ntG
PS37v+YfbshrFoCOML0G7R8FcB5Z4WfgFoVxGe2uODwbjEyQe5WmvWfgkOXUtx4Q
D5gA8uW1m1I/J1rvFyx71Vx47yrdY45l8DGNvw2H/pwI9Jmw2VsVDYQapGzUSxyJ
x/XwOg8Dd+F7ZpiOzBkT3tScabZKbhotTBlHfvlybfinx9fGeYrHcdX3aPQdGGST
FBKI31pP/7bud8r30vyKztXSH9L3byFeYeuwETjKfQQ8UyWbuwQa5wRJ6G7IxfMw
kOKL6hyhnLHNo5uY8I3SqgmbrIcADLRTX3TrHO9MwK/W8uOpdcUxJ5RrQa8S64Iq
ETsaqQVZMW008k2L+/dQh/i7xFfivjN+60cSfYkaqyaZ7KGpim/BeICL5BBLu7/f
FFHjVurxQrAFuUANc4GLu+pn1P3qw0kh1uOIgeQXRQeZSsOIXwVthEZZnFwZXzz3
0zeTQZ0CvndWxda6Eqjxawq5mELAqxeMf/2GF3Qn7JyysCvQo23lUDpTtGX5kqee
bTigs92r7EYugqPHp6gP5EkloaidhCPJU0xGMB0RLQbyW9Oli+q5o+hSgPf4DaKa
rhz9xwrI3MqEmRWSp5qZ
=7tr+
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: License violation: GoldBug

2013-07-27 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Perhaps you should just forward the information in a friendly manner
to the legal departments of all the involved vendors :)



On 07/27/2013 07:00 AM, Randolph D. wrote:
> Does the friendly License Soldier speaks that OpenSSL is not
> useable with Qt gui framework?
> 
> 
> 2013/7/27 Robert J. Hansen  <mailto:r...@sixdemonbag.org>>
> 
> 
> See, e.g.,
> https://people.gnome.org/~markmc/openssl-and-the-gpl.html
> 
> 
> 
> ___ Gnupg-users mailing
> list Gnupg-users@gnupg.org 
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 


- -- 



Larry Brower, CCNA

Fedora Ambassador - North America
Fedora Quality Assurance
lbro...@fedoraproject.org
http://www.fedoraproject.org/
-BEGIN PGP SIGNATURE-
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=Qh6T
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: searching for keys

2013-07-13 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1





On Sat, Jul 13, 2013 at 4:56 PM, kardan  wrote:
Hi,

When I search for a key via browser on [1] I get an unencrypted answer
from [2]. This happens for some keys that are onlyavailable on some
servers. The problem is that the info, whose key I am
searching is presented to sniffers in plaintext. I think the encrypted
pool should not forward to unencrypted web interfaces.

[1] https://hkps.pool.sks-keyservers.net/
[2] http://keyserver.stack.nl


http://keyserver.stack.nl also uses SSL. Is your main t that someone will
see the keys you are looking for or retrieving?
If this is the case then why not have them send them to you encrypted via
email?



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.13 (GNU/Linux)
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=0ofg
-END PGP SIGNATURE-
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG keys listed are not correct.

2011-05-17 Thread Larry Brower
On 05/17/2011 06:56 PM, Lucélio Gomes de Freitas wrote:
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> Dear GnuPG staff,
> 
> I have Virtualbox-4.0.6 installed ok on my Linux machine, but on
> updating to the newest one . . . .
> I got the following messages using(KDE) kpackage kit:
> 
> ===
> 1 -> The GPG keys listed for the "Fedora 14 - x86_64 - VirtualBox"
> repository are already installed but they are not correct for this
> package.
> 2 -> Check that the correct key URLs are configured for this repository.
> ===
> 
> Sorry for this question but:
> How to install the correct GPG keys for this package?
> where are the correct key URLs, and where to configure it? Please.
> 
> Ps. Besides Virtualbox I have installed Firefox & Thunderbird.
> 
> Thanks.
> 


Are you just trying to update virtualbox or Fedora in general ?

If Fedora, have you verified that the GPG key's for that release are
installed?

You might want to reference https://fedoraproject.org/keys

If it is just that one RPM you are trying to update and the key is
failing I would suggest contacting the packager of Virtualbox or making
an inquiry on the Fedora Users Mailing list which you can join at
https://admin.fedoraproject.org/mailman/listinfo/users




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing a key (meaning)

2011-04-11 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 04/11/2011 06:09 PM, MFPA wrote:

> That's all fair enough, but I still think the standard MITM attack is
> an example of "some hypothetical exploit by some hypothetical attacker
> compromises your communications."
> 

MITM is not hypothetical and has been used quite a bit with SSL based
systems. There are even companies who have entire product lines geared
towards LE / Intel org's that perform SSL MITM attacks for intelligence
gathering and such.




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=knMv
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: 4096 bit keys

2011-03-22 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 03/22/2011 06:32 PM, Jonathan Ely wrote:
> What is ECC? Now I want that haha.

Elliptic curve cryptography



http://en.wikipedia.org/wiki/Elliptic_curve_cryptography
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=hTLX
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Default GPG Encryption Algorithm (symmetric cipher) is?

2011-01-02 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 01/02/2011 12:14 AM, frankexcha...@nospammail.net wrote:
> As mentioned I am a Linux newbie (command line adverse) and like many
> users of Ubuntu they would not know how access details of what the
> default symmetric cipher is.
> 
> Use of the term "default" was provided to mean the one GPG uses without
> any user intervention IE: Default
> 
> So at risk of sounding silly, what is the Default symmetric cipher used
> in GPG under Unbuntu 10.04 LTS?
> 
> Thanks
> Frank
> 

Perhaps try looking in ~/.gnupg/gpg.conf ?


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=62Di
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hauke Laging wrote:
> Hello,
> 
> I just had the idea that it might be a good countermeasure against malicious 
> software not to use a cached passphrase without any user interaction (and 
> thus 
> without user notice). A good compromise would be to open a dialog which does 
> not ask for the passphrase but just for the confirmation that it's OK to use 
> the passphrase. The dialog could mention the process accessing gpg-agent.
> 
> 
> CU
> 
> Hauke
> 

This seems like something that would get really annoying really
quickly. Why not just change settings to not cache the passphrase if
you do not like using it this way ?
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=+JVD
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Encrypt Error - There is no assurance this key belongs to the named user

2010-10-05 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thomas Chitwood wrote:
> Yes, that is our key.
> 

Have you verified it is trusted on the system you are trying to use it
 on? Perhaps the key isn't trusted.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=SEBx
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Encrypt Error - There is no assurance this key belongs to the named user

2010-10-05 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thomas Chitwood wrote:
> Here you go.
> 
> $ gpg --list-sigs F56DBCBE
> pub   2048R/F56DBCBE 2010-09-28
> uid  Patrick Ashbrook 
> sig  N   F56DBCBE 2010-09-28  Patrick Ashbrook 
> sig  359B3EB2 2010-10-05  it.security@bcbs-ga.com (Key created 
> for adp on 2/1/2005) 
> sub   2048R/CEA16A49 2010-09-28
> sig  F56DBCBE 2010-09-28  Patrick Ashbrook 
> 

Is the key you signed this with the 0x359B3EB2 one? If so, is this one
marked as trusted in your keyring?
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=fqLi
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Encrypt Error - There is no assurance this key belongs to the named user

2010-10-05 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thomas Chitwood wrote:
> Robert,
> 
> This is a error that is preventing us from encrypting. The key has been 
> trusted and signed.
> 
> 
> pub  2048R/F56DBCBE  created: 2010-09-28  expires: never   usage: SC 
>  trust: full  validity: unknown
> sub  2048R/CEA16A49  created: 2010-09-28  expires: never   usage: E 
> [ unknown] (1). Patrick Ashbrook 
> 

Can you provide the output of --list-sigs ?

That doesn't look like it has been signed or perhaps you didn't issue
save afterward?


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=Zttz
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Secret key without public key

2010-03-29 Thread Larry Brower

CONNIE RODRIGUEZ wrote:

Great!!  Thank you for your help.  I will post on how it went.
 

Welcome ;)  Just let us know if you have any questions on anything.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Secret key without public key

2010-03-29 Thread Larry Brower

CONNIE RODRIGUEZ wrote:
Sorry forgot to mention this is in unix.  Also, I do not have a backup 
to re-import. 
 


I figured is was Unix. Without a backup you wont be able to decrypt 
the file.


Are you certain there is no backup? No backup of the system which 
could have the .gnupg directory? Tape perhaps?



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Secret key without public key

2010-03-29 Thread Larry Brower

CONNIE RODRIGUEZ wrote:
This is a development box..no backup.  Can I copy from the another 
environment?




yes if you have the key on another server such as a production box.

gpg --export-secret-key -a > a-filename-here

copy it to the dev box with something like scp

then on the dev box

gpg --import a-filename-here

make sure to remove the file you generated exporting the key. You 
don't want someone to see copy it ;)


shred -f -n 1000 -z -v -u a-filename-here



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Secret key without public key

2010-03-29 Thread Larry Brower

CONNIE RODRIGUEZ wrote:
Help!!  Just last week I was able to decrypt files for our Vendor.  I 
tried this morning and now I get the message below.  The only changes 
that occurred was that another vendor key was added last week.  The 
ELG-E Key is the same the message was encrypted with.  Any insight to 
this message is appreciated.  I read a few articles and it stated to 
delete secret key but I am not comfortable with deleting any key without 
some kind of guidance since I am a rookie at gpg.   Anyway I am confused 
as to why I would need to delete the secret key when nothing has changed 
for this vendor.
 
gpg: key 9EDEB618: secret key without public key - skipped

gpg: encrypted with ELG-E key, ID BEA2D168
gpg: decryption failed: secret key not available
 
Thank you in advance for any help that you can provide
 
Connie


The actual error is:

gpg: encrypted with ELG-E key, ID BEA2D168
gpg: decryption failed: secret key not available

It appears that another key being added was not the only thing that 
occurred and someone has deleted the secret key the message was 
encrypted to. Do you have a backup to re-import?


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users