Re: My Conclusions
I have never had any issues moving keys between boxes. In fact I moved my keys just last week to a box at work. What exactly is the nature of the problem? On Friday, November 14, 2014, da...@gbenet.com wrote: > Hi All, > > After spending 62 hours on what I thought would be a simple task namely to > get a fully > functioning gnupg mirror on my 64 bit Linux system - I realise this is an > impossible task to > do. In the past I've ended up creating a new set of certificates - but > this time round I > thought that I would apply some effort. > > My conclusion is It IS Impossible To Transfer Your Keys From The Same O/S > To Another Machine. > > There is no one in the entire universe that has ever attempted it. And if > they have THEY > HAVE FAILED. Not one person on this list knows how to do it successfully. > No one. NOT ONE OF > YOU can transfer a mirror image of your .gnupg folder and expect it to > work. > > This tells me what I have long suspected - yes it's good at encryption and > signing but the > programme is fundamentally flawed as to make it utter crap. My keys are > PERFECT but the > software is CRAP. Werner Koch knows it's crap. Every one knows it's crap. > > So, If I want to go on signing and encrypting my emails I HAVE TO CREATE > ANOTHER SET A > BLOODY KEYS > > I am not a happy bunny!!! > > David > > > > > -- > “See the sanity of the man! No gods, no angels, no demons, no body. > Nothing of the > kind.Stern, sane,every brain-cell perfect and complete even at the moment > of death. No > delusion.” https://linuxcounter.net/user/512854.html - http://gbenet.com > > ___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Recommended key size for life long key
On 09/01/2013 02:45 PM, Johan Wevers wrote: > Why? What's the advantage of that? I replace keys after I they have a > chance of being compromised, but not before. Same for my mail domain - I > created a ssh certificate that is valid for 50 years (unlimited was not > an option) and I'll replace it whan I fear intrusions or crypto > breakthroughs make it unsecure. Not before. > The longer a key is in use the greater the chance of compromise. Just because you believe it has not been compromised doesn't make it so. By regenerating keys every so often you drastically lessen the chances of a key being compromised or of a possible compromise having as much effect on you. There is a reason things like IPSEC keys are renegotiated after so many minutes or after so many bytes are transmitted. :) -- Larry Brower, CCNA Fedora Ambassador - North America Fedora Quality Assurance lbro...@fedoraproject.org http://www.fedoraproject.org/ 0x0806CF8B.asc Description: application/pgp-keys ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Why trust gpg4win?
On 08/25/2013 08:24 AM, Josef Schneider wrote: > I would suggest OpenBSD for that. If BSD is to exotic, then Debian Stable. > Flas is known to have more security holes than one can count, so I > would stay very far away from it! BSD might have too high a learning curve for most ordinary people. A custom BSD distro targeted at non-technical people would be useful here. Perhaps one which took Security and Privacy into account as design goal. Staying away from flash would be easier if all these people who think they are web developers would stop using it. -- Larry Brower, CCNA Fedora Ambassador - North America Fedora Quality Assurance lbro...@fedoraproject.org http://www.fedoraproject.org/ 0x0806CF8B.asc Description: application/pgp-keys ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Why trust gpg4win?
On 08/24/2013 11:34 PM, mirimir wrote: > Small flash cards are cheap enough to use once and then destroy. This doesn't resolve the problem of the device being compromised as soon as it is plugged into a compromised system. There is a lot of malware that will copy itself to any disk that gets plugged in the instant it is plugged in. -- Larry Brower, CCNA Fedora Ambassador - North America Fedora Quality Assurance lbro...@fedoraproject.org http://www.fedoraproject.org/ 0x0806CF8B.asc Description: application/pgp-keys ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: No secret key on 1 file
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 08/16/2013 07:56 AM, Steven Bonda wrote: > --batch --passphrase Have you tried to do this without --batch and --passphrase? Is there any change? - -- Larry Brower, CCNA Fedora Ambassador - North America Fedora Quality Assurance lbro...@fedoraproject.org http://www.fedoraproject.org/ -BEGIN PGP SIGNATURE- Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBCgAGBQJSDjkmAAoJEDtLZtIIBs+LCu4H/i1DZgWHsbqFbpxgNaHsiPZ9 FsLmQSurt1HOAn/UEfK33FUN6BOS1Gk3G8s3AjqUoBvurpTb8SXuDNavTIvBBlRL 2gYnsukGMG769DifHvsgVCc0bWePxzGl08m97kZttO/MmFnpT7rJF7j3hgVUyhLB /wfgOCVqmCnScy1L2KbLRydH4hfyuP+Wt7EtNHhE5Wh/gVfEQdaIHwPQNKIPtIZo vBb/cya6SdFVii6YCZwT3/uq9YqqOqWv5VnboTW4FSwun//N5nCgRCudtxcRCuSA RAaIueMzNwJUU932VqsAQOIorjl2KWKyTp+gZX7608TTmyvmNxSFySrZNKNcs6w= =KcoN -END PGP SIGNATURE- 0x0806CF8B.asc Description: application/pgp-keys ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: [#INN-651-31269]: Re: key management & APG
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 08/04/2013 10:27 AM, TeamSpeak Piracy wrote: > Hauke Laging, > > Thank you for contacting us. This is an automated response confirming > the receipt of your ticket. One of our agents will get back to you as > soon as possible. For your records, the details of the ticket are listed > below. When replying, please make sure that the ticket ID is kept in the > subject line to ensure that your replies are tracked appropriately. > >*Ticket ID: *INN-651-31269 >*Subject: *Re: key management & APG >*Department: *Piracy [English] >*Type: *Issue >*Status: *Open > What is with the helpdesk being a list member? - -- Larry Brower, CCNA Fedora Ambassador - North America Fedora Quality Assurance lbro...@fedoraproject.org http://www.fedoraproject.org/ -BEGIN PGP SIGNATURE- Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJR/riTAAoJEEP/g4ToY9/OF3sP/00gYsJuAS5Q/iZoCgpRx89G 0A+WVt9k56MY8x1LFqgZ9DnOXYoKEzzDxwDpvmTpq6gZPeFvDp1+pvcybfJi9ntG PS37v+YfbshrFoCOML0G7R8FcB5Z4WfgFoVxGe2uODwbjEyQe5WmvWfgkOXUtx4Q D5gA8uW1m1I/J1rvFyx71Vx47yrdY45l8DGNvw2H/pwI9Jmw2VsVDYQapGzUSxyJ x/XwOg8Dd+F7ZpiOzBkT3tScabZKbhotTBlHfvlybfinx9fGeYrHcdX3aPQdGGST FBKI31pP/7bud8r30vyKztXSH9L3byFeYeuwETjKfQQ8UyWbuwQa5wRJ6G7IxfMw kOKL6hyhnLHNo5uY8I3SqgmbrIcADLRTX3TrHO9MwK/W8uOpdcUxJ5RrQa8S64Iq ETsaqQVZMW008k2L+/dQh/i7xFfivjN+60cSfYkaqyaZ7KGpim/BeICL5BBLu7/f FFHjVurxQrAFuUANc4GLu+pn1P3qw0kh1uOIgeQXRQeZSsOIXwVthEZZnFwZXzz3 0zeTQZ0CvndWxda6Eqjxawq5mELAqxeMf/2GF3Qn7JyysCvQo23lUDpTtGX5kqee bTigs92r7EYugqPHp6gP5EkloaidhCPJU0xGMB0RLQbyW9Oli+q5o+hSgPf4DaKa rhz9xwrI3MqEmRWSp5qZ =7tr+ -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: License violation: GoldBug
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Perhaps you should just forward the information in a friendly manner to the legal departments of all the involved vendors :) On 07/27/2013 07:00 AM, Randolph D. wrote: > Does the friendly License Soldier speaks that OpenSSL is not > useable with Qt gui framework? > > > 2013/7/27 Robert J. Hansen <mailto:r...@sixdemonbag.org>> > > > See, e.g., > https://people.gnome.org/~markmc/openssl-and-the-gpl.html > > > > ___ Gnupg-users mailing > list Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > - -- Larry Brower, CCNA Fedora Ambassador - North America Fedora Quality Assurance lbro...@fedoraproject.org http://www.fedoraproject.org/ -BEGIN PGP SIGNATURE- Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJR87fUAAoJEEP/g4ToY9/Oy7YP/3cXkF4V4fVl8LCwXorqoyfL 5h0UFraSz2RBQ7fs+okRzJ+YQU759bmjpbKfhFhAwtSqHP8zH7rnbdpxp1E7iIjN l8ohVhDQ+5eHxIbz695LqXe6wlWInkekzEpXacYwME1C+fNh84ZkTJ85kYlQ0XS4 GfzDdPJ0HHqx8Vec1TuZp1xhlZ0zCsOhkKiEqJhlpjvDK/4fhNBP/V+aGeA6VxCG tNTJcNDKmTqu7AfD3M5lDyzZBlhjAepxJPtVxMb8IUR8tqNs4BmygSO/a+48vnRH stT2jXbvJGdAJYA3un8q0kBRmwuVTMJU25HlOB6ijm8bZIogma4e1ozCB57HUQ4s WQOA3/ptke8JkwyicBIdhqKiOXb10llzplCeObI7I1AzLtX3vE0Wyzuh3z3jM21v /AmvzmmR88yAwK5YDlab77MqlMePnqu8nI85Omatm47j3XsneaVRIXXS6SP6AU+e vSzI+NtbJNXIZur3+4fzyLYBAiRxvZ4yhxTpen+p6OciUW3on+woRkwfVb3h8cyj LOxGlVwi5CmJjg0MdqTVhrGu6JWm0uVD9qumlgMl2mzsDhvr6nqcMTOzMX0igCHz t7uOF4iT8m5iv2Q5ycZl67aIFpFp2MuA1OIou3xFeU0lQCekU13B5Vpgc56OhGnD Pf1gJRWmssxbiYFGVGqw =Qh6T -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: searching for keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sat, Jul 13, 2013 at 4:56 PM, kardan wrote: Hi, When I search for a key via browser on [1] I get an unencrypted answer from [2]. This happens for some keys that are onlyavailable on some servers. The problem is that the info, whose key I am searching is presented to sniffers in plaintext. I think the encrypted pool should not forward to unencrypted web interfaces. [1] https://hkps.pool.sks-keyservers.net/ [2] http://keyserver.stack.nl http://keyserver.stack.nl also uses SSL. Is your main t that someone will see the keys you are looking for or retrieving? If this is the case then why not have them send them to you encrypted via email? -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJR4ftIAAoJEEP/g4ToY9/ODA4QAJoqRPXuv0LKlF9sHo/0XTD4 rNQmn4dD5EYWJWiBmaP3x+M8cxuJsOo35yTNOS8l095dw9VRKIfW82mf8LV+TD8Y k0xFH3E/UIfuDiPTM7+B2Jcj7Mw2n+GaxC40k90P9PV4C8PNKxxXuT391ibHxPsT ezdu2rRxOFt8lTTSmaWR9masKoNvjE0l9J8tM+pm8ApSDmsZkedObcgDxVyFP5Kp 9QRh+50HkGhfSZmJcdySYawqmSzNOR2z1cu/CLd8CCH8Akr/hSpjDhXInqoYbeO0 beJGWO5kCI3Akym4PiIE93anGBL1SLkBxgPBh5nxMH5yS7S936it4UAFbNzR4Cx3 BYWOfZxEfsOQvTbAjiWd9/sioOO0VEdnD87MMPMURdvXQzmHZ+v6afsMHWZA+FRd HPYsJuC9Wq4PyTGXI5pScNo6iQba5i+ImwpSyZW1ilB4pbh3/3LhJPMIB8Hi4859 XcNo8915KFZCyOidaibdvK7DnTHb8WT9xGnV2VNVjnBH7lo6mDsCfrDqUOG3oSwx 24gYfonmebmsD7vg3oh6uPdAytXt7poE2wmy9DSCIPuOEvEchpQdLkgGeHmAzbiX y/okqYflXC6aZGXhXj8ULFz5XDhP3DUE2YYw44A+nxfLNubQ3228JG3rVOl3mDdd OAcEChXQbPnTF/jhqyxx =0ofg -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: GPG keys listed are not correct.
On 05/17/2011 06:56 PM, Lucélio Gomes de Freitas wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Dear GnuPG staff, > > I have Virtualbox-4.0.6 installed ok on my Linux machine, but on > updating to the newest one . . . . > I got the following messages using(KDE) kpackage kit: > > === > 1 -> The GPG keys listed for the "Fedora 14 - x86_64 - VirtualBox" > repository are already installed but they are not correct for this > package. > 2 -> Check that the correct key URLs are configured for this repository. > === > > Sorry for this question but: > How to install the correct GPG keys for this package? > where are the correct key URLs, and where to configure it? Please. > > Ps. Besides Virtualbox I have installed Firefox & Thunderbird. > > Thanks. > Are you just trying to update virtualbox or Fedora in general ? If Fedora, have you verified that the GPG key's for that release are installed? You might want to reference https://fedoraproject.org/keys If it is just that one RPM you are trying to update and the key is failing I would suggest contacting the packager of Virtualbox or making an inquiry on the Fedora Users Mailing list which you can join at https://admin.fedoraproject.org/mailman/listinfo/users ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Signing a key (meaning)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 04/11/2011 06:09 PM, MFPA wrote: > That's all fair enough, but I still think the standard MITM attack is > an example of "some hypothetical exploit by some hypothetical attacker > compromises your communications." > MITM is not hypothetical and has been used quite a bit with SSL based systems. There are even companies who have entire product lines geared towards LE / Intel org's that perform SSL MITM attacks for intelligence gathering and such. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJNo4vwAAoJEPXCUD/44PWqc40QAIKXhSHTZRVk8dBzO7hwMUrr b89uLITHGzuHK0lP3Y0QJB78mZAaL65HjTIcfqWKkjfaiJige06wb/iwoCQLPlE+ YCqACYwg4ByVQB+YOCFJ2H00aOXFq67rm7WkDoCvvrstVMQLmK3TW0uRFld7cNwu vkPcFj/Sz6HE5Yoo9yFrU2IFAGAKjjHsSrpoNXQzZn+5OdqTrM3zDlzfkNHFw6da zSd/uP+gBjo85e6mgseloI8WVSSDnYmuww5RMiTSfAYcSJCu5t6Pa1nA0bQzk4O2 BWQwjbmvfat0soy5cChyZLONvXV3DfReMWRzrz4rauNoyn7BDZSbsBcL+QC0OwQb 0L3iIGVXhKtQWmQiZXvEPHsto/JKWq6B4TvM6tWXN3H5MTuIe2ecl1VtMPF0x7F6 UQGcD6kAIaYIiL1x0wapQ8xwbVAzbxcwsZpNfjiUcc8YWrrnQLBvzOd95EcsLstH ntx6wBK2Jg9lWZmiSHO7tTPbbvnDXTev+WTBd6xVnDNrBRaAl2zGUOv6aP9lduOv m0t5tkX4OV5IT4aqh4xu6B1MSEIYBb2toJ5Gm8sIPIYi9j7BFiXW6QxTIP+g/C72 jCej+foHl5cKG/F4wjmT75907r7RzUdzaASVW/A5h8a6p7cS3z1YtO3NERrczszN WJYy19kpRZw9VcI8Cijk =knMv -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 4096 bit keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/22/2011 06:32 PM, Jonathan Ely wrote: > What is ECC? Now I want that haha. Elliptic curve cryptography http://en.wikipedia.org/wiki/Elliptic_curve_cryptography -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJNiTL8AAoJEPXCUD/44PWqF5EQAL+WCIFd0ylULGW9LacvRS84 5tXtYQxShj2onusspDfMQdiFJoUYAA1MIVrFe1S8IXBOG4PSnNkZuos9arPgPFz4 Vt2epmtd0fF1hcbi7kfJrftyMW4F4j0HO+XWgM6l2EKxWYHzDKnxO7aDzwddpcyc 9VWXz0B8eMJWhfcQjW7K9XZJJrCuijzXcejD3ObXbOcTjIhBrcl30xKtyPt4aJPt ekuMl7rgM0lMP2uXXHzGgOaU4c21f0kAOlcfF8VQ9uorZEK8ngRovyyoNwYcGKw8 VqrW5WGgZb1so8hGMgaK6/nRcsEDW5HFWX4lNV5md46oddldMuKbh64Bvc0OBFC+ 0zT/pSb60DhTuomDKj7M15Z2ezVWA1179zwFAcpi0M/2xMSmx/PiuD7y/mdNggka bo72eyh9kttNwuX6+8QIi6wVn0CgEoY5lXUGUjaDkwlzswqnn3PCZN1dYVZRVSWW NIPOgGG0N2cuH4pwCQQ9I17sD+xLHbDV11ddphe3ect95LP2/Ope5fDOvNeMS2KF E8U1m4ON40PW3jIYg72OhoRSHHQzp9JVFjRCczDtMmMsJPk5YD2Njg+4RaUkjSw1 NKZbpa0UJD0gwB3zyWI+goxwICWsrD6LveqlZBtg1F48/qx6NTcb0HIou29dYBSs lu74QTku+2rNvYWnZi0j =hTLX -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Default GPG Encryption Algorithm (symmetric cipher) is?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 01/02/2011 12:14 AM, frankexcha...@nospammail.net wrote: > As mentioned I am a Linux newbie (command line adverse) and like many > users of Ubuntu they would not know how access details of what the > default symmetric cipher is. > > Use of the term "default" was provided to mean the one GPG uses without > any user intervention IE: Default > > So at risk of sounding silly, what is the Default symmetric cipher used > in GPG under Unbuntu 10.04 LTS? > > Thanks > Frank > Perhaps try looking in ~/.gnupg/gpg.conf ? -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCgAGBQJNICscAAoJEPXCUD/44PWqzpIP/Rc15kfAPtt3ZWFH1BYQEGIx hoPHsYHr5+mTAoDd0gGNo/7JRLJwEnLxb539VCUfDSBXgvwfPNfYLydw0lY+43xh vxlGbsSAu3qwXySeSToozdVItav2ERwQ7rkMPfoJ8J0itRUj8cJyRp8Rzj8iBxvP KvDTnwEdtB1nwb2SZeNSug2Z08bvoBWPoMbfRxlNXaam2rMpiX7+SelsU52cyD0Q WdUbDI/ue2F4nnPmuuyul0fMkU54RtkU2mHF2RJfOyP6iaHpVIgmEc+VNILP9hBT FSs7GkPjvvfNw8R3smJUxMIncMNyEKIs/R4hl+OxJmBay6EimEmVnkyifioEK5+H zmp4rVa0jwOoqXhqWs1v0W5Djl/hWPtpetFnBluOsaN1/3n7cAl9kFWzyMRi4Vwb dE5iKAdXNZS9YFyWHrlO/Ztzh8+jBtoETFCgLxdid6AFoDwl+yikTpDaY/NBdJ3I XAeDkXZ7OJxNKvT6XL72nDs3jwQI9raJaOnOebHKDz1VnRWy6ymhDVMxCjqzxBke zXAOKgcbukXkqEi6j6btrJEdO8qqJL6js6yEqsywlnipGBAbOqVERpm9HLws8Dna SU7+N8Pd8xxTJx5NQKJoZ3vc0A5bOgfKyYmmPnkpKKsiUzUd3sX4unBlvmXOwrob VbC5puSVCkZpo442WOcQ =62Di -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Confirmation for cached passphrases useful?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hauke Laging wrote: > Hello, > > I just had the idea that it might be a good countermeasure against malicious > software not to use a cached passphrase without any user interaction (and > thus > without user notice). A good compromise would be to open a dialog which does > not ask for the passphrase but just for the confirmation that it's OK to use > the passphrase. The dialog could mention the process accessing gpg-agent. > > > CU > > Hauke > This seems like something that would get really annoying really quickly. Why not just change settings to not cache the passphrase if you do not like using it this way ? -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJMs8A+AAoJEPXCUD/44PWqVHUP/i2jbdt/AsYx2IlrrNqMdtjw 8lnxlUTeOfM11vOHD1CWctJsUH1LyhihKmf+0WZZRSv7k3S1vkVcIPD6zRmee4IS AI+3wvtlGdsF/+BlMeelCMMdaU8ys4OB4YbfQdaftAsBsO3IqZ32K1VLkMcje6Wd YdREF/dDEzD41tJ/oQLwxW8Ek9IBTUDrA7p1HdCuzf5YfqdDF0eLvTaGXCK6mO7e RJeSLlelQs7kgTq1KEvOAMGgpF8vye8soLN3aJcxkZnjp991Eeus6ZIhxdYRoXIz o7sPTf8ejctUrgGrW00hVUoUMhCdKN+ELx4Ux0fIgDGzMVItYRDXrAnbTeuZ2z3x /3gBAQbAQWWvFXQZ6CQT3uNJQVtOmTwber8DjSaSRsRxNsQbh15SeOIHEGgI73wk xEfvoL7iirMOcVmjndGc6063nUPvhJyotvefafrOKbL3vae7C8480x1kc0uhB2Ry U9daKonVyCPGyqAhqem1oYpPjjD2aUuyDzLM4y7t0yfKAwEqjL+vQogGfilyKYhy U+g/OybkgQLckG5RgnEcqzlIcSWPdnl6eIxc/YF8EMxYpcXrZhXMrGkk8fDVC36R 3TM/siVhttdo7v9ekFxT3eOF/6vsKoASpP1Vz4aZXpSQ8a3/WRW5eDyQ6li4goKH Ub+vZOmMc14HvzSAlBpt =+JVD -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Encrypt Error - There is no assurance this key belongs to the named user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thomas Chitwood wrote: > Yes, that is our key. > Have you verified it is trusted on the system you are trying to use it on? Perhaps the key isn't trusted. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIbBAEBAgAGBQJMq9eiAAoJEPXCUD/44PWqevsP+JdrIt71gjQg1TVXB2cxie45 oeIe7pEX5/kL7welfwbPwAPjRBCERHYfJTeh13qXvxMEtJ/ilqMJtJFipiIM+0DH 6RbmvNVDViFfsqTnSbrHpDKnPbXzYhbr5k67jU2uUP34saUA7oZJgT1A3FVe67Pr iD93pjzxyeXM8t0WMTY01duQWVOBsfdsCjQCrKx3ouZLq10S/peYwhRv9hRCQDUA TLfXDnLgbumRu1c5+3yyInztUGAznWqLcKoqc+2K6CEwTkPYB2OwRw2ZVyc1zfjm xR4Zlec/9BYagq4w6zN1g7LocQ3OwiiUnRCafl6ZU9gZU2oeS6ULL003reFfcSER SNKMUxgUzH6YNBQmh7d8qhUTktPC8XSiQZRun8iil7PoeWfhcBC0/tdCw7/9OnkL m0bAA1jFeQcEHEjWlQMZvFKhfsn/OMUju52X3m3SrhxUx0HQt/uYTMttpxyJwvnN GH2o3+klajfAfZUfzlUYk342hPYyK3O7jI5j04S1jJSTar8kLB02vqj4basD3+Uv mTlvK2TWOUZBW1kqefUx6GNnIPHUwl0dMrOoe/JtE6JRBbTFVYdCNEyOPjUeFQeS kR76YmQTmOufKAOa0sMYiPoDhJhwpjwQfm+3+/kaqFwlYZtijXrMP2fxtFrPgRqI i1TY+s6p9zTMmiTpflw= =SEBx -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Encrypt Error - There is no assurance this key belongs to the named user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thomas Chitwood wrote: > Here you go. > > $ gpg --list-sigs F56DBCBE > pub 2048R/F56DBCBE 2010-09-28 > uid Patrick Ashbrook > sig N F56DBCBE 2010-09-28 Patrick Ashbrook > sig 359B3EB2 2010-10-05 it.security@bcbs-ga.com (Key created > for adp on 2/1/2005) > sub 2048R/CEA16A49 2010-09-28 > sig F56DBCBE 2010-09-28 Patrick Ashbrook > Is the key you signed this with the 0x359B3EB2 one? If so, is this one marked as trusted in your keyring? -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJMq8PeAAoJEPXCUD/44PWqviUQAKBzwb/B7MHJqqDuNKpvNjN8 /r0f0O/46SB0lvl59bHcN6pLWMHCNgCp1tNNoQrwNmgltZ9vC58KMSUe5iQl6AeC h9t0Fi62lmNifaqogz9cVX2To1m9d1cy7fC9KKK9NH4wl3hbgBgq+Cq1r1xptUk7 NcfoxSJdEV4ia/vFg8Fb8Igxh30jSteaxzPe6H/Ti0moY/V1S/x30Fyhu8rOOi4j tQ3U4Ai9tqjJx5jCzN6HMitodTNOgF/HVLdMH0QKrVgY+Cvo6nuqNlCDgPvc/JSF fw6OjGzjCJxLMhwkktClsTh/EA4ASzf/kcKjxxkYs+YF6hpHR/h6gJA/YMRn2OYQ 3+XOG5n/qxd9AQM3/P4kiFq8pJpQm7b9a6499diqpe0U5xXJ+7dBSeaRBOcbIyGb 79DZowkIXw5HRpKo5roovfVmzEzHKKFU2rjLGCEJRJYDe5NS0Twu3WdQbhoasVXa S2SCeDK74pnF8ybHJiXTiIP2ma9V1yFBrc1tI5YYNx5TW8oPX0oW/UhUXRnT4Z7n KrLsnKrmFkri7xDYill6GFOBMmaibjRNAqim26EY0fGkgrE42yVg0InuFiNAJ2cr io2m9tQD0YY004OX5xwWRo4V++X+HgZfztXyI2vO4QygbvedcQOvWimcBRZYxYpg JwW3N3uvwjs+tBuqL/Zj =fqLi -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Encrypt Error - There is no assurance this key belongs to the named user
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thomas Chitwood wrote: > Robert, > > This is a error that is preventing us from encrypting. The key has been > trusted and signed. > > > pub 2048R/F56DBCBE created: 2010-09-28 expires: never usage: SC > trust: full validity: unknown > sub 2048R/CEA16A49 created: 2010-09-28 expires: never usage: E > [ unknown] (1). Patrick Ashbrook > Can you provide the output of --list-sigs ? That doesn't look like it has been signed or perhaps you didn't issue save afterward? -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJMq6qrAAoJEPXCUD/44PWqGvsQAMrRIyqk8yl42aHga1uMXZde bEhzA4oO8IEZZlRTQ0Lvz58DHpP+pIxvGhZERYqgo+jiv90Jntwj+Rz4LhZi/qUZ iap7POF+EcNEaw/JpNvZ1ubLt9CriRJYHyhhmL5nZ3UQwdIVcDBADrNdPHxnWZpE IQ/6WI1hTEibHx8QmbTnt5jSJy31O9IUPQaMa5tcjd99iJz2nT3cR3u6WaTgkbUW eQYOnJgONBKAi0D/rS0szz39wONI2QZ6krx56jjOOTZNuXQ2HuODQ1WRMuamVGbf sAANUgljz6HErbsgb16mru/fWTaNnD4UEttYqTlaMyrsHetrfGNewkyE5hIE1PgD TW/wA/HJrGVAu3aNWvFd1aiS5Uz9fxEWBYp0pd02A3/c7AJKN84EntkrMYfDM01v Bv/Nq6dTImHVHwvyjqErZYCHQbJ79s7qqGZl3sMEmVbOifLGvebQ6vkunO/+Oe1D QEKcBoNDtJn8PYCXC9ixkT3oD7gS8QzFVfIQOlJrqsxNO6x4ET7RGTvGg0bbaUPJ PTPGq+m9XrSopscY5efs8SwR6v7uu4okrhvEM+7FQ796qD3QYw8HVgHHlJ/P9Ewn b42krovPFDgZ0Ffx6DD96DeySFN/wpjy2lebVegdXFMetdh6UMZzT2BneKvByKr7 z4Zuq70fFAXxsg+viUKX =Zttz -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Secret key without public key
CONNIE RODRIGUEZ wrote: Great!! Thank you for your help. I will post on how it went. Welcome ;) Just let us know if you have any questions on anything. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Secret key without public key
CONNIE RODRIGUEZ wrote: Sorry forgot to mention this is in unix. Also, I do not have a backup to re-import. I figured is was Unix. Without a backup you wont be able to decrypt the file. Are you certain there is no backup? No backup of the system which could have the .gnupg directory? Tape perhaps? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Secret key without public key
CONNIE RODRIGUEZ wrote: This is a development box..no backup. Can I copy from the another environment? yes if you have the key on another server such as a production box. gpg --export-secret-key -a > a-filename-here copy it to the dev box with something like scp then on the dev box gpg --import a-filename-here make sure to remove the file you generated exporting the key. You don't want someone to see copy it ;) shred -f -n 1000 -z -v -u a-filename-here ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Secret key without public key
CONNIE RODRIGUEZ wrote: Help!! Just last week I was able to decrypt files for our Vendor. I tried this morning and now I get the message below. The only changes that occurred was that another vendor key was added last week. The ELG-E Key is the same the message was encrypted with. Any insight to this message is appreciated. I read a few articles and it stated to delete secret key but I am not comfortable with deleting any key without some kind of guidance since I am a rookie at gpg. Anyway I am confused as to why I would need to delete the secret key when nothing has changed for this vendor. gpg: key 9EDEB618: secret key without public key - skipped gpg: encrypted with ELG-E key, ID BEA2D168 gpg: decryption failed: secret key not available Thank you in advance for any help that you can provide Connie The actual error is: gpg: encrypted with ELG-E key, ID BEA2D168 gpg: decryption failed: secret key not available It appears that another key being added was not the only thing that occurred and someone has deleted the secret key the message was encrypted to. Do you have a backup to re-import? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users