Re: Setting up shared access to gpg on a UNIX server

2014-01-30 Thread Peter Lebbing
On 30/01/14 02:14, DUELL, BOB wrote: On my server, I created a directory named /opt/app/apps/dbmprod/gpg and set the permissions to global access (777). I set the permission on all the files in this directory to allow global read access (744). If you're trying to achieve by the 744 what I

Re: Setting up shared access to gpg on a UNIX server

2014-01-30 Thread Johannes Zarl
On Thursday 30 January 2014 11:49:47 Peter Lebbing wrote: If you're trying to achieve by the 744 what I think you're trying to achieve, namely that users can't change the files, I think you're mistaken[1]. Look at the following session I just did[2]: The thing is, you're not allowed to change

Re: MUA automatically signs keys?

2014-01-30 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 30 January 2014 at 12:58:44 AM, in mid:20140130005844.1f0f5b54@steves-laptop, Steve Jones wrote: The advantage you have here though is the web of trust. 1 level 1 signature would probably be not enough, but 5, 10, 100..? If

Re: MUA automatically signs keys?

2014-01-30 Thread Leo Gaspard
On Thu, Jan 30, 2014 at 09:09:45PM +, MFPA wrote: The advantage you have here though is the web of trust. 1 level 1 signature would probably be not enough, but 5, 10, 100..? If the signatures are made automatically be email software without verifying identity, where is the web of

Re: MUA automatically signs keys?

2014-01-30 Thread Johannes Zarl
[resent, this time to the mailing list] Hi, On Thursday 30 January 2014 21:09:45 MFPA wrote: mid:20140130005844.1f0f5b54@steves-laptop, Steve Jones wrote: The advantage you have here though is the web of trust. 1 level 1 signature would probably be not enough, but 5, 10, 100..? If the

Re: MUA automatically signs keys?

2014-01-30 Thread Steve Jones
On Thu, 30 Jan 2014 21:09:45 + MFPA 2014-667rhzu3dc-lists-gro...@riseup.net wrote: On Thursday 30 January 2014 at 12:58:44 AM, in mid:20140130005844.1f0f5b54@steves-laptop, Steve Jones wrote: The advantage you have here though is the web of trust. 1 level 1 signature would probably be

cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

2014-01-30 Thread Donald Morgan Jr.
If you know a user has a signature that they use to always end a message with, does that data aid in the decryption of the file? Would this exploit be applicable to symmetric encryption methods as well? ___ Gnupg-users mailing list Gnupg-users@gnupg.org

RE: Setting up shared access to gpg on a UNIX server

2014-01-30 Thread DUELL, BOB
Hi again, Firstly, as a Windows Outlook user, I've never figured out the correct etiquette on formatting responses to list-server messages, so I'm just going to post a new message without previous references. Taking previous comments to heart, I've altered my home directory permissions to

Re: MUA automatically signs keys?

2014-01-30 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 30 January 2014 at 10:43:39 PM, in mid:20140130224339.5fcb0d27@steves-laptop, Steve Jones wrote: Well therein lies my problem with the PGP system. It relies on the notion of there being this singular thing called your identity.

Re: cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

2014-01-30 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 30-01-2014 18:15, Donald Morgan Jr. escribió: If you know a user has a signature that they use to always end a message with, does that data aid in the decryption of the file? Would this exploit be applicable to symmetric encryption methods as

Re: MUA automatically signs keys?

2014-01-30 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 30 January 2014 at 10:03:53 PM, in mid:1703510.WrKrPo3DPU@mani, Johannes Zarl wrote: If the same email-address is used together with the same key for a long time, it effectively ties the email-address to a person for all

Re: MUA automatically signs keys?

2014-01-30 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 30 January 2014 at 9:28:27 PM, in mid:20140130212827.GA30954@leortable, Leo Gaspard wrote: About emails reused by different persons... AFAICT most major email services never re-issue the same email address twice. Which could

cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

2014-01-30 Thread Michael Anders
Short answer: No. This would be a form of a (partially) known plaintext attack. Semantically secure ciphers are safe against this attack and it is not possible to extract information on the key. To be precise, you may of course be able guess a lot in the plaintext domain: Edward Snowden is a %@µ

Re: cryptanalysis question: Does knowing some of the content of the message make the full message vulnerable to decryption?

2014-01-30 Thread Paul R. Ramer
On January 30, 2014 1:15:08 PM PST, Donald Morgan Jr. donaldmorga...@gmail.com wrote: If you know a user has a signature that they use to always end a message with, does that data aid in the decryption of the file? Would this exploit be applicable to symmetric encryption methods as well? A