Re: GnuPG User ID expiry

2015-09-29 Thread Daniel Kahn Gillmor
Hi Jens-- On Fri 2015-09-25 00:49:48 -0700, Jens Lechtenboerger wrote: > I tried to generate test keys with expired user IDs (under faked > system time), but I failed, with gpg 1.4 as well as 2.1.8. I tried > to use the options default-sig-expire and default-cert-expire as > well as ask-sig-expi

Re: PAM authentication with gpg or ssh key

2015-09-29 Thread NIIBE Yutaka
Hello, Yesterday, I included my answer to your question to a different thread. I should have replied to this post. I think that your question is relevant to GnuPG community. On 09/29/2015 02:06 AM, Schlacta, Christ wrote: > Therefore, I'm looking for a way to have PAM query the ssh-agent > remo

Re: Non-interactive PIN not accepted, gpg hangs

2015-09-29 Thread NIIBE Yutaka
On 09/30/2015 04:00 AM, Laurent Blume wrote: > Non-interactively, however, I can't get it to work: gpg-agent always > spawns a pinentry in the background, and gpg waits for it indefinitely, > instead of using the PIN provided on the command line. As far as I know, you can't provide a PIN by comman

Re: adding card keys and make them non exportable

2015-09-29 Thread Damien Goutte-Gattat
On 09/29/2015 09:51 PM, Heiko Folkerts wrote: AFAIK the exports contain a valid looking key block. It *looks like* a valid key block, but--if the keytocard operation was indeed successful--it's actually only a "stub" that does not contain any private material. You can check the actual conte

adding card keys and make them non exportable

2015-09-29 Thread Heiko Folkerts
Hi all, I am new to this list and have a question I couldn't find answered either in the docs or in the FAQ. I just started using a smart card with GPG namely the nitro key www.nitrokey.com . It behaves like a smart card so this shouldcorrespond to any GPG card as well. I already had a key pair w

Non-interactive PIN not accepted, gpg hangs

2015-09-29 Thread Laurent Blume
Hello all, I'm trying to setup automatic file decryption using a smartcard to store the private key. Interactively, it all works fine, I get the PIN request, enter it, decryption works, all good. Non-interactively, however, I can't get it to work: gpg-agent always spawns a pinentry in the backg

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Robert J. Hansen
> Does that mean long-term confidence in elliptic curves would be better > placed? I don't know. Sorry. :( What I do know is that, judging from past experience, our projections on key lengths need to take into account the possibility of radical improvements in mathematics that make our original

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Leo Gaspard
On 09/29/2015 06:04 PM, Robert J. Hansen wrote: > But you never know when a George Dantzig will appear. And that means I > think your long-term confidence in RSA is misplaced. Does that mean long-term confidence in elliptic curves would be better placed? Does ECC rely on a stronger mathematical

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Robert J. Hansen
> AFAIK RSA-3072 (and ElGamal-3072) are comparable to AES-128. No: they're comparable to AES-128 *at our present level of mathematical knowledge*. That's a very important qualifier. Back in the mid-to-late '80s, Ron Rivest declared that 1024-bit RSA keys would be unbreakable for at least the nex

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Robert J. Hansen
> Dan Boneh has already published an awe-inspiring paper showing that RSA > isn't anywhere near as safe as we think it is: Eh. Correction: *may* not be anywhere near as safe it is. Definitely shows that our confidence in RSA probably isn't as well-founded as we'd like. I did a pretty long write

Re: unlock keychain with pam authentication

2015-09-29 Thread SGT. Garcia
On Tue, Sep 29, 2015 at 03:33:38PM +0100, Andrew Gallagher wrote: > On 29/09/15 15:28, Daniel Kahn Gillmor wrote: > > On Tue 2015-09-29 08:53:32 -0400, Andrew Gallagher > > wrote: > >> On 28/09/15 23:16, SGT. Garcia wrote: > >>> On Mon, Sep 28, 2015 at 04:10:10PM -0400, Daniel Kahn Gillmor wrote:

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Johan Wevers
On 28-09-2015 22:26, Robert J. Hansen wrote: > RSA-3072 is not all that much stronger than RSA-2048, and RSA-4096 adds even > less. AFAIK RSA-3072 (and ElGamal-3072) are comparable to AES-128. That's strong enough for the forseable future; the only known thing they are vyulnerable to (except for

Re: unlock keychain with pam authentication

2015-09-29 Thread Andrew Gallagher
On 29/09/15 15:28, Daniel Kahn Gillmor wrote: > On Tue 2015-09-29 08:53:32 -0400, Andrew Gallagher > wrote: >> On 28/09/15 23:16, SGT. Garcia wrote: >>> On Mon, Sep 28, 2015 at 04:10:10PM -0400, Daniel Kahn Gillmor wrote: Do you ever import keys that other people send you? or keys

Re: unlock keychain with pam authentication

2015-09-29 Thread Daniel Kahn Gillmor
On Tue 2015-09-29 08:53:32 -0400, Andrew Gallagher wrote: > On 28/09/15 23:16, SGT. Garcia wrote: >> On Mon, Sep 28, 2015 at 04:10:10PM -0400, Daniel Kahn Gillmor wrote: >>> >>> Do you ever import keys that other people >>> send you? or keys you find on the web? or keys attached to e-mail >>> m

Re: Own Mail: PGP running on local server; Is it secure

2015-09-29 Thread Peter Lebbing
On 28/09/15 20:39, sam...@riseup.net wrote: > Hi all Hi! > Thanks for your comments, not exactly a ringing endorsement! Well, for some reason I never got the mail that started this discussion, a reply by Robert J. Hansen was the first I saw of it. And I didn't check the website. But the quotes f

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Malte
> I can't offer any conclusive evidence for this, but it is my > honest estimate that more real-world sensitive traffic volume > is generated by 1.4.x than 2.x. Consequently, if 1.4.x is in any > was insecure, this would be of significantly greater benefit to > a whole class of large institutional

Re: unlock keychain with pam authentication

2015-09-29 Thread Andrew Gallagher
On 28/09/15 23:16, SGT. Garcia wrote: > On Mon, Sep 28, 2015 at 04:10:10PM -0400, Daniel Kahn Gillmor wrote: >> >> Do you ever import keys that other people >> send you? or keys you find on the web? or keys attached to e-mail >> messages? Are you sure the things imported can't include a secret

Re: unlock keychain with pam authentication

2015-09-29 Thread SGT. Garcia
On Mon, Sep 28, 2015 at 04:10:10PM -0400, Daniel Kahn Gillmor wrote: > On Mon 2015-09-28 16:00:38 -0400, SGT. Garcia wrote: > > i really want it as the only authentication required that is open password > > from > > user logs him in and decrypts the passwords. > > > >> > that would be my email acc

Re: Should I be using gpg or gpg2?

2015-09-29 Thread Guan Xin
On Tue, Sep 29, 2015 at 3:52 AM, Robert J. Hansen wrote: > Please respond on-list; I generally don't like answering questions off-list. Sorry, was too sleepy last night and did not click on "Reply to all". > So if ECC falls, well -- so will RSA. Ok quite clear, that means if RSA falls, so had