* ilf wrote:
> Over the years, I have used quite a number of keypairs. Unfortunately, I
> have forgotten the passphrase for some of them. But I do know potential
> parts of the passphrase.
This is ancient, but may help you https://www.vanheusden.com/nasty/
--
left blank, right bald
It's all about where they look for new/updated keys. There's folks
out there who use a WKD setup, as you mentioned, then there's some
who use a standalone (isolated, non-peering) SKS keyserver, etc.
I do not think reverting the patch that causes issues for them is a
smart move in the long run.
* Wiktor Kwapisiewicz via Gnupg-users wrote:
> in a similar fashion to what --quick-* commands already do for other actions
> (e.g. --quick-add-uid).
--set-notation maybe?
HTH
--
left blank, right bald
___
Gnupg-users mailing list
* André Ockers wrote:
> Op 06-04-19 om 15:04 schreef Markus Reichelt:
> > gpg -a --output an...@ockers.eu.asc.revoke --gen-revoke 7CD3FBC8F6005ED5
>
> This leads to the following:
>
> gpg: secret key "7CD3FBC8F6005ED5" not found: eof
i'm using on slackware64-cu
* André Ockers wrote:
> But when I tried to do the some thing in Bash I ran into the following:
>
> $ gpg -a --output an...@ockers.eu.asc.revoke --gen-revoke an...@ockers.eu
>
> sec 4096R/F5FE3668 2014-07-31 André Ockers
>
> Which is the fingerprint of the old key.
>
> What happened and
* Nicolai Josuttis n...@josuttis.de wrote:
For those who didn't have time to see it yet,
there was an important talk at 31C3
about the social and technical status and consequences of
encryption by Jacob Applebaum and Laura Poitras.
As a side effect it covers GnuPG significantly.
So,
* adrelanos adrela...@riseup.net wrote:
TrueCrypt.org says [1] they are signing TrueCrypt Setup 7.1a.exe
[2] with a X.509 signature. How can I verify such a signature?
For Windows, they explicitly state how to do that.
(On Debian Wheezy.) I tried:
gpg2 --verify TrueCrypt Setup 7.1a.exe
Aloha,
Oecher Keysigning Party III
Do 15.12.2011, 18:30 Uhr s.t.
Aachen, Elisenbrunnen (linker Flügel)
http://mareichelt.com/okp3/
pgpblGwdhal7M.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Hi folks,
just a quick heads-up for those planning to visit Berlin within the
2nd week of June:
Linuxtag 2010, June 09-12,
http://www.linuxtag.org/2010/
Mini Debian Conference 2010, June 10-11,
http://wiki.debconf.org/wiki/Miniconf-LT-Berlin/2010
25th Chemspec Europe, June 09-10,
* Joke de Buhr j...@seiken.de wrote:
I'm not quiet sure but shouldn't gnupg encrypt to both (all
not-revoked) encryption keys in this case? This way the user could
decrypt the encrypted message (email) regardless what encryption
keys secrets are available at the current location.
Nope. More
* Alex Mauer ha...@hawkesnest.net wrote:
Nope. More to the point, think about people having both private UID
and business UID on the same key - the way you describe it could mix
things up badly.
How so? There's no connection between UIDs and keys
Exactly, and you are not getting my
* Mohan Radhakrishnan moh...@fss.co.in wrote:
What is the experience of this forum with split keys and storage ?
Great success.
--
left blank, right bald
pgp8JRUD4AfZK.pgp
Description: PGP signature
___
Gnupg-users mailing list
* Faramir faramir...@gmail.com wrote:
markus reichelt escribió:
* Mohan Radhakrishnan moh...@fss.co.in wrote:
What is the experience of this forum with split keys and storage
?
Great success.
By the way, I suppose the idea behind splitting the keys is to
create several shares
* markus reichelt m...@mareichelt.de wrote:
gpg: key generation failed: Card error
Key generation failed: Card error
That's on a stock Slackware 13 system, gpg (GnuPG) 2.0.12,
libgcrypt 1.4.4 with OMNIKEY CardMan 4040 v1.1.0gm5.
Okay, after much cursing omnikey I finally was successful
* David Shaw ds...@jabberwocky.com wrote:
If you mean the signature verification level, then it is visible in
the --list-sigs output - 3 for positive verification, 2 for
casual verification, and 1 for persona (aka didn't check)
verification. If none of these numbers appear, it's a generic
Hi,
I cannot create keys on my shiny new v2 smartcard. Personalizing the
card works just fine, as does changing PINs.
But when I want to generate new keys I always get this error message
(after gpg asked about how long the key shall be valid):
gpg: key generation failed: Card error
* Mario Castelán Castro mariocastelancas...@gmail.com wrote:
I need GNU PG 2 because i want to get out of the 1024 bits limit
and SHA forced for DSA, i want my next key (2010-2012) to be more
secure and accept some SHA2.
You don't need gpg2 for that.
--
left blank, right bald
Hi,
for those interested, there's going to be a keysigning party at
FrOSCon 2009 in Sankt Augustin on August 22nd, 12:30h:
http://ksp.froscon.org/
Deadline for key submission is Thursday, August 20th 2009.
More info about the conference is online at http://www.froscon.org/
--
left blank,
* Robert J. Hansen r...@sixdemonbag.org wrote:
(am not overly worried, still use IDEA when encrypting for diehard
pgp2.x e-mailers, and that has 5 of 8 rounds broken ;-) ))
6.
7 - raise? fold?
--
left blank, right bald
pgpFiYo0Yf06I.pgp
Description: PGP signature
* Jean-David Beyer jeandav...@verizon.net wrote:
Too bad I would lose all the signatures on it, but since it would
be no good, there would be no sense in transferring the signatures
to my new key, even if that were possible (and I hope it is not).
For obvious reasons it isn't possible indeed.
* markus reichelt m...@mareichelt.de wrote:
PGP/GPG Keysigning event on Saturday March 14th 18:00h at Chemnitz
Linux Days in ... Chemnitz.
Deadline for key submission: *Monday March 9th*
This is just a friendly (and last) reminder that you can still
participate, just honour the deadline
* Sven Radde em...@sven-radde.de wrote:
Then they would need brute force against key AND password or they
know about weaknesses in algorithms which nobody else knows.
Let me clarify this a bit:
Whoever wants to break your key needs to do only one of the following:
1) Retrieve your
* don rhummy donrhu...@yahoo.com wrote:
What does GPG have to recover my data if i forgot my password?
Your last chance is a tool like nasty, check it before you do
anything stupid in a rush @ http://www.vanheusden.com/nasty/
--
left blank, right bald
pgpVu3j3MHs5j.pgp
Description: PGP
* markus reichelt m...@mareichelt.de wrote:
PGP/GPG/CA Keysigning events on Sunday Feb 8th at FOSDEM in
Brussels The exact time is yet to be announced, more info (in
English) at http://fosdem.org/2009/keysigning
Deadline for key submission: Thursday Jan 29th, 8:00 PM CEST
This is just
* Robert J. Hansen r...@sixdemonbag.org wrote:
When Freon catches fire it decomposes into phosgene, a nerve gas,
which makes it kind of hard to fight the fire. In the book, a fire
ravages the datacenter and yet somehow people in it aren't dead
from phosgene exposure.
Phosgene is not a nerve
Hi,
for those interested in keysigning there are two upcoming events:
PGP/GPG/CA Keysigning events on Sunday Feb 8th at FOSDEM in Brussels
The exact time is yet to be announced, more info (in English) at
http://fosdem.org/2009/keysigning
Deadline for key submission: Thursday Jan 29th, 8:00 PM
* Hideki Saito [EMAIL PROTECTED] wrote:
I did look for one, but no...
you could give it your best shot :)
--
left blank, right bald
pgpwNozmNvuP2.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
* Faramir [EMAIL PROTECTED] wrote:
Begin of spoiler blank lines
[...]
End of spoiler blank lines
niiice, I bet he didn't catch that one!
--
left blank, right bald
pgptXuX9KPvBR.pgp
Description: PGP signature
___
Gnupg-users mailing list
* Chris Walters [EMAIL PROTECTED] wrote:
I would sooner use 30 M hydrochloric acid than sulfuric acid
30M? I guess not. Industrial grade conc. hydrochloric acid is about
12M max
--
left blank, right bald
pgpSvlVNH7WX4.pgp
Description: PGP signature
Hi,
for those interested, there's going to be again a keysigning party at
FROSCON 2008 in Bonn-Rhein-Sieg (August 23rd):
http://ksp.froscon.org/
--
left blank, right bald
pgpvVe1LZ4gS3.pgp
Description: PGP signature
___
Gnupg-users mailing list
* Faramir [EMAIL PROTECTED] wrote:
So, here is the question: Can that public key cause problems,
if I associate another key with the same email account?
I have good news (good for me at least): I checked the gpg
installed in my USB flash memory, and I found the private key (or
at
* Thomas Sowa [EMAIL PROTECTED] wrote:
- i definitely can't find the passphrase
Have a look at http://vanheusden.com/nasty/
HTH
--
left blank, right bald
pgpvNLbhhsNSQ.pgp
Description: PGP signature
___
Gnupg-users mailing list
Hi,
this is just a reminder that there's a key signing party at FOSDEM
this year again. I am a bit late to post this note (due to carneval
season), submissions are already closed by now, but it's possible to
exchange key fingerprints according to the usual scheme (with me ;-)
FOSDEM takes place
* Laurent Jumet [EMAIL PROTECTED] wrote:
Many mail clients will assume that any GPG message is encrypted and
prompt for a passphrase prior to invoking GPG.
Are you sure?
Security wouldn't be compromised if passphrase is given to anything else
then gpg?
F.e. mutt itself asks for
* Paul Surgeon [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED]: gpg bigfile.pgp
gpg: fatal: zlib inflate problem: invalid block type
secmem usage: 1920/3872 bytes
Have you tried redirection?
gpg bigfile.pgp bigfile
Using redirection is the correct way of handling large files
regarding both
* [EMAIL PROTECTED] wrote:
just thought it would be much quicker and more convenient if the
same were possible from the command line ...
I agree.
--
left blank, right bald
pgpmx3dkiLv1V.pgp
Description: PGP signature
___
Gnupg-users mailing list
* [EMAIL PROTECTED] wrote:
We are beginning the process to upgrade our gnuPG installation from
1.2.1 to 1.4.4. I have looked on the website, but have not found
directions on how to do this upgrade. Can someone please provide
me that information, or a link to the site containing that
* Johan Wevers [EMAIL PROTECTED] wrote:
David Shaw wrote:
There should be no special steps to take. Aside from the obvious
steps of making a backup and testing that your environment still
does what you want it to do, you can just install 1.4.3 on top of
1.2.1.
The OP doesn't state what
* Thomas Widhalm [EMAIL PROTECTED] wrote:
We are looking for cross- signatures with other CAs, too. So please
contact us, if you want to change signatures.
Sorry for hijacking, but I guess the easiest way of obtaining those
soon is to attend the upcoming Linuxtage in Wiesbaden, Germany, since
* Johan Wevers [EMAIL PROTECTED] wrote:
markus reichelt wrote:
What makes you think the NSA doesn't want to decrypt US government
traffic?
/me raises eyebrow I don't care what the NSA wants.
I meant to say that, as others also pointed out, that this can mean
that the NSA
* Johan Wevers [EMAIL PROTECTED] wrote:
markus reichelt wrote:
I put the speculations aside and stick with the fact that the NSA
recommends ECC for government use. That's enough for _me_.
What makes you think the NSA doesn't want to decrypt US government
traffic?
/me raises eyebrow I
* Werner Koch [EMAIL PROTECTED] wrote:
On Fri, 04 Nov 2005 19:32:07 +0100, markus reichelt said:
I put the speculations aside and stick with the fact that the NSA
recommends ECC for government use. That's enough for _me_.
There is a rationale reason why NIST (not the NSA) will go
* Jean-David Beyer [EMAIL PROTECTED] wrote:
I put the speculations aside and stick with the fact that the NSA
recommends ECC for government use. That's enough for _me_.
I guess it depends on how your paranoia works, and about whom you
choose to be paranoid. Does the NSA recommend ECC
* Dirk Traulsen [EMAIL PROTECTED] wrote:
So, fortunately in 1.4.3, there will be a 'clean', which does exactly
what 'clean total' should have done.
Great news, I'm looking forward to it.
--
left blank, right bald
pgpmUqWFaKtPm.pgp
Description: PGP signature
* Jean-David Beyer [EMAIL PROTECTED] wrote:
markus reichelt wrote (in part):
Mainly, because I think that the guys with the small ... glasses
;-) at NSA can break public key crypto quite easily,
Could you give a basis for this assertion?
Well... please understand that it is my personal
* Christoph Anton Mitterer [EMAIL PROTECTED] wrote:
No, we will however add some ECC support into Libgcrypt as time
permits.
What about using that uhm,.. libecc
(http://libecc.sourceforge.net/)?
do you know of an application that uses this lib? it seems to be on
hold. mailinglists are
* Christoph Anton Mitterer [EMAIL PROTECTED] wrote:
What about using that uhm,.. libecc
(http://libecc.sourceforge.net/)?
do you know of an application that uses this lib?
No I don't but that shouldn't be a reason to forget about it,...
Now why is that? I didn't imply anything to such
* Dirk Traulsen [EMAIL PROTECTED] wrote:
I obviously think this to be a good thing to have, but I'm a little
discouraged by the nearly total lack of interest of the list. I
would really appreciate a discussion of the proposed feature and
change of the man-page. Please write if you think that
* Thomas Jones [EMAIL PROTECTED] wrote:
John W. Moore III wrote:
Running Knoppix from the CD I encrypted the Linux partition and
it's virtually invisible. (unless one knows my HD size)
What do you mean by this statement? Are you referring to the
/randomization of the partition by use of
* Thomas Jones [EMAIL PROTECTED] wrote:
on a sidenote, using /dev/urandom is a bad idea. f.e. the standard
slackware install and other distros as well have the following code
(or something similar) in /etc/rc.d/rc.S:
The above statement, although worthwhile, is not well founded. I
think
* Thomas Jones [EMAIL PROTECTED] wrote:
The use of prng generated data to seed another prng function is
utilized to compute data that is inherently random from the
previous generation.
That is not my point, tho this might be the case. :)
If this generated data is used once, it's ok. If not,
51 matches
Mail list logo