Re: RSA or DSA? That's the question

2007-09-06 Thread Oskar L.
Noiano wrote: > to choose and why. Is it one more secure than the other? I don't think > so but I think there are some difference that make one algorithm > suitable for some uses than the other. There was a lengthy discussion on this list about the differences between RSA and DSA a few weeks ago.

Re: Questions about generating keys

2007-08-25 Thread Oskar L.
> Ultimately, you trust _someone_. Which is precisely the point I made: > trust underlies everything. Without that fundamental trust, there's no > point talking about authenticity. If that someone is yourself, do you still call it trust? Some things about myself I only trust, such as my memory

Re: Questions about generating keys (hash firewalls)

2007-08-25 Thread Oskar L.
Allen Schultz wrote: > Is there a comprehensive list of hashes used in encryption that can > help me choose which is the best to use? I'm sure there is, but such a list would not do you much good. The application you use probably only supports a few. Some are old and insecure, and should not be us

Re: Questions about generating keys

2007-08-25 Thread Oskar L.
> If I had good reason to believe Google was up to something nefarious, > there is nothing in heaven or earth that would cause me to say "yes, > that site is authentic." The point of certificates is for you to be able to verify that you are on the site you think you are, and not a fake one. If you

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Oskar L.
> Well, except that your attack isn't a birthday attack. > > A birthday attack involves making a ton of different messages and > checking _all_ messages created to find _any_ collision. > > Your attack involves taking one particular message and creating > permutations of it, one after another, look

Re: Questions about generating keys

2007-08-24 Thread Oskar L.
Robert J. Hansen wrote: > Because there is no such thing as an 'insignificant' amount of > resources. Everything has a price associated with it. The trick is to > get the most bang for your buck. Well I guess what's insignificant to one person might not be to another. I know some spammers get ad

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Oskar L.
Robert J. Hansen wrote: > Doing a birthday attack is highly nontrivial. E.g., to do a birthday > attack on SHA256 requires a minimum, a _minimum_, of over 10**17 joules > to be liberated as heat. That's about as much as you'd get from an > entire full-out strategic nuclear exchange between the US

Re: Questions about generating keys

2007-08-24 Thread Oskar L.
"Robert J. Hansen" wrote: > This is not my experience. I've received spam addressed to my amateur > radio call sign (KC0SJE) at a domain that's not directly associated with > me. I don't know how it was discovered, but for right now I'm leaning > towards the hypothesis that spammers have made pa

Re: Questions about generating keys (hash firewalls)

2007-08-24 Thread Oskar L.
That was a very good explanation of what a hash firewall and a second-preimage attack are. But I think it gives the impression that all the hash firewall is good for is protecting against a second-preimage attack, and therefore is of little importance, since a successful second-preimage attack on S

Re: Questions about generating keys

2007-08-23 Thread Oskar L.
Robert J. Hansen wrote: > In the battle between armor and warhead, _always_ bet on the warhead. > > Playing defensively and trying to make an email address invisible is > going to be an exercise in frustration. They always get seen. They > always get spammed. Play defensively and you lose. Well

Re: Questions about generating keys

2007-08-22 Thread Oskar L.
Thanks again for all your answers, I'm really interested in this kind of stuff. Robert J. Hansen wrote (regarding "DSA2" keys): > The latest versions of PGP support them. That's good news. Can it also create them? But there are probably still many using older versions. I know some who refuse to

Re: Questions about generating keys

2007-08-22 Thread Oskar L.
Robert J. Hansen wrote: > 2. Why do you need an RSA keypair? The overwhelming majority of users >are best served by sticking with the defaults--which, in this case, >means a DSA/Elgamal keypair. I prefer RSA keys because - DSA does not have a hash firewall. - They don't have a 1024 bit

Questions about generating keys

2007-08-22 Thread Oskar L.
I'm about to generate a new keypair, and got a few questions. I have many e-mail addresses and change them frequently, and therefore I don't want to have one in my public key. (Also because I'm afraid of getting spam.) I think this would be easier than having to update a lot of user IDs. Are there

Re: Structure of pubring.gpg

2006-09-15 Thread Oskar L.
>> Why are the keys in pubring.gpg in the order in witch they were >> imported? > > pubring.gpg is an internal data structure of gpg and only to be used > by gpg. If you want to export import stuff, you need to use the gpg > commands --import or --export. Yes, I know how to import and export keys

Structure of pubring.gpg

2006-08-21 Thread Oskar L.
Why are the keys in pubring.gpg in the order in witch they were imported? Is this not considered a security risk? Would it not be safer and more convenient to have the keys sorted by user ID or key ID? I deleted all files in my .gnupg directory, and then imported a public key. Then I exported the

Exporting keys as seperate files

2006-06-11 Thread Oskar L.
Hello, I'd like to export all public keys in my keyring to seperate ASCII-armored files, using the name from the user ID as the filname, and adding ".asc" as the extension. If a key has multiple user IDs, then the name from the newest one should be used. Is there a shell script that can do this?

Re: Password length paranoia

2006-02-07 Thread Oskar L.
"Gabriele Alberti" <[EMAIL PROTECTED]> wrote: > Keeping in mind my password can be composed with all 95 writeable ascii > chars, > using for example a 15 chars password gives me a "password space" of > 95^15, > that is 463291230159753366058349609375 passwords..*much* smaller than the > 256 > bit

Re: How to fix the user ID on an old (secret) key?

2005-10-20 Thread Oskar L.
[EMAIL PROTECTED] wrote: > Well, my first "attempt to repair" would be to "open" the Key with the > Edit function in GPGshell and re-set the prefs (even if you keep them > the same) and then use the "save" Command. Whenever one "tinkers" with > their Key a new self-signature is generated showing

Re: How to fix the user ID on an old key?

2005-10-19 Thread Oskar L.
"Alphax" <[EMAIL PROTECTED]> wrote: > If that doesn't work, gpg --sign 0x75AC881F ... Re-signing the key was the first thing that came to my mind when I saw the "this may be caused by a missing self-signature" message, but it doesn't help (see below). As you can see, deleting the self-signature a

How to fix the user ID on an old key?

2005-10-12 Thread Oskar L.
Hello, I've got an old keypair, generated in 2003 with the current PGP version at that time. When I import the secret key, I get: gpg: key 75AC881F: no valid user IDs gpg: this may be caused by a missing self-signature I'm able to get the key to work in gpg, but is there any way to fix it, so th

Re: import private key

2005-10-11 Thread Oskar L.
gpg --import filename Oskar > Hi all, > > In my previous linux installation i exported my keys to privatekey.txt > and publickey.txt files. After new installation i want to re-install > (re-import) them. > > Which command should I use, or is there a way to re-import privatekey? > > THX > > __

No Debian package for 1.4.2

2005-09-08 Thread Oskar L.
Does anyone know why there still isn't a Debian package for version 1.4.2 of GnuPG? http://packages.debian.org/gnupg Oskar ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Transparent keyboards

2005-09-04 Thread Oskar L.
[EMAIL PROTECTED] wrote: > I don't know of any transparent keyboards off-hand (I can check our > local computer store tomorrow, since they have one there). Thanks! > But, I will > say this. There is a keylogger out that goes between the keyboard plug > and the case. There are several, see http

Re: Transparent keyboards

2005-09-04 Thread Oskar L.
"Neil Williams" <[EMAIL PROTECTED]> wrote: > What makes you think a keylogger goes 'inside' a keyboard? The cable > connection is just as easy and an internal unit (on the inside of the > socket on the box) even better. I keep my case open, so I would notice that. There enough space for a keylogg

Transparent keyboards

2005-09-03 Thread Oskar L.
Hi, Can anyone recommend a transparent keyboard, or any kind of keyboard witch makes it easy to check that a keylogger has not been installed inside whilst you were away. I only found this one: http://www.directron.com/kb603cl.html Oskar ___ Gnupg-user

Re: Signing MS-Excel spread sheets

2005-09-02 Thread Oskar L.
Unless it is possible to configure Excel not to update the time stamp, then the only solution I can think of is to mark the file as "read-only". Oskar > I hate to admit that I still use MS-Excel rather than an open source > spread sheet tool, but workplace requirements constrain my fate... > > An

Re: Filename for digests

2005-08-21 Thread Oskar L.
> On Sat, Jul 23, 2005 at 03:33:53AM +0000, Oskar L. wrote: >> > Red Hat and others use a filename of "MD5SUM", which is a clearsigned >> > file containing the human readable MD5 hashes. I like your CHECKSUMS >> > idea better since MD5 isn't

Choosing a keyserver

2005-08-08 Thread Oskar L.
What differences are there between different keyservers? What should one take in consideration when choosing witch keyserver to use? Oskar ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Filename for digests

2005-07-22 Thread Oskar L.
> Red Hat and others use a filename of "MD5SUM", which is a clearsigned > file containing the human readable MD5 hashes. I like your CHECKSUMS > idea better since MD5 isn't the way to go any longer. > > David Naming a file containing hashes CHECKSUMS would not be a good idea, since a hash is not

Re: Filename for digests

2005-07-16 Thread Oskar L.
> > Sorry if this is a bit off topic. When you calculate the hashes (sha1) for > > several files, and save them in a singel file, then is there any standard > > witch states or suggests what this file should be called? > > Not that I know of. The format used by sha1sum is probably the best > suite

Patenting software in EU remains divisive

2005-07-06 Thread Oskar L.
http://www.euronews.net/create_html.php?page=detail_europa&lng=1&option=0,europa Patenting software in EU remains divisive - EP kills directive on harmonising Using its muscle like never before, the European Parliament has thrown out a controversial bill to harmonise patents on software. This was

Filename for digests

2005-06-20 Thread Oskar L.
Sorry if this is a bit off topic. When you calculate the hashes (sha1) for several files, and save them in a singel file, then is there any standard witch states or suggests what this file should be called? Oskar ___ Gnupg-users mailing list Gnupg-users

Re: What happened to the Win32 version of gnupg

2005-06-14 Thread Oskar L.
[EMAIL PROTECTED] wrote: > I thought that there *is* a win 32 version of 1.4.2 somewhere > > Am I wrong ? > > Thanks > > Subu Version 1.4.2 has not been released yet, but a release candidate for it has. There is no official Windows binary for the release candidate, but since the source code is av

Binary public key explained in detail anywhere?

2005-06-07 Thread Oskar L.
Hi, I export a public key in binary format and open it in a hex editor. Is there any documentation explaining what I see? Like if there are any particular bits that begins and ends user ids, signatures etc. Oskar ___ Gnupg-users mailing list Gnupg-user

Re: Passphrase Encoding and Entropy

2005-06-07 Thread Oskar L.
"Martin Geisler" <[EMAIL PROTECTED]> wrote: > When you have 64 different possibilities, all of equal likelyhood, > then you can code them using 6 bit. This is what the entropy tells > you. > > The fact that A in the 7-bit ASCII standard is 0101 is just a > coincedence --- they could just as we

Passphrase Encoding and Entropy

2005-06-05 Thread Oskar L.
Hi, If I'm not misinformed the passphrase can be encoded using different character sets. Can I in gpg change witch one is used, or does it depend on witch operating system I use? How does it affect the way you calculate entropy if a character is encoded using 16 or 24 bits (as some characters are

Re: Additional self-signature

2005-06-05 Thread Oskar L.
Hi, Using the release candidate for version 1.4.2, I imported my public and secret key, and just like with version 1.4.1 I got double self-signatures on it. I then deleted the first one, exported both keys, deleted my keyring, imported the keys, and the double self-signatures were still there. I t

Re: Set date for signature to expire

2005-06-05 Thread Oskar L.
"Per Tunedal Casual" <[EMAIL PROTECTED]> wrote: > Hi, > I want to sign keys with signatures having a limited life time. Can I set > an expiration date when I sign a key? > > I often get a question if I want my signature to expire when the key > expires, so far so good. I want to set a date of my o

Re: passphrase or random characters the safest

2005-05-31 Thread Oskar L.
"Roscoe" <[EMAIL PROTECTED]> wrote: > Lets say there are about 10 words in your dictionary. Lets also > say there are about 100 different characters on your keyboard. > > Now for password of random characters we would need: > log(340282366920938463463374607431768211456)/log(100) 20 chars. > >

Re: KMail and smartcard

2005-05-31 Thread Oskar L.
"=k3Rn=" <[EMAIL PROTECTED]> wrote: > What is the real advantage of a smartcard? I have stored my > secret-keyring on an usb-stick at the moment. How could i improve > security further more? I am just reading about encrypting the filesystem > on the stick using 'truecrypt' - is that a good idea

Re: Additional self-signature

2005-05-27 Thread Oskar L.
"David Shaw" <[EMAIL PROTECTED]> wrote: > No, it's the other way around. The public key can be created from the > secret key. What you are seeing with the second self-signature is a > historical oddity. In the past, keys were generated with two > different self-signatures - one on the secret key

Re: Additional self-signature

2005-05-26 Thread Oskar L.
Werner wrote: > When importing a secret key into a keyring without a public key, a > public key is created from the secret key. Due to historic reasons > the self-signature on the secret key is a different one than the one > created with the public key. How when importing the public key a new > s

Additional self-signature

2005-05-19 Thread Oskar L.
Hello, I'm new on this list. Can anyone tell me why I get a second self-signature when I do this: [EMAIL PROTECTED]:~$ gpg --list-sigs /home/oskar/.gnupg/pubring.gpg -- pub 1024D/7EE6D97F 2005-05-18 uid foobar <[EMAIL PROTECTED]> sig 37EE6D97F