Re: Copy Current GPG Installation to Another Server

2015-03-17 Thread Peter Lebbing
On 2015-03-17 23:18, Doug Barton wrote: I think you are asking way too much, and giving near-zero value in return. I'm not asking for anything. I suggested they check the plain SHA1 checksum or even not check at all! I'm merely opposed to making people think the short key ID is any good for

Re: Making the case for smart cards for the average user

2015-03-16 Thread Peter Lebbing
On 15/03/15 23:24, Jose Castillo wrote: I think it’s encouraging, in a perverse way, to hear that when GCHQ sought to compromise SIM card encryption keys [4], they had to resort to spying on the employees generating them. Perhaps the SIM cards are relatively well protected from remote access;

Re: Enigmail speed geeking

2015-03-14 Thread Peter Lebbing
On 13/03/15 22:33, Robert J. Hansen wrote: And if you don't trust /dev/urandom, I'd suggest using a different operating system, because that's a game-over compromise. I trust both /dev/random and the sanity of the default settings of GnuPG. And when I'm generating a key in GnuPG, I put my

Re: Enigmail speed geeking

2015-03-13 Thread Peter Lebbing
On 2015-03-13 19:54, Doug Barton wrote: But it is a major source of frustration when folks take comments out of context to use the tiniest bit of leverage with which to forward an agenda. WHAT?!?! It is true, text is a truly god awful medium to communicate in. We are apparently completely

Re: Enigmail speed geeking

2015-03-13 Thread Peter Lebbing
On 12/03/15 20:17, Doug Barton wrote: Further, the inconvenience of having to deal with generating and socializing a new key if your smart card gets lost, becomes inoperable, etc. is way too high a cost for near-zero benefit. And what if your hard drive holding your on-disk key crashes? Do you

Re: Enigmail speed geeking

2015-03-13 Thread Peter Lebbing
I interpreted Dougs message as saying that a disadvantage of smartcards, as opposed to on-disk keys, is that you lose the key when the smartcard stops functioning. I was replying to this statement by Doug: Further, the inconvenience of having to deal with generating and socializing a new key

Re: Enigmail speed geeking

2015-03-13 Thread Peter Lebbing
On 2015-03-13 15:31, Brian Minton wrote: If a key is generated externally, a backup can be taken before the key is moved to the card. For a key generated on the card, there is (by design), no way to extract the secret key, including for the purpose of backing it up When you ask GnuPG to

Re: AES-NI, symmetric key generation

2015-03-11 Thread Peter Lebbing
On 11/03/15 18:55, Maricel Gregoraschko wrote: One more question: Is there any standardization in output formats between encryption programs and libraries, for example say you encrypt with AES128 in CBC, with the same key (directly or via passphrase), and since the output will have to have,

Re: where can one find an official gnupg project statement on the state of sub project?

2015-03-05 Thread Peter Lebbing
On 05/03/15 11:33, Paulo Lopes wrote: as of today (March 5, 2015) ubuntu 14.04 LTS is still offering gnupg 1.4.16 even though there have been security issues fixed in 1.4.17, 1.4.18 and 1.4.19. In a way a uninformed user that is under the impression that gnupg is secure due to the fact that

Re: Thoughts on GnuPG and automation

2015-03-04 Thread Peter Lebbing
On 04/03/15 00:55, Hans of Guardian wrote: [...] what I'm trying to say is that for programming environments where GPGME does not make sense, there should be the ability to easily make a native version of what GPGME is doing. Couldn't this be achieved by writing a C program that, for instance,

Re: Thoughts on GnuPG and automation

2015-03-03 Thread Peter Lebbing
On 03/03/15 14:29, Hans of Guardian wrote: It is actually more difficult to wrap GPGME in Java than to have just rewritten GPGME in Java. In my opinion, if this is the case, then that is indeed the proper solution: write a general-purpose library à la GPGME, but don't call gpg directly from

Re: Thoughts on GnuPG and automation

2015-03-03 Thread Peter Lebbing
On 03/03/15 18:29, Hans of Guardian wrote: Android has an installed base of hundreds of millions. Desktop UNIX is the exotic system here as compared to Windows, Android, etc. I have no idea about how difficult it is to launch the gpg binary with a few pipes attached to a few file descriptors

Re: German ct magazine postulates death of pgp encryption

2015-03-02 Thread Peter Lebbing
On 02/03/15 11:35, Stephan Beck wrote: Sticking to that perfect position argument, in what kind of position are (would be) the people that control (packaging of) your distro? (Just curious.) I think they basically completely control my system. For individual Debian Developers, it might need

Re: German ct magazine postulates death of pgp encryption

2015-03-01 Thread Peter Lebbing
On 01/03/15 13:21, Jonathan Schleifer wrote: You mean like BitMessage https://bitmessage.org/bitmessage.pdf? It was Werner who floated the idea of replacing SMTP here on gnupg-users. After thinking about it, it made a lot of sense to me. You could search gnupg-users for his messages about this.

Re: Whishlist for next-gen card

2015-03-01 Thread Peter Lebbing
On 01/03/15 17:43, NdK wrote: while I was talking of remote user auth (so using openpgp card instead of ~/.ssh/id_* keys -- something that's already doable). No, I'm talking about that as well. And I don't think the fingerprint of the host is part of the signed data or the signature. Why do you

Re: German ct magazine postulates death of pgp encryption

2015-02-28 Thread Peter Lebbing
On 28/02/15 14:06, Ralph Seichter wrote: but PGP does not work for mass e-mail protection Let me stress again that the proper course might be to replace SMTP (e-mail) and then work from that. If you have a sieve and wish for something to hold liquids, you could plug up all the holes or say Blow

Re: German ct magazine postulates death of pgp encryption

2015-02-28 Thread Peter Lebbing
On 28/02/15 13:28, Johan Wevers wrote: I don't see even the NSA breaking that. Heh, famous last words ;). Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at

Re: German ct magazine postulates death of pgp encryption

2015-02-28 Thread Peter Lebbing
I think a bit of opportunistic encryption without proper identity verification can be a very good thing. I was just pointing out that you need to know the limits of that way of working, and make a conscious decision whether you need proper verification or not. But I didn't indicate that clearly

Re: German ct magazine postulates death of pgp encryption

2015-02-28 Thread Peter Lebbing
On 28/02/15 16:25, Bjarni Runar Einarsson wrote: E-mail is the *only* surviving decentralized free and open messaging system with any clout today. Literally everything else in common use is proprietary and centralized. We should all be deeply worried about this. Well, I think it's a bit grim

Re: Whishlist for next-gen card

2015-02-27 Thread Peter Lebbing
On 21/02/15 19:54, NdK wrote: 4 - HOTP PINs for signature/certification keys What generates the HOTP then? Do you type a PIN on the HOTP device to get the HOTP? No need. Just an applet on the phone could do. At least if you aren't using the same phone to do the crypto. I don't understand

Re: German ct magazine postulates death of pgp encryption

2015-02-27 Thread Peter Lebbing
On 27/02/15 21:12, Andreas Schwier wrote: I'd rather start a communication with a bogus key and establish trust in my genuine peer from the conversation we are having. But what about that Man in the Middle who does nothing more than receive your message encrypted to their key and forward it to

Re: Whishlist for next-gen card

2015-02-27 Thread Peter Lebbing
On 27/02/15 21:59, NdK wrote: For auth it should be the hash of the host's pub key, the same SSH shows you the first time you connect to that host. I think you're confusing /host/ authentication and /user/ authentication. I was talking about using the auth key on your OpenPGP card to do user

Re: German ct magazine postulates death of pgp encryption

2015-02-27 Thread Peter Lebbing
On 27/02/15 09:45, gnupgpacker wrote: German ct magazine has postulated [...] published mail addresses are collected from keyservers They are? I can read German, but it is veeerr slooo. So I'll probably not do that. But I have a honeypot key on the keyservers that has a

Re: GNU-divert-to-card S2K format

2015-02-25 Thread Peter Lebbing
Oops, I realised I made a mistake. On 24/02/15 19:49, Peter Lebbing wrote: - [Optional] If string-to-key usage octet was 255 or 254, a string-to-key specifier. The length of the string-to-key specifier is implied by its type, as described above. specifier 110 hash algo

Re: Unattended signing

2015-02-25 Thread Peter Lebbing
On 25/02/15 06:49, NdK wrote: Use a smartcard and generate on-card a new key that replaces the expired one. While I agree this could be a neat setup for OP, it might be overkill or even impractical given the signing speed of a smartcard. I don't know what volume of signatures will be issued.

Re: Surprising command line options handling

2015-02-24 Thread Peter Lebbing
On 24/02/15 09:34, Werner Koch wrote: No, we can't error out on an arg which looks like an option because that may actually be a valid argument. However, if running interactively and --batch is not specified, might it be useful to print Warning: --export-options did not match any key with the

Re: GNU-divert-to-card S2K format

2015-02-24 Thread Peter Lebbing
On 24/02/15 17:52, Werner Koch wrote: for everything else you need to look at the code (parse-packet.c) RFC 4880 specifies that for a string-to-key usage octet of 255, the final two bytes are a checksum, but it /is/ part of the encrypted data for v4 keys. I was curious and also had a look at the

Re: Unattended signing

2015-02-24 Thread Peter Lebbing
On 24/02/15 23:16, Daniel Kahn Gillmor wrote: So why are you keeping it around? I suppose it depends on your definition of destroying... I think you'd be fine with setting an expiry date and --delete-secret-key-ing the subkey when the time comes. If you asked me to /destroy/ the key, I would

Re: Whishlist for next-gen card

2015-02-21 Thread Peter Lebbing
On 20/02/15 09:32, NdK wrote: 1 - support for more keys (expired ENC keys, multiple signature keys) Yes! This would be a great feature to keep expired encryption keys on a card. I personally would have no use for more than 1 signature and 1 authentication key, but I don't see a reason why you

Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-19 Thread Peter Lebbing
On 2015-02-19 18:16, Jonathan Schleifer wrote: I also like @ to hide useless output, but is downloading *and executing* from a remote location really something you should hide? Especially if everything else isn't hidden? I can understand you're pretty darn pissed off that they executed

Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 17/02/15 22:32, Lukas Pitschl wrote: We’ve recently been accused again of knowlingly lowering the overall security“ [1] by not allowing such a key size. We’re still not sure what to do about it exactly. There will always be people who think

Re: 2.1.2: keyserver route failure

2015-02-18 Thread Peter Lebbing
On 18/02/15 18:07, Johan Wevers wrote: Admit it, IPv6 has failed. It may get some uses, but the widespread adaptation of carrier NAT has made it largely obsolete. Tired as I may be of this discussion (what's your next argument, NAT provides beneficial firewalling behaviour?), I still wish to

Re: MIME or inline signature ?

2015-02-13 Thread Peter Lebbing
On 2015-02-13 15:07, Brian Minton wrote: if you have a 4096 bit RSA key, please dont sign inline. The signature block is ridiculously long. You'll find it is actually even an 8192 bit RSA key. Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me

Re: [Announce] GnuPG 2.1.2 released

2015-02-12 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/02/15 20:40, Werner Koch wrote: Since the start of the funding campaign in December several thousand people have been kind enough to donate a total of 25 Euro to support this project. In addition the Linux Foundation gave a grant of $

Re: Revoked keys and past signatures

2015-02-10 Thread Peter Lebbing
On 09/02/15 20:34, Daniel Kahn Gillmor wrote: the *date* of your key was superceded revocation is relevant, though. Any certifications that claim to have happened after the date of the revocation *should* be considered invalid, whereas revocations that happen before that date (but after the

Re: (bug?) Revoked keys and past signatures

2015-02-10 Thread Peter Lebbing
On 10/02/15 12:52, Kristian Fiskerstrand wrote: No, the signature is still valid: $ gpg2 --verify test.gpg gpg: Signature made Tue 10 Feb 2015 11:53:47 CET using RSA key ID B2F1C0D8 gpg: Good signature from Testkey 3 [unknown] ^^ In my opinion, the signature might be

Re: (bug?) Revoked keys and past signatures

2015-02-10 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 10/02/15 13:30, Kristian Fiskerstrand wrote: Unless you rely on a trusted third party to provide signature stamps, signature dates can be forged. A key revocation should result in immediate questioning of all aspects of the key, as it currently

Re: (bug?) Revoked keys and past signatures

2015-02-10 Thread Peter Lebbing
On 10/02/15 13:24, Peter Lebbing wrote: If you're convinced you're not mistaken, could you please take the time to show me where this data signature from a revoked key is any different than a signature from any random invalid key? Quick correction: If you're convinced you're not mistaken

Re: Key keeps showing unknown trust

2015-02-09 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 09/02/15 10:27, Hugo Osvaldo Barrera wrote: However, the issue at hand is another: even if I set a trust of 5 (ultimate), the next screen still shows it as unknown and that doesn't change. Also not when you quit and edit the key again? It

Re: Revoked keys and past signatures

2015-02-09 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/02/15 20:06, Hugo Osvaldo Barrera wrote: Does this mean that if someone revokes their key today, *all past* signatures become invalid? I believe so, yes. You should probably have expired it instead, sorry. Suppose it is revoked because

Re: Key keeps showing unknown trust

2015-02-08 Thread Peter Lebbing
On 07/02/15 20:43, Hugo Osvaldo Barrera wrote: I don't think I'm doing something wrong, but: Am I? Did I miss something? Yes, you have interpreted it wrong. What you are doing now is this statement: I trust Hugo Osvaldo Barrera checks identities carefully before signing keys. However, I do not

Re: How to reset the PIN counter

2015-02-08 Thread Peter Lebbing
On 07/02/15 21:45, Rainer Keller wrote: Unfortunatly this seemed to brick the card. gpg: OpenPGP card not available: Not supported Gnupg does not detect the card anymore. Fortunately, your card is not bricked. But GnuPG can't access it anymore. If you have a recent enough version of GnuPG,

Re: Talking about Cryptodevices... which one?

2015-02-06 Thread Peter Lebbing
You know, if you had just said right from the start I know that a smartcard is supposed to protect theft of the private key but what is the use of that given that they can still sign and decrypt, the discussion might have progressed a /lot/ quicker. Also, it doesn't help that you eloquently refute

Re: Talking about Cryptodevices... which one?

2015-02-06 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/02/15 00:32, Faramir wrote: But I still have the impression about smartcards are supposed to prevent an attacker from stealing the private keys from the cards, right? Yes, I agree. Peter. - -- I use the GNU Privacy Guard (GnuPG) in

Re: Talking about Cryptodevices... which one?

2015-02-06 Thread Peter Lebbing
On 06/02/15 01:21, Matthias-Christian Ott wrote: If they provably don't sign their firmware or incorrectly check the signature and are not responsive, perhaps it would be helpful to talk to them through third parties like BSI or S-CERT Why?! Why would I do that?! I do like to think of myself

Re: Talking about Cryptodevices... which one?

2015-02-06 Thread Peter Lebbing
On 06/02/15 01:21, Matthias-Christian Ott wrote: Yes, you /could/. However, we were talking about Rainer smartcard readers, which /don't/. Do you have evidence for this? To st the record straight: no, I don't know this, I might myself have inferred a bit too much from Werner stating that:

Re: Talking about Cryptodevices... which one?

2015-02-05 Thread Peter Lebbing
On 04/02/15 23:12, Matthias-Christian Ott wrote: You could protect against this scenario by signing the firmware. Yes, you /could/. However, we were talking about Rainer smartcard readers, which /don't/. I think we're really not having the same discussion here... I didn't make this argument.

Re: Talking about Cryptodevices... which one?

2015-02-04 Thread Peter Lebbing
On 04/02/15 21:44, Matthias-Christian Ott wrote: There are enough examples of vendors that introduced government backdoors in their proprietary products to come to the conclusion that it is probably not a good idea to use proprietary software or hardware if your threat model includes

Re: Anonymous payment for hardware tokens

2015-02-04 Thread Peter Lebbing
On 04/02/15 13:56, NIIBE Yutaka wrote: I meant, something in a JTAG/SWD protocol layer (not by user program), built-in _hardware_ feature by semiconductor manufacturer to show hash of flash blocks. But Gnuk is not secret, so the flash doesn't need to be read-protected. And if you need a JTAG

Re: GPA fails to verify certain .asc files

2015-01-25 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 25/01/15 11:48, Damien Goutte-Gattat wrote: It looks like bug 1637 [1], which indeed affected gpa-0.9.4 but has been fixed in gpa-0.9.5 and later versions. So GPA never verified detached signatures in the first place? I read the report by Philip

Re: GPA fails to verify certain .asc files

2015-01-25 Thread Peter Lebbing
I was postulating that the breakage might be related to the fact that GnuPG in batch mode no longer verifies a detached signature as valid when it is only given the detached signature, instead of the pair of signed file and detached signature. This security fix was backported to 2.0 and 1.4, so it

Re: GPA fails to verify certain .asc files

2015-01-25 Thread Peter Lebbing
On 25/01/15 14:49, Philip Jackson wrote: I'm sorry if I've wasted people's time with a worry from the past that no longer exists. It was totally reasonable to bring this to the list, so no need to apologise as far as I'm concerned. Peter. -- I use the GNU Privacy Guard (GnuPG) in combination

Re: Talking about Cryptodevices... which one?

2015-01-25 Thread Peter Lebbing
On 25/01/15 17:31, Matthias-Christian Ott wrote: [...] but I felt that I had to intervene to stop portraying the OpenPGP card as a secure solution. I suppose you and I read the following statement from that mail by Werner quite differently: On 23/01/15 21:31, Werner Koch wrote: Granted,

Re: Talking about Cryptodevices... which one?

2015-01-25 Thread Peter Lebbing
On 23/01/15 22:53, Bob (Robert) Cavanaugh wrote: Werner, What set would you recommend for us Linux types (Fedora 20 in my case) ? Werner has posted on this mailing list what he uses himself; I suppose a good search term should turn it up rather quickly from the archives. SCM is pretty okay; I

Re: Talking about Cryptodevices... which one?

2015-01-24 Thread Peter Lebbing
On 24/01/15 17:57, Andreas Schwier wrote: Can you provide any evidence for that claim or is this just paranoia ? One man's paranoia is another man's common sense, I suppose. Since those smartcards are pretty much exclusively used for security purposes, i.e., private key storage, they're a likely

Re: GPA fails to verify certain .asc files

2015-01-24 Thread Peter Lebbing
On 24/01/15 20:05, Philip Jackson wrote: Using GPA 0.9.4 in linux. I downloaded a file and its signature as a .asc from a website that I have used many times. While looking at the spelling of the filename, I accidentally clicked on the signature file and launched GPA so decided to use it

Re: gpg-connect-agent querying max-cache-ttl

2015-01-12 Thread Peter Lebbing
On 12/01/15 18:45, Rob Fries wrote: I believe the proper way to do this would be through gpg-connect-agent. You're mistaken; it's as Patrick said through gpgconf, the program to programmatically query the configuration. $ gpgconf --list-options gpg-agent|grep ^max-cache-ttl: |cut -d: -f 10 But

Re: gpg-connect-agent querying max-cache-ttl

2015-01-12 Thread Peter Lebbing
On 12/01/15 21:48, Rob Fries wrote: But I am not looking for the value in the configuration, I am looking for the time remaining until a passphrase expires. Oh ah! Have you considered these two options: 1) gpgconf says the ttl is a 32-bit unsigned number. Have you tried entering the value

Re: Key selection

2015-01-02 Thread Peter Lebbing
this is not much work. $ gpg2 -k lebbing pub 1024R/3E4FCA14 2006-03-31 [revoked: 2009-11-12] uid [ revoked] Peter Lebbing pe...@digitalbrains.com pub 2048R/DE500B3E 2009-11-12 [expires: 2015-10-27] uid [ultimate] Peter Lebbing pe...@digitalbrains.com sub 2048R/DE6CDCA1 2009-11-12

Re: Craft public key so that private key equals given string (my password)?

2015-01-02 Thread Peter Lebbing
On 02/01/15 13:14, sben1783 wrote: What I'd like to do is: create a public key so that the corresponding private key equals my given password. This is possible with elliptic curve cryptography, although you should realise that a passphrase usually contains a lot less entropy than a private key

Re: Craft public key so that private key equals given string (my password)?

2015-01-02 Thread Peter Lebbing
On 02/01/15 17:04, Ben Staude wrote: Another thought would be to just paste the private key (encrypted by my password) to the gpg'd files? Of course my private key would then be sort of public, but still it is as secure as using symmetric encryption with that password in the first place (but

Re: GnuPG and g10 code

2014-12-16 Thread Peter Lebbing
On 16/12/14 13:26, Dave Pawson wrote: What about: https://en.wikipedia.org/wiki/OpenPGP_card (IMHO) pure geekery copied from one of the other pages? Hmmm, that article seems lacking. If you would have asked nicely, I might have bothered to improve it. Now, I don't feel inclined to do it.

Re: Mainkey with many subkeys??

2014-12-13 Thread Peter Lebbing
On 13/12/14 12:12, Tomo Ruby wrote: But what does meaningful way mean? That there may be theoretic methods to use signatures to learn information about the private key, but that they are all so impractical that they can be ignored. HTH, Peter. -- I use the GNU Privacy Guard (GnuPG) in

Re: Randomized hashing

2014-12-13 Thread Peter Lebbing
On 28/11/14 11:41, NdK wrote: Oh, I agree, I already thought that might close any 'r'-swapping security issues, if there would be any; just like you can include the hash algorithm in the signature to prevent swapping it out for a weaker one. But when swapping 'r''s does not actually create

Re: Mainkey with many subkeys??

2014-12-12 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11/12/14 15:15, Tomo Ruby wrote: I really know only of this approach: The more encrypted/signed data I spread over the web, the easier it might be for an attacker to calculate the secret key. If this was advice directly relating to OpenPGP: Do

Re: 31C3, keysigning party

2014-12-11 Thread Peter Lebbing
On 11/12/14 11:39, Werner Koch wrote: Hi! Hi! I will be at the 31C3 at Hamburg from the 28th (late afternoon) to the 30th. You may find me at the FSFE Assembly or ask there for my local communication parameters. I intend to organise a keysigning party if no one else does. I did one at 29C3

Re: 31C3, keysigning party

2014-12-11 Thread Peter Lebbing
On 11/12/14 13:22, Peter Lebbing wrote: Oh, and there's this 2D barcode keysigning thing as well, should look it up. It was demonstrated to me at the keysigning at OHM2013. Probably monkeyscan from monkeysign... the latter has been mentioned numerous times on this list, btw. Peter. -- I use

Re: 31C3, keysigning party

2014-12-11 Thread Peter Lebbing
On 11/12/14 14:46, Tobias Mueller wrote: FWIW: A tool with a similar goal is GNOME Keysign: Thanks for the pointer! Contrasting caff or monkeysign, it does not rely on keyservers. Neither does caff, if the organiser of the keyparty simply collects all keys (sent by the participants) and sends

Re: 31C3, keysigning party

2014-12-11 Thread Peter Lebbing
On 11/12/14 17:58, Guilhem Moulin wrote: There is one advertized already: steeples fingers Excellent! And thank you for pointing it out, especially since they expect you to sign up /way before/ the event. I hope they'll allow people in who didn't sign up (who will bring their own slips of paper

Re: digest-algo SHA256, SHA-1 attacks

2014-11-27 Thread Peter Lebbing
On 27/11/14 06:55, NdK wrote: 1) who guarantees that the 'r' seen by the receiving party is the same generated by the signer? Since it's usually trivially combined with source text, I feel it's a huge attack vector The purpose of the signature is to ascertain that the OpenPGP message has not

Randomized hashing (was: digest-algo SHA256, SHA-1 attacks)

2014-11-27 Thread Peter Lebbing
Perhaps I should add that it takes real research and formal proof to show that this randomized hashing doesn't add attack vectors, and I have been glossing over that. But that is because at a glance it looks like such research has been done. That doesn't mean it's a fact that there are no

Re: Randomized hashing

2014-11-27 Thread Peter Lebbing
On 27/11/14 13:04, NdK wrote: (note that r is not signed, as the rhash scheme suggests and the paper confirms!) In contrast to a previous proposal by the same authors, the salt r does not need to be included under the signature. I read this quite differently. I read it as that 'r' is not

Re: Pros and cons of PGP/MIME for outgoing e-mail?

2014-11-26 Thread Peter Lebbing
My proposal doesn't have this problem. I want the manifest to summarize the entire content of the message, including sha256 (or whatever is considered good) fingerprints of each part. 1) What does a checksum add beyond the OpenPGP Modification Detection Code (MDC)? 2) Why doesn't an attacker

digest-algo SHA256, SHA-1 attacks (was: Setpref is not working or is it a bug or something?))

2014-11-26 Thread Peter Lebbing
(By the way, how did the topic - gpg.conf: settings for security and compatibility ever get confused with the topic - Setpref is not working or is it a bug or something? because this definitely is the former but is called the latter. Also, @g, as you apparently call yourself, you seem to start a

Re: Symmetrical encryption or ...

2014-11-22 Thread Peter Lebbing
On 22/11/14 10:23, Dave Pawson wrote: https://launchpad.net/ubuntu/+source/keepass2 Looks like Ubuntu only? Not found for Fedora. If I look at the KeePass website, specifically at [1], I see: 8 -- 8 In addition to Windows, KeePass 2.x runs

Re: Symmetrical encryption or ...

2014-11-22 Thread Peter Lebbing
On 22/11/14 11:11, Peter Lebbing wrote: If I look at the KeePass website, specifically at [1], I see: Whoops! [1] http://keepass.info/help/v2/setup.html#mono -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key

Re: Encryption on Mailing lists sensless?

2014-11-19 Thread Peter Lebbing
On 19/11/14 01:31, Robert J. Hansen wrote: No. Client-side, you get to inspect (fully) only your data, and you have to develop a statistical model of spam based on only your data. When Gmail filters, it inspects (fully) traffic to *millions* of users, and uses that to create a model no

Re: Encryption on Mailing lists sensless?

2014-11-19 Thread Peter Lebbing
On 19/11/14 09:54, Nan wrote: First, charlatan and snake oil imply deceit. They often do, don't they? I doubt that is what is meant, though. If I look in the Oxford online dictionary: Definition of charlatan in English: noun A person falsely claiming to have a special knowledge or skill

Re: ECDSA vs EDDSA

2014-11-12 Thread Peter Lebbing
On 10/11/14 17:31, Werner Koch wrote: Which is used in 2.1: That's great to hear, just like it is in general pretty great you got to release a major new version! Congratulations! After browsing a bit in the source, I conclude that RFC 6979 is used for both classic DSA and ECDSA; something not

Re: Detached signature ambiguity

2014-11-11 Thread Peter Lebbing
On 11/11/14 09:52, Werner Koch wrote: I think this is what I will implement. How would the warning be triggered? By the extension of the signature file or by existence of a file without the .sig extension, or even some other way? That is an entire different thing and not a problem of gpg. If

Detached signature ambiguity (was: [Announce] GnuPG 2.1.0 modern released)

2014-11-10 Thread Peter Lebbing
On 10/11/14 12:02, Nicholas Cole wrote: So the confusion is that you have one single command that deals with verifying both a detached signature and with a file that contains a signature? Yes. Is the best fix for this to introduce two new commands That seems extreme. Although you could add

Re: Detached signature ambiguity

2014-11-10 Thread Peter Lebbing
On 10/11/14 13:03, Nicholas Cole wrote: But in fact, it is the fact that scripts depend on this that made me think that this might be a case where things *should* get broken, because this is actually a serious security flaw, and the scripts in question need fixing. In many cases, no one is

Re: [Announce] GnuPG 2.1.0 modern released

2014-11-09 Thread Peter Lebbing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/11/14 22:21, Simon Nicolussi wrote: Invoking GnuPG that way is insecure without knowing the contents of the signature file. An attacker could have replaced it by something that's not, in fact, a detached signature. Oops! Very nice find,

Re: gpg-agent forwarding

2014-11-07 Thread Peter Lebbing
On 07/11/14 03:24, Kristian Fiskerstrand wrote: See https://lists.gnupg.org/pipermail/gnupg-devel/2014-August/028697.html Right, thanks for the pointer! Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key

gpg-agent forwarding (was Re: Help needed to setup Passphrase with GNUPG 2.0.26 on Solaris 10)

2014-11-06 Thread Peter Lebbing
On 05/11/14 22:09, Werner Koch wrote: It might be worth to check whether there is an interest in running gpg on the server via Putty and have Putty forward the communication of gpg to a gpg-agent+pinentry running on Windows. I think this certainly has its upsides, running the agent on the

What's new in 2.1 FAQ: Corrections, suggestions

2014-11-06 Thread Peter Lebbing
Hello Werner and list, While reading that FAQ top to bottom, I encountered some typo's which I fixed. I'm only used to git in a non-distributed fashion, so I'm not accustomed to it's patch submission features and simply attach a git-generated diff against 0968808. I hope that suffises. And

Re: gpg-agent forwarding

2014-11-06 Thread Peter Lebbing
On 06/11/14 15:40, Werner Koch wrote: OpenSSH has socket forwarding and that is what I was thinking about. Sockets other than TCP you mean? Is this something generic that can be invoked by using the command-line OpenSSH client? I can't find it. To avoid that other users connect to a listening

(OT) Re: What's new in 2.1 FAQ: Corrections, suggestions

2014-11-06 Thread Peter Lebbing
so I'm not accustomed to it's patch submission features Ah, I'm glad to see Muphry's Law is still in effect. The world works the way it's supposed to. ;) Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My

Re: With the release of modern, is there intent to support ECC in classic?

2014-11-06 Thread Peter Lebbing
On 06/11/14 17:45, Werner Koch wrote: In case your problem is the pinentry: The agent now provides a loopback pinentry option which basically brings back the version 1 Pinentry prompts. Perhaps this warrants a mention on the what's new FAQ page, for people that are using 1.4 for that specific

RE: Help needed to setup Passphrase with GNUPG 2.0.26 on Solaris 10

2014-11-05 Thread Peter Lebbing
Sorry, it was not the intention to advertise the Phrase or using a Famous Passphrase. I wanted to show after giving the Passphrase it was hanging. So I showed that in the Screen Shot. We wanted the Resolution for this. You weren't entering a passhprase there. If it were asking for a

Re: Help needed to setup Passphrase with GNUPG 2.0.26 on Solaris 10

2014-11-05 Thread Peter Lebbing
On 2014-11-05 16:56, Robert J. Hansen wrote: Not to harp, but it bears repeating: use GnuPG 1.4 and this entire problem goes away. Given all the emails that have gone back and forth on this subject, I think it's probably time to make the switch to 1.4. :) Right, yes, I agree. I focussed

Re: Help needed to setup Passphrase with GNUPG 2.0.26 on Solaris 10

2014-11-05 Thread Peter Lebbing
On 05/11/14 20:52, SubramaniaRao, ravikumar wrote: Thank for your Input. Please help me where I will get the tar File for Qt pinentry, so that I can install it. If QT Pinetry is not required, Is it perhaps possible that you only notice the contributions to this thread that are explicitly

Re: Is gpg-agent passphrase status query possible?

2014-11-02 Thread Peter Lebbing
On 02/11/14 09:42, Cpp wrote: I see that command will print out the passphrase in clear text. Is this secure to use just like that? This is the same channel as where session keys are exchanged. With a session key, you can decrypt an encrypted message: very sensitive information. So the channel

Broken mirrors

2014-11-02 Thread Peter Lebbing
It is a bit unclear to me where you should report broken mirrors or whether you should do so at all; I thought I'd best just post it here. ftp://ftp.surfnet.nl/pub/security/gnupg/ seems to only hold directories, no files. ftp://ftp.demon.nl/pub/mirrors/gnupg/ - that directory doesn't even exist.

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
Why is brute force even mentioned in something about RSA? You couldn't brute-force a 128 bit RSA key. I'd say 2048 bit quite covers it 8-) Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My key is available at

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 21:49, ved...@nym.hush.com wrote: Surely Peter knows this too ;-) More likely 128 was a typo for the more common older RSA key of 1028 ... No, I'm using a strict definition of brute force. For p = 2^63 to 2^64-1 For q = 2^63 to 2^64-1 If p * q == n: Break Next

Re: key length/size RSA discussion/recommendations in the wiki

2014-10-29 Thread Peter Lebbing
On 2014-10-29 22:30, Robert J. Hansen wrote: Technically, brute force is testing every *possible* value... not values that you know aren't going to work. Why test those? Well, why not restrict ourselves to primes whose product equal the modulus? I could solve any key in constant time that

Re: Terminal asks for passphrase even when passphrase is cached by gpg-agent

2014-10-28 Thread Peter Lebbing
I have gpg-agent cache passphrase. When I run gpg -c text.txt it asks for passphrase twice like it normally would but Kgpg or KMail don't. -c is symmetric encryption, encryption with a passphrase. It is prompting you what the passphrase should be. If it were to ask you for your passphrase for

Re: auto refresh for expired certificates

2014-10-26 Thread Peter Lebbing
On 26/10/14 11:32, MFPA wrote: I couldn't come up with search terms to find it with a search engine. After several tries I finally had luck. I also forgot the name :). But it's parcimonie. It seems to live at https://github.com/EtiennePerot/parcimonie.sh . HTH, Peter. -- I use the GNU

Re: auto refresh for expired certificates

2014-10-26 Thread Peter Lebbing
On 26/10/14 12:44, Peter Lebbing wrote: After several tries I finally had luck. By the way, my search string was keyserver lookup exposes keyring It seems to live at https://github.com/EtiennePerot/parcimonie.sh . But this e-mail is to correct this bit: this is actually a reimplementation

<    3   4   5   6   7   8   9   10   11   12   >