If anyone has a backup copy for Ubuntu please let me know.
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
in,
but would prefer not to give you my key itself.
(GnuPG, as well as allowing generation of signing subkeys, and encrypting
subkeys,
also allows generating a key with both signing and encrypting capabilities, and
not adding subkeys . 8^) )
vedaal
algorithm on the key with the passphrase.
Knowing the un-encrypted copy of the key would not help any.
(I don't know how to explain the workings of the block-ciphers in gnupg, but
think that they are resistant to known-plaintext attacks.)
vedaal
on the keyserver at all?
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
is usually
only
used for either signing or decrypting symmetric session keys,
whether
that's in TLS or OpenPGP or CMS or any other place where RSA is
used.
--dkg
=
OK, Thanks.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
offline.
(Obviously, for a real secret key, would not use the online PGPdump)
Any help or criticism about how to extract a functional RSA key would be
appreciated.
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
escaped string with -g).
Also, when I did apt-cache search pgpdump, I noticed there is a
Python library:
[1]. That might be even better for your purpose.
HTH,
Peter.
[1] https://pypi.python.org/pypi/pgpdump/
=
Yes,
Python should be simpler to use in ubuntu
THANKS !!!
vedaal
on
keyservers, for other RSA functions.
vedaal
And... You say you do not trust closed source programs for key
generation, but
does that mean you trust them for key usage?
=
I trust them to encrypt to my public key, and was planning to work out
a system where I could decrypt on my own without
,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
itself.
Much as I like different crypto options, I don't think it would really improve
GnuPG to have a keyfile option.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
name and e-mail
address).
This way you can read and correspond on whatever device you are using at the
time.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
not use 'pgp 2' in the options in gpg.conf.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
For some reason, none of the backward slashes '' were included in the
posting in Gnupg users mailing list website.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Gnupg 1.4.16 decrypts the above 2.x message fine when using the
--override-session-key and just changing the 1 in the shown session
key to a 10.
C:g1416gpg --override-session-key 10:9F6E6800CFAE7749EB6C486619254B9C
c:hct.
asc
gpg: armor: BEGIN PGP MESSAGE
gpg: armor header: Version: PGP
Disastry's version either on Ubuntu,
but was able to import the unix PGP he compiled on his website, into Ubuntu
without problems.
Here is the re-creation of his website:
http://www.spywarewarrior.com/uiuc/disastry/263multi.htm
His version allows all the ciphers GnuPG uses except for Camelia.
vedaal
extensions.
(It easily open gpg.conf and saves it a gpg.conf).
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Am using Gpg4win 2.2.1 /GnuPG 2.0.22
Did gpg --dump-options and noticed that the --faked-system-time option is not
listed.
Was this option removed?
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo
.
(I would be willing to pay for such an app,
If developers think enough others would be willing to buy such an app to make
it worthwhile,
then maybe gnupg on android could be widely used.)
fwiw,
I have played around with APG and like it, but don't trust the 'phone' with it.
vedaal
Fingerprint;
(the semi-colon should be a colon)
Add the empty line (GnuPG will import it anyway without it, if you forget to
;-) )
Command line gnupg will import it anyway, but the front-ends might not.
vedaal
___
Gnupg-users mailing list
that it will be durable
and scanable and importable without scanning errors ?
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
] Whenever the correspondents are in an environment 'safe' from this type of
acoustic threat, the message can be decrypted using the 'special typical' key.
Whatever information is intended to be conveyed by using a 'special key', will
still be understood by the receiver.
vedaal
, to do almost anything a
user wants to do in terms of storing, sending or authenticating any messages or
files.
Thanks again, to WK and the GnuPG team.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo
:
just another testgpg: decryption okay
Maybe people here can figure out why it works this way, but not in the way you
tried, and if this is a 'windows' issue ... ;-((
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
1, keyid 506F4FA1D35FB186
data: [4095 bits]
gpg: public key is D35FB186
You need a passphrase to unlock the secret key for
user: vedaal nistar (previous addresses were spam flooded) ved...@nym.hush.com
4096-bit RSA key, ID D35FB186, created 2008-01-22
gpg: Invalid passphrase; please try
vedaal at nym.hush.com vedaal at nym.hush.com
wrote onTue Nov 19 18:14:31 CET 2013 :
gpg: public key decryption failed: bad passphrase
gpg: encrypted with unknown algorithm 163
gpg: decryption failed: unknown cipher algorithm
(the passphrase used was: 12345)
Now here is the last part
-key encrypted session key] (plain text + MDC
SHA1(20 bytes))
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Tuesday, November 19, 2013 at 3:02 PM, Peter Lebbing
pe...@digitalbrains.com wrote:
On 19/11/13 18:14, ved...@nym.hush.com wrote:
Why does gnupg give these types of error message, as opposed to
simply
stating 'decryption failed: bad passphrase' ??
What kind of relationship is there
be that, as Robert intuitively felt, an avenue of attack on the
password and subsequently derived keys, might be far more feasible than trying
to brute force a keyspace, and therefore rendering the resulting ciphertext
more vulnerable than if it were encrypted only once.
vedaal
it was generated as 'only-sign' ? )
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
missed?
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
maybe an icon type visualization of a file/folder, covered with ascii PGP armor
with a metallic shine, and a little head on top covered with a helmet,
(with eyes showing through, and a smile showing through the visor of the helmet)
and little armored arms and feet.
a criminal element clientele and be fairly profitable,
but then law enforcement can try to go the hardware key-logger route.)
just a thought ...
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
of the encrypting version is listed.
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
-mode $PGPID
-
It's even enough to just do:
gpg --fingerprint --fingerprint
and gnupg will list the keys and subkeys each with their short id followed by a
line
Key fingerprint with the fingerprint
vedaal
___
Gnupg-users mailing list
Gnupg-users
to get ubnutu
to recognize a usb gnupg smart card reader ;-) )
tia,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the details of the metadata of the
pdf and seeing what 'extra' material was embedded, but only if a habit is made
of checking the metadata very carefully.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo
padding.
As the session key is random, it isn't vulnerable to a plain-text attack, and
might not need any padding at all,
and so, the hash function used for the padding isn't such an issue...
Sorry to take up the time needlessly.
vedaal
___
Gnupg-users
through an RSA
standard first?
just curious,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
.
Anyone come across specific recommendations for paper, printer, and storage
recommendations for 'Archival Paper Backup' ?
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
and size to be used for accurate OCR ?
OCR-A, OCR-B, Ordinary Courier 10, other ?
(I know that the purpose of Paperkey is to be able to type it in by hand, if
all else fails ;-)
but if OCR works, it would make things much easier ... )
TIA
vedaal
for a detached signature
file,
when only the signature file is present, and the file signed is not:
$ gpg --list-packets /cygdrive/c/users/vedaal/'My Documents'/km1.pdf.gpg
:compressed packet: algo=1
:onepass_sig packet: keyid A306C37B495CA15B
version 3, sigclass 0x00, digest 8, pubkey 1
If your mapping table ever gets lost, you can easily recover the filename by
decrypting the added ciphertext at the end of each encrypted file.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
to a full-size dvd.
[4] The truecrypt volume doesn't dismount from the ordinary truecrypt window,
but needs to be right-clicked on in the ubuntu file browser, and dismounted
from the truecrypt option in the right-click drop down menu.
hth,
vedaal
and encrypted text is noticeably larger,
which can be worked around by the user by making the message wordier,
if the user, for whatever reason, wanted to conceal that the message wasn't
signed.)
tia,
vedaal
___
Gnupg-users mailing list
Gnupg-users
downloaded,
and actively maintaining it and improving it!!!
vedaal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (MingW32)
Comment: Acts of Kindness better the World, and protect the Soul
iQIcBAEBCAAGBQJQj9hoAAoJEFBvT6HTX7GGUY0P+wR49fcsqgMg2aGKheOP3mMY
Tp3nPNj1QnK7zFMyhs
that
gnupg can handle when done this way, (or any other problems)?
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
. ubuntu) writing to usb only, using
any ubuntu editor, and then rebooting when done.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
communication, she can
then learn the other issues on how to do this safely.
(She can find us on the web, and join this mailing list or others
like it, and learn at her own pace ;-) ).
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
, the message M, and other padding to form an
encoded message EM of length k octets as
EM = 0x00 || 0x02 || PS || 0x00 || M.
4. Output EM.
=[ end quoted sections ]=
vedaal
n.b.
If you are interested in looking into this rigorously further, I
recommend you contact Professor
it's sent from an appropriately anonymized e-mail
address),
and if it is signed, then the throw -keyid doesn't hide the
sender's identity from the receiver.
vedaal
(sorry about thread-breaking ;-((
sent from a site that doesn't allow e-mail clients
not by the averaqe user :-) ... )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
is there anywhere else to find zlib?
are there any other dependencies that are also needed before compiling?
is it supposed to be 'not do-able' under windows?
(the compililer *did* give the encouraging message of:
'checking whether build environment is sane... yes'
;-) )
TIA
vedaal
* as to the problems that may occur.
It is far, far worse to communicate using encryption, expecting
that privacy will be maintained, when unknown to the user, it may
not be,
than not to communicate at all.
Do not place such a 'stumbling block' before the 'blind'.
vedaal
(sorry about breaking
, keyid 506F4FA1D35FB186
data: [4094 bits]
gpg: public key is D35FB186
gpg: public key encrypted data: good DEK
:encrypted data packet:
length: 72
mdc_method: 2
gpg: encrypted with 4096-bit RSA key, ID D35FB186, created 2008-01-
22
vedaal nistar (previous addresses were spam
message that the directory can't be
found,
and that can be taken as an indication to use a forward slash
rather than a backward slash)
maybe this could be added to the documentation or the FAQ ?
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
but for the ordinary windows dos box, which doesn't allow pipes,
sorry, my mistake :-((
current windows does allow pipe, but not grep
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
it
this way.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
'Doesn't really matter much, since the secret key is required for
both,'
sorry,
my mistake,
to remove a uid, doesn't require the secret key,
(probably done this way to maken it easier for users to manage
their public keyrings)
vedaal
___
Gnupg
.
(A clever, malicious attacker could backdate the clock,
and have a forgery of something you did in the past,
when you couldn't claim:
Hey, that's an obvious forgery!
I'm on record as saying I would never use SHA1 to sign anything anymore!)
vedaal
-BEGIN PGP SIGNATURE-
Version: GnuPG
.
So when is it reasonable enough to suggest that SHA1
is broken enough to start working on a v5 key?
vedaal
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (MingW32)
Comment: Acts of Kindness better the World, and protect the Soul
Comment: Using GnuPG with Mozilla - http
SHA-256
(btw,
am trying out thunderbird with enigmail, and a new gmail account, to try
to not 'break threads'
please let me know if it still breaks,
thanks,
vedaal
my keys:
http://www.angelfire.com/pr/pgpf/mykeys.html
(have not yet added the new gmail uid and uploaded to keyservers)
-BEGIN
it require unsubscribing and re-subscribing,
or is there an easier way?
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
,
if not, any other suggestions to try in hushmail?
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
' is a
premium user)
Usually access gnupg during downtime at work, and cannot use a
'nym' on my work-based e-mail clients.
Will think about setting up a 'non-thread breaker' thunderbird
arrangement on my laptop, and send messages from there
Thanks
vedaal
)
tend to engender such passionate responses.
it will be interesting to see if V4 keys will be gracefully
abandoned as SHA1 becomes as broken as MD5,
or if there will be die-hards holding onto they their V4 keys no
matter what ...
vedaal
except for people who insist on it.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
,
trivially countered by
simply listing the keysize together with the fingerprint.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
never called it a 'fix'. It's an easily describable and do-able
workaround for people who need their v3's for their preferred
cryptosystem.)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
to decrypt them, and nostalgic to see their
verified signatures, and am thankful to WK for allowing this in
gnupg 1.x, and soon in gnupg 2.x.
Am somewhat surprised by the unprovoked V3 rants, when I asked for
nothing from anyone, and only thanked WK for allowing it to happen.
vedaal
)
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
vedaal at nym.hush.com vedaal at nym.hush.com wrote on
Thu Jun 21 19:05:06 CEST 2012 :
Will GnuPG 2.x then allow importation of v3 keys?
(main reason I still prefer 1.4.x over 2.x)
Sorry,
my mistake, gnupg 2.x does import v3 keys,
haven't looked at this aspect for a while, as I couldn't use my
a listing explaining these things be in the FAQ ? )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Is there a listing anywhere of the different 'error messages' that
gnupg gives when something is wrong,
(specifically, when there is an error message in trying to decrypt)
?
TIA
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
(Cygwin)
Is there any way to find out without performing a gpg function on a
file?
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
their privacy by using encryption,
while the bad guys seem not only to need no convincing, they use
the encryption so effectively that capable intelligence agencies
can't crack it)
now if only they got a warrant to put in a keylogger before setting
him free ...
vedaal
address separately to
whomever the user wants to correspond with.)
fwiw,
Have never received any keyserver id related spam on some of my old
V3 keys that are used only for remailer list correspondence and
have been on keyservers for well over a decade.
vedaal
easier to just give the fingerprint ;-)
than to go through all the above,
but it's a possible doable approach ...
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
more relevant in my case, where I routinely use 3DES
;-) )
(am not familiar enough with the primitives of symmetric encryption
in how a string to key symmetric encryption works.)
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
Truecrypt does not accept more than 64, for whole
disk encryption.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
What if keyservers were to limit the amount of keys generated or
uploaded to a 'reasonable' amount which no 'real' user would
exceed?
(i.e. 10/day, or some other number discussed and agreed upon by the
various keyservers?)
vedaal
___
Gnupg-users
the one I intend.
Not with a direct command, but with a simple workaround.
Make another keyring with only the key(s) you want tried, and point
gnupg to that keyring for that batch job.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
...
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
on a flashdrive
to run from windows, it does have the advantage of the unix-like
commands.
Sorry, about the 'ONLY' ...
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
, and a miniDVD with
ubuntu),
then, assuming there is no keylogger on the borrowed laptop, what
is the problem with booting from the ubuntu miniDVD, and running
gnupg from ubuntu while accessing the keys from the usb, and
writing to the usb?
vedaal
___
Gnupg
is available anyway, and the mbr on the hard
drive isn't accessed.
Now if these rootkits can copy the usb secring,
then I might be worried.
Can they??
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
' for my limited
threat model, and non-UEFI motherboards), is it to run gnupg from a
usb and an Ubuntu install disk, when booting bypasses the
harddrive's mbr altogether, even considering known bios rootkit
infections?
(or are we drifting into really OT waters already? ;-) )
vedaal
)
(6) RSA (encrypt only)
(7) DSA (set your own capabilities)
(8) RSA (set your own capabilities)
Your selection?
-
Is there a way to do this from any of the gpg4win front ends?
TIA,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
;-) )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
MingW\bin
folder).
So,
as long as you don't need permission to run msys.bat from a
flashdrive
(Norton and some other antivirus software sometimes get upset with
this),
you can have a portable MingW-MSYS compiler that works on windows
machines).
vedaal
/cyowb.html
As expected, the compilation does not include iconv.dll, so a link
to the gnupg.org iconv.dll download and instructions,
http://www.gnupg.org/download/iconv.en.html , is also provided.
If anyone has any suggestions for improvement, please post,
Thanks,
vedaal
, that the resultant files have the same hash?
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
reasonably certain that Maxine would have accepted the ftp of
the bunary and its sig, 'on faith') ;-)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
primarily in order to update Maxine Brandt's
Torduninja site that I recreated, as no one had access to her old
site after she passed on)
http://www.angelfire.com/mb2/mbgpg2go/tp.html
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users
Maxine Brandt's GPG-
to-GO site, in the event that windows binaries for 1.x might not
available.
If anyone has a simpler way of doing this, or any other
suggestions, please post,
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
;-)
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
that just encrypts
anything copied to clipboard, but can it be done just from the
gnupg commandline?)
Thanks,
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
.asc as the desired ciphertext, but
only by encrypting the plaintext in the input file f1.txt
If you, (or anyone else here), were able to get this to work, could
you please list all the steps and the gpg output?
Thanks!
vedaal
___
Gnupg-users mailing
filesave.asc
which is something I would not have known before DGK's suggestion.
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Peter Lebbing peter at digitalbrains.com wrote on
_Mon Aug 15 11:06:53 CEST 2011_ :
... when trying to
solve the RSA problem ...
Here is a good overview (dated 1998, but not too many new RSA attack
approaches since then:-) ) of 20 years of RSA attacks:
101 - 200 of 362 matches
Mail list logo