Re: Migrating from PGP to GPG question

2010-03-05 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Laurent Jumet wrote: Hello Smith, ! Smith, Cathy cathy.sm...@pnl.gov wrote: I've tried using the --yes option without success to suppress this interactive prompt doesn't pop up. This encryption does need to run in a batch job. What do I

Re: Migrating from PGP to GPG question

2010-03-05 Thread David Shaw
On Mar 5, 2010, at 7:39 AM, John W. Moore III wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Laurent Jumet wrote: Hello Smith, ! Smith, Cathy cathy.sm...@pnl.gov wrote: I've tried using the --yes option without success to suppress this interactive prompt doesn't pop up.

Re: Migrating from PGP to GPG question

2010-03-05 Thread Daniel Kahn Gillmor
On 03/05/2010 01:30 AM, Smith, Cathy wrote: The gpg --list-sig shows that the keys are signed. Do I need to create a new signature key, and re-sign all the public keys that I imported? I think the simplest thing for you to do is to modify the ownertrust of your old signing key on the new

Re: manipulating the set of keys that can decrypt a file/message

2010-03-05 Thread Nicolas Boullis
On Thu, Mar 04, 2010 at 06:13:17PM -0500, David Shaw wrote: On Mar 4, 2010, at 4:34 PM, Nicolas Boullis wrote: Reading RFC 4880 (OpenPGP standard), if I am able to decrypt the session key, it should be possible to create a new Public-Key Encrypted Session Key packet to allow a new key

Re: manipulating the set of keys that can decrypt a file/message

2010-03-05 Thread Robert J. Hansen
On 3/5/10 9:51 AM, Nicolas Boullis wrote: I will now have a look at how things are organised in GnuPG code. Would you suggest that I look at the GnuPG 1 or GnuPG 2 code? If memory serves, the codebases are identical with respect to this. Shouldn't matter which one you use. And if I succeed to

Re: manipulating the set of keys that can decrypt a file/message

2010-03-05 Thread David Shaw
On Mar 5, 2010, at 9:51 AM, Nicolas Boullis wrote: On Thu, Mar 04, 2010 at 06:13:17PM -0500, David Shaw wrote: On Mar 4, 2010, at 4:34 PM, Nicolas Boullis wrote: Reading RFC 4880 (OpenPGP standard), if I am able to decrypt the session key, it should be possible to create a new Public-Key

RE: Migrating from PGP to GPG question

2010-03-05 Thread Smith, Cathy
Folks Thanks for your suggestions. They worked. Regards, Cathy --- Cathy L. Smith IT Engineer Pacific Northwest National Laboratory Phone:  509.375.2687 Fax:    509.375.2330 Email: cathy.sm...@pnl.gov -Original Message- From: gnupg-users-boun...@gnupg.org

Re: Migrating from PGP to GPG question

2010-03-05 Thread John Clizbe
Daniel Kahn Gillmor wrote: On 03/05/2010 01:30 AM, Smith, Cathy wrote: The gpg --list-sig shows that the keys are signed. Do I need to create a new signature key, and re-sign all the public keys that I imported? I think the simplest thing for you to do is to modify the ownertrust of your

Memory forensics

2010-03-05 Thread Robert J. Hansen
http://jessekornblum.livejournal.com/259124.html For quite some time we've known that hibernation files present risks for information security. However, there are always those who say until I see an actual demonstration, I won't believe it. The upshot: we now have an actual demonstration. The

Re: Memory forensics

2010-03-05 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert J. Hansen wrote: http://jessekornblum.livejournal.com/259124.html For quite some time we've known that hibernation files present risks for information security. However, there are always those who say until I see an actual

Re: Memory forensics

2010-03-05 Thread Grant Olson
On 3/5/2010 4:30 PM, Robert J. Hansen wrote: http://jessekornblum.livejournal.com/259124.html For quite some time we've known that hibernation files present risks for information security. However, there are always those who say until I see an actual demonstration, I won't believe it.

Re: Memory forensics

2010-03-05 Thread Robert J. Hansen
On 3/5/10 5:04 PM, Grant Olson wrote: That article was a little vague. And I don't know much about memory forensics in practice. Do you know that it actually was a hibernation file and not swap space? Note Jesse's phrasing: volatile memory forensics. Swap space is nonvolatile storage.

Re: Memory forensics

2010-03-05 Thread Grant Olson
On 03/05/2010 05:18 PM, Robert J. Hansen wrote: On 3/5/10 5:04 PM, Grant Olson wrote: That article was a little vague. And I don't know much about memory forensics in practice. Do you know that it actually was a hibernation file and not swap space? Note Jesse's phrasing: volatile memory

Re: Memory forensics

2010-03-05 Thread Robert J. Hansen
Thanks a million for all this. The company Volatile Systems was really messing with my google-fu. Err -- why? Volatile Systems is behind the Volatility framework, which is probably the best FOSS tool going right now for Windows memory analysis. (Admittedly, it only works on Windows XP...