Re: Decryption Fails on UserName but not on EmailAddress ???

2009-09-29 Thread nschroth

Interesting. The key is not listed twice, but...

--list-keys PrimaryUserName shows ALL THREE keys while
--list-keys PrimaryEmailAddress shows only the primary host key.

Could it be that the name I used for the primary key was CompanyName  and
the email addresses for all the people had that as their domain (ex:
b...@companyname.com) ???



nschroth wrote:
 
 I have been reading previous posts on this topic but have not found my
 answer.
 When I ENcrypt on BoxA using -r UserName, decryption on BoxB errors with :
 decryption failed: secret key not available.
 However, doing the same test using the email address associated with the
 recipient, Decryption WORKS.
 
 Can anyone offer some reasons for this?  Did we gen or export or import
 the key incorrectly?
 
 
 
 

-- 
View this message in context: 
http://www.nabble.com/Decryption-Fails-on-UserName-but-not-on-EmailAddress-tp25577787p25661872.html
Sent from the GnuPG - User mailing list archive at Nabble.com.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: choosing an encryption target from a User ID

2009-09-29 Thread Ingo Klöcker
On Monday 28 September 2009, Daniel Kahn Gillmor wrote:
 On 09/25/2009 02:40 PM, Ingo Klöcker wrote:
  0xF661F608 (This is _not_ one of my keys. Funny enough this Ingo
  Klöcker went to the same school and the same university as I did.)
 
  0x104B0FAF, 0x5706A4B4, 0xD96484AC, 0x7C52AC99, 0xAFA03822,
  0x91190EF9 (this last one is definitely still in use)

 ok, thanks, those are not expired, though i only see non-unicode in
 three of them:  104B0FAF and F661F608, and 91190EF9.

 Those keyholders should probably create a new User ID that *is*
 UTF-8, with the same e-mail address as the non-UTF-8 one, and
 encourage the people who have certified the old User ID to re-certify
 the new one. Once enough certifications are through on the new, valid
 one, they can revoke the old one and move forward with a fully
 OpenPGP-compliant key.

Yes, I suppose this would be a sensible solution.


  I don't see why harmless changes (see David's example) shouldn't be
  ignored. If the user hard-coded the key Alice1, then what's wrong
  with using this key as long as it's valid. Obviously, any changes
  making a hard-coded key invalid need to be escalated and such a key
  must not be used anymore by the MUA.

 If the user hard-coded a specific key (by fingerprint) to the Alice
 User ID, then of course GPG should respect that preference (and it
 should emit warnings if the key ever becomes invalid),  but i don't
 think that users should be asked to make permanent choices like this,
 since they might become invalidated by future circumstances; how will
 they know that another (maybe better) choice is available, or should
 be made?

If Alice does not tell them, then they might not know this. But I'm not 
sure whether this is a common problem or more an academic problem. 
Let's say Alice loses her first key and cannot revoke it because she 
didn't create a revocation certificate. She creates a new key, but Bob 
continues to use the old key. Unless Bob automatically imports unknown 
keys, he will notice that Alice now uses a different key because he 
cannot verify her signature anymore. And if Bob uses the old key to 
send an encrypted message to Alice, Alice will surely tell him what 
happened. So I don't really see the problem with a hardcoded choice.


  If for some email address multiple matching valid keys are found by
  KMail (or rather gpgme) then KMail asks the user which key(s) to
  use (and then remembers the user's choice). This transparency gives
  me a better feeling than some automagic behind-my-back key
  selection based on user ID/email address.

 I hear what you're saying, but i think there are two problems with
 it:

  0) for many users, they are being asked to make a choice that they
 don't understand; there are few things more frustrating than this. 
 If the tool *can* make a good choice based on the knowledge available
 to it, it shouldn't need to pester the user, who may or may not have
 as much understanding of the problem space.

I agree, but I also disagree. I agree that it's preferable to save the 
user from having to make a choice. But then again I disagree about 
the not have as much understanding of the problem space. People who 
do not understand to a certain degree how the WoT works would be better 
off using a centralized PKI. IMO this is a major weakness of the WoT.


  1) users are being asked to make an effectively permanent decision,
 even though relevant circumstances may change in the future.
 Presumably, this binding will produce warnings (with the option to
 change the binding) if the bound key suddenly actually drops into
 unknown calculated validity (for example, if you decide to revoke
 ownertrust on a relevant intermediary; has this been tested?)  But
 there might be other changes that make this selection suboptimal
 without causing it to throw warnings.

See above. I wonder how much of a real problem this is. How many people 
have multiple valid keys bound to the same email addresses? What is the 
use case for having multiple valid keys bound to the same addresses?

In the past, when I worked at the university, I used a private/home key 
and a work key. At home I could read anything. At work I could only 
read messages encrypted with my work key. So anything I was supposed to 
read at work needed to be encrypted with my work key. To make things 
more complicated my home key did have my work address as one user ID. 
So hardcoding my work address to my work key was basically mandatory.


Regards,
Ingo


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Export key to multiple servers

2009-09-29 Thread Paul R. Ramer
On Mon, 2009-09-28 at 09:46 -0700, kearney wrote: 
 I am trying to export a secret key created on my local box to multiple
 servers. Let's say the key is 12345678.
 
 The goal is to have 1 script which runs on all the servers to encrypt and 
 backup the data to S3. And 1 script to decrypt the data for restores.
 
 currently i've done
 
   gpg --output secret --export-secret-keys Real name
   gpg --output public --export Real name
 
 secret  public have been scp'd to the servers.
 
 From the servers I ran 
 
   gpg --import secret
   gpg --import public
 
 Now, when I try to encrypt the data
 
   gpg --recipient 12345678 --encrypt file
 
 I get 
 
  gpg: 12345678: There is no assurance this key belongs to the named user
  It is NOT certain that the key belongs to the person named in the user
 ID.  If you *really* know what you are doing, you may answer the next
 question with yes.
 
 I don't have a public key so I can't use gpg --sign-key. And if I do create
 a public key; can the same script be used to decrypt the files for
 restores across all the servers?
 
 How can I import the keys on the servers so the servers can encrypt data?
 And data can be decrypted using the key (12345678)?

You don't need a public key to suppress this warning.  The reason gpg is
warning about the validity of this key is that when gpg exports keys,
the ownertrust information, which is kept in ~/.gnupg/trustdb.gpg, isn't
exported with the key.  When you imported the keys onto your server, gpg
didn't import any ownertrust information.

If you created a signing key (we'll call it AABBCCDD) and signed your
key 12345678 with AABBCCDD, gpg wouldn't trust the signature unless it
trusted the owner of the key (ownertrust).  The answer lies in fixing
the ownertrust.

You need to edit the key with the following commands.

gpg --edit-key 12345678
trust

Gpg will ask how much trust to give.  Choose 5, which is ultimate,
because you own the secret key.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: choosing an encryption target from a User ID

2009-09-29 Thread Daniel Kahn Gillmor
Thanks for the discussion, Ingo!  This is really useful to me, and i
appreciate the thought you've obviously put in here.

On 09/29/2009 04:32 PM, Ingo Klöcker wrote:
 She creates a new key, but Bob 
 continues to use the old key. Unless Bob automatically imports unknown 
 keys, he will notice that Alice now uses a different key because he 
 cannot verify her signature anymore. And if Bob uses the old key to 
 send an encrypted message to Alice, Alice will surely tell him what 
 happened. 

will she?  will Alice know how to resolve the problem?  If she sends Bob
her new key, and Bob imports it, that would be great.  They've already
had to do some work manually.  Let's say that Bob even takes the time to
properly certify Alice's new key.  You're now asking Bob to take an
*additional* step of re-binding the new Key ID to the User ID -- why
would he need to do that, when he's already certified the key?

 I agree, but I also disagree. I agree that it's preferable to save the 
 user from having to make a choice. But then again I disagree about 
 the not have as much understanding of the problem space. People who 
 do not understand to a certain degree how the WoT works would be better 
 off using a centralized PKI. IMO this is a major weakness of the WoT.

if you're doing explicit, hard-coded keyID-to-UserID bindings, you're
not using the WoT.  You're using your bindings, perhaps with a smidgen
of the WoT to make sure that the key isn't totally invalid or revoked.

The way i'd like to see the WoT actually used is to get people to think
about two things which are well within the range of normal human activity:

 a) who can i identify?

 b) who can i rely on to identify others?

and then let reasonable, well-thought-out mechanisms draw the links for
the people automatically, without them having to think about it.

If the tools don't do the Right Thing by default, then we start to ask
users to think about a bunch of extra arcane ideas beyond a and b (ideas
that folks on this list have actually thought about in-depth).  Those
are tough to understand, and non-experts are justifiably confused by them.

This is why we need the tools to draw the right patterns by default, not
an argument to use hard-coded bindings or some centralized PKI that asks
the user to make none of these decisions at all.

 See above. I wonder how much of a real problem this is. How many people 
 have multiple valid keys bound to the same email addresses? What is the 
 use case for having multiple valid keys bound to the same addresses?

I agree that it's not currently a common situation.  here are the few
legitimate situations with multiple keys that i know of:

 * several people are going through key transitions right now, for the
same reasons that the defaults are changing in gpg.  These people often
have two keys for a period of time.

 * Some people also have old keys that they have accidentally lost
access to.  once that happens, it's too late.

But:

Malicious people can upload keys with arbitrary User IDs to public
keyservers; if a user fetches one of those from a search (perhaps to
check the validity of any attached signatures), it's still in their
keyring, possible before the valid key of the corresponding user.

If we say it's not a common situation, so we won't worry about extra
hassle; only a few people will have to deal with the hassle, but anyone
can inject material into the public keyservers that trigger the hassle
for anyone else, i think that's a problem, even if no one has chosen to
exploit it yet that we know of.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users