Re: No SSH public key authentication using smartcard

2023-11-25 Thread Bernd Naumann
On 25.11.23 13:24, Thomas Schneider via Gnupg-users wrote:
> Hello Stephan,
> 
> thanks for your reply.
> 
> When you say I should modify ~/.ssh/config, where is this file?
> On jumphost?
> 
> Actually I have a working setup on Windows 10, but here I use another
> terminal emulator: MobaXterm.
> And in the settings of MobaXterm I enabled SSH forwarding.
> 
> As of now I don't want to continue using MobaXterm on Windows 11, but
> using Windows Terminal.

Hey Stephan,

I can not answer where to find that file on windows, but the first hit
with google: https://stackoverflow.com/a/56536275

You can also set these options directly on the command line:
```
ssh -o IdentityAgent='%d/.gnupg/S.gpg-agent.ssh' -o
ProxyJump=jumpserver.example.net targethost.example.org
```

I'm not sure if you really have to set the IdentityAgent if your GPG and
SSH Agent Socket is setup correctly...

Do you see something with `ssh-add -L`? If yes, then you should not have
a need to set IdentityAgent for a Host. (Only if you have multiple
Agents or you have to specify it only for certain hosts etc etc but if
its your only Agent and you have no special requirements, then just
leave it out IF `ssh-add -L` shows you the key from your card.)

Good luck,
Bernd

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: get OpenPGP pubkeys authenticated using German personal ID

2023-07-13 Thread Bernd Naumann
/* I don't know how to reply to a previous thread, which predates my
joining on the list. That's why I'm starting a new one. */


I want to share my experience with that service, and have a general
question or two regarding the web-of-trust model.

First: I'm impressed. It (more or less) just works...
...with a GNU/Linux desktop. In Germany! ;) I would have not expected
that, to be honest.

(I have a german ID card (BPA) with the "ePA"-function enabled...)

On an Arch GNU/Linux PC, using Firefox, and with the AusweisApp2 via
flatpak, and an Android phone with the AusweisApp2 from the Google Play
Store, the "remote access" -- using the phone as an NFC card reader --
just worked without issues. IF you just follow the instructions and read
before you click... as always and often.

Procedure is easy and fast-forward:
start the AusweisApp2 on both devices; and start the remote access;
goto the website and start the process;
proof your identity with the ePA;
upload your key; select a uid;
get the mail.
Repeat if you have more the one uid...


Regarding the criticism from Andrew Gallagher on 1 Jun 2023, at 12:23:
> This is not best practice. Normally when email verification is being
performed, the gated action (such as certification, account creation
etc.) is not done until after a (time-bound!) challenge/response
succeeds. This places too much emphasis on verification of the
(non-unique) “real name” component of the UserID, and not enough on the
machine-readable email address.
>
> This opens up more fundamental questions about the meaning of
signatures over RFC822 UserIDs - do they validate the “real name”, the
email address, or some combination of the two? For example, an
email-validating CA may only check the email address part, treating the
“real name” as little more than a comment; while Governikus appear to be
doing it the other way around. It is of course up to the receiver to
decide how to interpret signatures, but it only compounds the problem
when not only is the signer’s trustworthiness in question, but also
their intent. How do you interpret the validity of a claim when it’s not
even clear what the claim is?


If a person, say "Max Mustermann", generates a PGP key with the uid "Max
Mustermann "; yes I assume Governikus would
still sign the key, because the Real Name corresponds,
but isn't this signature totally worthless? Because:
Max will probably never get the mail with the signature.
And Olaf has now the signed public key, but he is missing the secret
key. Or not? So is this really an /practical/ issue?
(I want to exclude I'm do not overseeing, or missing something out.)


Another related question:

If we can attest, that the ePA is somehow secure and can not be forged,
then the validation of the identity is pretty good, or not?
/* At least it's far better then a passport validation done by
unqualified personal. If I attend the cryptoparty at FOSDEM, I'm pretty
sure I would not be able to tell if this Italian or French passport is
real or not. */

And a last one:
Why shouldn't I give Governikus (864E 8B95 1ECF C04A F2BB  233E 5E5C
CCB4 A4BF 43D7) a trust-signature with a depth of 2, so I can trust
signatures they made? I have not found such info or recommendation on
their website, but the use-case is probably present?

And btw: Are their any *public* OpenPGP CAs out their?
(Not openpgp-ca.org which you can selfhost and stuff, but rather an
entity checking and validating Person/ID/Key and so forth...)


Thanks and greetings,
Bernd

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Failed to use GPG key for SSH

2023-07-12 Thread Bernd Naumann
On 12.07.23 05:28, Caleb Herbert wrote:
> [caleb@farnsworth ~]$ export SSH_AUTH_SOCK=$(gpgconf --list-dirs agent-
> ssh-socket)
> [caleb@farnsworth ~]$ gpgconf --launch gpg-agent
> [caleb@farnsworth ~]$ ssh-add -L
> The agent has no identities.
> 


Hi Caleb,
But you have the correct keygrip in `~/.gnupg/sshcontrol`?

(Don't nail me on details, but my impression was, that /sometimes/ a
kill on the gpg-agent is necessary, however `gpgconf --reload` should be
enough.)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Looking for keyserver software without any validation or fancy features

2023-07-07 Thread Bernd Naumann
On 07.07.23 12:21, Werner Koch wrote:

> https://www.gnupg.org/blog/20201018-gnupg-and-ldap.html

Thanks, I will have a look into it.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Looking for keyserver software without any validation or fancy features

2023-07-07 Thread Bernd Naumann
Hi *,

For a test setup / proof of concent / lab, I'm looking for a pretty
simple keyserver implementation.

I don't need any form of validation, web ui, etc.
At least I want to be able to disable send mail validation, federation,
web server, and what not.

I just want to be able to send and receive keys to/from a server.

All machines in this setup are running Debian 11 or 12.

hagrid and huckeypuck are total overkill, and at least hagrid is not
even /intended/ to be "self hosted".

I have seen https://github.com/SKS-Keyserver/sks-keyserver but still
have to check it out if it really suites my needs.

`gpg-wks-server` has to send and receive verification mails, right?
I would like to avoid having to configure a mail-server and mail-clients.

Are there any other options?
I would like to not take `cp` and `scp` as an option, I'm doing this
already...

Thanks.
Bernd

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users