Smartcard With Pin Pad Better Security?
I understand that a smartcard is more secure to keep my key from ever coming off the card itself. I like the idea of getting one with a pin pad to lower my attack surface sense as long as my pinpad is not compromised I should be golden right? All the pin pads I've seen dont have many possible buttons it looks like all numbers. Even with a strong password is it seems it would be easy if I could only use pin of 0-9 right? Couldnt that be brute forced quick assuming they could get my smartcard? Or am I missing something and theres an mode that letters it do alphabets and such? Some I saw were pc, some were class 1, class 2, class 3. Which of these is the most secure? http://www.cryptoshop.com/index.php Should I get one from here or another shop? I want one that will work in windows and ubuntu and will work with OpenPGP smartcards. Any recommendations on this? Also do OpenPGP smartcards support the new ECC key systems in beta? Sorry for wall of text, thank you. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Help with error please
Just installed GPA/Kleopatra. Whenever I start up GPA I get 3 windows pop-up: 1. "GnuPG is rebuilding the trust database. This might take a few seconds." 2. "The GPGME library returned an unexpected error at keytable.c:150. The error was: Provided object is too short This is either an installation problem or a bug in GPA. GPA will now try to recover from this error." 3. A dialog box saying I don't have a private key yet and giving me option to generate one now. I've re-installed and tried creating keys but nothing seems to work. Any help would be greatly appreciated! ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
For Windows
Hello. I use Enigmail, so of course I have GnuPG installed. I use 1.4.9 because [1] I can not find an executable for 2.0.17 for Windows, and [2] I do not know how to configure the GPG-agent. Can somebody please assist me with upgrading to 2.0.17 and configuring the agent? For about a week I have been searching everywhere but found nothing. I did install GPG4WIN then uninstalled it because I could not figure out how to use the agent and the GPA utility is not screen reader accessible. Thanks in advance for your help. PS. I am blind and use a screen reader. Everything must be 100% keyboard accessible. -- CONFIDENTIALITY NOTICE: This e-mail transmission, and any documents, files or previous e-mail messages attached to it may contain confidential information that is legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify the sender, and please destroy the original transmission and its attachments without reading or saving in any manner. Thank you. 0x4B22824D.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
RSA Versus DSA and EL GAMAL
I apologise in advance if this is a stupid question to ask now or if people already asked it before I stepped on the scene, but which algorithm is more secure: DSA and EL GAMAL or RSA? I know the latter has undergone a ridiculous amount of scrutiny and is immensely popular. I also know it generates longer keys. I have a 4096 RSA key but really never found the answer whilst searching beforehand which one to choose. I know 4096 is much better than 2048, so I can not figure out why Enigmail defaults to a 2048 instead of 4096 but whatever. I am not concerned about speed; I will gladly sacrifice speed for security any day. As always, thanks for the future lessons. -- CONFIDENTIALITY NOTICE: This e-mail transmission, and any documents, files or previous e-mail messages attached to it may contain confidential information that is legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify the sender, and please destroy the original transmission and its attachments without reading or saving in any manner. Thank you. 0x4B22824D.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: For Windows
I use a screen reader called JAWS For Windows. The GUI is not screen reader accessible, meaning I can not use the Arrow keys, Tab, Shift+Tab and any other navigational keys to use the GPA utility like you can with the mouse. I really hate that; people have no idea how much it annoys me. I might write to the GPG4WIN developers if I can track down their information. The command-line utility of GnuPG is more verbose than that. On 14/03/2011 03:56 AM, Werner Koch wrote: On Sat, 12 Mar 2011 01:40, k...@grant-olson.net said: - GPG4WIN is the right package to install gpg2 on windows, so you've got the right installer. It's a shame GPA doesn't work with a screen reader. What is the problem with GPA? It is a plain gtk+ application and thus should have the same features and problems as other gtk+ applications. Salam-Shalom, Werner 0x4B22824D.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: For Windows
I think I made the mistake of using HTML format the first time then learnt my signature failed to validate. I realised it was because of the HTML check box being checked; thus, I have disabled that. I have also disabled the text signature for replies. On 14/03/2011 02:24 AM, Remco Rijnders wrote: On Mon, Mar 14, 2011 at 09:06:20AM +1100, Ben McGinnes wrote: Although I've received other email from the OP that did not include the footer, so now I'm curious to know where it came from, especially since he is using the GMail MX servers. Hi Ben, I exchanged a few emails off list with the OP as well, and that led us to conclude that most likely the original mail also included a HTML-part (scrubbed off by the mailing list?) which caused the signature to fail. The legal mumbo jumbo disclaimer was added by the MUA and not the MTA, so I imagine enigmail properly signed the footer and my original assumption that the MTA was to blame was incorrect. Cheers, Remco ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users 0x4B22824D.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyservers
The attached .asc file causes problems? I have disabled that but still enabled the header. Why would the .asc attachment option be there if it causes problems? On 20/03/2011 01:28 PM, Ingo Klöcker wrote: On Sunday 20 March 2011, Charly Avital wrote: Ingo Klöcker wrote the following on 3/20/11 11:43 AM: I doubt this very much because the encoding surely happens before the signing. Regards, Ingo In my post, I also indicated that there was a string --=20 between the actual text and the signature disclaimer CONFIDENTIALITY NOTICE: This e-mail Well, that's the standard signature separator: 2 dashes followed by a space. To preserve this trailing space Thunderbird/enigmail does the right thing and encodes it. After Jonathan disabled that signature add-on, his signed messages verified. Yeah, well. Even though Jonathan disabled the signature his message is still quoted-printable encoded. As are my messages. So, quoted-printable encoding does not seem to be the problem. Also, Jonathan's message Re: what are the sub keys does not have a signature. Still the signature is broken. What the two messages with broken signatures seem to have in common is the attached key. Maybe that's what is causing the problems. Regards, Ingo ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyservers
Firstly, what is MUA? I hear that but am not sure what that means. Secondly, I have disabled that in Thunderbird. I had no idea it modified anything; I thought it was simply a text signature that did not interfere with Enigmail and GnuPG. Thanks for enabling me to understand the complication there. On 20/03/2011 02:38 PM, Ben McGinnes wrote: On 21/03/11 5:11 AM, Jonathan Ely wrote: The attached .asc file causes problems? I have disabled that but still enabled the header. Why would the .asc attachment option be there if it causes problems? The .asc file is the GPG signature and does not cause problems. The signature that is referred to is the confidentiality notice that is appended to your email. Presumably it is appended by your MUA or GMail *after* the rest of your message is signed and thus the bad signature message indicates your email has been modified (which it has, by a disclaimer which everyone will ignore and not feel bound by). Regards, Ben ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyservers
I do not use the Gmail interface any more; I only use the Thunderbird client and typed the signature in the edit field found in the Tools | Account options | General dialogue. It always appears in the body, right under the point where I type. If this is the case it should not interfere with Enigmail or GnuPG, correct? PS. I learnt my lesson about including any signature for a mailing list. On 20/03/2011 03:35 PM, Ben McGinnes wrote: On 21/03/11 6:11 AM, Jonathan Ely wrote: Firstly, what is MUA? I hear that but am not sure what that means. MUA = Mail User Agent, e.g. Thunderbird, Outlook, Apple Mail, etc. MTA = Mail Transfer Agent, e.g. Sendmail, Postfix, Exchange, etc. Secondly, I have disabled that in Thunderbird. I had no idea it modified anything; I thought it was simply a text signature that did not interfere with Enigmail and GnuPG. Thanks for enabling me to understand the complication there. If a signature is inserted before the message is signed then it will be included as part of the message body and will be part of the signed content. This means it won't break the signature. If it is inserted as the message is being sent, but after the message is signed then it will generate the error seen on the list. To be sure that a text signature is appended without interfering with the digital signature, it should appear in the body of the message when you edit it. Thunderbird is quite capable of doing this (I have one, but don't normally include it when posting to lists). Regards, Ben ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyservers
Really? For me, it is much easier to access the newest reply instead of using the Down Arrow key to find it. Gmail always worked the same way for me. On 20/03/2011 04:44 PM, Ingo Klöcker wrote: On Sunday 20 March 2011, Jonathan Ely wrote: On 20/03/2011 03:35 PM, Ben McGinnes wrote: To be sure that a text signature is appended without interfering with the digital signature, it should appear in the body of the message when you edit it. Thunderbird is quite capable of doing this (I have one, but don't normally include it when posting to lists). I do not use the Gmail interface any more; I only use the Thunderbird client and typed the signature in the edit field found in the Tools | Account options | General dialogue. It always appears in the body, right under the point where I type. If this is the case it should not interfere with Enigmail or GnuPG, correct? PS. I learnt my lesson about including any signature for a mailing list. The next thing you might want to learn is not to top-post (i.e. write the reply above of the full quote of the message one replies to). Top- posting is very common in corporate email exchange but it is uncommon on many mailing lists (including this one). Regards, Ingo ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyservers
Something to think about that one. I guess I will experiment in the future, but I understand what you mean and you do have a point with the question answer order rather than the reverse. Now I understand why Thunderbird has that option. On 20/03/2011 05:35 PM, Grant Olson wrote: On 03/20/2011 05:16 PM, Jonathan Ely wrote: Really? For me, it is much easier to access the newest reply instead of using the Down Arrow key to find it. Gmail always worked the same way for me. Ingo's talking about the body of the message. Most mailing lists people reply after the question, so it's in context when you find a thread later, instead of before, at the top of the message. Arguably, when reading a message out of context, it's easier when most people see: QUESTION: What is the secret to life, the universe and everything? ANSWER: 42 Rather than: ANSWER: 42 QUESTION: What is the secret to life, the universe and everything? Which is what happens when you 'top-post' your answer at the top of the message. If it's hard to do compose an interleaved reply with your screen-reader, that's fine, but you will get people complaining about it every now and then. If it's easy, you probably want do to reply after people's comments, in context, instead of before, when you're on mailing lists. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: what are the sub keys
Exactly. Computation time is nothing nowadays. If that was the case, those who use 1024 bit keys I would think still use the SHA1 hash algorithm. But now people such as myself use SHA512 and 4096 bit RSA keys, and if I could use a 8192 bit RSA key and the new SHA512/256 algorithm that I think was published just this past 02 February I would. On 22/03/2011 10:19 AM, lists.gn...@mephisto.fastmail.net wrote: On Sat, Mar 19, 2011 at 11:36:57PM -0400 Also sprach Robert J. Hansen: On 3/19/11 10:34 PM, Jonathan Ely wrote: but be sure to set your preferences and choose a 4096 over 2048. Why? This is like saying, I like the bank vault on my front door, but I wish it was thicker: I want the extra security. Key length is only a small part (arguably the smallest part) of communications security. I agree that 4096 may seem like overkill, but I think the recommendation to max out one's RSA key size is defensible. Here's why: 1. Modern computers are fast; it costs us almost nothing in terms of computation time to use a 4096-bit key. 2. Modern computers are fast, and getting faster all the time; remember that your security margin may need to be good not just today, but against all the attacks that are possible in the future, for as long as your data needs to remain secure (decades, for some people). Once upon a time, 1024-bit keys were considered perfectly adequate; most experts urge against generating keys today with that strength. I agree that an awful lot of fuss is made over key length, sometimes to the exclusion of other, much more likely attack vectors. However, until someone describes for me a compelling reason NOT to bump key length up to 4096, my view remains: Why not? Special case, relating to this thread's original question: Some software which is designed to interface with GnuPG, or otherwise implement PGP keys, may not support arbitrary key lengths. E.G. Evolution used to have a 160-bit hash hard-coded into it's gnupg integration (it may still--I haven't used Evolution in a while), which meant that to remain DSS-compliant, you could only sign email with a 1024-bit DSA key. DSA-2 keys could not be supported directly by Evolution. You could circumvent the key-stregth limit by using an RSA key as long as you liked. However, in cases when a particular piece of software may require use of a key which does not meet your general-use criteria, for whatever reason, generating a sub-key which meets the requirements can allow you to use the specific feature you need, while still enabling you to use other sub-keys for less restrictive applications. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: what are the sub keys
Would not it be 4096 with RSA, or is DSA in conjunction with a 4096 bit key still popular? I have never used DSA so does what Robert said pertaining to my used combination apply here? On 22/03/2011 12:13 PM, Jerome Baum wrote: Robert J. Hansen r...@sixdemonbag.org writes: And this is where I part ways with you. There is no reason not to bump key length up to 4096. There is also no reason not to use SHA512 with a DSA-1k key, for instance. Sure, only 160 bits of SHA512 will be used, but that's not a reason not to use it. It's not as if you're making the system weaker. Correct me if I'm wrong on this one, but it does make your key weaker, right? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: what are the sub keys
Enigmail allows only 1024, 2048 and 4096. I have never heard of that, but even still I would personally choose the largest key for the time being till RSA becomes obsolete. Is there anything larger than 4096 since you mentioned values unknown to me? On 22/03/2011 05:17 PM, MFPA wrote: Hi On Tuesday 22 March 2011 at 7:43:23 PM, in mid:20110322194323.ga1...@imac-6g2p.mgh.harvard.edu, lists.gn...@mephisto.fastmail.net wrote: There is a greater margin of security in a 4096-bit key over a 2048-bit key (all other factors being equal) Is there any particular reason to jump from 2048 to 4096 rather than use an intermediate value? 3072 maybe? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 4096 bit keys
I really wish 8192 would become available. Not that it would be the end all/be all of key security but according to your theory it sounds much more difficult to crack. On 22/03/2011 05:14 PM, Mike Acker wrote: with chip makers playing with chips having 64 cores printed in silicon... someplace i read the ratios on this,-- if you make the key a little longer the key gets much harder to break. in public key encryption though you have to factor the product of the two large prime numbers -- which i'm told is no easy task. i've often wondered about this as lists of large prime numbers are not hard to come by... so-- start someplace and start running divides... trouble is though you can't use the hardware instruction set: the numbers are way to large what does an x64 chip do? divide a 64 bit integer into a 128 bit dividend to yield a 64 but quotient and a 64 bit remainder? dunno but you have to do the same thing but using what? a 2048 or 4096 bit dividend? (I'm not a mathematician) what if they put 8192 cores on a chip? who would have such a machine? NSA. the smart money would bet they would have it ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: 4096 bit keys
What is ECC? Now I want that haha. On 22/03/2011 06:53 PM, Grant Olson wrote: On 03/22/2011 06:06 PM, Jonathan Ely wrote: I really wish 8192 would become available. Not that it would be the end all/be all of key security but according to your theory it sounds much more difficult to crack. The actual cutting edge solution is to move from RSA to ECC. Even a 8192 bit or 16k bit RSA key isn't approved by the NSA or NIST for TOP SECRET materials, but ECC-521 is. ECC actually is up-and-running in the beta for gpg 2.1, but realistically it'll be (at least) a few years before it gets mainstream adoption. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: what are the sub keys
Well excuse me for not knowing it all. I only know what Enigmail allows through its user interface, and bad judgement is sometimes a method of learning for better decision making. I have only begun using both GnuPG and Enigmail this month along with Thunderbird, and this list educated me a lot since I have been subscribed. Anything else you would like to point out? I apologise if I come off mean in any way. On 23/03/2011 04:55 PM, Ingo Klöcker wrote: On Tuesday 22 March 2011, Jonathan Ely wrote: Enigmail allows only 1024, 2048 and 4096. I have never heard of that, but even still I would personally choose the largest key for the time being till RSA becomes obsolete. Is there anything larger than 4096 since you mentioned values unknown to me? Let's see. There's 4097, 4098 and even 4099. And then there's 4100. ;-p IMHO all those discussions about key sizes are really pathetic. Stick with the defaults or educate yourself by reading the appropriate literature instead of starting one non-sensical discussion after the other on this mailing list. It should be rather obvious by now that key sizes above 2048 are mostly a matter of personal taste and bad judgement. Regards, Ingo ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Hi
The first spammer I have seen thus far. Did not know they existed here. On 31/03/2011 10:27 AM, Lee Elcocks wrote: hi it's in your best interests to start this right away http://bit.ly/gntBne ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Hi
I did not understand what that menat anyway. I never click links that seem anonymous so I am safe, but that was unusual. On 31/03/2011 08:41 PM, Robert J. Hansen wrote: On 3/31/11 7:25 PM, Jerry wrote: Dumping [something] would have been my first choice. Let's be a little careful about our language. Thanks. :) ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: windows front end to GnuPG
Have you ever thought about GPG4WIN? It is not accessible for me since I use a screen reader and because of that I think the graphical user interface needs some serious work, but I hear it works well for others. On 17/04/2011 08:45 PM, Felipe Alvarez wrote: I've currently begun getting everyone in the office using GnuPG on windows. We're using WinPT as the front end. However there are several deficiencies with this program that we have encountered. Further, it is no longer being developed (last version 1.4.3 release sept 2009). Are there any other windows front ends that are easy to use, WRT single file en/de/cryption? The main requirements would possibly include: - sits on the task tray - low mem footprint - still in development -- Felipe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: windows front end to GnuPG
The only thing I use is the Enigmail extension for Mozilla Thunderbird which works well enough for me, but of course I must use the version 1 branch of GnuPG. On 17/04/2011 08:57 PM, Felipe Alvarez wrote: Have you ever thought about GPG4WIN? Looks a bit 'heavy' (fancy GUI and a bunch of programs I know that I will not be using) but I'll give it a try. Felipe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: windows front end to GnuPG
So their is an installer for Windows for version 2.x? I never found one accept for that of GPG4WIN. On 17/04/2011 09:08 PM, Doug Barton wrote: On 04/17/2011 18:00, Jonathan Ely wrote: The only thing I use is the Enigmail extension for Mozilla Thunderbird which works well enough for me, but of course I must use the version 1 branch of GnuPG. There is nothing about enigmail that requires gnupg 1. I use it with gnupg2 without any problems on windows and FreeBSD. Doug signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: windows front end to GnuPG
Version 1.4.11 is still the latest of that branch, right? That is what the download page says but some times there are later versions than what is reported. Media Player Classic is a good example of this. On 17/04/2011 09:32 PM, Faramir wrote: El 17-04-2011 22:18, Jonathan Ely escribió: So their is an installer for Windows for version 2.x? I never found one accept for that of GPG4WIN. AFAIK, GPG4win is the only package for GPG 2.x for windows. But you can chose which apps to install. However, there are a few that are required to run GPG 2.x. I don't remember which ones, since I'm still a happy user of GPG 1.x Best Regards ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: It Is Gone
Thanks. I should have known better to ask before I copied an FTP's link location from the page. They made it a bit more difficult for me since they no longer link it directly but as long as the FTP server is still in existence I should be able to find it. On 19/07/2011 07:37 PM, Robert J. Hansen wrote: On 7/19/11 5:24 PM, Jonathan Ely wrote: Can somebody please link to or refer me to the site that contains the latest version 1 of GnuPG? Thanks. ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.11.exe Enjoy! ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users 0xDA74EEF3.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Open Password Protected ZIP File
I strongly suggest Ultimate ZIP Cracker at vdgsoftware.com/uzc.html if I recall correctly. It is undoubtedly the most complete and promising software I have ever used and trust me when I say I have used many of the kind. Beware that it is resource intensive if you configure it as such. On 14/08/2011 01:19 AM, Jean-Philippe Charpentier wrote: Does anybody know how to open a ZIP file, password protected? I forgot the password. Google brings me to various password attack tools - any recommendation? Thanx, JPC ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users 0xDA74EEF3.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Location of GnuPG 1.4.11 Windows binary
You must have missed my enquiry from some time in July. I was looking for it as well only to copy the link location of one of the FTP links and do some self-searching. It would be useful if they announce 1.x.x upgrades so people will not have to randomly decide when to check the directory for an upgrade. I installed GPG4WIN and uninstalled it because it was just too much for me and the 1.x.x branch is more simple for me anyway since I only need it for the Enigmail extension. On 21/08/2011 10:54 PM, Mark Rousell wrote: I just thought the following might be helpful for Windows users of GnuPG 1.x. I had been running 1.4.10 on Windows for some time and I thought it was time I checked for an upgrade so I visited http://www.gnupg.org/download/ to see if there was a new version. I found that 1.4.11 was available but that the binary download links had disappeared! The only reference to Windows binaries is now via Gpg4win but that project only provides Windows binaries of 2.x and not 1.x. Happily however I found that the traditional standalone Windows binary installer is still in available via FTP. It's simply not linked from the GnuPG website as far as I can see. Here's the link: ftp://ftp.gnupg.org/gcrypt/binary/ Thank goodness for that. If anyone from GnuPG is reading this, please don't stop building (and providing links to) Windows binaries for GnuPG 1.x. I'm sure I can't be the only user of it. :-) I'm sure it wouldn't be the end of the world for me to learn how to compile it for Windows but I know that the GnuPG developers will probably do a better job of it than me. ;-) ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users 0xDA74EEF3.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: supersede key on key-server
I was wondering something similar. I have a few keys which I have invalidated and disabled but there is no way to delete them. I am using this new key which I have not uploaded because if something happens and I must re-create the key that will too become just clutter on the server. On 22/08/2011 10:39 AM, Mike Acker wrote: some of us use more than one email address. with GPG it is simple to add a secondary ID to a key and this seems to work quite well. when a change like this is made it is desirable to update the keyserver. what happens when you re-upload a key to the keyserver? I hate to think the keyserver gets loaded up with old junk keys no one want used anymore... 0xDA74EEF3.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: windows binary for gnupg 1.4.11 // link no longer on gnupg site?
It is no longer shown but it is available at ftp.gnupg.org/gnupg/binaries or something of the sort. Copy one of the link locations that link to the source code and modify that path in the location bar. It is inconvenient no doubt but it works. I hope there will be updates to the 1.x branch because I use it with Enigmail and have no use for the PGP agent that I read is mandatory in the 2.x branch. On 13/09/2011 10:41 AM, ved...@nym.hush.com wrote: On the gnupg download site, http://gnupg.org/download/ There is no link for a windows binary for 1.4.11, only a link to the gpg4win site (a GREAT site and program, btw, but only for gnupg 2.x). Is there going to be a a windows binary for future builds of the gnupg 1.x branch? (I'm interested primarily in order to update Maxine Brandt's Torduninja site that I recreated, as no one had access to her old site after she passed on) http://www.angelfire.com/mb2/mbgpg2go/tp.html Thanks, vedaal ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users -- Brotha J. 0xDA74EEF3.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Looking for 3G smartphone partner and cooperator
On 28/09/2011 07:46 AM, Bolin qu wrote: Hello,my friend: How are you recently? i hope everything is very well with you now. This is your friend_bolin worked in 3G T-smart communications factory as a sales man and tooling manager, Our company has many years experience in providing the brand owners and wholesalers all over the world with professional products and OEM, ODM services.and we're the strategic partner with China Mobile. Attached is our newest product presentation for you reference. if any style meets your interest,please don't hesitate to contact me! BRS! -- Bolin qu,Oversea sales and tooling manager T-smart communications equipment Co.,LTD.(China mobile Partner) Add:B-D,8 Floor,Hanjing International building,Nanshan District,Shenzhen City,PRC MP:+86 13602649836 skype:bolin.qu Email: slsimon...@gmail.com or bolinqud...@live.cn TEL:0755-83534040/25315393 FAX:0755-83584225 ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users Nothing but a spammer. Get off the list or whomever controls the list should ban this fool for good. -- Brotha J. 0xDA74EEF3.asc Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Shouldn't keyservers store and provide subkeys?
[I'm guessing the original mail was on gnupg-users; I'm not on that list though I do read pgp-keyserver-folk.] On Thu, Mar 24, 2005 at 04:44:49PM -0500, Jason Harris wrote: On Thu, Mar 24, 2005 at 04:20:02PM -0500, David Shaw wrote: I'm all for it. It would be nice to point people to a keyserver set that works properly with everything: multiple subkeys, photo IDs, and MR output. At the moment, this is just SKS servers. onak should handle all of these; if anyone has examples of keys that it doesn't deal with then please do let me know the details. I appreciate that the.earth.li [wwwkeys.uk.pgp.net] is probably the only public keyserver running the code, but I do try to react to any bug reports I receive. It can be found at: http://www.earth.li/projectpurple/progs/onak.html which also has details of the arch repository. J. -- 101 things you can't have too much of : 41 - Tea. This .sig brought to you by the letter E and the number 3 Product of the Republic of HuggieTag pgpF08vQs36S3.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
preferred compression types with multiple recipients
Good day everyone, How does gpg reconcile conflicting preferred compression types? I've switched mine to bzip2 to save space, but it occurs to me that it may not be of much effect until a significant number of other people I communicate with also switch from zlib. My understanding of encrypted mail to multiple recipients is that * a session key is generated * the message is encrypted symmetrically with the session key * the session key is encrypted asymmetrically with each recipient's public key. It seems that a message is only compressed once. Thanks, Jonathan PGP.sig Description: This is a digitally signed message part ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: SHA2 compatibility
This is a true statement, but not relevant to your question. I was discussing DSA keys, and you're asking about RSA. You can use any hash with RSA that you like. There are no restrictions in size or otherwise. The only thing you have to worry about is whether your recipient can handle that hash or not. Interestingly, my OpenPGP smartcard (1024-bit RSA key) refuses to sign anything that's not 160 bits (i.e. SHA1 and RIPEMD-160 only). Is there any reason for this, or is this a bug? Regards, Jonathan Rockway signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How to verify the file was successfully encrypted...
There is no way to design such a self-check. This isn't a lack in GnuPG, but a design impossibility for any program. Think about it: a check mode would try and account for a bug in GnuPG and warn you that the file was not encrypted properly. However, if you're presuming a bug, then who says you should trust the check mode? If GnuPG completes successfully, that means it succeeded. If you want more assurance than that, the only way to do it is to decrypt the file and compare. If you wanted to be really sure that GPG didn't mess something else, try decrypting it with some other OpenPGP implementation. If you're using perl, use Crypt::OpenPGP. (And Text::Diff to do your diff, and File::Slurp to read in the files for Text::Diff :) BTW, why are you encrypting these files anyway? If someone broke into your computer they could just steal the crypto key too. Regards, Jonathan Rockway ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: [Fwd: perl EUID change causing failure]
Might I suggest using a pre-implemented perl solution? Crypt::OpenPGP: http://search.cpan.org/~btrott/Crypt-OpenPGP-1.03/lib/Crypt/OpenPGP.pm GnuPG::Interface: http://search.cpan.org/~ftobin/GnuPG-Interface-0.33/ And also, GPG, Mail::GPG, Crypt::GPG, or Mail::GnuPG. http://search.cpan.org/search?query=gpgmode=all In other words, other people have already worked out the details, so why not try one of those modules before fighting with something that's not really worth your time? Regards, Jonathan Rockway Marcel Chastain - Security Administration wrote: I have a perl wrapper around gpg for use within a web app. It changes its 'EUID' (Effective UserID) early in the script. From there, it attempts to run /usr/local/bin/gpg --list-public-keys My test script: #!/usr/bin/perl $ENV{'GNUPGHOME'} = '/home/username/.gnupg'; my $uid = getpwnam(username); $ = $uid; print `/usr/local/bin/gpg --list-public-keys`; The output: gpg: O j: ... this is a bug (gpg.c:1880:main) secmem usage: 0/0 bytes in 0/0 blocks of pool 0/32768 (replace the word 'username' with a user on your system for testing purposes) Now, this *only* happens when setting the EUID. I can set the RealUID($) and things work perfectly. Does this have something to do with the code updates mentioned in the What's New section..? ( http://lists.gnupg.org/pipermail/gnupg-announce/2006q2/000226.html ) User IDs are now capped at 2048 bytes. This avoids a memory allocation attack (see CVE-2006-3082). Running gnupg 1.4.4 compiled from ports, freebsd 4.11-STABLE . Subject: perl EUID change causing failure From: Marcel Chastain - Security Administration [EMAIL PROTECTED] Date: Wed, 26 Jul 2006 16:26:48 -0700 To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] I have a perl wrapper around gpg for use within our company's internal control panel. It changes its 'EUID' (Effective UserID) early in the script. From there, it attempts to run /usr/local/bin/gpg --list-public-keys My test script: #!/usr/bin/perl $ENV{'GNUPGHOME'} = '/home/username/.gnupg'; my $uid = getpwnam(username); $ = $uid; print `/usr/local/bin/gpg --list-public-keys`; The output: gpg: O j: ... this is a bug (gpg.c:1880:main) secmem usage: 0/0 bytes in 0/0 blocks of pool 0/32768 (replace the word 'username' with a user on your system for testing purposes) Now, this *only* happens when setting the EUID. I can set the RealUID and things work perfectly. Running gnupg 1.4.4 compiled from ports, freebsd 4.11-STABLE . ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: AES 256 bit key generation
AES is a symmetric cypher, so you can use anything you want as the key, although I'm pretty sure that you must never use the same key to encrypt two different messages. (See Initialization Vector. I know this is required for stream cyphers like RC4, but I'm not sure about block cyphers like AES.) If anything, using a different key every time ensures that two identical messages encrypt to different cyphertexts, which is a good thing. Also be sure to read up on ECB / CBC. You should probably look this up in the AES section of Applied Cryptography before you deploy any code, though. Regards, Jonathan Rockway I want to create as AEs key of size 256 bits.is there any function in libgcrypt to generate AES key ? Now i am using libgcrypt random number generation to create an AES key .is this correct ? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Don't store your key on a flash drive! [was Re: GnuPG (GPG) Problem]
I would recommend that you don't do that. What if you lose the drive? Then your private key is compromised. Do you have a revocation certificate in a safe location? If not, you can't even tell anyone that your private key has been compromised! Not good! The OpenPGP smartcard is a much safer option, since it will not give up the private key (even if you have the password), and will lock itself after 3 incorrect password attempts. (And after 3 incorrect Admin PIN attempts, it will destroy itself, which is pretty inconvenient for someone trying to steal your key.) Compare this to a pen drive that will let anyone copy off the secret key and guess the passphrase on their friendly local supercomputer cluster. The other advantage is that if your card gets stolen, you *know* that it's been stolen. If you have your key lying around in your homedir somewhere, someone could just make a copy of it, and you'd never know. With the OpenPGP card, if it's not in your hand, you can consider it stolen. For $20, you can't go wrong. Get an OpenPGP card and be happy :) http://www.kernelconcepts.de/products/security-en.shtml Regards, Jonathan Rockway Ismael Valladolid Torres wrote: John Clizbe escribe: Just copy the keyring files. I store my private keyring and a public keyring containing only my public key on a pendrive, then in your gpg.conf: keyring /path/to/pendrive/pubring.gpg secret-keyring /path/to/pendrive/secring.gpg Using several different computers it works like a charm. Cordially, Ismael signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Don't store your key on a flash drive! [was Re: GnuPG (GPG) Problem]
I am a smartcard programmer. Sure an OpenPGP card is just a standard smartcard with special elementary files in its filesystem. Could I make my own OpenPGP card from a common smartcard given I know its administrative codes? Yup, that's what the Open in OpenPGP Smartcard means :) I'm not a smartcard programmer, so I bought one instead. If you'd like to make OpenPGP smartcards and sell them, that would be great! Regards, Jonathan Rockway ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Crypto Stick vs Smart Card Reader /w Pin Pad
Is the crypto stick which is fully open source and open hardware more secure than a Gemalto smart card reader with pin pad built in? Which of these would make you more of a hard target and increase security. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 17:00 schrieb Ville Määttä mailing-li...@asatiifm.net: Upstream still does have the issue which now seems to have been fixed in the fork but in a binary removed from upstream… I really can not confirm this. I am running vanilla GnuPG 2.1.2 (built from source) on Yosemite (10.10.2 to be exact) with a Gnuk without any problems. In any case, I agree about the part that such fixes should be developed in the GnuPG repo and not in basically a fork that receives less reviewing. I think the GUI tooling of not only Mac but other *NIX systems to be quite an important factor in getting wider use for encryption. Such tools must be from a respectable source and properly implemented just as much as the underlying engine. I would argue GnuPG should take the responsibility of such tooling where there isn’t a good option. Other *NIX systems are doing fairly well already so I suppose a Mac GUI would really be the urgent one. I suppose it might be a good idea to have a Qt GUI. That looks native enough on Mac so that most users won't complain, works good on X11 or Wayland based systems and also works well on Windows. Ideally, this would be a project under the GnuPG umbrella, but ideally not taking away time from core developers and thus be done by others. It also is not that security critical if it's just a GUI using the command line tool. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 14:31 schrieb Werner Koch w...@gnupg.org: GnuPG's speedo build system also downloads stuff via the Makefile but it verifies the checksums before proceeding. The checksums are taken from a public file which has a detached signature and the public key for that is one of the GnuPG release signing keys. While this is much better from a security point of view, it still means that building needs an internet connection. It would be nice to be able to build it on an air-gapped machine, which I guess is quite a common use case for GnuPG. To be fair, though, I never noticed that until you mentioned it :). -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 14:22 schrieb Werner Koch w...@gnupg.org: I do not think that it matters whether you pull using the git or the ssh protocol. In both cases an active attacker can intercept the traffic easily. Virtually nobody checks ssh host keys and how should they do it given that I can't find its fingerprint easily on github. Thus you would only see the host key changed warning in case this is not the first time you connected to this github project (I assume they use different host keys per project). I do verify the fingerprint, and they are quite easy to find actually: https://help.github.com/articles/what-are-github-s-ssh-key-fingerprints/ First Google match for GitHub SSH fingerprint. After all it is not different from downloading tarballs - only 10 to 20% of all downloads also download the signature file and for most projects there is no signature file. Well, I guess you have to take into account that a lot of downloads are from packaging software like pkgsrc, FreeBSD ports, Gentoo portage, ArchLinux's makepkg, etc. Usually, these do download the signature and tarball once, verify it and then write a checksum to the Makefile / PKGBUILD / however it is called that is then verified. So I guess you can't easily map that to Only x% of users check the downloaded tarball. I guess it's a lot more, it's just not all check it using the .sig. For gnupg.org we assume that users of the repos closely watch out for conflicts and verify the latest release tag. If there is a problem that should be reported to a mailing-list (after verification that it is really a conflict). git meanwhile allows to sign commits. If anyone knows a method to set a different key for tagging and commits, I would soon start to sign each commit. I use a smartcard based key for tagging but won't use that for regular commits. git commit -S keyID You can just create an alias for that, I for example use git ci. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 14:58 schrieb Sandeep Murthy s.mur...@mykolab.com: FYI I think you haven’t really looked at the support forum. This page http://support.gpgtools.org/kb/faq/found-an-issue clearly lists instructions for submitting a bug. They are always interested in reproducible issues, and every week in the discussions such issues are reported. Therefore it is not true that this support forum does not allow people to report bugs. I looked for this a month ago and couldn't find anything besides a support forum (didn't sound right to me) and a Twitter handle, thus I decided to try Twitter. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 20:16 schrieb Juergen Fenn schneeschme...@googlemail.com: Enigmail has discussed recently to drop support for GnuPG1, making gpg-agent/pinentry a crucial issue on the Mac. The standard version of pinentry from MacPorts does not work properly out of the box. For homebrew, there's a pinentry-mac formula, which unfortunately also does the remote code execution. I raised the issue with homebrew, however, most posts in that ticket were deleted because some people started questioning the review process of new formula and asked how this could even have gotten into homebrew. The solution I chose is an ugly, but more secure one: I use pinentry-gtk with XDarwin. Sure it's ugly, even more so since it is upscaled on a retina display. But it's only for entering the PIN / passphrase, so I'd rather use that then pinentry-mac. I did not choose pinentry-curses because that didn't work well with signing Git commits. Anyway, alternatives should be mentioned on the GnuPG pages because—I agree to the OP—this is too important an issue, GnuPG also being used by many people who seriously depend on its security. I totally agree. There should at least be a big fat warning, saying to not use if it you really depend on security. The question is, can we use GnuPG on the Mac and rely on it? I'd say yes. I'm using GnuPG 2.1.2 vanilla with a Gnuk token and don't see why it should be any less reliable than on Linux. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 22:32 schrieb Lukas Pitschl luk...@gpgtools.org: The best way to reach us is either our support platform at https://gpgtools.tenderapp.com or t...@gpgtools.org. When I tried contacting you guys a little more than a month ago, there was no e-mail to be found on the website. Only a support forum that sounded like Users helping users (so I didn't want to report the bug there) and a Twitter, which I then used. Can you please make sure it's easy to find that mail address? The code that checks out our GPGTools_Core repository is pretty old already and it’s certainly a stupid way to do it. It's not so much about age, but about what thought process came to the conclusion that this might be a good idea. This is a security project, so every change done should be done with thoroughly thinking about the security implications that change might have. This was clearly not done here, and IMHO downloading and executing remote code without any verification is unforgivable for a security project. At the time we assumed that it was safe to check it out via ssl from github, since curl would refuse to do so if there was a certificate error. This entirely depends on the certification store curl has and the configuration. Granted, the defaults on OS X are sane. But still, this relies completely on GitHub not being compromised. And it was only quite recently that someone managed to get write access to repos due to a bug in GitHub. How can someone blindly trust and rely on a service they can neither control nor audit for the security of their users in a security project? This is just extremely irresponsible. And even worse: Why did you decide to hide what is going on by prefixing it with a @? This really feels like you are trying to deceit users, hiding from them that they execute remote code that you could change at any moment. Worse yet, you could later on switch it back and nobody would notice. This feels a lot like a hidden backdoor to me. we will only charge a fee for GPGMail, the rest of GPG Suite will remain free. Actually, I'm all for you charging a fee. That will create enough pressure for a fork that will then hopefully have better security practices. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Please remove MacGPG from gnupg.org due to serious security concerns
Hi! I hereby request that MacGPG gets removed from gnupg.org due to serious security concerns. Basically, the first thing the Makefile in all their repos / tarballs does is this: @bash -c $$(curl -fsSL https://raw.github.com/GPGTools/GPGTools_Core/master/newBuildSystem/prepare-core.sh) So you type make not expecting anything bad (you verified the checksum and everything), but you just executed remote code. Great. And they even hide it from you by prefixing it with @, which is downright evil. So you never notice unless you look at the Makefile. Currently, that script clones another common repo using the unverified git:// protocol (because, why use submodules if you can do it in an insecure way?), but obviously, that can change any minute and could change just for certain IPs etc. The developer(s) don't allow any issues on GitHub, so I tried contacting them by other means (e.g. Twitter), only to get ignored. They clearly don't care about security. In any case, somebody who does something like this clearly doesn't care about security the least. The potential for backdoors is extremely high and I think nobody should be using any software written by this developer / these developer(s), as they clearly demonstrated that they couldn't care less about your security. I don't feel comfortable that the majority of Mac users are using this software which doesn't care for security at all, but is used for extremely security sensitive tasks. I guess this is because gnupg.org recommends it and therefore people think it's safe. I think gnupg.org should do the contrary instead and strongly discourage using it. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 07:53 schrieb Sandeep Murthy s.mur...@mykolab.com: I'm guessing because you need an SSH key at GitHub in order to pull via SSH. Yet another problem solved by git modules. Still, they could have at least changed it to https. GitHub supports pull/push via SSH or HTTPS therefore you can do this to with MacGPG (2) or any GitHub repo. Well, for SSH, you need a key, but for HTTPS, you don't, so they could have used that. However, git submodules solve the problem completely, as you can use relative paths. So it uses whatever you used to check out the initial repo. There must be lots of MacGPG users and most of them probably use the GPG suite, because it is GUI based (also more user friendly, unlike GnuPG) and it would not be fair on them to unilaterally remove the link to GnuPG or to receive some kind of security warning without raising the issues you mention with the people who are actively developing and maintaining the source. I disagree. The developers are not capable of writing secure software, as demonstrated (several times even, it seems). It would be best to advise to never use that at all and then write new software, if there's demand for it. It's sometimes better to not use something than to use something untrustworthy. For security products, this is especially true. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 19.02.2015 um 20:08 schrieb Werner Koch w...@gnupg.org: Because I have to enter the PIN everytime (right, I do this on purpose), the RSA signatures a long, and I do not keep my signing key card inserted all the time. In fact I have to walk out of the office to pick it up. Another approach is to not sign them when working on it and only signing them before pushing using git rebase. I do agree that it's sometimes annoying to always plug it in and out again. ps. Here is the key I started to use for commits. pub ed25519/E3FDFF218E45B72B 2015-02-18 [expires: 2025-02-15] Key fingerprint = C1D3 4B69 219E 4AEE C0BA 1C21 E3FD FF21 8E45 B72B uid [ unknown] Werner Koch (wheatstone commit signing) +1 for choosing Ed25519! (I did the same because I didn't want commits to be huge). As most keyservers still don't support Ed25519 keys, I guess it's worth pointing out that you can get the key with --keyserver keyserver.mattrude.com. Btw, does this mean that basically Ed25519 keys are stable enough now and won't change anymore? -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 00:53 schrieb Hugo Osvaldo Barrera h...@barrera.io: It is true that there's a pretty big security hole there with git clone git://github.com..., since any malicious attacker can intercept that communication. There's no checksuming or anything to make this difficult *at all*. Well, this is only checking out the code. While I agree that this is dangerous, the curl | sh paradigm is even more dangerous. What *does* suprise me is that there's a commit to specifically remove git+ssh in favour of insecure ssh. There's no comment on why that was done either: https://github.com/GPGTools/GPGTools_Core/commit/5186bade36acedfdc0b76f9f5ddfcfc004ec698b I'm guessing because you need an SSH key at GitHub in order to pull via SSH. Yet another problem solved by git modules. Still, they could have at least changed it to https. However, I'd recomend that you go over the proper support channels first (rather than merely twitter) before asking that references to the proyect are deleted. As stated on https://gpgtools.org/: Please report any issues you find on our support platform. Which points to http://support.gpgtools.org/. Well, I think there's enough evidence that they do not know how to do things securely. It has even been pointed out in this thread that this is not the first time there are serious security problems. It feels like they are actively trying to make it insecure, because they do things that normally nobody working on a security product would even consider. Please consider this: GnuPG is a security product. People's lives might depend on it. They might have heard that GnuPG is secure and think they are safe since even Snowden uses it. They go to gnupg.org and then download MacGPG. That's dangerous and there's no way for them to know unless they go check the source. As a matter of fact, I compromised one of my machines by checking out one of the MacGPG tools, checking the checksum of the downloaded tarball and then typing make. I did not realize it executed remote code (twice even, the curl and the git checkout, on which make is also run later on). They even actively hide the fact, which makes it even worse. Should gnupg.org really endorse that? -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 00:16 schrieb Sandeep Murthy s.mur...@mykolab.com: I think this is an exaggeration. I have been using MacGPG and the GPG Tools support forum for quite some time, and have brought a number of issues to their attention, including a couple of security related ones, like making their key fingerprints more visible. On the one hand, you think it's an exaggeration, on the other, you can list even more examples. I mean, they don't even do the most basic security practices which are common in basically all projects these days, even non-security related projects. And we're talking about a security related project here! If someone clearly demonstrates even lack of the most basic security measures, why should that someone be trusted with way more complex stuff? You listing they had problems in the past basically only strengthens the argument that they are not to be trusted and should not be endorsed. They do care about security and are very responsive to posts on the GPG Tools support forum Really? Somebody caring about security executing remote code? Rather than using git submodules (which exist for how many years?), they prefer executing remote code that then downloads more code using an unverified channel. This can't be just laziness (using git submodules is less work), but looks like somebody even put a lot of effort into failing at security. How can you call that caring about security? If you'd argue they care a lot about being insecure, I'd agree though, because they actually seem to put a lot of effort into that… http://support.gpgtools.org/ If you are a security project, you should be thankful for people reporting bugs, not trying to make it as hard as possible to report a serious bug. This looks like more of a users help users forum kind of thing, nothing where you would want to report a bug. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Great to see that you are planning on trying to bring things into shape so they can get upstreamed. Might I suggest that you start with pinentry? Currently, you import an old pinentry release and then build a lot of things around it. It would be really helpful if you could instead create a new subdirectory cocoa and do it like the other pinentries. That would allow to review it more easily (only the new directory needs to be reviewed) and would allow upstreaming it. I think that would be a lot more helpful than having a pinentry-mac fork. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Whishlist for next-gen card
Am 20.02.2015 um 09:32 schrieb NdK ndk.cla...@gmail.com: 1 - support for more keys (expired ENC keys, multiple signature keys) And maybe for storing a certification key with a different PIN. 5 - possibility to export private keys to user-certified devices That pretty much defeats the point of using a smart card in the first place. 6 - like in Yubikey NEO, a physical button to authorize some operations can be useful (certification, signature, NFC PIN-less auth) That would be a pretty useful thing, but require you to trust the card reader. This, however, would really make sense on the Gnuk and I guess you could even do that without changing the spec. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 17.02.2015 um 15:14 schrieb Hugo Osvaldo Barrera h...@barrera.io: Actually, I've noticed that there was a very quick reply to this when it was brought to the dev's attention. I'll leave this here for anyone else interested in following-up: https://github.com/GPGTools/GPGTools_Core/commit/5186bade36acedfdc0b76f9f5ddfcfc004ec698b I'm not aware of any track record of writing bad software in the past either - I believe they're just human. A user complained, so we'd rather use something insecure. This is not the correct mindset to develop security software! Also, the new way they solve it ignores the proposal to use git submodules entirely, not even stating why they don't want to use git submodules. But that at least is not a security problem, so I don't have strong feeling about this :). -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 18.02.2015 um 15:57 schrieb Werner Koch w...@gnupg.org: git commit -S keyID You can just create an alias for that, I for example use git ci. I know that but I would like to have a different key for tag and commit. Requiring an option is just too cumbersome. I don't really see how that is cumbersome if you have an alias for tag and for commit that each specify the key you want? As an aside, what's the reason for not signing the commits with the key on the card? I sign all my commits with the key stored on my Gnuk. What is kinda annoying though is if you set commit.gpgsign = true, as it will then even sign git stash etc. and ask you to enter the PIN all the time. Which is why I have an alias git ci for git commit -S, as I only want to sign commits, not temporary state. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 18.02.2015 um 16:05 schrieb Werner Koch w...@gnupg.org: I also do this often to avoid cluttering the screen. No need to assume a backdoor. It is for a Mac and Mac users want a clean tty ;-) I also like @ to hide useless output, but is downloading *and executing* from a remote location really something you should hide? Especially if everything else isn't hidden? -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Trezor - Could this be the model for a PGP crypto device?
On Tue, 10 Mar 2015 13:35:27 +0900, NIIBE Yutaka gni...@fsij.org wrote: Confirmation push button would be a good idea, and I have been considering how we can enhance the OpenPGPcard specification so that we could do something like that for future implementation(s). Does this really need to be part of the specification? For example, the Gnuk could just delay signing / decryption / authentication until the button has been pressed and return an error if it doesn't get pressed within a certain amount of time. -- Jonathan pgpoQTbUc54_Z.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: gpg in a cybercafé
On Thu, 05 Mar 2015 22:27:36 +, flapflap flapf...@riseup.net wrote: The current version (1.3) of Tails comes with GnuPG 1.4.12. That's just not true. Not only is the gpg2 command available, but the change log even explicitly states that GnuPG 2 was added to improve smartcard support. -- Jonathan pgpMrNu2rjlQA.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: strength of voice authentication [was: Re: German ct magazine postulates death of pgp encryption]
On Mon, 02 Mar 2015 22:24:45 +0100, Johan Wevers joh...@vulcan.xs4all.nl wrote: For once, I've never heard of the police trying something like this to obtain confessions or information: the chance of failure in an indivicual case are too big. I'm guessing the reason is more that this would be a legal mine field and most likely completely useless in court. -- Jonathan pgpaN4ya35EI6.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: gpg in a cybercafé
On Wed, 04 Mar 2015 14:29:47 +0300, Robert Deroy robert.de...@mail.ru wrote: How could i do for use gpg on a usb key, because i have no computer, i only go in cybercafé. I want to use the last version, 2.1.1, with gpa. I woudl recommend to boot off a Tails USB stick, as everything else would be way too risky in a public place. Don't even think about just running the executable on some system! Tails is - as far as I know - the only system designed to still provide security in the environment of a café. It goes so far as so try to wipe the memory when you shut down. And here's the catch: It comes with GnuPG - but GnuPG 2.0.x AFAIK. Are you positive you absolutely need 2.1? The main reason to require 2.1 is to use ECC, I guess. -- Jonathan pgpnFKaFM6_7Q.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: German ct magazine postulates death of pgp encryption
On Mon, 2 Mar 2015 00:13:07 +0100, Ingo Klöcker kloec...@kde.org wrote: On what kind of hardware? A high-end gamer PC? Or a low end mobile phone? According to the paper, the goal is to take 4 minutes on an average PC and that it shall be adjusted according to hardware improvements. There are much larger bot nets, e.g the ramnit bot net apparently controlled 3.2 million (!) machines (see http://heise.de/-2559388, in German). And with regard to providers not accepting those mails you seem to be missing that the bots simply (ab)use the mail accounts of the bot owners. Abusing mail accounts only works if they are mail accounts with crappy hosts. Sane providers will block your account if you start sending 100 mails in 1 minute ;). Of course, 800,000 spam messages per minute is still many magnitudes less than now. The question is if that would still be profitable for spammers. Currently, they just send their spam to millions of addresses hoping that one of them is stupid enough to fall for it. They can do that because it's cheap. But if sending isn't cheap, sending to millions to just get one idiot who falls for it isn't an option anymore. I don't see BitMessage killing spam. But it will surely kill mailing lists. It would just need to be extended to groups. The protocol is not set in stone. In any case, I'm not suggesting we all switch to BitMessage. I'm just saying this is going in the right direction. -- Jonathan pgpBKEMKJpQhY.pgp Description: PGP signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: German ct magazine postulates death of pgp encryption
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Am 01.03.2015 um 23:25 schrieb Ingo Klöcker kloec...@kde.org: And most spam is sent by bots. The spammers don't really care how much energy the bots burn. Yes, the amount of spam might decrease because the bots cannot hammer out that many bitmessages as SMTP messages per second, but your hypothesis that BitMessage would get rid of spam is unrealistic. I don't really agree with that. The goal is that the proof of work for a single message takes 4 minutes. At that rate, sending spam really is not profitable. In 4 minutes, spammers can currently send hundreds of thousands of mails. At that rate, they can afford to send it to every address they can find. With only one mail per machine every 4 minutes, they really need to be careful where to send it. Let's assume they have 1 machines (which is unrealistic - most machines are behind a dialup connection from which no provider will accept mail). That's only 2500 mails a minute. If global spam were just 2500 spam messages a minute, spam would hardly be a problem. - -- Jonathan -BEGIN PGP SIGNATURE- Version: GnuPG v2 iF4EARYKAAYFAlTzle0ACgkQM+YcY+tK57UH+wEA2vgeaGeMeZ8daVMhQnJHsibz CP2bH4N9Jur5NMcu0G4BAACkAVlj0D5KKr6MfMcVb5dYoCRvn5mqOv/eoZPmLKEI =xAfS -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: German ct magazine postulates death of pgp encryption
Am 28.02.2015 um 14:12 schrieb Peter Lebbing pe...@digitalbrains.com: On 28/02/15 14:06, Ralph Seichter wrote: but PGP does not work for mass e-mail protection Let me stress again that the proper course might be to replace SMTP (e-mail) and then work from that. If you have a sieve and wish for something to hold liquids, you could plug up all the holes or say Blow this for a lark and get a pan. You mean like BitMessage https://bitmessage.org/bitmessage.pdf? I think it's the only replacement for mail with cryptography from the start. It gets rid of the whole public / private key problem and also gets rid of spam by requiring a proof of work to send something. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: trust paths
Am 28.02.2015 um 19:15 schrieb Johan Wevers joh...@vulcan.xs4all.nl I'm not talking about mathematically proving something. After all, a government agency could make a false key with Werner Koch's name on it and send someone who looks like him with real ID documents to a keysigning party. Government-issued ID's are no mathematical proof either. FWIF, you don't even need to be a government for that. And you don't need to look like Werner. Some document looking like a government issued ID showing a picture of you with Werner's name will most likely be enough to fool everyone who doesn't know Werner personally to sign this fake key. If the key was only on the keyservers, sure, then even I could do that myself easily. But I'm talking about keys on places where it is unlikely anyone has write access to, like the gnupg website or as a signature in mailinglist messages. Sure, it could be spoofed - but only a short time before it get noticed. It would not be the first time I read about a spoofed gpg key on a Linux distro server when the server was hacked. The attack works - but not for long. You are assuming it will be spoofed for everyone. It could just be spoofed for you. Anybody who can MITM you and give you a fake SSL cert that you accept (i.e. every government on the planet, a lot of companies and even some individuals) can give you something spoofed and you would not notice. And there would be no outcry about spoofed keys, because it's just you being affected. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: German ct magazine postulates death of pgp encryption
Am 01.03.2015 um 17:45 schrieb MFPA 2014-667rhzu3dc-lists-gro...@riseup.net: and also gets rid of spam by requiring a proof of work to send something. Surely, proof of work is evidence of performing some otherwise unnecessary CPU cycles. This wastes energy. In a system used by billions of people, lots of energy. That wasted energy is a lot less than the energy we currently waste on spam, especially if you take into consideration the amount of human time wasted. The majority of the e-mail traffic is used up by spam. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Integrate pinentry-mac into pinentry
Am 22.02.2015 um 13:17 schrieb Roman Zechmeister me...@gpgtools.org: 1. On Mac OS X it's standard to use Xcode for builds and we're using it for pinentry-mac and all of our other tools. Is it okay for you, if we're using an Xcode-Project and Xcode, instead of plain automake, to build pinentry for Mac OS X? I've seen a lot of projects where the Mac-specific part is nicely integrated into automake. The huge disadvantage of Xcode project files is that they are huge, can't make much use of the results from configure which often results in basically needing a different .xcproj file per combination of OS version and architecture (or at least different targets) and do not support cross-compiling at all. automake OTOH has none of these problems and is hardly any more work. Plus it's possible to edit build rules with an editor instead of a GUI that is only available for OS X. Oh, and then of course there's the problem that it's not possible to do reproducible builds with .xcproj files! I think Walter mentioned that he never touched OS X, so I'm guessing he'd prefer something that he can read and modify ;). 4. pinentry-mac allows the calling app to define a custom message to show. This is implemented using PINENTRY_USER_DATA. We allow placeholders like %KEYID and %USERID. To fill the placeholders, we parse the description from pinentry. This works in the most cases. The reason for this feature is, to allow some more informative and readable messages. e.g. We can tell the user for which email/file, he enters the passphrase. What do you think about that? Is this a desirable feature for pinentry? Hm, this sounds good at first, but after some thought, there are several issues. This could be used to trick the user into thinking he's doing the right thing when in fact he's not. What if you just don't use %KEYID, but write another key ID there that the user expects, when in fact you sign for something else? I think it would be better to have a dialog that shows all these information and then maybe a free form text for the justification, where no replacing takes place? 5. Using PINENTRY_USER_DATA we also allow to set a custom icon to be shown, like the standard Mac OS X security dialog. Opinions? I can't think of any problem with that and this sounds indeed like a good addition. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Am 20.02.2015 um 11:48 schrieb Lukas Pitschl luk...@dressyvagabonds.com: Pinentry-mac is one project we’ve „revived“ and thus only added stuff on top of the old code instead of refactoring it. We’ve been planning to do that for a long time now though, so we’ll definitely look into that and check out how other UIs do it, like GTK. It seems there's http://github.com/GPGTools/pinentry now, which is based on the original pinentry. Unfortunately, as of now, it's just one huge commit on top of it. Still, I did a *very* quick review (so don't blame me if I overlooked something :P) and left a few comments. -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Please remove MacGPG from gnupg.org due to serious security concerns
Sorry for reviving this old thread. But since you guys still don't accept bug reports (why?!)… I'm not sure whether this is better or worse than the old situation, but now you include an unsigned binary in your tree that is executed as part of the build process. Nowhere can be found what this binary does or from which sources it has been built. This is at least as bad as executing remove code. Can you please explain why you do this, or why you thought this would be a good idea after that long discussion on how important security is for a security product? -- Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: GnuPG public key vulnerability?
Hi Murphy, This email refers to the ROCA vulnerability (https://crocs.fi.muni.cz/ public/papers/rsa_ccs17), which affects a number of hardware devices including some versions of the Yubikey 4-nano (https://www.yubico.com/ keycheck/). I believe Yubico are offering to replace affected Yubikeys. One aspect of this vulnerability is that RSA public keys can be very easily checked to determine if they are vulnerable - so at Facebook, we checked the public keys that have been uploaded to people's profiles, and notified people whose keys are affected. Unfortunately it seems like you were one of the unlucky ones! Details here: https://www.facebook.com/ protectthegraph/posts/1954548564785285. Hope that helps, Jon On 1 November 2017 at 00:10, murphywrote: > I got a signed notification from facebook (good signature, enigmail) > that claims my GnuPG generated public key has a "recently disclosed > vulnerability". This is the full text: > > We have detected that the OpenPGP key on your Facebook profile may be > susceptible to attacks due to a recently disclosed vulnerability. We > recommend that you revoke and replace your public key immediately to > minimize the risk to your encrypted communications. You can update your > public key by visiting your Security and Login settings. To help reduce > the risk of your key being attacked, we have set the privacy of your > potentially vulnerable public key on your profile to "Only Me" to limit > further distribution. We will continue to encrypt your notification > emails using this OpenPGP public key. > > This is doubly weird since the private/public key was generated on a > Yubikey-4 nano and it is safe at home. Does anyone know what this may > be about? > > Facebook public key (it is valid, see: > https://www.facebook.com/notes/protect-the-graph/ > securing-email-communications-from-facebook/1611941762379302/): > > pub rsa4096 2015-05-17 [SC] [expires: 2018-05-17] > 31A70953D8D590BA1FAB37762F3898CEDEE958CF > uid [ full ] Facebook, Inc. > sub rsa4096 2017-07-24 [S] [expires: 2018-02-19] > > My public key is uploaded to keyservers and is: > > pub rsa4096 2016-10-17 [SC] [expires: 2018-10-17] > D89A29A3E1DA59DFBF516EA73E450D1BCF78C26B > uid [ultimate] orange > uid [ultimate] Murphy Chesney (facebook communication) > > sub rsa4096 2016-10-17 [A] [expires: 2018-10-17] > sub rsa2048 2016-10-17 [E] [expires: 2018-10-17] > > Murphy > > > > ___ > Gnupg-users mailing list > Gnupg-users@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-users > > ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: How to use PKA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Can someone provide a clear example of what I need to do to allow others to use pka-lookup to verify my email address? My understanding of those instructions is as follows: As the administrator of yourdomain.com, you can attest to the fact that [EMAIL PROTECTED] has a certain public key. To do this: Create a TXT record in yourdomain.com for you._pka.yourdomain.com. you is the part before the at sign, and yourdomain.com is your domain. the _pka part isn't really a host on your network, it's simply the convention that was decided upon for this. The value of that TXT record is a colon-separated list of key=value pairs, where the keys and values are: (ignore everything after #, obviously) v=pkal; # meaning that this is a pkal record fpr=the fingerprint of your key; uri=url where your public key can be looked up; When concatenated together, you TXT record should look something like: v=pkal\;fpr=95FF88C5277C2282973FB90AD0197853DD25E42F\;uri=http://www.jrock.us/jon.key; Which is incidentally what my PKA record looks like. I actually just set this up and haven't tested it yet, though. If it doesn't work, I'll post a correction :) I've tried invoking variations of what I interpret to be instructions from http://lists.gnupg.org/pipermail/gnupg-devel/2005-August/022254.html but I can't seem to get my GnuPG to use pka-lookup even though it is in my verify-options. What version of gpg are you using? The instructions indicate that you need to check out the subversion (CVS) tree. It's experimental in nature, so it hasn't trickled down to stable versions yet. I need to try a newer version today anyway, so I'll try this out and let you know what version works. Regards, Jonathan Rockway -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.3 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iQCVAwUBRHMAq9AZeFPdJeQvAQKNSgQArIaHRx1q4M0uf8VoaPFc9/rYQe/sZr9f czDgjhZO7h7Z1FRwnccpj3XeUVoMGIoDeHNc/SCgsTgrWaXN1+FKGTxZPrOLp2U5 cXIXc/XWcunFmuf0iUeVp64yd5yjmcddh+8Mf5Tko0CbeIcWhBLJ87RIrzX20HR9 i5IGrhTrPX0= =9YfM -END PGP SIGNATURE- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Cipher v public key.
Sorry I may be missing the point but why does it now show AES or AES256 as a pukey? I think you're misunderstanding how PGP public-key encryption works. When you send an encrypted message, the first thing that happens is a random number called a session key is generated. This session key is then used to encrypt the (compressed, possibly) original message with a symmetric cypher like AES256. Then, this session key is encrypted with the recipient's public key (RSA or ElGamal). When the message is received by the recipient, he uses his private key to decrypt the session key. Then he uses the session key to decrypt the original message. If you're just using symmetric keys, you use AES256 directly. The passphrase you type in is used as the session key, in this case (actually, there's a random number called salt appended to the passphrase to prevent certain attacks, but the idea is the same). With public key cryptography, the software (via the public key algorithms) handles the (difficult) task of giving the recipient the decryption key. With symmetric encryption, it's your responsibility to get the passphrase to the recipient. If you're still not clear on this, you should definitely read something like Applied Cryptography, so that you can talk intelligently to your client about cryptography. The biggest security problem with crypto is when it's misapplied (people think they're safe, but the crypto is merely obfuscating the message, not securing it). Another good way to learn about symmetric encryption is to write your own simple encryption program. http://ciphersaber.gurus.com/ will guide you through this. Feel free to ask us any questions, though :) Regards, Jonathan Rockway signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Bypass PIN entry
I am using GPG on windows. Is there a way to pass the user PIN of a smartcard in a gpg-agent batch file or script? I am using a nitrokey as a private key store for an unattended SFTP system. It simply runs a WinSCP script to pickup and send files via SFTP. Before the script runs I launch I run a batch file to invoke the gpg-agent: gpg-connect-agent.exe" /bye WinSCP is then able to use the private key on the smartcard. However, the first time I connect the pinentry program appears and requires me to enter the user PIN. Is there a way for a script to pass this PIN and unlock the nitrokey when gpg-agent launches? ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
RE: Provide user PIN to gpg-agent?
Niibe-san Thank you so much for your help! It worked. I was using gpg4win, which of course does not include v2.1. I need to download the windows version from gnupg.org. I had some difficulty with the syntax of a windows batch file but eventually succeeded with gpg-connect-agent.exe --run Where contained: OPTION pinentry-mode=loopback /definqfile PASSPHRASE SCD CHECKPIN /bye And where was the ID of the card from gpg --card-status as you suggested, and was a file containing the PIN. Thank you again for your kind advice. -Original Message- From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of NIIBE Yutaka Sent: 02 December 2015 03:07 To: gnupg-users@gnupg.org Subject: Re: Provide user PIN to gpg-agent? On 12/01/2015 10:50 PM, Harbord Jonathan-EURITEC wrote: > Is it possible to pass the user PIN of a smartcard to gpg-agent in a command? > > I'd like to stop the pinentry program appearing for an automated system. Please note that I don't have any experience like that, and I don't generally recommend such a usage. In general, we can provide a special application specific pinentry program for such a special purpose. In GnuPG 2.1.x, there is allow-loopback-pinentry option. When enabled it by .gnupg/gpg-agent.conf or as an argument invoking gpg-agent, we can do something like: gpg-connect-agent \ "OPTION pinentry-mode=loopback" '/definqfile PASSPHRASE /tmp/passphrase-for-smartcard' \ "SCD CHECKPIN " /bye having a file /tmp/passphrase-for-smartcard, where is the one in the output of 'gpg --card-status' like: Application ID ...: D276000124010200F5170001 Substitute by D276000124010200F5170001. Please try. -- ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Provide user PIN to gpg-agent?
Is it possible to pass the user PIN of a smartcard to gpg-agent in a command? I'd like to stop the pinentry program appearing for an automated system. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
gpg --import-options import-drop-uids not available?
Hello, I see this option being added here: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=8e83493dae426fe36a0e0081198b10db1e103ff1 However it doesn't seem to have been released as of 2.2.19. Is there a reason this still hasn't been released? Thanks, Jonathan signature.asc Description: Message signed with OpenPGP ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Batch generate keys without revocation cert?
Hello, I would like to batch generate keys, but *not* have a revocation cert generated. I do not see an option for this, how can it be done? Thanks, Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Batch generate keys without revocation cert?
> > On 2020-01-23 at 17:32 +0100, Jonathan Cross via Gnupg-users wrote: > > Hello, > I would like to batch generate keys, but *not* have a revocation cert > generated. > I do not see an option for this, how can it be done? > Thanks, Jonathan > > From: ?ngel > To: gnupg-users@gnupg.org > Subject: Re: Batch generate keys without revocation cert? > Hello Jonathan > See if this helps > > https://www.gnupg.org/documentation/manuals/gnupg/Unattended-GPG-key-generation.html > Anyway, you could always generate a revocation certificate and then > discard it. > Kind regards Thank you Angel, I am already making extensive use of batching, but (as you can see on the linked page), there is no option to remove revocation certificates from being generated. Was there something specific there that I overlooked? As you mentioned, I am deleting the revocation cert, but this is suboptimal. A bit of background... I was trying to use this for generating "vanity" keys (while using all of the gpg mechanics, entropy, etc) -- so I need it as fast as possible. I have come to see that this is far too slow to get an interesting key ID of my choosing, so I will continue looking into other options like this: https://github.com/osresearch/pgp-vanity-keygen (with modifications for Curve25519 added) If there was an option to provide my own fixed entropy, that would also be helpful as I'd like to create that using Diceware. If you have any suggestions, please let me know. Thanks! Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ed448 support in gpg?
>> Is ed448 available / in development? > > Will be part of 2.3. Great news! > However, even then I do not suggest to create such > a key because the majority of deployed software won't be able to use > it. How will older clients deal with a certification signature from this unrecognized algorithm? > If you care about the secuity of your key use a smartcard. Yes, I intend to do this with the subkeys (Curve25519) Only the primary (certification key) would use ed448 which would rarely be used and only offline. > Think of your threat model and, as usual, see https://www.xkcd.com/538/ Agreed :-) In this situation, I just want to avoid creating a new key-pair as long as possible and ed448 is likely to survive just a bit longer from what I understand. Performance is irrelevant. Jonathan signature.asc Description: Message signed with OpenPGP ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: ed448 support in gpg?
> On Mar 11, 2020, at 3:58 PM, Andrew Gallagher wrote: > > Signed PGP part > On 11/03/2020 12:30, Jonathan Cross via Gnupg-users wrote: >> ed448 is likely to survive just a bit longer from what I understand. > > It depends on how soon you think general-purpose quantum computers will > be available. Elliptic-curve keys are *less* resistant to quantum > algorithms than classically-equivalent RSA, due to their smaller size. Ah, I was not aware of that. Seems I should stick with RSA-4096 primary key for now. I can add an Cv25519 subkey (and even an ed448 subkey later) signature.asc Description: Message signed with OpenPGP ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
ed448 support in gpg?
Hello, I am looking into making a new key that is as "future-proof" as possible. Offline master key that is ed448 would be ideal if possible with Curve25519 subkeys for daily use on a smartcard. Is ed448 available / in development? Or a similar 256bit "safe-curves" option? Thank you, Jonathan signature.asc Description: Message signed with OpenPGP ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: MacOSX help - beginner installation, first time
Hi Cyrus, 1. This is the SHA256 checksum I get for GnuPG-2.2.20.dmg: 39970099819616d4b66a4e471ce26db97384948d0f375e02aae9d9de1d69baa5 2. The signature (GnuPG-2.2.20.dmg.sig) checked out for me: gpg: Signature made Sat Mar 21 12:42:46 2020 CET gpg:using RSA key 4F9F89F5505AC1D1A260631CDB1187B9DD5F693B gpg: Good signature from "Patrick Brunschwig " [full] gpg: aka "Patrick Brunschwig " [full] gpg: aka "[jpeg image of size 13251]" [full] Primary key fingerprint: 4F9F 89F5 505A C1D1 A260 631C DB11 87B9 DD5F 693B Furthermore... 1. I have met Patrick Brunschwig in person, checked his government ID. He also checked mine. 2. We both cross-signed each other's keys. 3. You can verify this by getting our pubkeys from pgpkeys.urown.net 4. You can check the OpenPGP signature on this email to verify my key is: 9386 A2FB 2DA9 D0D3 1FAF 0818 C0C0 7613 2FFA 7695 Now, of course you don't know me, but you now have a bit more info to go on. Maybe there's someone in this list below that you know / trust to check ID and / or verify key fingerprints? My key: https://pgpkeys.urown.net/pks/lookup?op=vindex=0xC0C076132FFA7695 Meeting people in person and verifying key fingerprints is of course best, but not always a realistic option for every piece of software :-) Good luck! Jonathan signature.asc Description: Message signed with OpenPGP ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
gpg: used key is not marked for encryption use.
Hi, I'm trying to understand the scenario in which we see the log message, "gpg: used key is not marked for encryption use." I haven't been able to find any mentions of the phrase on the web, so I turned to the source code. Looking at https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=blob;f=g10/pubkey-enc.c;h=6e1b0898e4b3687ef4d57ae1a6270782723b01e3;hb=refs/heads/master#l146 it is a little difficult to tease out. The context is I'm trying to debug why another party's encrypted file is producing this extra log message by gpg-2.3.1, and if it matters. They used a tool which uses the BouncyCastle java library. Would someone be able to help me with this? Thank you, Jonathan Kaczynski ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Backing up your PGP key by hand
Thank you for sharing this Francesco. Yes, having a secure, durable offline backup is important. Coming from the Bitcoin space, we've already explored many options in an effort to allow users easily to back up private keys. I have to say the effort involved in your method seems unrealistic for most users: > Considering a paperkey is less than 150 lines, that means it should take 50 sessions, or a little less than 2½ months to get it on paper. The whole effort costs 50×10m ≃ 8 hours of your time. In Bitcoin, we can use the BIP39 standard to backup nearly infinite number of keys (trees of derived keys) with just 12 simple English words. It even has a checksum! Only in the first four letters of each word are even necessary as those are always distinct making input very quick and easy. GPG would benefit from something similar. Only 1% of the 1% of users, will put in the effort in that you did meaning that most users are not properly backing up their PGP keys and or are trusting computer hardware/printers. I see there is efforts like paperkey word list: https://github.com/vonshednob/paperkeywords But ideally such a system should be standardized and built into gpg so that users can be sure they will be able to restore keys. One can actually use the most popular Bitcoin hardware wallet as a PGP signing device. Since the device is backed up with a BIP39 "seed phrase", you can effectively say that it's a way to backup GPG keys with 12 or 24 words: https://support.ledger.com/hc/en-us/articles/115005200649-OpenPGP?docs=true The fact that It has a screen and you can input the words directly into the signing device means that you don't need an air gap computer as well. That might be a good option for some people. Jonathan ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg.org/mailman/listinfo/gnupg-users