Smartcard With Pin Pad Better Security?

2012-10-14 Thread Jonathan
I understand that a smartcard is more secure to keep my key from ever
coming off the card itself. I like the idea of getting one with a pin
pad to lower my attack surface sense as long as my pinpad is not
compromised I should be golden right?

All the pin pads I've seen dont have many possible buttons it looks like
all numbers. Even with a strong password is it seems it would be easy if
I could only use pin of 0-9 right? Couldnt that be brute forced quick
assuming they could get my smartcard? Or am I missing something and
theres an mode that letters it do alphabets and such?

Some I saw were pc, some were class 1, class 2, class 3. Which of these
is the most secure?

http://www.cryptoshop.com/index.php

Should I get one from here or another shop? I want one that will work in
windows and ubuntu and will work with OpenPGP smartcards.

Any recommendations on this?

Also do OpenPGP smartcards support the new ECC key systems in beta?

Sorry for wall of text, thank you.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Help with error please

2017-11-15 Thread Jonathan

  
  
Just installed GPA/Kleopatra.  Whenever I start up GPA I get 3
  windows pop-up:
1.  "GnuPG is rebuilding the trust database.  This might take a
  few seconds."
2. "The GPGME library returned an unexpected error at
  keytable.c:150.  The error was:
Provided object is too short
This is either an installation problem or a bug in GPA.  GPA will
  now try to recover from this error."
3.  A dialog box saying I don't have a private key yet and giving
  me option to generate one now.
I've re-installed and tried creating keys but nothing seems to
  work.
Any help would be greatly appreciated!

  



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


For Windows

2011-03-11 Thread Jonathan Ely
Hello. I use Enigmail, so of course I have GnuPG installed. I use 1.4.9
because [1] I can not find an executable for 2.0.17 for Windows, and [2]
I do not know how to configure the GPG-agent. Can somebody please assist
me with upgrading to 2.0.17 and configuring the agent? For about a week
I have been searching everywhere but found nothing. I did install
GPG4WIN then uninstalled it because I could not figure out how to use
the agent and the GPA utility is not screen reader accessible. Thanks in
advance for your help.

PS. I am blind and use a screen reader. Everything must be 100% keyboard
accessible.
-- 
CONFIDENTIALITY NOTICE: This e-mail transmission, and any documents,
files or previous e-mail messages attached to it may contain
confidential information that is legally privileged. If you are not the
intended recipient, or a person responsible for delivering it to the
intended recipient, you are hereby notified that any disclosure,
copying, distribution or use of any of the information contained in or
attached to this transmission is STRICTLY PROHIBITED. If you have
received this transmission in error, please immediately notify the
sender, and please destroy the original transmission and its attachments
without reading or saving in any manner. Thank you.


0x4B22824D.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RSA Versus DSA and EL GAMAL

2011-03-13 Thread Jonathan Ely
I apologise in advance if this is a stupid question to ask now or if
people already asked it before I stepped on the scene, but which
algorithm is more secure: DSA and EL GAMAL or RSA? I know the latter has
undergone a ridiculous amount of scrutiny and is immensely popular. I
also know it generates longer keys.

I have a 4096 RSA key but really never found the answer whilst searching
beforehand which one to choose. I know 4096 is much better than 2048, so
I can not figure out why Enigmail defaults to a 2048 instead of 4096 but
whatever. I am not concerned about speed; I will gladly sacrifice speed
for security any day. As always, thanks for the future lessons.
-- 
CONFIDENTIALITY NOTICE: This e-mail transmission, and any documents,
files or previous e-mail messages attached to it may contain
confidential information that is legally privileged. If you are not the
intended recipient, or a person responsible for delivering it to the
intended recipient, you are hereby notified that any disclosure,
copying, distribution or use of any of the information contained in or
attached to this transmission is STRICTLY PROHIBITED. If you have
received this transmission in error, please immediately notify the
sender, and please destroy the original transmission and its attachments
without reading or saving in any manner. Thank you.


0x4B22824D.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: For Windows

2011-03-14 Thread Jonathan Ely
I use a screen reader called JAWS For Windows. The GUI is not screen
reader accessible, meaning I can not use the Arrow keys, Tab, Shift+Tab
and any other navigational keys to use the GPA utility like you can with
the mouse. I really hate that; people have no idea how much it annoys
me. I might write to the GPG4WIN developers if I can track down their
information. The command-line utility of GnuPG is more verbose than that.

On 14/03/2011 03:56 AM, Werner Koch wrote:
 On Sat, 12 Mar 2011 01:40, k...@grant-olson.net said:
 
 - GPG4WIN is the right package to install gpg2 on windows, so you've got
 the right installer.  It's a shame GPA doesn't work with a screen reader.
 
 What is the problem with GPA?  It is a plain gtk+ application and thus
 should have the same features and problems as other gtk+ applications.
 
 
 Salam-Shalom,
 
Werner
 


0x4B22824D.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: For Windows

2011-03-14 Thread Jonathan Ely
I think I made the mistake of using HTML format the first time then
learnt my signature failed to validate. I realised it was because of the
HTML check box being checked; thus, I have disabled that. I have also
disabled the text signature for replies.

On 14/03/2011 02:24 AM, Remco Rijnders wrote:
 On Mon, Mar 14, 2011 at 09:06:20AM +1100, Ben McGinnes wrote:

 Although I've received other email from the OP that did not include
 the footer, so now I'm curious to know where it came from, especially
 since he is using the GMail MX servers.

 
 Hi Ben,
 
 I exchanged a few emails off list with the OP as well, and that led us
 to conclude that most likely the original mail also included a HTML-part
 (scrubbed off by the mailing list?) which caused the signature to fail.
 The legal mumbo jumbo disclaimer was added by the MUA and not the MTA,
 so I imagine enigmail properly signed the footer and my original
 assumption that the MTA was to blame was incorrect.
 
 Cheers,
 
 Remco
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users


0x4B22824D.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keyservers

2011-03-20 Thread Jonathan Ely
The attached .asc file causes problems? I have disabled that but still
enabled the header. Why would the .asc attachment option be there if it
causes problems?

On 20/03/2011 01:28 PM, Ingo Klöcker wrote:
 On Sunday 20 March 2011, Charly Avital wrote:
 Ingo Klöcker wrote the following on 3/20/11 11:43 AM:
 I doubt this very much because the encoding surely happens before
 the signing.


 Regards,
 Ingo

 In my post, I also indicated that there was a string --=20 between
 the actual text and the signature disclaimer CONFIDENTIALITY
 NOTICE: This e-mail
 
 Well, that's the standard signature separator: 2 dashes followed by a 
 space. To preserve this trailing space Thunderbird/enigmail does the 
 right thing and encodes it.
 
 
 After Jonathan disabled that signature add-on, his signed messages
 verified.
 
 Yeah, well. Even though Jonathan disabled the signature his message is 
 still quoted-printable encoded. As are my messages. So, quoted-printable 
 encoding does not seem to be the problem.
 
 Also, Jonathan's message Re: what are the sub keys does not have a 
 signature. Still the signature is broken. What the two messages with 
 broken signatures seem to have in common is the attached key. Maybe 
 that's what is causing the problems.
 
 
 Regards,
 Ingo
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keyservers

2011-03-20 Thread Jonathan Ely
Firstly, what is MUA? I hear that but am not sure what that means.
Secondly, I have disabled that in Thunderbird. I had no idea it modified
anything; I thought it was simply a text signature that did not
interfere with Enigmail and GnuPG. Thanks for enabling me to understand
the complication there.

On 20/03/2011 02:38 PM, Ben McGinnes wrote:
 On 21/03/11 5:11 AM, Jonathan Ely wrote:

 The attached .asc file causes problems? I have disabled that but
 still enabled the header. Why would the .asc attachment option be
 there if it causes problems?
 
 The .asc file is the GPG signature and does not cause problems.  The
 signature that is referred to is the confidentiality notice that is
 appended to your email.  Presumably it is appended by your MUA or
 GMail *after* the rest of your message is signed and thus the bad
 signature message indicates your email has been modified (which it
 has, by a disclaimer which everyone will ignore and not feel bound
 by).
 
 
 Regards,
 Ben
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keyservers

2011-03-20 Thread Jonathan Ely
I do not use the Gmail interface any more; I only use the Thunderbird
client and typed the signature in the edit field found in the Tools |
Account options | General dialogue. It always appears in the body, right
under the point where I type. If this is the case it should not
interfere with Enigmail or GnuPG, correct?

PS. I learnt my lesson about including any signature for a mailing list.

On 20/03/2011 03:35 PM, Ben McGinnes wrote:
 On 21/03/11 6:11 AM, Jonathan Ely wrote:
 Firstly, what is MUA? I hear that but am not sure what that means.
 
 MUA = Mail User Agent, e.g. Thunderbird, Outlook, Apple Mail, etc.
 MTA = Mail Transfer Agent, e.g. Sendmail, Postfix, Exchange, etc.
 
 Secondly, I have disabled that in Thunderbird. I had no idea it
 modified anything; I thought it was simply a text signature that did
 not interfere with Enigmail and GnuPG. Thanks for enabling me to
 understand the complication there.
 
 If a signature is inserted before the message is signed then it will
 be included as part of the message body and will be part of the signed
 content.  This means it won't break the signature.  If it is inserted
 as the message is being sent, but after the message is signed then it
 will generate the error seen on the list.
 
 To be sure that a text signature is appended without interfering with
 the digital signature, it should appear in the body of the message
 when you edit it.  Thunderbird is quite capable of doing this (I have
 one, but don't normally include it when posting to lists).
 
 
 Regards,
 Ben
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keyservers

2011-03-20 Thread Jonathan Ely
Really? For me, it is much easier to access the newest reply instead of
using the Down Arrow key to find it. Gmail always worked the same way
for me.

On 20/03/2011 04:44 PM, Ingo Klöcker wrote:
 On Sunday 20 March 2011, Jonathan Ely wrote:
 On 20/03/2011 03:35 PM, Ben McGinnes wrote:
 To be sure that a text signature is appended without interfering
 with the digital signature, it should appear in the body of the
 message when you edit it.  Thunderbird is quite capable of doing
 this (I have one, but don't normally include it when posting to
 lists).

 I do not use the Gmail interface any more; I only use the Thunderbird
 client and typed the signature in the edit field found in the Tools |
 Account options | General dialogue. It always appears in the body,
 right under the point where I type. If this is the case it should
 not interfere with Enigmail or GnuPG, correct?

 PS. I learnt my lesson about including any signature for a mailing
 list.
 
 The next thing you might want to learn is not to top-post (i.e. write 
 the reply above of the full quote of the message one replies to). Top-
 posting is very common in corporate email exchange but it is uncommon on 
 many mailing lists (including this one).
 
 
 Regards,
 Ingo
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keyservers

2011-03-20 Thread Jonathan Ely
Something to think about that one. I guess I will experiment in the
future, but I understand what you mean and you do have a point with the
question  answer order rather than the reverse. Now I understand why
Thunderbird has that option.

On 20/03/2011 05:35 PM, Grant Olson wrote:
 On 03/20/2011 05:16 PM, Jonathan Ely wrote:
 Really? For me, it is much easier to access the newest reply instead of
 using the Down Arrow key to find it. Gmail always worked the same way
 for me.

 
 Ingo's talking about the body of the message.  Most mailing lists people
 reply after the question, so it's in context when you find a thread
 later, instead of before, at the top of the message.
 
 Arguably, when reading a message out of context, it's easier when most
 people see:
 
 QUESTION: What is the secret to life, the universe and everything?
 ANSWER: 42
 
 Rather than:
 
 ANSWER: 42
 QUESTION: What is the secret to life, the universe and everything?
 
 Which is what happens when you 'top-post' your answer at the top of the
 message.
 
 If it's hard to do compose an interleaved reply with your screen-reader,
 that's fine, but you will get people complaining about it every now and
 then.  If it's easy, you probably want do to reply after people's
 comments, in context, instead of before, when you're on mailing lists.
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: what are the sub keys

2011-03-22 Thread Jonathan Ely
Exactly. Computation time is nothing nowadays. If that was the case,
those who use 1024 bit keys I would think still use the SHA1 hash
algorithm. But now people such as myself use SHA512 and 4096 bit RSA
keys, and if I could use a 8192 bit RSA key and the new SHA512/256
algorithm that I think was published just this past 02 February I would.

On 22/03/2011 10:19 AM, lists.gn...@mephisto.fastmail.net wrote:
 On Sat, Mar 19, 2011 at 11:36:57PM -0400 Also sprach Robert J. Hansen:
 On 3/19/11 10:34 PM, Jonathan Ely wrote:

 but be sure to set your preferences and choose a 4096 over 2048.

 Why?  This is like saying, I like the bank vault on my front door, but
 I wish it was thicker: I want the extra security.  Key length is only a
 small part (arguably the smallest part) of communications security.

 
 I agree that 4096 may seem like overkill, but I think the recommendation
 to max out one's RSA key size is defensible. Here's why:
 
 1. Modern computers are fast; it costs us almost nothing in terms of
computation time to use a 4096-bit key.
 
 2. Modern computers are fast, and getting faster all the time; remember
that your security margin may need to be good not just today, but
against all the attacks that are possible in the future, for as long
as your data needs to remain secure (decades, for some people). Once
upon a time, 1024-bit keys were considered perfectly adequate; most
experts urge against generating keys today with that strength.
 
 I agree that an awful lot of fuss is made over key length, sometimes to
 the exclusion of other, much more likely attack vectors. However, until
 someone describes for me a compelling reason NOT to bump key length up
 to 4096, my view remains: Why not?
 
 Special case, relating to this thread's original question:
 
 Some software which is designed to interface with GnuPG, or otherwise
 implement PGP keys, may not support arbitrary key lengths.
 E.G. Evolution used to have a 160-bit hash hard-coded into it's gnupg
 integration (it may still--I haven't used Evolution in a while), which
 meant that to remain DSS-compliant, you could only sign email with a
 1024-bit DSA key. DSA-2 keys could not be supported directly by
 Evolution. You could circumvent the key-stregth limit by using an RSA
 key as long as you liked. However, in cases when a particular piece of
 software may require use of a key which does not meet your general-use
 criteria, for whatever reason, generating a sub-key which meets the
 requirements can allow you to use the specific feature you need, while
 still enabling you to use other sub-keys for less restrictive
 applications.
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: what are the sub keys

2011-03-22 Thread Jonathan Ely
Would not it be 4096 with RSA, or is DSA in conjunction with a 4096 bit
key still popular? I have never used DSA so does what Robert said
pertaining to my used combination apply here?

On 22/03/2011 12:13 PM, Jerome Baum wrote:
 Robert J. Hansen r...@sixdemonbag.org writes:
 
 And this is where I part ways with you.  There is no reason not to bump
 key length up to 4096.  There is also no reason not to use SHA512 with a
 DSA-1k key, for instance.  Sure, only 160 bits of SHA512 will be used, but
 that's not a reason not to use it.  It's not as if you're making the system
 weaker.
 
 Correct me if I'm  wrong on this one, but it does  make your key weaker,
 right?
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: what are the sub keys

2011-03-22 Thread Jonathan Ely
Enigmail allows only 1024, 2048 and 4096. I have never heard of that,
but even still I would personally choose the largest key for the time
being till RSA becomes obsolete. Is there anything larger than 4096
since you mentioned values unknown to me?

On 22/03/2011 05:17 PM, MFPA wrote:
 Hi
 
 
 On Tuesday 22 March 2011 at 7:43:23 PM, in
 mid:20110322194323.ga1...@imac-6g2p.mgh.harvard.edu,
 lists.gn...@mephisto.fastmail.net wrote:
 
 
 There is a greater margin of security in a 4096-bit key
 over a 2048-bit key (all other factors being equal)
 
 Is there any particular reason to jump from 2048 to 4096 rather than
 use an intermediate value? 3072 maybe?
 
 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users




signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: 4096 bit keys

2011-03-22 Thread Jonathan Ely
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.

On 22/03/2011 05:14 PM, Mike Acker wrote:
 with chip makers playing with chips having 64 cores printed in silicon...
 
 someplace i read the ratios on this,-- if you make the key a little
 longer the key gets much harder to break.  in public key encryption
 though you have to factor the product of the two large prime numbers --
 which i'm told is no easy task.  i've often wondered about this as lists
 of large prime numbers are not hard to come by... so-- start someplace
 and start running divides... trouble is though you can't use the
 hardware instruction set: the numbers are way to large
 
 what does an x64 chip do? divide a 64 bit integer into a 128 bit
 dividend to yield a 64 but quotient and a 64 bit remainder? dunno but
 you have to do the same thing but using what? a 2048 or 4096 bit dividend?
 
 (I'm not a mathematician)
 
 what if they put 8192 cores on a chip? who would have such a machine?
 NSA.  the smart money would bet they would have it
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: 4096 bit keys

2011-03-22 Thread Jonathan Ely
What is ECC? Now I want that haha.

On 22/03/2011 06:53 PM, Grant Olson wrote:
 On 03/22/2011 06:06 PM, Jonathan Ely wrote:
 I really wish 8192 would become available. Not that it would be the end
 all/be all of key security but according to your theory it sounds much
 more difficult to crack.

 
 The actual cutting edge solution is to move from RSA to ECC.  Even a
 8192 bit or 16k bit RSA key isn't approved by the NSA or NIST for TOP
 SECRET materials, but ECC-521 is.
 
 ECC actually is up-and-running in the beta for gpg 2.1, but
 realistically it'll be (at least) a few years before it gets mainstream
 adoption.
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: what are the sub keys

2011-03-23 Thread Jonathan Ely
Well excuse me for not knowing it all. I only know what Enigmail allows
through its user interface, and bad judgement is sometimes a method of
learning for better decision making. I have only begun using both GnuPG
and Enigmail this month along with Thunderbird, and this list educated
me a lot since I have been subscribed. Anything else you would like to
point out? I apologise if I come off mean in any way.

On 23/03/2011 04:55 PM, Ingo Klöcker wrote:
 On Tuesday 22 March 2011, Jonathan Ely wrote:
 Enigmail allows only 1024, 2048 and 4096. I have never heard of that,
 but even still I would personally choose the largest key for the time
 being till RSA becomes obsolete. Is there anything larger than 4096
 since you mentioned values unknown to me?
 
 Let's see. There's 4097, 4098 and even 4099. And then there's 4100. ;-p
 
 IMHO all those discussions about key sizes are really pathetic. Stick 
 with the defaults or educate yourself by reading the appropriate 
 literature instead of starting one non-sensical discussion after the 
 other on this mailing list. It should be rather obvious by now that key 
 sizes above 2048 are mostly a matter of personal taste and bad 
 judgement.
 
 
 Regards,
 Ingo
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Hi

2011-03-31 Thread Jonathan Ely

The first spammer I have seen thus far. Did not know they existed here.
On 31/03/2011 10:27 AM, Lee Elcocks wrote:
 hi  it's in your best interests to start this right away http://bit.ly/gntBne
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Hi

2011-03-31 Thread Jonathan Ely
I did not understand what that menat anyway. I never click links that
seem anonymous so I am safe, but that was unusual.

On 31/03/2011 08:41 PM, Robert J. Hansen wrote:
 On 3/31/11 7:25 PM, Jerry wrote:
 Dumping [something] would have been my first choice.
 
 Let's be a little careful about our language.  Thanks.  :)
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: windows front end to GnuPG

2011-04-17 Thread Jonathan Ely
Have you ever thought about GPG4WIN? It is not accessible for me since I
use a screen reader and because of that I think the graphical user
interface needs some serious work, but I hear it works well for others.

On 17/04/2011 08:45 PM, Felipe Alvarez wrote:
 I've currently begun getting everyone in the office using GnuPG on
 windows. We're using WinPT as the front end. However there are several
 deficiencies with this program that we have encountered. Further, it
 is no longer being developed (last version 1.4.3 release sept 2009).
 Are there any other windows front ends that are easy to use, WRT
 single file en/de/cryption? The main requirements would possibly
 include:
 - sits on the task tray
 - low mem footprint
 - still in development
 
 --
 Felipe
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: windows front end to GnuPG

2011-04-17 Thread Jonathan Ely
The only thing I use is the Enigmail extension for Mozilla Thunderbird
which works well enough for me, but of course I must use the version 1
branch of GnuPG.

On 17/04/2011 08:57 PM, Felipe Alvarez wrote:
 Have you ever thought about GPG4WIN?
 Looks a bit 'heavy' (fancy GUI and a bunch of programs I know that I
 will not be using) but I'll give it a try.
 
 Felipe
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: windows front end to GnuPG

2011-04-17 Thread Jonathan Ely
So their is an installer for Windows for version 2.x? I never found one
accept for that of GPG4WIN.

On 17/04/2011 09:08 PM, Doug Barton wrote:
 On 04/17/2011 18:00, Jonathan Ely wrote:
 The only thing I use is the Enigmail extension for Mozilla Thunderbird
 which works well enough for me, but of course I must use the version 1
 branch of GnuPG.
 
 There is nothing about enigmail that requires gnupg 1. I use it with
 gnupg2 without any problems on windows and FreeBSD.
 
 
 Doug
 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: windows front end to GnuPG

2011-04-17 Thread Jonathan Ely
Version 1.4.11 is still the latest of that branch, right? That is what
the download page says but some times there are later versions than what
is reported. Media Player Classic is a good example of this.

On 17/04/2011 09:32 PM, Faramir wrote:
 El 17-04-2011 22:18, Jonathan Ely escribió:
 So their is an installer for Windows for version 2.x? I never found one
 accept for that of GPG4WIN.
 
   AFAIK, GPG4win is the only package for GPG 2.x for windows. But you
 can chose which apps to install. However, there are a few that are
 required to run GPG 2.x. I don't remember which ones, since I'm still a
 happy user of GPG 1.x
 
   Best Regards

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It Is Gone

2011-07-19 Thread Jonathan Ely
Thanks. I should have known better to ask before I copied an FTP's link
location from the page. They made it a bit more difficult for me since
they no longer link it directly but as long as the FTP server is still
in existence I should be able to find it.

On 19/07/2011 07:37 PM, Robert J. Hansen wrote:
 On 7/19/11 5:24 PM, Jonathan Ely wrote:
 Can somebody please link to or refer me to the site that
 contains the latest version 1 of GnuPG? Thanks.
 
 ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.11.exe
 
 Enjoy!
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 


0xDA74EEF3.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Open Password Protected ZIP File

2011-08-14 Thread Jonathan Ely
I strongly suggest Ultimate ZIP Cracker at vdgsoftware.com/uzc.html if I
recall correctly. It is undoubtedly the most complete and promising
software I have ever used and trust me when I say I have used many of
the kind. Beware that it is resource intensive if you configure it as such.

On 14/08/2011 01:19 AM, Jean-Philippe Charpentier wrote:
 Does anybody know how to open a ZIP file, password protected? I forgot the 
 password.
 
 Google brings me to various password attack tools - any recommendation?
 
 Thanx,
 JPC
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users


0xDA74EEF3.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Location of GnuPG 1.4.11 Windows binary

2011-08-21 Thread Jonathan Ely
You must have missed my enquiry from some time in July. I was looking
for it as well only to copy the link location of one of the FTP links
and do some self-searching. It would be useful if they announce 1.x.x
upgrades so people will not have to randomly decide when to check the
directory for an upgrade. I installed GPG4WIN and uninstalled it because
it was just too much for me and the 1.x.x branch is more simple for me
anyway since I only need it for the Enigmail extension.

On 21/08/2011 10:54 PM, Mark Rousell wrote:
 I just thought the following might be helpful for Windows users of GnuPG
 1.x.
 
 I had been running 1.4.10 on Windows for some time and I thought it was
 time I checked for an upgrade so I visited
 http://www.gnupg.org/download/ to see if there was a new version. I
 found that 1.4.11 was available but that the binary download links had
 disappeared! The only reference to Windows binaries is now via Gpg4win
 but that project only provides Windows binaries of 2.x and not 1.x.
 
 Happily however I found that the traditional standalone Windows binary
 installer is still in available via FTP. It's simply not linked from the
 GnuPG website as far as I can see. Here's the link:
 ftp://ftp.gnupg.org/gcrypt/binary/
 
 Thank goodness for that.
 
 If anyone from GnuPG is reading this, please don't stop building (and
 providing links to) Windows binaries for GnuPG 1.x. I'm sure I can't be
 the only user of it. :-)
 
 I'm sure it wouldn't be the end of the world for me to learn how to
 compile it for Windows but I know that the GnuPG developers will
 probably do a better job of it than me. ;-)
 
 
 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users


0xDA74EEF3.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: supersede key on key-server

2011-08-22 Thread Jonathan Ely
I was wondering something similar. I have a few keys which I have
invalidated and disabled but there is no way to delete them. I am using
this new key which I have not uploaded because if something happens and
I must re-create the key that will too become just clutter on the server.

On 22/08/2011 10:39 AM, Mike Acker wrote:
 some of us use more than one email address. with GPG it is simple to add
 a secondary ID to a key and this seems to work quite well.
 
 when a change like this is made it is desirable to update the keyserver.
 what happens when you re-upload a key to the keyserver? I hate to think
 the keyserver gets loaded up with old junk keys no one want used anymore...
 


0xDA74EEF3.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: windows binary for gnupg 1.4.11 // link no longer on gnupg site?

2011-09-13 Thread Jonathan Ely
It is no longer shown but it is available at
ftp.gnupg.org/gnupg/binaries or something of the sort. Copy one of the
link locations that link to the source code and modify that path in the
location bar. It is inconvenient no doubt but it works.

I hope there will be updates to the 1.x branch because I use it with
Enigmail and have no use for the PGP agent that I read is mandatory in
the 2.x branch.

On 13/09/2011 10:41 AM, ved...@nym.hush.com wrote:
 On the gnupg download site,
 http://gnupg.org/download/
 
 There is no link for a windows binary for 1.4.11, only a link to 
 the gpg4win site (a GREAT site and program, btw, but only for gnupg 
 2.x).
 
 Is there going to be a a windows binary for future builds of the 
 gnupg 1.x branch?
 
 (I'm interested primarily in order to update Maxine Brandt's 
 Torduninja site that I recreated, as no one had access to her old 
 site after she passed on)
 
 http://www.angelfire.com/mb2/mbgpg2go/tp.html
 
 Thanks,
 
 vedaal 
 
 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

-- 
Brotha J.


0xDA74EEF3.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Looking for 3G smartphone partner and cooperator

2011-09-28 Thread Jonathan Ely
On 28/09/2011 07:46 AM, Bolin qu wrote:
 Hello,my friend:
 
 How are you recently? i hope everything is very well with you now.
 This is your friend_bolin worked in 3G T-smart communications factory as a 
 sales man and tooling manager, Our company has many years experience in 
 providing the brand owners and wholesalers all over the world with 
 professional products and OEM, ODM services.and we're the strategic partner 
 with China Mobile.
 Attached is our newest product presentation for you reference. if any style 
 meets your interest,please don't hesitate to contact me!
 
 BRS!
 --
 Bolin qu,Oversea sales and tooling manager
 T-smart communications equipment Co.,LTD.(China mobile Partner)
 Add:B-D,8 Floor,Hanjing International building,Nanshan District,Shenzhen 
 City,PRC
 MP:+86 13602649836   skype:bolin.qu 
 Email: slsimon...@gmail.com or bolinqud...@live.cn
 TEL:0755-83534040/25315393 FAX:0755-83584225 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
Nothing but a spammer. Get off the list or whomever controls the list
should ban this fool for good.

-- 
Brotha J.


0xDA74EEF3.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Shouldn't keyservers store and provide subkeys?

2005-03-29 Thread Jonathan McDowell
[I'm guessing the original mail was on gnupg-users; I'm not on that list
though I do read pgp-keyserver-folk.]

On Thu, Mar 24, 2005 at 04:44:49PM -0500, Jason Harris wrote:
 On Thu, Mar 24, 2005 at 04:20:02PM -0500, David Shaw wrote:
  I'm all for it.  It would be nice to point people to a keyserver set
  that works properly with everything: multiple subkeys, photo IDs, and
  MR output.  At the moment, this is just SKS servers.

onak should handle all of these; if anyone has examples of keys that it
doesn't deal with then please do let me know the details.

I appreciate that the.earth.li [wwwkeys.uk.pgp.net] is probably the
only public keyserver running the code, but I do try to react to any
bug reports I receive.

It can be found at:

http://www.earth.li/projectpurple/progs/onak.html

which also has details of the arch repository.

J.

-- 
101 things you can't have too much of : 41 - Tea.
This .sig brought to you by the letter E and the number  3
Product of the Republic of HuggieTag


pgpF08vQs36S3.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


preferred compression types with multiple recipients

2006-05-24 Thread Jonathan Wellons

Good day everyone,

How does gpg reconcile conflicting preferred compression types?  I've 
switched mine to bzip2 to save space, but it occurs to me that it may 
not be of much effect until a significant number of other people I 
communicate with also switch from zlib.


My understanding of encrypted mail to multiple recipients is that
* a session key is generated
* the message is encrypted symmetrically with the session key
	* the session key is encrypted asymmetrically with each recipient's 
public key.


It seems that a message is only compressed once.

Thanks,
Jonathan


PGP.sig
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: SHA2 compatibility

2006-06-07 Thread Jonathan Rockway



This is a true statement, but not relevant to your question.  I was
discussing DSA keys, and you're asking about RSA.  You can use any
hash with RSA that you like.  There are no restrictions in size or
otherwise.  The only thing you have to worry about is whether your
recipient can handle that hash or not.


Interestingly, my OpenPGP smartcard (1024-bit RSA key) refuses to sign 
anything that's not 160 bits (i.e. SHA1 and RIPEMD-160 only).  Is there 
any reason for this, or is this a bug?


Regards,
Jonathan Rockway



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Jonathan Rockway



There is no way to design such a self-check.  This isn't a lack in
GnuPG, but a design impossibility for any program.  Think about it: a
check mode would try and account for a bug in GnuPG and warn you
that the file was not encrypted properly.  However, if you're
presuming a bug, then who says you should trust the check mode?

If GnuPG completes successfully, that means it succeeded.  If you want
more assurance than that, the only way to do it is to decrypt the file
and compare.
  


If you wanted to be really sure that GPG didn't mess something else, try 
decrypting it with some other OpenPGP implementation.  If you're using 
perl, use Crypt::OpenPGP.  (And Text::Diff to do your diff, and 
File::Slurp to read in the files for Text::Diff :)


BTW, why are you encrypting these files anyway?  If someone broke into 
your computer they could just steal the crypto key too.


Regards,
Jonathan Rockway

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Fwd: perl EUID change causing failure]

2006-07-31 Thread Jonathan Rockway
Might I suggest using a pre-implemented perl solution?

Crypt::OpenPGP:
http://search.cpan.org/~btrott/Crypt-OpenPGP-1.03/lib/Crypt/OpenPGP.pm
GnuPG::Interface: http://search.cpan.org/~ftobin/GnuPG-Interface-0.33/

And also, GPG, Mail::GPG, Crypt::GPG, or Mail::GnuPG.

http://search.cpan.org/search?query=gpgmode=all

In other words, other people have already worked out the details, so why
not try one of those modules before fighting with something that's not
really worth your time?

Regards,
Jonathan Rockway


Marcel Chastain - Security Administration wrote:
 I have a perl wrapper around gpg for use within a web app. It changes
 its 'EUID' (Effective UserID) early in the script.
 From there, it attempts to run
 /usr/local/bin/gpg --list-public-keys

 My test script:
 #!/usr/bin/perl
 $ENV{'GNUPGHOME'} = '/home/username/.gnupg';
 my $uid = getpwnam(username);
 $ = $uid;
 print `/usr/local/bin/gpg --list-public-keys`;

 The output:
 gpg: O j: ... this is a bug (gpg.c:1880:main)
 secmem usage: 0/0 bytes in 0/0 blocks of pool 0/32768

 (replace the word 'username' with a user on your system for testing
 purposes)
 Now, this *only* happens when setting the EUID. I can set the
 RealUID($) and things work perfectly.

 Does this have something to do with the code updates mentioned in the
 What's New section..? (
 http://lists.gnupg.org/pipermail/gnupg-announce/2006q2/000226.html )

 User IDs are now capped at 2048 bytes.  This avoids a memory
 allocation attack (see CVE-2006-3082).

 Running gnupg 1.4.4 compiled from ports, freebsd 4.11-STABLE .



 

 Subject:
 perl EUID change causing failure
 From:
 Marcel Chastain - Security Administration [EMAIL PROTECTED]
 Date:
 Wed, 26 Jul 2006 16:26:48 -0700
 To:
 [EMAIL PROTECTED]

 To:
 [EMAIL PROTECTED]


 I have a perl wrapper around gpg for use within our company's internal
 control panel. It changes its 'EUID' (Effective UserID) early in the
 script.
 From there, it attempts to run
 /usr/local/bin/gpg --list-public-keys

 My test script:
 #!/usr/bin/perl
 $ENV{'GNUPGHOME'} = '/home/username/.gnupg';
 my $uid = getpwnam(username);
 $ = $uid;
 print `/usr/local/bin/gpg --list-public-keys`;

 The output:
 gpg: O j: ... this is a bug (gpg.c:1880:main)
 secmem usage: 0/0 bytes in 0/0 blocks of pool 0/32768

 (replace the word 'username' with a user on your system for testing
 purposes)
 Now, this *only* happens when setting the EUID. I can set the RealUID
 and things work perfectly.

 Running gnupg 1.4.4 compiled from ports, freebsd 4.11-STABLE .

 

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
   


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: AES 256 bit key generation

2006-08-11 Thread Jonathan Rockway
AES is a symmetric cypher, so you can use anything you want as the key,
although I'm pretty sure that you must never use the same key to encrypt
two different messages.  (See Initialization Vector.  I know this is
required for stream cyphers like RC4, but I'm not sure about block
cyphers like AES.)  If anything, using a different key every time
ensures that two identical messages encrypt to different cyphertexts,
which is a good thing.  Also be sure to read up on ECB / CBC.

You should probably look this up in the AES section of Applied
Cryptography before you deploy any code, though.

Regards,
Jonathan Rockway
 I want to create as AEs key of size 256 bits.is there any function in
 libgcrypt to generate AES key ?
 Now i am using libgcrypt random number generation to create an AES key
 .is this correct ? 


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Don't store your key on a flash drive! [was Re: GnuPG (GPG) Problem]

2006-08-19 Thread Jonathan Rockway
I would recommend that you don't do that.  What if you lose the drive? 
Then your private key is compromised.  Do you have a revocation
certificate in a safe location?  If not, you can't even tell anyone that
your private key has been compromised!  Not good!

The OpenPGP smartcard is a much safer option, since it will not give up
the private key (even if you have the password), and will lock itself
after 3 incorrect password attempts.  (And after 3 incorrect Admin PIN
attempts, it will destroy itself, which is pretty inconvenient for
someone trying to steal your key.)  Compare this to a pen drive that
will let anyone copy off the secret key and guess the passphrase on
their friendly local supercomputer cluster.

The other advantage is that if your card gets stolen, you *know* that
it's been stolen.  If you have your key lying around in your homedir
somewhere, someone could just make a copy of it, and you'd never know. 
With the OpenPGP card, if it's not in your hand, you can consider it stolen.

For $20, you can't go wrong.  Get an OpenPGP card and be happy :)

http://www.kernelconcepts.de/products/security-en.shtml

Regards,
Jonathan Rockway

Ismael Valladolid Torres wrote:
 John Clizbe escribe:
   
 Just copy the keyring files.
 

 I store my private keyring and a public keyring containing only my
 public key on a pendrive, then in your gpg.conf:

 keyring /path/to/pendrive/pubring.gpg
 secret-keyring /path/to/pendrive/secring.gpg

 Using several different computers it works like a charm.

 Cordially, Ismael
   




signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Don't store your key on a flash drive! [was Re: GnuPG (GPG) Problem]

2006-08-22 Thread Jonathan Rockway

 I am a smartcard programmer. Sure an OpenPGP card is just a standard
 smartcard with special elementary files in its filesystem. Could I
 make my own OpenPGP card from a common smartcard given I know its
 administrative codes?

Yup, that's what the Open in OpenPGP Smartcard means :) I'm not a
smartcard programmer, so I bought one instead.  If you'd like to make
OpenPGP smartcards and sell them, that would be great!

Regards,
Jonathan Rockway

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Crypto Stick vs Smart Card Reader /w Pin Pad

2014-08-30 Thread Jonathan Brown
Is the crypto stick which is fully open source and open hardware more
secure than a Gemalto smart card reader with pin pad built in? Which of
these would make you more of a hard target and increase security.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 17:00 schrieb Ville Määttä mailing-li...@asatiifm.net:

 Upstream still does have the issue which now seems to have been fixed in the 
 fork but in a binary removed from upstream…

I really can not confirm this. I am running vanilla GnuPG 2.1.2 (built from 
source) on Yosemite (10.10.2 to be exact) with a Gnuk without any problems.

In any case, I agree about the part that such fixes should be developed in the 
GnuPG repo and not in basically a fork that receives less reviewing.

 I think the GUI tooling of not only Mac but other *NIX systems to be quite an 
 important factor in getting wider use for encryption. Such tools must be from 
 a respectable source and properly implemented just as much as the underlying 
 engine. I would argue GnuPG should take the responsibility of such tooling 
 where there isn’t a good option. Other *NIX systems are doing fairly well 
 already so I suppose a Mac GUI would really be the urgent one.

I suppose it might be a good idea to have a Qt GUI. That looks native enough on 
Mac so that most users won't complain, works good on X11 or Wayland based 
systems and also works well on Windows. Ideally, this would be a project under 
the GnuPG umbrella, but ideally not taking away time from core developers and 
thus be done by others. It also is not that security critical if it's just a 
GUI using the command line tool.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 14:31 schrieb Werner Koch w...@gnupg.org:

 GnuPG's speedo build system also downloads stuff via the Makefile but it
 verifies the checksums before proceeding. The checksums are taken from a
 public file which has a detached signature and the public key for that
 is one of the GnuPG release signing keys.

While this is much better from a security point of view, it still means that 
building needs an internet connection. It would be nice to be able to build it 
on an air-gapped machine, which I guess is quite a common use case for GnuPG.

To be fair, though, I never noticed that until you mentioned it :).

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 14:22 schrieb Werner Koch w...@gnupg.org:

 I do not think that it matters whether you pull using the git or the ssh
 protocol.  In both cases an active attacker can intercept the traffic
 easily.  Virtually nobody checks ssh host keys and how should they do it
 given that I can't find its fingerprint easily on github.  Thus you would only
 see the host key changed warning in case this is not the first time
 you connected to this github project (I assume they use different host
 keys per project). 

I do verify the fingerprint, and they are quite easy to find actually:

https://help.github.com/articles/what-are-github-s-ssh-key-fingerprints/

First Google match for GitHub SSH fingerprint.

 After all it is not different from downloading tarballs - only 10 to 20%
 of all downloads also download the signature file and for most projects
 there is no signature file.

Well, I guess you have to take into account that a lot of downloads are from 
packaging software like pkgsrc, FreeBSD ports, Gentoo portage, ArchLinux's 
makepkg, etc. Usually, these do download the signature and tarball once, verify 
it and then write a checksum to the Makefile / PKGBUILD / however it is called 
that is then verified. So I guess you can't easily map that to Only x% of 
users check the downloaded tarball. I guess it's a lot more, it's just not all 
check it using the .sig.

 For gnupg.org we assume that users of the repos closely watch out for
 conflicts and verify the latest release tag.  If there is a problem that
 should be reported to a mailing-list (after verification that it is
 really a conflict).
 
 git meanwhile allows to sign commits.  If anyone knows a method to set a
 different key for tagging and commits, I would soon start to sign each
 commit.  I use a smartcard based key for tagging but won't use that for
 regular commits.

git commit -S keyID

You can just create an alias for that, I for example use git ci.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 14:58 schrieb Sandeep Murthy s.mur...@mykolab.com:

 FYI I think you haven’t really looked at the support forum.  This page
 
 http://support.gpgtools.org/kb/faq/found-an-issue
 
 clearly lists instructions for submitting a bug.  They are always interested
 in reproducible issues, and every week in the discussions such issues
 are reported.
 
 Therefore it is not true that this support forum does not allow people to
 report bugs.

I looked for this a month ago and couldn't find anything besides a support 
forum (didn't sound right to me) and a Twitter handle, thus I decided to try 
Twitter.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 20:16 schrieb Juergen Fenn schneeschme...@googlemail.com:

 Enigmail has discussed recently to drop support for GnuPG1, making
 gpg-agent/pinentry a crucial issue on the Mac. The standard version of
 pinentry from MacPorts does not work properly out of the box.

For homebrew, there's a pinentry-mac formula, which unfortunately also does the 
remote code execution. I raised the issue with homebrew, however, most posts in 
that ticket were deleted because some people started questioning the review 
process of new formula and asked how this could even have gotten into homebrew.

The solution I chose is an ugly, but more secure one: I use pinentry-gtk with 
XDarwin. Sure it's ugly, even more so since it is upscaled on a retina display. 
But it's only for entering the PIN / passphrase, so I'd rather use that then 
pinentry-mac. I did not choose pinentry-curses because that didn't work well 
with signing Git commits.

 Anyway, alternatives should be mentioned on the GnuPG pages because—I
 agree to the OP—this is too important an issue, GnuPG also being used
 by  many people who seriously depend on its security.

I totally agree. There should at least be a big fat warning, saying to not use 
if it you really depend on security.

 The question is, can we use GnuPG on the Mac and rely on it?

I'd say yes. I'm using GnuPG 2.1.2 vanilla with a Gnuk token and don't see why 
it should be any less reliable than on Linux.

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 22:32 schrieb Lukas Pitschl luk...@gpgtools.org:

 The best way to reach us is either our support platform at 
 https://gpgtools.tenderapp.com or t...@gpgtools.org.

When I tried contacting you guys a little more than a month ago, there was no 
e-mail to be found on the website. Only a support forum that sounded like 
Users helping users (so I didn't want to report the bug there) and a Twitter, 
which I then used. Can you please make sure it's easy to find that mail address?

 The code that checks out our GPGTools_Core repository is pretty old already 
 and it’s certainly a stupid way to do it.

It's not so much about age, but about what thought process came to the 
conclusion that this might be a good idea. This is a security project, so every 
change done should be done with thoroughly thinking about the security 
implications that change might have. This was clearly not done here, and IMHO 
downloading and executing remote code without any verification is unforgivable 
for a security project.

 At  the time we assumed that it was safe to check it out via ssl from github, 
 since curl would refuse to do so if there was a certificate error.

This entirely depends on the certification store curl has and the 
configuration. Granted, the defaults on OS X are sane. But still, this relies 
completely on GitHub not being compromised. And it was only quite recently that 
someone managed to get write access to repos due to a bug in GitHub. How can 
someone blindly trust and rely on a service they can neither control nor audit 
for the security of their users in a security project? This is just extremely 
irresponsible.

And even worse: Why did you decide to hide what is going on by prefixing it 
with a @? This really feels like you are trying to deceit users, hiding from 
them that they execute remote code that you could change at any moment. Worse 
yet, you could later on switch it back and nobody would notice. This feels a 
lot like a hidden backdoor to me.

 we will only charge a fee for GPGMail, the rest of GPG Suite will remain free.

Actually, I'm all for you charging a fee. That will create enough pressure for 
a fork that will then hopefully have better security practices.

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-16 Thread Jonathan Schleifer
Hi!

I hereby request that MacGPG gets removed from gnupg.org due to serious 
security concerns. Basically, the first thing the Makefile in all their repos / 
tarballs does is this:

@bash -c $$(curl -fsSL 
https://raw.github.com/GPGTools/GPGTools_Core/master/newBuildSystem/prepare-core.sh)

So you type make not expecting anything bad (you verified the checksum and 
everything), but you just executed remote code. Great. And they even hide it 
from you by prefixing it with @, which is downright evil. So you never notice 
unless you look at the Makefile. Currently, that script clones another common 
repo using the unverified git:// protocol (because, why use submodules if you 
can do it in an insecure way?), but obviously, that can change any minute and 
could change just for certain IPs etc.

The developer(s) don't allow any issues on GitHub, so I tried contacting them 
by other means (e.g. Twitter), only to get ignored. They clearly don't care 
about security.

In any case, somebody who does something like this clearly doesn't care about 
security the least. The potential for backdoors is extremely high and I think 
nobody should be using any software written by this developer / these 
developer(s), as they clearly demonstrated that they couldn't care less about 
your security.

I don't feel comfortable that the majority of Mac users are using this software 
which doesn't care for security at all, but is used for extremely security 
sensitive tasks. I guess this is because gnupg.org recommends it and therefore 
people think it's safe. I think gnupg.org should do the contrary instead and 
strongly discourage using it.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-17 Thread Jonathan Schleifer
Am 17.02.2015 um 07:53 schrieb Sandeep Murthy s.mur...@mykolab.com:

 I'm guessing because you need an SSH key at GitHub in order to pull via SSH. 
 Yet another problem solved by git modules.
 
 Still, they could have at least changed it to https.
 
 GitHub supports pull/push via SSH or HTTPS therefore you can do this to with 
 MacGPG (2)
 or any GitHub repo.

Well, for SSH, you need a key, but for HTTPS, you don't, so they could have 
used that. However, git submodules solve the problem completely, as you can use 
relative paths. So it uses whatever you used to check out the initial repo.

 There must be lots of MacGPG users and most of them probably use the GPG
 suite, because it is GUI based (also more user friendly, unlike GnuPG) and it
 would not be fair on them to unilaterally remove the link to GnuPG or to 
 receive
 some kind of security warning without raising the issues you mention with
 the people who are actively developing and maintaining the source.

I disagree. The developers are not capable of writing secure software, as 
demonstrated (several times even, it seems). It would be best to advise to 
never use that at all and then write new software, if there's demand for it. 
It's sometimes better to not use something than to use something untrustworthy. 
For security products, this is especially true.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-19 Thread Jonathan Schleifer
Am 19.02.2015 um 20:08 schrieb Werner Koch w...@gnupg.org:

 Because I have to enter the PIN everytime (right, I do this on purpose),
 the RSA signatures a long, and I do not keep my signing key card
 inserted all the time.  In fact I have to walk out of the office to pick
 it up.

Another approach is to not sign them when working on it and only signing them 
before pushing using git rebase. I do agree that it's sometimes annoying to 
always plug it in and out again.

 ps. Here is the key I started to use for commits.
 
 pub   ed25519/E3FDFF218E45B72B 2015-02-18 [expires: 2025-02-15]
  Key fingerprint = C1D3 4B69 219E 4AEE C0BA  1C21 E3FD FF21 8E45 B72B
 uid   [ unknown] Werner Koch (wheatstone commit signing)

+1 for choosing Ed25519! (I did the same because I didn't want commits to be 
huge).

As most keyservers still don't support Ed25519 keys, I guess it's worth 
pointing out that you can get the key with --keyserver keyserver.mattrude.com.

Btw, does this mean that basically Ed25519 keys are stable enough now and won't 
change anymore?

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-16 Thread Jonathan Schleifer
Am 17.02.2015 um 00:53 schrieb Hugo Osvaldo Barrera h...@barrera.io:

 It is true that there's a pretty big security hole there with git clone
 git://github.com..., since any malicious attacker can intercept that
 communication. There's no checksuming or anything to make this difficult *at
 all*.

Well, this is only checking out the code. While I agree that this is dangerous, 
the curl | sh paradigm is even more dangerous.

 What *does* suprise me is that there's a commit to specifically remove git+ssh
 in favour of insecure ssh. There's no comment on why that was done either:
 
 https://github.com/GPGTools/GPGTools_Core/commit/5186bade36acedfdc0b76f9f5ddfcfc004ec698b

I'm guessing because you need an SSH key at GitHub in order to pull via SSH. 
Yet another problem solved by git modules.

Still, they could have at least changed it to https. 

 However, I'd recomend that you go over the proper support channels first
 (rather than merely twitter) before asking that references to the proyect are
 deleted.
 
 As stated on https://gpgtools.org/:
 
   Please report any issues you find on our support platform.
 
 Which points to http://support.gpgtools.org/.

Well, I think there's enough evidence that they do not know how to do things 
securely. It has even been pointed out in this thread that this is not the 
first time there are serious security problems. It feels like they are actively 
trying to make it insecure, because they do things that normally nobody working 
on a security product would even consider.

Please consider this: GnuPG is a security product. People's lives might depend 
on it. They might have heard that GnuPG is secure and think they are safe since 
even Snowden uses it. They go to gnupg.org and then download MacGPG. That's 
dangerous and there's no way for them to know unless they go check the source.

As a matter of fact, I compromised one of my machines by checking out one of 
the MacGPG tools, checking the checksum of the downloaded tarball and then 
typing make. I did not realize it executed remote code (twice even, the curl 
and the git checkout, on which make is also run later on). They even actively 
hide the fact, which makes it even worse. Should gnupg.org really endorse that?

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-16 Thread Jonathan Schleifer
Am 17.02.2015 um 00:16 schrieb Sandeep Murthy s.mur...@mykolab.com:

 I think this is an exaggeration.  I have been using MacGPG and the
 GPG Tools support forum for quite some time, and have brought a
 number of issues to their attention, including a couple of security
 related ones, like making their key fingerprints more visible.

On the one hand, you think it's an exaggeration, on the other, you can list 
even more examples. I mean, they don't even do the most basic security 
practices which are common in basically all projects these days, even 
non-security related projects. And we're talking about a security related 
project here! If someone clearly demonstrates even lack of the most basic 
security measures, why should that someone be trusted with way more complex 
stuff? You listing they had problems in the past basically only strengthens the 
argument that they are not to be trusted and should not be endorsed.

 They do care about security and are very responsive to posts on the
 GPG Tools support forum

Really? Somebody caring about security executing remote code? Rather than using 
git submodules (which exist for how many years?), they prefer executing remote 
code that then downloads more code using an unverified channel. This can't be 
just laziness (using git submodules is less work), but looks like somebody even 
put a lot of effort into failing at security. How can you call that caring 
about security? If you'd argue they care a lot about being insecure, I'd agree 
though, because they actually seem to put a lot of effort into that…

 http://support.gpgtools.org/

If you are a security project, you should be thankful for people reporting 
bugs, not trying to make it as hard as possible to report a serious bug. This 
looks like more of a users help users forum kind of thing, nothing where you 
would want to report a bug.

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-20 Thread Jonathan Schleifer
Great to see that you are planning on trying to bring things into shape so they 
can get upstreamed.

Might I suggest that you start with pinentry? Currently, you import an old 
pinentry release and then build a lot of things around it. It would be really 
helpful if you could instead create a new subdirectory cocoa and do it like the 
other pinentries. That would allow to review it more easily (only the new 
directory needs to be reviewed) and would allow upstreaming it. I think that 
would be a lot more helpful than having a pinentry-mac fork.

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Whishlist for next-gen card

2015-02-20 Thread Jonathan Schleifer
Am 20.02.2015 um 09:32 schrieb NdK ndk.cla...@gmail.com:

 1 - support for more keys (expired ENC keys, multiple signature keys)

And maybe for storing a certification key with a different PIN.

 5 - possibility to export private keys to user-certified devices

That pretty much defeats the point of using a smart card in the first place.

 6 - like in Yubikey NEO, a physical button to authorize some operations
 can be useful (certification, signature, NFC PIN-less auth)

That would be a pretty useful thing, but require you to trust the card reader. 
This, however, would really make sense on the Gnuk and I guess you could even 
do that without changing the spec.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-18 Thread Jonathan Schleifer
Am 17.02.2015 um 15:14 schrieb Hugo Osvaldo Barrera h...@barrera.io:

 Actually, I've noticed that there was a very quick reply to this when it was
 brought to the dev's attention. I'll leave this here for anyone else 
 interested
 in following-up:
 
  
 https://github.com/GPGTools/GPGTools_Core/commit/5186bade36acedfdc0b76f9f5ddfcfc004ec698b
 
 I'm not aware of any track record of writing bad software in the past either -
 I believe they're just human.

A user complained, so we'd rather use something insecure.

This is not the correct mindset to develop security software!

Also, the new way they solve it ignores the proposal to use git submodules 
entirely, not even stating why they don't want to use git submodules. But that 
at least is not a security problem, so I don't have strong feeling about this 
:).

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-19 Thread Jonathan Schleifer
Am 18.02.2015 um 15:57 schrieb Werner Koch w...@gnupg.org:

 git commit -S keyID
 
 You can just create an alias for that, I for example use git ci.
 
 I know that but I would like to have a different key for tag and commit.
 Requiring an option is just too cumbersome.

I don't really see how that is cumbersome if you have an alias for tag and for 
commit that each specify the key you want?

As an aside, what's the reason for not signing the commits with the key on the 
card? I sign all my commits with the key stored on my Gnuk. What is kinda 
annoying though is if you set commit.gpgsign = true, as it will then even sign 
git stash etc. and ask you to enter the PIN all the time. Which is why I have 
an alias git ci for git commit -S, as I only want to sign commits, not 
temporary state.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-19 Thread Jonathan Schleifer
Am 18.02.2015 um 16:05 schrieb Werner Koch w...@gnupg.org:

 I also do this often to avoid cluttering the screen.  No need to assume
 a backdoor.  It is for a Mac and Mac users want a clean tty ;-)

I also like @ to hide useless output, but is downloading *and executing* from a 
remote location really something you should hide? Especially if everything else 
isn't hidden?

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Trezor - Could this be the model for a PGP crypto device?

2015-03-10 Thread Jonathan Schleifer
On Tue, 10 Mar 2015 13:35:27 +0900, NIIBE Yutaka gni...@fsij.org wrote:

 Confirmation push button would be a good idea, and I have been
 considering how we can enhance the OpenPGPcard specification so that
 we could do something like that for future implementation(s).

Does this really need to be part of the specification? For example, the Gnuk 
could just delay signing / decryption / authentication until the button has 
been pressed and return an error if it doesn't get pressed within a certain 
amount of time.

-- 
Jonathan


pgpoQTbUc54_Z.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg in a cybercafé

2015-03-10 Thread Jonathan Schleifer
On Thu, 05 Mar 2015 22:27:36 +, flapflap flapf...@riseup.net wrote:

 The current version (1.3) of Tails comes with GnuPG 1.4.12.

That's just not true. Not only is the gpg2 command available, but the change 
log even explicitly states that GnuPG 2 was added to improve smartcard support.

--
Jonathan


pgpMrNu2rjlQA.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: strength of voice authentication [was: Re: German ct magazine postulates death of pgp encryption]

2015-03-02 Thread Jonathan Schleifer
On Mon, 02 Mar 2015 22:24:45 +0100, Johan Wevers joh...@vulcan.xs4all.nl 
wrote:

 For once, I've never heard of the police
 trying something like this to obtain confessions or information: the
 chance of failure in an indivicual case are too big.

I'm guessing the reason is more that this would be a legal mine field and most 
likely completely useless in court.

-- 
Jonathan


pgpaN4ya35EI6.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg in a cybercafé

2015-03-05 Thread Jonathan Schleifer
On Wed, 04 Mar 2015 14:29:47 +0300, Robert Deroy robert.de...@mail.ru wrote:

 How could i do for use gpg on a usb key, because i have no computer, i only 
 go in cybercafé.
 
 I want to use the last version, 2.1.1, with gpa.

I woudl recommend to boot off a Tails USB stick, as everything else would be 
way too risky in a public place. Don't even think about just running the 
executable on some system! Tails is - as far as I know - the only system 
designed to still provide security in the environment of a café. It goes so far 
as so try to wipe the memory when you shut down.

And here's the catch: It comes with GnuPG - but GnuPG 2.0.x AFAIK. Are you 
positive you absolutely need 2.1? The main reason to require 2.1 is to use ECC, 
I guess.

--
Jonathan


pgpnFKaFM6_7Q.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: German ct magazine postulates death of pgp encryption

2015-03-01 Thread Jonathan Schleifer
On Mon, 2 Mar 2015 00:13:07 +0100, Ingo Klöcker kloec...@kde.org wrote:

 On what kind of hardware? A high-end gamer PC? Or a low end mobile phone?

According to the paper, the goal is to take 4 minutes on an average PC and that 
it shall be adjusted according to hardware improvements.
 
 There are much larger bot nets, e.g the ramnit bot net apparently controlled 
 3.2 million (!) machines (see http://heise.de/-2559388, in German). And with 
 regard to providers not accepting those mails you seem to be missing that the 
 bots simply (ab)use the mail accounts of the bot owners.

Abusing mail accounts only works if they are mail accounts with crappy hosts. 
Sane providers will block your account if you start sending 100 mails in 1 
minute ;).

 Of course, 800,000 spam messages per minute is still many magnitudes less 
 than 
 now.

The question is if that would still be profitable for spammers. Currently, they 
just send their spam to millions of addresses hoping that one of them is stupid 
enough to fall for it. They can do that because it's cheap. But if sending 
isn't cheap, sending to millions to just get one idiot who falls for it isn't 
an option anymore.

 I don't see BitMessage killing spam. But it will surely kill mailing lists.

It would just need to be extended to groups. The protocol is not set in stone.

In any case, I'm not suggesting we all switch to BitMessage. I'm just saying 
this is going in the right direction.

-- 
Jonathan


pgpBKEMKJpQhY.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: German ct magazine postulates death of pgp encryption

2015-03-01 Thread Jonathan Schleifer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Am 01.03.2015 um 23:25 schrieb Ingo Klöcker kloec...@kde.org:

 And most spam is sent by bots. The spammers don't really care how much
 energy the bots burn. Yes, the amount of spam might decrease because
 the bots cannot hammer out that many bitmessages as SMTP messages per
 second, but your hypothesis that BitMessage would get rid of spam is
 unrealistic.

I don't really agree with that. The goal is that the proof of work for a
single message takes 4 minutes. At that rate, sending spam really is not
profitable. In 4 minutes, spammers can currently send hundreds of
thousands of mails. At that rate, they can afford to send it to every
address they can find. With only one mail per machine every 4 minutes,
they really need to be careful where to send it. Let's assume they have
1 machines (which is unrealistic - most machines are behind a dialup
connection from which no provider will accept mail). That's only 2500
mails a minute. If global spam were just 2500 spam messages a minute,
spam would hardly be a problem.

- --
Jonathan
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iF4EARYKAAYFAlTzle0ACgkQM+YcY+tK57UH+wEA2vgeaGeMeZ8daVMhQnJHsibz
CP2bH4N9Jur5NMcu0G4BAACkAVlj0D5KKr6MfMcVb5dYoCRvn5mqOv/eoZPmLKEI
=xAfS
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: German ct magazine postulates death of pgp encryption

2015-03-01 Thread Jonathan Schleifer
Am 28.02.2015 um 14:12 schrieb Peter Lebbing pe...@digitalbrains.com:

 On 28/02/15 14:06, Ralph Seichter wrote:
 but PGP does not work for mass e-mail protection
 
 Let me stress again that the proper course might be to replace SMTP (e-mail) 
 and
 then work from that. If you have a sieve and wish for something to hold 
 liquids,
 you could plug up all the holes or say Blow this for a lark and get a pan.

You mean like BitMessage https://bitmessage.org/bitmessage.pdf?

I think it's the only replacement for mail with cryptography from the start. It 
gets rid of the whole public / private key problem and also gets rid of spam by 
requiring a proof of work to send something.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: trust paths

2015-03-01 Thread Jonathan Schleifer
Am 28.02.2015 um 19:15 schrieb Johan Wevers joh...@vulcan.xs4all.nl

 I'm not talking about mathematically proving something. After all, a
 government agency could make a false key with Werner Koch's name on it
 and send someone who looks like him with real ID documents to a
 keysigning party. Government-issued ID's are no mathematical proof either.

FWIF, you don't even need to be a government for that. And you don't need to 
look like Werner. Some document looking like a government issued ID showing a 
picture of you with Werner's name will most likely be enough to fool everyone 
who doesn't know Werner personally to sign this fake key.

 If the key was only on the keyservers, sure, then even I could do that
 myself easily. But I'm talking about keys on places where it is unlikely
 anyone has write access to, like the gnupg website or as a signature in
 mailinglist messages. Sure, it could be spoofed - but only a short time
 before it get noticed.
 
 It would not be the first time I read about a spoofed gpg key on a Linux
 distro server when the server was hacked. The attack works - but not for
 long.

You are assuming it will be spoofed for everyone. It could just be spoofed for 
you. Anybody who can MITM you and give you a fake SSL cert that you accept 
(i.e. every government on the planet, a lot of companies and even some 
individuals) can give you something spoofed and you would not notice. And there 
would be no outcry about spoofed keys, because it's just you being affected.

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: German ct magazine postulates death of pgp encryption

2015-03-01 Thread Jonathan Schleifer
Am 01.03.2015 um 17:45 schrieb MFPA 2014-667rhzu3dc-lists-gro...@riseup.net:

 and also gets rid of spam
 by requiring a proof of work to send something.
 
 Surely, proof of work is evidence of performing some otherwise
 unnecessary CPU cycles. This wastes energy. In a system used by
 billions of people, lots of energy.

That wasted energy is a lot less than the energy we currently waste on spam, 
especially if you take into consideration the amount of human time wasted. The 
majority of the e-mail traffic is used up by spam.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Integrate pinentry-mac into pinentry

2015-02-22 Thread Jonathan Schleifer
Am 22.02.2015 um 13:17 schrieb Roman Zechmeister me...@gpgtools.org:

 1. On Mac OS X it's standard to use Xcode for builds and we're using it for 
 pinentry-mac and all of our other tools.
 Is it okay for you, if we're using an Xcode-Project and Xcode, instead of 
 plain automake, to build pinentry for Mac OS X?

I've seen a lot of projects where the Mac-specific part is nicely integrated 
into automake. The huge disadvantage of Xcode project files is that they are 
huge, can't make much use of the results from configure which often results in 
basically needing a different .xcproj file per combination of OS version and 
architecture (or at least different targets) and do not support cross-compiling 
at all. automake OTOH has none of these problems and is hardly any more work. 
Plus it's possible to edit build rules with an editor instead of a GUI that is 
only available for OS X. Oh, and then of course there's the problem that it's 
not possible to do reproducible builds with .xcproj files!

I think Walter mentioned that he never touched OS X, so I'm guessing he'd 
prefer something that he can read and modify ;).

 4. pinentry-mac allows the calling app to define a custom message to show.
 This is implemented using PINENTRY_USER_DATA. We allow placeholders like 
 %KEYID and %USERID.
 To fill the placeholders, we parse the description from pinentry. This works 
 in the most cases.
 The reason for this feature is, to allow some more informative and readable 
 messages. e.g. We can tell the
 user for which email/file, he enters the passphrase.
 What do you think about that? Is this a desirable feature for pinentry?

Hm, this sounds good at first, but after some thought, there are several 
issues. This could be used to trick the user into thinking he's doing the right 
thing when in fact he's not. What if you just don't use %KEYID, but write 
another key ID there that the user expects, when in fact you sign for something 
else? I think it would be better to have a dialog that shows all these 
information and then maybe a free form text for the justification, where no 
replacing takes place?

 5. Using PINENTRY_USER_DATA we also allow to set a custom icon to be shown, 
 like the standard
 Mac OS X security dialog. Opinions?

I can't think of any problem with that and this sounds indeed like a good 
addition.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-02-21 Thread Jonathan Schleifer
Am 20.02.2015 um 11:48 schrieb Lukas Pitschl luk...@dressyvagabonds.com:

 Pinentry-mac is one project we’ve „revived“ and thus only added stuff on top 
 of the old code instead of refactoring it.
 We’ve been planning to do that for a long time now though, so we’ll 
 definitely look into that and check out how other UIs do it, like GTK.

It seems there's http://github.com/GPGTools/pinentry now, which is based on the 
original pinentry. Unfortunately, as of now, it's just one huge commit on top 
of it. Still, I did a *very* quick review (so don't blame me if I overlooked 
something :P) and left a few comments.

--
Jonathan


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please remove MacGPG from gnupg.org due to serious security concerns

2015-08-23 Thread Jonathan Schleifer
Sorry for reviving this old thread. But since you guys still don't accept bug 
reports (why?!)…

I'm not sure whether this is better or worse than the old situation, but now 
you include an unsigned binary in your tree that is executed as part of the 
build process. Nowhere can be found what this binary does or from which sources 
it has been built. This is at least as bad as executing remove code. Can you 
please explain why you do this, or why you thought this would be a good idea 
after that long discussion on how important security is for a security product?

--
Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG public key vulnerability?

2017-10-31 Thread Jonathan Millican
Hi Murphy,

This email refers to the ROCA vulnerability (https://crocs.fi.muni.cz/
public/papers/rsa_ccs17), which affects a number of hardware devices
including some versions of the Yubikey 4-nano (https://www.yubico.com/
keycheck/). I believe Yubico are offering to replace affected Yubikeys.

One aspect of this vulnerability is that RSA public keys can be very easily
checked to determine if they are vulnerable - so at Facebook, we checked
the public keys that have been uploaded to people's profiles, and notified
people whose keys are affected. Unfortunately it seems like you were one of
the unlucky ones! Details here: https://www.facebook.com/
protectthegraph/posts/1954548564785285.

Hope that helps,
Jon

On 1 November 2017 at 00:10, murphy  wrote:

> I got a signed notification from facebook (good signature, enigmail)
> that claims my GnuPG generated public key has a "recently disclosed
> vulnerability".  This is the full text:
>
> We have detected that the OpenPGP key on your Facebook profile may be
> susceptible to attacks due to a recently disclosed vulnerability.  We
> recommend that you revoke and replace your public key immediately to
> minimize the risk to your encrypted communications.  You can update your
> public key by visiting your Security and Login settings.  To help reduce
> the risk of your key being attacked, we have set the privacy of your
> potentially vulnerable public key on your profile to "Only Me" to limit
> further distribution.  We will continue to encrypt your notification
> emails using this OpenPGP public key.
>
> This is doubly weird since the private/public key was generated on a
> Yubikey-4 nano and it is safe at home.  Does anyone know what this may
> be about?
>
> Facebook public key (it is valid, see:
> https://www.facebook.com/notes/protect-the-graph/
> securing-email-communications-from-facebook/1611941762379302/):
>
> pub   rsa4096 2015-05-17 [SC] [expires: 2018-05-17]
>  31A70953D8D590BA1FAB37762F3898CEDEE958CF
> uid   [  full  ] Facebook, Inc.
> sub   rsa4096 2017-07-24 [S] [expires: 2018-02-19]
>
> My public key is uploaded to keyservers and is:
>
> pub   rsa4096 2016-10-17 [SC] [expires: 2018-10-17]
>  D89A29A3E1DA59DFBF516EA73E450D1BCF78C26B
> uid   [ultimate] orange
> uid   [ultimate] Murphy Chesney (facebook communication)
> 
> sub   rsa4096 2016-10-17 [A] [expires: 2018-10-17]
> sub   rsa2048 2016-10-17 [E] [expires: 2018-10-17]
>
> Murphy
>
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How to use PKA

2006-05-23 Thread Jonathan T. Rockway
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 Can someone provide a clear example of what I need to do to allow others
 to use pka-lookup to verify my email address?

My understanding of those instructions is as follows:

As the administrator of yourdomain.com, you can attest to the fact
that [EMAIL PROTECTED] has a certain public key.  To do this:

Create a TXT record in yourdomain.com for you._pka.yourdomain.com.
you is the part before the at sign, and yourdomain.com is your
domain.  the _pka part isn't really a host on your network, it's
simply the convention that was decided upon for this.

The value of that TXT record is a colon-separated list of key=value
pairs, where the keys and values are: (ignore everything after #,
obviously)

v=pkal; # meaning that this is a pkal record
fpr=the fingerprint of your key;
uri=url where your public key can be looked up;

When concatenated together, you TXT record should look something like:

v=pkal\;fpr=95FF88C5277C2282973FB90AD0197853DD25E42F\;uri=http://www.jrock.us/jon.key;

Which is incidentally what my PKA record looks like.

I actually just set this up and haven't tested it yet, though.  If it
doesn't work, I'll post a correction :)

 I've tried invoking variations of what I interpret to be instructions
 from
 http://lists.gnupg.org/pipermail/gnupg-devel/2005-August/022254.html but
 I can't seem to get my GnuPG to use pka-lookup even though it is in my
 verify-options.

What version of gpg are you using?  The instructions indicate that you
need to check out the subversion (CVS) tree.  It's experimental in
nature, so it hasn't trickled down to stable versions yet.

I need to try a newer version today anyway, so I'll try this out and
let you know what version works.

Regards,
Jonathan Rockway
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.3 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQCVAwUBRHMAq9AZeFPdJeQvAQKNSgQArIaHRx1q4M0uf8VoaPFc9/rYQe/sZr9f
czDgjhZO7h7Z1FRwnccpj3XeUVoMGIoDeHNc/SCgsTgrWaXN1+FKGTxZPrOLp2U5
cXIXc/XWcunFmuf0iUeVp64yd5yjmcddh+8Mf5Tko0CbeIcWhBLJ87RIrzX20HR9
i5IGrhTrPX0=
=9YfM
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Cipher v public key.

2006-05-30 Thread Jonathan T. Rockway



Sorry I may be missing the point but why does it now show AES or AES256 as a
pukey? 
  
I think you're misunderstanding how PGP public-key encryption works.  
When you send an encrypted message, the first thing that happens is a 
random number called a session key is generated.  This session key is 
then used to encrypt the (compressed, possibly) original message with a 
symmetric cypher like AES256.  Then, this session key is encrypted with 
the recipient's public key (RSA or ElGamal).


When the message is received by the recipient, he uses his private key 
to decrypt the session key.  Then he uses the session key to decrypt the 
original message. 

If you're just using symmetric keys, you use AES256 directly.  The 
passphrase you type in is used as the session key, in this case 
(actually, there's a random number called salt appended to the 
passphrase to prevent certain attacks, but the idea is the same).  With 
public key cryptography, the software (via the public key algorithms) 
handles the (difficult) task of giving the recipient the decryption 
key.  With symmetric encryption, it's your responsibility to get the 
passphrase to the recipient.


If you're still not clear on this, you should definitely read something 
like Applied Cryptography, so that you can talk intelligently to your 
client about cryptography.  The biggest security problem with crypto is 
when it's misapplied (people think they're safe, but the crypto is 
merely obfuscating the message, not securing it).


Another good way to learn about symmetric encryption is to write your 
own simple encryption program.  http://ciphersaber.gurus.com/ will guide 
you through this.


Feel free to ask us any questions, though :)

Regards,
Jonathan Rockway






signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Bypass PIN entry

2015-11-27 Thread Harbord Jonathan-EURITEC
I am using GPG on windows.

Is there a way to pass the user PIN of a smartcard in a gpg-agent batch file or 
script?

I am using a nitrokey as a private key store for an unattended SFTP system.
It simply runs a WinSCP script to pickup and send files via SFTP.

Before the script runs I launch I run a batch file to invoke the gpg-agent:
gpg-connect-agent.exe" /bye

WinSCP is then able to use the private key on the smartcard. However, the first 
time I connect the pinentry program appears and requires me to enter the user 
PIN.

Is there a way for a script to pass this PIN and unlock the nitrokey when 
gpg-agent launches?


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: Provide user PIN to gpg-agent?

2015-12-02 Thread Harbord Jonathan-EURITEC
Niibe-san

Thank you so much for your help! It worked.

I was using gpg4win, which of course does not include v2.1. I need to download 
the windows version from gnupg.org.

I had some difficulty with the syntax of a windows batch file but eventually 
succeeded with

gpg-connect-agent.exe --run 

Where  contained:

OPTION pinentry-mode=loopback
/definqfile PASSPHRASE 
SCD CHECKPIN 
/bye


And where  was the ID of the card from gpg --card-status as you 
suggested,
and  was a file containing the PIN.

Thank you again for your kind advice.



-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of NIIBE 
Yutaka
Sent: 02 December 2015 03:07
To: gnupg-users@gnupg.org
Subject: Re: Provide user PIN to gpg-agent?

On 12/01/2015 10:50 PM, Harbord Jonathan-EURITEC wrote:
> Is it possible to pass the user PIN of a smartcard to gpg-agent in a command?
> 
> I'd like to stop the pinentry program appearing for an automated system.

Please note that I don't have any experience like that, and I don't generally 
recommend such a usage.

In general, we can provide a special application specific pinentry program for 
such a special purpose.

In GnuPG 2.1.x, there is allow-loopback-pinentry option.  When enabled it by 
.gnupg/gpg-agent.conf or as an argument invoking gpg-agent, we can do something 
like:

gpg-connect-agent \
"OPTION pinentry-mode=loopback"
'/definqfile PASSPHRASE /tmp/passphrase-for-smartcard' \
"SCD CHECKPIN " /bye


having a file /tmp/passphrase-for-smartcard, where  is the one in the 
output of 'gpg --card-status' like:

Application ID ...: D276000124010200F5170001

Substitute  by D276000124010200F5170001.

Please try.
-- 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Provide user PIN to gpg-agent?

2015-12-01 Thread Harbord Jonathan-EURITEC
Is it possible to pass the user PIN of a smartcard to gpg-agent in a command?

I'd like to stop the pinentry program appearing for an automated system.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpg --import-options import-drop-uids not available?

2020-03-03 Thread Jonathan Cross via Gnupg-users

Hello,

I see this option being added here:

http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=8e83493dae426fe36a0e0081198b10db1e103ff1

However it doesn't seem to have been released as of 2.2.19.

Is there a reason this still hasn't been released?

Thanks,  Jonathan




signature.asc
Description: Message signed with OpenPGP
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Batch generate keys without revocation cert?

2020-01-23 Thread Jonathan Cross via Gnupg-users
Hello,
I would like to batch generate keys, but *not* have a revocation cert
generated.
I do not see an option for this, how can it be done?

Thanks,  Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Batch generate keys without revocation cert?

2020-02-04 Thread Jonathan Cross via Gnupg-users
>
> On 2020-01-23 at 17:32 +0100, Jonathan Cross via Gnupg-users wrote:
>
> Hello,
> I would like to batch generate keys, but *not* have a revocation cert
> generated.
> I do not see an option for this, how can it be done?
> Thanks,  Jonathan
>
> From: ?ngel 
> To: gnupg-users@gnupg.org
> Subject: Re: Batch generate keys without revocation cert?
> Hello Jonathan
> See if this helps
>
> https://www.gnupg.org/documentation/manuals/gnupg/Unattended-GPG-key-generation.html
> Anyway, you could always generate a revocation certificate and then
> discard it.
> Kind regards


Thank you Angel,
I am already making extensive use of  batching, but (as you can see on the
linked page), there is no option to remove revocation certificates from
being generated.
Was there something specific there that I overlooked?
As you mentioned, I am deleting the revocation cert, but this is suboptimal.

A bit of background...
I was trying to use this for generating "vanity" keys (while using all of
the gpg mechanics, entropy, etc) -- so I need it as fast as possible.
I have come to see that this is far too slow to get an interesting key ID
of my choosing, so I will continue looking into other options like this:
https://github.com/osresearch/pgp-vanity-keygen (with modifications for
Curve25519 added)

If there was an option to provide my own fixed entropy, that would also be
helpful as I'd like to create that using Diceware.

If you have any suggestions, please let me know.

Thanks!  Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: ed448 support in gpg?

2020-03-11 Thread Jonathan Cross via Gnupg-users

>> Is ed448 available / in development?
> 
> Will be part of 2.3.

Great news!

> However, even then I do not suggest to create such
> a key because the majority of deployed software won't be able to use
> it.

How will older clients deal with a certification signature from this 
unrecognized algorithm?

> If you care about the secuity of your key use a smartcard.

Yes, I intend to do this with the subkeys (Curve25519)
Only the primary (certification key) would use ed448 which would rarely be used 
and only offline.

> Think of your threat model and, as usual, see https://www.xkcd.com/538/

Agreed  :-)
In this situation, I just want to avoid creating a new key-pair as long as 
possible and ed448 is likely to survive just a bit longer from what I 
understand.
Performance is irrelevant.

Jonathan


signature.asc
Description: Message signed with OpenPGP
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: ed448 support in gpg?

2020-03-13 Thread Jonathan Cross via Gnupg-users


> On Mar 11, 2020, at 3:58 PM, Andrew Gallagher  wrote:
> 
> Signed PGP part
> On 11/03/2020 12:30, Jonathan Cross via Gnupg-users wrote:
>> ed448 is likely to survive just a bit longer from what I understand.
> 
> It depends on how soon you think general-purpose quantum computers will
> be available. Elliptic-curve keys are *less* resistant to quantum
> algorithms than classically-equivalent RSA, due to their smaller size.

Ah, I was not aware of that.
Seems I should stick with RSA-4096 primary key for now.
I can add an Cv25519 subkey (and even an ed448 subkey later)



signature.asc
Description: Message signed with OpenPGP
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

ed448 support in gpg?

2020-03-10 Thread Jonathan Cross via Gnupg-users
Hello,

I am looking into making a new key that is as "future-proof" as possible.
Offline master key that is ed448 would be ideal if possible with Curve25519 
subkeys for daily use on a smartcard.

Is ed448 available / in development?
Or a similar 256bit "safe-curves" option?

Thank you,  Jonathan


signature.asc
Description: Message signed with OpenPGP
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: MacOSX help - beginner installation, first time

2020-05-25 Thread Jonathan Cross via Gnupg-users
Hi Cyrus,

1. This is the SHA256 checksum I get for GnuPG-2.2.20.dmg:

39970099819616d4b66a4e471ce26db97384948d0f375e02aae9d9de1d69baa5

2. The signature (GnuPG-2.2.20.dmg.sig) checked out for me:

gpg: Signature made Sat Mar 21 12:42:46 2020 CET
gpg:using RSA key 4F9F89F5505AC1D1A260631CDB1187B9DD5F693B
gpg: Good signature from "Patrick Brunschwig " [full]
gpg:   aka "Patrick Brunschwig " [full]
gpg:   aka "[jpeg image of size 13251]" [full]
Primary key fingerprint: 4F9F 89F5 505A C1D1 A260  631C DB11 87B9 DD5F 693B

Furthermore...

1. I have met Patrick Brunschwig in person, checked his government ID.
   He also checked mine.
2. We both cross-signed each other's keys.
3. You can verify this by getting our pubkeys from pgpkeys.urown.net
4. You can check the OpenPGP signature on this email to verify my key is:
   9386 A2FB 2DA9 D0D3 1FAF  0818 C0C0 7613 2FFA 7695


Now, of course you don't know me, but you now have a bit more info to go on.

Maybe there's someone in this list below that you know / trust to check ID
and / or verify key fingerprints?  My key:

https://pgpkeys.urown.net/pks/lookup?op=vindex=0xC0C076132FFA7695

Meeting people in person and verifying key fingerprints is of course best,
but not always a realistic option for every piece of software :-)

Good luck!

Jonathan



signature.asc
Description: Message signed with OpenPGP
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

gpg: used key is not marked for encryption use.

2021-07-23 Thread Jonathan Kaczynski via Gnupg-users
Hi,

I'm trying to understand the scenario in which we see the log message,
"gpg: used key is not marked for encryption use." I haven't been able to
find any mentions of the phrase on the web, so I turned to the source code.

Looking at
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=blob;f=g10/pubkey-enc.c;h=6e1b0898e4b3687ef4d57ae1a6270782723b01e3;hb=refs/heads/master#l146
it is a little difficult to tease out.

The context is I'm trying to debug why another party's encrypted file is
producing this extra log message by gpg-2.3.1, and if it matters. They used
a tool which uses the BouncyCastle java library.

Would someone be able to help me with this?

Thank you,
Jonathan Kaczynski
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Backing up your PGP key by hand

2022-05-02 Thread Jonathan Cross via Gnupg-users
Thank you for sharing this Francesco.

Yes, having a secure, durable offline backup is important.

Coming from the Bitcoin space, we've already explored many options in an
effort to allow users easily to back up private keys.

I have to say the effort involved in your method seems unrealistic for most
users:

> Considering a paperkey is less than 150 lines, that means it should take
50 sessions, or a little less than 2½ months to get it on paper. The whole
effort costs 50×10m ≃ 8 hours of your time.

In Bitcoin, we can use the BIP39 standard to backup nearly infinite number
of keys (trees of derived keys) with just 12 simple English words. It even
has a checksum! Only in the first four letters of each word are even
necessary as those are always distinct making input very quick and easy.

GPG would benefit from something similar.

Only 1% of the 1% of users, will put in the effort in that you did meaning
that most users are not properly backing up their PGP keys and or are
trusting computer hardware/printers.

I see there is efforts like paperkey word list:
https://github.com/vonshednob/paperkeywords

But ideally such a system should be standardized and built into gpg so that
users can be sure they will be able to restore keys.

One can actually use the most popular Bitcoin hardware wallet as a PGP
signing device. Since the device is backed up with a BIP39 "seed phrase",
you can effectively say that it's a way to backup GPG keys with 12 or 24
words:

https://support.ledger.com/hc/en-us/articles/115005200649-OpenPGP?docs=true

The fact that It has a screen and you can input the words directly into the
signing device means that you don't need an air gap computer as well.

That might be a good option for some people.

Jonathan
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users