Re: Card readers supported by GPG's internal drivers

2006-07-12 Thread Werner Koch
On Tue, 11 Jul 2006 20:16, Tony Whitmore said: Is there a compatibility list of drivers supported by GPG's internal card reader driver, other than the relevant part of the HOWTO? Do No there is no such list. This is becuase the driver implements the CCID specification with a few limitations

How to verify the file was successfully encrypted...

2006-07-12 Thread Benny Helms
Hi folks. I've read the man page. I've read the FAQ's. I'm not seeing what I'm looking for. Using something like zip, you can use a -T to test the integrity of the file. Note: this is not testing that nobody has altered it, or that it came from a specific user; it is only testing whether it

Re: Card readers supported by GPG's internal drivers

2006-07-12 Thread Tony Whitmore
On Wed, Jul 12, 2006 at 09:05:58AM +0200, Werner Koch wrote: On Tue, 11 Jul 2006 20:16, Tony Whitmore said: Is there a compatibility list of drivers supported by GPG's internal card reader driver, other than the relevant part of the HOWTO? Do No there is no such list. This is becuase

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Robert J. Hansen
Benny Helms wrote: I'm looking for a way to gpg encrypt a file, test that the encryption was good and that the file can be extracted, and then to delete the original file. Forgive a silly question, but what's wrong with decrypting the file as a way of verifying the encryption worked? At the

Re: Card readers supported by GPG's internal drivers

2006-07-12 Thread Mark Brown
On Tue, Jul 11, 2006 at 10:03:20PM +0100, Tony Whitmore wrote: I'm running Ubuntu Dapper. Am I right in thinking the entries in /proc/bus/usb/XXX/XXX should be modified to match the rules (i.e. group scard, mode 644)? Because they don't seem to be: Current systems with udev should use

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Janusz A. Urbanowicz
On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote: Hi folks. I've read the man page. I've read the FAQ's. I'm not seeing what I'm looking for. Using something like zip, you can use a -T to test the integrity of the file. Note: this is not testing that nobody has altered it,

Re: Card readers supported by GPG's internal drivers

2006-07-12 Thread Tony Whitmore
On Wed, Jul 12, 2006 at 12:02:12PM +0100, Mark Brown wrote: On Tue, Jul 11, 2006 at 10:03:20PM +0100, Tony Whitmore wrote: I'm running Ubuntu Dapper. Am I right in thinking the entries in /proc/bus/usb/XXX/XXX should be modified to match the rules (i.e. group scard, mode 644)? Because

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Benny Helms
On Wed, 2006-07-12 at 12:25 +0200, Janusz A. Urbanowicz wrote: On Tue, Jul 11, 2006 at 01:38:23PM -0600, Benny Helms wrote: snip What is your actual threat model here? The simplest answer is to check gpg's rc after the encryption run. Before deleting original file, I must make certain

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Benny Helms
On Wed, 2006-07-12 at 05:14 -0500, Robert J. Hansen wrote: Benny Helms wrote: I'm looking for a way to gpg encrypt a file, test that the encryption was good and that the file can be extracted, and then to delete the original file. Forgive a silly question, but what's wrong with

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Benny Helms
On Wed, 2006-07-12 at 13:23 -0400, Mark Hardman wrote: If you're using bash, can't you just script it like this... 1. encrypt to gpg 2. decrypt to text (or whatever it was originally) with altered file name (filename.test_decrypt) 3. do a diff between the original file and the newly

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread David Shaw
On Wed, Jul 12, 2006 at 11:57:21AM -0600, Benny Helms wrote: On Wed, 2006-07-12 at 13:23 -0400, Mark Hardman wrote: If you're using bash, can't you just script it like this... 1. encrypt to gpg 2. decrypt to text (or whatever it was originally) with altered file name

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Jonathan Rockway
There is no way to design such a self-check. This isn't a lack in GnuPG, but a design impossibility for any program. Think about it: a check mode would try and account for a bug in GnuPG and warn you that the file was not encrypted properly. However, if you're presuming a bug, then who says

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Jeffrey F. Bloss
Benny Helms wrote: snippage First off, I hope you've considered that gpg is doing what it's suppose to do and you're really trying to break it. If your encrypted files are corrupt at a later date, maybe you have another problem and don't *want* to make it just go away. IOW, be cautious that a

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Todd Zullinger
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Jonathan Rockway wrote: BTW, why are you encrypting these files anyway? If someone broke into your computer they could just steal the crypto key too. True, unless the private key isn't kept on the same machine. Which also would negate the

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Benny Helms
On Wed, 2006-07-12 at 13:11 -0500, Jonathan Rockway wrote: snip BTW, why are you encrypting these files anyway? If someone broke into your computer they could just steal the crypto key too. Excellent question! Truth be told, as soon as they are encrypted, they're being moved to another

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Benny Helms
On Wed, 2006-07-12 at 15:13 -0400, Jeffrey F. Bloss wrote: Benny Helms wrote: snippage Don't know if this will help or not, but I just did a quick test with GnuPG 1.4.4 and the --dry-run command line switch seem to work fine. Outputs to stdout rather than writing a file to disk. I changed

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Jørgen Lysdal
This might be a hard one. When you encrypt to a public key, there is no way gpg can decrypt it, to verify that it can be decrypted, unless it can unlock the private key with your password. The only way i see, is that gpg would have to encrypt 2 times and compare the results. But then again, the

Re: How to verify the file was successfully encrypted...

2006-07-12 Thread Alphax
Benny Helms wrote: On Wed, 2006-07-12 at 15:13 -0400, Jeffrey F. Bloss wrote: Benny Helms wrote: snippage Don't know if this will help or not, but I just did a quick test with GnuPG 1.4.4 and the --dry-run command line switch seem to work fine. Outputs to stdout rather than writing a file