Prime searching

2008-01-19 Thread Hardeep Singh
Hi Could any one tell me the high-level prime search method employed by GPG? Is it something like this: - generate a random number - is it prime? if yes, use it - if not, continue adding ones to it until a prime number is found Also, which algorithm is used by GPG for testing primality?

Re: Exit code 2 from PHP script

2008-01-19 Thread Vlad SATtva Miller
Brent Hagany wrote on 19.01.2008 02:39: Hello, This issue has been addressed several times on this list, but after several hours of searching, I cannot find a solution that works for me. Here's a simple test case that I cannot get to work: $out = exec(/usr/bin/gpg

Keyservers mangle with subkey binding sigs

2008-01-19 Thread Vlad SATtva Miller
While I understand that this place isn't the best for PKS bug reports, I'm still not sure of what's happening (except it's quite weird). My key 0x8443620A consists of a main certification key and two subkeys: one for encryption and one for signing. Both subkeys have expired in the end of the last

Re: Keyservers mangle with subkey binding sigs

2008-01-19 Thread Simon Josefsson
Vlad \SATtva\ Miller [EMAIL PROTECTED] writes: While I understand that this place isn't the best for PKS bug reports, I'm still not sure of what's happening (except it's quite weird). My key 0x8443620A consists of a main certification key and two subkeys: one for encryption and one for

Re: Keyservers mangle with subkey binding sigs

2008-01-19 Thread Vlad SATtva Miller
Simon Josefsson wrote on 19.01.2008 17:15: Vlad \SATtva\ Miller [EMAIL PROTECTED] writes: [snip] If I understand this correctly and not missing something terribly here, keyservers just looked at newly uploaded key, thought huh? I already have that subkey in place, and this 0x18 sig too!, and

Re: Keyservers mangle with subkey binding sigs

2008-01-19 Thread Charly Avital
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Vlad SATtva Miller wrote the following on 1/19/08 6:01 AM: [...] | Here for example (in the bottom) you may see two subkeys with binding | signatures expired at 2007-12-31: |

Re: Keyservers mangle with subkey binding sigs

2008-01-19 Thread Vlad SATtva Miller
Charly Avital wrote on 19.01.2008 18:26: Vlad SATtva Miller wrote the following on 1/19/08 6:01 AM: [...] | Here for example (in the bottom) you may see two subkeys with binding | signatures expired at 2007-12-31: | http://pool.sks-keyservers.net:11371/pks/lookup?search=0x8443620Aop=vindex

Re: Why gpg complains?

2008-01-19 Thread Gonzalo Bermúdez
GnuPG is warning you since you seem to have not signed the Key. IF you trust the key (i.e. you are sure to a reasonable degree that the key owner is who he claims to be), then you should sign it and the warning will go away. To do so from the command line: gpg --edit-key key id sign (1) save

Re: Keyservers mangle with subkey binding sigs

2008-01-19 Thread Charly Avital
Vlad SATtva Miller wrote the following on 1/19/08 8:38 AM: [...] So here's an explicit distinction between what we got from a keyserver and from the gpg output. As far as I am concerned, that's what I got from the keyserver I used, yes. I believe [EMAIL PROTECTED] posted that: I'm not

Fwd: is there any remote possibility to recover passphrase?

2008-01-19 Thread [EMAIL PROTECTED]
Hi all and thank you for GnuPG! I was wondering whether one attacker who'd be in possess of my private and public keys, my entire archive of encrypted data, and a common file which for sure is just plain the same as an encrypted one of my backup, could in some way and time recover my

Re: is there any remote possibility to recover passphrase?

2008-01-19 Thread David Picón Álvarez
When in doubt, use brute force. So, the answer is, it depends on the strenght of your passphrase. --David. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: is there any remote possibility to recover passphrase?

2008-01-19 Thread [EMAIL PROTECTED]
=~~=~=~=~=~=~=~=~=~=~=~=~=~~= 19:41 (sabato), David Picón Álvarez: When in doubt, use brute force. So, the answer is, it depends on the strenght of your passphrase. --David. So if the strenght of passphrase is something like 25 chars (a-Z,0-9,non alphanumeric) I can rest assured nobody

Re: is there any remote possibility to recover passphrase?

2008-01-19 Thread Robin H. Johnson
On Sat, Jan 19, 2008 at 08:54:26PM +0100, [EMAIL PROTECTED] wrote: =~~=~=~=~=~=~=~=~=~=~=~=~=~~= 19:41 (sabato), David Pic?n ?lvarez: When in doubt, use brute force. So, the answer is, it depends on the strenght of your passphrase. --David. So if the strenght of passphrase is something

Re: Fwd: is there any remote possibility to recover passphrase?

2008-01-19 Thread Robert J. Hansen
[EMAIL PROTECTED] wrote: gpg, but let my keys available to the attacker, would he theorically be able to crack my passphrase and recover all of my archive? Yes. Please note how you qualified that: /theoretically./ In practice, given a good passphrase, this is highly nontrivial.

Re: is there any remote possibility to recover passphrase?

2008-01-19 Thread Robert J. Hansen
[EMAIL PROTECTED] wrote: So if the strenght of passphrase is something like 25 chars (a-Z,0-9,non alphanumeric) I can rest assured nobody today or in a year could possibly decrypt even someone with a distributed super calculus hardware power, is it? Depends. English text has about 1.5 bits