[Announce] GPA 0.9.4 released

2013-05-01 Thread Werner Koch
Hello! We are pleased to announce GPA version 0.9.4. GPA is a graphical frontend for the GNU Privacy Guard (GnuPG, http://www.gnupg.org). GPA can be used to encrypt, decrypt, and sign files, to verify signatures and to manage the private and public keys. You can find the release here:

[Announce] GPGME 1.4.1 released

2013-05-01 Thread Werner Koch
Hello! I am pleased to announce version 1.4.1 of GPGME. GnuPG Made Easy (GPGME) is a C language library that allows to add support for cryptography to a program. It is designed to make access to public key crypto engines as included in GnuPG easier for applications. GPGME provides a high-level

Re: random_seed - no locks available

2013-05-01 Thread Peter Pentchev
On Mon, Apr 29, 2013 at 09:29:58PM +, Henry Hertz Hobbit wrote: On 04/29/2013 02:43 PM, M Russell wrote: Hello, I hope someone might be able to lend me a hand. I am running into an error message that I resolve. I get a lock error when trying to encrypt or decrypt a file. I found

Re: random_seed - no locks available

2013-05-01 Thread Peter Pentchev
On Wed, May 01, 2013 at 03:44:09PM +0300, Peter Pentchev wrote: On Mon, Apr 29, 2013 at 09:29:58PM +, Henry Hertz Hobbit wrote: On 04/29/2013 02:43 PM, M Russell wrote: Hello, I hope someone might be able to lend me a hand. I am running into an error message that I resolve. I

Re: Confusion with signature digest type.

2013-05-01 Thread Daniel Kahn Gillmor
On 04/28/2013 04:26 AM, Robert J. Hansen wrote: On 4/27/2013 8:01 PM, Daniel Kahn Gillmor wrote: I don't think this recommendation was made to defend against preimage attacks. Avoiding the use of SHA-1 in certifications in general is a step towards defend against collision attacks, which is

RE: random_seed - no locks available

2013-05-01 Thread brewsome
Thanks for the responses. I did find out that the home drive is a NFS mount. NFS is version 3, and I don't see any nolock option specified in /etc/fstab. It appears that NFS is mounted properly. I'm thinking it might be a NFS problem too, but not sure were. I'll dig into that side more.

Re: Web of Trust in Practical Usage

2013-05-01 Thread Daniel Kahn Gillmor
Peter Lebbing's thoughtful consideration of the issues in this thread was spot-on, imho. Thanks, Peter! On 04/29/2013 12:29 AM, Quinn Wood wrote: My question in simpler terms could probably be summed up How can one find the most popular- most signed- key (matching some query such as name or

Re: Confusion with signature digest type.

2013-05-01 Thread Robert J. Hansen
On 5/1/2013 10:16 PM, Daniel Kahn Gillmor wrote: It doesn't facilitate a collision attack against that specific certification; but if a collision attack is possible against a particular digest, then *any* signature made over that digest becomes suspect. First, thank you for a thorough reply.

Re: Confusion with signature digest type.

2013-05-01 Thread Daniel Kahn Gillmor
On 05/02/2013 12:03 AM, Robert J. Hansen wrote: Eve manages to inject data into your collection that makes the data collection have the same digest as a particularly weird User ID when bound to your primary key (i'm handwaving past the details of the OpenPGP boilerplate involved in a self-sig

Re: Confusion with signature digest type.

2013-05-01 Thread Robert J. Hansen
On 5/2/2013 12:33 AM, Daniel Kahn Gillmor wrote: if it was a preimage attack (even for SHA1), then yeah, it'd be game over in a lot of horrible ways i don't want to think about in detail right now :) I think I can make a compelling argument this is a preimage attack and not a collision attack,

Re: Confusion with signature digest type.

2013-05-01 Thread Robert J. Hansen
On 5/2/2013 12:48 AM, Robert J. Hansen wrote: She cares what the collision is: it has to be a valid OpenPGP signature sequence. Erf, did I really write that? s/signature/User ID The point being the User ID isn't allowed to be completely arbitrary: there's a lot of structure to it. I think

Re: Confusion with signature digest type.

2013-05-01 Thread Daniel Kahn Gillmor
On 05/02/2013 12:51 AM, Robert J. Hansen wrote: On 5/2/2013 12:48 AM, Robert J. Hansen wrote: She cares what the collision is: it has to be a valid OpenPGP signature sequence. Erf, did I really write that? s/signature/User ID The point being the User ID isn't allowed to be completely