On Tue 2015-02-17 13:48:26 -0500, Thomas White wrote:
I have a private key I am trying to recover the passphrase hash from
to try and then use in conjunction with another tool (hashcat?) to
recover the passphrase on a GPU cluster I have.
How would one go about extracting the passphrase hash
On Tue, 17 Feb 2015 21:12, er...@askerrol.org said:
But it fails openpgp tests, and all executable exit with an Abort message.
Please run such an executable under a debugger and privide a stack
backtrace. Using gdb you would use:
gdb g10/gpg
then enter break abort, run, and after it
On Tue, 17 Feb 2015 20:23, r...@sixdemonbag.org said:
S # . pool.sks-keyservers.net
S # . -- 6 8 1 13 20 4 10 11 7 2 15 5 12 17 9 19* 14 3 16 18
S # 19 6 sks.spodhuis.org v6=[2a02:898:31::48:4558:73:6b73]
You are using this keyserver. ping6 shows that this server is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Tue, Feb 17, 2015, at 10:48, Thomas White wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I have a private key I am trying to recover the passphrase hash from
to try and then use in conjunction with another tool (hashcat?) to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/18/2015 07:31 AM, Xavier Maillard wrote:
Hi,
in order to announce my new GPG key I have written a key
transition document.
gpg --output keytransition.signed --clearsign keytransition.txt
This works for one GPG key but how can I
On Tue, 17 Feb 2015 17:31, mar...@martinpaljak.net said:
GnuPG just got a huge sum of money, I'm sure arrangements can be made
to allocate some of that for a easy to use and *free* OSX version with
an integrated GUI ?
I would consider it unfair to all true free software developers to take
the
You are using this keyserver. ping6 shows that this server is
currently up. May it be that your v6 routing is not working
correct?
I don't have IPv6 routing, period. This raises the question of why
GnuPG is trying to reach an IPv6 address at all.
Worked fine under 2.0.x; under 2.1, this
On Tue, 17 Feb 2015 17:00, mailing-li...@asatiifm.net said:
command line tools. *I think there is no more reason to develop
MacGPG*, i.e. a port, anymore. Let the port die.
Can you briefly explain how Patrick's new installer [1] is related to that?
Would it be an option to use that as the core
Hi,
in order to announce my new GPG key I have written a key transition
document.
I am at the step where I should/must sign it with both keys (old and
new one).
I can sign (inline) my document using this:
gpg --output keytransition.signed --clearsign keytransition.txt
This works for one GPG
On Tue, 17 Feb 2015 00:53, h...@barrera.io said:
git://github.com..., since any malicious attacker can intercept that
communication. There's no checksuming or anything to make this difficult *at
all*.
What *does* suprise me is that there's a commit to specifically remove git+ssh
in favour
On 17.02.2015, Werner Koch wrote:
git meanwhile allows to sign commits. If anyone knows a method to set a
different key for tagging and commits, I would soon start to sign each
commit.
I can be seriously wrong, but is that not something the LKML people do?
I’ve had some concerns about GPGTools for months now. For some time I've
disliked the way the project is being run, the communication of what they are
planning and the way they have been doing their development for example. Months
went by when their Yosemite betas were not available in source
I have posted a message in the GPG Tools support forum
copying the original post in this thread, letting the developers
know of the concerns raised here.
Perhaps you will see some comments in the near future.
Sandeep Murthy
s.mur...@mykolab.com
On 17 Feb 2015, at 13:31, Werner Koch
http://support.gpgtools.org/
If you are a security project, you should be thankful for people reporting
bugs, not trying to make it as hard as possible to report a serious bug. This
looks like more of a users help users forum kind of thing, nothing where
you would want to report a
On 2015-02-17 11:01, Jonathan Schleifer wrote:
I disagree. The developers are not capable of writing secure software, as
demonstrated (several times even, it seems). It would be best to advise to
never use that at all and then write new software, if there's demand for it.
It's sometimes
On Mon, 16 Feb 2015 22:48, js-gnupg-us...@webkeks.org said:
@bash -c $$(curl -fsSL
https://raw.github.com/GPGTools/GPGTools_Core/master/newBuildSystem/prepare-core.sh)
Bad idea to directly run code from a foreign remote site. I'd
appreciate if someone from gpgtools.org can comment on
You don't know that the hosts in those two situations are the
same...
I know, which is why I said:
It also affects all keyservers I tested, not just the round-robin
front-end.
I tried several different non-round-robin servers. Same thing.
___
Actually, I've noticed that there was a very quick reply to this when it was
brought to the dev's attention. I'll leave this here for anyone else
interested
in following-up:
https://github.com/GPGTools/GPGTools_Core/commit/5186bade36acedfdc0b76f9f5ddfcfc004ec698b
I'm not aware of
On Mon, 16 Feb 2015 20:40, m...@rainerkeller.de said:
For me it looks like the authentication private key uses the encryption pin
(Auth ID 0x02) while it should use the signature pin.
It tried to set the encryption pin via pkcs15-tool --auth-id 02
[ You should not use this tool for the
On 17 Feb 2015, at 18:31, Martin Paljak mar...@martinpaljak.net wrote:
Not sure about overall GnuPG affection with Apple or other closed
source software, but the PC/SC layer in Yosemite is broken (again):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I have a private key I am trying to recover the passphrase hash from
to try and then use in conjunction with another tool (hashcat?) to
recover the passphrase on a GPU cluster I have.
How would one go about extracting the passphrase hash from
On 17 Feb 2015, at 21:16, Juergen Fenn schneeschme...@googlemail.com wrote:
as you've pointed
out, the GPGTools have decided to go all commercial including, I
didn't realise this before, a closed code repository so that no one
can study the code? Is this true? I can't believe it.
That’s
2015-02-17 17:31 GMT+01:00 Martin Paljak mar...@martinpaljak.net:
So, generally speaking: if the upstream has not catered to the OSX
folks and somebody on the internet has, I would not blame GPGTools
guys for doing it. Yes, it would be nice if one at least tried to
contribute back to upstream
On 17 Feb 2015, at 21:03, Sandeep Murthy s.mur...@mykolab.com wrote:
As a user, not a developer on MacGPG, the issues previously
raised here about the remote execution of scripts etc. may be
questionable, but they do not directly affect my use of the software,
which is nothing but a front
Jerry writes:
...Worse,
since most users have no concept of trimming a message before replying to
it, even more useless garbage is transmitted when replied to, thus killing
more innocent electrons and wasting bandwidth not to mention the consumption
of screen territory.
Does that make you an
On Tue, Feb 17, 2015 at 6:00 PM, Ville Määttä
mailing-li...@asatiifm.net wrote:
Instead they should use upstream and contribute the minimal amount of
wrappers or fixes upstream. Case in point: Has the fix for gpg-agent /
scdaemon hang been discussed upstream at all [4], [5]? In MacGPG there
Am 17.02.2015 um 07:53 schrieb Sandeep Murthy s.mur...@mykolab.com:
I'm guessing because you need an SSH key at GitHub in order to pull via SSH.
Yet another problem solved by git modules.
Still, they could have at least changed it to https.
GitHub supports pull/push via SSH or HTTPS
On Tue, 17 Feb 2015 00:16:26 +, MFPA stated:
I like that advantage of keeping it all visible in the message body.
That is the reason I detest INLINE as opposed to PGP/MIME. The insertion of
superfluous garbage in the message body is annoying to say the least. Worse,
since most users have no
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/17/2015 02:21 AM, Robert J. Hansen wrote:
Is there any explanation for this behavior, or is this a 2.1.2
bug? (This is using Patrick's OS X package, if that matters. It
also affects all keyservers I tested, not just the round-robin
I would also add that if you agree that more people should
be using encryption in more forms then the way to go is
to make it more more usable and user friendly (and at the
moment the standard GnuPG version can’t exactly be described as
that) then this is not an aspiration that should be described
gpg-connect-agent --dirmngr 'keyserver --hosttable' /bye
Okay. I have no idea what I'm looking for, but here goes.
quorra:~ rjh$ gpg-connect-agent --dirmngr 'keyserver --hosttable' /bye
S # hosttable (idx, ipv6, ipv4, dead, name, time):
S # 0 pool.sks-keyservers.net
S # .
I suppose if you were conceited enough to describe yourself
as a “power user” then you might be dumb enough to think
that people who use GPG Suite are “dumb users”.
Platform fanatics and those make an easy job of caricaturing
themselves in their fanaticism for a “pure setup”, which is an
I have successfully compile gnupg 2.0.26 on Solaris 10 using gcc (GCC)
3.4.3 (csl-sol210-3_4-branch+sol_rpath)
But it fails openpgp tests, and all executable exit with an Abort message.
I cannot determine what is causing this abort, but it I can
successfullyexecute programs to generate keys.
On 2/17/15 12:12 PM, Errol Casey wrote:
gpg: WARNING: unsafe ownership on homedir `.'
What are the permissions on your home directory, and your ~/.gnupg
directory?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
Hi all,
since we’ve only now subscribed to the gnupg-users list, unfortunately we can’t
reply to the correct message in the thread.
First off we’d like to apologize for not reacting sooner to this issue. We only
today became aware of it, when we received a message on our support platform
On Tue, 17 Feb 2015 02:21, r...@sixdemonbag.org said:
quorra:~ rjh$ gpg - --keyserver x-hkp://pool.sks-keyservers.net
--recv-key 0xD6B98E10
gpg: using character set 'utf-8'
gpg: keyserver receive failed: No route to host
It should have swithed to the next host of the
36 matches
Mail list logo