On 11/06/13 23:57, Smith, Cathy wrote:
Hi
A couple of years ago I created a gpg key for an account that is use to
transfer documents with vendors. It's worked fine. We now have a new vendor
that won't accept the public key because of the expiration date. I don't see
a way to create
On 09/10/13 21:42, Jan wrote:
10/9/2013 14:19, Werner Koch wrote :
So what about using that free USB stack for AVR's to implement a flash
device? You would be able to audit about everything; flylogic even has
these nice pictures of the ATmega88 masks...
10/9/2013 16:33, David Smith wrote
On 09/10/13 15:16, Jan wrote:
I don't understand this, what does AVR etc. mean? Is there a substituion for
USB? I'd be grateful for an explanation.
AVR is a semiconductor manufacturer who make microcontrollers (amongst
other things).
___
Gnupg-users
, and your addressees verify that the public keys they
have really do belong to you, you can be confident that the signature
mechanism is safe.
--
David SmithWork Email: dave.sm...@st.com
STMicroelectronics Home Email: david.sm...@ds-electronics.co.uk
Bristol, England GPG Key
On 07/26/13 22:20, Johan Wevers wrote:
Yes, I know the mantra, and I'm sure that obvious backdoors are not
present because they would be found rather quickly. However, more subtle
bugs leading to decipherable messages can take more time to find. The
infamous PRNG bug in pgp 5 on Unix is a
On 06/12/13 10:49, Nils Faerber wrote:
Am 12.06.2013 07:24, schrieb Navin:
Since GnuPG comes under the GPL, I would like to clarify if a person's
proprietary software makes use of GnuPG purely by invocation of the
commandline commands, and the GnuPG exe's and DLL's are bundled
unmodified with
On 05/22/13 09:59, Zece Anonimescu wrote:
Hey fellas!
For the sake of portability I was reading about keeping the keyring on a
removable drive. I searched online but I get other things. Is it
possible to have the keys some other place? How do I tell GnuPG on some
other computer that it
On 05/03/13 12:58, Lema KB wrote:
Hi Werner
let's say, user_1 created public-private-key_1. then senders should
encrypt it with public-key_1 but for all user_1, user_2, etc.
with which private key will user_2, user_3,.. decrypt this file.csv,
which is encrypted with public-key_1?
No.
On 05/03/13 15:02, Lema KB wrote:
can a symmetric cipher be/use also public-private-keys?
No. The whole point of public/private cryptography is to use asymmetric
ciphers.
(caveat: actually, this is an over-simplification. In reality, gpg DOES
use symmetric ciphers, but in a way that makes it
On 03/25/13 20:05, Jan Chaloupecky wrote:
On Monday, March 25, 2013 at 8:36 PM, Werner Koch wrote:
On Mon, 25 Mar 2013 16:00, chal...@gmail.com
so the question is .. can I ship the idea shared object with my software?
The idea.c contains the following comments. So if I understand it
You need
On 03/26/13 10:30, Jan Chaloupecky wrote:
Sorry, I sent the last mail only to Hubert.
I was saying that Squeeze does not have in any of its repositories the
versions that support IDEA:
Max version of GnuPG is 1.4.12
On 03/05/13 16:45, BassToGo123 wrote:
I apologize for my inpatients. I have scoured the internet for a
discussion board or some other way of finding support for this program,
and this board is the only one I could find. Not that it matters to
anyone here, but not resolving this problem in a
On 01/04/13 17:31, David Shaw wrote:
Sure, paperkey supports piping the output into whatever code generator you
like:
gpg --export-secret-key mykey | paperkey --output-format raw |
your-bar-code-generator
However, 2D bar codes have some of the problems that paperkey is intended to
On 09/13/12 16:47, ved...@nym.hush.com wrote:
The discussion about 'safe' text editors brings about an
interesting question:
Is an editor needed at all?
Why not just input text into gnupg and then encrypt the inputted
txt without saving it as file at all ?
example:
$ printf just a
Davi Barker wrote:
Werner,
Thanks for you help. I discovered a list of libraries that needed to be
installed prior to GnuPG. I got that figured out, but now I'm getting a
new error message:
compress.c:34:18: fatal error: zlib.h: No such file or directory
compilation terminated.
It looks
Robert J. Hansen wrote:
IIRC, it was a response to laws like the United Kingdom's RIPA which
allows the authorities to demand encryption keys from users. By
separating encryption and signing into separate subkeys, and making the
signing subkey the 'master' one, it allows users to divulge
m.aflakpar...@ut.ac.ir wrote:
I need to decrypt .gz.gpg files (e.g. 70195_C1_WTCCCT442627.CEL.gz.gpg).
I have the encryption key(passphrase).
Remember that the passphrase is not the key. The key is stored in a
file, and that file is protected by the passphrase so that only people
who know the
Please remember to keep the GnuPG users' mailing list in copy in case
anyone else has any better ideas.
m.aflakpar...@ut.ac.ir wrote:
Thank you Dave,
I tried again with this command:
gpg --decrypt-file myfile.gpg
and entered the passphrase when I was asekd to enter it.
But, this error
Possibly a bit off-topic, but...
Does anyone have any experience of using an MS Exchange server, where it
corrupts PGP-MIME emails by re-encoding the encrypted data in base64?
If I'm going to complain to our local IT about it, I need some hard
evidence about how it's breaking the PGP-MIME RFC.
Ben McGinnes wrote:
On 2/09/11 3:02 AM, Julian H. Stacey wrote:
(talk about a long password). However, which tool is used to encrypt it?
Would running the unix 'file' command give a clue ?
Nope, it just comes up as data and the only clue as to what type is
the .aes256 extension it's been
m...@vp.pl wrote:
Hello
I have a question. I want to encrypt file that consists of one word for
example 'home with AES'. When I did encryption I got file that is 49
bytes. How can I separate my encrypted 4-byte word from the rest of
file. I need only encrypted part of my word, I don't want to
griffmcc wrote:
Although I can encrypt a file using a script, when crontab runs the same
script, it returns the error message “no default secret key: No secret
key”. I have one secret key:
sananselmo backupscripts.d # gpg --list-secret-keys
/root/.gnupg/secring.gpg
jimbob palmer wrote:
In Firefox I can sign or encrypt or encrypt+sign an e-mail.
In what case would I want my encrypted emails also signed? Does it
provide any additional benefit over a pure encrypted email?
Signing and encrypting serve different purposes.
Encrypting a mail ensures that
Jameson Rollins wrote:
We should be careful not to overstate the impatience of users too much.
I've seen plenty of people wait many seconds for google maps to load on
phones without giving up on the whole process. I also have an extremely
slow machine were I routinely have to wait a long time
Daniel Kahn Gillmor wrote:
On 09/24/2010 09:54 AM, David Shaw wrote:
It won't work with the current generation of OpenPGP smartcards. It also
will be dreadfully slow if you (or someone you are communicating with) ever
uses the key on a small machine (think smart phone). If you are usually
Jean-David Beyer wrote:
David Smith wrote:
Not truly quantitative, but I notice a significant difference
between encrypting emails to people with 1024-bit keys vs people with
4096-bit keys. I'd say that the difference is in the order 3-6
seconds.
I'm running GnuPG 1.4.x on a Sun Ultra10
Snaky Love wrote:
Hi David,
thank you very much for your explanation!
May I ask a few final questions about this issue:
- are there any tools at all that handle the group crypto + archive
use-case satisfactory? (Yes, PM me your ads :)
- what is the current state of research regarding
Snaky Love wrote:
Hi,
thank you very much for the interesting discussion.
About GSWoT - does this cover my described use-case? I don´t quite get
it from a first glance on the website...
Well, I've only just learned about it by reading the website, but...
Not really.
From what I can
m...@proseconsulting.co.uk wrote:
I need to be able to ultimately trust a public key in batch mode, that I
have downloaded automatically with wget from an internal server over HTTPS.
I don't want to do --trust-model always, apart from the fact I want to
use a trusted key anyway, gpg
Robert wrote:
Hi, we're using GnuPG 1.4.5 to encrypt and store sensitive files at
work. We have been given some requirements to comply with, spawning some
general questions. I tried searching in help files but haven't found
answers to everything so I'm trying here. If this questions are asked
Robert wrote:
7) I assume the key rings themselves, holding the keys, are encrypted.
How strong is this encryption in GPG? What algorithm is used, etc? One
requirement is about compromising the machine with the keys, how easy it
would be to export the keys. Since the keyring is physically
Jean-David Beyer wrote:
David Smith wrote:
Mailing lists programs normally send mails with the Precedence: bulk
or Precedence: junk header, and then the autoresponder should
recognise this and choose not to respond to mails with the bulk or
junk precedence header. It is up
Jean-David Beyer wrote:
Well, the stuff I get from the Gnupg-users@gnupg.org list has
precedence: list set. Other lists to which I subscribe use Precedence
normal or precedence: bulk. Regular e-mail does not have precedence
set at all. It seems to me that mailing lists should get their acts
Gorugantu, Prakash wrote:
Our project has a requirement where we need to pull a file using PGP
encryption/decryption from one of our clients ftp servers. Please let us
know if we can use GNUPG to encrypt/decrypt files with PGP. We read
somewhere in your licensing agreement that GNUPG for PGP
erythrocyte wrote:
On 3/11/2010 3:29 PM, Dan Mahoney, System Admin wrote:
On Thu, 11 Mar 2010, erythrocyte wrote:
Ref:
http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/
Okay, let me sum up this article for you:
Researchers who had physical
is that it's looking for a C compiler (e.g.
gcc) and you haven't got one installed.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
people aren't
deliberately trying to fool it), it would work.
If you're running on UNIX (particularly Linux), look at 'man file'.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West
about the difficulty of proving that you don't have
access to a particular piece of information.
The RIPA is a particularly nasty piece of legislation in this respect.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile
by putting encrypted data onto someone's computer and tipping
off the authorities.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
, you then have the key exchange problem.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work Email: dave.sm
you see a problem
with the key once it's been imported into GPG, don't worry about it.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key
separately:
my_command 1 stdout_goes_here.txt 2 stderr_goes_here.txt
Otherwise, you need to be a bit more specific as to exactly what you want
to do (and which shell you're running in).
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454
is bouncing
I can't access http://www.gnupg.org/mailing-lists.en.html to see if
there's a better list to send to than this one either!
I'm hoping someone here can do something about it
Works OK for me, so either someone's already fixed it, or it was a
transient problem.
--
David Smith
.
To help my understanding a little futher, if this does not always
occur, or does not usually occur, when does it occur (not occur)?
Using what ciphers (algorithms)?
Typical usage for gpg will be ElGamal for the asymmetric public/private
key bit, and AES for the symmetric cipher.
--
David Smith
On Thu, Mar 26, 2009 at 07:51:15PM +1000, Felipe Alvarez wrote:
I was unable to find adequate explanations online.
http://www.gnupg.org/gph/en/manual/x209.html
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44
, on the GnuPG website, and
if you still have questions, come back and ask...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury
the passphrase?
Maybe it's considered a security risk because it doesn't necessarily
have the usual UNIX (or other OS) permissions set to make it accessible
only by its owner? Or maybe it's just there to discourage people from
transporting secret keys around?
--
David Smith| Tel: +44 (0
length, algorithm strength and
speed of development of computing hardware
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury
if it's only left half or right half, that
divides the search space by 2^number_of_keypresses.
The technique doesn't have to be absolutely perfect; just good enough to
reduce the search space down to something that can realistically be
brute-forced.
Like I said, interesting project... :-)
--
David
On Thu, Aug 07, 2008 at 03:49:52PM +0200, Farkas, Illes wrote:
Do you happen to know how to use gpg recursively on a directory, similarly
to gzip -r and gunzip -r ?
find directory -type f -exec gpg --encrypt-files '{}' --recipient name \;
HTH...
--
David Smith| Tel: +44 (0)1454
On Thu, Aug 07, 2008 at 09:54:13AM -0600, Eliot, Christopher wrote:
gpg arguments `find . -type f`
will get you pretty close.
Close, but if you've got lots of files, you'll hit the maximum command
line length limit.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
then give them this exported secret key. Of course, you need to
be very careful about how you transport this secret key around.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA
.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work Email: [EMAIL PROTECTED]
BRISTOL, BS32 4SQ | Home Email: [EMAIL
that this is a bad thing to do. What
problems does it cause?
TIA...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury
sign or edit a key
|
+- adduid add a user ID
HTH...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury
. Don't give
it away.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work Email: [EMAIL PROTECTED]
BRISTOL, BS32
be generated from the public key, for obvious
reasons.
Somehow I think you've lost the secret part of the subkey.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380
'?
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work Email: [EMAIL PROTECTED]
BRISTOL, BS32 4SQ | Home Email
to look around in the places where you generated/stored
the key to see if you can find it. If you can't find it, then I'm
afraid that you're stuffed - you won't be able to decrypt your encrypted
information (short of brute-force cracking it).
Sorry for being the bearer of bad news...
--
David
bytes of data, but the operations in the loop
are much more complicated.
If you want more info, FIPS180-2 is the document you're after.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West
find incredible).
Of course, encryption is more about integer performance than FLOPS, but
I suspect that integer performance has scaled in the same orders of
magnitude.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile
On Fri, Oct 27, 2006 at 07:26:24PM +0200, Werner Koch wrote:
On Fri, 27 Oct 2006 16:10, David SMITH said:
I'm having some problems with my GnuPG-generated key. I have one
primary DSA for signing (which does not expire), and then every 6 months
I generate a new El-Gamal encryption key
] from hkp server wwwkeys.bri.st.com
(1) David Smith (Home) [EMAIL PROTECTED]
David Smith (STMicroelectronics) [EMAIL PROTECTED]
1024 bit DSA key F13192F2, created: 2002-02-12
Enter number(s), N)ext, or Q)uit 1
gpg: requesting key F13192F2 from hkp server
63 matches
Mail list logo