Re: question about public keys

2013-11-07 Thread David Smith
On 11/06/13 23:57, Smith, Cathy wrote: Hi A couple of years ago I created a gpg key for an account that is use to transfer documents with vendors. It's worked fine. We now have a new vendor that won't accept the public key because of the expiration date. I don't see a way to create

Re: Why trust gpg4win?

2013-09-13 Thread David Smith
On 09/10/13 21:42, Jan wrote: 10/9/2013 14:19, Werner Koch wrote : So what about using that free USB stack for AVR's to implement a flash device? You would be able to audit about everything; flylogic even has these nice pictures of the ATmega88 masks... 10/9/2013 16:33, David Smith wrote

Re: Why trust gpg4win?

2013-09-10 Thread David Smith
On 09/10/13 15:16, Jan wrote: I don't understand this, what does AVR etc. mean? Is there a substituion for USB? I'd be grateful for an explanation. AVR is a semiconductor manufacturer who make microcontrollers (amongst other things). ___ Gnupg-users

Re: Some doubts about signature procedure

2013-09-09 Thread David Smith
, and your addressees verify that the public keys they have really do belong to you, you can be confident that the signature mechanism is safe. -- David SmithWork Email: dave.sm...@st.com STMicroelectronics Home Email: david.sm...@ds-electronics.co.uk Bristol, England GPG Key

Re: Why trust gpg4win?

2013-08-23 Thread David Smith
On 07/26/13 22:20, Johan Wevers wrote: Yes, I know the mantra, and I'm sure that obvious backdoors are not present because they would be found rather quickly. However, more subtle bugs leading to decipherable messages can take more time to find. The infamous PRNG bug in pgp 5 on Unix is a

Re: Clarifying the GnuPG License

2013-06-12 Thread David Smith
On 06/12/13 10:49, Nils Faerber wrote: Am 12.06.2013 07:24, schrieb Navin: Since GnuPG comes under the GPL, I would like to clarify if a person's proprietary software makes use of GnuPG purely by invocation of the commandline commands, and the GnuPG exe's and DLL's are bundled unmodified with

Re: Keyring on external encrypted drive

2013-05-22 Thread David Smith
On 05/22/13 09:59, Zece Anonimescu wrote: Hey fellas! For the sake of portability I was reading about keeping the keyring on a removable drive. I searched online but I get other things. Is it possible to have the keys some other place? How do I tell GnuPG on some other computer that it

Re: Suggest please

2013-05-03 Thread David Smith
On 05/03/13 12:58, Lema KB wrote: Hi Werner let's say, user_1 created public-private-key_1. then senders should encrypt it with public-key_1 but for all user_1, user_2, etc. with which private key will user_2, user_3,.. decrypt this file.csv, which is encrypted with public-key_1? No.

Re: Suggest please

2013-05-03 Thread David Smith
On 05/03/13 15:02, Lema KB wrote: can a symmetric cipher be/use also public-private-keys? No. The whole point of public/private cryptography is to use asymmetric ciphers. (caveat: actually, this is an over-simplification. In reality, gpg DOES use symmetric ciphers, but in a way that makes it

Re: IDEA License

2013-03-26 Thread David Smith
On 03/25/13 20:05, Jan Chaloupecky wrote: On Monday, March 25, 2013 at 8:36 PM, Werner Koch wrote: On Mon, 25 Mar 2013 16:00, chal...@gmail.com so the question is .. can I ship the idea shared object with my software? The idea.c contains the following comments. So if I understand it You need

Re: IDEA License

2013-03-26 Thread David Smith
On 03/26/13 10:30, Jan Chaloupecky wrote: Sorry, I sent the last mail only to Hubert. I was saying that Squeeze does not have in any of its repositories the versions that support IDEA: Max version of GnuPG is 1.4.12

Re: Public Keys not showing up in Choose Recipients

2013-03-06 Thread David Smith
On 03/05/13 16:45, BassToGo123 wrote: I apologize for my inpatients. I have scoured the internet for a discussion board or some other way of finding support for this program, and this board is the only one I could find. Not that it matters to anyone here, but not resolving this problem in a

Re: Paperkey 1.3

2013-01-07 Thread David Smith
On 01/04/13 17:31, David Shaw wrote: Sure, paperkey supports piping the output into whatever code generator you like: gpg --export-secret-key mykey | paperkey --output-format raw | your-bar-code-generator However, 2D bar codes have some of the problems that paperkey is intended to

Re: encryption/decryption without files

2012-09-13 Thread David Smith
On 09/13/12 16:47, ved...@nym.hush.com wrote: The discussion about 'safe' text editors brings about an interesting question: Is an editor needed at all? Why not just input text into gnupg and then encrypt the inputted txt without saving it as file at all ? example: $ printf just a

Re: Compiling GnuPG problem

2012-02-01 Thread David Smith
Davi Barker wrote: Werner, Thanks for you help. I discovered a list of libraries that needed to be installed prior to GnuPG. I got that figured out, but now I'm getting a new error message: compress.c:34:18: fatal error: zlib.h: No such file or directory compilation terminated. It looks

Re: Why is there a subkey and a selfsig in a new key?

2011-11-08 Thread David Smith
Robert J. Hansen wrote: IIRC, it was a response to laws like the United Kingdom's RIPA which allows the authorities to demand encryption keys from users. By separating encryption and signing into separate subkeys, and making the signing subkey the 'master' one, it allows users to divulge

Re: GnuPG decryption problem

2011-11-01 Thread David Smith
m.aflakpar...@ut.ac.ir wrote: I need to decrypt .gz.gpg files (e.g. 70195_C1_WTCCCT442627.CEL.gz.gpg). I have the encryption key(passphrase). Remember that the passphrase is not the key. The key is stored in a file, and that file is protected by the passphrase so that only people who know the

Re: GnuPG decryption problem

2011-11-01 Thread David Smith
Please remember to keep the GnuPG users' mailing list in copy in case anyone else has any better ideas. m.aflakpar...@ut.ac.ir wrote: Thank you Dave, I tried again with this command: gpg --decrypt-file myfile.gpg and entered the passphrase when I was asekd to enter it. But, this error

MS Exchange server corrupting PGP-MIME emails

2011-10-04 Thread David Smith
Possibly a bit off-topic, but... Does anyone have any experience of using an MS Exchange server, where it corrupts PGP-MIME emails by re-encoding the encrypted data in base64? If I'm going to complain to our local IT about it, I need some hard evidence about how it's breaking the PGP-MIME RFC.

Re: Decrypting WikiLeaks insurance file

2011-09-02 Thread David Smith
Ben McGinnes wrote: On 2/09/11 3:02 AM, Julian H. Stacey wrote: (talk about a long password). However, which tool is used to encrypt it? Would running the unix 'file' command give a clue ? Nope, it just comes up as data and the only clue as to what type is the .aes256 extension it's been

Re: Symmetric cipher question

2011-02-07 Thread David Smith
m...@vp.pl wrote: Hello I have a question. I want to encrypt file that consists of one word for example 'home with AES'. When I did encryption I got file that is 49 bytes. How can I separate my encrypted 4-byte word from the rest of file. I need only encrypted part of my word, I don't want to

Re: Crontab running gpg script can’t find secret key

2011-02-03 Thread David Smith
griffmcc wrote: Although I can encrypt a file using a script, when crontab runs the same script, it returns the error message “no default secret key: No secret key”. I have one secret key: sananselmo backupscripts.d # gpg --list-secret-keys /root/.gnupg/secring.gpg

Re: What is the benefit of signing an encrypted email

2011-01-11 Thread David Smith
jimbob palmer wrote: In Firefox I can sign or encrypt or encrypt+sign an e-mail. In what case would I want my encrypted emails also signed? Does it provide any additional benefit over a pure encrypted email? Signing and encrypting serve different purposes. Encrypting a mail ensures that

Re: how slow are 4Kbit RSA keys? [was: Re: multiple keys vs multiple identities]

2010-09-28 Thread David Smith
Jameson Rollins wrote: We should be careful not to overstate the impatience of users too much. I've seen plenty of people wait many seconds for google maps to load on phones without giving up on the whole process. I also have an extremely slow machine were I routinely have to wait a long time

Re: how slow are 4Kbit RSA keys? [was: Re: multiple keys vs multiple identities]

2010-09-27 Thread David Smith
Daniel Kahn Gillmor wrote: On 09/24/2010 09:54 AM, David Shaw wrote: It won't work with the current generation of OpenPGP smartcards. It also will be dreadfully slow if you (or someone you are communicating with) ever uses the key on a small machine (think smart phone). If you are usually

Re: how slow are 4Kbit RSA keys? [was: Re: multiple keys vs multiple identities]

2010-09-27 Thread David Smith
Jean-David Beyer wrote: David Smith wrote: Not truly quantitative, but I notice a significant difference between encrypting emails to people with 1024-bit keys vs people with 4096-bit keys. I'd say that the difference is in the order 3-6 seconds. I'm running GnuPG 1.4.x on a Sun Ultra10

Re: Gnupg good for big groups?

2010-08-09 Thread David Smith
Snaky Love wrote: Hi David, thank you very much for your explanation! May I ask a few final questions about this issue: - are there any tools at all that handle the group crypto + archive use-case satisfactory? (Yes, PM me your ads :) - what is the current state of research regarding

Re: Gnupg good for big groups?

2010-08-06 Thread David Smith
Snaky Love wrote: Hi, thank you very much for the interesting discussion. About GSWoT - does this cover my described use-case? I don´t quite get it from a first glance on the website... Well, I've only just learned about it by reading the website, but... Not really. From what I can

Re: gpg --batch --yes --edit-key trust

2010-07-23 Thread David Smith
m...@proseconsulting.co.uk wrote: I need to be able to ultimately trust a public key in batch mode, that I have downloaded automatically with wget from an internal server over HTTPS. I don't want to do --trust-model always, apart from the fact I want to use a trusted key anyway, gpg

Re: GPG clarification

2010-07-06 Thread David Smith
Robert wrote: Hi, we're using GnuPG 1.4.5 to encrypt and store sensitive files at work. We have been given some requirements to comply with, spawning some general questions. I tried searching in help files but haven't found answers to everything so I'm trying here. If this questions are asked

Re: GPG clarification

2010-07-06 Thread David Smith
Robert wrote: 7) I assume the key rings themselves, holding the keys, are encrypted. How strong is this encryption in GPG? What algorithm is used, etc? One requirement is about compromising the machine with the keys, how easy it would be to export the keys. Since the keyring is physically

Re: AUTO: Richard Hamilton is out of the office (returning 06/24/2010)

2010-06-18 Thread David Smith
Jean-David Beyer wrote: David Smith wrote: Mailing lists programs normally send mails with the Precedence: bulk or Precedence: junk header, and then the autoresponder should recognise this and choose not to respond to mails with the bulk or junk precedence header. It is up

Re: AUTO: Richard Hamilton is out of the office (returning 06/24/2010)

2010-06-18 Thread David Smith
Jean-David Beyer wrote: Well, the stuff I get from the Gnupg-users@gnupg.org list has precedence: list set. Other lists to which I subscribe use Precedence normal or precedence: bulk. Regular e-mail does not have precedence set at all. It seems to me that mailing lists should get their acts

Re: Can we use GNUPG with PGP for commercial use

2010-06-17 Thread David Smith
Gorugantu, Prakash wrote: Our project has a requirement where we need to pull a file using PGP encryption/decryption from one of our clients ftp servers. Please let us know if we can use GNUPG to encrypt/decrypt files with PGP. We read somewhere in your licensing agreement that GNUPG for PGP

Re: Implications Of The Recent RSA Vulnerability

2010-03-11 Thread David SMITH
erythrocyte wrote: On 3/11/2010 3:29 PM, Dan Mahoney, System Admin wrote: On Thu, 11 Mar 2010, erythrocyte wrote: Ref: http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/ Okay, let me sum up this article for you: Researchers who had physical

Re: Installing Software

2010-01-14 Thread David SMITH
is that it's looking for a C compiler (e.g. gcc) and you haven't got one installed. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2

Re: Is it possible to decide what is a gpg file?

2009-11-17 Thread David SMITH
people aren't deliberately trying to fool it), it would work. If you're running on UNIX (particularly Linux), look at 'man file'. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West

Re: Two convicted in U.K. for refusal to decrypt data

2009-08-13 Thread David SMITH
about the difficulty of proving that you don't have access to a particular piece of information. The RIPA is a particularly nasty piece of legislation in this respect. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile

Re: Two convicted in U.K. for refusal to decrypt data

2009-08-13 Thread David SMITH
by putting encrypted data onto someone's computer and tipping off the authorities. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2

Re: Public key crypto by hand

2009-07-30 Thread David SMITH
, you then have the key exchange problem. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury| Work Email: dave.sm

Re: My public key block appears different on keyservers

2009-07-02 Thread David SMITH
you see a problem with the key once it's been imported into GPG, don't worry about it. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key

Re: Separate stdout and stderr

2009-06-26 Thread David SMITH
separately: my_command 1 stdout_goes_here.txt 2 stderr_goes_here.txt Otherwise, you need to be a bit more specific as to exactly what you want to do (and which shell you're running in). -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454

Re: problems with http://www.gnupg.org

2009-05-05 Thread David SMITH
is bouncing I can't access http://www.gnupg.org/mailing-lists.en.html to see if there's a better list to send to than this one either! I'm hoping someone here can do something about it Works OK for me, so either someone's already fixed it, or it was a transient problem. -- David Smith

Re: cloudy understanding of asymmetric cryptography

2009-03-26 Thread David SMITH
. To help my understanding a little futher, if this does not always occur, or does not usually occur, when does it occur (not occur)? Using what ciphers (algorithms)? Typical usage for gpg will be ElGamal for the asymmetric public/private key bit, and AES for the symmetric cipher. -- David Smith

Re: cloudy understanding of asymmetric cryptography

2009-03-26 Thread David SMITH
On Thu, Mar 26, 2009 at 07:51:15PM +1000, Felipe Alvarez wrote: I was unable to find adequate explanations online. http://www.gnupg.org/gph/en/manual/x209.html -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44

Re: gpg: WARNING

2009-03-18 Thread David SMITH
, on the GnuPG website, and if you still have questions, come back and ask... -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury

Re: Some questions

2008-08-08 Thread David SMITH
the passphrase? Maybe it's considered a security risk because it doesn't necessarily have the usual UNIX (or other OS) permissions set to make it accessible only by its owner? Or maybe it's just there to discourage people from transporting secret keys around? -- David Smith| Tel: +44 (0

Re: Some questions

2008-08-08 Thread David SMITH
length, algorithm strength and speed of development of computing hardware -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury

Re: Some questions

2008-08-08 Thread David SMITH
if it's only left half or right half, that divides the search space by 2^number_of_keypresses. The technique doesn't have to be absolutely perfect; just good enough to reduce the search space down to something that can realistically be brute-forced. Like I said, interesting project... :-) -- David

Re: recursive gpg, as in gzip -r

2008-08-07 Thread David SMITH
On Thu, Aug 07, 2008 at 03:49:52PM +0200, Farkas, Illes wrote: Do you happen to know how to use gpg recursively on a directory, similarly to gzip -r and gunzip -r ? find directory -type f -exec gpg --encrypt-files '{}' --recipient name \; HTH... -- David Smith| Tel: +44 (0)1454

Re: recursive gpg

2008-08-07 Thread David SMITH
On Thu, Aug 07, 2008 at 09:54:13AM -0600, Eliot, Christopher wrote: gpg arguments `find . -type f` will get you pretty close. Close, but if you've got lots of files, you'll hit the maximum command line length limit. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963

Re: GNUpg Version 1.4.8 on Solaris 10 (Sparc)

2008-07-31 Thread David SMITH
then give them this exported secret key. Of course, you need to be very careful about how you transport this secret key around. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA

Re: so how do you get others to sign your key?

2008-07-22 Thread David SMITH
. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury| Work Email: [EMAIL PROTECTED] BRISTOL, BS32 4SQ | Home Email: [EMAIL

--export/import-ownertrust

2008-07-18 Thread David SMITH
that this is a bad thing to do. What problems does it cause? TIA... -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury

Re: how to create a key with two user ids and two number ids

2007-12-20 Thread David SMITH
sign or edit a key | +- adduid add a user ID HTH... -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury

Re: Public/Private Keys - Consequences

2007-10-22 Thread David SMITH
. Don't give it away. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury| Work Email: [EMAIL PROTECTED] BRISTOL, BS32

Re: decrypt : primary key or subkey ?

2007-06-07 Thread David SMITH
be generated from the public key, for obvious reasons. Somehow I think you've lost the secret part of the subkey. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380

Re: decrypt : primary key or subkey ?

2007-06-06 Thread David SMITH
'? -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2 Almondsbury| Work Email: [EMAIL PROTECTED] BRISTOL, BS32 4SQ | Home Email

Re: decrypt : primary key or subkey ?

2007-06-06 Thread David SMITH
to look around in the places where you generated/stored the key to see if you can find it. If you can't find it, then I'm afraid that you're stuffed - you won't be able to decrypt your encrypted information (short of brute-force cracking it). Sorry for being the bearer of bad news... -- David

Re: Old PC as Hardware Security Module?

2007-05-15 Thread David SMITH
bytes of data, but the operations in the loop are much more complicated. If you want more info, FIPS180-2 is the document you're after. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724 1000 Aztec West

Re: Summary: Windows GUI recommendation for USB disk

2006-11-03 Thread David SMITH
find incredible). Of course, encryption is more about integer performance than FLOPS, but I suspect that integer performance has scaled in the same orders of magnitude. -- David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963 STMicroelectronics | Fax: +44 (0)1454 462305 Mobile

Re: Can't propagate key through public keyservers

2006-10-30 Thread David SMITH
On Fri, Oct 27, 2006 at 07:26:24PM +0200, Werner Koch wrote: On Fri, 27 Oct 2006 16:10, David SMITH said: I'm having some problems with my GnuPG-generated key. I have one primary DSA for signing (which does not expire), and then every 6 months I generate a new El-Gamal encryption key

Can't propagate key through public keyservers

2006-10-27 Thread David SMITH
] from hkp server wwwkeys.bri.st.com (1) David Smith (Home) [EMAIL PROTECTED] David Smith (STMicroelectronics) [EMAIL PROTECTED] 1024 bit DSA key F13192F2, created: 2002-02-12 Enter number(s), N)ext, or Q)uit 1 gpg: requesting key F13192F2 from hkp server