with a recipient that should be
able to open and reply to e-mails as usual.
Sorry for being OT.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
On 8/27/23 08:42, isp_stream via Gnupg-users wrote:
I do not get the point of this thread, please stop.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
On Sat, 2023-08-12 at 21:47 -0500, Jacob Bachmeyer wrote:
> Will there be support for importing, say, a Tor onion service keypair onto an
> OpenPGP certificate as a subkey?
That is one of the first things I plan to work on.
> Or, perhaps more practically, importing an existing OpenSSH keypair as
On Sat, 2023-08-12 at 08:48 +0200, Francesco Ariis wrote:
> Is there any repository, or site, or blog we can follow to get news about
> this?
Great question! I don't have access to the old repository, mailing list, and
bug trackers yet, but here are some places where you can keep track of
ask me, I think DANE
is the future for most ordinary TLS needs, but the Monkeysphere can be used
with it to prove that the person you know as "John Scott" actually controls the
service as opposed to mere domain validation. The best part is that this
doesn't require using the TLS for
> Please not[e] that your compiler does not support the GCC style aligned
> attribute. Using this software may evoke bus errors.
I'd like to pose the question of why GnuPG should use the non-standard aligned
attribute anyway, when to the best of my knowledge, the same functionality is
supported
On Sun, 2023-04-09 at 12:09 +0100, Damien Goutte-Gattat wrote:
> If you don’t mind compiling and installing GnuPG ≥ 2.3 yourself you should
> also try installing Scute 1.7.0.
You're a genius! I actually had a hard time getting Scute 1.7.0 to compile, so
I built it from Git instead and
Hi,
I'm using Debian Bookworm (Testing) with GnuPG, gpgsm, and Scute. My motivation
for using this trio of tools is a little elaborate, so allow me to explain. For
just the technical stuff, skip to the end.
I use OpenPGP for a variety of reasons, including for my own email security and
Hi all,
Just for fun and because I have extra Gnuk tokens lying around, I'd like
to try writing a program for my libreCMC router that feeds the Linux
entropy pool with data from the token's true RNG. The help text for
scdaemon states
> # RANDOM
> #
> # Get NBYTES of random from the card and
server
instead of WKD or Hagrid.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
signature?if it is necessary, would you tell me why?thank
you.
It is up to you to decide if you want to verify a GPG signature.
To verify a signature it is required to import a public key, look for
instructions on the site from which you downloaded what is to be verified.
--
John Doe
instead ?
I am using gpg 2.2.12 on Debian 10
On Debian you need to use:
$ update-alternatives --config pinentry
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users
tion.
If possible could you please provide me the steps to install gnupg on Linux
machine.
Thanks in advance, have a wonderful day.
Can't you simply use the package manager of your distribution?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg
are refering to
would be best.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
. For
example posteo.de has such a rule for keys used on their platform;
If I understand correctly, the 'real name' and 'comment' should be left out.
1) https://posteo.de/en/help/policies-for-public-keys#names
--
John Doe
___
Gnupg-users mailing list
--yes
7D2BAF1CF37B13E2069D6956105BD0E739499BDB
Note that this e-mail is folded by my mailer.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
like I'm seeing the same stuff as before.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
was significantly
improved in 2.3.
Is this still relevent with the built-in gpg stuff of TB?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
or to use the agent.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Sun, 2021-06-20 at 18:57 +, mailinglisten--- via Gnupg-users
wrote:
> is there any educated guess, when some safe curve (25519?) will find
> their ways into openPGP smart cards?
Some cards already support Curve25519; I'm signing this with my
Nitrokey Start (which is really a Gnuk) using my
feedback.
A statement to that effect at the top of the page could be added
describing why this way was chosen.
1) https://lists.gnupg.org/pipermail/gnupg-users/2021-March/064974.html
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
mails just from thunderbird, it leaks at least the
user-agent header.
Currently I configured my MTA to remove that headers for outgoing mails.
You can disable the usage of the user-agent in TB, one can only hope for
the others as well.
--
John Doe
On 16/03/2021 11:19, John Lane wrote:
> Hello, I have a scenario where gpg is prompting for a passphrase when I
> don't think it should because it is cached in the agent. It seems to be
> triggered by concurrent use. Here is an example.
>
I've asked someone else to try this and the
/gnupg-faq.html#no_default_of_rsa4096
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
https://wiki.gentoo.org/wiki/Project:Infrastructure/
Generating_GLEP_63_based_OpenPGP_keys
>
On the pages, I get 'There is currently no text in this page. You can
search for this page title in other pages, or ...'.
Am I missing something?
--
John
>
> Probably the easiest way to avoid this is to seed the cache of gpg-agent with
> the needed passphrases before starting the concurrent invocations. See
> man gpg-preset-passphrase
> for details.
>
I just tried that to see if it would help. It doesn't make any
difference because the
Hello, I have a scenario where gpg is prompting for a passphrase when I
don't think it should because it is cached in the agent. It seems to be
triggered by concurrent use. Here is an example.
First, create some encrypted data:
$ echo test | gpg --encrypt -o test.gpg -r
Then decrypt it a
On Saturday, January 23, 2021 10:39:30 AM EST Ingo Klöcker wrote:
> Did you have a look at GPGME's tests as working example code? There is a
> test for listing signatures:
> https://dev.gnupg.org/source/gpgme/browse/master/tests/gpg/t-keylist-sig.c
Thanks, I didn't see that. Except for the
.
The code is at https://salsa.debian.org/-/snippets/519 or can be cloned from
https://salsa.debian.org/snippets/519.git
I'm using GPGME 1.14.0-1+b2 on Debian Bullseye (testing) with GnuPG 2.2.20 and
libgcrypt 1.8.7.
Thanks!
John
signature.asc
Description: This is a digitally signed message part
On Saturday, December 5, 2020 9:20:33 AM EST Nicolas Boullis wrote:
> PIN retry counter : 2 0 3
It looks like you're trying to decrypt a file and your encryption PIN counter
is zero. I wonder why it was giving you the strange error message.
Does signing work?
signature.asc
Description: This is
On 11/29/2020 12:53 PM, Werner Koch wrote:
On Sat, 28 Nov 2020 07:57, john doe said:
If I look at Debian (1) for example, the checksum file is gpg signed.
Assuming that I understand correctly, the Debian approach is not a safe
way to make the checksums available?propagate?
No, that is a safe
On 11/26/2020 9:10 PM, Werner Koch wrote:
Hi,
and thanks for asking.
Thanks for this.
To be sure that I understand you correctly, I took the liberty of
rewording your answers.
On Thu, 26 Nov 2020 19:12, john doe said:
Is there a URL to download those sha1sums and those public keyss
the release process in
that regard.
1) https://gnupg.org/download/integrity_check.html
2) https://gnupg.org/signature_key.html
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
y does GPG so desire the net access for my tasks?
Does it work if you do:
$ gpg --verify <*.sig>
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Hi
I'm writing a tool using GPGSM and want to print signature validation
information without reinventing the wheel with case statements, also for the
sake of localization. These members in gpgme_signature_t [1] seem to be what
I'm looking for:
gpgme_validity_t validity
The validity of
se"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:suse:sles:15:sp1"
Or do we have to compile it from source?
Hi Mattias,
GnuPG is packaged for OpenSuse:
https://software.opensuse.org/package/gpg2
Best regards,
John
___
Gnupg-users
On Sun, Oct 11, 2020 at 09:48:37AM +0200, Stefan Claas wrote:
> John A. Leuenhagen via Gnupg-users wrote:
>
> > On Thu, Oct 08, 2020 at 12:27:24AM +0200, Stefan Claas wrote:
> > > Regarding the Internet as of today and Al Gores vision and the Internet
> > > comme
On Thu, Oct 08, 2020 at 12:27:24AM +0200, Stefan Claas wrote:
> Regarding the Internet as of today and Al Gores vision and the Internet
> commerce etc.
>
> I always wondered why it is not possible for me and probably many other
> people to not get a *static* IPv6 address additionally when you
to collect such data.
You can't assume that this is also the case for other countries if you
are looking for EU contributers.
I must also say that I don't understand how this is related to this list.
--
John Doe
___
Gnupg-users mailing list
Gnupg
for that is not online?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Monday, May 18, 2020 2:53:55 AM EDT Werner Koch wrote:
> On Sat, 16 May 2020 23:24, John Scott said:
>> Looking up recipients with both dirmngr-client and
>> gpgsm --verbose --list-external-keys [recipient]
>> are fruitless whether I drop the ads\ from my usernam
On Sunday, May 24, 2020 12:18:51 PM EDT Robert J. Hansen wrote:
> > But using Sherpa is probably a good bet.
>
> Good Lord, it's been a while since I wrote that. The Windows MSI
> installer should still work, though. If there's interest in other
> formats, I'll see about updating it.
Having
anything
gpgsm: enabled debug flags: x509 crypto cache ipc
gpgsm: DBG: chan_3 <- # Home: /home/john/.gnupg
gpgsm: DBG: chan_3 <- # Config: /home/john/.gnupg/dirmngr.conf
gpgsm: DBG: chan_3 <- OK Dirmngr 2.2.20 at your service
gpgsm: DBG: connection to the dirmngr established
gpgsm: DB
On 3/23/2020 5:21 PM, Andrew Gallagher wrote:
> On 23/03/2020 15:58, john doe wrote:
>> $ gpg --version
>> gpg (GnuPG) 2.1.18
>> libgcrypt 1.7.6-beta
>>
>> Is it not working because of a too old release?
>
> Yes, that's FAR too old. :-) You need to dist-upgr
On 3/23/2020 1:01 PM, Werner Koch wrote:
> On Mon, 23 Mar 2020 10:16, john doe said:
>
>> Thank you Werner, I wrapped the above as an one liner:
>
> This is even easier.
>
> $ mkdir -p /etc/gcrypt && echo only-urandom>/etc/gcrypt/random.conf
>
> The '#
On 3/22/2020 8:55 PM, Werner Koch via Gnupg-users wrote:
> On Sun, 22 Mar 2020 12:36, Andrew Gallagher said:
>> On 22/03/2020 05:38, john doe wrote:
>>> Do you have enough entropy on the VM?
>>
>> Argh, thank you. I thought I had enough entropy because monkeysp
eally. Monkeysign is a caff replacement, not the other way around.
> And monkeysign's GUI, monkeyscan, is the real killer app. I know of
> nothing comparable.
>
I might be missing the point here but why don't you simply use a Buster
VM for monkeysign?
Also, monkeysign is convenient but
> [1] https://wiki.gnupg.org/WKS
>
Do you have enough entropy on the VM?
In a Stretch VM, I had to install 'haveged' to have enough entropy
otherwise it would hang for ages.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
possible, when
> there's very little likelihood of you going for that long a period
> without a key compromise event?
>
You could also "transsition" to a new key.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
s://dev.gnupg.org/T2818
>
>
Is it the same with pinentry-tty?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
on Ubuntu
Linux.
After many searches, I have not found any information on how to do this. I
am looking through the documentation on the https://gnupg.org/ website, but
its unclear where to start reading.
Thank you
John
___
Gnupg-users mailing list
Gnupg
or his answer, and (2) for his answer in an
other thread (3).
1) Wiktor Kwapisiewicz
2) Konstantin Ryabitsev
3) https://lists.gnupg.org/pipermail/gnupg-users/2020-January/063190.html
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
considering notmuch/sup to get what I want, it looks like
Mutt uses 'ncurses' which is not an option for me.
Any input is welcome
1)
https://admin.hostpoint.ch/pipermail/enigmail-users_enigmail.net/2020-January/005562.html
P.S.
By key pare, I mean private/public key.
--
John Doe
[expires: 2020-01-04]
ssb rsa4096 2020-01-03 [S] [expires: 2020-01-04]
ssb rsa4096 2020-01-03 [E] [expires: 2020-01-04]
Is there any downside to have my master key with the certify capability
only?
In other words, is it required for the master key to have the sign and
certify capabilities.
By any chance, could something like the following be implemented?:
$ gpg -K --print-fingerprint-only test
Which would only print the fingerprint to avoid the awk redirection
altogether.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
about it?
In other words, why '--quick-set-expire' requires a fingerprint and does
not accept a .
Any input is welcome.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
FWIH, NFC keys are more
> convenient; that is, if someone considers it safe to keep NFC enabled
> with Google Pay installed.
>
On AndroidI use k9mail with openkeychain and one subkey which has only
the sign capability.
The use of subkey makes it possible to revoke only that subke
> Hi
>
>
> On Monday 7 October 2019 at 9:15:54 AM, in
> , john doe wrote:-
>
>
>> would it be possible to add the ability to
>> checksum the binaries?
>
> When a new GnuPG version is announced, there are checksums in the
> announcement. For example
On 10/7/2019 12:03 PM, Werner Koch wrote:
> On Mon, 7 Oct 2019 10:15, john doe said:
>
>> In the above link, only the cli version of the 1.4 release is available.
>> I got it from (1).
>
> Nope. That is always the current 2.2.
>
Yes it is there, some how I mist it!
Hi, thanks for your answer.
> Hi
>
>
> On Saturday 5 October 2019 at 7:05:55 PM, in
> , john doe wrote:-
>
>
>> In other words, how can I only install the command
>> line version of GPG on
>> Windows.
>
> At https://gnupg.org/download/index.html
ter to remove GPA all together from Gpg4win?
As an aside, I don't use Cleopatra at all, is there anyway to install
Gpg4win without Cliopatra?
Inother words, how can I only install the command line version of GPG on
Windows.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
gt; I received yesterday my free Lumens, currently worth $21.29 USD :-)
>
Who are you, anything to disclose?
I don't think this is appropriate to advertise on this list.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gn
.
>
The obvious solution would be to use mutt on your work station! :)
I would also use one signing key per device on which you need to sign
commits/tags/...
That way if one device is compromised you simply revoke that subkey.
Sorry for not directly answering your question!
--
John Doe
__
where to download your public key.
If you are talking about the comment in your UID, you would need to
creat a new UID to do that but you are better off without the one that
you want to use or without a comment altogether.
--
John Doe
___
Gnupg-us
> I don't want to warm-up this topic again, but... didn't Robert said in his
> github gist that the issue was known for more than a decade?
>
> Why was is then not fixed a decade ago, like it was done with 2.2.17?
The link in the github document, points to another link which explains
that the
On 7/24/2019 6:38 PM, Lentes, Bernd wrote:
>
>
> - On Jul 24, 2019, at 5:58 PM, john doe johndoe65...@mail.com wrote:
>
>
>
>>>
>>
>> Quoting your original e-mail:
>>
>> "i'm new to GPG, so please excuse asking silly questions.
>>
On 7/24/2019 5:20 PM, Lentes, Bernd wrote:
>
>
> - On Jul 24, 2019, at 12:15 PM, john doe johndoe65...@mail.com wrote:
>>> I sent a cleartext e-Mail with my public key to ad...@gnupp.de (which is an
>>> automated system for practicing encryption and decryption)
&g
tried. But i got the message
> while decrypting:
>
> gpg: encrypted with 2048-bit RSA key, ID F742DB29, created 2019-07-23
> "Bernd Lentes (Helmholtz GPG Schluessel)
> "
> gpg: Fatal: zlib inflate problem: invalid code lengths set
>
> What does this meesage mean ?
>
>
I might be rong here, but I would use build-in GPG capability in my
e-mail client to decrypt the encrypted e-mail.
Do you have the same error if you encrypt and decrypt a file?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
e.com/questions/189000/how-to-verify-the-checksum-of-a-downloaded-file-pgp-sha-etc
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
/hpp/BWPFDWQnGaWeWdFfsxlzu6gOMsfYJQDxNIPRjLbYkcIOL3Xw5EIFlS2xEr+/ZGsD2uNnReXj5XZnXh6FrxcX7vhnKpHHsVzDZG+xRs+xhErhiini8J1REZaQzZnVftD/WZGbAU8f3LSDfSCFQVxRTibXW5JMd6JfFe1zZXST+JfAEqg5LhucpzsQAbYWtNiqZ5McerI1HYPjYNUqoYhGzXsWvEuvPp3qugVjH3ZI5
> (none)
>
My understanding is that one subkey is to be used for authentication .
--
John D
ng?
Thank you Werner for your input, along with Werner's input I'd also like
to thank the below two for their input:
Daniel Kahn Gillmor
Konstantin Ryabitsev
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
> j...@example.org
>
> and leave out all other parts. There are even mail providers which
> demand this for data privacy reasons. However if you prefer to have
> your mail in it, do it in the same was as it is common in your
> country/culture like
>
> John Doe
>
> If y
to be able to sign a release
- Other suggestions
In other words: What is, if any, the best way to sign a file, when the
same key is to be used by multiple persons.
Any help is appriciated.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
On 2/23/2019 4:34 PM, MFPA wrote:
> Hi
>
>
> On Saturday 23 February 2019 at 7:06:20 AM, in
> , john doe wrote:-
>
>
>> Is it acceptable to have multiple 'user ID's with the
>> same address e-mail?
>
> Yes. It might be simpler to have a single
-mail?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
is process for a while then explore more complex
> and or customized options.
>
TB and enigmail are a good place to start on Windows or Linux for that
matter.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the program? I have a
large file that was encrypted with PGP and I want to decrypt it. Am I missing
something simple? I am using Ubuntu 16.04 operating system. I can not find
this program in the installed program list.
Thanks,
John
___
Gnupg-users mailing
e. if I want to read the same email on my laptop I plug out in there.
> it's been smooth and solid for years.
>
> recently I got a yubikey 4 which i plug into the USB port on the phone. it
> works just as well. I slightly preferred the NFC version.
>
> On Thu, Nov 8, 2018, 7:4
subkey only.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On 7/5/2018 12:18 PM, john doe wrote:
On 7/4/2018 2:25 PM, Werner Koch wrote:
On Wed, 4 Jul 2018 09:11, gni...@fsij.org said:
The patch is: Don't try to look the error code, but fallback TOR_PORT2
always.
I don't like this patch because it is not specific enough.
If Cygwin really returns
th Fishman
From the ML archive:
https://lists.gnupg.org/pipermail/gnupg-users/2018-June/060688.html
HTH.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ing but the decrypted output of
the gpg file?
It is working fine here, which version of gpg2 do you have and which
distro are you using?
Output redirection is more a shell issue then a gpg2 problem.
Can you redirect STDERR of other commands to the null device?
--
John
that is why I'm sending it here.
I have installed all required libraries and I got so far as:
$ gnupg
./configure --sysconfdir=/etc --enable-maintainer-mode && make
snip
make all-recursive
make[1]: Entering directory '/home/john/git/gnupg'
Making all in m4
make[2]: Entering directory '/home/
On 7/4/2018 9:11 AM, NIIBE Yutaka wrote:
Hello,
john doe wrote:
I'm willing to confirm that but I'm not sure how I would do that!?
I am considering a patch like following. If you can build GnuPG for
Cygwin, you can try. Or, you can ask Cygwin's package maintainer for
GnuPG.
The patch
I suspect this.
I'm willing to confirm that but I'm not sure how I would do that!?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
t goes?
beyond '-v' and '--debug-all' what can I do to furder troubleshoot?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On 6/29/2018 6:40 PM, john doe wrote:
On 6/29/2018 4:24 PM, Werner Koch wrote:
On Thu, 28 Jun 2018 17:05, johndoe65...@mail.com said:
dirmngr.conf:
use-tor
http-proxy socks5://localhost:9150
Nobody said that you should configure a proxy ;-)
Dirmngr has integrated Tor support which
il:
https://lists.gnupg.org/pipermail/gnupg-users/2018-June/060740.html
As you can see no command proxy option is being used.
Some how I'm stuck at DNS name resolving if I'm not mistaking?
Any help is welcome.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users
On 6/29/2018 9:30 AM, NIIBE Yutaka wrote:
john doe wrote:
Now, the next step is to configure dirmngr to do the same!:
dirmngr.conf:
use-tor
http-proxy socks5://localhost:9150
Only "use-tor" is needed, then, dirmngr connects to localhost:9150 for
Tor.
Looks like the issue
nf:
use-tor
http-proxy socks5://localhost:9150
gives the following error:
ERR 219 Server indicated a failure
How can I use socks5 with dirmngr?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
all DNS over Tor. Just install the
Tor Browser and GnuPG will use that.
Can you elaborate on how I would let "Cygwin dirmngr" use "Tor Browser
for Windows"?
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
ht
u pass the option '--homedir' to gpg2 you should look in the
gpg.conf found in that directory.
--
John Doe
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854359
$ dirmngr --server --homedir $PWD -v
dirmngr[7576]: error opening
'/home/john/try/dirmngr-test/dirmngr_ldapservers.conf': No such file or
directory
dirmngr[7576.0]: permanently loaded certificates: 134
dirmngr[7576.0]: runtime cached
where do I find the public key for these subkeys that are
supposed to be the recipient?
When I'm on the machine that holds the sub key and I attempt to decrypt
I get the message:
> gpg: decryption failed: No secret key
--
John
___
Gnupg-us
> Once you assume that your opponent is specifically targeting you with
> malware capable of sophisticated memory forensics, you're screwed.
> Pinning your hopes on a smartcard is the worst kind of crypto-fetishism.
> You can't proudly hold it up and say "ah ha, but *now* I am safe from
> Tier-1
On 23/01/17 12:34, Peter Lebbing wrote:
> On 23/01/17 12:54, John Lane wrote:
>> Ok, so - if I understand you correctly - when I *export* the secret key
>> I can choose which algorithms are applied to the exported copy ?
>
> No, I meant that the bug report (turned feat
On 23/01/17 11:22, Peter Lebbing wrote:
> It's close to what you're talking about, but not exactly. That is
> specifically about *exporting* an OpenPGP secret key, not how it is
> *stored* in your keyring. The protection on private-keys-v1.d is
> implemented differently than the protection of the
I've been reading about symmetric encryption of the private key.
When I tried to experiment with the `--s2k` options, attempting to
change the passphrase on my key, I found that they were ignored. A brief
search identified issue 1800 [1] on the bug tracker which was last
updated in 2015, some 20
On 18/01/17 15:39, Damien Goutte-Gattat wrote:
>
> I believe there's a bug in the handling of the regular expression
> associated with a trust signature. I've just submitted a patch to fix it
> [1]. With that patch applied, I get the expected result for step 10
> (Blake's key is fully valid, not
On 18/01/17 03:03, David Shaw wrote:
>
> Can you post the actual user IDs of the keys you are testing with (or a
> similar example.com set) so I can try them as well?
Hi David,
I have written a test shell script to experiment with trust signatures.
The script is at https://git.io/vMXMQ
There
1 - 100 of 882 matches
Mail list logo