outside of the system.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
Aut disce aut discede
2016-October/035409.html
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keyblock at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B
ee resolver results,
additionally output of $ gpg-connect-agent --dirmngr 'KEYSERVER --help',
make sure hkps is listed as a supported schemata
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP keybloc
are too much about things like this today so I
should remove it): "The signed keyblock is uploaded to a randomly chosen
set of keyservers. The signee may hint on what key server or choose to
receive it through mail instead."
References:
[0] https://sumptuouscapital
t;5% of the time, and this is literally the first time I've heard the
> word "keyblock".
>
I'd start with -BEGIN PGP PUBLIC KEY BLOCK- :)
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
---
exception of ultimate trust, that
you should only use on keys you control yourself already requires the
key to be validated)
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP certificate a
e else, and can rotate that
as often as wanted to start fresh from time to time.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP certificate at hkp://pool.sks-keyservers.net
fpr:94CB AFD
t which point even short keyid isn't an issue as long as they only
select amongst valid keys to begin with, unless they actually have two
people with colliding keyids by coincidence that they communicate with.
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuousc
with, although I might read it without the proper context in this email)
--
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP certificate at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA
d at all, but print full fingerprint so
setting 0xlong here will be a degrade
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP certificate at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034
On 08/08/2016 08:11 AM, Daniel Kahn Gillmor wrote:
> On Sun 2016-08-07 10:40:08 -0400, Kristian Fiskerstrand wrote:
>
..
>> Note when upgrading from earlier versions of SKS
>>
>> The default values for pagesize settings changed in SKS 1.1.4. To
>&
On 08/07/2016 04:40 PM, Kristian Fiskerstrand wrote:
> Hello lists,
>
> We are pleased to announce the availability of a new stable SKS
> release: Version 1.1.6.
>
> SKS is an OpenPGP keyserver whose goal is to provide easy to deploy,
> decentralized, and highly rel
Hello lists,
We are pleased to announce the availability of a new stable SKS
release: Version 1.1.6.
SKS is an OpenPGP keyserver whose goal is to provide easy to deploy,
decentralized, and highly reliable synchronization. That means that a
key submitted to one SKS server will quickly be
On 06/04/2016 04:26 PM, MFPA wrote:
>
>
> On Saturday 4 June 2016 at 11:15:36 AM, in
> <mid:ba3bd322-022f-4d24-4784-42c69de34...@sumptuouscapital.com>,
> Kristian Fiskerstrand wrote:
>
>> And if this is upgraded to 1.7 branch?
>
>
> Thanks for
r package libgcrypt20:
>
> Repository: openSUSE-13.2-Security-Privacy
> Name: libgcrypt20
> Version: 1.6.5-112.1
And if this is upgraded to 1.7 branch?
--
----
Kristian Fiskerstrand
Blog: https://blog.sumpt
tuations (incidentally is a a good example of why the versioning
discussed above makes sense for LTS).
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP certificate at hkp://pool.sks-keyserver
character set 'utf-8'
> gpg: keyserver receive failed: No keyserver available
what is the dig +trace output and any firewall blocking port 11371 anywhere?
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
king ldd
[2] iirc using system provided root CAs wasn't included until 2.1.12 either
--
----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP certificate at hkp://pool.sks-keyservers.net
fpr:94CB
On 05/23/2016 09:56 PM, Bjoern Kahl wrote:
> I'd like to convert the existing secret key and the corresponding
> public key, preferably without destroying the signatures, from
> "version 2" to "version 4".
This is not possible.
--
--
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 04/08/2016 12:38 PM, Philip Colmer wrote:
> On 7 April 2016 at 17:03, Kristian Fiskerstrand
> <kristian.fiskerstr...@sumptuouscapital.com> wrote:
>> is ldap listed as a schema when doing KEYSERVER --help ? you can
>> al
. At the moment, the only
> information I seem to be getting is:
>
> gpg: DBG: chan_4 <- ERR 167772346 No keyserver available
is ldap listed as a schema when doing KEYSERVER --help ? you can also
check if ldd /usr/bin/dirmngr shows a linkage to libldap
- --
- ---
way and
the user don't have a path; and this is first download so the TOFU
scenario fails .. and they aren't doing some probabilistic
consideration based on other public sources as well the end result
will be the same as having provided the checksum, but...
- --
- ----
Kristi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/27/2016 10:17 AM, Martin Konold wrote:
> Am Freitag, 26. Februar 2016, 12:43:54 CET schrieb Kristian
> Fiskerstrand:
>
> Hi Kristian,
>
>>> the two cards with the gpg -- homedir commandline option.
>
>
private-keys-v1.d (for gnupg 2.1) for the known stubs and doing a
gpg-connect-agent learn /bye or gpg --card status during e.g smartcard
attachment in an udev rule etc, etc.
But see the thread "Re: stub-key migration from gpg 1.4/2.0 to 2.1"
where it is also discussed some options.
- --
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/25/2016 08:30 PM, Peter Lebbing wrote:
> On 25/02/16 20:24, Kristian Fiskerstrand wrote:
>> 2.0 supports --batch --passphrase-fd 0
>
> Oh! I must have mixed up some things.
>
> Thanks for the rectification!
&
.1 needs a loopback
> pinentry. But of course, the answe
2.0 supports --batch --passphrase-fd 0
- --
- ----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key at hkp://pool.sks-keyservers.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/25/2016 02:38 PM, Peter Lebbing wrote:
> (If this feels like droning on to you, just stop reading and go do
> something fun!)
>
> On 2016-02-25 14:25, Kristian Fiskerstrand wrote:
>> Now, the real question discussed here t
>
> which is the nano. It seems that even killing the gpg-agent and
> inserting the other yubikey doesn't seem to work. Suggestions?
Delete the stubs and do gpg --card-status to learn of the new smartcard
- --
-
Kristian Fiskerstrand
Blog:
preimage attack, that is a different story and far more difficult :)
- --
- ----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F
ipulation of the
update channel (e.g. a preference for fetching from non-tls URI rather
than a keyserver).
- --
-
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key at hkp://p
y
>> archiving?
>
> Not that I'm aware of.
Not following this thread too closely, but I expect --show-session-key
and --override-session-key has been discussed.
- --
- ----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
all
> permutations of what you think the passphrase was?"), please let me
> know. :)
Would a reference to nasty[0] or other tools to aid such brute-force
attacks be useful in this context?
Reference:
[0] http://freecode.com/projects/nasty
- --
- ----
Kristian Fiskerstrand
known password
string using separators and number paddings etc so they have been able
to build a good pattern to base it on
- --
- ----
Kristian Fiskerstrand
Blog: https://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0
[Sent from my iPad, as it is not a secured device there are no cryptographic
keys on this device, meaning this message is sent without an OpenPGP signature.
In general you should *not* rely on any information sent over such an unsecure
channel, if you find any information controversial or
ues/36/curve25519-oid-for-encryption
>
>
Fwiw, this patch is now applied to the servers in the keys2.kfwebs.net
cluster and the subkey is listed at
http://keys2.kfwebs.net/pks/lookup?op=vindex=0x3AED5886
--
----
Kristian Fiskerstrand
Blog: http://blog.sumptuousca
one
> from #gnupg).
>
That is very possible, as there is not yet an ID except for
http://www.ietf.org/internet-drafts/draft-koch-eddsa-for-openpgp-01.txt for
curve25519 related keys
--
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
---
dirmngr who does the request. Can I reproduce it
> with dirmngr alone, not involving gpg binary?
$ dirmngr
...
OK Dirmngr 2.1.9 at your service
KEYSERVER --clear hkp://pool.sks-keyservers.net
OK
KS_GET 409B6B1796C275462A1703113804BB82D39DC0E3
...
BYE
- --
-
Kristian F
4 Compression:
> Uncompressed, ZIP, ZLIB
>
> $ gpg2 --keyserver hkp://keys.gnupg.net <http://keys.gnupg.net>
> --recv-key 0x409B6B1796C275462A1703113804BB82D39DC0E3 gpg:
> keyserver receive failed: No keyserver available
What are the known schematas listed for:
$ echo "KEYSERV
is IPv4 vs IPv6, so pay attention to the address it
is trying to connect to in the output.
--
----
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:
server / CA of sorts to
> establish identity for a user profile they believe to be genuine,
> they couldn't do so from outside of FB.
>
>
>> It works! I found how:
>
>> curl https://www.facebook.com/melvo/publickey/download/
>
Thats great, thanks! :)
--
h research, is that the key
can't be requested by username, only by user id. So if anyone were to
want to using it as a keyserver / CA of sorts to establish identity
for a user profile they believe to be genuine, they couldn't do so
from outside of FB.
- --
-
Kristian Fiske
te the setup.
- --
- ----
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
"Don't be afraid to
easily be constructed, either through generating
new keys or due to the keyservers not doing any cryptographic
verification that the signatures themselves are correct.
... and that is intended behavior ...
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
-expected send a response and request a signed confirmation]
On Jul 29, 2015 4:02 PM, MFPA 2014-667rhzu3dc-lists-gro...@riseup.net
wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Wednesday 29 July 2015 at 1:47:35 PM, in
mid:55b8cb67@sumptuouscapital.com, Kristian Fiskerstrand
, running a 10 year
old version of Operating System XY with so many trojan horses working
on copying the private key data that they are fighting over the
resources on the computer.
To paraphrase Schneier, security isn't a product it is a process.
- --
-
Kristian Fiskerstrand
(while still providing _some_ level
of security).
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F
it will be interpreted by a parser, and raw data from
keyservers anyways shouldn't be trusted directly before validating the
signature (including its subpackets/notations) since no crypto has
been performed at that point.
- --
-
Kristian Fiskerstrand
Blog: http
the blockchain itself was decentralized (it can't
function securely if completely local to validation server). iirc this
is what Google is doing with its approach as well[0].
References:
[0] http://www.certificate-transparency.org/
--
Kristian Fiskerstrand
Blog: http
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/27/2015 11:03 AM, Kristian Fiskerstrand wrote:
On 07/27/2015 10:48 AM, Marko Božiković wrote:
On 25/07/2015 13:26, MFPA wrote:
Hi
..
Ok, but why doesn't it make much sense anymore? Is there another
way to get private key info
.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
History doesn't
this be a GnuPG 2.1.x issue? Lance, did this
work with older GnuPG versions?
No issue here at least using Gentoo's gnupg-2.1.5 ebuild with
IUSE:{smartcard,usb} using either yubikey or openpgp smartcard,
- --
-
Kristian Fiskerstrand
Blog: http
://www.gnupg.org/download/release_notes.en.html
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60
trying to achieve (and for
that matter why what happened so long ago matter to any extent, and
whether it is worthwhile to look into)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP
.pool.sks-keyservers.net that only servers A records (and the
opposite for IPv6 at ipv6.pool.) to use as mitigants if such
situations arise.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
Great things are not accomplished by those who
-devel/2014-May/028458.html
[2] https://gnupg.org/roadmap.html
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/18/2015 08:39 PM, Samir Nassar wrote:
On Wednesday, March 18, 2015 07:28:31 PM Kristian Fiskerstrand
wrote:
Likely related to the PTR issues[0, 1], its already in the
roadmap[2]
Thank you Kristian,
So I understand this better. When
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/18/2015 10:08 PM, Samir Nassar wrote:
On Wednesday, March 18, 2015 09:21:08 PM Kristian Fiskerstrand
wrote:
11371 is expected to be for HKP, so requiring this to be TLS is
bad practice.
...
gpg: DBG: chan_4 - ERR 1 General error
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/18/2015 09:13 PM, Samir Nassar wrote:
On Wednesday, March 18, 2015 08:54:47 PM Kristian Fiskerstrand
wrote:
Hmm, I didn't notice that it was a wildcard cert, that should
also support holdfast.myriapolis.net in the cert matching
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/18/2015 10:33 PM, Samir Nassar wrote:
On Wednesday, March 18, 2015 10:14:53 PM Kristian Fiskerstrand
wrote:
gpg-connect-agent --dirmngr 'KEYSERVER --help' /bye S # Known
schemata: S # hkp S # hkps S # http S # finger S #
kdns
= 1.6.0
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
If you choose to sail upon the seas
to bootstrap a key validity in the absence of a
direct key path.
References:
[0] http://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html
[1] http://permalink.gmane.org/gmane.org.fsf.announce/2278
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
) :)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-interaction-wise because it adds pointless noise when
searching for keys.
It doesn't affect neither security nor the user at all, the first
because the key anyways needs to be verified, the second because the
key anyways needs to be verified.
- --
-
Kristian
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/03/2015 01:50 PM, Hans of Guardian wrote:
On Feb 27, 2015, at 1:11 PM, Kristian Fiskerstrand wrote:
On 02/27/2015 12:43 PM, Hauke Laging wrote:
Am Fr 27.02.2015, 12:27:40 schrieb gnupgpacker:
Maybe implementation with an opt-in could
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/03/2015 04:20 PM, Kristian Fiskerstrand wrote:
On 03/03/2015 01:50 PM, Hans of Guardian wrote:
On Feb 27, 2015, at 1:11 PM, Kristian Fiskerstrand wrote:
...
The standard PGP keyserver pool is a mess with racist spam,
lost keys
.html
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/02/2015 04:50 AM, Chuck Peters wrote:
Kristian Fiskerstrand said:
You wouldn't need the keyservers to be involved in this at
all. Anyone could set up such a mail verification CA outside
of the keyserver network.
How about storing keys
of signatures from it)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/02/2015 02:45 AM, Helmut Waitzmann wrote:
Kristian Fiskerstrand kristian.fiskerstr...@sumptuouscapital.com
writes:
On 02/27/2015 12:57 PM, Philip Jackson wrote:
On 26/02/15 18:15, Helmut Waitzmann wrote:
I tried
gpg2 --verbose
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/01/2015 04:35 PM, Patrick Brunschwig wrote:
On 01.03.15 15:58, Kristian Fiskerstrand wrote:
On 03/01/2015 03:41 PM, Patrick Brunschwig wrote:
On 27.02.15 20:56, Werner Koch wrote:
On Fri, 27 Feb 2015 17:26, patr...@enigmail.net said
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/01/2015 06:01 PM, Marco Zehe wrote:
Hi Kristian,
Am 01.03.2015 um 17:54 schrieb Kristian Fiskerstrand
kristian.fiskerstr...@sumptuouscapital.com:
Since the author's first reaction was closing it WONTFIX I didn't
bother
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/01/2015 05:36 PM, Marco Zehe wrote:
Hi Kristian,
Am 01.03.2015 um 16:38 schrieb Kristian Fiskerstrand
kristian.fiskerstr...@sumptuouscapital.com:
You wouldn't need the keyservers to be involved in this at all.
Anyone could set up
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/01/2015 05:45 PM, Marco Zehe wrote:
Hi Kristian,
Am 01.03.2015 um 17:36 schrieb Kristian Fiskerstrand
kristian.fiskerstr...@sumptuouscapital.com:
Seriously? Please look at
https://bugzilla.mozilla.org/show_bug.cgi?id=790487regarding
)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
I have always wished that my computer would
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 03/01/2015 06:08 PM, Kristian Fiskerstrand wrote:
On 03/01/2015 06:01 PM, Marco Zehe wrote:
Hi Kristian,
Am 01.03.2015 um 17:54 schrieb Kristian Fiskerstrand
kristian.fiskerstr...@sumptuouscapital.com:
...
that have enabled
-LDAP gateway using OpenLDAP myself.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/27/2015 05:26 PM, Patrick Brunschwig wrote:
On 27.02.15 13:11, Kristian Fiskerstrand wrote:
On 02/27/2015 12:43 PM, Hauke Laging wrote:
Am Fr 27.02.2015, 12:27:40 schrieb gnupgpacker:
Maybe implementation with an opt-in could preserve
.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
Money
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/27/2015 07:37 PM, Marco Zehe wrote:
Hi Kristian,
Am 27.02.2015 um 17:31 schrieb Kristian Fiskerstrand
kristian.fiskerstr...@sumptuouscapital.com:
On 02/27/2015 05:26 PM, Patrick Brunschwig wrote:
On 27.02.15 13:11, Kristian
?
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
Veni vidi velcro
I
a slightly different wording :) But adding something of
the sort to my TODO list for SKS.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
?
_cracking_ the system (I hack my system every day..) would leave
traces, the same would not necessarily be true for DNS poisioning or
BGP hijacking on the network layer.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
the algorithm classes in kindergarden in britain
teching kids algos through games (i.e physical games)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks
lists over a long time for a project etc).
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED
.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
Varitatio delectat
Change pleases
to make your own considerations as to the validity of the key
at the present stage
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/10/2015 01:24 PM, Peter Lebbing wrote:
On 10/02/15 12:52, Kristian Fiskerstrand wrote:
No, the signature is still valid:
Why? The key was revoked because it was superseded or has been
retired, not because it was stolen
NTLM
NTLM_WB
TLS-SRP
References:
[0] https://bugs.gentoo.org/show_bug.cgi?id=538852
[1] https://538852.bugs.gentoo.org/attachment.cgi?id=395722
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public
://gnupg.org/download/mirrors.html
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
with systems such as Symantec Encryption Serve)
- Standardization of the EdDSA I-D by WK (we already support this in
the development branch of SKS, but not in any released version)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01/18/2015 06:13 PM, Kristian Fiskerstrand wrote:
On 11/26/2014 12:27 PM, Werner Koch wrote:
Hi,
I have been asked to forward the CFP below. In case we want to
do a GnuPG BoF we should ask whether it is possible to share
that devroom
.
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
-
A government
GPGTools for Mac.
Gnupg 2.1 does not use curl for these matters
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109
compile it yourself, file a bug with whomever provided
the binaries for inclusion of this feature similar to Arch Linux's [0]
References:
[0] https://bugs.archlinux.org/task/42739
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 12/13/2014 02:41 PM, Peter Lebbing wrote:
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1
On 08/12/14 16:37, Kristian Fiskerstrand wrote:
This key will always be capable of signing by definition
In what sense is that? It seems GnuPG
about key preferences on that
key and your own? If you include your own key as an encrypt-to and do
not list IDEA in preferences for that it should find another common
denominator (likely 3DES)
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter
-beta67
References:
[0] http://lists.gnupg.org/pipermail/gnupg-users/2014-November/051471.html
- --
-
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
-
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks
, 2014-12-10 18:10:58 Kristian Fiskerstrand wrote:
The SNI issue last discussed in [0] springs to mind. But I still
experience this on gpg (GnuPG) 2.1.1-beta67
I had the impression that this bug is getting fixed in 2.1.1 and
that I shouldn't increase noise to an existing and known problem
101 - 200 of 290 matches
Mail list logo