Re: Extraction of decryption session key without copying complete encrypted file

2017-08-28 Thread Fiedler Roman
> Von: Werner Koch [mailto:w...@gnupg.org] > > On Mon, 28 Aug 2017 12:00, pe...@digitalbrains.com said: > > > The gpg process communicates its TTY to the agent so the pinentry > knows > > where to pop up. This is a feature, not a bug. But when you > deliberately > > want to pop it up elsewhere...

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-28 Thread Peter Lebbing
On 28/08/17 09:57, Fiedler Roman wrote: > But it seems, that the gpg-decryption process attempts to trigger the > pinentry, not the agent and so the access to the correct controlling TTY > fails. The gpg process communicates its TTY to the agent so the pinentry knows where to pop up. This is a

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-28 Thread Fiedler Roman
> Von: Peter Lebbing [mailto:pe...@digitalbrains.com] > > On 25/08/17 18:40, Fiedler Roman wrote: > > Idea: > > 1) Extract all GPG preambles of files to be decrypted to a single file > > (working) > > 2) Batch decrypt all preambles from the input file on the trusted > equipment > > (not working in

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-25 Thread Peter Lebbing
On 25/08/17 16:08, Fiedler Roman wrote: > I tried to use the agent support that way. One reason for low adoption might > be, that using the provided documentation, it is just not possible to get a > simple batch scenario working on Ubuntu 16.04 server setups without spending > a > whole day

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-25 Thread Fiedler Roman
Addendum: agent-use > From: Werner Koch [mailto:w...@gnupg.org] > > On Fri, 4 Aug 2017 14:36, roman.fied...@ait.ac.at said: > > Ah, that's great - and actually the first nice gpg-agent feature apart > > from > > gpg-agent being little annoying when running it on RAM-disks in early > > boot. >

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-04 Thread Andrew Gallagher
On 04/08/17 14:39, Matthias Apitz wrote: > But this implies that everyone with priv access on the remote host could > abuse your secret key on your localhost, especially when a GnuPG-card is > used and you entered the PIN to unlock the secret key. I'm wrong? Yes, someone with root on the remote

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-04 Thread Matthias Apitz
El día viernes, agosto 04, 2017 a las 01:59:57p. m. +0200, Werner Koch escribió: > On Wed, 2 Aug 2017 15:52, roman.fied...@ait.ac.at said: > > > How to decrypt large files, e.g. gpg-encrypted backups, without copying > > them to the machine with the GPG private key? > > With GnuPG 2.1 this is

Re: Extraction of decryption session key without copying complete encrypted file

2017-08-04 Thread Werner Koch
On Wed, 2 Aug 2017 15:52, roman.fied...@ait.ac.at said: > How to decrypt large files, e.g. gpg-encrypted backups, without copying them > to the machine with the GPG private key? With GnuPG 2.1 this is easy: You use ssh's socket forwarding feature to forward gpg-agent's restricted remote