Hello,
can the openPGP card store more than one key? If yes, how many can be stored?
Will the forthcoming cards version 2.0 differ from 1.1 in that aspect?
Malte
signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users
Hi!
Due to problems with GnuPG 1.4.7 as included in Gpg4win 1.1.3 on Windows
Vista we are about to do a new Gpg4win release 1.1.4. Because there has
been no release for a long time I created a release candidate first.
Please report all regressions against 1.1.3 to this mailing list or
I will create a shell script and see what happens.
-- Original message from Joseph Oreste Bruni jbr...@me.com: -- One last test: Rather than having BPEL run "gpg" directly, perhaps you could have it run a shell script that in turn runs "gpg". You should then be able
Hi.
Does anyone of you have an idea whether it could make problems to use
gnupg on Celeron or Atom CPUs?
I mean could this have an effect on the PRNG, e.g. that the entropy is
worse? Or something similar?
Regards,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
On Feb 10, 2009, at 9:07 AM, Christoph Anton Mitterer wrote:
Hi.
Does anyone of you have an idea whether it could make problems to use
gnupg on Celeron or Atom CPUs?
I mean could this have an effect on the PRNG, e.g. that the entropy is
worse? Or something similar?
The PRNG is generally a
Christoph Anton Mitterer schrieb:
Hi.
Does anyone of you have an idea whether it could make problems to use
gnupg on Celeron or Atom CPUs?
I mean could this have an effect on the PRNG, e.g. that the entropy is
worse? Or something similar?
Hej Chris,
I cannot imagine why the kind
Thanks for your info :-)
Best wishes,
Chris.
smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Am Dienstag, 10. Februar 2009 11:34:03 schrieb Werner Koch:
On Tue, 10 Feb 2009 08:34, malte.g...@gmx.de said:
1. killing running gpg-agent
That is not necessarry. You can simply give it a HUP (pkill -HUP
gpg-agent). This will reload most of the config options including
--scdaemon-program.
One last test: Rather than having BPEL run gpg directly, perhaps you
could have it run a shell script that in turn runs gpg. You should then
be able to set whatever variables you need prior to the call of gpg from
within the shell script. You can also enable tracing (set -o xtrace) to
help
Hey list,
was wondering if it was possible to import many keys at the same time from a
keyserver. Had imported a key with a lot of sigs and most of them can't be
checked as I don't have the keys the key was signed with. So my question is to
import all the signing keys at once, perhaps even with
David Shaw dshaw at jabberwocky.com
wrote on Sun Feb 8 22:41:10 CET 2009 :
In OpenPGP, a secret key is just a public key with some
extra stuff (the secret numbers) tacked on to the end. That's how
paperkey makes the keys so small - it can safely leave off all the
public key information.
On Feb 10, 2009, at 10:49 AM, ved...@hush.com wrote:
is there a way to get paperkey to reconstruct both the public and
secret keys, given the secret key ?
You don't need paperkey to do this. Just use GPG. If you import a
secret key and you don't have the matching public key, GPG will
Hello,
Am Dienstag, 10. Februar 2009 11:34:03 schrieb Werner Koch:
(...)
Your problem is probably another version of gpg-agent or scdaemon
somewhere in your PATH.
Hm, I don't buy it.. I continued to try things, the strange behaviour
continues, now my openPGP card is shown as empty:
On Tue, 10 Feb 2009 17:38, malte.g...@gmx.de said:
Hm, I don't buy it.. I continued to try things, the strange behaviour
continues, now my openPGP card is shown as empty:
I have noticed such a behaviour sporadically but I was not abale to
reliable replicate it. Which reader are you using
Sidney Kenson wrote:
Hey list,
was wondering if it was possible to import many keys at the same time from a
keyserver. Had imported a key with a lot of sigs and most of them can't be
checked as I don't have the keys the key was signed with. So my question is to
import all the signing keys at
On Tue, 10 Feb 2009 11:30:07 -0500 David Shaw
ds...@jabberwocky.com wrote:
You don't need paperkey to do this. Just use GPG. If you import
a
secret key and you don't have the matching public key, GPG will
automatically create a public key from the secret key.
but i need paperkey to
On Tue, Feb 10, 2009 at 12:41:12PM -0500, ved...@hush.com wrote:
On Tue, 10 Feb 2009 11:30:07 -0500 David Shaw
ds...@jabberwocky.com wrote:
You don't need paperkey to do this. Just use GPG. If you import
a
secret key and you don't have the matching public key, GPG will
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
John Clizbe wrote:
OK, You look to be on Windows. You'll need some sort of POSIX environment on
Windows to pull this off, eg Cygwin, SFU, MSYS, UWin,...
Or I just export my keyrings from my WinPT and import it in my gpg under
Ubuntu and it'll
ved...@hush.com wrote:
uses a public key generated for only this purpose,
not put up on any keyserver,
This seems to be a misapplication of asymmetric crypto. Asymmetric
crypto is generally inappropriate for session keys.
is there a way to get paperkey to reconstruct both the public and
Hi!
David Shaw schrieb:
If you can't remove the redundant parts, then you're basically storing
a secret key, unchanged.
Apart from the encoding and line-wise checksums which paperkey adds,
that is...
Maybe this posting from a thread when I asked to extend paperkey for use
with revocation
Am Dienstag, 10. Februar 2009 18:09:58 schrieb Werner Koch:
On Tue, 10 Feb 2009 17:38, malte.g...@gmx.de said:
Hm, I don't buy it.. I continued to try things, the strange behaviour
continues, now my openPGP card is shown as empty:
I have noticed such a behaviour sporadically but I was
Sidney Kenson wrote:
John Clizbe wrote:
OK, You look to be on Windows. You'll need some sort of POSIX environment on
Windows to pull this off, eg Cygwin, SFU, MSYS, UWin,...
Or I just export my keyrings from my WinPT and import it in my gpg under
Ubuntu and it'll work.
Yes, That's the
Robert J. Hansen rjh at sixdemonbag.org
wrote on Tue Feb 10 19:18:22 CET 2009 :
uses a public key generated for only this purpose,
not put up on any keyserver,
This seems to be a misapplication of asymmetric crypto. Asymmetric
crypto is generally inappropriate for session keys.
the situation
The hexidecimal approach works well for a whole secret key. I tried this with
the OCRA font and appears to work very well and means that you do not need to
get the public key from keyservers.
Using this method my secret key printed comes to two sides of A4. Hex is
easier to re-enter and this
The black helicopters can read the paper copies in your house with
microwaves.
On 2/9/09, David Shaw ds...@jabberwocky.com wrote:
You can't take a public key and just attach the blob to the end. A
secret key is made up of secret key packets. You need to convert your
individual public key
Message: 8
Date: Tue, 10 Feb 2009 16:44:01 -0500
From: Robert J. Hansen r...@sixdemonbag.org
Subject: Re: paperkey // ? feature request
[1] 'very-important-secret' encrypted in ascii armored form to
unpublished public key using throw-keyid option
So only someone with the private key can
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Robert J. Hansen escribió:
...
So only someone with the private key can decrypt it. Okay. How do you
communicate the private key with your intended recipients? And how is
communicating the private key with your intended recipients different
ved...@hush.com wrote:
but unless you choose a sufficiently long and random passphrase,
symmetric crypto with a passphrase string-2-key is much less
protected than when the session key is encrypted to an unknown
asymmetric key
The moral of the story is to (a) use the right tool for the job,
Faramir wrote:
IMHO, the difference is the recipients can send it's public to me by
some way, and check the fingerprint by telephone...
It's not a disposable session key if the recipients need to contact the
sender afterwards. If you're assuming a high threat environment, you
kind of need to
On Tue, Feb 10, 2009 at 04:44:01PM -0500, Robert J. Hansen wrote:
[2] above mentioned message posted anonymously to newsgroup like
comp.security.pgp.test
from internet cafe,
(pre-paid in cash, using new usb drive with nothing else on it)
USB tokens have GUIDs, Globally Unique
the latter cannot be attacked without the keypair and the
passphrase,
Keep in mind that we are talking about a hybrid crypto system. Your
hidden assumption seems to be that the session key which is generated
during encryption to a public key is not worth attacking. Then, nothing
prevents you
On Tue, Feb 10, 2009 at 06:57:33PM -0500, Robert J. Hansen wrote:
Or consider a hibernation file. When your laptop goes into hibernation
mode, your laptop copies its entire internal state to disk so that when
you open your laptop again it can pick up right where it left off. That
David Shaw wrote:
Not exactly: http://www.wpi.edu/News/Journal/Summer98/secured_opus.html
Thank you for the link -- I was going by my recollection of journalistic
coverage after the attack, but apparently either it or my memory was in
error.
___
David Shaw wrote:
I don't know if I'd go so far as to call it a GUID as it is only
unique relative to the vendor and device type
Must be my luck, then -- the ones I've looked at have all had per-device
serial #s.
There is also no guarantee that the host computer will log the device
serial
On Feb 10, 2009, at 9:51 PM, Robert J. Hansen wrote:
David Shaw wrote:
I don't know if I'd go so far as to call it a GUID as it is only
unique relative to the vendor and device type
Must be my luck, then -- the ones I've looked at have all had per-
device
serial #s.
I suspect the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Robert J. Hansen escribió:
David Shaw wrote:
I don't know if I'd go so far as to call it a GUID as it is only
unique relative to the vendor and device type
Must be my luck, then -- the ones I've looked at have all had per-device
serial #s.
On Feb 10, 2009, at 11:21 PM, Faramir wrote:
Robert J. Hansen escribió:
David Shaw wrote:
I don't know if I'd go so far as to call it a GUID as it is only
unique relative to the vendor and device type
Must be my luck, then -- the ones I've looked at have all had per-
device
serial #s.
Dr. Scott S. Jones wrote:
I run both Win xp and ubuntu 8.10. My wife runs win xp on her laptop. We are
at the point now where we both want to enable encrypted emailing AND we want
to find a nice way of educating those we email to often, or with whom we
exchange sensitive information, in how to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
David Shaw escribió:
...
and capable. The Timothy McVeigh example from earlier is particularly
good here: the US government really, really wanted to find him, and
fast. That is certainly sufficiently motivated and capable.
Right, but if I
Faramir wrote:
Right, but if I understood it well, he had done more than 700 calls
from a rechargeable prepaid card... that is not a disposable card.
That wasn't his problem. That was, honestly, mostly irrelevant.
This was his problem: when you're trying to cover your tracks, there are
I run both Win xp and ubuntu 8.10. My wife runs win xp on her laptop. We are
at the point now where we both want to enable encrypted emailing AND we want
to find a nice way of educating those we email to often, or with whom we
exchange sensitive information, in how to use gnupg to encrypt email
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Robert J. Hansen escribió:
Faramir wrote:
Right, but if I understood it well, he had done more than 700 calls
from a rechargeable prepaid card... that is not a disposable card.
That wasn't his problem. That was, honestly, mostly irrelevant.
42 matches
Mail list logo