Joseph Oreste Bruni wrote:
I tried compiling 1.4.10rc1 on Mac OS X 10.6 without success.
During make the compile bombed here:
...
mv -f .deps/mpih-mul.Tpo .deps/mpih-mul.Po
gcc -DHAVE_CONFIG_H -I. -I.. -I.. -I../include-g -O2 -Wall -Wno-
pointer-sign -MT mpiutil.o -MD -MP -MF
Csabi wrote:
Hello,
I have Windows XP with GnuPG 1.4.9 installed.
I wanted to install GNUPG Shell 1.0 but when i clicked to install
snip
GPG Shell works fine but i would like to try the GnuPG Shell.
Do You have any idea to resolve the problem?
Have you asked on GnuPG Shell's support
Allen Schultz wrote:
Csabi wrote:
I have Windows XP with GnuPG 1.4.9 installed.
...
GnuPG not installed on your system. Please, install it first.
Have you set the System PATH and then tried the installation again? Is
it possible GPG Shell uses PATH and other windows settings for looking
John Clizbe wrote:
Allen Schultz wrote:
Csabi wrote:
I have Windows XP with GnuPG 1.4.9 installed.
...
GnuPG not installed on your system. Please, install it first.
Have you set the System PATH and then tried the installation again? Is
it possible GPG Shell uses PATH and other windows
Daniel Kahn Gillmor wrote:
when encrypting messages to a user ID with multiple matching keys with
full calculated validity, gpg seems to just choose the first matching
key, for some definition of first -- i think it's decided by
chronological age of first import into the local keyring.
IIRC,
Werner Koch wrote:
On Wed, 23 Sep 2009 16:16, bmea...@ieee.org said:
By the way, are there any python or PHP bindings for GPGME?
Yes, there are several of them and we should really compile a list of
them or actually add them to the distribution.
It would be a huge help if added to the
gpg.me...@spamgourmet.com wrote:
Hi, I just have a basic question about subkeys. When I create an RSA
subkey I only have the option to create one for signing or encryption,
not both. Why is that? There's nothing different about the keys
themselves, is there? Is there supposed to be some
David Gray wrote:
What are peoples thoughts on which is the best option:
a) copy the secring.gpg pubring.gpg files to the second user account?
b) export and import the keys to the second user account?
c) add a reference to the second account's gpg.conf file?
it depends on what you
T. Howell-Cintron wrote:
I'm roughly familiar with GnuPG and have used it in the past when I had
a single presence, a single e-mail address, etc.
I'm in a position now where I'm using multiple e-mail addresses, for
different purposes, but want to share the same key for the sake of
benoit.an...@orange-ftgroup.com wrote:
Hello,
have installed Gpg4win 2.0.1 (2009-09-28). Default setup.
am running windows XP SP2
outlook 2003 -(11.8206.8221) SP3
I managed to create the keys and import someelse key.
No pbm sending encrypted email - they are ok at the destination, but
Mario Castelán Castro wrote:
November 17th for gnupg-users@gnupg.org
I need GNU PG 2 because i want to get out of the 1024 bits limit and
SHA forced for DSA, i want my next key (2010-2012) to be more secure
and accept some SHA2.
GnuPG 2.0 is not needed for DSA 1024 GnuPG 1.4.x has
M.B.Jr. wrote:
Thanks again, David.
The last dumb question, I promise, would be:
There aren't any dumb questions.
how can I see my primary key and my subkey as well?
$ gpg --list-key 0x0x608d2a10
pub 1024D/608D2A10 2003-03-06
uid John P. Clizbe jpcli...@earthlink.net
Robert J. Hansen wrote:
David Shaw wrote:
Difficult question to answer, since everyone is going to wave around
their opinion. :)
There are some empirical facts which may be useful, though -- like
observing the RC5-64 project was able to break a 64-bit key via a
massive distributed project
Andre Lee wrote:
gpg: public key decryption failed: bad passphrase
gpg: decryption failed: secret key not available
I've had an issue with running gpg commands via Oracle BPEL before but
the change to the new server fixed it in the TEST. Now I have this new
issues on another server in the
BenXS wrote:
I would like to use this mailing-list through the forum emulation of Nabble
at
http://old.nabble.com/GnuPG---User-f959.html
I don't need any posting delivery by email any more but would like to stay
subscribed to be able to post questions.
However when I go to
Robert J. Hansen wrote:
On 1/19/10 11:46 PM, Matthew Krotzer wrote:
What is the best way to let people know you use gpg in an email
signature?
Some email clients (Thunderbird+Enigmail, for instance) let you put a
kind of note to other users hidden in the email headers. These things,
Doman Name Administrator wrote:
Hello,
We are trying to change over to Mozilla Thunderbird 3 w/OpenPGP on a 32
bit Vista machine. The primary reason being a PGP signature we need to
continue to use originally created in 1999.
snip
Of course we have already downloaded and intalled the
Tobias Holz wrote:
Hey Folks,
i successfully installed gnupg on my Win7 machine. I want to use it
with Thunderbird to encrypt personal eMails.
Now I've got some questions:
1) What does happen if I lose my private key? Can I burn it to a CD/DVD?
If you lose your secret key or forget your
MFPA wrote:
On Thursday 25 February 2010 at 3:53:23 AM, in
mid:4b85f433.1040...@mozilla-enigmail.org, John Clizbe wrote:
MFPA wrote:
Hi John
On Thursday 25 February 2010 at 12:17:36 AM, you wrote:
It is also a good idea to send your key to the keyservers.
But is, of course, a matter
This may be a dup - I think the original went out with the wrong From addr
MFPA wrote:
Hi
On Saturday 27 February 2010 at 6:11:29 AM, in
mid:4b88b791.7000...@sixdemonbag.org, Robert J. Hansen wrote:
In any case, I've never seen a convincing argument *for* including email
addresses in the
MFPA wrote:
Hi
On Saturday 27 February 2010 at 6:11:29 AM, in
mid:4b88b791.7000...@sixdemonbag.org, Robert J. Hansen wrote:
In any case, I've never seen a convincing argument *for* including email
addresses in the UID of a PGP key.
Nor have we seen compelling arguments for their omission
David Shaw wrote:
Didn't someone write a nice HOWTO about offline private keys at one point? I
thought there was one out there, but can't find it at the moment. Can anyone
post the URL for Philip?
Adrian von Bidder's page is the only one that memory serves up:
Daniel Kahn Gillmor wrote:
On 03/05/2010 01:30 AM, Smith, Cathy wrote:
The gpg --list-sig shows that the keys are signed. Do I need to create a
new signature key, and re-sign all the public keys that I imported?
I think the simplest thing for you to do is to modify the ownertrust of
your
Faramir wrote:
Just a question, and I don't have any intention about doing it, but,
is there a way to disable the usage of 3DES in GnuPG, when encrypting?
Sure, the source is available -- the result just won't be a valid OpenPGP
implementation any longer.
Now for my Just a Question: Why on
MFPA wrote:
On Saturday 13 March 2010 at 12:07:08 AM, in
mid:de002b15-fa18-49a1-b7b0-5afaaf829...@jabberwocky.com, David Shaw
wrote:
On Mar 12, 2010, at 6:31 PM, Faramir wrote:
is there a way to disable the usage of 3DES in GnuPG, when
encrypting?
Patch the source :)
There is no way other
Faramir wrote:
David Shaw escribió:
On Apr 7, 2010, at 3:18 AM, Andre Amorim wrote:
What type of encryption the WikiLeaks said to have broken? AES ?
...
I do not think that this is a break of any serious crypto, though. If
someonecould arrange for AES or any other strong cipher to be
Olav Seyfarth wrote:
Hi *,
english version:
http://www.privacyfoundation.de/crypto_stick/crypto_stick_english/
That's the only page I've seen in English, Olav.
Check the Shop links:
http://www.privacyfoundation.de/shop/ and
http://www.privacyfoundation.de/shop/crypto-stick.html
Google
raviraj kondraguntla wrote:
Hi,
I am trying to install the gnupg 1.4.10 on solaris 10 server, I have
received the below error
configure:3550: /opt/SUNWspro/bin/cc --version 5
./configure: line 3551: /opt/SUNWspro/bin/cc: No such file or directory
configure:3553: $? = 127
raviraj kondraguntla wrote:
All,
Thanks for your reply.
I checked the package GCC, it is showing that it was already installed.
$ pkginfo | grep -i gcc
system SUNWgcc gcc - The GNU C compiler
system SUNWgccruntime GCC Runtime libraries
Michael D. Berger wrote:
On a Linux box, in encrypting a file with gpg, I get this query:
It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.
Use this key anyway? (y/N)
Hauke Laging wrote:
I hope there is a tell me what this is command that does nothing else (so
that it can be safely used). If it is a keyring, list the content (like now
without a command), if it is an encrypted file it would be nice to know that
(and the recipients' key IDs) WITHOUT gpg
Mark H. Wood wrote:
On Thu, Jun 10, 2010 at 05:57:50PM +0200, Joke de Buhr wrote:
You do not sacrifice legitimate incoming mail because there is an RFC that
clearly states mailservers do not operate from dynamic IP addresses.
Therefore
they can not be considered valid.
If there is such
Роман Шерстюк wrote:
Good day!
Sorry for disturb, please.
I have been setup SKS server on Linux Debian 5.0.3 and I'd like to ask
Perhaps your post would get a better answer on the SKS list,
sks-de...@nongnu.org
you how can I see detailed statistic.
Assuming the statistics code ran at
VH Dolcourt wrote:
This is a Windows 7 question:
I was able to mouse around in Google and found out how to modify the
proper PATH environment variable. Therefore, at the command prompt I'm
able to execute gpg without having to migrate to the directory where gpg
lives. The good news is that
Dan Mahoney, System Admin wrote:
The ones I've seen have enough awareness of what's in a key to pull a key
apart and determine who's signed it, when, and when it's expired. Is
there more than that to read these bits? Again:step zero may be to
determine what the internal format is.
Dan Mahoney, System Admin wrote:
I'm also not aware of how servers synchronize, but if it's a different
protocol than the standard single-key-request protocol, then there's an
easy metric to say don't hand out keys with this flag via this protocol.
For SKS (taken from the current SKS
Csabi wrote:
Can somebody help me?
I have Windows XP.
I just installed the newest Thunderbird Portable 3.0.1 and GPG for
Thunderbird Portable 1.4.10 and the EnigMail Extension to my USB drive.
The Gpg.exe in the GPG for Thunderbird Portable 1.4.10 is always search
my keyrings in the default
Prasanth Thandra wrote:
On Tue, Jul 20, 2010 at 12:50:53PM +0530, Prasanth Thandra wrote:
I already replied this on July 21, but it would appear it never reached you so
allow me to quote myself in these two top sections (+)
i configured gnupg 2.0.15 on RHEL4 which is a mialserver.
i am able
MFPA wrote:
On Wednesday 4 August 2010 at 8:14:16 AM, in
mid:646262.92885...@web94804.mail.in2.yahoo.com, Prasanth Thandra
wrote:
When a user receives an encrypted mail from his peer ... he is
able to read the mail only after receiving the KEY of sender to his
pubring.gpg .
Not quite
Alex Smily wrote:
Hi
i am new to gnupg email encryption. I have installed gpg4win on my
machine...it is working fine , i am able to send and receive encrypted
mails using Thunderbird (using enigmail plugin) outlook. but i want to
use outlook express so i decide to use GPGrelay but when i
James Board wrote:
I'm trying to encode a file in a shell script on a linux machine. The script
is getting stuck on an interactive question for which the answer is always 'y'
(yes). I tried redirecting stdin from a file, and with 'echo y | , but
that doesn't work for some reason (it works
Grant Olson wrote:
I can find docs on generating a key on a smart card, and migrating an
existing key to the smart card. But I can't figure out how to configure
the smart card on a clean machine that never had my secret keys.
The card has both signing and encryption keys on it. The drivers
Grant Olson wrote:
On 9/1/10 12:39 AM, David Shaw wrote:
Do you have the public key corresponding to the card key on that box? You
need the public key plus a run of --card-status to generate the stubs.
That did the trick. As did John's suggestion to run fetch from 'gpg
--card-edit' I'm
Lee Elcocks wrote:
Hi, I have the signing key as the default key in the config file, do i
still have to use both in the command, the encyption and signing is
working perfectly, just the output of the file name (and size) that i
cannot get to work.
If the signing key is specified with
Thomas Chitwood wrote:
Thanks for the info Doug. I don't think I have ever encrypted a file
with more than one key. Would the command be something like the example
below?
gpg --output test.txt.gpg --encrypt --recipient 359B3EB2 DAE72D59
test.txt (where 359B3EB2 is their key and DAE72D59
Anthony Papillion wrote:
Hello Everyone,
I'm a new member of the list but I've been using GPG for a bit now on
Linux. I recently installed it on my Windows machine and needed to
revoke a compromised key. When I tried to send the information to the
keyserver, I got the following error:
Osama Khalid wrote:
Hello,
When I generated my OpenPGP smartcard, I asked GPG to save a backup
version of the key. It did that in an
sk_random_letters_and_numbers.gpg file.
Now I'm trying to find a way to restore my secret key.
snip
I was wondering about the correct way to do that.
Mohan Radhakrishnan wrote:
We use passphrases for protecting the secret key. Is there a passphrase for
accessing the keyring itself ?
No, unless the secret keyring is stored on some form of encrypted volume which
is a different subject.
-John
--
John P. Clizbe Inet:John
Lee Elcocks wrote:
Good Luck with GPG4win, i cannot find any decent documentation on how to
use! and get no replies from the GPG4Win mailing lists either.
You can't sign and encrypt a file at the same time either through the command
line so i had to abort and go back to PGP.
You can't? It's
Ben McGinnes wrote:
On 10/12/10 6:17 AM, Robert J. Hansen wrote:
On 12/9/10 1:30 PM, Ben McGinnes wrote:
Is it possible that this current transition push is partially aimed
at reigniting the WG's discussion by creating a new de-facto
standard?
Dunno, ask the WG.
As soon as I find them
Robert J. Hansen wrote:
On 12/9/10 1:30 PM, Ben McGinnes wrote:
If/when the time comes for SHA-1 to be completely removed from OpenPGP,
the migration path will quite likely involve new keys -- the same way
that the V3/V4 migration path in the past necessitated new keys.
Since I prefer a
Ben McGinnes wrote:
On 10/12/10 8:33 AM, John Clizbe wrote:
Ben McGinnes wrote:
On 10/12/10 6:17 AM, Robert J. Hansen wrote:
On 12/9/10 1:30 PM, Ben McGinnes wrote:
Is it possible that this current transition push is partially aimed
at reigniting the WG's discussion by creating a new de
Ben McGinnes wrote:
On 10/12/10 1:08 AM, Robert J. Hansen wrote:
On 12/9/2010 1:14 AM, Ben McGinnes wrote:
I am giving very serious thought to creating new keys and
doing a (long-term) transition to them. This is partly to respond to
known flaws with SHA-1 and take advantage of SHA-256 and
Robert J. Hansen wrote:
On 12/9/2010 11:08 PM, David Tomaschik wrote:
If a new keypair is generated, what length would be sufficient for a
decent (10+ year, preferrably 20+) margin of safety? I know that there
may be unforeseen advances in computing that allow for keys to be broken
rapidly
Ingo Klöcker wrote:
On Tuesday 14 December 2010, Robert J. Hansen wrote:
Off by about a factor of 100 there. RSA-2048 is roughly equivalent
to a 112-bit symmetric key; RSA-1024 is roughly equivalent to an
80-bit key. 32 bits of difference equals a factor of four billion.
It's way harder
Tomasz Zajączkowski wrote:
Hi All,
I have installed gnupgp on Solaris 10 and created a pair of keys for
myself and imported key from my client. I need use same set for
different local account - unfortunately whenever I try to change the
folder with --homedir option I am ending up with:
gpg
Ingo Klöcker wrote:
On Sunday 16 January 2011, Bo Berglund wrote:
What is gpgme? I found a very short reference on the GPG website:
http://www.gnupg.org/gpgme.html
But it talks about a library that applications should use to access
gpg. What does library mean?
A library is similar to what
David Tomaschik wrote:
Anyone in the US ever order the OpenPGP smartcards from Kernel
Concepts? I'm wondering if there are any customs issues I should be
aware of. I'm thinking of trying to get a few people together around
here to do a bulk order to cut shipping costs, etc., but wanted to
Jerry wrote:
On Sat, 19 Feb 2011 14:55:14 -0500
Robert J. Hansen r...@sixdemonbag.org articulated:
On 2/19/11 9:53 AM, lists.gn...@mephisto.fastmail.net wrote:
Think we'll see this included one day in OpenPGP, or will we just
skip to SHA-3 when it's ready?
Usually, algorithms are added
Robert J. Hansen wrote:
On 2/25/11 10:27 PM, Aaron Toponce wrote:
On 02/25/2011 07:39 PM, Robert J. Hansen wrote:
Bruce himself recommends AES over TWOFISH.
[citation needed]
_Practical Cryptography_. Read it. Other people on this list can
provide a page ref: I'm at a funeral in the
Ben McGinnes wrote:
On 11/03/11 12:10 AM, Robert J. Hansen wrote:
Not at all. Every few days the keyserver network posts complete dumps
of all the certificates in the system. (Or, more accurately, various
people within the network do.) This exists so that new volunteers who
want to
Ben McGinnes wrote:
On 12/03/11 12:33 AM, Robert J. Hansen wrote:
On 3/11/2011 1:07 AM, Ben McGinnes wrote:
Out of curiosity, how big is that now?
My complete /var/lib/sks/DB directory comes in at 7.8G. Not too large.
That's smaller than I would have thought, but a *lot* larger than the
Ben McGinnes wrote:
On 12/03/11 6:26 PM, John Clizbe wrote:
That's the SKS implementation of the key database. On top of the
keys, there are several other tables. Within each table there is
also empty space, most commonly space left at the end of a page.
The present size of just the raw
Mike Acker wrote:
Is PGP/ENIGMAIL compatible with folks using Outlook or Microsoft Mail
with PGP Desktop?
I've tried searching for this but no luck,-- :-(
Enigmail is an extension for Thunderbird and Mozilla mail. It uses GnuPG for its
cryptographic processing. It conforms to RFC2 4880 and
gayamantra wrote:
Hi,
We are intending to use GNUPG to encrypt a file before we FTP it to an
external party.
Is it possible to use GNUPG as a standalone client without having to install
in on our servers?
Yes, GnuPG may be installed on a workstation and accessed at the command line,
Jerome Baum wrote:
Grant Olson k...@grant-olson.net writes:
On 03/22/2011 06:06 PM, Jonathan Ely wrote:
I really wish 8192 would become available. Not that it would be the end
all/be all of key security but according to your theory it sounds much
more difficult to crack.
The actual
Mike Acker wrote:
I really liked the idea of having the Membership Secretary sign a Public
Keyring for the Group Members and then to circulate that keyring to the
membership.
That's just super-neato great, but what does it have to do with the message
thread you replied to dealing with 4096-bit
Jerome Baum wrote:
Nicholas Cole nicholas.c...@gmail.com writes:
Please remove my name from future replies on this thread.
I did not ask to be included nor do I wish to be included.
Thank you.
signature.asc
Description: OpenPGP digital signature
Bronson K Shadlock wrote:
Hi there,
We are using GnuGP 1.1.3 on a few PCs, all able to decrypt using 1 public
Do you mean GPG4Win 1.1.3?
GnuPG 1.1.3 (if it existed) would date back to circa 2000.
key. I can use it on my PC, but a new user on a new PC is getting constant
errors. I've
123098 wrote:
I've made a script that (among other things) encrypts some sensitive data
that I have to send afterwards to a different user on a different computer.
If I encrypt the data by command-line I have no problem at all and
everything goes smoothly. However, when I try to get cron to
Bernhard Kleine wrote:
Hi,
i wonder whether the keys from several members of this maillist should
be available from the keyserver. e.g. Grant Olson signs all his messages
here. evolution and gpg on ubuntu, however, fail to retrieve the public
key from the server:
the message always
John Clizbe wrote:
Bernhard Kleine wrote:
Hi,
i wonder whether the keys from several members of this maillist should
be available from the keyserver. e.g. Grant Olson signs all his messages
here. evolution and gpg on ubuntu, however, fail to retrieve the public
key from the server:
My
Bernhard Kleine wrote:
I am quite sure that Grant Olson's key is on the keyserver, thus there
is no matter of hiding it, as robert j.hansen suggested. however, i
wonder why i can't retrieve it.
gpg --search-keys A18A54D
gpg: Suche nach A18A54D von hkp Server pool.sks-keyservers.net
gpg:
Pramod.R wrote:
Hi,
We are migrating from pgp 6.5.8 to gpg 1.4.11. I had a question
regarding the migration of the public keys and the private keys:
Is there a way where I could migrate the entire key ring at one go? I’m
currently extracting my keys from pgp using the pgp –dx key-id
Stephen H. Dawson wrote:
Dire need, hoping for help.
I have my private and public keys, but you have neither the passphrase
nor a revocation certificate. I need to revoke my published key. Can
they recommend a bash script to discover the passphrase using brute
force on the private key?
Mike Acker wrote:
thanks for the note
i have PGP/MIME set ON so this should not happen (and HTML has to be MIMEd )
from your note it sounds like Thunderbird is sending BOTH .txt and .html
formats. I would expect your e/mail client to selecvt one of these --
and either should verify --
Christopher Tran wrote:
Whats the easiest way to keep GPG keys synced between my computers? Like, I
have my MacBook, which is usually my main machine, but I also have my netbook
which I prefer carrying around and sometimes I update my key with User IDs on
either machine but the only way I have
Charly Avital wrote:
Hi,
in the avalanche of news about the [recently] late Osama Bin Laden, I
noticed a small item: the area where he was caught had been *also*
defined/pinpointed by the lack of cellular phone communications.
Among other anomalies at the compound: No cell traffic, no
David Shaw wrote:
There is/was a HOWTO document for this method of handling keys written at one
point. I can't seem to find the link at the moment, but if someone has it
handy, please do post it.
Adrian von Bidder's How-To, http://fortytwo.ch/gpg/subkeys, comes to mind.
It's linked on the
Kevin Kammer wrote:
Let us suppose that we have more than one private key on our keychain.
Safe bet.
For this example, let's say we use one key to sign our personal email, and a
different one to sign software packages we host on a company server. There
may be settings in our gpg.conf
Hauke Laging wrote:
BTW: Would it be a good idea for gpg to suggest the user to check for an
updated version of the key (or do it automatically before if configured to do
so) if it find an expired subkey? This would probably not work with the GUIs
though (but might make the GUI developers
Yard, John wrote:
Forgive the simple gpg syntax issue,
I have
gpg --verbose --trust-model always --yes --armour --recipient X_UCLA
--encrypt $T1
which encrpts a file , I would like to sign it in the same command , I would
like the output to be $T1.asc
gpg -v --yes --trust-model
Johan Wevers wrote:
On 16-09-2011 21:30, Simone Cianfriglia wrote:
To achieve your desired result, it's required to run the exactly same
compiler, including the version, with the same options targeting the
correct architecture. Also a minor tweak in architecture settings
could change the
Werner Koch wrote:
Hi,
there is a thing for Windows called System Services for Unix (SFU). It
is a modern POSIX implementation on top of the NT kernel but very
different to the old we-need-to-be-compliant-to-gov-ITBs Posix
subsystem. Did anyone ever tried to build a GnuPG on it?
AFAICS
ved...@nym.hush.com wrote:
BTW,
There is a unique advantage to running gnupg from cygwin on
windows, as it's the only way to make use of unix-like commands,
(cat, grep, printf, etc.) and pipe them to and from gnupg.
ONLY? How much effort did you expend looking?
The MinGW compiler folks
ved...@nym.hush.com wrote:
Thanks,
I knew about the MSYS method, but not about the others,
but my point was about running gnupg from a flash drive.
I was under the impression that there is no portable way to do that
on a flashdrive that doesn't have these systems installed on the
host
ved...@nym.hush.com wrote:
So, if , for example, in a case where I don't have my laptop with me, (but I
do have a usb with gpg and keyrings, and a miniDVD with ubuntu),
then, assuming there is no keylogger on the borrowed laptop, what
is the problem with booting from the ubuntu miniDVD, and
Jerry wrote:
It would seem, and this is strictly my own opinion, that if the old
pksd servers are dead then there is no logical reason to continue to
support them. Just my 2¢.
If only all software support decisions were that cut and dried. Oh well...
David Shaw committed patches to the 1.4,
Dan McGee wrote:
On Thu, Dec 29, 2011 at 2:18 AM, John Clizbe j...@enigmail.net wrote:
Jerry wrote:
It would seem, and this is strictly my own opinion, that if the old
pksd servers are dead then there is no logical reason to continue to
support them. Just my 2¢.
If only all software
Dan McGee wrote:
On Thu, Dec 29, 2011 at 2:18 AM, John Clizbe j...@enigmail.net wrote:
Jerry wrote:
It would seem, and this is strictly my own opinion, that if the old
pksd servers are dead then there is no logical reason to continue to
support them. Just my 2¢.
If only all
Barry Smith wrote:
Environ - Windows 7 (64Bit)
SeaMonkey 2.6.1
Enigmail 1.3.4
GnuPG 1.4.9
GPG4Win 2.1.0
GPGShell 3.78 (which is complaining about GPG 1.4.9,
but working)
Problem -- There is no binary install
Holger wrote:
2012-01-22T16:11:14-08:00, Doug Barton:
On 01/22/2012 10:05, Holger wrote:
I intend to use gpg only for receiving encrypted e-mail, not signing
my outgoing e-mail. Because I don't want my name or e-mail address
out there on the keyservers,
Why not?
One reason is spam,
Chris Poole wrote:
On Mon, Jan 23, 2012 at 4:52 PM, brian m. carlson
sand...@crustytoothpaste.net wrote:
Because it's also used to sign other people's keys. Using a very large
key (for 256-bit equivalence, ~15kbits) makes verification so slow as to
be unusable. You have to not only verify
MFPA wrote:
On Monday 23 January 2012 at 3:04:45 PM, Holger wrote:
Please simply accept that it's an issue for me as well as many others.
Harvesting is supereasy: full keydumps are readily available.
Yep, Full keydumps are readily available. http://www.keysigning.org/sks/
Yep, harvesting is
MFPA wrote:
Hi
On Tuesday 24 January 2012 at 3:21:35 PM, in Daniel Kahn Gillmor wrote:
Certainly, the keyservers will continue to support non-digested User IDs,
so now tools will need to be able to handle both of them; we'll also need a
policy for end-user agents to answer questions like when
Doug Barton wrote:
On 01/26/2012 15:41, MFPA wrote:
The use of the word harvesting in this context suggests to me a
concern about spamming rather than about privacy. And I would like
the ability to protect my name as well as (or instead of) my email
address.
As I said the last time you
Peter Lebbing wrote:
And a curious person with a mean streak might sign a key with an obscured
e-mail
address with a signature saying this is the key for
expires2...@rocketmail.com
}:-]. Which is verifiable by hashing the e-mail address. And once keyserver
no-modify is implemented, he'll
Jerome Baum wrote:
On 2012-01-28 06:14, Robert J. Hansen wrote:
It isn't just that no one's written the code: it's there's no community
consensus to deploy such code, even if it were written. It would be a
pretty major flag day. After all, if one keyserver enforces it and
others don't, then
MFPA wrote:
On Friday 27 January 2012 at 12:48:30 AM, Doug Barton wrote:
put whatever you like in the name and e-mail fields, and notify the people
you communicate with
Which is exactly what I do already, using a key with MFPA a@b.c as
its sole User ID.
There is no software modification
MFPA wrote:
On Saturday 28 January 2012 at 1:37:17 PM, John Clizbe wrote:
To achieve the two goals, you only need to put each in its own UID. Just
remember once they locate the matching key, they will have all the
information in all the UIDs.
Which is precisely what I don't want. I'm
1 - 100 of 406 matches
Mail list logo