Git clone index-pack failed

2013-12-09 Thread Kevin Hilton
Trying to clone gnupg repository on cygwin which I've done many times in
the past, but this is what I'm getting:

$ git clone git://git.gnupg.org/gnupg.git
Cloning into 'gnupg'...
fatal: index-pack failed

I've even tried:
$ git clone git://git.gnupg.org/gnupg.git --depth=1
Cloning into 'gnupg'...
fatal: index-pack failed

I'm not sure what I should be trying at this point.  Frustrating.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Test mail to kevhil...@gmail.com

2010-06-11 Thread Kevin Hilton
Not sure who that was but I was not responsible

On Jun 11, 2010 4:26 AM, Werner Koch w...@gnupg.org wrote:

Hi!

One of the subscribers to this list created a mail forward to an
automated ticketing system which responds to the the poster.  The
owner of the ticketing system at secure.mpcustomer.com does not
respond to any of our queries to send us more information on the mails
triggering the posting.  Thus we need to send these test mails in the
hope to figure out the culprit.

Sorry for the inconvenience,

 Werner
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


LZMA Compression

2009-08-31 Thread Kevin Hilton
Although I understand the compression algorithms within gnupg are
specified by the OpenGPG standard, are there any grumblings regarding
the addition of the lzma compression scheme?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Practical Advice for those using AES256 cipher?

2009-08-19 Thread Kevin Hilton
Although I usually get a wide range of responses, is there any
practical advice an end-user should take away from the recent AES256
attacks as described
here:http://www.schneier.com/blog/archives/2009/07/another_new_aes.html?
 Should I continue to use AES256 (double AES) or default to single AES
or simply default back to 3DES, or just sit tight?  Although I found
the article interesting (not sure if I understood a lot of the blog
comments), is there any practical advice I should take away from it as
it relates to GnuPG?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG + PSI Portable

2008-12-10 Thread Kevin Hilton
Did you alter your path statement and put your USB drive directories
first in the path?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG 2.0,9 - Error when trying to compile in Linux.

2008-12-04 Thread Kevin Hilton
I've composed a How-To for compiling GnuPG and GnuPG2.  I used Ubuntu 8.10
as my testing platform.  I have also verified the installation on cygwin,
although the process with cygwin was slightly more complicated, having to
download individual libraries rather than using a package management system.

Hopefully others may find these instructions useful:

http://ubuntuforums.org/showthread.php?t=649466
-- 
Kevin Hilton
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Happy Thanksgiving

2008-11-23 Thread Kevin Hilton
A little off topic, however I wanted to wish Happy Thanksgiving to all
those users in America, and actually give Thanks to the regular
contributors to this mailing list.

Thanks

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Question regarding s2k algorithms

2008-11-16 Thread Kevin Hilton
Just wondering specifically is the option
s2k-digest-algo

Does this option specifically refer to one particular digest algorithm
or a list of algorithms.  I'm just thinking there may be a problem
with a few different scenarios if this refers to only one algorithm if
for example the SHA256 algorithm is used.
1. Symmetric Encryption -- Using symmetric encryption to specifically
password protect a file, the chosen password is salted and hashed with
the algorithm specificied with the s2k-digest-algo.  I would assume
however if this file along with the password was distributed, that the
recipient's gpg version would need to specifcally have to have the
SHA256 enabled in their build or a problem would result.

2. Asymmetric Encrytion -- Am I wrong to assume, but isn't the session
key salted and hashed in the same manner?  Again, wouldn't the
recipient need the specific hashes installed.

s2k-cipher-algo

If you are using a stock gpg.conf file, and say for example this
variable is set to Camellia, or IDEA.  If you use this stock
gpg.conf file with another gpg version that doesn't have these ciphers
compiled in -- What results?  A default back to CAST5?  What if you
change this parameter after keys are already stored on the keyring?
Will this confuse things?


And lastly what specifically is the purpose of the -for-your-eyes-only
flag?  Is this option currently still in use, or only included for
backwards compatibility purposes.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question regarding s2k algorithms

2008-11-16 Thread Kevin Hilton
Ok so let me ask things in a different way

Is the s2k-cipher-algo used in any other methods other than for
protection of the keyring?  Seems odd to me that CAST5 is the default
-- however I'm sure this is specified according the one of the RFCs.

There is no current security implication for using the SHA1 hash for
password hashing when using symmetric encryption?  I'm only asking
this in regards to selecting hash algorithms, because there seems to
be a little hedging on the tried and true statement Use the defaults
when it comes to the selection of hash algorithms.  The intention of
the last statement is not to rehash the old discussion of which hash
algorithm to use -- really it is not!!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Anyone know what became of the Gaim-E Project?

2008-11-03 Thread Kevin Hilton
As others have mentioned there is another pidgin encryption technique:
http://pidgin-encrypt.sourceforge.net/ .
This project also seems to have stalled if I'm looking at the release
dates as an appropriate indication.

The OTR website specifically addresses this plugin with the following:
How is this different from the pidgin-encryption plugin?
The pidgin-encryption plugin provides encryption and
authentication, but not deniability or perfect forward secrecy. If an
attacker or a virus gets access to your machine, all of your past
pidgin-encryption conversations are retroactively compromised.
Further, since all of the messages are digitally signed, there is
difficult-to-deny proof that you said what you did: not what we want
for a supposedly private conversation!

This explanation doesn't make a lot of sense to me.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Anyone know what became of the Gaim-E Project?

2008-11-03 Thread Kevin Hilton
I'm going to try to steer this back onto a relevant topic

Robert

I love your off the cuff feelings about things.  Its when you are at
your best.  Question:

What value do signatures serve then however other than to provide data
authentication but not sender authentication? How can you be sure in
any case that if you get an unsigned transmission, that the data is
secure, was altered, or that a signature was just mistakingly not
appended?  As a counter argument -- if the private key was stolen and
a message signed using the stolen signature, it really doesn't act to
prove sender authenticity either -- but I guess it does serve to prove
data authenticity.

So in the best case scenario if the private keys are kept truly
private and secure, the signature mechanism works as designed.  In
unideal circumstances however, this trust mechanism falls apart
however.  Seems like somewhat of a quandary?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Anyone know what became of the Gaim-E Project?

2008-11-02 Thread Kevin Hilton
Just wondering if anyone was familar with the Gaim-E project?
Supposedly this was a plugin for the former IM client Gaim - now known
as Pidgin -- that provided for encrypted IM communication using
GnuPG.http://sourceforge.net/projects/gaim-e/

Interesting concept, however looks as if the project was abandoned.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


set type digest mode? plus other query

2008-10-23 Thread Kevin Hilton
Who was behind the pgp 6.5.8 ckt release?  That seemed like a solid
piece of software at the time.  If your were using windows, it
provided a good tray interface, and made encryption/decryption very
easy.  How does this piece of antiquated software compare to modern
day gnupg as far as ciphers used, digests used, etc.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Session Key Questions

2008-10-21 Thread Kevin Hilton
When the session key is randomly generated (asymmetric encryption),
how large is the session key?  Is the length set or does it depend on
other parameter such as the length of the DSA/RSA key or hash?

Thanks for clarification.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Session Key Questions

2008-10-21 Thread Kevin Hilton
Depends on what algorithm you're using for the symmetric cipher.  A 128-bit 
cipher gets a 128-bit session key, a 256-bit cipher gets a 256-bit session 
key.  The only exception might be 3DES, which technically requires a 192-bit 
session key, but since only 168 bits get used, there could be some discrepancy 
there.

 When the session key is randomly generated (asymmetric encryption),
 how large is the session key?  Is the length set or does it depend on
 other parameter such as the length of the DSA/RSA key or hash?

 It is the key size of your symmetric cipher.  So AES256 == 256 bits, AES128
 == 128 bits, etc.


Thanks for rapid response -- I guess I'm missing out on some of the
more basic details.  Just a quick followup.  If I'm planning on using
gpg to symmetrically encrypt a file for example, and choose a
password.  This password is salted and hashed.  Say for theoretical
reasons SHA512 was used to perform the hashing producing a 512 bit
hash result.  Would then hash then be rounded, or the right most bits
excluded if it were to used with AES encryption (which requires a 128
bit key)?  In the opposite situation, say SHA1 produced a 160 bit hash
result and I wanted to use AES256 (which requires a 256 bit key) --
would extra bits be added onto the hash result to pad the results up
to 256 bits?

Using the defaults as provided in the standard gpg.conf file -- what
hash is used in the normal salting/hashing process during symmetric
encryption?  I dont believe this is the s2k-digest-algo since this is
for key protection.



-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Session Key Questions

2008-10-21 Thread Kevin Hilton
 If the hash output is not enough, then extra 0x00 byte will be added to
 your passphrase and hashed again to produce additional and different
 hashing output. If even this isn't enough, then two 0x00 bytes will be
 added and hashed again, and so on.


Ok -- so just some points of clarification.  What is the default
s2k-digest-algo?  Lets say its SHA1 or for the point of argument I set
it to be SHA1.  SHA1 always produces 160 bit resultants.  Say I want
to use the AES256 cipher.  If I am understanding what has been
reported previously, this requires a 256 bit key.  If the process you
described above works, wouldn't a 160 bit hash always be produced?
Just to clarify in my own mind your process --  If the hash output is
not enough and an extra 0x00 byte (which I think you are telling me
0x00 = 256 0 bits) is added to the passphrase and then rehashed with
SHA1 - wouldn't another 160 bit hash be produced again?  How would a
256 bit hash ever be produced is the SHA1 hash was always used.

Thanks -- I have a feeling I'm getting off in left field here and
missing some understanding of some basic concepts.



-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Testing a build

2008-10-13 Thread Kevin Hilton
Just to throw it out there -- if you need to compile for Windows why
don't you do it for cygwin?  I've just recently been able to compile
both gpg and gpg2 using cygwin on WinXP.  This saved me the need to
cross compile.  Probably not the most elegant solution, however it
does work.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GPG --symmetric option and passphrases

2008-10-06 Thread Kevin Hilton
When using gpg with the --symmetric flag (as when symmetrically
encrypting a file with a passphrase), is the passphrase salted and
hashed?  Is so, how many times is it hashed, and what hashing
algorithm is used for this process?  Is this controlled by some
parameter in the gpg.conf file or command line flag?

Thanks

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Computational Efficiency of GnuPG ciphers and hashes

2008-10-06 Thread Kevin Hilton
Its often been mentioned on this mailing list, that 3DES is
notoriously slow.  On the flipside, what cipher is considered the
fastest -- or the most computationally efficient (if this term even
applies)?  Are there similar relative results among the GnuPG hashes?

Thanks

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG --symmetric option and passphrases

2008-10-06 Thread Kevin Hilton
 On Mon, Oct 6, 2008 at 10:17 AM, David Shaw [EMAIL PROTECTED] wrote:
 On Oct 6, 2008, at 10:54 AM, Kevin Hilton wrote:

 When using gpg with the --symmetric flag (as when symmetrically
 encrypting a file with a passphrase), is the passphrase salted and
 hashed?

 Yes.  Unless you change that safe default with --s2k-mode.

  Is so, how many times is it hashed, and what hashing
 algorithm is used for this process?

 By default, it's 65536 iterations.  The hash algorithm is SHA-1, unless you
 change it with --s2k-digest-algo.

  Is this controlled by some
 parameter in the gpg.conf file or command line flag?

 --s2k-count is what you're looking for:

   --s2k-count n
  Specify how many times  the  passphrase  mangling  is
  repeated.
  This  value  may  range between 1024 and 65011712 inclusive,
 and
  the  default  is  65536.   Note  that  not  all  values  in
  the
  1024-65011712  range  are  legal  and  if  an  illegal  value
 is
  selected, GnuPG will round up to the nearest legal value.
 This
  option is only meaningful if --s2k-mode is 3.

 As always, the defaults here are safe.  Don't change them unless you know
 what you're doing.

 David



Thanks -- very clear explanations.  How long can the passphrase be?  I
assume it would be truncated at a particular length.  For example if I
passes a Whirlpool Hash as the passphrase, would the entire 128-digit
hexadecimal hash be used as the passphrase or would this be rounded?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GPG2 - IDEA

2008-10-01 Thread Kevin Hilton
Ok, I've finally managed to compile the gpg2 package (the stable
package, not svn) with cygwin.  Is there a way to add idea support to
gpg2 or is this feature not supported?  Thanks

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-24 Thread Kevin Hilton
Thanks for the quoted sections from Applied Cryptography.  Just to
throw more fuel on the fire, however from the quoted material, it
would seem that Serpent and 3DES have a lot in common -- slowness, but
security.  Again a lot of ciphers are already included in GnuPG, many
it seems for historical reasons, that could be made read only as many
have suggested.  How a cipher like cast5, but not Serpent could be
included, other than for historical reasons, is beyond me.  Again as I
have been told on this list, in selecting an AES winner, a lot more
factors were considered than just plain security, hence the reason why
Serpent was never the AES standard.

I'll stop ranting now.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing preferences

2008-09-24 Thread Kevin Hilton
 Purely historical reasons.  Also, the SERPENT design team, much like the
 Twofish design team, is strongly pushing abandoning the AES also-rans
 and using AES.



What's the motivation for abandoning the AES also-rans?  I can see the
motivation for not including them in the OpenGPG specification,
however wouldn't it be a mistake to move toward one algorithm (or two
in the case of AES and 3DES)?  I guess I'm just confused how
critically evaluated algorithms (as per the AES competition), such as
Serpent and Twofish, are moving towards the opinion of being
abandoned, whereby Camellia is moving towards adoption by the OpenGPG
committee.  On the surface, there seems to be a lot of double-talk
regarding the abandonment/ or reasons for not adopting some
algorithms, but on the other hand using similar rationale to except
other algorithms.

Since I don't really understand the process of cryptography other than
on the surface, I could be mistaken.  However on the surface --
mathematics removed -- these decisions seem to be more political than
based on proven concept.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-23 Thread Kevin Hilton
Robert can probably give a better explanation that I, however with
3072 DSA signing keys, the SHA512 and SHA256 algorithms functionally
produce the same length hash since the lower 256 bits are dropped as
per the FIPS specification.  I've often wondered the consequences of
such an action -- whether this makes the chance of a collision higher
or equal in comparing the SHA512 modified hash product to the SHA256
hash product.  Perhaps someone could elaborate on this.

Of course with RSA keys, no such limitation is in place.  Just an FYI.

(And just another summary, the battle between RSA vs DSA signing keys
has been waged many times prior on this mailing list -- Google for it
if you don't believe me -- and to summarize the conclusions of many on
this list -- this is no functional advantage of using one over the
other).

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-21 Thread Kevin Hilton
 By the way... if I use setpref to set my encryption algorithms to
 AES256 and AES128, does it mean people won't be able to use, let's say,
 3DES to send encrypted messages to, even if they are incapable of using
 AES? I mean... if I forget to add some algo, would I be making my key
 less compatible with other OpenPGP software?

The prefs associated with your key, is advertising to the sender what
you would prefer.  However the capabilities to decode an encrypted
version is really determined by your gpg version and what ciphers it
was associated with.  Unless you force an algorithm -- with the
cipher-algo preference, if your personal-preference list and the
preferences associated with the public key (showpref or pref) have no
matches in common (this is not a union of the sets), then 3DES is
chosen by default.  I believe all gnupg version since inception have
had the capablities to decode 3DES encrypted messages as dictated by
the OpenPGP RFC specifications.  (I could be wrong on this very last
statement).  The use of personal-cipher-preferences rather than
cipher-algo is preferred, since it prevents the problem of sending an
encrypted communication that the recipient can not decode.  If there
is a null union of the personal-cipher-preferences and the key
preferences, then 3DES is chosen.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-21 Thread Kevin Hilton
  If you never want to see that algorithm used ever, leave it
  off the list completely.

Not to beat a dead horse, but this statement isn't exactly true.  The
sender can force the use of a particular algorithm that is not on the
list.  I take objection to the use of the work never.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-21 Thread Kevin Hilton
I'm not here to create an argument, however the option(s)

cipher-algo
digest-algo

is specifically addressed within the documentation.  All the scenarios
you are speaking about are extremely unrealistic, not documented in
the documentation, and would take extreme measures to fulfill.  I
except your statement that we need a basic level of communication,
however I think this basic level begins by discussing the possible
switches which are discussed and documented specifically within the
documentation.  I am very much a novice in answering question on this
mailing list, however I think your rant was unjustified and
inappropriate. I'm not making any claims or false statements or
presumptions other than those specifically discussed within the
documentation.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing preferences

2008-09-18 Thread Kevin Hilton
I think the problem is with the word preferences.  The use of this
word in the setpref command and in the
personal-cipher/hash-preferences really doesn't convey what
preferences are preferred over each other.  The sender's preferences
always trump the recipient's preferences.  The use of
personal-cipher/hash-preferences performs a verification based on the
list contained within the recipient's public key, that the recipient
has the capabilities to decode/verify the message, whereas the use of
the non-recommended cipher/digest-algo avoids this check altogether.

Its straightforward once someone explains it, however the use of the
word preferences on both the public keys and the sender's preferences
does not convey any information on the hierarchy of the preferences
(with senders  recipients).

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-18 Thread Kevin Hilton
 GnuPG in particular works like this:

 1) Take the intersection of all recipients preference lists.  This
 rules out any algorithms that would be unusable by someone.
 2) Elect a decider.  The decider is the one person whose ordered
 list we will honor the rankings for.  If the user has specified a
 personal-*-prefs list, then the user is the decider.  If the user has
 not specified a list, then the last recipient key is used.
 3) Walk the decider preference list from highest ranked to lowest
 ranked - as soon as we hit an algorithm that is part of the
 intersection from step #1, stop.

 For example:
   Alice has AES CAST5 TWOFISH
   Baker has CAST5 AES BLOWFISH
   Charlie has BLOWFISH AES CAST5
   Donald has CAMELLIA TWOFISH BLOWFISH

 Assuming that there is no personal-*-prefs list set), here's how it
 falls out:

Alice Baker Charlie == AES
Baker Alice Charlie == AES
Charlie Alice Baker == CAST5
Charlie Alice Baker Donald = 3DES


Thats a great explanation.  Perhaps this should be included in the
documentation.

Lastly however this is assuming the sender is not using the

cipher-algo
digest-algo

options.  From my reading of the documentation, this will force the
use of a particular cipher as dictated by the sender, even if the
algorithm is not contained in the list of the public keys.  I know
these two options are not recommended for use, however since they are
included as possible options, I think that they should at least be
covered by a what if scenario.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG Defaults

2008-09-17 Thread Kevin Hilton
 For whatever it's worth, many people within the OpenPGP community would
 really like to see a lot of algorithms go away.  (E.g., if it were up to
 me, only DSA, ElG, AES, 3DES, SHA1 and SHA256 would be supported.)  Some
 people reduce their advertised capabilities in order to encourage moving
 to a smaller algorithm set.


Based on the lack of vulnerabilities of those limited set of
algorithms (excluding SHA1 -- another topic entirely), it would seem
to be prudent to refine the number of acceptable algorithms.  When
the SHA family is eventually supplanted and Camellia cipher officially
recognized, I only see this list expanding, not shrinking!



-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Session Key Questions

2008-09-17 Thread Kevin Hilton
Just some quick questions regarding the session key.  Ive consulted
the RFC4880 docs, however am still slightly confused regarding the
session key.

1. How is the session key generated?  How is its entropy randomness
determined?  Is there a specific algorithm used to generate the key?
2. Once generated, Im confused how its used.  When I use the gpg
--show-session-key option I receive:
gpg: session key:
`9:EB7DFF392EA4EDBC90A8836F82462CD0E0B5AB22D49141941CE252311ECD2D9C'

I believe 9 is referring to the symmetric cipher which the session key
is used as described by:
9.2.  Symmetric-Key Algorithms

   ID   Algorithm
   --   -
   0  - Plaintext or unencrypted data
   1  - IDEA [IDEA]
   2  - TripleDES (DES-EDE, [SCHNEIER] [HAC] -
168 bit key derived from 192)
   3  - CAST5 (128 bit key, as per [RFC2144])
   4  - Blowfish (128 bit key, 16 rounds) [BLOWFISH]
   5  - Reserved
   6  - Reserved
   7  - AES with 128-bit key [AES]
   8  - AES with 192-bit key
   9  - AES with 256-bit key
   10 - Twofish with 256-bit key [TWOFISH]
   100 to 110 - Private/Experimental algorithm


3. Is it possible to decrypt a gnupg encrypted message if I know the
decrypted session key?  How could this be accomplished?
-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Session Key Questions

2008-09-17 Thread Kevin Hilton
On Wed, Sep 17, 2008 at 9:41 AM, Werner Koch [EMAIL PROTECTED] wrote:
 On Wed, 17 Sep 2008 15:52, [EMAIL PROTECTED] said:

 1. How is the session key generated?  How is its entropy randomness
 determined?  Is there a specific algorithm used to generate the key?

 It is a random number of course:

   This random number generator is modelled after the one described in
   Peter Gutmann's paper: Software Generation of Practically Strong
   Random Numbers. See also chapter 6 in his book Cryptographic
   Security Architecture, New York, 2004, ISBN 0-387-95387-6.

 2. Once generated, Im confused how its used.  When I use the gpg
 --show-session-key option I receive:
 gpg: session key:
 `9:EB7DFF392EA4EDBC90A8836F82462CD0E0B5AB22D49141941CE252311ECD2D9C'

 That one is the encrypted using the public key algorithm (RSA or
 Elgamal) and prepended to the messaage as described in rfc4880.

 3. Is it possible to decrypt a gnupg encrypted message if I know the
 decrypted session key?  How could this be accomplished?

 Yes, use:

  --override-session-key string

Don't use the public key but the session key string.  The format of
this string is the same as the one printed by --show-session-key.
This option is normally not used but comes handy in case someone
forces you to reveal the content of an encrypted message; using this
option you can do this without handing out the secret key.



 Salam-Shalom,

   Werner



Hmm,  this method works different than what I thought.  For example if
I specify a manual session key on the command line:
gpg -se -r KevDog --override-session-key 9:345DFG session_key_test_original

But then ask gpg to reveal session key
gpg --show-session-key session_key_test_original.gpg  decrypt

I get:
gpg: session key:
`9:B619909D1DE40EEAA4865A970522895560D6556561BCD8E2B6DEF6DB8E7DA34D'


I must be doing something wrong.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Session Key Questions

2008-09-17 Thread Kevin Hilton
 for ?? historical reasons of compatibility ?? with pgp 5+
 the default cipher that will be used for encryption, and also for
 protection of the secret key, is CAST-5, not 3DES

Nope, 3DES is the only MUST cipher algorithm and thus used as the
last-resort if the preference system can't decide upon on the
algorithm.

CAST5 is like IDEA only a SHOULD in OpenPGP as per rfc2440.  The
updated OpenPGP (rfc4880) changed this SHOULD algorithms to AES-128
and CAST5 but kept 3DES as MUST algorithm.


So what is GnuPG's default implementation is no symmetric cipher is
specified?  Since it includes AES-128, CAST5, and 3DES in all recent
distributions, does it use AES-128 or 3DES as the default symmetric
cipher if no cipher is specified on the command line, or within the
sender's gpg.conf file?  I would assume that it would look at the
preferences of the public encryption key, and likely pick the first
cipher on the list.  Since in most recent versions of GPG, AES256 is
the first algorithm specified (as demonstrated with the showpref
command), that the sender in turn would reply with an AES256
symmetrically encrypted message (if possible).  If an older version of
GPG were being used that didnt support AES, it would likely then
choose among rank ordered subsequent algorithms as shown in the
setpref commad.  Following this logic however, it would seem for me
that CAST5 would be chosen preferentially rather than 3DES:
Cipher: AES256, AES192, AES, CAST5, 3DES, IDEA

Other than for backward compatibility purposes, I thought the
encryption community had turned their backs on CAST5, but not 3DES.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG Defaults

2008-09-17 Thread Kevin Hilton
 David Shaw wrote:

No.  If you don't specify, GPG will take the union of every cipher
preference on every key you are encrypting to.  It will pick the
cipher from that list.  If that list is empty, it will pick 3DES.

Thanks -- I think I understand the cipher selection process as you
describe it.  Thanks everyone for the clarification.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Session Key Questions

2008-09-17 Thread Kevin Hilton
On Wed, Sep 17, 2008 at 11:51 AM, Werner Koch [EMAIL PROTECTED] wrote:
 On Wed, 17 Sep 2008 17:38, [EMAIL PROTECTED] said:

 Hmm,  this method works different than what I thought.  For example if
 I specify a manual session key on the command line:
 gpg -se -r KevDog --override-session-key 9:345DFG session_key_test_original

 --override-session-key is for decyrption only.


 Shalom-Salam,

   Werner

 --


I take it there is not encryption equivalent -- making it in one
session using gpg with the symmetric option.



-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing preferences

2008-09-17 Thread Kevin Hilton
I think you are using the wrong command within your gpg.conf file


personal-cipher-preferences
personal-digest-preferences

These control what cipher/hash will be used when using other people's
public key.  showpref allows you as the sender to be aware of the
capabilities (ciphers/hashes) that are available on the recipients
machine.  You wouldn't want to send someone for example, a message
encrypted using the Camellia cipher, when the recipient would not have
capabilities by virtue of their gpg version to decrypt the message
because Camellia was not compiled into the executable.
personal-cipher-preferences (or digest) allows you as a sender to
choose algorithms that you prefer.  The firstmost algorithm contained
within your personal preference that is also within the key preference
list is chosen to encode or sign the message.

Preferences that are set at key generation time are controlled by the:
--default-preference-list string
Set the list of default preferences to string. This preference
list is used for new keys and becomes the default for setpref in the
edit menu.

Hopefully that is clear.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG ElGamal Signing Key

2008-09-16 Thread Kevin Hilton
Although you would have to go to lengths to create an ElGamal signing
key (rather than a DSA or RSA key), is use of an ElGamal signing key
still considered to be bad behaivor?  The last article I read from
2003 suggested ElGamal signing keys (strictly different than ElGamal
encryption keys) had been compromised:

http://silverstr.ufies.org/blog/archives/000415.html


As a side note, are there any other possible algorithms that may be
used to generate a signing key other than DSA/RSA/ElGamal.

Thanks.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG Defaults

2008-09-16 Thread Kevin Hilton
I'm sure its probably contained in one of the RFC's, however when was
DSA signing keys and ElGamal Encryption keys, along with the AES-256
cipher and SHA1 digest chosen as the defaults for key generation?  Any
particular reasons these were chosen as the defaults?  (This is not an
attempt to lure people into a discussion of which is better than
that).  I'm just curious why these were chosen as defaults.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG Defaults

2008-09-16 Thread Kevin Hilton
On Tue, Sep 16, 2008 at 11:50 PM, Robert J. Hansen [EMAIL PROTECTED] wrote:
 Kevin Hilton wrote:
 I'm sure its probably contained in one of the RFC's, however when was
 DSA signing keys and ElGamal Encryption keys, along with the AES-256
 cipher and SHA1 digest chosen as the defaults for key generation?  Any
 particular reasons these were chosen as the defaults?

 DSA-1024 is a MUST in the RFC, and therefore is interoperable with every
 conforming OpenPGP implementation.  Likewise with SHA-1.

 AES is a SHOULD, and is interoperable with the great majority of OpenPGP
 applications (PGP 7.1+).

 As DSA-2048 and DSA-3072 support becomes more commonplace (read: as
 people migrate away from older versions of PGP and GnuPG, a process that
 takes astonishingly long), you can expect to see the defaults change.  I
 don't know too many people who are still enthusiastic about DSA-1024,
 although it's still considered infeasible to break it.



Im slighly confused.  I thought in terms of GnuPG - AES256 was the
default cipher as of version 1.48.  I thought 3DES was still the
standard cipher according to the OpenGPG spec.  I dont use PGP,
however it would seem that you were implying 3DES is still the default
cipher type in this product?

Any knowledge on why ElGamal was chosen over RSA as the default
session key cipher?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GPG2 compile problems on cygwin

2008-07-09 Thread Kevin Hilton
Perhaps the belongs in development section.

Again have never successfully compiled gpg2 for cygwin.  I'm trying to
compile gnupg2 svn version 4797.  I'm getting following error (I've received
same error with many of previous revisions also:)

libcommon.a(libcommon_a-convert.o): In function `do_bin2hex':
/home/klal/temp/gnupg/gpg2/common/convert.c:120: undefined reference to
`_gcry_m
alloc'

Is there something I can do to help with the debugging of this error?
Thanks for any suggestions.

-- 
Kevin Hilton
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


About my prefered settings...

2008-06-24 Thread Kevin Hilton
Typing gpg -v --version will give you the capabilities along with the
relative numbers for your compiled version of gpg

Example:

$ gpg -v --version
gpg (GnuPG) 1.4.10-svn4783
Copyright (C) 2008 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html

This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA (S1), 3DES (S2), CAST5 (S3), BLOWFISH (S4), AES (S7), AES192
(S8),

AES256 (S9), TWOFISH (S10), CAMELLIA128 (S11), CAMELLIA192 (S12),
CAMELLIA256 (S13)
Hash: MD5 (H1), SHA1 (H2), RIPEMD160 (H3), SHA256 (H8), SHA384 (H9),
  SHA512 (H10), SHA224 (H11)
Compression: Uncompressed (Z0), ZIP (Z1), ZLIB (Z2), BZIP2 (Z3)

-- 
Kevin Hilton
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: SVN version not correctly displaying

2008-05-23 Thread Kevin Hilton
$ svn info configure.ac
Path: configure.ac
Name: configure.ac
URL: svn://cvs.gnupg.org/gnupg/branches/STABLE-BRANCH-1-4/configure.a
Repository Root: svn://cvs.gnupg.org/gnupg
Repository UUID: 8a63c251-dffc-0310-8ec6-d64dca2275b1
Revision: 4765
Node Kind: file
Schedule: normal
Last Changed Author: wk
Last Changed Rev: 4753
Last Changed Date: 2008-04-30 06:46:35 -0500 (Wed, 30 Apr 2008)
Text Last Updated: 2008-05-08 00:28:46 -0500 (Thu, 08 May 2008)
Checksum: 1c05726d57e4533f00678401269d3603

The version part is discovered here (as you know):
m4_define([svn_revision], m4_esyscmd([echo $((svn info 2/dev/null \
  || echo 'Revision: 0')|sed -n '/^Revision:/ s/[^0-9]//gp'|head -1)| \
  tr -d '\n']))

Im not certain about the m4 declarations, but the script logic:
 echo $((svn info 2/dev/null || echo 'Revision: 0')|sed -n
'/^Revision:/ s/[^0-9]//gp'|head -1)|  tr -d '\n']

Works OK on the command line and produces the desired svn number.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: SVN version not correctly displaying

2008-05-12 Thread Kevin Hilton
 Did You Manually change the version number within configure.ac?

I had no idea that you had to change the version number within the
configure.ac file.  I was hoping to avoid any manual changes but see
that it may be needed.

 Did you make clean or make distclean first?

Yes a make distclean -- it didn't make any difference.  During the
./configure process it tells you the version number it is compiling
for.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Suggestions on how to compile for cygwin

2008-05-08 Thread Kevin Hilton
I frequently try to compile svn versions often for the cygwin
platform.  Both for svn version of gnpgp 1.49 and gnupg2, I'm getting
a lot of errors during the make process.  All are problems related to
the gettext module.  By default cygwin is installed with gettext
version 0.15 however I did go ahead and install version 0.17 from
source as gettext 0.16 or later is required with the gpg2 source
installation.  I'm still getting errors however.  Does anyone have any
suggestions how to get around these errors?  It always involves the
gettext package.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Cygwin gpg 1.4.10 -- svn 4752 make error

2008-04-23 Thread Kevin Hilton
Hmmm seems to be another gettext problem -- Any solutions

$ gettext --version
gettext (GNU gettext-runtime) 0.17
Copyright (C) 1995-1997, 2000-2007 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Written by Ulrich Drepper.

Making all in intl
make[2]: Entering directory `/home/klal/temp/gnupg/svn_gnupg_trunk/intl'
gcc -c -DLOCALEDIR=\/usr/local/share/locale\ -DLOCALE_ALIAS_PATH=\/usr/local/
share/locale\ -DLIBDIR=\/usr/local/lib\ -DBUILDING_LIBINTL -DBUILDING_DLL -DI
N_LIBINTL -DENABLE_RELOCATABLE=1 -DIN_LIBRARY -DINSTALLDIR=\/usr/local/lib\ -D
NO_XMALLOC -Dset_relocation_prefix=libintl_set_relocation_prefix -Drelocate=libi
ntl_relocate -DDEPENDS_ON_LIBICONV=1 -DHAVE_CONFIG_H -I. -I. -I..  -g -O2 -Wall
-Wcast-align -Wshadow -Wstrict-prototypes -Wformat-nonliteral   version.c
version.c:26: error: `LIBINTL_VERSION' undeclared here (not in a function)
make[2]: *** [version.o] Error 1
make[2]: Leaving directory `/home/klal/temp/gnupg/svn_gnupg_trunk/intl'
make[1]: *** [all-recursive] Error 1
make[1]: Leaving directory `/home/klal/temp/gnupg/svn_gnupg_trunk'
make: *** [all] Error 2
-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG v2.x?

2008-04-07 Thread Kevin Hilton
Just updated to svn version gpg2 4739

Still have same problems trying to compile gpg2 under cygwin with the
gettext error:

gcc  -I/usr/local/include -I/usr/local/include -g -O2 -Wall -Wcast-align -Wshado
w -Wstrict-prototypes -Wformat -Wno-format-y2k -Wformat-security -Wpointer-arith
   -o gpg2.exe gpg.o server.o build-packet.o compress.o compress-bz2.o free-pack
et.o getkey.o keydb.o keyring.o seskey.o kbnode.o mainproc.o armor.o mdfilter.o
textfilter.o progress.o misc.o openfile.o keyid.o parse-packet.o cpr.o plaintext
.o sig-check.o keylist.o pkglue.o pkclist.o skclist.o pubkey-enc.o passphrase.o
seckey-cert.o encr-data.o cipher.o encode.o sign.o verify.o revoke.o decrypt.o k
eyedit.o dearmor.o import.o export.o trustdb.o tdbdump.o tdbio.o delkey.o keygen
.o helptext.o keyserver.o photoid.o call-agent.o card-util.o exec.o ../common/li
bcommon.a ../jnlib/libjnlib.a ../gl/libgnu.a  ../common/libgpgrl.a -lz -lbz2 -lr
esolv  -lreadline /usr/local/lib/libintl.dll.a -liconv -L/usr/local/lib   -lgcry
pt -lgpg-error -L/usr/local/lib -lassuan -L/usr/local/lib -lgpg-error -liconv
/usr/local/lib/libgpg-error.a(libgpg_error_la-strerror.o): In function `gpg_stre
rror':
/home/klal/temp/gnupg/libgpg-error-1.6/src/strerror.c:50: undefined reference to
 `_libintl_dgettext'
/usr/local/lib/libgpg-error.a(libgpg_error_la-strerror.o): In function `gpg_stre
rror_r':
/home/klal/temp/gnupg/libgpg-error-1.6/src/strerror.c:161: undefined reference t
o `_libintl_dgettext'
Info: resolving _rl_attempted_completion_over by linking to __imp__rl_attempted_
completion_over (auto-import)
Info: resolving _rl_attempted_completion_function by linking to __imp__rl_attemp
ted_completion_function (auto-import)
Info: resolving _rl_inhibit_completion by linking to __imp__rl_inhibit_completio
n (auto-import)
Info: resolving _rl_catch_signals by linking to __imp__rl_catch_signals (auto-im
port)
Info: resolving _rl_outstream by linking to __imp__rl_outstream (auto-import)
Info: resolving _rl_instream by linking to __imp__rl_instream (auto-import)
Info: resolving _rl_readline_name by linking to __imp__rl_readline_name (auto-im
port)
collect2: ld returned 1 exit status
make[2]: *** [gpg2.exe] Error 1
make[2]: Leaving directory `/home/klal/temp/gnupg/gpg2/g10'
make[1]: *** [all-recursive] Error 1
make[1]: Leaving directory `/home/klal/temp/gnupg/gpg2'
make: *** [all] Error 2

I've seen other people complain of a similar error trying to compile
other programs, but never found a posted solution.  I don't know a lot
about playing with the link flags.  Are there any suggestions I could
try?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG v2.x?

2008-04-05 Thread Kevin Hilton
But will it compile using in Vista using cygwin?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG v2.x?

2008-04-05 Thread Kevin Hilton
I think I can answer my own question --- No!

I obtained svn sources, but during the make process, it failed with
the following:

gcc -I/usr/local/include -I/usr/local/include -I/usr/local/include -g -O2 -Wall
-Wcast-align -Wshadow -Wstrict-prototypes -Wformat -Wno-format-y2k -Wformat-secu
rity -Wpointer-arith   -o gpg2.exe gpg.o server.o build-packet.o compress.o comp
ress-bz2.o free-packet.o getkey.o keydb.o keyring.o seskey.o kbnode.o mainproc.o
 armor.o mdfilter.o textfilter.o progress.o misc.o openfile.o keyid.o parse-pack
et.o cpr.o plaintext.o sig-check.o keylist.o pkglue.o pkclist.o skclist.o pubkey
-enc.o passphrase.o seckey-cert.o encr-data.o cipher.o encode.o sign.o verify.o
revoke.o decrypt.o keyedit.o dearmor.o import.o export.o trustdb.o tdbdump.o tdb
io.o delkey.o keygen.o helptext.o keyserver.o photoid.o call-agent.o card-util.o
 exec.o ../common/libcommon.a ../jnlib/libjnlib.a ../gl/libgnu.a  ../common/libg
pgrl.a -lz -lbz2 -lresolv  -lreadline /usr/local/lib/libintl.dll.a -liconv -L/us
r/local/lib   -L/usr/local/lib -lgcrypt -lgpg-error -L/usr/local/lib -lassuan -L
/usr/local/lib -lgpg-error -liconv
/usr/local/lib/libgpg-error.a(libgpg_error_la-strerror.o): In function `gpg_stre
rror':
/home/klal/libgpg-error-1.6/src/strerror.c:50: undefined reference to `_libintl_
dgettext'
/usr/local/lib/libgpg-error.a(libgpg_error_la-strerror.o): In function `gpg_stre
rror_r':
/home/klal/libgpg-error-1.6/src/strerror.c:161: undefined reference to `_libintl
_dgettext'
/usr/local/lib/libgpg-error.a(libgpg_error_la-strsource.o): In function `gpg_str
source':
/home/klal/libgpg-error-1.6/src/strsource.c:36: undefined reference to `_libintl
_dgettext'
/home/klal/libgpg-error-1.6/src/strsource.c:36: undefined reference to `_libintl
_dgettext'
Info: resolving _rl_attempted_completion_over by linking to __imp__rl_attempted_
completion_over (auto-import)
Info: resolving _rl_attempted_completion_function by linking to __imp__rl_attemp
ted_completion_function (auto-import)
Info: resolving _rl_inhibit_completion by linking to __imp__rl_inhibit_completio
n (auto-import)
Info: resolving _rl_catch_signals by linking to __imp__rl_catch_signals (auto-im
port)
Info: resolving _rl_outstream by linking to __imp__rl_outstream (auto-import)
Info: resolving _rl_instream by linking to __imp__rl_instream (auto-import)
Info: resolving _rl_readline_name by linking to __imp__rl_readline_name (auto-im
port)

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG v2.x?

2008-04-05 Thread Kevin Hilton
Hmm, thanks for the suggestion.  I believe gnupg2 requires gettext
0.17 or greater -- cygwin ships with 0.16, with no higher version
available in its mirrors.  I downloaded the 0.17 sources from here:
ftp://mirrors.kernel.org/gnu/gettext/, compiled and installed.  I'm
kind of stuck at this point.  The intl package is contained within the
gettext package correct?  For some reason the cvs sources of gettext
will not compile.  I'm stuck in dependency hell!  I'm finding not much
luck with the cygwin mailing list either!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG v2.x?

2008-04-05 Thread Kevin Hilton
Maybe this isnt for me.  I did manage to get gettext compiled from
cvs.  Its now 0.18-pre1.  However I think Im getting stuck at the same
point:

gcc -I/usr/local/include -I/usr/local/include -I/usr/local/include -g -O2 -Wall
-Wcast-align -Wshadow -Wstrict-prototypes -Wformat -Wno-format-y2k -Wformat-secu
rity -Wpointer-arith   -o gpg2.exe gpg.o server.o build-packet.o compress.o comp
ress-bz2.o free-packet.o getkey.o keydb.o keyring.o seskey.o kbnode.o mainproc.o
 armor.o mdfilter.o textfilter.o progress.o misc.o openfile.o keyid.o parse-pack
et.o cpr.o plaintext.o sig-check.o keylist.o pkglue.o pkclist.o skclist.o pubkey
-enc.o passphrase.o seckey-cert.o encr-data.o cipher.o encode.o sign.o verify.o
revoke.o decrypt.o keyedit.o dearmor.o import.o export.o trustdb.o tdbdump.o tdb
io.o delkey.o keygen.o helptext.o keyserver.o photoid.o call-agent.o card-util.o
 exec.o ../common/libcommon.a ../jnlib/libjnlib.a ../gl/libgnu.a  ../common/libg
pgrl.a -lz -lbz2 -lresolv  -lreadline /usr/local/lib/libintl.dll.a -liconv -L/us
r/local/lib   -L/usr/local/lib -lgcrypt -lgpg-error -L/usr/local/lib -lassuan -L
/usr/local/lib -lgpg-error -liconv
/usr/local/lib/libgpg-error.a(libgpg_error_la-strerror.o): In function `gpg_stre
rror':
/home/klal/libgpg-error-1.6/src/strerror.c:50: undefined reference to `_libintl_
dgettext'
/usr/local/lib/libgpg-error.a(libgpg_error_la-strerror.o): In function `gpg_stre
rror_r':
/home/klal/libgpg-error-1.6/src/strerror.c:161: undefined reference to `_libintl
_dgettext'
/usr/local/lib/libgpg-error.a(libgpg_error_la-strsource.o): In function `gpg_str
source':
/home/klal/libgpg-error-1.6/src/strsource.c:36: undefined reference to `_libintl
_dgettext'
/home/klal/libgpg-error-1.6/src/strsource.c:36: undefined reference to `_libintl
_dgettext'
Info: resolving _rl_attempted_completion_over by linking to __imp__rl_attempted_
completion_over (auto-import)
Info: resolving _rl_attempted_completion_function by linking to __imp__rl_attemp
ted_completion_function (auto-import)
Info: resolving _rl_inhibit_completion by linking to __imp__rl_inhibit_completio
n (auto-import)
Info: resolving _rl_catch_signals by linking to __imp__rl_catch_signals (auto-im
port)
Info: resolving _rl_outstream by linking to __imp__rl_outstream (auto-import)
Info: resolving _rl_instream by linking to __imp__rl_instream (auto-import)
Info: resolving _rl_readline_name by linking to __imp__rl_readline_name (auto-im
port)
collect2: ld returned 1 exit status
make[2]: *** [gpg2.exe] Error 1
make[2]: Leaving directory `/home/klal/temp/gnupg/gnupg2/gnupg/g10'
make[1]: *** [all-recursive] Error 1
make[1]: Leaving directory `/home/klal/temp/gnupg/gnupg2/gnupg'
make: *** [all] Error 2

Still seems like a gettext error.  All libs are in /usr/local/libs

Thanks for any suggestions or sympathies.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG v2.x?

2008-04-05 Thread Kevin Hilton
Clarification,

my libraries are in /usr/local/lib

Also this link statement seems strange to me.  Possibly this is correct?:

-lreadline /usr/local/lib/libintl.dll.a

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Whirlpool Hash

2008-04-01 Thread Kevin Hilton
Has anyone written a patch that would allow whirlpool as an available
hash algorithm for use with gnupg?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Whirlpool Hash

2008-04-01 Thread Kevin Hilton
Let us know when you are done with the patch.  I'd be interested in
trying it out -- that would make one person who could verify your
signature!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: When using svn version gnupg, why isnt svn version shown with gpg --version

2008-03-07 Thread Kevin Hilton
Just to clarify

I wasn't compiling version 1.48 against rev 4702.  The flag in the
configure.ac was not updated to reflect the newer version, so it
appeared it was version 1.48 when in fact it was 1.49 as has been
graciously pointed out to me.

Thanks for your help.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: When using svn version gnupg, why isnt svn version shown with gpg --version

2008-03-06 Thread Kevin Hilton
Whats wrong with my version  -- I'm getting 1.48

$ gpg --version
gpg (GnuPG) 1.4.8-svn4702
Copyright (C) 2007 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: ~/.gnupg
Supported algorithms:
Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128,

CAMELLIA256
Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

My configure.ac (at least the top part looks like this:)
# Remember to change the version number immediately *after* a release.
# Set my_issvn to yes for non-released code.  Remember to run an
# svn up and autogen.sh --force right before creating a distribution.
m4_define([my_version], [1.4.8])
m4_define([my_issvn], [yes])

m4_define([svn_revision], m4_esyscmd([echo -n $((svn info 2/dev/null \
  || echo 'Revision: 0')|sed -n '/^Revision:/ s/[^0-9]//gp'|head -1)]))

I'm guessing it should read like this:
m4_define([my_version], [1.4.9])

Since Im using the svn sources I would have thought this file would
have automatically at least been updated to 1.49 -- or am I missing
something.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: When using svn version gnupg, why isnt svn version shown with gpg --version

2008-03-06 Thread Kevin Hilton
Oops, David I see what you meant about updating the flag after the
last release -- just updated to the newest svn release and all is
well.  Thanks

$ gpg --version
gpg (GnuPG) 1.4.9rc1-svn4705
NOTE: THIS IS A DEVELOPMENT VERSION!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


When using svn version gnupg, why isnt svn version shown with gpg --version

2008-03-05 Thread Kevin Hilton
Was wondering if it would be possible to show the actual gpg version
with the gpg --version flag when using gpg svn version. It would be
nice to show the revision number.  thanks

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Are DSA2 signing keys backwards compatible?

2008-02-11 Thread Kevin Hilton
No.  Preferences, including the digest preferences, are not relevant
here at all.  This is a signature *you* are making.  The digest
preferences are consulted when someone *else* is making a signature,
and wants to know if you can handle it.  It has nothing to do with
what your key needs because your key is not involved.

Sorry I was writing my last reply when I received yours.  Thank your
for clarification. I understand the difference.  However given the
fact that I could produce for example SHA256 hashes, wouldn't I prefer
the same hash length in return for security reasons?

Meaning woundn't it be preferable for the showpref statement to read
SHA256, SHA1, RIPEMD160

rather than
SHA1, SHA256, RIPEMD160

Again, Im aware of the default-preference-list within the gpg.conf
file,  This controls the preference order of the hashes, ciphers with
key creation within my own set of keys.  Other than consulting this in
the gpg.conf file, there is no other place this default list could be
consulted?  Meaning this is no command I could type that would give me
the Hash Algorithm I would be using before signing the document --
once the document is signed its easy to see the hash that was used.

I suppose the same discussion type could be stated with cipher type.
Other than consulting the default preference list within the gpg.conf
file (is there is one), is there any way to predict or show a
preference list in relation to my own keys?

Again if the showpref statement is meant for the other party, is there
an equivalent statement or command for myself?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Are DSA2 signing keys backwards compatible?

2008-02-11 Thread Kevin Hilton
On Feb 10, 2008 10:53 PM, Kevin Hilton [EMAIL PROTECTED] wrote:
 You could use SHA-512 with
 it if you liked, but the hash would be truncated to 256 bits.

 Interesting.  Are the higher or lower bits truncated?

 We follow the advice in FIPS 180-3:
 
   L = 1024, N = 160
   L = 2048, N = 224
   L = 3072, N = 256

 Ok.  So back to the ever asking defaults question, so why when I
 produce a 3072 bit DSA signing key, why isnt my first digest hash
 preference or choice SHA-256?  Here is what I am getting:

 pub  3072D/0053175A  created: 2007-11-14  expires: never   usage: SC
  trust: unknown   validity: unknown
 sub  4096g/51BFA0E0  created: 2007-11-14  expires: never   usage: E
 [ unknown] (1). -

 Command showpref
 [ unknown] (1). -
  Cipher: AES256, AES192, AES, CAST5, 3DES
  Digest: SHA1, SHA256, RIPEMD160
  Compression: ZLIB, BZIP2, ZIP, Uncompressed
  Features: MDC, Keyserver no-modify

 It would seem in fact that my digest preferences should only be SHA256
 or SHA512 based on the information provided!  SHA1 or RIPEMD160
 shouldn't even be listed here, correct?


My reason for asking these questions is in regards to a documentation
Im trying to compose for a user's group.  Obviously I'm very much a
novice in both the mathematics beyonds GnuPG but in also its
implementation.  Its clear to me you are following both the FIPS and
OpenGPG RFC 8440 in implementing the program, however the truncation
of longer hash products, along with attempting to predict which hash
the program based on the output available will actually use is very
troubling and extremely difficult to document given all the nuances of
the program, particularly in relation to DSA keys.  Given the above
example (just one example), where a 3072 DSA key actually uses either
a SHA256 or SHA512 bit hash (truncated to 256 bits), despite what is
listed when showprefs is displayed -- How do you actually document
this scenario?  Im sure the situation is similar with 2048 DSA keys.
This is particularly troublesome given the fact that many actually
recommend the use of 2048 DSA keys - meaning all hashes used are
going to be trucated to 224 bits and that 160 bit hashes will never be
used despite what would be suggested by the preference statement.

Are RSA signing keys subject to some of the same nuances as DSA keys?
Practically could a 1024 bit RSA key be used with a 512 hash?

Again its all very confusing to me -- math aside and practical
considerations why you wouldn't want to mix and match key types and
hash lengths.  Again Robert Hansen has wisely suggested use the
defaults -- I'm understanding this more and more -- however when I see
showpref statements that would suggest SHA-1 is the default hash, when
in actuality with larger DSA keys it is not, I get rather frustrated.

Thank you for your help.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Are DSA2 signing keys backwards compatible?

2008-02-10 Thread Kevin Hilton
Are DSA2 signing keys (or simply DSA keys that are larger than 1024
bits) backwards compatible with older GnuPG versions prior to 1.48?

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Are DSA2 signing keys backwards compatible?

2008-02-10 Thread Kevin Hilton
Just to clarify for some other users,

What version of GnuPG were the DSA2 keys (or longer DSA signing keys)
and the additional SHA hashes introduced?

A little of topic, but I'm predicting a future foreseeable bump in the
road when the Secure Hash Standard is named in 2011 (or whenever the
recent NIST hash analysis is concluded).  I guess however the
personal-hash-preferences would bypass this problem and default to
SHA1 if a new hash (or series of new hashes) is introduced.
Hopefully md5 support is abandoned, however I guess for historical
purposes this would be unlikely to happen.

Even more challenging will be when longer DSA keys become the de-facto
standard.  I would guess there is not any similar workaround.  I guess
users of older GnuPG versions would simply have to upgrade.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Authenticate capability of DSA or RSA signing keys

2008-02-10 Thread Kevin Hilton
When I perform a

gpg --expert --gen-key

Im given the following options:

Please select what kind of key you want:
   (1) DSA and Elgamal (default)
   (2) DSA (sign only)
   (3) DSA (set your own capabilities)
   (5) RSA (sign only)
   (7) RSA (set your own capabilities)
Your selection?

If I select either 3 or 7, Im given the choice similar to below (note
the following was produced with option #3):
Possible actions for a DSA key: Sign Certify Authenticate
Current allowed actions: Sign Certify

   (S) Toggle the sign capability
   (A) Toggle the authenticate capability
   (Q) Finished

I believe I'm aware of the signing capabilities, but how does Certify
differ from Authenticate?  Obviously I'm confused on the meaning of
Certify vs Authenticate.  I thought the public DSA signing key did
certification/authentication whereas the private DSA key performed the
signing.

Thanks for any explanation!

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Are DSA2 signing keys backwards compatible?

2008-02-10 Thread Kevin Hilton
It doesn't work that way.  SHA-1 doesn't even work with DSA2 keys.
DSA2 doesn't mean a bigger DSA key.  It means a bigger hash with a
bigger DSA key.  DSA2 allows for any hash size that is equal to or
greater than the hash size that was used when generating the key.
Thus, for example, it is legal (albeit silly) to use SHA-512 with a
old DSA key (which uses a 160-bit hash).  We just truncate to fit.

So just to clarify --
A 3096 bit DSA signing key could only be used with the SHA-512 hash?

Thanks for the explanation!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Authenticate capability of DSA or RSA signing keys

2008-02-10 Thread Kevin Hilton
Sign = sign some data
Certify = sign a key
Authenticate = prove you are you

Authenticate is used for things like using an OpenPGP key for ssh.

I forgot about the certifying of keys, sorry about that.

I knew openssh utilized rsa or dsa keys, but didn't know that the same
gpg keys could be used for this purpose.  That's very interesting.  I
suppose however the reverse is not true.  I suppose I could not take
my rsa openssh keypair, and somehow make them work with gpg?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Are DSA2 signing keys backwards compatible?

2008-02-10 Thread Kevin Hilton
You could use SHA-512 with
it if you liked, but the hash would be truncated to 256 bits.

Interesting.  Are the higher or lower bits truncated?

We follow the advice in FIPS 180-3:

  L = 1024, N = 160
  L = 2048, N = 224
  L = 3072, N = 256

Ok.  So back to the ever asking defaults question, so why when I
produce a 3072 bit DSA signing key, why isnt my first digest hash
preference or choice SHA-256?  Here is what I am getting:

pub  3072D/0053175A  created: 2007-11-14  expires: never   usage: SC
 trust: unknown   validity: unknown
sub  4096g/51BFA0E0  created: 2007-11-14  expires: never   usage: E
[ unknown] (1). -

Command showpref
[ unknown] (1). -
 Cipher: AES256, AES192, AES, CAST5, 3DES
 Digest: SHA1, SHA256, RIPEMD160
 Compression: ZLIB, BZIP2, ZIP, Uncompressed
 Features: MDC, Keyserver no-modify

It would seem in fact that my digest preferences should only be SHA256
or SHA512 based on the information provided!  SHA1 or RIPEMD160
shouldn't even be listed here, correct?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-09 Thread Kevin Hilton
Twofish is almost entirely abandoned nowadays, but it still exists in
PGP and GnuPG.  Once a bad decision is made in engineering, the
engineers are stuck supporting it forever.

Is this statement really true or just opinion?  Bruce Schneier is one
of my favorite cryptoanalysts.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Any plans for GnuPG to implement decrypting to RAM?

2008-02-05 Thread Kevin Hilton
Just wonder if GnuPG, similar to PGP, would implement decrypting files
to RAM rather than swap, or to allow user to pick location.

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-04 Thread Kevin Hilton


 The one specific piece of advice:

  * Unless you can articulate a clear need why the defaults will not
work for your purpose, stick with the defaults.

I think I've seen this piece of advice before, and for the most part I
agree with it.  The problem I have, is that no where in the
documentation are the defaults specified.  You want me to trust the
defaults, but my contention is, at least tell me what the defaults are
-- no explanation needed.  We had this discussion with the default
cipher and hash choices.  When you tell me that dsa2 is enabled by
default (in newer GnuPG versions), however in the man pages there is
still a --enable-dsa2 flag, I hope you understand my confusion.  I'm
still confused what default cipher is chosen automatically (for me its
AES).  Again the man pages should accurately represent the defaults,
and changes should be made to the documentation when changes to the
defaults are added or subtracted.  I don't think the current GnuPG
manual is complete in any way nor in any way conveys what are the
default settings.   Its disingenuous for the program creators to
expect me to trust the defaults without at least conveying them to me.

Rant over, I apologize to the community.


-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-04 Thread Kevin Hilton
Im aware of the personal cipher preferences and personal hash
preferences, but when talking about the defaults I specifically asking
if gpg were installed from source -- no modifications made -- and gpg
keys were created - what default cipher and hash would be listed first
in the list with the keys?

Without any intervention
gpg-key-gen

It appears to manually choose a DSA signing key (DSA vs DSA2 --
ambiguous since the man pages contain a switch to --enable-dsa2 in the
gpg.conf file) with SHA1 hash -- or at least the SHA1 hash is ranked
first in the key preference list

For the encryption key - a ElGamal 2048 bit key is the default with
AES chosen as the first cipher contained in the key cipher preference.

Basically I'm aware of the --default-preference-list option in the
gpg.conf file that control preferences during key generation.  I know
how to use this option, but sadly I think the explanation is really
lacking:
--default-preference-list string
  Set  the list of default preferences to string.  This prefer-
  ence list is used for new keys and becomes  the  default  for
  setpref in the edit menu.

What I want to know is obviously GnuPG comes with a
--default-preference-list built-in.  If I dont specify this setting
in the gpg.conf file, what string is used by default?  This would
basically reveal the order and list of all the defaults for ciphers,
hashes, and compression settings.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-04 Thread Kevin Hilton
As of 1.4.8 and 2.0.8, and subject to change in future versions:

Cipher:  AES256, AES192, AES, CAST5, 3DES
Hash:   SHA1, SHA256, RIPEMD160
Compression: ZLIB, BZIP2, ZIP, None

You are absolutely correct about these settings.  Perhaps this should
be included in documentation (and changed when needed), since I would
consider these to be the default settings for cipher, hash, and
compression choice.


All the --enable-dsa2 switch
does (and again, it's off by default in 1.4.8 and 2.0.8), is allow you
to generate a DSA key that is larger than 1024 bits or has a hash
larger than 160 bits.

This seems peculiar to me.  Why is this setting turned off by default?
 I'm not at war with anyone in these forums, but many have
acknowledged the shortcomings of using 160 bit hashes -- at least with
the SHA1 hash.  In the same vain, aren't keys sizes larger than 1024
bits actually now recommended?

The default fallback allows the creation of a 1024 bit DSA key
utilizing the SHA-1 hash -- the preferred preference.  Again I know
nothing about cryptography but based on the links provided by users'
of this forum, it would seem that the choice or a larger DSA key and
different hash would be preferable?.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Can you clarify when data compression is used?

2008-02-03 Thread Kevin Hilton
Is the data compression algorithm applied to the text prior to being
converted to ciphertext, or is the ciphertext compressed, or is it the
combination of the ciphertext and encrypted session key that is compressed?
I can't seem to find any documentation discussing this.

-- 
Kevin Hilton
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Can you clarify when data compression is used?

2008-02-03 Thread Kevin Hilton
On Feb 4, 2008 1:17 AM, Kevin Hilton [EMAIL PROTECTED] wrote:

 Although  not supported on all systems (and not included on ubuntu by
 default if you can believe it), does bzip2 offers the highest compression?
 I know that --personal-compress-preferences may be included in the
 gpg.conf file to take advantage of bzip2 or zlib if desired.  Does PGP
 still only recognize ZIP or no compression?




-- 
Kevin Hilton
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


IDEA

2008-01-29 Thread Kevin Hilton
Hope I don't get in trouble for posting this, however the idea module
can be found here:
wget ftp://ftp.gnupg.dk/pub/contrib-dk/idea.c.gz

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-15 Thread Kevin Hilton
I dont have any feelings or objections about any of the ciphers or
hashes included or excluded (ok maybe serpent should be included),
however I can imagine that deleting old ciphers and hashes would cause
a problem with backwards compatibility.  Why md5 and cast5 are still
included is beyond me, other than for backwards compatibility.

Lastly, who is this governing body that decides what algorithms should
be included? The IETF OpenPGP group?  As a regular user of gpg, but
novice when it comes to the history of PGP/GPG this discussion on the
history/politics of GPG/PGP has been very interesting for me.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-15 Thread Kevin Hilton
From what you are saying about cipher/hashes, it sounds as an end user
of gnupg, it would be best to regularly rotate my personal cipher/hash
preferences.


And lastly, not to be a conspiracy theorist, but how certain can I be
that the NSA (who probably employs the single largest collection of
cryptographers) hasn't discovered back-doors or cracks in the
encryption algorithms?  I always get asked this by my brother, and I'm
not sure how best to respond.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-15 Thread Kevin Hilton
Unless you know exactly what you're doing and why, use the defaults.
That is all the advice you will get from me.

Hmm, not the answer I was quite expecting.

Thanks again for all your time.  You have greatly enlightened me and
reinforced my love for gnupg.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-15 Thread Kevin Hilton
Just a few follow-up points

Quote:
My advice has been the same for years: unless you know precisely what
you're doing and why, stick with the defaults.  GnuPG's defaults are
excellent.  They make good sense.  They interoperate well.  Don't mess
with them unless you know precisely what you're doing and why.

However in your link: http://sixdemonbag.org/cryptofaq.html#agencies,
you recommend other things (as discussed below).

From my limited knowledge, the default GnuPG settings are to create a
1024-bit DSA signing key, a 1024-bit ElGamal encryption key, a 3DES
symmetric cipher, and SHA-1 hash.

In your link however, you recommend the creation of 1024 or 2048 RSA
signing and encryption keys (or DSA2 signing key with RSA encryption
key??), and to choose something else other than the SHA-1 hash.

It would seem from your the information in your link, it would not be
best to follow the default settings in terms of signing/encryption key
creation, and hash algorithm.  What hash algorithm should I be using,
if SHA-1 is not preferred? SHA512??

Who chooses the defaults in terms of DSA/ElGamal signing/encryption
keys?  Is this set by the GnuPG programmers or they OpenGPG standard?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-14 Thread Kevin Hilton
I can see NIST is calling for entries for a competition to discover a
new hash function:
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html

I was hoping they would name the winner of this contest the ASS
(American Signing Standard), but see the winner will be referred to as
the SHA-3 (Secure Hash Algorithm version 3).  No doubt the winner of
this consult will eventually be added to the gpg standard.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Question about history of hash and cipher collections

2008-01-13 Thread Kevin Hilton
Here was I was able to find about the current hash and cipher choices with gpg

Pref Code (n)   Algorithm (name)PGP 2   PGP 5   PGP 6   PGP 7
PGP 6.5.8cktGPG 1.0.6
s1 *IDEAX   X   X   X   X   X *
s2  3DES--- X   X   X   X   X
s3  CAST5   --- X   X   X   X   X
s4  Blowfish--- --- --- --  X (03)  X
s7  AES (128)   --- --- --- X (7.0.1)   X (03)  X
s8  AES192  --- --- --- X (7.0.1)   X (03)  X
s9  AES256  --- --- --- X (7.0.1)   X (03)  X
s10 Twofish --- --- --- X   X (03)  X
s11  Camellia128
s12  Camellia256

* only with IDEA module

Digest (Hash) Algorithms
Pref Code (n)   Algorithm (name)PGP 2   PGP 5   PGP 6   PGP 7   
PGP
6.5.8cktGPG 1.0.6
h1  MD5 X   X   X   X   X   X
h2  SHA1--- X   X   X   X   X
h3  RIPEMD160   --- X   X   X   X   X
h6 +TIGER192--- --- --- --- X (08)  X +
h8 *SHA256  --- --- --- --- X (07)  X *
h9 *SHA384  --- --- --- --- X (07)  X *
h10 *   SHA512  --- --- --- --- X (07)  X *

Just a few questions,

#1 - How can I generate this list with newer versions of gpg -- is
their an internal command that cross-references the s or h numbers
with the specific ciphers/hashes that are compiled into the module --
something I can type at the command line?

#2 Historically, what ciphers were eliminated -- For example what
ciphers were in the s5, s6 slots?  Same with the hashes.  I believe
the TIGER has was equal to s5.  What happened to that hash choice?

Thanks for your help

-- 
Kevin Hilton

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-13 Thread Kevin Hilton
Sorry about my post

Whatever happened to the tiger hash??

Lastly, do you know the reason that the serpent cipher algorithm never
made it into gpg.  From the NSA competition, I thought the serpent
algorithm came in second --- again Im not sure of the criteria that
was used to judge strength -- but wasnt it from this competition that
the US gov adopted AES as the national standard?  Ive seen

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about history of hash and cipher collections

2008-01-13 Thread Kevin Hilton
Sorry the last post was cut off

Sorry about my post

I can see you seem to know a lot about gpg -- thanks.

Whatever happened to the tiger hash??

Lastly, do you know the reason that the serpent cipher algorithm never
made it into gpg.  From the NSA competition, I thought the serpent
algorithm came in second --- again Im not sure of the criteria that
was used to judge strength -- but wasnt it from this competition that
the US gov adopted AES as the national standard?  Just a question, b/c
from my very elementary understanding of ciphers, it seems like
serpent is a very secure standard.  I believe looking at the source
code (either in pgg or pgp2 -- I cant remember) I even saw a serpent.c
file.

Thanks for your input

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users