Re: Linux-gnupg and win-pgp

2005-09-05 Thread Lionel Elie Mamane
On Tue, Sep 06, 2005 at 01:53:18AM +0200, Stefan Fuhrmann wrote:
> Am Dienstag, 6. September 2005 01:31 schrieb Lionel Elie Mamane:
>> On Mon, Sep 05, 2005 at 11:26:40PM +0200, Stefan Fuhrmann wrote:

>>> Im using kubuntu and so kmail with gnupg.
>>> When I send an encrypted mail to win user who has pgp the encrypted mail
>>> is attached.
>>> 1.) Why this message is attached and pgp is not able to decrypt it?
>>> I have to save it first and decrypt it then.

>> Because you send is a PGP/MIME (RFC3156) message, which is the
>> better and preferred way, but your correspondent's mail user agent
>> (mail program) doesn't support PGP/MIME.

> okay, most of the win users have outlookso what?

So they suffer from a very limited feature set. ;-)

>>> 2.) Is there a way to sent this mail so that win users have the mail in
>>> the mail body and not as attachment?

>> I dunno if KMail can do that. Look for a "old method" option or "plain
>> text" option or something like that.

> Cant find something like that.

In the message composition window, in the toolbar, there is a choice
list between "Inline OpenPGP", "OpenPGP/MIME" and a few others. Choose
"Inline OpenPGP".

>>> But when I do it some german characters are not displayed!
>>> 3.) What is the reason for it?

>> Because by then the information over which charset the text was in is
>> lost. This is meta-information attached to the attachment, by saving
>> it you "loose" it.

> hmmm... I dont understand this: when I save the message the
> information is lost?! Why?

The filesystem doesn't have a "place" for this information.

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Lionel Elie Mamane
On Tue, Sep 06, 2005 at 03:14:56PM +1200, Peter Gutmann wrote:
> Lionel Elie Mamane <[EMAIL PROTECTED]> writes:
>>On Mon, Sep 05, 2005 at 10:14:41PM +0200, Alon Bar-Lev wrote:

>>> Since your GPLed program does not contain any other licensed code it is
>>> still GPLed...
>>> The same goes with GPLed licensed program that loads PKCS#11
>>> module...

>>Not unless that PKCS#11 module "is normally distributed with the major
>>components of the operating system". (Assuming here that the PKCS#11 module
>>would is a library that GnuPG would be dlopen.)

> PKCS #11 is a device driver without which it's impossible to use
> critical (to the application) hardware.  If you take this
> interpretation then GPG already violates it because it ends up using
> all manner of components (RAID drivers, ATI/nVidia video drivers,
> PC/SC drivers, etc) that aren't distributed as part of the OS.

GnuPG doesn't *link* to RAID drivers or video drivers. They don't end
up "running linked together in a shared address space". They
communicate over syscalls or sockets; mechanisms that are well-known
as to be "GPL-safe" (as long as the coupling between them isn't too
tight). See
http://www.fsf.org/licensing/licenses/gpl-faq.html#MereAggregation .

On the other hand, some people interpret the GPL in a way saying that
if a library implements a "standard" ABI, then one can link GPL
software to it.  I think it is a good idea to stick to the
copyright holder's interpretation.

> In fact if you wanted to go reductio ad absurdum even kernel32.dll
> is excluded because the hotfixes that are constantly applied to it
> aren't "normally distributed with the system components" - they're a
> special download.

Do I have to answer that?

> On the other hand using a particular interpretation of the GPL in
> order to make it impossible for GPG to be able to support widespread
> smart cards and crypto hardware is a great example of cutting off
> your nose to spite your face.

That's a choice for the copyright holder to make.

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Linux-gnupg and win-pgp

2005-09-05 Thread Stefan Fuhrmann
Am Dienstag, 6. September 2005 01:31 schrieb Lionel Elie Mamane:
> On Mon, Sep 05, 2005 at 11:26:40PM +0200, Stefan Fuhrmann wrote:
> > Im using kubuntu and so kmail with gnupg.
> > When I send an encrypted mail to win user who has pgp the encrypted mail
> > is attached.
> > 1.) Why this message is attached and pgp is not able to decrypt it?
> > I have to save it first and decrypt it then.
>
> Because you send is a PGP/MIME (RFC3156) message, which is the better
> and preferred way, but your correspondent's mail user agent (mail
> program) doesn't support PGP/MIME.
okay, most of the win users have outlookso what?
>
> > 2.) Is there a way to sent this mail so that win users have the mail in
> > the mail body and not as attachment?
>
> I dunno if KMail can do that. Look for a "old method" option or "plain
> text" option or something like that.

Cant find something like that.
>
> > But when I do it some german characters are not displayed!
> > 3.) What is the reason for it?
>
> Because by then the information over which charset the text was in is
> lost. This is meta-information attached to the attachment, by saving
> it you "loose" it.

hmmm... I dont understand this: when I save the message the information is 
lost?! Why?
 And how can win-PGP users decrypt such messages? With a correct character set 
also?
I tried a lot and search a lot but cant find a solution.

maybe somone has an idea??

tia

stefan


pgpEUTjV7a0eA.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Transparent keyboards

2005-09-05 Thread Roscoe
First:
Sure, with enough anything can be brute forced.
But what happens when that "enough" isn't possible?

Brute forcing (alone) 256-bit keys is a joke. It's just not a issue.

Second:
Being investigated by animal rights folk does *not* make you a terrorist.


Now back to being on topic but still slightly off...

I think a laptop you keep with you all the time is a pretty good shot. :)


On 9/6/05, the dragon <[EMAIL PROTECTED]> wrote:
> I suspect, with enough horsepower and resources, any encrytion can be
> broken.
> 
> I am sure, at one point, all encrytion was thought to be unbreakable.
> 
> peace,
> clark 'the dragon' willis
> 
> 
> 
> PSA: Salary <> Slavery. If you earn a salary, your employer is renting your
> services for 40 hours a week, not purchasing your soul. Your time is the
> only real finite asset that you have, and once used it can never be
> recovered, so don't waste it by giving it away.
> 
> I work to live; I don't live to work.
> 
> "Time is the coin of your life. It is the only coin you have, and only you
> can determine how it will be spent. Be careful lest you let other people
> spend it for you."
> 
> Carl Sandburg
> (1878 - 1967)
> 
> Original Message Follows
> 
> Jean-David Beyer wrote:
> 
>  >I imagine if the NSA really wanted to decrypt a gpg-encrypted message,
> they
>  >have the resources to do it. It would probably take them a while if they
> had
>  >to use brute force
> 
> No, they can's do it by brute force. Look even at the power requirements
> to do such a calculation: we're talking about an energy consumption that
> is more that the entire sun will radiate during its entire lifetime.
> I'm pretty sure that's beyond anything even the NSA can deploy.
> 
> If they are able to decrypt pgp/gpg, it will be because they either broke
> an algorithm or implementation of it, or they have obtained the key by
> other means (keylogger, hidden camera, tempest, virus, torture).
> 
> 
> 
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Linux-gnupg and win-pgp

2005-09-05 Thread Lionel Elie Mamane
On Mon, Sep 05, 2005 at 11:26:40PM +0200, Stefan Fuhrmann wrote:

> Im using kubuntu and so kmail with gnupg.
> When I send an encrypted mail to win user who has pgp the encrypted mail is 
> attached.
> 1.) Why this message is attached and pgp is not able to decrypt it?
> I have to save it first and decrypt it then. 

Because you send is a PGP/MIME (RFC3156) message, which is the better
and preferred way, but your correspondent's mail user agent (mail
program) doesn't support PGP/MIME.

> 2.) Is there a way to sent this mail so that win users have the mail in the 
> mail body and not as attachment?

I dunno if KMail can do that. Look for a "old method" option or "plain
text" option or something like that.

> But when I do it some german characters are not displayed!
> 3.) What is the reason for it?

Because by then the information over which charset the text was in is
lost. This is meta-information attached to the attachment, by saving
it you "loose" it.

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Lionel Elie Mamane
On Tue, Sep 06, 2005 at 12:59:48AM +0200, Alon Bar-Lev wrote:
> Lionel Elie Mamane Wrote: 

>> Not unless that PKCS#11 module "is normally distributed with the
>> major components of the operating system". (Assuming here that the
>> PKCS#11 module would is a library that GnuPG would dlopen.)

> So how come GPGed application can use display driver that is vendor
> provided?

The application does not link to the display driver. On Microsoft
Windows, the display driver is part of the kernel, and AFAIK
applications communicate with the kernel through syscalls (eventually
wrapped by gdi32.dll, kernel32.dll, etc), not linkage. On a Unix
system, the program communicates with the "display" through the
networking layer, so there is also absolutely no linkage.

But there is indeed a case to be made that if the library implements a
well-known, standard ABI, then linking to it is not a GPL
violation.  Legally it depends whether the linked program is a
"derived work" from the program or not.

> And how come GPGed application can print on a printer using a
> proprietary driver from HP (for example)?

On a Unix system, again, programs don't link with a printer
driver. They exec() lpr over a pipe and dump postscript to it over the
pipe. Just a matter of passing data around to another process, no
library linkage.

> I can show you that it GPLed program loads these drivers...

Yes, show me, I'm curious.

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Certification-only key

2005-09-05 Thread Lionel Elie Mamane
On Mon, Sep 05, 2005 at 04:46:46PM -0400, David Shaw wrote:
> On Mon, Sep 05, 2005 at 09:35:50PM +0200, Lionel Elie Mamane wrote:
>> On Mon, Sep 05, 2005 at 01:46:07PM -0400, David Shaw wrote:

>>> It's not necessarily a good idea though: some people before agreeing
>>> to sign a key will ask for a signed message to prove that you "own"
>>> the secret portion of the key they are about to sign.

>> I would obviously have at least one data-signing subkey. I presume
>> these people would take a signature from such as subkey. Or
>> decryption of a nonce they sent me encrypted to an encryption
>> subkey.

> They might, but really shouldn't (I wouldn't).  When you make a
> certification signature on someone elses key, you're signing the
> primary key plus the user ID in question.  There is no benefit in
> receiving a signed challenge from any key other than the primary.

But that subkey is attached to the primary key by a signature of the
primary key. Isn't then control of that subkey enough to "prove"
control of the primary key?

Unless:

 1) Signature scheme cryptographically broken. We have a bigger
problem.

 2) Primary key owner has done stupid things, like sharing subkeys
with others. But if we assume he has done that, we might as well
assume he would sign the challenge a man-in-the-middle attacker
has forwarded him or shared his primary key or ...

Where's the flaw in the reasoning?

>> You could argue I could have this without marking the key as
>> certificate-only, by never issuing data signatures with the primary
>> key. That's harder on me. I have to be more cautious. Over the course
>> of twenty years, I *will* screw up.

> GnuPG actually makes it hard for you to screw up here.  If there is
> a subkey that can sign, GnuPG will use it rather than the primary.
> The only way to get a signature (as opposed to a key certification)
> from the primary is to specify its key ID explicitly with an
> exclamation point.

Ah. Good. I just hope mutt doesn't pass the KeyID with an exclamation
point. Should check that.

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


linux-gpg and win-pgp

2005-09-05 Thread Stefan Fuhrmann

Hello all,
Im using kubuntu and so kmail with gnupg.
When I send an encrypted mail to win user who has pgp the encrypted mail is 
attached.
1.) Why this message is attached and pgp is not able to decrypt it?
I have to save it first and decrypt it then. 
2.) Is there a way to sent this mail so that win users have the mail in the 
mail body and not as attachment?
But when I do it some german characters are not displayed!
3.) What is the reason for it?
The character set under my linux is okay!
When I use win-pgp with this characters öäü and so on all is okay also under 
my linux , only when I send the mail from my linux to a win and trying to 
decrypt with pgp I have the problems with pgp and the characters.
4.) How can I solve this?


Can someone help?

tia

stefan

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Linux-gnupg and win-pgp

2005-09-05 Thread Stefan Fuhrmann
Hello all,
Im using kubuntu and so kmail with gnupg.
When I send an encrypted mail to win user who has pgp the encrypted mail is 
attached.
1.) Why this message is attached and pgp is not able to decrypt it?
I have to save it first and decrypt it then. 
2.) Is there a way to sent this mail so that win users have the mail in the 
mail body and not as attachment?
But when I do it some german characters are not displayed!
3.) What is the reason for it?
The character set under my linux is okay!
When I use win-pgp with this characters öäü and so on all is okay also under 
my linux , only when I send the mail from my linux to a win and trying to 
decrypt with pgp I have the problems with pgp and the characters.
4.) How can I solve this?


Can someone help?

tia

stefan


pgpDmBFF5bxvz.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
 
Joe Smith wrote:

> *PKCS#11 has nothing at all to do with smartcards.* The fact that many
propretary card drivers export a PKCS #11 interface
> is mearly coincedence.

PKCS#11 and Microsoft cryptographic providers are the two APIs available for
accessing cryptographic tokens.
Every application that wishes to use services of vendor in depended
cryptographic tokens uses one of these APIs.
So vendors that developing smartcard provide these interfaces so their card
will be usable.
Enterprises (which are the larger clients) will not but a smartcard that
does not support PKCS#11.

> One of the larger reasons why Werner is probably reluctant to support
> PKCS#11 in GPG is that X509 (which pkcs#11 is almost always used with)
does not interface well with OpenPGP. It makes beteter sense to
> have a separate X509 key, rather than use your key for both X509 and
OpenPGP. For example, your CA can revoke your key leaving you
> with one key that is invalid X.509, but valid OpenPGP? Yuck!

I think you got revocation wrong... Revocation is letting OTHERS know that a
key should not be trusted... There is nothing wrong in leaving the private
key in the smartcard.
Regardless this point PKCS#11 token can be organized that the same X.509 and
PGP certificates will refer to the same private key, so if that private key
is deleted both certificate will be unusable.

> Werner designed the OpenPGP Card such that the interface works well with
OpenPGP. OpenPGP cards are intended to be used for
> authentication and OpenPGP only. They are not designed for things such as
SSL, SSH, TLS, S/MIME , or any other cryptographic purpose.
> It is important to ensure that people do not confuse X.509 and OpenPGP,
but implementing PKCS#11 in gpg may blur things too much.

But each user should have one smartcard... It is not logical to force user
to keep several cards in his wallet in order to use several applications.
One smartcard can be used to have tree types of identities: Authentication,
Signature (Email and data), Decryption (Email and data). There is no reason
to divide these into several physical containers.
Users will simply select a different software which can access the same card
as other software...
Application that forces users to use a specific exclusive card will slowly
vanish.

> Besides it is hard enough to support just one card, imagine the problems
that could arise if people started using cards with broken PKCS#11
> drivers, and asssumed the problem was in gpg. 

But this is exactly the point!
You should not develop low-level code to access each card's processor in
order to add the ability to work with smartcards, resulting in N separate
implementations.
You can benefit from the PKCS#11 high-level API in order to access
cryptographic tokens (Smartcards, HSM, software).
PKCS#11 is a standard that most vendors support, I can agree that if vendor
did not implement the standard correctly, its token will not work with
applications. For example, Mozilla Firefox will not work with some of the
smartcards out there... And I have no claims to Mozilla, they have done a
great job!

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
Lionel Elie Mamane Wrote: 

> Not unless that PKCS#11 module "is normally distributed with the major
components of the operating system".
> (Assuming here that the PKCS#11 module would is a library that GnuPG would
be dlopen.)

So how come GPGed application can use display driver that is vendor
provided? I use ATI drivers... And I have a lot of GPLed programs on my
computer...
And how come GPGed application can print on a printer using a proprietary
driver from HP (for example)? I can show you that it GPLed program loads
these drivers...
The same goes to PKCS#11, it is a driver to access the smart card... It is
just like any other peripheral component you use, it is part of the run-time
environment, so that the user may choose which device should be used,
without the software author forcing him to use a specific device.
Open source if about freedom... Right? So there is also the freedom of the
user to choose his peripheral devices, including smartcards.

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Joe Smith


"Zeljko Vrba" <[EMAIL PROTECTED]> wrote in message 
news:[EMAIL PROTECTED]



IMHO, PKCS#11 has succeeded where ISO7816 has failed: providing a
(relatively) simple way to interface with many smart-card
implementations, many of which aren't ISO7816-compliant above level 3 -
they even don't support basic interindustry commands, but provide their
own proprietary and undocumented command set

PKCS#11 is a crypto token enchange system
ISO7816 is a specification for a card interface.
They are 100% unrelated. Perhaps you meant the abondoned PKCS#13 which is 
what many cards use.


*PKCS#11 has nothing at all to do with smartcards.*
The fact that many propretary card drivers export a PKCS #11 interface is 
mearly coincedence.


That said, I think allowing a pkcs #11 interface as well as OpenPGP Card 
interface is useful in its own right.


Doesn't gpgsm support PKCS#11?

One of the larger reasons why Werner is probably reluctant to support 
PKCS#11 in GPG is that X509 (which pkcs#11 is almost always used with) does 
not interface well with OpenPGP. It makes beteter sense to have a seperate 
X509 key, rather than use your key for both X509 and OpenPGP. For example, 
your CA can revoke your key leaving you with one key that is invalid X.509, 
but valid OpenPGP? Yuck!


Werner designed the OpenPGP Card such that the interface works well with 
OpenPGP. OpenPGP cards are intended to be used for authentication and 
OpenPGP only. They are not designed for things such as SSL, SSH, TLS, S/MIME 
, or any other cyrptographic purpose. It is important to ensure that people 
do not confuse X.509 and OpenPGP, but implementing PKCS#11 in gpg may blur 
things too much.


Besides it is hard enough to support just one card, imagine the problems 
that could arise if people started using cards with broken PKCS#11 drivers, 
and asssumed the problem was in gpg. 




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Certification-only key

2005-09-05 Thread David Shaw
On Mon, Sep 05, 2005 at 09:35:50PM +0200, Lionel Elie Mamane wrote:
> On Mon, Sep 05, 2005 at 01:46:07PM -0400, David Shaw wrote:
> > On Mon, Sep 05, 2005 at 04:41:40PM +0200, Lionel Elie Mamane wrote:
> 
> >> I tried to generate an RSAv4 certification-only key with GnuPG, but
> >> failed, even in "expert mode".
> 
> >> Is this impossible with GnuPG? Is it a bad idea? Why? Do I
> >> misunderstand the RFC?
> 
> > It's not impossible - 1.4.3 (not released yet) supports certify-only
> > keys like you want.
> 
> OK, thanks.
> 
> > It's not necessarily a good idea though: some people before agreeing
> > to sign a key will ask for a signed message to prove that you "own"
> > the secret portion of the key they are about to sign.
> 
> I would obviously have at least one data-signing subkey. I presume
> these people would take a signature from such as subkey. Or decryption
> of a nonce they sent me encrypted to an encryption subkey.

They might, but really shouldn't (I wouldn't).  When you make a
certification signature on someone elses key, you're signing the
primary key plus the user ID in question.  There is no benefit in
receiving a signed challenge from any key other than the primary.

For the same reason, encryption challenges ("can you decrypt this?")
aren't usually meaningful in OpenPGP (PGP 5+, GnuPG).  Since the
object being signed is the primary key, that's the key you want to
establish ownership of.  The huge majority of primary keys in the
world today don't or can't encrypt.

> You could argue I could have this without marking the key as
> certificate-only, by never issuing data signatures with the primary
> key. That's harder on me. I have to be more cautious. Over the course
> of twenty years, I *will* screw up.

GnuPG actually makes it hard for you to screw up here.  If there is a
subkey that can sign, GnuPG will use it rather than the primary.  The
only way to get a signature (as opposed to a key certification) from
the primary is to specify its key ID explicitly with an exclamation
point.

Some people keep their primary key offline and do their regular day to
day signing and encryption with subkeys.  In that case, it's not
possible to screw up: even if you override the default by specifying
the key ID and an exclamation point, the actual key isn't there to
use.

> Now, I'm starting to wonder if I can retroactively change the
> capabilities of the key. I just have to reissue the self-signature on
> the UserIDs, right? (Yes, I'd have to hack GnuPG to allow me to change
> the key flags.)

Yes.  Obviously you can't do things like turn a DSA key into an
encryption key, but you can certainly twiddle an RSA key into whatever
you like.

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Lionel Elie Mamane
On Mon, Sep 05, 2005 at 10:14:41PM +0200, Alon Bar-Lev wrote:
> Zeljko Vrba wrote:  

>> Neither do I understand that. Werner didn't give a single plausible
>> argument except possibly of license incompatibility. But in my
>> understanding, just incorporating PKCS#11 support into GnuPG would
>> NOT cause license incompatibility. It would happen at run-time if
>> the user chooses to load GPL-incompatible binary PKCS#11 driver
>> (which most of them are).

> Right... This argument was given to me also...
> But I could not find any justification for it...

> Let's say you use GPLed licensed program on windows... It loads
> kernel32.dll, right?

kernel32.dll falls under the following language in the GPL:

 However, as a special exception, the source code distributed need not
 include anything that is normally distributed (in either source or
 binary form) with the major components (compiler, kernel, and so on)
 of the operating system on which the executable runs, unless that
 component itself accompanies the executable.

> Since your GPLed program does not contain any other licensed code it is
> still GPLed...
> The same goes with GPLed licensed program that loads PKCS#11
> module...

Not unless that PKCS#11 module "is normally distributed with the major
components of the operating system". (Assuming here that the PKCS#11
module would is a library that GnuPG would be dlopen.)

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing MS-Excel spread sheets

2005-09-05 Thread Samuel ]slund
On Mon, Sep 05, 2005 at 08:07:13AM -0400, Berend Tober wrote:
> Kimmo Surakka wrote:
> 
> >Just my two cents worth: isn't it true that most Windows zippers can  
> >open a file "from inside a zip archive", i.e. uncompress it  
> >transparently to a temp directory and open from there? One easy-to- 
> >use solution could therefore be to store the Excel file inside a zip  
> >archive, and then sign that archive? When the second person opens the  
> >spreadsheet, all the changes Excel wants to do are done to the  
> >temporary copy -- not the actual spreadsheet itself.
> 
> The sounds like it would work, but I don't like the idea of imposing the 
> extra layer of the separate zip application like this between the 
> document and the signing step -- although it could be the approach we 
> have to take if we bring this to the next level and scan the supporting 
> documents (i.e., receipts) to jpeg files for inclusion along with the 
> spread sheet -- which would be pretty cool. However, I still have the 
> issue being discussed in a separate-but-related thread concerning 
> co-signatures.

Another option with zip-archives, if you put the signed .xls and the
signatures in the zip you should get the nonmodifiable effect and keep
the signatures "attached" to the file.

With luck there is some way to ask the zip program to execute your
sctrip...

//Samuel



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
Peter Pentchev wrote:

> Hate to jump into this discussion, but isn't this *exactly* why Werner
always keeps mentioning *shared* libraries? :)

Why hate?
Can you please elaborate? I don' t understand what you mean...

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Certification-only key

2005-09-05 Thread Lionel Elie Mamane
On Mon, Sep 05, 2005 at 01:46:07PM -0400, David Shaw wrote:
> On Mon, Sep 05, 2005 at 04:41:40PM +0200, Lionel Elie Mamane wrote:

>> I tried to generate an RSAv4 certification-only key with GnuPG, but
>> failed, even in "expert mode".

>> Is this impossible with GnuPG? Is it a bad idea? Why? Do I
>> misunderstand the RFC?

> It's not impossible - 1.4.3 (not released yet) supports certify-only
> keys like you want.

OK, thanks.

> It's not necessarily a good idea though: some people before agreeing
> to sign a key will ask for a signed message to prove that you "own"
> the secret portion of the key they are about to sign.

I would obviously have at least one data-signing subkey. I presume
these people would take a signature from such as subkey. Or decryption
of a nonce they sent me encrypted to an encryption subkey.

> Why do you want such a key?

First, separation of roles. Doesn't hurt. More importantly, my wishes
on the primary key and on data signature keys are different. The
primary key is my electronic identity; it should be humongous. If it
can hold secure for all my life, then I want it to. My data
signatures, on the other hand, for most of them, a week of security is
enough (but sometimes a few years is nice). Paying the cost of big
signature size is less worth it, at least until computers again get
too fast or factorisation becomes easier or ... Maybe I even *want*
them to fade away into fakability over time. Who knows what I will be
in twenty years? I may be so unlucky as to be a politician then. I
wouldn't want some of my teenage opinions or acts to haunt me back,
would I?

You could argue I could have this without marking the key as
certificate-only, by never issuing data signatures with the primary
key. That's harder on me. I have to be more cautious. Over the course
of twenty years, I *will* screw up.

Now, I'm starting to wonder if I can retroactively change the
capabilities of the key. I just have to reissue the self-signature on
the UserIDs, right? (Yes, I'd have to hack GnuPG to allow me to change
the key flags.)

-- 
Lionel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Peter Pentchev
On Mon, Sep 05, 2005 at 10:14:41PM +0200, Alon Bar-Lev wrote:
> Zeljko Vrba wrote:  
> > Alon Bar-Lev wrote:
> >>
> >> I agree... So if we all understand the need of PKCS#11 in order to 
> >> access cryptographic tokens, what I don't understand is how come 
> >> people choose to develop low-level applications in order to work with
> specific devices?
> >>
> > Neither do I understand that. Werner didn't give a single plausible
> argument except possibly of license incompatibility. But in my
> understanding, 
> > just incorporating PKCS#11 support into GnuPG would NOT cause license
> incompatibility. It would happen at run-time if the user chooses to 
> > load GPL-incompatible binary PKCS#11 driver (which most of them are).
> 
> Right... This argument was given to me also...
> But I could not find any justification for it...
> Let's say you use GPLed licensed program on windows... It loads
> kernel32.dll, right?
> Since your GPLed program does not contain any other licensed code it is
> still GPLed...
> The same goes with GPLed licensed program that loads PKCS#11 module...

Hate to jump into this discussion, but isn't this *exactly* why Werner
always keeps mentioning *shared* libraries? :)

G'luck,
Peter

-- 
Peter Pentchev  [EMAIL PROTECTED][EMAIL PROTECTED][EMAIL PROTECTED]
PGP key:http://people.FreeBSD.org/~roam/roam.key.asc
Key fingerprint FDBA FD79 C26F 3C51 C95E  DF9E ED18 B68D 1619 4553
This sentence was in the past tense.


pgpM5iAic7Epg.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
Zeljko Vrba wrote:  
> Alon Bar-Lev wrote:
>>
>> I agree... So if we all understand the need of PKCS#11 in order to 
>> access cryptographic tokens, what I don't understand is how come 
>> people choose to develop low-level applications in order to work with
specific devices?
>>
> Neither do I understand that. Werner didn't give a single plausible
argument except possibly of license incompatibility. But in my
understanding, 
> just incorporating PKCS#11 support into GnuPG would NOT cause license
incompatibility. It would happen at run-time if the user chooses to 
> load GPL-incompatible binary PKCS#11 driver (which most of them are).

Right... This argument was given to me also...
But I could not find any justification for it...
Let's say you use GPLed licensed program on windows... It loads
kernel32.dll, right?
Since your GPLed program does not contain any other licensed code it is
still GPLed...
The same goes with GPLed licensed program that loads PKCS#11 module...

I think it is the same as gpg works with vendor's X card... The card runs an
operating system that is not GPLed... And yet... gpg is GPL...

Moreover, I've found that opensc and PAM PKCS11 are LGPL and that
openCryptoki (http://sourceforge.net/projects/opencryptoki) is GPL.

So... I think licensing should not be an issue...

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Zeljko Vrba

Alon Bar-Lev wrote:


I agree... So if we all understand the need of PKCS#11 in order to access
cryptographic tokens, what I don't understand is how come people choose to
develop low-level applications in order to work with specific devices?


Neither do I understand that. Werner didn't give a single plausible
argument except possibly of license incompatibility. But in my
understanding, just incorporating PKCS#11 support into GnuPG would NOT
cause license incompatibility. It would happen at run-time if the user
chooses to load GPL-incompatible binary PKCS#11 driver (which most of
them are).


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev

Peter wrote:

> Zeljko Vrba <[EMAIL PROTECTED]> writes:

>> Yes, these devices are expensive for individuals. 

> Although they're less expensive on ebay :-).  Keep an eye on that long
enough and you'll find almost
> anything turning up, for example there's almost always some Spyrus Lynks
cards on sale by someone.
> Some of the stuff even has previous CA's keys still in the HW.

>> PKCS#11 is not limited to smart-cards.

> Yup, and that's an important point.  If you want big-iron style crypto HW
support, your choice is
> either PKCS #11, CryptoAPI, or a per-hardware-device custom API.  I know
which one I'd want...

I agree... So if we all understand the need of PKCS#11 in order to access
cryptographic tokens, what I don't understand is how come people choose to
develop low-level applications in order to work with specific devices?

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: Multiple signing - is this a common desire? (was Re: Signing MS-Excel spread sheets)

2005-09-05 Thread Kiefer, Sascha
Well, i do not know about files, but our product signs mails using 
multiple-signatures (at least two signatures are required before a mail
leaves the system).
So i think it is NOT a bad feature.

Regards,
Sascha

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Kurt Fitzner
> Sent: Montag, 5. September 2005 01:21
> To: gnupg-users@gnupg.org
> Subject: Multiple signing - is this a common desire? (was Re: 
> Signing MS-Excel spread sheets)
> 
> 
> 
> Berend Tober wrote:
> 
> > Anyway, I've looked at WinPT and GPGee and one other GUI wrapper 
> > around gnupg, but they all of course are victims of this MS Excel 
> > "feature", and furthermore none of them satisfy my other need to be 
> > able to support multiple persons signing any given document
> 
> 
> When I started with GPGee I debated the idea of handling 
> multiple-signatures.  I decided not to deal with the added 
> complexity because I didn't think it was a much called-for feature.
> 
> If this is something that people would want to do more often 
> in the real world, I'll happily add this feature.
> 
> I can even drop in something like "Set target file read-only 
> after operation" - well, if I can figure out a shorter 
> description to use for it.
> 
> Anyway, is multiple-key signing more common than I gave it credit for?
> 
>   Kurt.
> 
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org 
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Certification-only key

2005-09-05 Thread David Shaw
On Mon, Sep 05, 2005 at 04:41:40PM +0200, Lionel Elie Mamane wrote:
> Hi,
> 
> I tried to generate an RSAv4 certification-only key with GnuPG, but
> failed, even in "expert mode".
> 
> What I mean is a primary key that can be used to attach a subkey to
> it, or _maybe_ also to sign UserIDs of other keys (for the Web of
> Trust). But not for data signatures. As I understand the RFC, I want a
> primary key with key flags 0x01 (or maybe even 0x00?).

It would be 0x01.  0x00 is not meaningful in PGP since that would mean
"key with no capabilities".  The standard requires that all primary
keys must be able to certify.  Even if the 0x01 bit is not set by the
user, primary keys can certify.

> But GnuPG only presents me with three "bits" to flip:
> 
>  - signature, which seems to set key flag 0x03
>  - encryption, which seems to set key flag 0x0C
>  - authentication, which seems to set flag 0x21
> 
> I tried turning all three bits off, but then the key doesn't have a
> key flags subpacket (packet 27) at all and seems to be treated by
> GnuPG as a "everything is allowed" key.
> 
> Is this impossible with GnuPG? Is it a bad idea? Why? Do I
> misunderstand the RFC?

It's not impossible - 1.4.3 (not released yet) supports certify-only
keys like you want.  It's not necessarily a good idea though: some
people before agreeing to sign a key will ask for a signed message to
prove that you "own" the secret portion of the key they are about to
sign.  Without the ability to sign, such a signature is hard to
generate.

Why do you want such a key?

David

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Zeljko Vrba

Alon Bar-Lev wrote:

Zeljko wrote:


IMHO, PKCS#11 has succeeded where ISO7816 has failed: providing a
(relatively) simple way to interface with many smart-card implementations,



And I've forgot to mention one thing that may be important to some
people: PKCS#11 is not limited to smart-cards. If GPG were to support
it, it could be used with top-grade crypto modules (providing physical
security and self-destruct on tampering) such as Thales WebSentry or
nCipher. And for these things there is *no* universal standard except
for PKCS#11 and MS CAPI.

From experience I know that Thales was delivering RG732 crypto modules
with their own development kit, and they've switched to PKCS#11 + MS
CAPI in their new products (i.e. WebSentry).

Yes, these devices are expensive for individuals. But if company already
does own (for some) reason one of these, maybe they would also like to
use it for e.g. storing a company "master key" that signs employees'
keys. That's just one use-case example.


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Transparent keyboards

2005-09-05 Thread the dragon
I suspect, with enough horsepower and resources, any encrytion can be 
broken.


I am sure, at one point, all encrytion was thought to be unbreakable.

peace,
clark 'the dragon' willis



PSA: Salary <> Slavery. If you earn a salary, your employer is renting your 
services for 40 hours a week, not purchasing your soul. Your time is the 
only real finite asset that you have, and once used it can never be 
recovered, so don't waste it by giving it away.


I work to live; I don't live to work.

"Time is the coin of your life. It is the only coin you have, and only you 
can determine how it will be spent. Be careful lest you let other people 
spend it for you."


Carl Sandburg
(1878 - 1967)

Original Message Follows

Jean-David Beyer wrote:

>I imagine if the NSA really wanted to decrypt a gpg-encrypted message, 
they
>have the resources to do it. It would probably take them a while if they 
had

>to use brute force

No, they can's do it by brute force. Look even at the power requirements
to do such a calculation: we're talking about an energy consumption that
is more that the entire sun will radiate during its entire lifetime.
I'm pretty sure that's beyond anything even the NSA can deploy.

If they are able to decrypt pgp/gpg, it will be because they either broke
an algorithm or implementation of it, or they have obtained the key by
other means (keylogger, hidden camera, tempest, virus, torture).



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Transparent keyboards

2005-09-05 Thread Johan Wevers
Jean-David Beyer wrote:

>I imagine if the NSA really wanted to decrypt a gpg-encrypted message, they
>have the resources to do it. It would probably take them a while if they had
>to use brute force

No, they can's do it by brute force. Look even at the power requirements
to do such a calculation: we're talking about an energy consumption that
is more that the entire sun will radiate during its entire lifetime.
I'm pretty sure that's beyond anything even the NSA can deploy.

If they are able to decrypt pgp/gpg, it will be because they either broke
an algorithm or implementation of it, or they have obtained the key by
other means (keylogger, hidden camera, tempest, virus, torture).

-- 
ir. J.C.A. Wevers //  Physics and science fiction site:
[EMAIL PROTECTED]   //  http://www.xs4all.nl/~johanw/index.html
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
>> I won't agree to this because there is at least one large company in 
>> Germany using Smartcards along with gpgsm.

> Well OK, so there's always exceptions, but I don't think there's enough to
drive significant
> demand for this - all the commercial users I've seen who want smart
cards/PKCS #11/whatever want
> to use it with standard commercial software and, you know, that stuff with
the 'X' and some
> digits in it :-).

I think that many enterprises are looking first for open source solutions...
If they find one that is suitable, they don't buy commercial product.
The problem is that the open source community does not always understand
which standard to support, and many, like gpg, inventing their own...

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev

Peter wrote:

>>Oh, that's the old Aladdin stuff.  Well, they've certainly come a 
>>*long* way since I last looked at them - in the 1999-2000 time frame 
>>they had the worst PKCS #11 driver I've ever seen, and their "support" 
>>consisted of telling you to buy more copies of their $700 SDK to see 
>>whether they'd fixed any of the bugs in the version you already had.

> Argh, sorry, wrong driver, it's the ActivCard drivers (and support) that
were that bad, not Aladdin.
> Aladdin (and by extension ASECard and Athena Cards, and eTokens as well)
work just fine.  Just to
> repeat that: Nothing wrong with Aladdin's PKCS #11.

I am glad you corrected your-self...
ActivCard did not implement a good CSP/PKCS#11 on Windows too... :(

Athena and Aladdin produce good support software... I am using their cards
and I am very happy... Athena support Linux well... And even share the same
cards between Windows CSP/PKCS#11 and Linux PKCS#11!!!

Best Regards,
Alon Bar-Lev


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
Zeljko wrote:

>>
>> I would have help merging it if I knew that there is a chance to merge 
>> it into to gpg source.
>>
> Judging by the discussion on this list.. it seems that there is no chance
for that :(

> Look in the archives of gnupg lists, IIRC it is around November 2004, for
threads started by me. I was quickly discouraged by Werner and
> nowhere as persistent as you in trying to persuade him into the usefulness
of PKCS#11.

Yes... I agree... I gave up... Tried to help... And failed.

> IMHO, PKCS#11 has succeeded where ISO7816 has failed: providing a
> (relatively) simple way to interface with many smart-card implementations,
many of which aren't ISO7816-compliant above level 3 - they even don't
> support basic interindustry commands, but provide their own proprietary
and undocumented command set.

I agree!

> Personally, I think that applications not supporting PKCS#11 and/or MS
CAPI will become extinct much before than non-compliant ISO7816 cards.
> These two have become the de-facto industry standards. I'm no fortune
teller, so time will prove me right or wrong :)

This is exactly my claim... I've tried to introduce this argument to
Werner... But without any success...
I was out of new arguments when I gave up... I think that an open source
project that does not support software interaction standards will be
replaced by a different solution when the time comes.

Best Regards,
Alon Bar-Lev.




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Zeljko Vrba

Alon Bar-Lev wrote:


I use Athena smartcard www.athena-scs.com which works perfectly in term of
Linux and PKCS#11. I enjoy using it with Java JCE, Mozilla, Tunderbird,
PAM_PKCS11, I've encrypted my disk using aes-loop and then required gpg to
support PKCS#11... And here we are...


Great! When I was developing my patch, I had only Cryptoflex 8k cards
available (still have a few of them, but not at my current geographical
location :)).



This is great work!

>
Thanks.

>

But the work needs to be moved into gpg-agent... :(


Probably not too difficult, but still time-consuming to understand the
existing code.. and that would probably be wasted time, unless you want
to make a life-time commitment to keep the patch in pace with gpg
development.

>

I would have help merging it if I knew that there is a chance to merge it
into to gpg source.


Judging by the discussion on this list.. it seems that there is no
chance for that :(

Look in the archives of gnupg lists, IIRC it is around November 2004,
for threads started by me. I was quickly discouraged by Werner and
nowhere as persistent as you in trying to persuade him into the
usefulness of PKCS#11.

IMHO, PKCS#11 has succeeded where ISO7816 has failed: providing a
(relatively) simple way to interface with many smart-card
implementations, many of which aren't ISO7816-compliant above level 3 -
they even don't support basic interindustry commands, but provide their
own proprietary and undocumented command set.

Personally, I think that applications not supporting PKCS#11 and/or MS
CAPI will become extinct much before than non-compliant ISO7816 cards.
These two have become the de-facto industry standards. I'm no fortune
teller, so time will prove me right or wrong :)


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev
Hello,

>That's correct, it was my proposal in question. The problem is that, under
Linux, I couldn't find a smart-card + PKCS#11
> combination that works correctly enough (out of the box) to be usable with
cryptlib.

I use Athena smartcard www.athena-scs.com which works perfectly in term of
Linux and PKCS#11. I enjoy using it with Java JCE, Mozilla, Tunderbird,
PAM_PKCS11, I've encrypted my disk using aes-loop and then required gpg to
support PKCS#11... And here we are...

> Patch that enables the use of any smart-card with GnuPG. It allows the use
of cards with pregenerated keys and uses an auxiliray file to
> feed metadata into GnuPG (I'm assuming a read-only token). Signing works
correctly.

> http://www.core-dump.com.hr/software/gnupg-1.3.92-pkcs11.patch
> http://www.core-dump.com.hr/software/gnupg-1.3.92-pkcs11.patch.asc

> There is a g10/p11howto.txt describing how to use it. I've given up on
maintaining it because of Werner's attitude towards PKCS#11.
> If someone else wants to maintain it - be welcome. I will provide you some
help if neccessary.

This is great work!
But the work needs to be moved into gpg-agent... :(

I would have help merging it if I knew that there is a chance to merge it
into to gpg source.

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Certification-only key

2005-09-05 Thread Lionel Elie Mamane
Hi,

I tried to generate an RSAv4 certification-only key with GnuPG, but
failed, even in "expert mode".

What I mean is a primary key that can be used to attach a subkey to
it, or _maybe_ also to sign UserIDs of other keys (for the Web of
Trust). But not for data signatures. As I understand the RFC, I want a
primary key with key flags 0x01 (or maybe even 0x00?).

But GnuPG only presents me with three "bits" to flip:

 - signature, which seems to set key flag 0x03
 - encryption, which seems to set key flag 0x0C
 - authentication, which seems to set flag 0x21

I tried turning all three bits off, but then the key doesn't have a
key flags subpacket (packet 27) at all and seems to be treated by
GnuPG as a "everything is allowed" key.

Is this impossible with GnuPG? Is it a bad idea? Why? Do I
misunderstand the RFC?


Thanks for your explanations,

-- 
Lionel


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev

>>The conclusion of my discussion with people here is that the need of 
>>using
>>PKCS#11 for accessing various smartcards is not clear. I've tried to 
>>highlight the advantages of using standard software API to access 
>>external devices, but I've failed.

>Users of crypto tokens tend to fall into two classes, hobbyists/enthusiasts
(who don't mind hacking their
> own glue code, so PKCS #11 isn't too important), and commercial/business
users (who really need
> PKCS #11 but who probably wouldn't use GPG).  The result is, as you've
found, something of a lack
> of a market for PKCS #11 combined with GPG.

I agree... But I was still amazed... If you read the PKCS#11 corresponding
you will notice that there is a remote possibility to agree the usage of
PKCS#11 in a way that gpg will be the provider... So that other applications
can use gpg keys... This was really strange. The whole idea is to separate
between application logic (gpg) and device access (Smartcards, HSM)...

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


new (2005-09-04) keyanalyze results (+sigcheck)

2005-09-05 Thread Jason Harris

New keyanalyze results are available at:

  http://keyserver.kjsl.com/~jharris/ka/2005-09-04/

Signatures are now being checked using keyanalyze+sigcheck:

  http://dtype.org/~aaronl/

Earlier reports are also available, for comparison:

  http://keyserver.kjsl.com/~jharris/ka/

Even earlier monthly reports are at:

  http://dtype.org/keyanalyze/

SHA-1 hashes and sizes for all the "permanent" files:

252e0f13e55a2ca2ca32886f211e7471d08afce612916224preprocess.keys
cb882ca6570486e9f20879accc1e4d3dab1022387871329 othersets.txt
890e81a284d0087c6587feb3e1c7ca046b4bda793190186 msd-sorted.txt

a751f9d5477744a4f5e5ce6ebad6a60908e317ee1372index.html
56433a9a8c1aa573893f03c5c6a2c0282aa9bb4c2291keyring_stats
26c3982c68658092c19c210abec94fe0351e98b01253289 msd-sorted.txt.bz2
fdd2a5d063a4817b86f6a595441ff23ce24cb32126  other.txt
e5737d65e99fb365b6ce180b6dffc39c062d4e021697277 othersets.txt.bz2
d9774ab70de75e25ff27ab89eb745f3725996c7a5219110 preprocess.keys.bz2
df084c3d93601c1669975012110398ec6c34a0bf13046   status.txt
740907630c1b3c8882c93d6987a549ea74be87bd210121  top1000table.html
8447fc107e1c02788ee5bed7143a13aa608c97d530191   top1000table.html.gz
483d02289f157c12fd4a00a8fa6722a20785bf2a10785   top50table.html
56ac06d6254b663d9ed114144f621cf53c8ea65c2534D3/D39DA0E3

-- 
Jason Harris   |  NIC:  JH329, PGP:  This _is_ PGP-signed, isn't it?
[EMAIL PROTECTED] _|_ web:  http://keyserver.kjsl.com/~jharris/
  Got photons?   (TM), (C) 2004


pgpCCXMRnUQvb.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP Card

2005-09-05 Thread Werner Koch
On Tue, 06 Sep 2005 01:23:51 +1200, Peter Gutmann said:

> and commercial/business users (who really need PKCS #11 but who probably
> wouldn't use GPG).  The result is, as you've found, something of a lack of a

I won't agree to this because there is at least one large company in
Germany using Smartcards along with gpgsm.


Salam-Shalom,

   Werner




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGG Card

2005-09-05 Thread Zeljko Vrba

Peter Gutmann wrote:


I'd already offered the use of my PKCS #11 interface code from cryptlib for
GPG use some time ago.  This should do everything you need and has had years
of tuning to work with all the bugs in various PKCS #11 drivers, it's vastly
easier than going through the entire learning curve yourself.


That's correct, it was my proposal in question. The problem is that,
under Linux, I couldn't find a smart-card + PKCS#11 combination that
works correctly enough (out of the box) to be usable with cryptlib.

GPG needs at three different keys and static data storage. I have a
patch emulating static data storage, enabling the use of pre-generated keys.

I don't remember exactly all the details, but I did disregard cryptlib
for some reason (not because of its quality which is superb, but because
of the state of.. smart-card and PKCS#11 issues on Linux).

For interested parties in this thread:

OpenPGP Java card applet (almost finished):
http://www.core-dump.com.hr/index.pl?node_id=421

Patch that enables the use of any smart-card with GnuPG. It allows the
use of cards with pregenerated keys and uses an auxiliray file to feed
metadata into GnuPG (I'm assuming a read-only token). Signing works
correctly.

http://www.core-dump.com.hr/software/gnupg-1.3.92-pkcs11.patch
http://www.core-dump.com.hr/software/gnupg-1.3.92-pkcs11.patch.asc

There is a g10/p11howto.txt describing how to use it. I've given up on
maintaining it because of Werner's attitude towards PKCS#11. If someone
else wants to maintain it - be welcome. I will provide you some help if
neccessary.


signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PKCS#11 support for gpg-agent

2005-09-05 Thread Werner Koch
On Mon, 5 Sep 2005 08:35:15 +0100 (BST), Nicholas Cole said:

> gpg-1.9, and the thinking behind adding support for
> s/mime.  What is the "roadmap" (from the point of view
> of users) for gpg?

* The most important task is to integrate gpg 1.4 code base into gpg
  1.9.  I did this a long time ago but in the meantime e changed a lot
  of stuff in 1.4. so that if needs to be done again.

* The format of the keyrings will be switched to a newer one (KBX).
  This should really help with larger keyrings and provides some other
  goodies.

* Release 2.0

> Is there any sense in which opengpg is, or may be
> soon, a deprecated standard? 

NO.  We all like OpenPGP far more than S/MIME.

> Beyond the pros and cons of centralised CAs, what are
> the advantages of the two?

To match the structure of the organisation.  OpenPGP allows for all
kinds of PKIs; whereas X.509 requires a hierarchical one.



Salam-Shalom,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGG Card

2005-09-05 Thread Werner Koch
On Mon, 05 Sep 2005 15:07:22 +1200, Peter Gutmann said:

> I'd already offered the use of my PKCS #11 interface code from cryptlib for
> GPG use some time ago.  This should do everything you need and has had years

Thanks.  That would indeed help to write a pkcs#11 implementation to
connect Mozilla et al with gpg-agent/scdaemon. 

Regarding use of pkcs#11 below scdaemon: This might be possible by
writing an app-p11 module.  However, I still doubt that it makes much
sense.  Tweaking app-p15 for the existing cards seems to be a cleaner
way to me.

BTW, I just committed support for T=0 cards, tested with the Beglian
eID card.


Shalom-Salam,

   Werner


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Transparent keyboards

2005-09-05 Thread the dragon
This thread is taking a turn to the absurd, and I have been thinking about 
it.


I fully support the ability to maintain your right to privacy, such as the 
government has granted you, to it's fullest.


However, if you're involved in a terrorist movement, and it appear the 
original poster is if the government is involved in one, even if it's under 
the guise of "animal rights" (as if they have any), then I support the 
ability of law enforcement to investigate, prosecute and convict the 
peretrator.


Good grief, if you need to be that paranoid, then maybe you should find a 
more legal cause to be involved in.


peace,
clark 'the dragon' willis

PSA: Salary <> Slavery. If you earn a salary, your employer is renting your 
services for 40 hours a week, not purchasing your soul. Your time is the 
only real finite asset that you have, and once used it can never be 
recovered, so don't waste it by giving it away.


I work to live; I don't live to work.

"Time is the coin of your life. It is the only coin you have, and only you 
can determine how it will be spent. Be careful lest you let other people 
spend it for you."


Carl Sandburg
(1878 - 1967)



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key signing policy

2005-09-05 Thread Neil Williams
On Monday 05 September 2005 4:09 am, Cameron Metzke wrote:
> Does anyone have solid written key signing policy?

I don't think there is one policy to fit all needs. There are FAQ's and 
HOWTO's on keysigning events/parties and lots of groups have their own 
policies for their own needs. There are also tools like CA Bot (by Peter 
Palfrader) and others that help in keysigning - particularly when keys and 
identities are verified at distant events and the participants won't 
necessarily meet again for a considerable time.

http://www.palfrader.org/#cabot
http://cabot.alioth.debian.org/

There's a very simple HOWTO for those who don't know the details of *how* to 
sign a key:
http://gnupg.neil.williamsleesmill.me.uk/book1.html

A more general FAQ based on the GNU Privacy Handbook:
http://www.dcglug.org.uk/linux_adm/gnupg.html
and containing it's own keysigning guide:
http://www.dcglug.org.uk/linux_doc/gnupgsign.html

And the general keysigning HOWTO:
http://www.cryptnet.net/fdp/crypto/gpg-party.html

All are written from a standpoint of a loose association of GnuPG users who 
correspond regularly by email and meet occasionally or just once. Each 
document tends to consider participants as individuals with their own 
individual key(s) and with no "group key" or "group hierarchy".

i.e. they are policies for friends/contacts, not necessarily policies for 
employer/employees.

These may need to be adapted for your purposes. The main DCGLUG guide at 
http://www.dcglug.org.uk/linux_doc/startgnupg.html
is licenced under the GNU Free Documentation Licence.

-- 

Neil Williams
=
http://www.data-freedom.org/
http://www.nosoftwarepatents.com/
http://www.linux.codehelp.co.uk/



pgpi6ywY8eEIf.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Transparent keyboards

2005-09-05 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Greg Sabino Mullane wrote:
> 
> 
>>>Once a computer or other device that needs secure access is sufficiently
>>>protected, it becomes cheaper for a large government agency to resort to
>>>bribery or torture to get the information it wants. Assuming they do not
>>>wish to try bribery, are you sure you want your machine that safe?
> 
> 
> That's a silly argument. Because they are ways of obtaining your
> passphrase by force, you shouldn't bother using one or take other
> protective measures? Last I heard, the government of Finland was not
> known for torturing its citizens. 

I do not say you should not take protective measures. I just say to consider
that if your protective measures are so effective that using force  or
torture are cheaper than the alternatives, that you expose yourself to such
measures if your information is actually worth it.

I am glad Finland is such a country. But what if an agency known to employ
torture, or not known do do so but that does, chooses to operate in Finland,
most likely withouth the knowledge or consent of the government of Finland... ?
> 
> 
>>>I assume you are using gnupg for all your correspondence with everyone. If
>>>you encrypt only your sensitive communications, it will be painfully obvious
>>>which of your e-mails to decrypt, saving the black hats a lot of trouble.
> 
> 
> A lot of trouble in what way? Do you know of a black hat agency able to
> decrypt exi[s]ting gpg-encrypted messages?

It is pretty easy once they have the passphrases or private keys. And once a
suitable keylogger is in there, they get them very easily.

I imagine if the NSA really wanted to decrypt a gpg-encrypted message, they
have the resources to do it. It would probably take them a while if they had
to use brute force (and perhaps that is what they would do, again, if they
felt the information was actually worth it). Probably no one on this
newsgroup actually knows how much compute power the NSA has at its disposal.
At one time, the budget of the NSA was about 10x the budget of the CIA (to
the great annoyance, apparently, of the DCI). I imagine a lot of their
budget was spent on computing equipment, general purpose and special purpose.
> 
> The original poster may want to check out "Tinfoil Hat Linux"[1] which has
> some interesting capabilities, including an anti-keylogger measure. A
> laptop or PDA with its own keyboard could be useful as well.
> 
> [1] http://tinfoilhat.shmoo.com/
> 

- --
  .~.  Jean-David Beyer  Registered Linux User 85642.
  /V\  PGP-Key: 9A2FC99A Registered Machine   241939.
 /( )\ Shrewsbury, New Jerseyhttp://counter.li.org
 ^^-^^ 08:15:00 up 82 days, 2:11, 4 users, load average: 5.23, 5.18, 4.91
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDHDkNPtu2XpovyZoRAiN7AJ91pz9h5uqJ1vsJBeTju61Klda5lwCfU4dL
YH5/sZwJd7XqYHRKx6KkjNU=
=QRHs
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing MS-Excel spread sheets

2005-09-05 Thread Berend Tober

Kimmo Surakka wrote:


Berend Tober wrote:

Indeed, and I even included in my original post "(Aside from the  
obvious -- "Stop using MS-Excel!" -- because that is a failure I  
cannot control...)".  Kids these days


Anyway, I've looked at WinPT and GPGee and one other GUI wrapper  
around gnupg, but they all of course are victims of this MS Excel  
"feature", and furthermore none of them satisfy my other need to be  
able to support multiple persons signing any given document, either  
(cf. other mailing list message thread "Multiple signatures on a  
single file").


Just my two cents worth: isn't it true that most Windows zippers can  
open a file "from inside a zip archive", i.e. uncompress it  
transparently to a temp directory and open from there? One easy-to- 
use solution could therefore be to store the Excel file inside a zip  
archive, and then sign that archive? When the second person opens the  
spreadsheet, all the changes Excel wants to do are done to the  
temporary copy -- not the actual spreadsheet itself.


The sounds like it would work, but I don't like the idea of imposing the 
extra layer of the separate zip application like this between the 
document and the signing step -- although it could be the approach we 
have to take if we bring this to the next level and scan the supporting 
documents (i.e., receipts) to jpeg files for inclusion along with the 
spread sheet -- which would be pretty cool. However, I still have the 
issue being discussed in a separate-but-related thread concerning 
co-signatures.


The comand script I'm refining seems to do all that I need, even if it 
has some rough edges:


gpg --sign.cmd:

@echo off
if .%1. == .. exit

attrib +r %1
gpg  --detach-sign --armor --comment "Signature of %USERNAME%" 
--local-user %USERNAME% -o - %1>>%1.asc




along with

gpg --verify.cmd:

@echo off
gpg --verify %1
echo.
pause


to list the co-signators. Lastly, I make short cuts in the Windows "Send 
To" folder, putting these two features in the Explorer context menu. 
Seems to work o.k.


-- BMT



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Multiple signatures on a single file

2005-09-05 Thread Berend Tober

Alphax wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Berend Tober wrote:
 


Is it possible to have multiple persons sign a single file? If so, how
is this done?

The particular scenario is currently this: Employees submit expense
reports for business travel using a spread sheet. Current practise is
the the employee fills out spread sheet via computer (or optionally
prints blank spread sheet template and writes by hand with a pen),
physically signs using pen and ink, physically delivers signed hardcopy
to supervisor for supervisor pen-and-ink signature prior to payment
processing.

Desired practise is to eliminate both producing hard copy and
pen-and-ink signatures, and then re-work the process using gpg
electronic signatures. Thus, employee would enter data into expense
report spread sheet, save, gpg sign, mail to supervisor, supervisor
would (presumably) open and review spread sheet, close without changing,
gpg sign, and then return to employee or forward to accounting dept.

Sounds straightforward, but I didn't spot in the various
manuals/guides/how-to's for gnupg how a second individual could add
their signature after me.

   



Use detached signatures? Generate a key to sign the document with, and
have that key signed by the supervisor?
 

What I don't like about doing that explicitly is that every additional 
signature, at least in the default operational mode, appends an 
additional ".sig" file extension. Further more, the signatures are 
wrapped withing one another, so that to verification would require 
serial verification of each preceding outer layer signature. What I've 
been refining during the last couple days uses a command line script to 
append additional detached signatures into a single signature file. This 
approach models more directly the co-signature concept of legacy 
contracts, i.e., think of buying a house -- you and you spouse are 
co-signators rather than having one sign the contract and the other sign 
the others signature. What you suggested models the concept of a notary 
public witnessing a signature, but that we already have by signing 
public keys in the trust model.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: OpenPGP Card

2005-09-05 Thread Alon Bar-Lev

>I'd already offered the use of my PKCS #11 interface code from cryptlib for
GPG use some time ago.  This
> should do everything you need and has had years of tuning to work with all
the bugs in various PKCS #11
> drivers, it's vastly easier than going through the entire learning curve
yourself.

Nice!
The conclusion of my discussion with people here is that the need of using
PKCS#11 for accessing various smartcards is not clear. I've tried to
highlight the advantages of using standard software API to access external
devices, but I've failed.

Best Regards,
Alon Bar-Lev.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Signing MS-Excel spread sheets

2005-09-05 Thread Kimmo Surakka

Berend Tober wrote:



Indeed, and I even included in my original post "(Aside from the  
obvious -- "Stop using MS-Excel!" -- because that is a failure I  
cannot control...)".  Kids these days


Anyway, I've looked at WinPT and GPGee and one other GUI wrapper  
around gnupg, but they all of course are victims of this MS Excel  
"feature", and furthermore none of them satisfy my other need to be  
able to support multiple persons signing any given document, either  
(cf. other mailing list message thread "Multiple signatures on a  
single file").





Just my two cents worth: isn't it true that most Windows zippers can  
open a file "from inside a zip archive", i.e. uncompress it  
transparently to a temp directory and open from there? One easy-to- 
use solution could therefore be to store the Excel file inside a zip  
archive, and then sign that archive? When the second person opens the  
spreadsheet, all the changes Excel wants to do are done to the  
temporary copy -- not the actual spreadsheet itself.


Kusti



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGG Card

2005-09-05 Thread Peter Gutmann
Benjamin Donnachie <[EMAIL PROTECTED]> writes:

>I saw that...  Perhaps we should "fork" GPG and work on a PKCS#11 compliant
>version...  I'm fairly new to smartcards, but I have a fair bit of other
>programming experience...

I'd already offered the use of my PKCS #11 interface code from cryptlib for
GPG use some time ago.  This should do everything you need and has had years
of tuning to work with all the bugs in various PKCS #11 drivers, it's vastly
easier than going through the entire learning curve yourself.

Peter.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [outlgpg] Outlook 2002 Crash

2005-09-05 Thread Timo Schulz
Am Mon, 2005-08-29 um 20.15 schrieb Ryley Breiddal:


> I'm running Outlook 2002 SP2 on Windows 2000, and whenever I try to sign
> a message, Outlook crashes.  There was a report recently, archived at
> http://lists.gnupg.org/pipermail/gnupg-users/2005-August/026511.html
> whose symptoms match mine exactly.
> 
> I have GPGExch.dll version 0.6.1 and libgpgmedlgs.dll version 0.99.4.
> My GPG version is 1.4.2 (I installed WinPT 0.10.0).

Please use the new GPGol version. The old 'OutlGPG' version will no
longer be maintained and is now replaced with GPGol.


Timo



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Sks-devel] Re: zero-length MPIs

2005-09-05 Thread Adam Schreiber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

David Shaw wrote:
> Try this patch.

I get an MPI error with this patch I didn't get with Klaus'.

*snip*
gpg: mpi larger than indicated length (2 bytes)
gpg: keyring_get_keyblock: read error: invalid packet
gpg: keydb_get_keyblock failed: invalid keyring
*snip*

Adam Schreiber

- --
Why isn't all of your email protected?
http://gnupg.org
http://enigmail.mozdev.org
http://seahorse.sourceforge.net
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD4DBQFDFnvqjU1oaHEI4wgRAv/MAKCltzlrWdWElPm4Gis173DWKeHKvACYyJdW
xXcd3RTxVp7/8OF7TeezrA==
=bdKw
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


[outlgpg] Outlook 2002 Crash

2005-09-05 Thread Ryley Breiddal
Hi there,

I'm running Outlook 2002 SP2 on Windows 2000, and whenever I try to sign
a message, Outlook crashes.  There was a report recently, archived at
http://lists.gnupg.org/pipermail/gnupg-users/2005-August/026511.html
whose symptoms match mine exactly.

I have GPGExch.dll version 0.6.1 and libgpgmedlgs.dll version 0.99.4.
My GPG version is 1.4.2 (I installed WinPT 0.10.0).

I've noticed a couple things.  The GnuPG prefs dialog seems to lose my
settings on a fairly regular basis, seemingly on the crashes.  I also
get a mix of crashes that pop up the "send a report to MS" dialog and
ones that just silently close Outlook.  The loss of settings always
comes with the first group of crashes.  The settings that keep getting
lost are specifically "Also encrypt with default key" and the logging
location.  The stuff in advanced always stays the same.

Path to key-manager binary question - I saw somewhere that I should set
it to "PATH/WinPT.exe --keymanager" but I can't get it to accept
anything but "PATH/WinPT.exe".  Any suggestions?

Similarly to Richard, I haven't figured out how to get a stack trace out
of Outlook yet, but I'm working on it.  In the meantime, I'm happy to
provide any other information that might be of interest.

Please CC any replies to me, as I'm not on the mailing list.

Regards,

___
Ryley Breiddal
PresiNET Systems





___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Sks-devel] Re: zero-length MPIs

2005-09-05 Thread Klaus Singvogel
-BEGIN PGP SIGNED MESSAGE-

I can confirm too that the patch of David Shaw is working fine.

Thanks.

Regards,
Klaus.

Adam Schreiber wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Please ignore my previous email.  The patch works for me.
> 
> 
> Adam Schreiber
> 
> - --
> Why isn't all of your email protected?
> http://gnupg.org
> http://enigmail.mozdev.org
> http://seahorse.sourceforge.net
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.2 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
> 
> iD8DBQFDFnx3jU1oaHEI4wgRAihPAJkB2BpJW+fej/HfvStxYCQTdCvETQCg4jA4
> DA7CvncNxh2hDubCGbIoO2A=
> =Can1
> -END PGP SIGNATURE-

- -- 
Klaus Singvogel
SUSE LINUX Products GmbH
Maxfeldstr. 5 E-Mail: [EMAIL PROTECTED]
90409 Nuernberg   Phone: +49 (0) 911 740530
Germany   GnuPG-Key-ID: 1024R/5068792D  1994-06-27
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (GNU/Linux)

iQCVAwUBQxbl7rbjw8ZQaHktAQF9PgP/Z0Xs81u0SjC98iCK9mmQEKI/c/5Q54CO
/fj/LkkunLQ7r+5ywwxJ/5htLEHKz4iY5QCvYCGc72H8S0IqX1KN3ThTTTsWiDy6
FWVb/svpOfQks9Zu6MJegxiphX+oHwieza6SVB3Y5/r2pC/gzQF3syiC/YOoI6r1
DbMPEtF0FSE=
=ran3
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Sks-devel] Re: zero-length MPIs

2005-09-05 Thread Adam Schreiber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Klaus Singvogel wrote:
> Please confirm me, that my thinking is correct here.

I'm not sure if Klaus' thinking is correct, but his patch clears up the
MPI errors I was receiving.

Adam Schreiber

- --
Why isn't all of your email protected?
http://gnupg.org
http://enigmail.mozdev.org
http://seahorse.sourceforge.net
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDFgCEjU1oaHEI4wgRAnQdAKDJfzhnHslrWKd7CCz0j2NiA1TM8QCglrwF
S4UcEMVOzn+TRmQvHkh25Ks=
=f736
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Sks-devel] Re: zero-length MPIs

2005-09-05 Thread Adam Schreiber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Please ignore my previous email.  The patch works for me.


Adam Schreiber

- --
Why isn't all of your email protected?
http://gnupg.org
http://enigmail.mozdev.org
http://seahorse.sourceforge.net
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDFnx3jU1oaHEI4wgRAihPAJkB2BpJW+fej/HfvStxYCQTdCvETQCg4jA4
DA7CvncNxh2hDubCGbIoO2A=
=Can1
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Multiple signatures on a single file

2005-09-05 Thread Berend Tober

Is it possible to have multiple persons sign a single file? If so, how
is this done?

The particular scenario is currently this: Employees submit expense
reports for business travel using a spread sheet. Current practise is
the the employee fills out spread sheet via computer (or optionally
prints blank spread sheet template and writes by hand with a pen),
physically signs using pen and ink, physically delivers signed hardcopy
to supervisor for supervisor pen-and-ink signature prior to payment
processing.

Desired practise is to eliminate both producing hard copy and
pen-and-ink signatures, and then re-work the process using gpg
electronic signatures. Thus, employee would enter data into expense
report spread sheet, save, gpg sign, mail to supervisor, supervisor
would (presumably) open and review spread sheet, close without changing,
gpg sign, and then return to employee or forward to accounting dept.

Sounds straightforward, but I didn't spot in the various
manuals/guides/how-to's for gnupg how a second individual could add
their signature after me.

-- BMT




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: PKCS#11 support for gpg-agent

2005-09-05 Thread Nicholas Cole

--- Werner Koch <[EMAIL PROTECTED]> wrote:



> It may not be widely adopted but nevertheless it is
> the standard to
> make sure that confidential information can be send
> over the Internet.
> It is used all over the Net and major industry
> players are using it
> and even requring that suppkiers are using PGP.  
> 
> The IETF has not decided whether OpenPGP or S/MIME
> will be the
> preferred standard.



I don't mean to get involved in the heated discussion
about smart cards and the like, but since it has been
raised, I would welcome some clarification about
gpg-1.9, and the thinking behind adding support for
s/mime.  What is the "roadmap" (from the point of view
of users) for gpg?

Is there any sense in which opengpg is, or may be
soon, a deprecated standard? 

Beyond the pros and cons of centralised CAs, what are
the advantages of the two?

It seems to be the case that amongst individuals and
open source projects, openpgp is in very wide use
(these things are relative!) - and given the ease with
which openpgp has shown it can adapt to emerging
security threats I would expect that to continue.  I
have no idea at all how well commercial pgp is doing.

Best,

N.




___ 
To help you stay safe and secure online, we've developed the all new Yahoo! 
Security Centre. http://uk.security.yahoo.com

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users