checking gpg-signatures in JavaScript

2011-01-24 Thread Ole Rixmann
Hi List,
i wrote already 2 Mails and got some help but i don't get any further by
myself...

I want to check gpg-clearsigned-signatures in JS,  and with the rfc
https://tools.ietf.org/html/rfc4880 i had some success.

The problem that i have right now is to produce the Hash-value which is
to be signed (to be checked).

I have an example to state my problem:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

{2011-01-13 13:00:cno,2011-01-13
14:00:cno,2011-01-14:cno,2011-01-15 13:00:cno}
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (Darwin)

iQIcBAEBAgAGBQJNPLs/AAoJEEH+GXMF1XjpY5MQAMSG7NcEJBEV7/mkeEtac1q7
cCYGzPBMnYlu3wY1/Jre6HPzfvY+x8kSsPMHIefndKDCcDFOqyEKpUe3rLZC9kBS
0yJ1Dewcz7/2tTrc6Yq6QfHXyalwpWk+I99bZpALQW5W3xh+hKtlxsZlLVn0MUnZ
r5ZReRhpxefyOhRfJRzVVImvDwUpBn6GrBjmAElQd/Z27ecNtprgUZ46HfA7wHKu
PjGmOHJzrbj34XPl7oqYS/tmE5AGIkyDYa7o81/8SODZxtBdztpZ48NBH9zgNcoV
32cdiGQ62S5DXUQeur+sL5z/vFMbcydtPeT2RW8gQ0Sgy6ogCwYt/QmtVFKNqJta
CNh6onchhkCywjBVpxlqRQBsWvionnIY3EMF7AnQ6DhiRvF6WzVB0n9GBZwX9rvf
0A8k7AnFbGA+hAK1Oq6takm0dP2zBrq1irNe2osJfYnVp5/2m4ok+dVECp5XVG/f
NgIQn1gOjflVzBotSG40VDbBKMNSjItU/xyWvR5h9Xd3p0W1940odUr1/wAwAZcM
ziWa5f2G0CdeTQUQ3dzP7ZvDZZepGP+uLYPEZCDvlI4ARWqC4IdlwVPDsYQbTm9a
BRzII51aiCHLuzQMNFy+Y91T655lhrsqQ6JMuURdhSGdcLvtJqZDWcyPaWflLaz/
nJlucBr0OdSQ04WkAlcA
=McmZ
-END PGP SIGNATURE-

The content-part is this (as i understand the rfc):

{2011-01-13 13:00:cno,2011-01-13
14:00:cno,2011-01-14:cno,2011-01-15 13:00:cno}

This has to be concatenated with some data from the header of the
clearsigned Packet, i have:

4,1,1,2,0,6,5,2,77,60,187,63 (as byte-array) which looks sound

The Hash (SHA1) i get for the concatenation is:

ebfc31ab409ac2c4d43ac99421992fb41c7590c8

but the first 16 bits from the hash (included in the header) are:

0x6393

The whole value from which the hash is calculated (as byte-array because
some chars may change due to encoding):

123,34,50,48,49,49,45,48,49,45,49,51,32,49,51,58,48,48,34,58,34,99,110,111,34,44,34,50,48,49,49,45,48,49,45,49,51,32,49,52,58,48,48,34,58,34,99,110,111,34,44,34,50,48,49,49,45,48,49,45,49,52,34,58,34,99,110,111,34,44,34,50,48,49,49,45,48,49,45,49,53,32,49,51,58,48,48,34,58,34,99,110,111,34,125,4,1,1,2,0,6,5,2,77,60,187,63

This can be inserted on a site like
http://home1.paulschou.net/tools/xlate/ to check the SHA1 value and from
what i see my SHA1 is correct.

I would be really happy if someone with knowledge of the implementation
could reproduce my values and tell me where i went wrong :)

I could give anyone with interest in it the code and would be willing to
opensource it when i have my work finished...

The system i'm working on is like www.doodle.com except that userdata is
encrypted and signed in the browser, i'm a student of computer science
so its more a proof of concept.

Thanks in advance,
Ole Rixmann






signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Thunderbird/Live/Outlook users' habits

2011-01-24 Thread Derick Centeno
In my view, what you are really discussing are how individuals parse or 
associate ideas.  It just so happens that what makes information 
different from raw and discrete data are the cultural and religious 
assumptions and context added to the data.  Briefly stated, as any 
Anthropologist and/or Psychologist will explain, humans find it a nearly 
impossible task to separate their cultural and/or religious assumptions 
from what individuals define as being logical.  At the root of this 
problem are not merely these assumptions, but language itself which 
incorporates and reaffirms these assumptions continuously providing the 
illusion of support of the logical appearance of the assumption.


These prejudices, for lack of a better term, influence not only what we 
see as logical, but what we see or accept as viable science.  This is 
a more intractable problem than writing any program or straightforward 
script as the very foundation regarding what one believes needs to be 
addressed or corrected is seen in terms of one's individual, and usually 
untested, understanding.  Of course, although as a society humanity 
developed mathematics and science to see such errors of thinking more 
clearly it is sadly also obvious that history shows very clearly that 
more often than not, humans require more than a generation at the 
minimum to catch such errors.


On 1/24/2011 7:15 AM, Tobias Nissen wrote:

Colin Leroy wrote:
[...]

I think a solution would be to remove In-Reply-To and References
headers using an action. The difficulty of it is that References can
span multiple lines.

I could easily parse that, but there's another problem. Consider this
thread:

   A
-  B
  -  ...
-  C(new)
  -  D  (my reply)
-  E(others' replies)
  -  F  (others' reply)
  -  ...

Let's say C is the subthread with the changed subject line, that is
supposed to be a new thread. Of course I could go on and remove those
references. C would then stand alone as the beginning of a new thread.
My reply to C (D) and replies to my reply (E) would then correctly be
filed under that new thread.

But direct replies to C (F) would still contain some references to the
old thread, A in this case. It doesn't really matter what Claws does in
this case, my guess would be to still file the reply under C. But all
direct replies to C would still have those stale references to A.

I don't consider this a good idea. Say for some reason I'd want to
delete message C. I would then expect that all replies to C would either
stand alone or form *new* thread beginnings. Instead, at least that's
a behaviour I observed in my past MUAs, all those messages would again
be filed under A. Maybe not right then, but surely when the index is
rebuilt for some reason.

I think there's now way around building a sophisticated filtering
mechanism. I think it's really hard to do right.


___
Users mailing list
us...@lists.claws-mail.org
http://lists.claws-mail.org/cgi-bin/mailman/listinfo/users
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: MacGPG2 v2.0.17 released!

2011-01-24 Thread Benjamin Donnachie
On 24 January 2011 23:03, Benjamin Donnachie benja...@py-soft.co.uk wrote:
 What's New
 bit Intel Macs running OS X Leopard (10.5) and higher.

Cut and paste failed me.  It should have read:

What's New
=
 * Supports 32- and 64-bit Intel Macs running OS X Leopard (10.5) and higher.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


MacGPG2 v2.0.17 released!

2011-01-24 Thread Benjamin Donnachie
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

MacGPG2, a build of GnuPG2 for MacOSX with a native pinentry program,
has been updated to GnuPG v2.0.17.

Download available from
https://github.com/downloads/GPGTools/MacGPG2/MacGPG2-2.0.17.6.zip and
detached signature at
https://github.com/downloads/GPGTools/MacGPG2/MacGPG2-2.0.17.6.zip.asc

 * Tiger and PPC chips no longer supported.
 * v2.0.16 will be deleted from your system.
 * You may need to change the file path for gpg2 to /usr/local/MacGPG2/bin/gpg2
 * Removal now as simple as sudo rm -fr /usr/local/MacGPG2

Support available from the GPGTools mailing list -
http://www.gpgtools.org/about.html

Release notes follow:

Please use the detached signature to confirm the integrity of your download
prior to install.  Public key needed available from http://www.gpgtools.org/

Unzip the archive and then run the MacGPG2 installer.

 * MD5 (MacGPG2-2.0.17.zip) = f682dda810d665ed68e321dd9d230350

 * 121,836 downloads of MacGPG2 from 165 countries in two years!


What's New
bit Intel Macs running OS X Leopard (10.5) and higher.

 * Core upgraded to GnuPG v2.0.17
  = Configured to use standard socket and daemonise gpg agent on the fly if
required

 * Maximum key size increased to 8192 bits; recommended for expert users only

 * Includes GPGTools gpg-agent cache-id option patch

 * Pinentry updated by GPGTools team and includes keychain support

 * Installs exclusively under /usr/local/MacGPG2/ removing previous
v2.0.16 install

 * Creates default gpg configuration file if none exists

 * Libksba upgraded to v1.1.0

 * Libusb upgraded to v1.0.8


Credits
=

 * Werner Koch and the GnuPG Project, http://www.gnupg.org/

 * Stéphane Corthésy for the launchd patches.

 * Charly Avital for his patient testing.

 * Dr Alun J Carr for his kind donation.


Noteworthy changes in GnuPG version 2.0.17 (2011-01-13)
- -

 * Allow more hash algorithms with the OpenPGP v2 card.

 * The gpg-agent now te gpg-agent.conf on a HUP.

 * Fixed output of gpgconf --check-options.

 * Fixed a bug where Scdaemon sends a signal to Gpg-agent running in
  non-daemon mode.

 * Fixed TTY management for pinentries and session variable update
  problem.

 * Minor bug fixes.

-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://www.gpgtools.org/
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=OsK9
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


MacGPG2 2.0.17

2011-01-24 Thread Charly Avital
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Kevin Kammer wrote the following on 1/24/11 8:42 PM:
 Thanks for the suggestion, but having deactivated everything GnuPG
 related that was installed by MacPorts, and running the latest GPGTools
 installer offered from their website, I ended up with far more problems
 than I solved. So, for the time being I am going to revert to gpg from
 MacPorts and use Mutt when I need to sign or encrypt something directly
 from the mail client.
 
 Thanks again,
 Kevin

To the best of my knowledge, there was no need to deactivate the
MacPorts installation, but it can't hurt to have done so.

I have not run the GPGTools installer, I have run the MacGPG2 2.0.17
released a few hours ago by Ben Donnachie:
 MacGPG2, a build of GnuPG2 for MacOSX with a native pinentry program,
 has been updated to GnuPG v2.0.17.
 
 Download available from
 https://github.com/downloads/GPGTools/MacGPG2/MacGPG2-2.0.17.6.zip and
 detached signature at
 https://github.com/downloads/GPGTools/MacGPG2/MacGPG2-2.0.17.6.zip.asc

And *everything* related to MacGPG2, Thunderbird+Enigmail and GPGMail
1.3.2.RC1 is running just fine:
- - decrypt/verify
- - encrypt
- - sign

Ditto for test commands in Terminal, such as:
ps waux | grep gpg-agent
echo test | gpg2 -aser [your user name] | gpg2



Best regards,
Charly




-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GnuPG for Privacy
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJNPnjpAAoJEM3GMi2FW4PvUS4H/RuSuhv7gQa3s9SGXnBaZySG
UWm7ogt29uUn1tD05zYbW3iM/WYcfrqmXqelY4NF4lqGgrlweQjmPXFr1uCjF9VA
3bUnXrG4D3sSlzC211ZJJmthD6wa5OJOm00+9HuGZWKA04V5ziLPon+zpbz7/B1Y
wwm0Eh6CEBUlyyHpozPyUqHIKUiZ02yBkKuH4HxKuauBVsi4EZmUjInHwte6siLH
esnYc8KvyELImMkiSJ4+ccmp+LIod2lDFKKAgManQ3kMOJTzt0Pc9CCNAyEshCCo
9PaOCJfD+k3Zu754O/0IKm+UZUbCPaDA2wdx3I+z5WDzm31fG+Jvs3BQhOQ3qdI=
=wcjU
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users