scripting gpg

2011-05-04 Thread Jon Drukman
I need to do the following:

- when a new machine is created, automatically import a public key and give it
full trust

- be able to encrypt files with that public key without any interactive
prompting (from a shell script/cron job)

in other words, a machine has to go from virgin state (OS + software only) to
being able to encrypt and transmit encrypted files without any prompting or
other user interaction.

I know about the 'trust' command but I don't see any non-interactive way to
achieve that.  Alternatively, if the gpg binary would stop giving me the It is
NOT certain that the key belongs to the person named
in the user ID.  If you *really* know what you are doing,
you may answer the next question with yes. prompt that would be fine too.

Are there some hidden command line options/environment variables I am missing?


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: scripting gpg

2011-05-04 Thread David Shaw
On May 4, 2011, at 7:01 PM, Jon Drukman wrote:

 I need to do the following:
 
 - when a new machine is created, automatically import a public key and give it
 full trust
 
 - be able to encrypt files with that public key without any interactive
 prompting (from a shell script/cron job)
 
 in other words, a machine has to go from virgin state (OS + software only) to
 being able to encrypt and transmit encrypted files without any prompting or
 other user interaction.
 
 I know about the 'trust' command but I don't see any non-interactive way to
 achieve that.  Alternatively, if the gpg binary would stop giving me the It 
 is
 NOT certain that the key belongs to the person named
 in the user ID.  If you *really* know what you are doing,
 you may answer the next question with yes. prompt that would be fine too.

You're looking for the --trust-model always option.  Add that to your 
options, and the trust model becomes if it's on my keyring, it's fully 
trusted.  It's up to you to make sure that only keys that are fully trusted 
are on your keyring, of course. :)

David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: scripting gpg

2011-05-04 Thread Jon Drukman
David Shaw dshaw at jabberwocky.com writes:


 You're looking for the --trust-model always option.  Add that to your
options, and the trust model
 becomes if it's on my keyring, it's fully trusted.  It's up to you to make
sure that only keys that are fully
 trusted are on your keyring, of course. :)


Awesome, thanks.  This works (php):

putenv('HOME=/tmp/gpg');
@mkdir('/tmp/gpg');
system(/usr/bin/gpg --batch --yes --import /sites/config/public_key.asc);
system(/usr/bin/gpg --batch --yes --no-ask-cert-level --trust-model always
--output $filename.gpg --encrypt --recipient $recipient $filename  /tmp/gpg.log
21);




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: scripting gpg

2011-05-04 Thread Jerome Baum
On Thu, May 5, 2011 at 02:19, Jon Drukman j...@cluttered.com wrote:

 putenv('HOME=/tmp/gpg');
 @mkdir('/tmp/gpg');


At this point, you should be watching carefully. What if another user has
created this directory to spoof the key?

Use the appropriate command for creating a unique temporary directory.
Should be mktemp or similar.


 system(/usr/bin/gpg --batch --yes --import /sites/config/public_key.asc);
 system(/usr/bin/gpg --batch --yes --no-ask-cert-level --trust-model always
 --output $filename.gpg --encrypt --recipient $recipient $filename 
 /tmp/gpg.log
 21);


Again, what if the keyring is already in place? Could even be yourself --
you create the keyring once, import the public key at the time, then later
update the public key and import again -- now, which key to use?

-- 
Jerome Baum

tel +49-1578-8434336
email jer...@jeromebaum.com
-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Storing secrets on other people's computers

2011-05-04 Thread M.R.

On 03/05/11 15:50, Daniel Kahn Gillmor wrote:


Dropbox exposes your secret
keys to dropbox employees (and anyone who can convince them to snoop):

http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html


That article makes no sense at all.

a) Storing files containing your secret data on somebody else's
computer makes sense only if *you* encrypt the data beforehand,
completely independently from the person or organization that
you will give the files to store.

b) Your data can not be considered safely encrypted, unless encrypted
with a competently written program that had its source inspected by
you or someone you trust, on the computer that you control at the
time of encryption.

Once these two extremely straightforward principles are observed,
it is perfectly OK to give the files containing your secrets to
someone/anyone else for safekeeping, provided you have no problem
that it will be known to him, to all those that he cooperates with
and to all those that monitor the traffic between the two of you
that you have given *some* secrets away for safekeeping. To imply
that one such service is better or worse than another based on what
*they* do (or they say they do) in order to protect your secrets
is utter nonsense.

Marko R.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Storing secrets on other people's computers

2011-05-04 Thread Robert J. Hansen
 Once these two extremely straightforward principles are observed...

For the better part of a decade now I've volunteered to publish my private 
certificate in the _New York Times_ if someone will pay for the advertising 
space.  With a strong passphrase that's not known to anyone else, the private 
certificate is about as safe as can be.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Storing secrets on other people's computers

2011-05-04 Thread Jerome Baum
On Thu, May 5, 2011 at 05:34, Robert J. Hansen r...@sixdemonbag.org wrote:

  Once these two extremely straightforward principles are observed...

 For the better part of a decade now I've volunteered to publish my private
 certificate in the _New York Times_ if someone will pay for the advertising
 space.  With a strong passphrase that's not known to anyone else, the
 private certificate is about as safe as can be.


Go ahead. Send it to the list. Then offer a bounty for the guy who hands you
your secret key. That'll be worth so much more.

-- 
Jerome Baum

tel +49-1578-8434336
email jer...@jeromebaum.com
-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Storing secrets on other people's computers

2011-05-04 Thread Jeffrey Walton
On Wed, May 4, 2011 at 10:24 PM, M.R. makro...@gmail.com wrote:
 On 03/05/11 15:50, Daniel Kahn Gillmor wrote:

 Dropbox exposes your secret
 keys to dropbox employees (and anyone who can convince them to snoop):


 http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html

 That article makes no sense at all.

I was somewhat surprised at the article.

I think a typical user expects that a file is encrypted locally and
then securely transmitted to DropBox for storage. (I don't use
DropBox, but its what I expected). I don't believe anyone would expect
that DropBox transmits a plain text file and then encrypts the file at
its leisure and pleasure.

OT: I was just getting ready to audit DropBox via their public API for
another project. The article saved me a lot of time.

Jeff

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: nothing so dramatic

2011-05-04 Thread Jeffrey Walton
On Thu, Apr 28, 2011 at 12:03 PM, M.R. makro...@gmail.com wrote:
 On 28/04/11 13:40, Johan Wevers wrote:

 I'm not so sure. Especially for human rights activists in, say, Syrie or
 Tibet, might not want the government to know when they are mailing with
 foreign journalists.

 Quite probably, but I do not consider myself qualified to comment
 on trials and tribulations of human rights activists in faraway lands,
 or, for that matter, on this continent. My concern is the result of
 a much more mundane set of circumstances.

 When legal pressure to decrypt is discussed, almost universally
 the issue becomes that of the right not to self-incriminate.
 Implicitly, it is assumed that the proceedings are part of some
 segment of the criminal law. However, it is not in the criminal
 but in the civil litigation that the courts can (and nowadays
 increasingly do) issue Subpoena Duces Tecum (production of evidence)
 for plain-text of one of the litigant's communications. No right not
 to self-incriminate applies in such case. Where the record exists
 (just for an-instance) in a monetary hefty divorce litigation that
 there was encrypted communication with a third party, reasonably
 suspected of interfering in the marriage, the request from the
 opposing side for such duces tecum would not be hard to obtain.
 But there has to be a reasonable expectation of relevance; i.e., encrypted
 communication with a specific and relevant individual.
 Without it, request would likely be treated as nothing but a fishing
 expedition and rejected. I can easily imagine similar cases where
 the other communicating party is not Alice (36-29-38) but Bob, your
 accountant or stockbroker.


A federal judge has ordered a criminal defendant to decrypt his hard
drive by typing in his PGP passphrase so prosecutors can view the
unencrypted files, a ruling that raises serious concerns about
self-incrimination in an electronic age.

'Judge orders defendant to decrypt PGP-protected laptop',
http://news.cnet.com/8301-13578_3-10172866-38.html.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Storing secrets on other people's computers

2011-05-04 Thread Anthony Papillion
The typical user most likely *does* believe files are locally
encrypted then sent to Dropbox. But isn't that still pretty
meaningless? If Dropbox is encrypting your file then you have to trust
that Dropbox either can't decrypt the file or that, if they can, they
would never under any circumstance compromise your security. One name:
HushMail.

If you don't encrypt it yourself using a tool that is *known* to be
secure then it really can't be trusted. Someone hacking a server is
really the least of your security worries.

Anthony


On 5/4/11, Jeffrey Walton noloa...@gmail.com wrote:
 On Wed, May 4, 2011 at 10:24 PM, M.R. makro...@gmail.com wrote:
 On 03/05/11 15:50, Daniel Kahn Gillmor wrote:

 Dropbox exposes your secret
 keys to dropbox employees (and anyone who can convince them to snoop):


 http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html

 That article makes no sense at all.

 I was somewhat surprised at the article.

 I think a typical user expects that a file is encrypted locally and
 then securely transmitted to DropBox for storage. (I don't use
 DropBox, but its what I expected). I don't believe anyone would expect
 that DropBox transmits a plain text file and then encrypts the file at
 its leisure and pleasure.

 OT: I was just getting ready to audit DropBox via their public API for
 another project. The article saved me a lot of time.

 Jeff

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users



-- 
Anthony Papillion
Lead Developer / Owner
Get real about your software/web development and IT Services
(918) 919-4624

Facebook: http://www.facebook.com/cajuntechie
My Blog:   http://www.cajuntechie.com

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: nothing so dramatic

2011-05-04 Thread Robert J. Hansen
 A federal judge has ordered a criminal defendant to decrypt his hard
 drive by typing in his PGP passphrase so prosecutors can view the
 unencrypted files, a ruling that raises serious concerns about
 self-incrimination in an electronic age.

That court's opinion was predicated on the fact Boucher had already waived his 
right against self-incrimination, and for that reason there was no 
constitutional violation.  It's sort of like testifying in court: the 
government can't force you to testify in your own criminal proceeding, but if 
you waive that right the government can cross-examine you.  Likewise, if you 
*voluntarily give the government your child porn*, you can't really claim that 
I'm not going to provide the government with copies of that child porn, 
because that would incriminate me.

_Boucher_ is nowhere near the death knell for privacy that some people seem to 
think it is.

(ObDisclosure: a couple of years ago I helped prepare a law review article on 
_Boucher_.)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users