Re: GnuPG 2.1 beta 3 released

2011-12-27 Thread Veet Vivarto
Perhaps you find this relevant. I don't even begin to see why you are
interested in this. But who knows.

On Mon, Dec 26, 2011 at 9:42 PM, Werner Koch w...@gnupg.org wrote:

 On Sun, 25 Dec 2011 19:00, nicholas.c...@gmail.com said:

  It would be very good if there were still a way to completely 'sandox'
 (for
  want of a better term) an instance of gpg, so that it uses its own key
  rings and trust databases.  I certainly find that for testing purposes it
  is very useful indeed.  On previous versions --homedir does this nicely.

 A easy way to do this is:

  GNUPGHOME=/foo/bar gpg-agent --daemon sh

 and then do whatever you want in this shell.  If you are done run give
 an exit and with a few seconds that gpg-agent will be terminated.  That
 is how I do almost all tests.


 Salam-Shalom,

   Werner

 --
 Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


 ___
 Gnupg-devel mailing list
 gnupg-de...@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-devel

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG 2.1 beta 3 released

2011-12-27 Thread Veet Vivarto
sorry my previous message was sent in error. Please disregard.
Thank you.

On Tue, Dec 27, 2011 at 4:42 AM, Veet Vivarto viva...@gmail.com wrote:

 Perhaps you find this relevant. I don't even begin to see why you are
 interested in this. But who knows.

 On Mon, Dec 26, 2011 at 9:42 PM, Werner Koch w...@gnupg.org wrote:

 On Sun, 25 Dec 2011 19:00, nicholas.c...@gmail.com said:

  It would be very good if there were still a way to completely 'sandox'
 (for
  want of a better term) an instance of gpg, so that it uses its own key
  rings and trust databases.  I certainly find that for testing purposes
 it
  is very useful indeed.  On previous versions --homedir does this nicely.

 A easy way to do this is:

  GNUPGHOME=/foo/bar gpg-agent --daemon sh

 and then do whatever you want in this shell.  If you are done run give
 an exit and with a few seconds that gpg-agent will be terminated.  That
 is how I do almost all tests.


 Salam-Shalom,

   Werner

 --
 Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


 ___
 Gnupg-devel mailing list
 gnupg-de...@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-devel



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: maximum passphrase for symmetric encryption ?

2011-12-27 Thread Jerome Baum
On 2011-12-27 23:14, ved...@nym.hush.com wrote:
 Is there a maximum size for a passphrase for symmetric encryption 
 in gnupg, or does a passphrase exceeding a certain size not add any 
 further security to the process?
 
 Example,
 The session key for AES 256 is 64 hexadecimal characters.
 
 The approximate equivalent in brute force work is 20 diceware 
 words.
 [ 7776^19  2^256  7776^20 ].
 
  A string of 15 diceware words is often more than 64 characters.

I can't tell for gpg specifically but it's not so much about
characters. It's about entropy. Natural language is redundant, and
diceware uses words from natural language.

Let's say we all adopted the convention to write every character twice,
to recover from errors in transmission. Is ttrraannssmmiiiioonn any
more secure than transmission, given that an attacker knows you're
doubling every letter? No, because it doesn't have more entropy.

So don't measure characters, your upper bound is entropy, so 20 diceware
words apparently contain 256 bits of entropy (based on your numbers).
That means any more than 20 words isn't going to add for the case of
AES-256.

Like I said, this is not gpg-specific. For all I know, gpg might cut off
after the 64th character and drop entropy from your passphrase. But that
sounds unlikely.

Wikipedia is great for further reading.

-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
--
nameserver 217.79.186.148
nameserver 178.63.26.172
http://opennicproject.org/
--
No situation is so dire that panic cannot make it worse.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


maximum passphrase for symmetric encryption ?

2011-12-27 Thread vedaal
Is there a maximum size for a passphrase for symmetric encryption 
in gnupg, or does a passphrase exceeding a certain size not add any 
further security to the process?

Example,
The session key for AES 256 is 64 hexadecimal characters.

The approximate equivalent in brute force work is 20 diceware 
words.
[ 7776^19  2^256  7776^20 ].

 A string of 15 diceware words is often more than 64 characters.

Does increasing the passphrase string to more than 64 characters 
add any security?

Truecrypt full disk encryption insists on a maximum of 64 
characters for the passphrase.


(This is even more relevant in my case, where I routinely use 3DES 
;-)  )

(am not familiar enough with the primitives of symmetric encryption 
in how a string to key symmetric encryption works.)


TIA,

vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: maximum passphrase for symmetric encryption ?

2011-12-27 Thread Aaron Toponce
There may be some errors in my reply, so if so, please notify me.

On Tue, Dec 27, 2011 at 11:23:50PM +0100, Jerome Baum wrote:
 On 2011-12-27 23:14, ved...@nym.hush.com wrote:
  The approximate equivalent in brute force work is 20 diceware
  words.
  [ 7776^19  2^256  7776^20 ].
 
   A string of 15 diceware words is often more than 64 characters.

 I can't tell for gpg specifically but it's not so much about
 characters. It's about entropy. Natural language is redundant, and
 diceware uses words from natural language.

Yes, but each word in the diceware list contains about 12.9 bits of
entropy, due to the random nature of rolling a fair D6. So, for a
passphrase that is 20 diceware words, it contains roughly 258-bits of
entropy, as he identified.

It's easy to calculate entropy in a truly random environment:

H = L*log2(N)

where 'H' is the entropy value in binary bits, 'L' is the length of the
message, 'log2()' is the log base-2 function, and 'N' is the possible
number of characters the system can have. The only time when this equation
becomes more complicated, is when predictable patterns, such as can be
found in human language, are found.

 So don't measure characters, your upper bound is entropy, so 20 diceware
 words apparently contain 256 bits of entropy (based on your numbers).
 That means any more than 20 words isn't going to add for the case of
 AES-256.

And this is the point, right here. A passphrase that has more binary bits
of entropy, than the containing system, won't provide you with any
additional benefit, or security. So, in the case with a 20 word, diceware
passphrase, provided that the RNG building the AES 256-bit environment is
truly random data, any additional entropy in the passphrase, won't buy you
any additional security in the encrypted data.

--
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: maximum passphrase for symmetric encryption ?

2011-12-27 Thread Jerome Baum
On 2011-12-28 00:27, Aaron Toponce wrote:
 On Tue, Dec 27, 2011 at 11:23:50PM +0100, Jerome Baum wrote:
 I can't tell for gpg specifically but it's not so much about
 characters. It's about entropy. Natural language is redundant, and
 diceware uses words from natural language.
 
 Yes, but each word in the diceware list contains about 12.9 bits of
 entropy, due to the random nature of rolling a fair D6.

How is this in conflict with what I said?


-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
--
nameserver 217.79.186.148
nameserver 178.63.26.172
http://opennicproject.org/
--
No situation is so dire that panic cannot make it worse.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: German Privacy Foundation Crypto-stick

2011-12-27 Thread Crypto Stick
After installing the package the UDEV rule should be located at
/lib/udev/rules.d/40-cryptostick.rules

Please check.

Am 27.12.2011 09:00, schrieb mcmurphy:
 Hi,
 
 thank you for the answer. There is no difference. I'm not sure,
 whether the installation works. There is no new rule in
 /etc/udev/rules.d. Is it gnupg-ccid.rules in /etc/udev/? However:
 Nothing changed for not-sudoer-user. Maybe there is something wrong
 with udev or gpg?
 
 mcmurphy
 
 On 27.12.2011 00:50, Crypto Stick wrote:
 Hi! Please install this package (UDEV rule) and it should work. 
 https://www.assembla.com/spaces/cryptostick/documents/ds_EMCisGr4k7QeJe5cbCb/download/ds_EMCisGr4k7QeJe5cbCb
 
 
 
 Am 27.12.2011 00:46, schrieb mcmurphy:
 Hi,

 i'm trying to work with the Crypto-stick of the German Privacy 
 Foundation 
 (https://www.privacyfoundation.de/crypto_stick/crypto_stick_english/)


 under ubuntu 11 64-bit. Unfortunately it works only for root or
 sudoers. An UNPRVILEGED user gets the following message:

 $ gpg --card-status gpg: selecting openpgp failed: unknown
 command gpg: OpenPGP Karte ist nicht vorhanden: Allgemeiner
 Fehler

 I searched a lot, tried some udev-rules, i.e. 
 http://dokuwiki.nausch.org/doku.php/centos:cryptos or 
 http://lists.gnupg.org/pipermail/gnupg-users/2011-February/040781.html.
 It makes no difference.

 Maybe you have some hints for solving this problem.

 Thanx mcmurphy

 ___ Gnupg-users
 mailing list Gnupg-users@gnupg.org 
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

 
 
 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


maximum passphrase for symmetric encryption ?

2011-12-27 Thread vedaal
Jerome Baum jerome at jeromebaum.com wrote on
Tue Dec 27 23:23:50 CET 2011 :

gpg might cut off after the 64th character and drop entropy from 
your passphrase. But that sounds unlikely.


That's exactly my question.
Does gnupg have a maximum string length for a passphrase, and 
restrict itself to the entropy contained within that length?

(Apparently not.)

I tried symmetrically encrypting, using a string of 65 characters, 
and it works, and requires exactly those 65 characters to decrypt. 
(Substituting any other character for the 65th character does not 
decrypt).

Curious as to why Truecrypt does not accept more than 64, for whole 
disk encryption.


vedaal



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


--trusted-key

2011-12-27 Thread John A. Wallace
--trusted-key long key ID

Assume that the specified key (which must be given as a full 8 byte key ID)
is as trustworthy as one of your own secret keys. This option is useful if
you don't want to keep your secret keys (or one of them) online but still
want to be able to check the validity of a given recipient's or signator's
key. 

 

 

I read this definition online, but I can't seem to get a grasp on what it is
used for.  As it sounds as though it may have use for something I want to
do, I was hoping someone could elaborate a bit on this.  It may be clear as
glass to most of you, but I am not seeing it (sorry).  Thanks.

 

 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: --trusted-key

2011-12-27 Thread Hauke Laging
Am Mittwoch, 28. Dezember 2011, 03:08:15 schrieb John A. Wallace:

 Assume that the specified key (which must be given as a full 8 byte key ID)
 is as trustworthy as one of your own secret keys. This option is useful if
 you don't want to keep your secret keys (or one of them) online but still
 want to be able to check the validity of a given recipient's or signator's
 key.

 I read this definition online, but I can't seem to get a grasp on what it
 is used for.

See --export-secret-subkeys.

(gpg main key offline) as input for your favorite search engine answers 
possibly remaing questions.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: --trusted-key

2011-12-27 Thread Jerome Baum
On 2011-12-28 03:08, John A. Wallace wrote:
 --trusted-key long key ID
 
 Assume that the specified key (which must be given as a full 8 byte key ID)
 is as trustworthy as one of your own secret keys. This option is useful if
 you don't want to keep your secret keys (or one of them) online but still
 want to be able to check the validity of a given recipient's or signator's
 key. 


 I read this definition online, but I can't seem to get a grasp on what it is
 used for.  As it sounds as though it may have use for something I want to
 do, I was hoping someone could elaborate a bit on this.  It may be clear as
 glass to most of you, but I am not seeing it (sorry).  Thanks.

You can't set ultimate trust on a public key unless you have the
corresponding private key. So this is a way of telling gnupg not to
require that, e.g. if you have the key on another computer and gnupg
can't know that.

For instance, I keep two key: 0x215236DA and 0xC58C753A. But only
0xC58C753A is on my machine, 0x215236DA is stored somewhere safe, so I
don't want it on here. But I still want to ultimately trust 0x215236DA
because, well, it's my key. So my gpg.conf says trusted-key 215236DA.


-- 
PGP: A0E4 B2D4 94E6 20EE 85BA E45B 63E4 2BD8 C58C 753A
PGP: 2C23 EBFF DF1A 840D 2351 F5F5 F25B A03F 2152 36DA
--
nameserver 217.79.186.148
nameserver 178.63.26.172
http://opennicproject.org/
--
No situation is so dire that panic cannot make it worse.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: maximum passphrase for symmetric encryption ?

2011-12-27 Thread brian m. carlson
On Tue, Dec 27, 2011 at 07:54:05PM -0500, ved...@nym.hush.com wrote:
 That's exactly my question.
 Does gnupg have a maximum string length for a passphrase, and 
 restrict itself to the entropy contained within that length?

Not to my knowledge.  OpenPGP does not specify a maximum string length
for a passphrase, and it's limited only to the amount of memory you
have, or in some cases 2^61 bytes (which is essentially unlimited).

 I tried symmetrically encrypting, using a string of 65 characters, 
 and it works, and requires exactly those 65 characters to decrypt. 
 (Substituting any other character for the 65th character does not 
 decrypt).

Yes.  When you use a passphrase to encrypt, the entire passphrase is
hashed, so if the input is at all different, the passphrase will be
rejected.  Most modern OpenPGP implementations repeatedly hash the
passphrase and use salt (8 bytes of random data stored with the
passphrase to make the hash unique even if you reuse the passphrase).
This makes brute-force attempts slower since more computation is
required.

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: --trusted-key

2011-12-27 Thread Johan Wevers
On 28-12-2011 3:08, John A. Wallace wrote:

 --trusted-key long key ID
 
 Assume that the specified key (which must be given as a full 8 byte key
 ID)

Perhaps it would be better to expand this option so it will also accept
the full key signature (and also check against the full sig) now that
intentional collisions of the 8-byte keyID can be generated.

-- 
Met vriendelijke groet / With kind regards,
Johan Wevers

PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users