Problems invoking gpgsm with curses interface.

2014-07-19 Thread The Fuzzy Whirlpool Thunderstorm
Hello,
Gnupg has s/MIME component to manage x509 certificate, which is called
gpgsm. Running gpgsm with a working desktop such as KDE is fine. But
when I'm running it on a shell, using pinentry-curses as passphrase
input backend, I got an error saying that LC-CTYPE is unknown.

gpgsm: pinentry-curses: no LC_CTYPE known - assuming UTF-8

I've set GPG_TTY environment variable and started gpg-agent as daemon.
For your information, I run gpgsm to import a p12 certificate

`gpgsm --import mycert.p12`

Is there any workaround to fix this strange gpgsm behavior?

Thanks.


pgpV1OM6eZDL8.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Automatic e-mail encryption

2014-07-19 Thread Peter Lebbing
On 19/07/14 00:34, Ingo Klöcker wrote:
 Sure. But the NSA already knows the correspondents of all of our mail
  anyway. Keyserver lookups do not add any additional data

Pssh. What an argument. Please refrain from such useless rhetorics.

 But the keyserver (owner) has to be trustworthy anyway.

First of all, trustworthy is a really ill-defined notion. Should I
give them my credit card? Secondly: why? Why does a keyserver need to be
trustworthy?

In fact, why do I even need a keyserver? It's a convenience. But I can
just exchange keys with my peers. I don't need to trust any keyserver
operator. Unless it is silently done behind my back, that is.

Here's an idea: when elliptic curve becomes ubiquitous, simply include
your public key in the header of every e-mail you send. That's way
closer to how SSH works, since it uses only one channel, in this case
the e-mails themselves. Perhaps it would be a good idea to only include
the actual EC public key, and not the whole OpenPGP packet, to keep it
small.

You say signing isn't covered... I don't see why not. Just as you
automatically decrypt; automatically sign.

There still is the large issue of private key distribution. I have
several machines all connected to my e-mail account. It seems to me
there's a *lot* of infrastructure still missing for this to be almost
transparent to the end-user. This topic, if discussed at all, should be
discussed by itself and not as some kind of counter-offer to symmetric
encryption, because the problem space is vastly different.

By the way: if we had a working alternative to SSL/TLS, all the mail
servers could talk to eachother securely without eavesdropping. That way
the contents of e-mails is only exposed on the sending SMTP server and
the receiving SMTP and mailbox servers (f.e., IMAP). The mailbox server
already knows when you use automatic decryption to facilitate searching,
and the receiving SMTP server is probably under the control of the same
people that control the receiving mailbox server. So they are probably
about equally difficult to access. And likewise, the sender will have a
decrypted copy in his Sent folder on his mailbox server, and the sending
SMTP server is again close to that server. So if only we had a way to
properly authenticate SMTP servers, I think we get almost the same
effective protection for the users, albeit without signatures. And this
requires only changes to a couple of servers, instead of to all endpoints.

HTH,

Peter.

-- 
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://digitalbrains.com/2012/openpgp-key-peter

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: [Enigmail] [ANN] Enigmail v1.7 available

2014-07-19 Thread John Clizbe
As there are many Enigmail users who read this list, but not [Enigmail], I'm
forwarding the announcement of the newest release of Enigmail, v1.7.
There are quite a few changes in this release.

As Patrick writes in the announcement:
 As usually, it will take up to two weeks until the version will be
 available from addons.mozilla.org.

Until then, Enigmail 1.7 may be obtained two ways:

1) From https://addons.mozilla.org/en-US/thunderbird/addon/enigmail/

Until the AMO staff finish their review, new versions will be available only
from Version History list ('View other versions' link below-right from the
Download button).

2) Visit the Enigmail project's download page and download from there.
https://www.enigmail.net/download/

Debian/Ubuntu users will need to wait until Enigmail 1.7 has been packaged for
your use.

There will no doubt be support questions. The BEST, and recommended, place to
address them is the Enigmail mailing list:
 enigmail-users mailing list
 enigmail-us...@enigmail.net
 To unsubscribe or make changes to your subscription click here:
 https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net

The list is moderated to reduce SPAM. Subscribe if you do not with to wait in
the moderation queue



 Forwarded Message 
Subject: [Enigmail] [ANN] Enigmail v1.7 available
Date: Sat, 12 Jul 2014 18:20:56 +0200
From: Patrick Brunschwig patr...@enigmail.net
Reply-To: Enigmail user discussion list enigmail-us...@enigmail.net
To: Enigmail user discussion list enigmail-us...@enigmail.net

I'm happy to announce the availability of Enigmail v1.7 for
Thunderbird 24 - 31, and SeaMonkey 2.20 and newer.

This version brings many new features (special thanks to Nico
Josuttis!) plus a lot bug fixes. Furthermore, this version ensures
compatibility with the upcoming releases of Thunderbird and SeaMonkey.


Notable Changes
===

* New convenience mode for sending mails
* Automatic encryption if all keys are known
* More intuitive view of encryption/signing states in icons and menus
* Possibility to filter in the key selection dialog
* Better selection options for importing keys from address book
* Menu items and labels were changed from OpenPGP to Enigmail
* Better algorithm for selecting best key for an email address
* More fine-grained options for displaying dialog before message sending
* Better fault tolerance at many places
* Some support for PGP/MIME mails deformed by Exchange servers

Obtaining Enigmail
==
Enigmail can be downloaded from
https://www.enigmail.net/download/index.php
The changelog is available from
https://www.enigmail.net/download/changelog.php


As usually, it will take up to two weeks until the version will be
available from addons.mozilla.org.

-Patrick

___
enigmail-users mailing list
enigmail-us...@enigmail.net
To unsubscribe or make changes to your subscription click here:
https://admin.hostpoint.ch/mailman/listinfo/enigmail-users_enigmail.net


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Friday 18 July 2014 at 8:23:08 PM, in
mid:20140718192308.47a05a0...@smtp.hushmail.com, ved...@nym.hush.com
wrote:


 The only annoyance with this type of approach, is that
 it needs a separate passphrase for each correspondent,

How? Running gpg --symmetric test.txt only gives me the opportunity
to enter one passphrase for the encryption.



 Hushmail has a one-way variant of this approach.

[snipped]

 The receiver gets a message that an encrypted e-mail
 has been sent, and is directed to the Hushmail server
 where the sender's question is asked, and the receiver
 has 3 chances to provide the correct answer.  A correct
 answer decrypts the symmetrically encrypted e-mail and
 the plaintext is displayed on the Hushmail server. The
 e-mail is removed from the server after 72 hours.

It is a good idea to tell the recipient in advance. Otherwise they
just see yet another unsolicited email suggesting to follow a link or
visit an unfamiliar website.


- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Don't cry because it is over - smile because it happened
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPKgS5XFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pXkgD/j3s56ApdFNwcjFY3SREkocyGxXGDtONA8Z4
nYeO60nOP3w95+p9t49aBfKxNTjoaix3MwlAzSbvtr8JU+0ZoiAZ6Kmlg88eLYYm
Zbt2eQqIpqwPhZjBCe9p2ZyTKW5gBnVSbYIZpB7Wj5fle+RoRpJHMMogjmhakdlc
YGmDRaVH
=8lgV
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Saturday 19 July 2014 at 4:41:10 AM, in
mid:53c9e8d6.4010...@riseup.net, Mirimir wrote:


 I just emailed that to myself using Thunderbird +
 Enigmail in Ubuntu. I was prompted for a password, and
 foo decrypted the symmetrically encrypted block.

I did a similar thing and my email program prompted me to Input
OpenPGP key passphrase for unknown recipient. Mine decrypted OK, as
well. If I encrypt it to my key as well as to a passphrase, it does
not list unknown recipient among the passphrase entry options, but
does encrypt with the test passphrase as well as with my key.

As an aside, the gui frontend I use for key management has a current
window or clipboard encrypt function, which allows to add
symmetrical by ticking a box (and prompting to enter the passphrase
twice).

- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

She looked like butter wouldn't melt in her mouth - or anywhere else.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPKht5XFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pR+oD/jOiZ9BXJ8AuOrFkVU90FU+OaXAcr3Oq5lwv
ThRMsX7YqXGntJ4etopopt90yPc93iDLpIJJpFjtS4uYbdEN4IozyJQiBUeeERHL
70ziw6aOpo78XykP6TuplNxpZ+1DlAP1LsAN8iXs1ei5Zne/I3dmcKNbqLzhbvtL
hfypitfs
=C7J1
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Friday 18 July 2014 at 11:34:19 PM, in
mid:1460534.5jfkcsu...@thufir.ingo-kloecker.de, Ingo Klöcker wrote:


 Sure. But the NSA already knows the correspondents of
 all of our mail  anyway. Keyserver lookups do not add
 any additional data (except of the information that you
 are trying to look up a key resp. that you are  talking
 to a keyserver).


Time of use is a big piece of information that a keyserver lookup
could add. And, maybe, IP address, operating system, software...



 Good point. Automatic decryption should be possible for
 those that want it. My scheme is mostly meant as
 in-transit encryption which again is  way better than
 our current status quo.

And the choice whether to store their emails encrypted or decrypted.
Storing decrypted could be an issue, especially if the emails are
stored on a server rather than the user's machine.


 Peter Lebbing wrote:
 An e-mail system with a default big usability issue
 will get swapped out for a more pleasant to use one.

It might, but Outlook is in widespread use despite major usability
issues.


 Peter Lebbing wrote:
 Finally, I think people might take issue with their
 e-mail address automatically being posted to a public
 keyserver.

A certain minority would take exception to this, including myself. It
is less of a problem for me with the automatic upload of just a single
email address per key and no name/identity information.



 How exactly does one harvest email addresses from the
 keyservers? Can I ask keyservers to give me all keys it
 has in storage? Or do I need to  search for keys
 matching a certain substring? I honestly don't know.
 Anyway, if this really becomes a problem than key
 lookup probably needs to be made as inconvenient as
 trying to send email probes to randomly  generated
 email addresses.

Isn't key lookup already more inconvenient than randomly generating
email addresses? Or have I missed something?



 For my scheme to work the keyservers would only need to
 return keys  where the email address part of a uid
 exactly matches the recipient's  email address.

The email address could be hashed in the key UID that's automatically
uploaded...



 Moreover, for my scheme to work no key certification is
 necessary, i.e. crawling from one key to the next via
 certification  signatures wouldn't be possible.

Some people have specific use cases where key certification is needed.
But most email communication doesn't have a way of being sure who
controls the address.



 The scheme has more issues: For example, there's no
 message integrity  protection (via signing) whatsoever.

There's no reason not to have it.




- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

Live your life as though every day it was your last.
-BEGIN PGP SIGNATURE-

iPQEAQEKAF4FAlPKlAZXFIAALgAgaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl
bnBncC5maWZ0aGhvcnNlbWFuLm5ldEJBMjM5QjQ2ODFGMUVGOTUxOEU2QkQ0NjQ0
N0VDQTAzAAoJEKipC46tDG5pFTIEAJ1acb0+CvHLkAuCtqnTed1L6v8xsvbvbNXz
TS8oaZ7cCzBo9PK3nllDl1AM/qw4tpopLpwNH5H3ByjrzrPZjyonV8bSZoyFffwd
U+hhSeaPEFI5Ox5pAdtnb3Mu0troNatcnKAdbgdykMlwsyEy0ez48qWeudlRy0Nr
xiBR99za
=wmKi
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread Robert J. Hansen
 A factor of two is immense to you...?

Yes.  A secret that only I know I can keep; a secret known to two people
can only be kept for a while.  Yes, that's an immense difference.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread Ingo Klöcker
On Saturday 19 July 2014 03:46:56 Hauke Laging wrote:
 I guess this discussion does not go well because of a misunderstanding
 or wrong expectations.
 
 
 You and Ingo are talking about real crypto issues.

Actually, concerning your proposal, I'm more talking about usability. To 
encrypt a message using your proposal the sender needs to
* write the message,
* tell his mail client that he wants to encrypt the message,
* come up with and enter the password that should be used for encrypting 
the message, (- minor inconvenience)
* tell the recipient the password, (- major inconvenience)
* and, finally, send the message.

That's three more steps than for sending an unencrypted message. And for 
one of those steps a completely different communication channel needs to 
be used. This is so inconvenient that I cannot see this helping our 
cause.


Regards,
Ingo


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Automatic e-mail encryption

2014-07-19 Thread Ingo Klöcker
Hi Peter,

please do not send me direct replies. I am subscribed so reply-to-list 
is sufficient. (I wouldn't ask this of you if I'd receive two copies of 
your replies, but I only receive the direct replies and this means I 
cannot use reply-to-list. The mailing list is correctly configured, so I 
blame a fancy deduplication feature of the receiving Exchange mail 
server.)


On Saturday 19 July 2014 14:26:44 Peter Lebbing wrote:
 Here's an idea: when elliptic curve becomes ubiquitous, simply include
 your public key in the header of every e-mail you send. That's way
 closer to how SSH works, since it uses only one channel, in this case
 the e-mails themselves. Perhaps it would be a good idea to only
 include the actual EC public key, and not the whole OpenPGP packet,
 to keep it small.

I like this idea.


 You say signing isn't covered... I don't see why not. Just as you
 automatically decrypt; automatically sign.

It doesn't feel right to automatically sign messages with automatically 
created keys. Also, signing is irrelevant for my use case: end-to-end 
encryption.


 There still is the large issue of private key distribution. I have
 several machines all connected to my e-mail account. It seems to me
 there's a *lot* of infrastructure still missing for this to be almost
 transparent to the end-user.

Yeah. Usage of multiple machines/devices is an unsolved problem.


 This topic, if discussed at all, should
 be discussed by itself and not as some kind of counter-offer to
 symmetric encryption, because the problem space is vastly different.

Right. I guess I simply grabbed the opportunity.


 By the way: if we had a working alternative to SSL/TLS, all the mail
 servers could talk to eachother securely without eavesdropping. That
 way the contents of e-mails is only exposed on the sending SMTP
 server and the receiving SMTP and mailbox servers (f.e., IMAP). The
 mailbox server already knows when you use automatic decryption to
 facilitate searching,

unless the decrypted messages are only stored locally. Yes, this would 
break server-side searching and is problematic on devices with limited 
storage capacity.


 and the receiving SMTP server is probably under
 the control of the same people that control the receiving mailbox
 server. So they are probably about equally difficult to access. And
 likewise, the sender will have a decrypted copy in his Sent folder on
 his mailbox server,

unless ...


 and the sending SMTP server is again close to
 that server. So if only we had a way to properly authenticate SMTP
 servers, I think we get almost the same effective protection for the
 users, albeit without signatures. And this requires only changes to a
 couple of servers, instead of to all endpoints.

Good news: I think we do have such a way. It's called DANE (DNS-based 
Authentication of Named Entities) [1].

Support for DANE has been added to Postfix a few months ago and a few 
German mail providers recently started using it.


Regards,
Ingo


[1] https://tools.ietf.org/html/rfc6698


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread Ingo Klöcker
On Saturday 19 July 2014 04:37:56 Hauke Laging wrote:
 Am Sa 19.07.2014, 01:42:19 schrieb Ingo Klöcker:
  Since you are also using KMail I invite
  you to test whether KMail is able to decrypt symmetrically encrypted
  OpenPGP/MIME messages out-of-the-box. It might just work, but I'm
  too
  lazy and too tired to test this right now.
 
 It does work. It seems not to work with Thunderbird/Enigmail though.
 But maybe I have done something wrong. The Enigmail console output
 looks good to me...
 
 I have prepared a mail file for those who want to give this a try:
 
 http://www.crypto-fuer-alle.de/docs/mail-symmetric/mail.cr-lf.eml

Thanks for testing (also to Mirimir and MFPA).


  And what's your threat model, i.e. what do you want to achieve by
  your symmetric email encryption scheme?

 Same answer: This is for users who don't need any threat model 
 consideration.

Huh? Why would those users want to encrypt a message if they don't have 
a threat in mind?


I'm not replying to anything else because I think I have nothing more to 
add.


Regards,
Ingo


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread Hauke Laging
Am Sa 19.07.2014, 22:37:24 schrieb Ingo Klöcker:

   And what's your threat model, i.e. what do you want to achieve by
   your symmetric email encryption scheme?
  
  Same answer: This is for users who don't need any threat model
  consideration.
 
 Huh? Why would those users want to encrypt a message if they don't
 have a threat in mind?

I guess the typical case would be that either the sender or the 
recipient wants the communication encrypted (probably uses real crypto 
himself) and would use symmetric encryption as the fastest and easiest 
way to enable the other one to do that (or the only way the other party 
accepts at that moment).

Furthermore: Usually when people start using a new tool or new 
technology they don't use it right. Probably at least 90% of the OpenPGP 
users use OpenPGP in a way I would not consider good. They do it because 
it's OK for them. They probably haven't put much consideration into that 
– as you have to know a lot about the area to make these considerations. 
Noone cares about that with normal crypto. Why should this be a hard 
criterion in this case?

I haven't seen the new Enigmail 1.7 yet but the default settings of 1.6 
are a nightmare. GPGTools takes worst practice to a new level by doing 
the same like Enigmail – but without the (easy to find?) option to 
change it. And even more showing off on the bad side: Certifying keys 
*without* showing the fingerprint! GnuPG doesn't tell you at which 
(maximum) level a certain key has been signed. There is no transparency 
in authenticity, no transparency in key security (part of that: no 
transparency about PC security, see (German) 
http://www.crypto-fuer-alle.de/wishlist/securitylevel/), no trancparency in key 
usage, the 
current WoT is crap because it offers nearly none of the information you 
need... That is the current crypto reality. And people are talking about 
security problems and thread models for symmetric encryption, fighting 
for good crypto usage? Really?


Hauke
-- 
Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread Robert J. Hansen
 I guess the typical case would be that either the sender or the 
 recipient wants the communication encrypted (probably uses real crypto 
 himself) and would use symmetric encryption as the fastest and easiest 
 way to enable the other one to do that (or the only way the other party 
 accepts at that moment).

When technically savvy people make guesses about the typical use case,
we are usually wrong on levels we don't even imagine.  This is why real
usability studies with real users are essential.

At any rate, no one is telling you that you can't do this.  All you've
heard is that you've not convinced other people to implement it for you.
 The GnuPG and Enigmail sources are both freely available: start
hacking.  If you're right and people start using this in droves, I'll
cheerfully be the first one to admit I was wrong.

With this, I'm out of this thread.  :)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: symmetric email encryption

2014-07-19 Thread Bob Holtzman
On Sat, Jul 19, 2014 at 01:55:45PM -0400, Robert J. Hansen wrote:
  A factor of two is immense to you...?
 
 Yes.  A secret that only I know I can keep; a secret known to two people
 can only be kept for a while.  Yes, that's an immense difference.

Old Hell's Angels saying, 3 people can keep a secret if two of them are
dead. Not a very sophisticated bunch but..

 
 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

-- 
Bob Holtzman
A man is a man who will fight with a sword
or tackle Mt Everest in snow, but the bravest 
of all owns a '34 Ford and tries for 6000 in low.


signature.asc
Description: Digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: [Enigmail] [ANN] Enigmail v1.7 available

2014-07-19 Thread Daniel Kahn Gillmor
On 07/19/2014 09:29 AM, John Clizbe wrote:
 Debian/Ubuntu users will need to wait until Enigmail 1.7 has been packaged for
 your use.

Enigmail 1.7 is already packaged and present in debian unstable and
debian testing.

I'll look into backporting it to debian stable later this week.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users