Re: One Key, multiple Smartcards not working anymore

2015-07-30 Thread Josef Schneider
Hello,

Thank you for the fast reply and the solution.
I can confirm, that this works. Also I switched to GPG 2.1 on my
notebook (also Windows) and the bug doesn't exist in that version.

Best regards,
Josef

On 29.07.2015, 06:02 NIIBE Yutaka wrote:
 Hello,

 I forgot to address some way to recover.

 On 07/28/2015 04:09 AM, Josef Schneider wrote:
 I insert the other card and do a card-status:
 [...]
 General key info..: pub  2048R/988E7DDD 2015-07-07 Josef Schneider
 jo...@schneider.wf
 sec  4096R/9BE45ED0  erzeugt: 2012-12-10  verfällt: 2017-04-13
   Kartennummer:0005 
 ssb  4096R/B641DD11  erzeugt: 2012-12-10  verfällt: niemals
   Kartennummer:0005 
 ssb  4096R/CA02F8EA  erzeugt: 2012-12-10  verfällt: niemals
   Kartennummer:0005 
 ssb#  2048R/988E7DDD  erzeugt: 2015-07-07  verfällt: 2017-07-06
 ssb#  2048R/03E021FE  erzeugt: 2015-07-07  verfällt: 2017-07-06
 ssb#  2048R/8B406748  erzeugt: 2015-07-07  verfällt: 2017-10-24
 In this situation, you have a stub for RSA 4096-bit keys.

 4096R/9BE45ED0 - Kartennummer:0005 
 4096R/B641DD11 - Kartennummer:0005 
 4096R/CA02F8EA - Kartennummer:0005 

 With GnuPG 2.0, you can export stub (it's not possible for GnuPG 2.1).

 $ gpg -a -o 9BE45ED0-stub.asc --export-secret-keys 9BE45ED0
 $ gpg -a -o B641DD11-stub.asc --export-secret-subkeys B641DD11
 $ gpg -a -o CA02F8EA-stub.asc --export-secret-subkeys CA02F8EA

 Then,

 General key info..: pub  2048R/988E7DDD 2015-07-07 Josef Schneider
 jo...@schneider.wf
 sec#  4096R/9BE45ED0  erzeugt: 2012-12-10  verfällt: 2017-04-13
 ssb#  4096R/B641DD11  erzeugt: 2012-12-10  verfällt: niemals
 ssb#  4096R/CA02F8EA  erzeugt: 2012-12-10  verfällt: niemals
 ssb  2048R/988E7DDD  erzeugt: 2015-07-07  verfällt: 2017-07-06
   Kartennummer:0006 
 ssb  2048R/03E021FE  erzeugt: 2015-07-07  verfällt: 2017-07-06
   Kartennummer:0006 
 ssb  2048R/8B406748  erzeugt: 2015-07-07  verfällt: 2017-10-24
   Kartennummer:0006 
 When you have this configuration ('#' means no secret key),
 import *-stub.asc by gpg --import.




signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


One Key, multiple Smartcards not working anymore

2015-07-27 Thread Josef Schneider
Hello,

I have a problem with my Key. I have a 4096bit RSA key since 2012 and it
is stored on a OpenPGP smartcard.
Recently I added three new 2048bit subkeys, because I bought a Yubikey
NEO device and want to use PGP on my phone/tablet with Android and NFC.
This worked as expected. I created the new subkeys on my PC, saved a
backup and then moved them to the card.
PGP showed me correctly that the first three keys are on card 1 and the
second three are on card 2. If the wrong card was inserted, it asked me
to insert the correct one.

I then wanted to create one key backup with all six private keys to
print using PaperBack and store in a safe place. I was able to merge all
the private keys with gpgsplit and moving/renaming files and created
that backup.

After that, I deleted the whole key, got my public key from the
keyservers and tried to use it with the card (after gpg2 --card-status).
Here is now my problem:
GPG adds the key stub for the smartcard keys only for the first card! If
I delete the key, import, use card-status, then I can usse the three
keys from that smartcard. If I insert the second smartcard and do a
card-status, nothing changes!

If I import the full key with all private keys, I can then replace the
keys on the card and move all keys to smartcards. Then I get a key
working with both smartcards again. But of course I don't want to touch
the key backup. It's printed on paper and stored in a safe location for
a reason.

Am I doing something wrong, or is that a bug?

Here are some gpg outputs:

At the moment, I have it here on my notebook working with the 4096bit keys:
sec  4096R/9BE45ED0 2012-12-10 [verfällt: 2017-04-13]
  Kartenseriennr. = 0005 
uid  Josef Schneider jo...@netpage.dk
uid  Josef Schneider jo...@schneider.wf
ssb  4096R/B641DD11 2012-12-10
ssb  4096R/CA02F8EA 2012-12-10
ssb#  2048R/988E7DDD 2015-07-07
ssb#  2048R/03E021FE 2015-07-07
ssb#  2048R/8B406748 2015-07-07

I insert the other card and do a card-status:

C:\Users\Josef Schneidergpg --card-status
Application ID ...: DXXX
Version ..: 2.0
Manufacturer .: Yubico
Serial number : 
Name of cardholder: Josef Schneider
Language prefs ...: de
Sex ..: männlich
URL of public key : https://j0s.at/gpg.asc
Login data ...: [nicht gesetzt]
Signature PIN : zwingend
Key attributes ...: 2048R 2048R 2048R
Max. PIN lengths .: 127 127 127
PIN retry counter : 3 3 3
Signature counter : 39
Signature key : 50FD 3663 AB67 A8FD 64BD  C208 1272 58BE 988E 7DDD
  created : 2015-07-07 11:34:08
Encryption key: 88FA 7314 795F 5F19 F258  3B70 E18B C1D9 03E0 21FE
  created : 2015-07-07 11:38:08
Authentication key: E0E5 13F9 AA97 8C8E 1BF5  27FB B6BF D0F7 8B40 6748
  created : 2015-07-07 20:15:08
General key info..: pub  2048R/988E7DDD 2015-07-07 Josef Schneider
jo...@schneider.wf
sec  4096R/9BE45ED0  erzeugt: 2012-12-10  verfällt: 2017-04-13
  Kartennummer:0005 
ssb  4096R/B641DD11  erzeugt: 2012-12-10  verfällt: niemals
  Kartennummer:0005 
ssb  4096R/CA02F8EA  erzeugt: 2012-12-10  verfällt: niemals
  Kartennummer:0005 
ssb#  2048R/988E7DDD  erzeugt: 2015-07-07  verfällt: 2017-07-06
ssb#  2048R/03E021FE  erzeugt: 2015-07-07  verfällt: 2017-07-06
ssb#  2048R/8B406748  erzeugt: 2015-07-07  verfällt: 2017-10-24


I can't use this key.
After deleting it and import https://j0s.at/gpg.asc :
C:\Users\Josef Schneidergpg --card-status
Application ID ...: DXXX
Version ..: 2.0
Manufacturer .: Yubico
Serial number : 
Name of cardholder: Josef Schneider
Language prefs ...: de
Sex ..: männlich
URL of public key : https://j0s.at/gpg.asc
Login data ...: [nicht gesetzt]
Signature PIN : zwingend
Key attributes ...: 2048R 2048R 2048R
Max. PIN lengths .: 127 127 127
PIN retry counter : 3 3 3
Signature counter : 40
Signature key : 50FD 3663 AB67 A8FD 64BD  C208 1272 58BE 988E 7DDD
  created : 2015-07-07 11:34:08
Encryption key: 88FA 7314 795F 5F19 F258  3B70 E18B C1D9 03E0 21FE
  created : 2015-07-07 11:38:08
Authentication key: E0E5 13F9 AA97 8C8E 1BF5  27FB B6BF D0F7 8B40 6748
  created : 2015-07-07 20:15:08
General key info..: pub  2048R/988E7DDD 2015-07-07 Josef Schneider
jo...@schneider.wf
sec#  4096R/9BE45ED0  erzeugt: 2012-12-10  verfällt: 2017-04-13
ssb#  4096R/B641DD11  erzeugt: 2012-12-10  verfällt: niemals
ssb#  4096R/CA02F8EA  erzeugt: 2012-12-10  verfällt: niemals
ssb  2048R/988E7DDD  erzeugt: 2015-07-07  verfällt: 2017-07-06
  Kartennummer:0006 
ssb  2048R/03E021FE  erzeugt: 2015-07-07  verfällt: 2017-07-06
  Kartennummer:0006 
ssb  2048R/8B406748  erzeugt: 2015-07-07  verfällt: 2017-10-24
  Kartennummer:0006 

I can use the 2048bit keys

Re: a bit OT: pgpdump binaries?

2014-05-09 Thread Josef Schneider
Hi,

something strange happened in my mail client so the signature of the
last message was invalid!
Here is the same message correctly signed:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,
 
compilation is straightforward, if msys and mingw is installed!
pgpdump.c is missing a #include getopt.h, after adding that
just  a
./configure and make to compile it!
I compiled a 64 and a 32 bit version for you! The files are
digitally
signed using the Microsoft Authenticode stuff.
The SHA-512 hashes of the files are:
pgpdump64.exe:
80F749B4893507502BE0418D022D4ECBE0018BE8F4DDF4B9ECC8C031962965CF
69C3FF5B83553819E3658C17B40E08A2CD536DD8229FCA2EA23DF0F205FEB364

pgpdump.exe:
771572FB6A1B078EF3E2A4E7EBEE3A2E8BA8817099F4B3DF1FA09E1CBECF174C
FDD3138E610A6D62087038AABBBAC6E019A1DE55C8BAE9D3D8253EAC700EB799

You can get them here:  http://dl.j0s.eu/pgpdump.zip
 
The files are statically linked to winpthreads, so make sure to
read the
included license.
 
Best regards,
Josef
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (MingW32) - GPGshell v3.78

iQIcBAEBAgAGBQJTbJL+AAoJEDFA6HOb5F7Qu7kP/2qqYck7X83/YupDA+xgEg5P
JyHdWUq2vQRXIvDjfqdO0n4e0KxS+cpEx3CitT+X5I666P2ZS+4GVBj4fBKgzA6C
qAdzmDIMhqkAat3cdOGDiC7ESSChN711p+90imxQXDoeP95Fg33Gn3HLLzziMtet
1ePO7BVRN1QuWrOPYjp9j1R6LCgfVzoX2YB85ZxD56VlEwokFLql1hmSwsAskpWP
j3wXhTpuaBFox6eVWeMunmVXIsDrfBYtY9/GbITvMGkfCCy8jH8N1SA3rwpjkd9B
nnXE1Y/m/ytufxDvtLdP10fP85grgilWKQDLPBspYkwGYpB3kpt4NLGbCWnomfRl
YGoLowZP90ud5cyUBRkXwmaxuPUGyhE+m8WnV6LouM+CnyNpnhNlTaqjeEVOgxkW
763dY+0pSitp9CVslHpMIVbFexvF7OHlBdBeydONBff8TRAuw+baGAlmejLsXKq/
sRfa29QP5reIsR1jNMnPOxEeWnnbLOmjgmezYgz6gxwtxX3M2Nnw0kYJRCL7CSwa
E+Lb1ZWdAteKp6INAxJGDy7SWRaxxEV57C6dTznk5IieB4O/1Sncfs72wmhjXPa7
HUEyw3zXTknJPGJwPGrEkGWnGgfGaUSWUSsk+tKE3DLMcDkEiTIpyXRdsTDDSf/A
StGLWwMt2ur4VlryzZvl
=StYd
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: a bit OT: pgpdump binaries?

2014-05-09 Thread Josef Schneider

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Hi,
 
compilation is straightforward, if msys and mingw is installed!
pgpdump.c is missing a #include getopt.h, after adding that just  a
./configure and make to compile it!
I compiled a 64 and a 32 bit version for you! The files are digitally
signed using the Microsoft Authenticode stuff.
The SHA-512 hashes of the files are:
pgpdump64.exe:
80F749B4893507502BE0418D022D4ECBE0018BE8F4DDF4B9ECC8C031962965CF69C3FF5B83553819E3658C17B40E08A2CD536DD8229FCA2EA23DF0F205FEB364

pgpdump.exe:
771572FB6A1B078EF3E2A4E7EBEE3A2E8BA8817099F4B3DF1FA09E1CBECF174CFDD3138E610A6D62087038AABBBAC6E019A1DE55C8BAE9D3D8253EAC700EB799

You can get them here:  http://dl.j0s.eu/pgpdump.zip
 
The files are statically linked to winpthreads, so make sure to read the
included license.
 
Best regards,
Josef
 
 Ben McGinnes
 Freitag, 9. Mai 2014 07:09

 I don't know about a Windows binary, but it appears that someone has
 ported it to Python, so if you have that language installed you might
 be able to get it to do what you want.

 https://pypi.python.org/pypi/pgpdump/1.5

 I haven't played with it (yet, I suspect that will change in the not
 too distant future) because I normally use the C version (and compile
 the source, but I only have Linux and OS X systems here so I can't
 roll you one unfortunately). That said, it doesn't look to be too
 large, you might be able to find someone who can compile a Windows
 binary for you here or maybe even on PGPNET. I'd do it for you, but I
 haven't had a Windows system for 15 years.


 Regards,
 Ben

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
 Faramir
 Freitag, 9. Mai 2014 05:00
 Hello,
 I hope this is not much off-topic. I was looking for pgpdump
 binaries, and the one I have is for version 0.20, I downloaded it on
 september 2011. But in the website, the current version is 0.28, from
 june 2013. Does somebody know where I can get a binary file for
 windows? Maybe one day I'll learn to compile stuff, but for now I'd
 rather use a binary.

 Best Regards

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 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=BK2B
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Any future for the Crypto Stick?

2013-12-01 Thread Josef Schneider
Einar Ryeng schrieb:

 Hi.

 The GPF Crypto Stick has been unavailable for months now, and I
 wondered if
 anyone here has information on its future.




 Any news on the crypto stick (or similar initiatives) would be
 appreciated.


I just use a OpenPGP Card in a small gemalto stick reader. AFAIK in the
Crypto stick they just soldered a OpenPGP card in, so it is basically
the same!


smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Question about a perfect private Key store for today's environment

2013-09-23 Thread Josef Schneider
On Mon, Sep 23, 2013 at 7:28 AM, Heinz Diehl h...@fritha.org wrote:

 Generally, I think you can't have it all. Can't imagine how long it
 will take to encrypt/decrypt a mail on a smartphone using the 4k key
 which I have on my smartcard..

The cheapest phones you can get here have at least 800Mhz ARMv6 CPUs!
My current one has a Quad-Core 4x1,5Ghz ARMv7.

I don't think that will be any problem!
On slow phones maybe you have to wait a few seconds, but you probably
won't send that many mails on your phone that it matters.

Best regards,
Josef

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-18 Thread Josef Schneider
On Wed, Sep 18, 2013 at 9:06 AM, Werner Koch w...@gnupg.org wrote:

 The standard already allows for all kind of curses.  They are specified
 by an OID and I offered DJB to assign OIDs from the GnuPG arc.  The
 original reason why I wanted an OID based design is so that it will be
 possible to use Brainpool curves which are preferred by some European
 institutions.  I rejected the idea to make them the default in GnuPG to
 support better interoperability but also told people that we change the
 default as soon as we see people are using other curves.  Meanwhile I
 don't think that we need a pool to settle on a different default.

Is there a way to say someone should under no circumstances send a
message to me that is encrypted with a NIST curve?
Even if that means, that he can't find a encryption for the message?

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: The symmetric ciphers

2013-09-10 Thread Josef Schneider
On Tue, Sep 10, 2013 at 3:30 PM, Robert J. Hansen r...@sixdemonbag.orgwrote:

  Assuming it takes effort a to break cipher A and effort b to break
  cipher b, this should result in effort at least max(a, b) needed to
  break A+B.

 Basically, though, it's this is a naive and unfounded assumption.


 Why? Assuming the Keys are not related (e.g. by creating random keys and
then encrypting them both with RSA) this is safer, assuming the attacker
can crack one of the two symmetric ciphers but not RSA.
If you use the same/related Keys for both encryptions and/or the ciphers
don't interact somehow (like when using ROT-13 two times) it is indeed less
secure!
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Recommended key size for life long key

2013-09-01 Thread Josef Schneider
I just use 4096 bit because that is the biggest size my OpenPGP Cards can
handle.  In my opinion using a smart card instead of online keys increase
security far more than strange large key sizes!
I also see no point using less than 4096 because modern hardware is fast
enough. Maybe my keys last longer that way.
Am 01.09.2013 02:43 schrieb Robert J. Hansen r...@sixdemonbag.org:

 On 08/31/2013 05:46 AM, Ole Tange wrote:
  The FAQ
 http://www.gnupg.org/faq/GnuPG-FAQ.html#what-is-the-recommended-key-size
  recommends a key size of 1024 bits.
 
  Reading http://www.keylength.com/en/4/ I am puzzled why GnuPG
 recommends that.

 It shouldn't; NIST recommends 2048 bits for 20 years of security.

 NIST notably makes no recommendations past 20 years, as they are deeply
 skeptical of their ability to forecast out that far.  I suspect your
 ability is no greater than theirs is, so I'd be very careful about
 declaring a 10K key to be greater than your natural lifespan.

 Per NIST, a 2048-bit key is of comparable difficulty to breaking 3DES.
 Given the tremendous level of confidence people have in the long-term
 suitability of 3DES, I am convinced a 2048-bit key will outlast my
 ability to remember the passphrase to it.

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Why trust gpg4win?

2013-08-25 Thread Josef Schneider
On Sun, Aug 25, 2013 at 2:33 PM, Jan takethe...@gmx.de wrote:

 Can you recommend such an operating system? Your idea seems practicable and
 convenient to me.
 Would users have to refrain from flash videos?

I would suggest OpenBSD for that. If BSD is to exotic, then Debian Stable.
Flas is known to have more security holes than one can count, so I
would stay very far away from it!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG detection on Windows?

2013-07-18 Thread Josef Schneider
On Thu, Jul 18, 2013 at 10:23 PM, Henry Hertz Hobbit
hhhob...@securemecca.net wrote:
 You probably just want to test whether either of these files
 are there since them or one of the others is what you are using:

 %ProgramFiles%\GNU\GnuPG\pub\gpg.exe
 %ProgramFiles%\GNU\GnuPG\pub\gpg2.exe

Protip: you can change the install location!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Aw: Re: GpgEX for 64 bit Windows test version

2013-07-15 Thread Josef Schneider
I have the same problem on my german 64bit Windows 8 with Version 2.2.0-beta31

Mit freundlichen Grüßen,
Josef Schneider


On Mon, Jul 15, 2013 at 3:02 PM, Werner Koch w...@gnupg.org wrote:
 On Fri, 12 Jul 2013 09:46, fisch@gmx.de said:

 good point and thanks for this hint. Will try to use the
 gpg4win-light-2.1.2-beta20.exe and let you know when i still have this

 Actually there is a bug I am currently fixing.  We will release a new
 beta in a few hours.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Gpg4win-devel] GpgEX for 64 bit Windows test version

2013-06-25 Thread Josef Schneider
On Mon, Jun 24, 2013 at 6:14 PM, Werner Koch w...@gnupg.org wrote:

 I need to check how to access the default browser.  It uses the class ID
 of InternetExplorer.Application to lookup IWebBrowser2.

Usually just with ShellExecute and Windows figures out the details!
http://support.microsoft.com/kb/224816/en-us

Best regards,
Josef Schneider

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GpgEX for 64 bit Windows test version

2013-06-25 Thread Josef Schneider
On Tue, Jun 25, 2013 at 9:50 AM, Werner Koch w...@gnupg.org wrote:
 On Mon, 24 Jun 2013 20:18, old...@oldbob.co.uk said:
 As I can't run the 32 bit version of GPGex anyway on this system, can I
 not just overwrite the existing copy of gpgex.dll with the 64 bit one
 and reboot?

 Yes, you can.  The regsvr32 call is still required.

But if you do this, the extension won't be available in 32bit
processes! (32bit explorer.exe, file selection dialogues in 32bit
programs, 32bit file managers...)

Best regards,
Josef Schneider

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How do I make the private key on a OpenPGP smartcard non exportable ?

2013-06-24 Thread Josef Schneider
On Mon, Jun 24, 2013 at 2:54 PM, NdK ndk.cla...@gmail.com wrote:

 Il 24/06/2013 10:15, Werner Koch ha scritto:

  A smartcard could be useful anyway, at least as a portable keyring
  (if it didn't need initialization on every machine...).
  A USB memory stick fulfills the same purpose.
 Not really secure...


Not any less secure than a Smartcard that allows key export!



  In any case it is a really complex task and not easy to get
  right - if at all.
 The card hosts public key of a export-authorizing CA (well, it's not a
 real CA, since it doesn't do certificates at all... but call it that way
 for clarity).
 When I send to the card an export command w/ a public key signed
 encrypted by the CA's private key, the card answers with the private key
 encrypted under the signed public key (thinking about requiring a
 signature w/ private key of the requesting card).
 Plain old RSA, layered.


Then you need a secure way to store the CA key. That is essentially
exactly the same problem!
I mean you can put it on a card and allow export of the CA key only if
the request is signed by a SuperSecureCA key...
But how do you control the export of the SuperSecureCA key?
If you want a key backup, why not just create the key on a secure
offline machine, copy it to a secure location (I print mine out using
PaperBak) and then move it to the card on that secure offline machine?
Works great!

Best regards,
Josef

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Gpg4win-devel] GpgEX for 64 bit Windows test version

2013-06-24 Thread Josef Schneider
On Mon, Jun 24, 2013 at 10:01 AM, Werner Koch w...@gnupg.org wrote:
 Hi!

 I just uploaded a test version of GpgEX (the GnuPG Explorer Plugin) for
 Windows 64 bit.  This is just the bare standalone DLL without an
 installer.  If you are using a 64 bit Windows system with Gpg4win, you
 may want to test this DLL:

Hi, I tried all of the possible functions work.
The only problem I found is, that help asks for Admin rights. And if
the rights are granted, it starts Internet Explorer, not the default
browser!
All of this on Windows 8 Pro 64bit German

Best regards,
Josef

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: key length for smart card key generation

2013-02-28 Thread Josef Schneider
On Thu, Feb 28, 2013 at 10:34 PM, Peter Lebbing pe...@digitalbrains.com wrote:
 On 27/02/13 22:58, Anonymous wrote:
 So I should be able to import the key...but not use it unless it is
 3072 bits or less?

 If we're all talking about RSA here, I think so.

Using an 4096 bit RSA key _should_ work if you compile the current
source from the git repository and then _should_ work with 2.0.20 once
that is out!
I didn't have the time to test that yet because I use Windows and
compiling GnuPG 2 for Windows seems to be quite a difficult task!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: More secure than smartcard or cryptostick against remote attacks?

2013-02-07 Thread Josef Schneider
On Fri, Feb 8, 2013 at 1:17 AM, Robert J. Hansen r...@sixdemonbag.org wrote:

 Sure.  That's theoretically possible.  I don't believe it to be true,
 though.  My machine is trusted not because I'm certain that it's immune
 to being pwn3d, but because I acknowledge that it can break my local
 security policy and I'm willing to accept what I perceive as the risks.

 If you don't trust your hardware, then that means you're not willing to
 accept the risks you perceive.  And that's a really big problem.  If
 you're not willing to accept the risks you perceive as associated with
 your hardware, then why are you using your hardware?

Of course you can trust a hardware created for the sole purpose of
signing clear text after displaying it more than a general purpose PC
that has a lot of software that has absolutely nothing to do with
security on it and regularly connects to a very insecure network (the
Internet).
You argue that there is only one level of trust for all hardware
someone owns and either you trust all of it or none, and that is just
not true!
Why do you think do Banks use Smart Card readers with own
display/keyboard and serial connection or TAN-generators using flicker
codes?
They do this because on the average PC there is a lot of software, a
lot of it closed source which the bank can not control and neither can
the owner.

I can write some virus a user has to install himself (and we all
know a lot will!) which sends signed mails to someone using GnuPG
installed on the PC, even if using a smart card, in probably less than
a day!
Writing a modified firmware that shows wrong amounts/account ids for
my Class 3 card reader and finding a way to install it (updates are
cryptographically checked) is much much harder. I have no idea how
long that would take or if I would ever succeed.
I assume for TAN generators which get the transaction data using
flicker codes it will be even harder!
So even if I get someone to install my malware on his PC, his online
banking will stay relatively safe.

I have a smart card that has digital certificates on it which can be
used to sign documents legally binding in my country. I use that card
with a reader with own pin pad. Of course someone can highjack my PC
and fake the data I want to sign. There are just a few problems:
• He can only sign something whenever I want to sign something, else I
won't input my PIN
• I expect something to have a valid signature after that, so either
he hopes I don't check this signature, or he fakes all the ways I can
check that, which is very hard.

With GnuPG on the other hand someone who has access to my PC can sign
whatever he likes and sign as much as he likes, as long as my card
reader is attached (which is, to be honest, quite long some times). If
I wouldn't have a smart card he could even copy my key and then sign
and decrypt whatever he likes, where- and whenever he likes!

So given the fact that I maybe sign an average of three documents a
day, in case one an attacker could sign up to three documents a day,
but I would notice that very quickly because someone of the recipients
would call me telling me the signature is invalid or I sent him some
things he didn't expect (except if the attacker waits for exactly THE
one document he wants to forge, has the right programming logic to
detect and change it accordingly, etc..). With GnuPG in its current
state he could sign millions of documents without me even noticing.

I see a difference there!
There is a risk to die when bungee jumping. There is a risk to die
when jumping naked from a bridge without bungee rope. This doesn't
mean I tell every bungee jumper to jump naked from bridges, because he
could die with bungee rope too! I I don't do this because the odds to
die are very different!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Paperkey 1.3

2013-01-07 Thread Josef Schneider
On Mon, Jan 7, 2013 at 5:54 PM, Peter Lebbing pe...@digitalbrains.com wrote:
 Flash memory stores its data as an electrical charge, which can leak away.
 It does so very slowly, but it still does[1]. We are talking about years.
 And reading a cell does not refresh it, so read-only use will in principle
 not do anything to extend the storage time.

Still you can't be sure that the controller or flash cells won't just
stop working.
Yesterday, a new MicroSD card of mine just stopped working.
At first one folder was unreadable and fsck didn't work, then after
unplugging and re-plugging it all file names where gibberish, the card
got hot and I unplugged it.
Since then it's detected as unformated and no write access is possible.
This is the second MicroSD card where this happens for me. While
yesterday this was after less than a day, the other one broke after
about a month of heavy usage in my smart phone.
And while with a CD or DVD you probably still can read parts of the
data (especially if you have e.g. PAR2 files to recover it) if a flash
storage of any kind stops working, realistically you can't do anything
to rescue even parts of the data.
And while most hard disks that broke showed some signs of that (via
SMART or increased sound level) all flash memory devices more or less
stopped working from one moment to the other. (but then, I don't have
very much data)
So I wouldn't trust any flash memory for long time storage.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


OpenPGP card decryption with 4096bit keys bugfix??

2012-12-26 Thread Josef Schneider
Hello,

first thing: I am not subscribed to this list, so please CC me in replies.

I recently bought a OpenPGP smart card and want to use 4096bit keys and
Windows.
This doesn't work for decrypting with any released gpg version!
There seems to be a patch to make it work at
http://lists.gnupg.org/pipermail/gnupg-users/2012-June/044868.html
Is this one line change the only thing that has to be changed to make it
work?
Compiling gpg2 for Windows is really hard it seems. I haven't got the
Gpg4win compilation to work because it needs some packages not available
on my debian sid based machine.
I am using the Gpg4win 2.1.1 Beta installer and want to change as little
as possible. I compiled libgpg-error and libassuan and switched out the
libassuan-0.dll
If this one line is the only change, this should be enough?! (except if
libassuan is also statically linked somewhere)
But the problem is still the same after the switch. The only commands
getting sent to the card when starting gpg --decrypt are:

 scdaemon[208]: chan_01BC - SERIALNO openpgp
 scdaemon[208]: chan_01BC - S SERIALNO
D276000124010205 0
 scdaemon[208]: chan_01BC - OK
 scdaemon[208]: chan_01BC - RESTART
 scdaemon[208]: chan_01BC - OK

Even if I have to compile gpg2 as a whole I don't want to use the git
working copy, but the 2.0.19 source with only the patch to make
decryption with 4096bit Keys work.
So can someone tell me if this is the only change (then I probably am
doing something wrong) or if something else, and what, has to be changed.

Thanks,
Josef

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users