Re: Fedora GPG Key Server

2013-09-09 Thread Marcio B. Jr.
This whole NSA blackmailing situation is causing strange reactions in you, sir.


Marcio Barbado, Jr.



On Sat, Sep 7, 2013 at 7:28 AM, Werner Koch  wrote:
> On Thu,  5 Sep 2013 22:22, marcio.barb...@gmail.com said:
>> https://lists.fedoraproject.org/pipermail/announce/2013-September/003180.html
>
> Please do not post a mere link.  This assume that everyone is online and
> able to read a web page.   At least an excerpt from the page would be
> useful.
>
>
> Salam-Shalom,
>
>Werner
>
> --
> Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
>

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fedora GPG Key Server

2013-09-05 Thread Marcio B. Jr.
https://lists.fedoraproject.org/pipermail/announce/2013-September/003180.html


Marcio Barbado, Jr.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


kernel.org status: establishing a PGP web of trust

2011-09-30 Thread Marcio B. Jr.
http://lwn.net/Articles/461236/



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: secring and dropbox

2011-08-01 Thread Marcio B. Jr.
https://twitter.com/#!/csoghoian/status/98116328677834752


On Fri, Jul 22, 2011 at 9:07 PM, Aaron Toponce  wrote:
> On Fri, Jul 22, 2011 at 09:37:09PM +0200, Michel Messerschmidt wrote:
>> set pgp_auto_decode = yes
>
> Perfect! That was the variable I was looking for! Thanks!
>
> --
> . o .   o . o   . . o   o . .   . o .
> . . o   . o o   o . o   . o o   . . o
> o o o   . o .   . o o   o o .   o o o
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-26 Thread Marcio B. Jr.
Hi Daniel,

On Sat, Jul 23, 2011 at 2:21 PM, Daniel Kahn Gillmor
 wrote:
> On 07/23/2011 07:04 PM, Marcio B. Jr. wrote:
>> On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen  
>> wrote:
>>>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>>>> Diffie-Hellman key exchange method with block ciphers.
>>>
>>> Why is this a problem?
>>
>> You know, secrets are shared. 100% increase (at least) in "exposing" risks.
>
> I am struggling with how to respond to your messages since i find them
> confusing.


Ok, I am grateful for that struggle.


> Are you aware that the purpose of OTR is to allow two parties to
> communicate confidentially?


Right now, I'm trying to study OTR within some US Fifth Amendment
contexts. So I'll answer that in a later time.


> OpenPGP itself uses this sort of symmetric encryption to encrypt
> messages with a random session key, and only uses asymmetric encryption
> to encrypt the session key itself.


So, say, my subkey's public part encrypts some session key, not the
message itself?


Regards,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-23 Thread Marcio B. Jr.
Hi Robert.

Secrecy sharing constitutes sort of a "symmetric fact" when more than
one instance is involved and you ask me for a citation?

I resumed this thread in order to clarify whether Kopete's OpenPGP
plugin was really superior, compared to the OTR one, and all people
say is OTR and its Diffie-Hellman algo are great, but no comparison is
ever made because choice depends on threat model. Come on, this is not
an academic seminar.

It would be simpler to put some hypothetical situation in which you'd
choose one of the options, and explain the reason behind that choice.

What can I say? My situation is a regular one. Privacy and/or
authenticity are needed in varying degrees.


Regards,



On Sat, Jul 23, 2011 at 2:16 PM, Robert J. Hansen  wrote:
> On 7/23/11 1:04 PM, Marcio B. Jr. wrote:
>> You know, secrets are shared. 100% increase (at least) in "exposing"
>> risks.
>
> I need to see a citation for this.  What you're claiming is at odds with
> everything I've ever learned about how DHKEA operates.
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: IM encryption options [was: Re: Is the OpenPGP model still useful?]

2011-07-23 Thread Marcio B. Jr.
Hi Aron,
you are somewhat arrogant.

Please read what I wrote till completion.


Regards,



On Fri, Jul 22, 2011 at 9:17 PM, Aaron Toponce  wrote:
> On Fri, Jul 22, 2011 at 07:56:42PM -0300, Marcio B. Jr. wrote:
>> Hello Daniel,
>> sorry for such a delay; this has been a wild JULY.
>>
>>
>> On Wed, Jul 6, 2011 at 4:09 PM, Daniel Kahn Gillmor wrote:
>> > On 07/06/2011 01:28 PM, Marcio B. Jr. wrote:
>> >> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> >> Diffie-Hellman key exchange method with block ciphers.
>> >
>> > Why does this seem unjustifiable to you?  DH and block ciphers are
>> > widely-reviewed parts of the standard crypto toolkit.  Do you have
>> > reason to believe they're generally bad?
>>
>> It seems unjustifiable because there exists an option in which secret
>> keys need not to take risks. And if there's any security concern and
>> one's to choose between zero risk and any other positive-value risk,
>> it's reasonable to pick the former.
>
> Are you familiar with the DH key exchange? It doesn't seem that you are.
> There is no risk in sharing the private key between the two parties. It
> basically goes like this:
>
> Step 1: A generates the private key.
> Step 2: A encrypts the private key with a one-time session key.
> Step 3: A sends the encrypted private key to B.
> Step 4: B encrypts the encrypted private key with his 1-time key.
> Step 5: B sends the doubly-encrypted private key to A.
> Step 6: A decrypts what he can with his one-time session key.
> Step 7: A sends the resulting encrypted key to B.
> Step 8: B decrypts the private key with his 1-time key.
>
> B now has the private key.
>
> The one-time session keys are never shared, but stored locally on the
> machine. Once the DH key exchange finished, the session keys are destroyed.
> No where in the exchange is there any risk of the private key being
> compromised. A MITM can grab all the packets he likes. Unless he has one or
> both session keys, he's not getting the private key.
>
> --
> . o .   o . o   . . o   o . .   . o .
> . . o   . o o   o . o   . o o   . . o
> o o o   . o .   . o o   o o .   o o o
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-23 Thread Marcio B. Jr.
Hello Robert.


On Wed, Jul 6, 2011 at 5:49 PM, Robert J. Hansen  wrote:
>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> Diffie-Hellman key exchange method with block ciphers.
>
> Why is this a problem?


You know, secrets are shared. 100% increase (at least) in "exposing" risks.


Regards,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users



Re: OT: IM encryption options [was: Re: Is the OpenPGP model still useful?]

2011-07-22 Thread Marcio B. Jr.
Hello Daniel,
sorry for such a delay; this has been a wild JULY.


On Wed, Jul 6, 2011 at 4:09 PM, Daniel Kahn Gillmor
 wrote:
> On 07/06/2011 01:28 PM, Marcio B. Jr. wrote:
>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> Diffie-Hellman key exchange method with block ciphers.
>
> Why does this seem unjustifiable to you?  DH and block ciphers are
> widely-reviewed parts of the standard crypto toolkit.  Do you have
> reason to believe they're generally bad?


It seems unjustifiable because there exists an option in which secret
keys need not to take risks. And if there's any security concern and
one's to choose between zero risk and any other positive-value risk,
it's reasonable to pick the former.


>> As of what I got from your (Robert) explanation plus some preliminary
>> conclusions of my studies, making use of asymmetric algos with OpenPGP
>> would be more coherent and secure, mathematically. Is it correct?
>
> Not all of these decisions should be made on purely mathematical
> grounds.  Consider, for example, pidgin's old GPG plugin (i dont know
> whether it is still in use or under development)
>
> It worked by signing and encrypting each message before it was sent, and
> decrypting and verifying each response.
>
> However, IM messages tend to be heavily context-dependent, which makes
> them vulnerable to replay attacks.


No secret key can ever be intercepted or shared.


> For example, how many times have you written on IRC (or whatever IM
> network you use) the simple phrase "i agree"?
>
> If each message is individually signed and verified, it'd be relatively
> easy for an attacker to replay your "i agree" in another conversation,
> making it look like you agreed to something you hadn't actually agreed
> to.  OTR's stream-based approach ensures that messages are only
> authenticated as part of a single, two-party conversation.  There is no
> room for a replay attack.


I am obviously considering signing and encrypting.


> OTR also is designed so that a third-party (one not involved in the
> original communication can't conclusively prove that you wrote
> something.  this is the "off the record" part of OTR.  It's debatable
> how useful this so-called "repudiability" would be in, say, a court of
> law; but individually-signed messages clearly do *not* have this kind of
> repudiability; anyone in possession of one of these messages can
> convince any third party that you did in fact write the message.


There is secrecy sharing so maintenance of this repudiability's
effectiveness is not entirely up to you.


Regards,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-06 Thread Marcio B. Jr.
Dear Doug,
I don't know what "IDOYTM" is supposed to mean, "and am" afraid I'm
not enough-of-a-teenager to get really concerned with that.

If the existence of big fans justifies quality, Amy Winehouse would be
Teresa of Calcutta.

My question, which, I must emphasize for you, is a question — not an
assertion, was on mathematical coherence.


Regards,



On Wed, Jul 6, 2011 at 4:37 PM, Doug Barton  wrote:
> On 07/06/2011 10:28, Marcio B. Jr. wrote:
>>
>> Hello,
>> resuming this thread because I'm studying encryption options for KDE's
>> Kopete IM client.
>>
>> So far, OTR adoption seems unjustifiable, really. I mean, it uses the
>> Diffie-Hellman key exchange method with block ciphers.
>>
>> As of what I got from your (Robert) explanation plus some preliminary
>> conclusions of my studies, making use of asymmetric algos with OpenPGP
>> would be more coherent and secure, mathematically. Is it correct?
>
> IDOYTM, which you haven't defined.
>
> Personally I've used OTR for years, and am a big fan.
>
> --
>
>        Nothin' ever doesn't change, but nothin' changes much.
>                        -- OK Go
>
>        Breadth of IT experience, and depth of knowledge in the DNS.
>        Yours for the right price.  :)  http://SupersetSolutions.com/
>
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Is the OpenPGP model still useful?

2011-07-06 Thread Marcio B. Jr.
Hello,
resuming this thread because I'm studying encryption options for KDE's
Kopete IM client.

So far, OTR adoption seems unjustifiable, really. I mean, it uses the
Diffie-Hellman key exchange method with block ciphers.

As of what I got from your (Robert) explanation plus some preliminary
conclusions of my studies, making use of asymmetric algos with OpenPGP
would be more coherent and secure, mathematically. Is it correct?


Regards,



On Fri, Apr 29, 2011 at 10:12 AM, Robert J. Hansen  wrote:
> On 4/28/11 11:05 AM, Michel Messerschmidt wrote:
>> Sounds very much like Off-the-Record messaging for every kind of
>> communication. Or is there a difference I have missed?
>
> The barrier to usage is still high with OTR: users still have to
> authenticate, and you can get horrible sync issues.  Plus, let's not
> forget the wacky hijinks that occur if you're logged into IM from two
> places at once -- although this is explicitly supported by some IM
> protocols (Jabber), with OTR it causes no end of troubles.
>
> The thought experiment here -- it's not a real proposal -- is, "what
> would happen if we discarded authentication entirely, and went purely
> for a require-brute-force approach to discover the random session key?"
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Still OT: NLP (was: Re: An Invitation to Neuroscientists and Physicists)

2011-05-18 Thread Marcio B. Jr.
Hacking the mind for fun and profit:
http://phrack.org/issues.html?issue=67&id=15#article


On Tue, May 17, 2011 at 8:58 PM, Robert J. Hansen  wrote:
> On 5/17/2011 5:07 PM, Andre Amorim wrote:
>> It's Called INCEPTION !
>
> There are two major possibilities here: either the poster is correct, or
> the poster is incorrect.  If correct, he deserves our compassion for the
> troubles others are inflicting upon him.  If incorrect, he deserves our
> compassion for the troubles his own mind is inflicting upon him.
>
> Either way, let's show a little polite discretion.  Thanks.  :)
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>




Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fyi: keysigning parties in Brazil

2010-12-28 Thread Marcio B. Jr.
Hi,
this wiki, maintained by "Associação Software Livre", is dedicated to
coordinate (and subsequently, list) all of the keysigning parties in
Brazil:

http://wiki.softwarelivre.org/KSP/WebHomeEn


regards, and a harmonious 2011 to you all,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPF Crypto Stick vs OpenPGP Card

2010-12-07 Thread Marcio B. Jr.
Thank you, Grant,

and perhaps, it's a good idea to own more than one of those devices.

One would be in constant use and the other(s) would mirror the former
for backup purposes. Because a small size device is easier to be
carried, and maybe this fact increases the chances of losing it or
getting it stolen.

I know its contents cannot be used by other than its legitimate owner.
Still, a coherent backup policy would include at least a second
device.

However, considering what Łukasz Stelmach answered to Andre Amorim:


> I know: secret keys may be uploaded to a card but not downloaded from
> it. I think (read speculate): the above question is asked when you
> generate a key pair on the PC and upload it to a card.


backup seems to be a hard task.

Well, supposing you have 2 Crypto Sticks or 2 OpenPGP cards. Is it
possible to create a mirroring/"synchronization" scheme between them?

And if possible, is it prudent? What do you think of that?


Regards,



On Mon, Dec 6, 2010 at 5:38 PM, Grant Olson  wrote:
> On 12/6/10 2:21 PM, Marcio B. Jr. wrote:
>> Hello,
>> sorry for this insistence. I just want to get it clearly.
>>
>> So, you mean those devices certainly protect information better than a
>> regular computer (even if making proper use of disk encryption
>> software)?
>>
>
> Yes.  Ultimately a malicious user with 'root' access can compromise any
> software solution.  Maybe that means downloading your keys and mounting
> an offline attack.  Maybe that means downloading your keys and
> installing a keylogger to get your passphrase.  Or finding your
> unencrypted key that's been cached by gpg-agent in system memory.  Full
> Disk Encryption doesn't provide protection there when your system is up
> and running, it only helps when someone steals your laptop, or tries to
> access the system while it's powered down.
>
> By moving the keys to a dedicated hardware device, it creates a
> partition between your (possibly compromised) computer's OS and and the
> device.  The key information never gets loaded into the OS and is opaque
> to the system.  So now a malicious user would need to 'root' your card,
> or card reader, which would probably involve something like trying to
> access or change the physical chips on the device, and is much much
> harder than installing a root-kit, or creating a virus, or developing
> some other malicious software.
>
> That's also why people are talking about readers with pin-pads.  That
> prevents someone from installing a general-purpose keyboard sniffer to
> get your pin, stealing your physical token, and having the two pieces of
> info they need to use your keys.
>
>
> --
> Grant
>
> "I am gravely disappointed. Again you have made me unleash my dogs of war."
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPF Crypto Stick vs OpenPGP Card

2010-12-06 Thread Marcio B. Jr.
Hello,
sorry for this insistence. I just want to get it clearly.

So, you mean those devices certainly protect information better than a
regular computer (even if making proper use of disk encryption
software)?



On Mon, Dec 6, 2010 at 9:06 AM, Hauke Laging
 wrote:
> Am Freitag 03 Dezember 2010 14:55:34 schrieb Marcio B. Jr.:
>
>> I've never used those external devices, and my private keys have
>> always been one place only located, a computer.
>>
>> That situation is a sort of "trade-off" for it keeps the referred keys
>> more protected/restricted whereas it gives me little chance of using
>> them in other hosts, easily.
>>
>> So, I guess one of the ideas behind making use of those devices would
>> be the facility of taking all of my keyrings ("secring.gpg" for
>> example) with me everywhere, is it correct? If so, by doing that,
>> weren't we losing the whole point?
>
> As you said: ONE of the ideas. The other one is to ptotect the keys (though
> not completely their usage) on your more protected system. As "more protected"
> is still a serious risk in typical environments. Using secret keys on other
> systems is the more serious argument but even for keys on a single host we are
> not missing the point.
>
>
> Hauke
> --
> PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPF Crypto Stick vs OpenPGP Card

2010-12-03 Thread Marcio B. Jr.
Ok,
let me utilize this thread to clarify something.

I've never used those external devices, and my private keys have
always been one place only located, a computer.

That situation is a sort of "trade-off" for it keeps the referred keys
more protected/restricted whereas it gives me little chance of using
them in other hosts, easily.

So, I guess one of the ideas behind making use of those devices would
be the facility of taking all of my keyrings ("secring.gpg" for
example) with me everywhere, is it correct? If so, by doing that,
weren't we losing the whole point?


Regards,



On Fri, Dec 3, 2010 at 10:21 AM, Hauke Laging
 wrote:
> Am Freitag 03 Dezember 2010 09:47:27 schrieb Nils Faerber:
>
>> The non-obvious content of the transaction, what you say as "you do not
>> see what you sign even on the PIN-pad" is an issue that has been
>> discussed a lot of times already - yes, it is definitely an issue but
>> very hard to solve. IMHO this would require a card terminal that
>> understands the data to be signed and present the user with a meaningful
>> summary.
>> But it strictly assumes again that this terminal cannot be compromised
>> too. And being more intelligent (in order to display complex data) means
>> to be a more complex device containing more complex device software
>> which again opens new possible security holes.
>
> A first improvement would be to show the hash to be signed. Of course, you
> cannot trust the hash calculation on a potentially compromised PC but this
> would be a start for further protection (e.g. by sending the file to someone
> else and comparing the hashes).
>
> If I understand the process correctly then not the file hash is signed but the
> hash for a combination of the file hash and some metadata (timestamp, signer
> ID). For a security progress the card reader would have to see both hash
> components which would require a protocol change. IMHO it makes sense to plan
> this for the future. Ask the card reader whether it has a display and can do
> the hash calculation itself. If so then send the data in a new format.
>
>
> Hauke
> --
> PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


EFF: Eight Epic Failures of Regulating Cryptography

2010-10-25 Thread Marcio B. Jr.
Hello,
I think this Electronic Frontier Foundation's text may be of your interest[1].

It was written by American attorney Cindy Cohn.


[1] Eight Epic Failures of Regulating Cryptography:
http://www.eff.org/deeplinks/2010/10/eight-epic-failures-regulating-cryptography


regards,



Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-09 Thread Marcio B. Jr.
I guess all you need is  proper "read" and "write" privileges management.


Regards,



On Tue, Aug 3, 2010 at 9:51 PM, Snaky Love  wrote:
> Hi,
> I would like to better understand: is gnupg good for big groups?
>
> I would like to encrypt communication in groups - not instant communication
> like e.g. messengers like pidgin, but like on a forum or web-group - the
> data persists in an archive,  where the communication can be read. Members
> are coming and leaving a group constantly - that means if somebody leaves
> the group, she should not be able to read the content decrypted anymore, and
> if anybody attaches the group all the old content optionally must be
> encrypted with her key so she can read all data belonging to this group.
> well, maybe you get the idea. It´s basically like a forum or mailing list
> with an archive.
> With my understanding of gnupg I see no other way than to store the data NOT
> encrypted - in a database or wherever, perhaps on an encrypted disc to
> compensate for the data not being encrypted - and then to encrypt the data
> on the fly with the pubkey of the user after the user logged into the
> website and is checked to belong to the right group.
> But doing this would be stupid, as it would basically use gnupg only for
> transport - but there is already SSL and TLS existing for this purpose.
> So is there any trick to encrypt data at creation time for unknown future
> users?
> And how can I remove users from the group of allowed users without
> re-encrypting the content? Is this possible to realize at all without having
> to keep the original unencrypted content?
> Is this scenario - group communication - not a use-case for gnupg at all?
> Thank you very much for your attention!
> Have a nice day,
> Snaky
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>




Marcio Barbado, Jr.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users