What is the latest version

2013-12-19 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I am running enigmail 1.5.2 .   Is this old?  How can I get the
latest?  Thanks!
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsvPLAAoJECrdp7MWSIVbdCgH/1YSseWaWgppLHseMmpN36qW
OuiYuGKhctDl/J6EnIvan0RrRoCaixCl57or/xGs3kxgzJYfCnGkIHjpjjOzYfDh
lWNHWaFPRoPezjMc/08+TiPz5Ez3SNnI0DKbwlzHBSwyP0HLCUYEkTzEC6I8ndio
ZSGZ531beDLyevnakT9pUsuof8XaqdDA/RFbPsqq99mYFc61ZMRImlukXFVENre8
cfwQWbyAjhcDQ2uxCuZBvXRB/eKjh7/FNswuacO5gxaUtJNcTAixPH7UkkmZHCbf
v3mbMOk+UjhV/GApGHkFbwJq6P4T8uTyfRk2qCjOtsLHCJp91CQQAFhHOODMzbE=
=5ULF
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-18 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/18/2013 12:05 AM, Robert J. Hansen wrote:
>> So in other words the message can not be read by some govt genius
>> with a rack of computers??
> 
> How would I know?  Ask a government genius with a rack of
> computers.
> 
> I don't know the extent of the government's capabilities, nor do I
> want to.  That's the kind of knowledge that normally comes with
> some really strict rules on what you're allowed to say.
> 
Oh OK.  So there is a chance that someone has a special mathematical
trick to reduce the key-space hence their need for things like
Saville, BATON, etc.

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsYCZAAoJECrdp7MWSIVbwloH/3/xQFdjbrjc/36x1IdaJm8+
YWy3+g5XwXHZxhZRyFhCMwcMa6p8m4fBNZ3kjFCohCq6NwkvErrMWVtuzrI8JY50
poDmZKhUdxdDXv7Dqj/RnI2dzwa7CmcRO8Cqt1JTY51heeq0E1v1R95uL1QUtGGg
v8ekuBwqvzUZLjAUrA3+WR+QZnWwoIzkcd884VEit/H4JZ6JYwyTeEMEhx47hsQE
qnN1dZGnv5saJgsaowSDQu/6CvRfmVg8N1DOqJX2fradz1aAJaF4cZ8biO3oXSRY
J/pmvtHZ0RA6lZRsWaqyAj18p561waE80w1fYdVChhzKskqzcRanmWO9Nld0wxU=
=78sh
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 11:02 PM, Robert J. Hansen wrote:
> On 12/17/2013 10:57 PM, Matt D wrote:
>> Lets assume I run Ubuntu live from USB stick or cd when I need
>> secure messaging so an attacker cannot predict what machine i
>> will send my message from and there will be nothing left on the
>> machine.  The encrypted message is captured but the adversary
>> does not have access to me.  What sort of attack has any chance
>> to decrypt the message?
> 
> Beating your kneecaps into pulp, hiring a hooker to persuade the
> secret out of you, beating your recipient's kneecaps into pulp,
> hiring a hooker to persuade the secret out of your correspondent,
> Van Eycking your terminal, Van Eycking your recipient's terminal,
> figuring out a way to plant an exploit on your USB stick... I could
> go on for quite some time, but you get the idea.  The best ways to
> recover the message do not involve cryptanalysis, and the
> non-cryptanalytic means are devastatingly effective.
> 
So in other words the message can not be read by some govt genius with
a rack of computers??

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsSElAAoJECrdp7MWSIVb4tIH/j3GJ91LkIEWOKyJ12VD0zkZ
PH2by0RFWP6EIZWcek2zCtwbte1u5EiF4qqrVhkkSs+mQD+K87rdZMZFGsTjqxzL
j8u8leyOOUm6jWXzLvncIVG5qYO6Tk1xIFKvNZK34hgnpxJ4JZm4tuzlgbK6S803
8A0i9beBITbFGrUIqr4/Xn9Ir9UOJEW7knhTZZnv1168p4sN4tuq5ei42yespAkz
HWMEtCyrI/xQHjc2YQB4mp9UnRAxIos0P8mdtJhN6ZSw6+UTFH30kSPslq159rWO
cT8LYxfd7wZwcS36mbXpWU8U6cxzXQp3/KcZ9ffJJsi7etnKCUCNLUOvigbfz9U=
=EAPZ
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 10:33 PM, Robert J. Hansen wrote:
> On 12/17/2013 9:41 PM, Matt D wrote:
>> OK, I see.  So . . . if brute force is impossible, then what sort
>> of an attack is possible?
> 
> Too many to list.  Depends largely on your attacker's budget and
> the constraints of their operation.  For instance, if I don't care
> if you know I've compromised your traffic, I'll tie you to a chair
> and start swinging a pipe wrench at your kneecaps.  Cheap and
> effective.
> 
> Or I can target your machine for compromise.  If I can trick you
> into visiting a particular URL I might be able to plant a
> remote-root on your desktop and gain control over it.  At that
> point it's easy to run a keylogger to intercept your passphrase,
> and easy to copy your private key off your desktop.
> 
> Or I can hire a $5,000-a-night hooker.  I'm pretty sure that inside
> of a week you'd be willing to tell your new charming companion
> pretty much anything.  The KGB employed this against United States
> cipher clerks with amazing success.
> 
> Or... etc.  The list goes on and on and on.  In fact, there are so
> many ways to gain access to your traffic that I think obsessing
> over whether the default should be 2048-bits or 3072-bits is ...
> it's like arguing over whether your security fence should be 100
> feet high or 120 feet high.  Either way you need to pay more
> attention to the guy who's digging a tunnel underneath it.

Lets assume I run Ubuntu live from USB stick or cd when I need secure
messaging so an attacker cannot predict what machine i will send my
message from and there will be nothing left on the machine.  The
encrypted message is captured but the adversary does not have access
to me.  What sort of attack has any chance to decrypt the message?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsR0MAAoJECrdp7MWSIVbJLUH/0WbAEDhm2vPBQMUaOTfgmpl
SBnZnAxLOk3V/oA5moDF2SK4MHHWcwy5UNkgF+r/NIeSiKVevYVbeMCo8WzjRJwt
6T7B92sH9C5NDgxerimrliUcK3/HgkEQvWjBGa7BL4s2EpvSM34HtPC6eUyu9S4T
Ylj8BuUnQC8p8Xpla7RQIZEY9xu/j4Rx7Gf/cuJKIhEGLbTMqXLQvF787/bqb7vG
2ib/QoUn8BVmRbgE186KVTX/uHm2FGNoTFRMQ/mgSQEoFdy8ELfs76QjYHFY4gAF
rEa6arHXgttcnadrvcyAWr705TZILm0Oi/QuJJNhkN1e0/4+qDualXXbQSQqNtA=
=GfAE
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 08:07 PM, Robert J. Hansen wrote:
>> what about the 2048-bit DSA part of it?
> 
> Search the list archives, please -- this question has been asked
> and answered a great number of times.
> 
OK, I see.  So . . . if brute force is impossible, then what sort of
an attack is possible?

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsQt2AAoJECrdp7MWSIVbJ7EH/2FBFnICQSUyubosjMq1BZTv
11pO4cn4j62x2iP4Hmq6n80zXJhP30hT3pLXW8ZOHqBp+yFW589/G6BSxRxK63lp
7HxSZJ8fSP7KWPdhKG7ykICEEwQPAWT9HoV4dmNomNMwJCD9LlMq+x1EIJWIoFzp
XMvImaerg64tutM7Tnvku9zS2lgyd/NeIZKbHTEYifKYkOCVpIzjnpr1iEC0qoeY
KHBiQwXjcMwUtqjRswQkXvp3INq44PxCYiAKbk5ZdR0IC57iYVFgJg1ExsH56ydv
xk4rIGY5EoRGffymcth/uN0rjCPUXYU3Ce6/iY/Vejgs3L88YkNTSfK3VOIpDCg=
=kQkY
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 04:54 PM, Robert J. Hansen wrote:
>> Lets assume the people I email have the same preferences.  So
>> how long, and at what cost would it take to brute force crack a
>> captured message?
> 
> [sigh]
> 
> Not this again.  I get very tired of answering this question.
> 
> The Second Law of Thermodynamics puts a minimum energy requirement
> on how much energy it takes to change the state of a bit.  That's
> given by kT ln 2, or on the order of 10**-23 joules.
> 
> You want to exhaust keys in random order, because otherwise it
> would give the defender an easy way to make things hard for you:
> just use a key that's close to the end of your search order.  By
> exhausting random keys you foil that defense.  Between setting and
> clearing registers on the CPU, loading instructions into memory and
> so on, let's say that each rekeying operation takes 10,000,000 bits
> (10**7) being changed.  (That's a wildly optimistic number,
> incidentally.)
> 
> Finally, 2**255 (the average number of keys you'll have to exhaust)
> is about 10**77.
> 
> 10**77 keys * 10**7 bitflips per rekeying * 10**-23 joules per
> bitflip equals... 10**61 joules of energy.
> 
> A supernova releases 10**44 joules of energy.  You'll need 10**17
> of them just to power the computer to brute-force a 256-bit cipher.
> The Milky Way has about 10**11 stars; you'll need about 60 galaxies
> to go supernova all at once.  This turns out to be about the same
> size as the Virgo Supercluster, which is the region of the universe
> the Milky Way is in.
> 
> The amount of energy we're talking about here is so large there is
> a non-zero chance it would disturb the false vacuum of spacetime
> and annihilate the cosmos.
> 
> People always seem to ask me if I'm making these numbers up.  No, I
> am not, nor am I joking.
> 
> No one will ever.  Ever.  Brute-force a 256-bit cipher.

what about the 2048-bit DSA part of it?

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsPDdAAoJECrdp7MWSIVbcdkH/ReJxrw76Vdx/cSVJFY20sGg
OcH8hmdrB4gOCrvt1SJj3KiRl0bTgZyLkEpWR2UT3x4Zvd9Kni0gRsXSyNR6AlcE
SCSIPOgDxeiWRWIuNSaRn9MBlzmpPnKWyECgeQ4S5HnDbZS+dApme+7AOZM54tm6
XPG57Ii2giUV6gmOdF0xMAt0uHd56hkoO09IYfkvbF4Vsk8vS4a0JCpCFzD4uaVa
R007MRRUvTfmoukGoiaIC3315ZhQZHbN5jK4LRia02Zoy6t6dAjkInC+Y4aiE0pb
6nUiDg4s7dGzLUBfwsUqhcZ3/1Kr3MU6pLKsHOz4azP/u42DOjvQ9cvWvlqQN3A=
=CUTC
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 01:37 PM, David Shaw wrote:
> On Dec 17, 2013, at 12:41 PM, Matt D  wrote:
> 
>> How can I find whats on my list?
> 
> gpg --edit-key (thekey) showpref
> 
> You can see your own, or anyone else's preference list that way.
> Note that each user ID (or photo ID) has its own preference list.
> 
> David
> 
> 
Thanks a bunch that was easy.  So mine is 2048 with AES-256.  So whats
all the complaining about the defaults?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsJ2QAAoJECrdp7MWSIVbAJoH/jWq0x3nx7bNzgxN4ScAMP8Y
1/7XBEgWTVUk8RcL37EaLcIrEjH3jnfWijl367/kvNVLxLiX+3IlRfAuxsndyXAZ
BBAKNOegr1pbfFQS0IlvmKEed0W1snFK7kOC5OxXyyrfm0gU9F6GNuFismSYkttH
CV19q427hT6ct6ysiBth4wT3ixXU0SCMnQlYq4wax7u1NSI6zaTMPR+7S+ym1K2b
DxQTD9OS1ufK+0PHmw7kpDr8klsLihHGDZ9Ca/CGaBEvgWlgP36HbXWKWTm4TowX
jx3fMa9ev88o4iOdyicqU1scmra2GdyR2hpmwwWdVevDk5kPDla9m+F1XGYz5/s=
=WTGi
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 02:28 PM, Robert J. Hansen wrote:
>> Thanks a bunch that was easy.  So mine is 2048 with AES-256.

Lets assume the people I email have the same preferences.  So how
long, and at what cost would it take to brute force crack a captured
message?

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsLGQAAoJECrdp7MWSIVb1CQIAJb6C9Q4BoDAUezBoDXR5Agv
tNi7NoEMc0r2wZGeARYGQSBQ+5dWO7wbkQsyFmQqlBc3gTE4QOtasJvjMeeqrQa5
lexz1Pk+Chk15zbkiQZAXcMm5x+BSsg/CoqnWWY8kciU6+SZjWIRMOXbdcgzli5l
eTUkDRBKhNDkUCTlE4C2Abdeox9KbGlU+JtZ7+cn1xP40OLxnuBmnyx5cl5CW2Wo
ibvGAX/jEmCNQXFc+8FUlFcTflcPXjC/MGQk64Q1Q5ApGiuwN+ajT1W2NAwsgTTg
XVEg9h6/5QyIq99nfTX5JYgoogWSgSNQtPwZaxKccc4VT1vKVUUdluQfQLQDbvM=
=VflP
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 12:02 PM, Robert J. Hansen wrote:
>> Why would anyone choose AES-128 instead of something more secure,
>> say AES-256?
> 
> "More secure" is sort of ... missing the point.  It's sort of like 
> arguing over whether King Kong or Godzilla is better at urban 
> destruction.  We choose between ciphers principally based on
> features other than some nebulous concept of 'security', at which
> we can say that all the ciphers are more or less equally secure.

(Definitely Godzilla) But why do people tell me that DH, DSA, and RSA
under 2048 are unacceptable?
> 
> Insofar as why one might be chosen over another, a big reason is 
> regulatory compliance.  For instance, a business might be
> constrained by laws or regulations that require 128-bit crypto.
> Some regulations may require national standards to be used; in this
> case, a Japanese business may be required to use Camellia, while a
> U.S. business would be required to use AES or 3DES.
> 
> The other big reason to prefer one over another is comfort.  I've 
> audited GnuPG's 3DES code and I'm satisfied that it's correct; I
> haven't audited the other algorithms.  That means I feel more
> comfortable using 3DES.
> 
How can I find whats on my list?

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsIzHAAoJECrdp7MWSIVb4z8H/3rsJx28X0LfAeRmMXo2yoce
48HnFEzs/jZ/aXT+yuBr73Ri81MCGtGvW0M0DNzWAwY5GRHiP6FiXbYBfMHovVVY
hoFwq20MAEkkHRDx34pkrPMqiQj2m6hR/ayJ+bkIMZquYS3z6gnbJYpp1NS5Uwi0
PI81Q7gWzi4xTv/NFluCLfry7Gc6TGXop71L6RROqhkSG1MJ4c1Aev3D7cW7h0Ke
r8WGlD9NDa9lZUSotKgQveIwFvwsMYmpeqWeP4/m5Xb+GReuVsy7ugirOMz4xmTA
FoMSx63YyH5JLii/+z/Afn/iTXgXNRP3pIfqak2DseM0eDR1rh1dJFkR9xBJex0=
=9656
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/17/2013 11:09 AM, Daniel Kahn Gillmor wrote:
> Hi Matt--
> 
> On 12/17/2013 10:07 AM, Matt D wrote:
>> Hi!  What encryption algorithm do we use in OpenPGP
> 
> OpenPGP has "algorithm agility", meaning that it's possible to use 
> different encryption algorithms at different times in the same 
> cryptographic framework.  encrypted OpenPGP messages are generally
> also "hybrid" messages -- that is, the bulk of the message is
> encrypted with a symmetric encryption algorithm (using a random
> key), and that random key is encrypted to the recipient's public
> key using an asymmetric algorithm.

Please excuse my ignorance but I have a question after looking at the
list. It is my impression that I can choose an algorithm for my
machine and whoever else I communicate with can choose another
algorithm.  Is this correct?   Why would anyone choose AES-128 instead
of something more secure, say AES-256?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsHxdAAoJECrdp7MWSIVb3icH/RgbWzDfDA/exNyu/Qt2+DPh
1kiEjxsRCxNlvhzLIvafvqgCHvqAtrq+BcqSiFSfY37FQymm02mAeEpExPmDSnHT
K3MH361++55ur/53WjQZpfw/4T+40PzTukSGMupCSWS82x2osw4upbPDixZcTwXo
byXaBcjdaXPza7W84LxBfQDXd3l1VyX0kwF51spXUrQ9TyrYIyzjDU4e/teUVaY1
HopB95dRLlT+SEih2f5lemPeRGvnd7D40cFXfiseLxRcsb3SPtAQ6keHGWz7xuRl
5juYws4xXTuZVBm4N8Euft/DNmi8SuSjc6iuALCpAYztTFId9q6AQLOumK9N7rk=
=WISY
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


encryption algorithm

2013-12-17 Thread Matt D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!  What encryption algorithm do we use in OpenPGP
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.21 (GNU/Linux)
Comment: MacGPG2 - http://www.gpgtools.org/macgpg2.html
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSsGjEAAoJECrdp7MWSIVbE3QH/iO9D8hesLb7YRufyGIGfPo3
Fufc97VKZ9NUrtYwJWhvnwOBFCKsUPQTFUx/uyQBoanL85HaFPzyPO8tdsZ2wUNc
3AxnGELdsdzI3BvunWAfOUXREBxfRmKXBT5ryAF4/uz3wmrMPWn2C9lQFXW+Mz5V
KGrFBcpuJle5jpxfdru4W+J1vdUw8TufijC9qhKqw44koI9bHkCFc7ciUlPmFVdo
bp+8gmJoC/aZGF7IhpgGfugM5T5XdiDgzHdpLlxtyaXJTyr3o27N0zd2AGLOH/wC
+X0GKA7I2A7MQGurPSzgrVgw/I7Lzu3P5wui4Lc/xbee8v/yFQWhiRDGTTWh8Bc=
=hQEy
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: problems opening .asc file

2013-09-06 Thread Matt D

> If you want to be able to verify these message signatures, you 
> should set yourself up with a Mail User Agent that can handle 
> PGP/MIME-signed messages.  Some examples are:
> 
> * thunderbird with the enigmail plugin * evolution * claws mail * 
> outlook with gpgOL (http://gpg4win.org/about.html) * notmuch
> 
> hth,
> 
> --dkg
> 
right.  for this email address i use thunderbird and everything seems
to work.  however i cant get my thunderbird to work with hush.com

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


problems opening .asc file

2013-09-05 Thread Matt D
Hey,
i was sent a .asc file as an attachment.  when i try to open it it says
"Couldn't decrypt file: No data"

and on the signature part of another email i get this:

OpenPGP Security Info

Error - signature verification failed

gpg command line and output:
gpg
gpg: Signature made Wed 14 Aug 2013 07:32:07 AM EDT using DSA key ID

gpg: BAD signature from "xxx.com>"

however when i do:

gpg --sign-key 

it tells me it is signed by my key.

What am i doing wrong here?
Thanks!

-- 
--
Matt D


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


cant open public keyring file

2013-09-05 Thread Matt D
my open pgp wont work.  i cant get keys.  using ubuntu 12.10.  latest
version of gpg.

OpenPGP Security Info

Unverified signature

gpg command line and output:
gpg
gpg: Signature made Wed 14 Aug 2013 07:32:07 AM EDT
gpg:using DSA key 0x5BB6809BAE445B2E
gpg: can't open `/home/matt/.gnupg/pubring.gpg'
gpg: keydb_search failed: file open error
gpg: Can't check signature: public key not found
gpg: Signature made Wed 14 Aug 2013 07:32:07 AM EDT
gpg:using RSA key 0xAE2FF2140E7A0087
gpg: can't open `/home/matt/.gnupg/pubring.gpg'
gpg: keydb_search failed: file open error
gpg: Can't check signature: public key not found
-- 
--
Matt D


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users