Re: encrypting to expired certificates

2014-09-16 Thread Sam Gleske
This is a resent because I accidentally mailed Peter Lebbing directly
without the mailing list.

Allow me to lay to rest all the confusion in this thread.

On Tue, Sep 16, 2014 at 6:45 AM, Peter Lebbing pe...@digitalbrains.com
wrote:

 I wanted to encrypt a document to myself on an offline system[1].
 However, that copy of my own key was expired, and it wouldn't do it. I
 was in a bit of a hurry, trying to get things done. Now, I had to get a
 USB drive, start another computer, export my updated key, and import it
 on the offline system. If I had --expert followed by yes to an Are you
 sure? prompt, I would have done that and updated the copy when I had
 more time.


Not really sure where you're going with this.  It has already been
*established* that if you're the key owner you can adjust the expiration
date of the key.  I think there's a lot of confusion around the intention
of a floating expiration here.  Expiring keys have the following function:

Expiring local copies of public keys on other peoples' computers to force
them to get a public key update from the owner.  That is to say that if I
have Peter Lebbing's public key and it has expired that means I must reach
out to Peter Lebbing for the latest copy of the public key of the exact
same fingerprint.  Expiration in this context does not mean the key is
forever invalid.  It means that *my copy* is invalid until I get a more
recent update from Peter Lebbing.  That just means Peter Lebbing would have
changed the expiration date of his public key and extended it.  So when I
get his new expiration date that is the time in which I must reach out to
him next for another public key update of the same finger print.

This protects both the key owner and correspondent in a couple ways.

1) If I have an expired key and I check to see what the latest key is of
Peter Lebbing, he may have revoked it.  In this case it forced me to go out
and check and see that it was revoked so I *must* not use this key again.
He can give me his new key with proper WoT validation.
2) If Peter Lebbing as a key owner loses his key and my local public key of
Peter Lebbing expires then the next time I reach out to Peter Lebbing for
the latest key copy he can tell me he, in fact, lost the key and give me a
new one with proper WoT validation.

To bring this full circle: the expiration date's purpose is to force users
of any public key to periodically check with the key owner that the public
key is still valid.

RESOLUTION

So if a key is expired I *must* not encrypt with it.  I *should* instead
reach out to the key owner and ask for their latest public key of the same
fingerprint which would have a new adjusted expiration date.  This ensures
I'm not encrypting to a compromised key, a revoked key, or a key in which
the owner lost the private key.

If you're the owner of a key that has an expired date, you *should* extend
it to allow further use of the key by your contacts.  If you decide you
don't want to use the key any longer then you *should* revoke the key.  If
you accidentally lose your key then no worries, because eventually it will
expire and nobody could encrypt to it even if they wanted to.

Hope this helps,
SAM


-- 
GPG FINGERPRINT 4096 KEY
8D8B F0E2 42D8 A068 572E
BF3C E8F7 3234 7257 E65F
https://keybase.io/samrocketman
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: mailto with pgp fingerprint

2014-07-23 Thread Sam Gleske
I'm hoping keybase.io will hopefully resolve the issue of identity checking
with key fingerprints.

For example, my keybase account is... https://keybase.io/samrocketman

My friends who regularly interact with me on github (and more rarely
twitter) as well as the domain(s) I own will help to give my recipients the
benefit of the doubt that my key is what I say it is when they only see it
in an email.


On Tue, Jul 22, 2014 at 10:27 AM, Werner Koch w...@gnupg.org wrote:

 On Tue, 22 Jul 2014 09:40, enigm...@josuttis.de said:
  More and more we seem to have the problem of faked keys in the key
  servers. This especially applies to well known keys such as
  authors of magazines and famous tools.

 This is actually the problem of checking the validity of the key.
 Granted, gpg is not smart enough to figure out the best matching key but
 that is something which can be fixed.

 A more simple way of tackling this is to use PKA or DANE for key
 validation: For sending mail you already need DNS and thus it would be
 easy to retrieve the matching key from the DNS.  The drawback is that
 this must be configured by the key owner and can't be changed by the
 sender.


 Shalom-Salam,

Werner

 --
 Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users




-- 
GPG FINGERPRINT 4096 KEY
8D8B F0E2 42D8 A068 572E
BF3C E8F7 3234 7257 E65F
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Sam Gleske
On Tue, Apr 8, 2014 at 11:01 PM, Felipe Vieira fmv1...@gmail.com wrote:

 Dear GNUPG community,
 I think a lot of unexperienced users would like to know more about the
 Heartbleed problem found on some of the openssl versions. I have two broad
 questions and two specific questions:
 1) Which type of clients have been compromised (consider an ordinary user)?
 2) Which common applications use openssl and are a potential target?

 2) Are firefox users compromised?
 3) Are RetroShare users compromised?
 Thanks in advance.


For the most part it is service providers who are affected by the bug.
There's a handy website to verbosely explain heartbleed.

http://heartbleed.com/

Affected services include HTTP, email servers (SMTP, POP and IMAP
protocols), chat servers (XMPP protocol), virtual private networks (SSL
VPNs), databases (e.g. mysql), and pretty much any service that uses
openssl TSL/SSL to secure transport of services if they're recently patched.

Security notices for popular server distros...
RHEL - https://access.redhat.com/site/solutions/781793
Ubuntu - http://www.ubuntu.com/usn/usn-2165-1/

CLIENT

There's not much you can do at this point.  Update your system packages and
that's about it.

SERVICE PROVIDER
Essentially you want to take the following steps if you're  service
provider.

1. Test for the vulnerability - http://pastebin.com/WmxzjkXJ it is also
prudent to search for the affected package versions across all services.
2. If vulnerable patch the OpenSSL version of public front end services
first.  Patch backend services after the front end is secure.
3. Reissue SSL private keys and certificates.  Since the leak exposes the
private key it is no longer pristine.

For the remaining more thorough steps of what to do see the
heartbleed.orgwebsite which has a nice set of instructions.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's 2014. Are we there yet?

2014-04-09 Thread Sam Gleske
On Wed, Apr 9, 2014 at 1:20 PM, Kapil Aggarwal ka...@hotmail.com wrote:

 -   I don’t even know what I need. – Well, assuming they are starting
 to recognize the need, I suspect they will find out relatively easily as to
 what they need. With a few caveats of course. There’s way more FUD/noise/BS
 out there than the average person can decipher, so it’ll probably end as
 being word-of-mouth recommendations or such.
 -   Even if I know what I need, getting it/installing it is hard. – It
 is. The setup/install needs to be simpler, i.e. as simple as installing an
 “app”. That is what the average Joe user is capable of.
 -   WTF is a key pair/public key/private key/insert more arcane
 terminology… -  This IS a big problem. I may get it, you may get it, how
 does the average Joe user gain that understanding? The nomenclature needs
 to be, well, something that the average Joe user can understand as well.
 They understood SSL (well, for the most part).
 -… several more similar arguments.

 Now, what will help drive this adoption more?

 -   A better install experience?
 -   A “dumbed down” (if you will) taxonomy that they can understand?
 -   Simpler UIs? (without sacrificing secure functionality)
 -   Better integration with existing systems?
 -   Education? i.e. ongoing information dissemination that educates
 people on these things. Newsletters? How tos? Youtube videos (shudder)? And
 others.
 -   Start hitting them on the head with a baseball bat? 


I've actually started talking to my family a lot about using it and getting
my parents to use GNUPG.  I think the biggest problem is too many paths
to accomplish what is needed.  There's so much software and so many
recommendations that you, as an expert explaining to your friends, need to
show them a single path and say, This is how it is done.

I've written a document for my family and regularly link it on facebook
encouraging friends and family to use it.  Warning to PGP experts, the
terminology is dumbed down and the concepts are filtered so not everything
is technically correct but explained in a way that the user can
understand.  Also, it's a few pages of text and mostly screen shots.  I
tried making it fun somewhat so bear with the imagery.

http://www.pages.drexel.edu/~sag47/privacy_for_everyone.pdf

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: It's 2014. Are we there yet?

2014-04-09 Thread Sam Gleske
On Wed, Apr 9, 2014 at 3:23 PM, Daniel Kahn Gillmor
d...@fifthhorseman.netwrote:

 Hi Sam--

 [offlist for now, see why below]

 On 04/09/2014 01:29 PM, Sam Gleske wrote:
  I've written a document for my family and regularly link it on facebook
  encouraging friends and family to use it.  Warning to PGP experts, the
  terminology is dumbed down and the concepts are filtered so not
 everything
  is technically correct but explained in a way that the user can
  understand.  Also, it's a few pages of text and mostly screen shots.  I
  tried making it fun somewhat so bear with the imagery.
 
  http://www.pages.drexel.edu/~sag47/privacy_for_everyone.pdf

 I'm really glad to see popularization of these tools.  thank you for
 writing this up.  i also really like your tinfoil hat photograph :) But...

 i read your disclaimer above, but the document (sha1sum
 6dac22e5fa1095638149a537d6a3b641ad2dd551) has dangerously misleading
 directions.  I strongly recommend you take it down for now while we
 figure out what to do about it.

 I haven't reviewed the whole document yet, but page 15 is particularly
 troubling.  the problem is that you describe the concept of key
 validity, but associate it with key ownertrust.

 key validity is does this key belong to a person whose name and e-mail
 are indicated in the User ID?

 key ownertrust is am i willing to rely on identity certifications made
 by the holder of this key?

 These are entirely separate questions.  I may know for sure that my
 boss's key belongs to my boss, but i don't want her to be able to create
 a new key that appears to belong to my husband, certify it, and send me
 mail that would then appear to come from my husband.  Even worse, i
 wouldn't want my mail to my husband to be encrypted to this bogus key,
 because my boss could then read the contents of the mail.

 There are other problems with the text, including (from a quick skim,
 not exhaustive, ordered from trivial to security-critical):

  * page 17 is far too much information about a useless-at-best feature
 (see [0])

  * the document recommends the use of pgp.mit.edu instead of the
 standard pool.sks-keyservers.net

  * the document discourages the creation of revocation certificates

  * page 11 seems to assume that asking their key ID is sufficient to
 verify identity, though this is distinctly not the case [1].  this is
 seriously insecure.  I can send you a new OpenPGP key show private half
 i control, but with your user ID and your keyID later if you need
 convincing. :/

 I recommend you read the riseup/debian OpenPGP best practices document
 [2] and the GnuPG DETAILS document and consider trying to align your
 document with the information and recommendations in those materials.

 I've left this message offlist for now, because i'm hoping you'll follow
 up on the message publicly and make it clear what your plan is with this
 document;  If you'd like, either you or i can post these concerns
 publicly, and we can have the discussion on-list.  But i think a quick
 note from you asking people not to rely on the current draft of that
 document while you revise it for clarity and correctness would be great.

 let me know what you think.  sorry to send you a lengthy critique, and i
 hope it doesn't discourage you from continuing to spread the word about
 encryption.  It's just important to avoid making recommendations that
 give people a sense of security that turns out to leave them vulnerable
 in hidden ways.

 All the best,

 --dkg

 [0] https://www.debian-administration.org/users/dkg/weblog/98
 [1] https://www.debian-administration.org/users/dkg/weblog/105
 [2] https://we.riseup.net/debian/openpgp-best-practices



I agree with your concerns.  In reality I only started using GPG a few
weeks ago which would explain my amateurish approach I suppose.  There is a
source document written in openoffice...

http://www.pages.drexel.edu/~sag47/privacy_for_everyone.odt

Also, I have created sha1 files... just append *.sha1 to the file name e.g.
http://www.pages.drexel.edu/~sag47/privacy_for_everyone.odt.sha1

For now I have removed the PDF since I have widely distributed the link to
the PDF so that people don't download it and receive misinformation.

The odt file remains.  I'm open to editing the document for clarity and
fact checking.  Once, an acceptable revised copy is well received on the
list then I'll recreate a PDF and upload it again.

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Heartbleed attack on Openssl

2014-04-09 Thread Sam Gleske
On Wed, Apr 9, 2014 at 6:45 PM, Pete Stephenson p...@heypete.com wrote:

 On Apr 10, 2014 12:22 AM, Felipe Vieira fmv1...@gmail.com wrote:
 
  So going back to the original question as I can see there is no
 disagreement on its importance:
  1) What are the consequences to the ordinary user?
  All the news are lacking information on that. Can you point relevant
 examples?

 In short: the consequences could be dire but there is no way of knowing
 for certain what, if any, things have been compromised. Its probably best
 to assume the worst.


^ That.  Assume the worst because the vulnerability was there for two
years.  Not sure who you're having a hard time convincing but send them to
heartbleed.com.  The first three paragraphs are for high flying executives
whose business critical documents are at risk.

  For example: Gmail and Dropbox and Hotmail seem to be imune to this. I
 also found out that Mozilla/Firefox browser were also imune. If I would
 persuade someone of this bug's importance, which other examples could I
 give?

What type of person are you trying to persuade?  If you download any of the
vulnerability test scripts in the wild you'll notice that the 64k output is
truncated and the script simply states you're vulnerable.  Edit that
script so that it dumps the full 64k.  While you're at it put that script
in an infinite while loop and dump the output to a file on disk.  Then use
Firefox or chrome or whatever browser you want and log in to the service.
When you're done search the file for your credentials.  It doesn't matter
what browser you're using.

  2) (specific question) Does Firefox use openssl to connect to some
 servers while browsing?

 No. Firefox is immune because it uses the NSS Crypto library.

I have verified this claim.  (Firefox Version: 28.0+build2-0ubuntu0.12.04.1)

$ dpkg -L firefox | while read x;do [ -f ${x} ]  (if ldd ${x}
2/dev/null | grep libssl /dev/null;then echo ${x};fi);done | while
read x;do echo ${x};ldd ${x} 2/dev/null | grep libssl;done
/usr/lib/firefox/components/libmozgnome.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7ffd9d836000)
/usr/lib/firefox/components/libdbusservice.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7f778ceda000)
/usr/lib/firefox/libxul.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7f326e66)
/usr/lib/firefox/browser/components/libbrowsercomps.so
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7fa4537f3000)
/usr/lib/firefox/plugin-container
libssl3.so = /usr/lib/x86_64-linux-gnu/libssl3.so
(0x7f0807de7000)

$ dpkg -S /usr/lib/x86_64-linux-gnu/libssl3.so
libnss3: /usr/lib/x86_64-linux-gnu/libssl3.so

If it was openssl then it would be linked to
/lib/x86_64-linux-gnu/libssl.so.1.0.0 which is a part of the libssl1.0.0
package which is a dependency of the openssl package.

 The issue typically exists on and affects servers. A server using an
 affected version of OpenSSL is vulnerable regardless of what browser
 clients use.

While it's true Firefox does not link openssl in binaries the vulnerability
allows an attacker to easily hijack sessions, steal usernames and
passwords, and steal the server private key during the SSL negotiation
phase.  See my comments above for how you can verify that.

  3) How about Ubuntu and other OSs? Do they use openssl to update
 themselves? (as in apt-get update  apt-get upgrade).

 Ubuntu and Debian use GnuPG to sign packages but updates typically take
 place over unencrypted connections. The update mechanism is not affected by
 this bug.

True.  $ grep -rH 'http:' /etc/apt/sources.list*

I'm not sure who you're trying to convince, Felipe, but HOPEFULLY you have
already handled this bug by patching and added rules to your intrusion
detection system for packets trying to attack SSL using this method (the
attack packets look very different from normal SSL communication).

Pete, forgive me breaking down your reply but I found it a good exercise in
attempting to verify your claims.

Environment
KUbuntu 12.04.4 LTS
Linux 3.8.0-37-generic x86_64

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Removing old preferences from exported key

2014-04-08 Thread Sam Gleske
There is also the clean command which cleans up old self sigs (among other
things like unusable sigs, e.g. expired signatures).


On Tue, Apr 8, 2014 at 1:48 AM, Johan Wevers joh...@vulcan.xs4all.nlwrote:

 On 07-04-2014 15:16, David Shaw wrote:

  When you change preferences you add another selfsig for your
  user ID that contains the new preferences.

  If you want to make the old preferences go away completely,
  you can simply delete the old selfsig via delsig

 Yers, that removes it completely from my keyring. That's not necessary
 and will be undone after the first sync with the keyservers anyway.

 However, is there a way to remove it from the exported key only - to
 keep the size of the exported key as small as possible? The export
 options didn't do that as list-packets showed.

 --
 ir. J.C.A. Wevers
 PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Length for AES256 symmetric encryption passphrase?

2014-04-04 Thread Sam Gleske
On Fri, Apr 4, 2014 at 10:46 AM, Sam Gleske sam.mxra...@gmail.com wrote:


 On Fri, Apr 4, 2014 at 2:04 AM, Robert J. Hansen r...@sixdemonbag.orgwrote:

 Using plain English for the passphrase, a 170-character passphrase is
 necessary to provide a full 256 bits of entropy.


 Interesting math.  However, I believe the OP mentioned they're generating
 the password and storing so human readable, i.e. English, isn't an issue.
 What would be the recommended length for completely random characters
 generated, for example, by a password manager such as keepassx?


To clarify and be more specific... if one were using the password as the
symmetric key in the GPG software (libcrypt)?  Or perhaps even just using
openssl tools?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Length for AES256 symmetric encryption passphrase?

2014-04-04 Thread Sam Gleske
On Fri, Apr 4, 2014 at 2:04 AM, Robert J. Hansen r...@sixdemonbag.orgwrote:

 Using plain English for the passphrase, a 170-character passphrase is
 necessary to provide a full 256 bits of entropy.


Interesting math.  However, I believe the OP mentioned they're generating
the password and storing so human readable, i.e. English, isn't an issue.
What would be the recommended length for completely random characters
generated, for example, by a password manager such as keepassx?

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using an RSA GnuPG key for RSA ?

2014-04-03 Thread Sam Gleske
On Wed, Apr 2, 2014 at 3:14 PM, Leo Gaspard ekl...@gmail.com wrote:

 Were you to use the key both for gnupg and other systems, I would
 understand,
 but doing things this way...?


I think generally it would be bad practice either way.  A compromised
server happens more often than a compromised gpg key.  Therefore if a
server gets compromised effectively your gpg private key has been
compromised.  It would be best to keep them separate entirely and not reuse
the RSA key pair anywhere else.  Treat your gpg private key like your
identity (i.e. social security number) because it really is your
identity... unless you want to go through the hassle of generating a new
key and having your web of trust go through the hassle of resigning it when
your RSA key gets compromised on a server.

openssl tools are simple enough that generating throw away RSA keys is a no
brainer.  The same goes for most applications that support RSA keys.

SAM
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Length for AES256 symmetric encryption passphrase?

2014-04-03 Thread Sam Gleske
You're making the assumption that 32 ASCII characters can produce every
possible binary combination in 256 bits.  I don't know how AES handles
password phrases longer than 32 bytes but the key can be stronger I'd
imagine with more random data as the key.  I'm simply presuming.


On Thu, Apr 3, 2014 at 5:21 PM, Barnet Wagman b...@norbl.com wrote:

 This a rather naive question, but I haven't found and answer to it. When
 doing symmetric encryption with AES256, is there any reason to have a
 passphrase that exceeds 32 characters (since that's the length of the AES
 key)?

 thanks

 ___
 Gnupg-users mailing list
 Gnupg-users@gnupg.org
 http://lists.gnupg.org/mailman/listinfo/gnupg-users

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Encrypted file-size approximation with multiple recipients

2014-04-01 Thread Sam Gleske
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512



On April 1, 2014 9:01:28 PM EDT, Tim Chase gn...@tim.thechases.com wrote:
I've been trying to find a good explanation on how something like

  gpg -r DEADBEEF -r CAFEBABE -r 8BADFOOD -o output.gpg -e input.txt

works.  The best I've been able to find is this:

http://lists.gnupg.org/pipermail/gnupg-users/2007-October/031938.html

I'm mostly interested in the overhead, so I set up 4 distinct
homedirs for testing.  It looks like each additional recipient adds
about 271 bytes (though one of them only has an extra 270 bytes), and
there's a per-file overhead of about 66 or 67 bytes.

So from my experimentation, the final file-size ends up being
something like

  input_file_size + 67 + (271 * recipient_count)

but I'm not sure how much that might change based on conditions I'm
not taking into consideration (all my test GPG users were just
g...@example.com, g...@example.com, etc), all with 2048-bit keys.

Is there a more formal formula that can be used to approximate the
overhead of multi-recipient encryption?

Thanks,

-tkc

After reading in the gpg man page different recipients can have different key 
sizes.  Additionally gpg will look at the supported cipher algorthms of all 
recipients and attempt to choose an algorithm common between them.

That means your calculations aren't accounting for the different key sizes nor 
is it accounting for the size of the session key (session key is for the 
symmetric algo).

You can go about this one of two ways.  You can try write a program smart 
enough to account for that or you can keep it simple.

KISS: assume worst case for every recipient and then do the math.  e.g. 4096 
bit rsa keys with AES256 cipher algo for the session key (assuming AES256 has 
the largest session key).

At least that's how I would tackle it.

SAM
- --
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-BEGIN PGP SIGNATURE-
Version: APG v1.1.1
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=ku2m
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users