Re: OT: Best way to send e-mails to a recipient that does know encryption

2024-01-02 Thread vedaal via Gnupg-users


On 1/2/2024 at 9:26 AM, "Ingo Klöcker"  wrote:

>Posteo will release data to authorities if they are forced to do 
>so by a 
>judicial order. See their transparency reports for details:
>https://posteo.de/en/site/transparency_report
>
>I'm still using Posteo.

=

Another option is Hushmail.

It allows to send encrypted mail to someone who has no encryption experience 
and to any email address.

The Receiver agrees on a passphrase with the Sender, and the Sender sends the 
encrypted email.

The Receiver gets a notice in whatever email he/she is using, with a link to a 
site on the hushmail server.

The Receiver clicks on a link, and Hushmail requests  a passphrase.  Only 3 
attempts are allowed.  The message is erased on the 4th try.

The message is also erased after 72 hours from the time it is sent.  If the 
passphrase is correct, it displays the plaintext of the message.

Again, if you are suspected of being a terrorist or a human trafficker, and Law 
Enforcement gets a convincing order, they will release your information.

They are based in Canada.   Price is 49 US$ / year.   Allows for unlimited 
aliases, (that haven't already been taken).

If anyone wants to try out the encryption, please send me an email, and tell me 
what you want your passphrase to be.


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ADK's

2023-04-30 Thread vedaal via Gnupg-users


There are 2 simple workarounds to employment ADK's  :
[ 1 ].  Send a symmetrically encrypted message to the key with the
ADK(This will require an agreed upon symmetric passphrase communicated
in person, phone, or another non-ADK manner)
[ 2 ].   Generate a non-ADK key, not uploaded to any server and send
and receive messages with a hidden-ID option, and keep this key on a
separated keyring. This can be communicated symmetrically as in [ 1 ].

vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Status of original PGP?

2022-09-07 Thread vedaal via Gnupg-users

On 9/7/2022 at 6:14 PM, "Robert J. Hansen via Gnupg-users"  wrote:On a
lark I went looking for the current iteration of PGP.  It was 
bought by Symantec some years ago, and the last I heard they'd renamed

it to "Symantec Encryption Desktop".  However, Symantec no longer has
it 
available for sale or download, and scouring their site turns up 
basically nothing.

Does anyone know what happened to PGP?

=

There is still a source for PGP freeware for PGP 8.0 and
earlier:http://www.pgpi.didisoft.com/products/pgp/versions/freeware/
(I followed the successive links and then got an error page, but if
this is still considered freeware for non-commercial use, then it is
archived somewhere...   https://zedz.net/ )
Vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Backing up your PGP key by hand

2022-05-29 Thread vedaal via Gnupg-users
On 5/26/2022 at 12:52 AM, "Robert J. Hansen via Gnupg-users"  wrote:
So, yeah.  I'm going to be solidly on the side of "no, really, paper
is
a magic technology, just be sure to talk with an archivist first to
ensure you're using the right kind of paper."

=

The other thing to consider is the Ink. 
In Ancient and Medieval times,  the ink was not standardized, and
varied in the quantity of the ingredients.  All were permanent but
some were too acidic and burned through the paper. Many monastery
manuscripts centuries old are still in very good condition.

Today there are "Bulletproof" permanent inks
(not resistant to real bullets, but resistant to water, alcohol,
bleach, soap, and known solvents.) 
https://www.jetpens.com/blog/Noodler-s-Fountain-Pen-Inks-A-Comprehensive-Guide/pt/902#bulletproof

The Noodler Eternal inks are available in a larger variety of
permanent colors, and are all fountain pen safe. 

https://noodlersink.com/product/19208-eternal-polar-blue/

Vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: Changing the encryption algorithm used for PGP/GPG private key

2022-02-18 Thread vedaal via Gnupg-users


On 2/18/2022 at 3:12 AM, "Daniel Colquitt via Gnupg-users"  wrote:Just
to follow up that this isn't a gpgwin problem. I have a Debian
installation and generated a test key using GnuPG and the same
gpg.conf file

=

Try this:
In gpg.conf file add the option of
--expert
and in personal preferences, list only AES 256,
Not the other strengths. 
Keep all of the s2k options you listed, and try generating a new key
again
Vedaal ___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: First Amendment and Marines?

2022-01-29 Thread vedaal via Gnupg-users


On 1/29/2022 at 11:06 PM, "Mauricio Tavares via Gnupg-users"  wrote:
> The patient can choose any, all, any combination, or none of them.
> And still get treatment.
>
  Can you provide which regulation states that? I could have used
it many times.

=

It's in the HIPPA act which requires the patient's consent to share
the date, and is in the pre-treatment or pre-hospittalization consent
form itself.
The worst the hospital can do, if the person refuses release to the
Insurance Company, is to bill the patient as self-pay.
The hospital cannot refuse treatment.
Can't speak about Covid, because  *The Science* seems to vary between
conservative and liberal states.
There are many horror stories, but it is not for this mailing list.
Vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pgp263iamulti06

2022-01-29 Thread vedaal via Gnupg-users


On 1/29/2022 at 11:02 PM, "Robert J. Hansen"  wrote:> Please
comment if this is adequate, or there is still a problem with
> Disastry's Linux Version.

Why?

I've been trying to get people to move to OpenPGP for literally a 
quarter-century, Vedaal.  I'm not going to suddenly switch gears and 
work on giving people reasons *not* to migrate.
=
I have publicly posted here that GnupG should not have to make a
considerations with backward compatibility with Disastry's version,
those who use Disastry's version among each other will continue to do
so, and among those who communicate with GnuPG user's, will use GnuPG.

If person1 has a signed and encrypted email to person 2, but which
used IDEA and MD 5, and now wants to decrypt, and re-encrypt and sign,
and send to person 2, who will then destroy the original email, why
shouldn't they be allowed to know if this is safe.  They still use
GnuPG for current email and will not be discouraged by knowing that
there is a safe way to do this in Linux based Diastry's version, which
cannot be sent to person 2's v3 key in GnuPG 2.x

vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: First Amendment and Marines?

2022-01-29 Thread vedaal via Gnupg-users
On 1/29/2022 at 5:39 PM, "Mauricio Tavares via Gnupg-users"  wrote
  Not quite. It cares about personal data from people residing in
Europe at the time said data was collected. And even then, you need to
be targeting EU/EEA residents. So, if a German citizen goes to FL and
needs to stop at the emergency care to have a shark bite taken care
of, that data now is owned by the hospital forever, which will figure
out how to make money with it without asking permission.

=

This is NOT true, 
(but may make sense to someone who has never been a hospital patient
in the US.)

Every hospitalized patient is given a consent form prior to treatment,
which they may edit or refuse to sign.
-It allows release of medical information to the Insurance Carrier, 
-to the Patient's private Physician, 
-to a third party designated by the patient as a 'next-of-kin-with
medical proxy', should the patient not be in a condition to make
decisions, 
-or to a third party statistical group following the frequency and
outcome of a particular condition requiring hospitalization.

The patient can choose any, all, any combination, or none of them. 
And still get treatment.
Vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Side-channel attacks

2022-01-18 Thread vedaal via Gnupg-users


On 1/18/2022 at 11:26 AM, "Robert J. Hansen via Gnupg-users"  wrote:>
1.4 should be able to decrypt all 2.6 generated data.

Not from the Disastry builds, which extended 2.6 to support newer 
algorithms.

=
1.4 still can decrypt and verify anything in Disastry's last build. 
He died before he could implement Camellia. 

I have been using it since it came out, and 1.4 can easily decrypt and
verify, but there is a simple procedural issue.:
1.4 decides that when it sees a v3 key, it tries to decrypt Idea and
verify md5. Which works perfectly for 2.6.x.

In order for 1.4 to decrypt and verify messages done with other
encryption algorithms and signing algorithms, the name of the signing
algorithm and the name of the encryption algorithm need to be included
in the command line. 
If this is cumbersome, so just continue to use Disastry 2.6 to decrypt
and verify. 
It's not gnupg's problem. 

Vedaal 
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Side-channel attacks

2022-01-16 Thread vedaal via Gnupg-users


On 1/16/2022 at 6:12 PM, "Robert J. Hansen via Gnupg-users"  wrote:On
this mailing list we sometimes see requests for help from people 
running dangerously antique versions of GnuPG.  Wasn't all that long
ago 
I was asked for help with something in the 1.2 series (!!).  Without 
exception, our first response is usually "for the love of God,
upgrade!"

They rarely do.  It's worked fine for them for a decade or more, and 
they're not going to change...

=

There is also the vulnerability of the 'shortcut' of decrypting
symmetric encryption, and how that needed to be upgraded to versions
where it was fixed.

Vedaal ___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG - signed Telefax communication

2022-01-14 Thread vedaal via Gnupg-users


On 1/14/2022 at 11:46 AM, "Стефан Васильев via
Gnupg-users"  wrote:Hi all,

If people have a modern Telefax machine, have you ever
tried out to send a GnuPG signed Fax?

=
You can simply armor sign the message. 
Don't bother with the 'begin' and 'end' part, it can be added on the
receiving end. 
OCR it into telefax and send. 
I have never done this, and the few times I have tried similar things,
the OCR always made mistakes. 

Anyone used an OCR program that reliably could get a page of gnupg
block ciphertext
Without mistakes
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Install gnupg on Linux machine ( For gpg encryption & decryption )

2022-01-04 Thread vedaal via Gnupg-users
On 1/4/2022 at 7:23 AM, "Rayapati Rama Rao (NCS)"  wrote 

Could you please let me know which gnupg software to download for
Linux machine to make use of gpg encryption & decryption. 

Also, may I know if any packages required to install on Linux prior
to gnupg installation. 

If possible could you please provide me the steps to install gnupg on
Linux machine.  

= 

Here is the Gnupg site for Gnupg downloads. 

The Linux links are listed below the ones for Windows and Mac. 

https://gnupg.org/download/index.html

Once gnupg 2.2.33 is installed on your Linux system, you can download
Kleopatra as an easy gui front end.

https://www.openpgp.org/software/kleopatra/

If you do not especially need the Linux version you are using, I
would highly recommend the Ubuntu 20.x LTS (long term support). It
already has Gnupg installed by default when you download the  .iso

https://ubuntu.com/download#download

All the Best 

Vedaal  

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Detaching signature from signed object

2021-06-21 Thread vedaal via Gnupg-users
On 6/20/2021 at 2:13 PM, "Matthew Richardson via Gnupg-users" 
wrote:Is there any way in GnuPG to detach (or extract) a signature
from a signed
object?  For example, a signed object is created with:-

>gpg --armor --output signedfile.asc --sign inputfile.txt

where what is wanted is a detached signature which would verify
against
inputfile.txt.

This feature is in PGP 2:-

>pgp -sa inputfile.txt -o signedfile.asc
>pgp -b signedfile.asc -o verified.txt

which also produces verified.pgp as the detached signature.  The
feature is
described (briefly) in the PGP 2 documentation thus:-

>To detach a signature certificate from a signed message:
> pgp -b ciphertextfile

=
Don't know how to do this in GnuPG.

Cannot be done in the PGP  commandlines later than 2.x with the -b
command.
Using the -b command in later PGP commandline versions, just decrypts,
but does not save the signature.

There is a program that can do this for DH keys, using the -b command
but only when encrypted with AES or 3DES:

Filecrypt
https://m.majorgeeks.com/files/details/filecrypt.html

(n.b  I have NOT used 'this' version, but I did use the original
Filecrypt when it first came out , to successfully use the -b
command):
https://www.angelfire.com/pr/pgpf/fcs.html

The developer of Filecrypt is accessible in a link when downloading
the Filecrypt on the majorgeeks site mentioned above.
You might consider discussing a version of Filecrypt with him for your
detached signature use.

vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

[no subject]

2021-05-04 Thread vedaal via Gnupg-users
On 5/4/2021 at 1:19 PM, "Ingo Klöcker"  wrote:I'd always use full
disk encryption ideally with the key stored on a USB
token. Otherwise, with a very good passphrase.

And, after use, wipe the disk and destroy the token.

Modern enterprise-level SSDs also have secure erase, but, of course,
you'd
have to trust the hardware manufacturer to implement it properly
without any
backdoors which you probably don't want to do in the above scenario.

=

Or, for the really paranoid ;-)you can have random data on a read-only
mini cdrom,and use it as an OTP, and throw it into a garbage
incinerator afterwards.
But really,  if anyone is up against adversaries where this is
necessary,this methods may ultimately not help.
These adversaries are not known for their honor and fair play ...
vedaal

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How would you do that ...

2021-05-04 Thread vedaal via Gnupg-users
Or, for the really paranoid ;-)you can have random data on a read-only
mini cdrom,and use it as an OTP, and throw it into a garbage
incinerator afterwards.
If you are up against adversaries where this is necessary,this methods
may ultimately not help ...
=

On 5/4/2021 at 1:19 PM, "Ingo Klöcker"  wrote:On Dienstag, 4. Mai
2021 18:47:50 CEST Robert J. Hansen via Gnupg-users wrote:
> For modern SSDs I generally recommend a single pass with random
data:
> 
> dd if=/dev/urandom of=/dev/foo bs=1M
> 
> (Don't forget the blocksize [bs] parameter; it can improve speed
> significantly.)
> 
> This is enough to foil the vast majority of forensic analysis.  Yes,
> yes, SSDs have remapping capabilities which means certain memory
cells
> won't get hit even if you do this, and it's theoretically possible
for a
> good forensics nerd to do all kinds of wild magic to pull off data
you
> didn't even know was there... but that kind of very high-level
forensics
> nerdery costs a lot of money, and few people are worth that kind of
> investment.

I'd always use full disk encryption ideally with the key stored on a
USB 
token. Otherwise, with a very good passphrase.

And, after use, wipe the disk and destroy the token.

Modern enterprise-level SSDs also have secure erase, but, of course,
you'd 
have to trust the hardware manufacturer to implement it properly
without any 
backdoors which you probably don't want to do in the above scenario.

Regards,
Ingo___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: question - Gnupg compatibility with Symantec

2021-03-09 Thread vedaal via Gnupg-users


On 3/9/2021 at 4:46 AM, "Margaret via Gnupg-users Call"  wrote:  

We would like to migrate our Symantec PGP to GNU PGP.  We tested the
system last week with new PGP users and a user that migrated to GNU
from Symantec.  We have fixed all bugs except one: 
Our legacy Symantec users (who have not yet transferred over to GNU)
are unable to decrypt/read GNU PGP emails.   

 =

What type of key, and what encryption algorithm do your Symantec
users have?

What error messages do you get?   ___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

re: How can I add encrypted comments

2021-01-14 Thread vedaal via Gnupg-users
vedaal at nym.hush.com vedaal at nym.hush.comwrote on Thu Jan 14
19:37:37 CET 2021:
>but functionally, yes, it can be done.- my mistake. Can't really
be done this way :-((= >[1] Armor the signature file ( gpg --armor
filename.sig ) -should be enarmor instead of armor :-( this
outputs to filename.sig.asc [2[ Armor your encrypted comments, and
copy them to the end of thefilename.sig.asc,
 (leave one blank line between the pgp footer of the signature
file,and the pgp header of the encrypted file) [3] Save the whole
thing as filename.sig.asc [4] gpg filename.sig,asc will automatically
verify the sig if theoriginal signed file 'filename' is present, and
also decrypt the addedcomments-It doesn't.It gives weird error
messages.sorry ;-(
vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How can I add encrypted comments.

2021-01-14 Thread vedaal via Gnupg-users
On 1/14/2021 at 4:47 AM, "Ayoub Misherghi via Gnupg-users"  wrote:
body p { margin-bottom:0; margin-top:0; }   
I am encrypting and signing documents with myself as the  
receiver. Nobody else will want to look inside them. Is it  
possible to add encrypted comments or other information to a  
separated signature file; and later retrieve this additional  
information? I want to be able to decrypt the signature file alone
  and retrieve all the information I put inside it.
=

Not exactly, 

but functionally, yes, it can be done.
[1] Armor the signature file(   gpg --armor filename.sig  )  
this outputs to filename.sig.asc
[2[ Armor your encrypted comments, and copy them to the end of the
filename.sig.asc,

(leave one blank line between the pgp footer of the signature file,
and the pgp header of the encrypted file)
[3] Save the whole thing as filename.sig.asc
[4] gpg filename.sig,asc  will automatically verify the sig if the
original signed file 'filename' is present, and also decrypt the added
comments
vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Password Decript GPG public key

2020-08-25 Thread vedaal via Gnupg-users



On 8/25/2020 at 3:21 PM, "Stefan Claas"  wrote:


>Maybe he could try to use a secret key without a passphrase and 
>give then the secret key personally to his friend?

=  

And just have the ascii armored text of the secret key as the passphrase for 
the symmetrically encrypted text?

There still needs to be a way to 'enter' it as the 'passphrase'.   If the OP 
doesn't mind saving it in a file-decsriptor way, that would work,
but it would work the same as the secret key had a passphrase, or even if it 
was an unpublished public key.


vedaal




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Password Decript GPG public key

2020-08-24 Thread vedaal via Gnupg-users



On 8/24/2020 at 8:36 AM, "Guille De La Torre via Gnupg-users" 
 wrote:
>
is it possible to create a key for symmetric encryption
>in such a way that the person who has my public key does not need 
>to enter a password? to decrypt.

=
  No. and Yes.8^)

It is not possible that the person does not have to enter 'anything' to decrypt.

But is it possible for you both to have a secret symmetric passphrase you share 
by sending your public key, if you create a public key,
and don't post it anywhere or encrypt or sign anything with it, and send that 
public key, encrypted, to the intended receiver's public key.

Now, use the key name and long fingerprint as the password for the symmetric 
encryption.

Example:

Here is a key created for this purpose:

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v2
Comment: Acts of Kindness better the World, and protect the Soul
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=tAGm
-END PGP PUBLIC KEY BLOCK-


Importing the key gives the following information:
User-ID:
mxtzphu.klemauj (non-publicized key) 
Validity:
from 2020-08-24 15:10 until forever
Certificate type:
2,048-bit RSA
Certificate usage:
Signing EMails and Files, Encrypting EMails and Files, Certifying other 
Certificates
Key-ID:
DFD35F5D
Fingerprint:
9D7ECA9BEDF40F804EB26A3C25FF072DDFD35F5D

The user id and email address were done by typing semi-randomly at the keyboard.

Now use the userid and the long fingerprint as the passphrase for your 
symmetric encryption:

mxtzphu.klemauj@qwejidnalldiopxz.wdb9D7ECA9BEDF40F804EB26A3C25FF072DDFD35F5D

Only you and the person you send this key to, will be able to decrypt your 
symmetrically encrypted messages.


vedaal





___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: In case you use OpenPGP on a smartphone ...

2020-08-17 Thread vedaal via Gnupg-users



On 8/15/2020 at 1:02 PM, "Stefan Claas"  wrote:

>Ok, worked! :-) SHA256 hashes matched from both devices.
 =
Great to hear!
-

>Only thing I have to do is purchasing an sd memory card, because 
>the regular memory is to low.
=
If you can afford it, there are 1 TB microsd cards available:

https://www.amazon.com/SanDisk-Extreme-microSDXC-Memory-Adapter/dp/B07P9W5HJV/ref=sr_1_2?crid=LIUTHCJU5JEA&dchild=1&keywords=1tb+sandisk+micro+sd+card&qid=1597692282&sprefix=1+tb+sandisk%2Caps%2C507&sr=8-2:

I have the 1tb sandisk microsd for the phone (my smartphone is a sony xperia z2 
premium. I'm in love with the camera and optics, and watch all my videos and 
amazon prime on the phone). Point is, official specs says it only accommodates 
a 250 gb microsd. This is not true.  Even older galaxy androids that officially 
say accommodates a 64 gb card, also accommodated a sandisk 400 gb card.  As 
long as there is a microsd slot, it accommodates any size.

*BUT*

The vast majority of 1 TB cards, are COUNTERFEIT, and don't ho;d more than a 
nominal minimal amount!
Even the Kingston ones, unless you get them from Kingston itself, are very 
convincingly appearing fakes.

I have been using sandisk since 64gb, then 128, then 400, and now 1 tb. and all 
of them worked, and got them all on Amazon.

If you know from people who actually used them, of other brands on Amazon that 
are trustworthy, maybe you can get a good card for less.

Even If you don't need more than 64gb, I would still recommend a Sandisk newer 
64gb card, because of the much faster transfer rates.


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: In case you use OpenPGP on a smartphone ...

2020-08-11 Thread vedaal via Gnupg-users



On 8/11/2020 at 3:00 PM, "Stefan Claas"  wrote:

...

>As understood a Pegasus operator can do what ever
>he likes to do remotely, anonymously with our (Android/iOS) 
>smartphone, without that we know that this happens.

...

>in form of a best practice FAQ (cross-platform), to no longer use 
>encryption software on online devices and work out
>strategies to use offline devices and how to handle this data 
>securely over to an online device, until proper and affordable
>hardware encryption devices for online usage are available?

=

There is already a simple existing solution.

[1]  Encrypt and decrypt on a computer that has internet hardware disabled.

[2] Use an Orbic Journey V  phone that gets and sends *only text*

[3] Use a microsd expansion card on the orbis phone

[4] set up the phone to save encrypted texts on the microsd 'storage' card

[5] Take out the microsd card and use a card reader in the computer in [1] 
transfer text only (encrypted or decrypted) 

Any file can be sent as encrypted text by using the armor option -a on the 
GnuPG command line.
(this includes audio, video .jpg, .png, pdf,  etc.literally any and all 
possible file types.)

Even if the Orbic uses the *unknown* system, if your are encrypting and 
decrypting on a separate air-gapped computer, and transferring only text to a 
microsd, it is hard to see how it can be compromised.
(Yes *Anything* can happen, but without evidence, there is no end to paranoia)

It is not the place of the FAQ to solve the transmission issues of an already 
perfectly formed GnuPG encrypted .asc file.

The manual and/or FAQ, tells how to use GnuPG to encrypt or decrypt the file, 
and armor it.

The rest is up to the User's threat model.

(btw,   
There is, [afaik], no protection available in GnuPG
against a Clairvoyancy attack vector on an encrypted file even in an air-gapped 
computer,
and there is a rumour that any Witch or Wizard can instantly behold the 
plaintext of an encrypted message 
by flicking a wand at it, and using the simple charm   'Revelato')  

but not really in my threat model   8^


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: "encrypted with 1 passphrase"

2020-07-31 Thread vedaal via Gnupg-users


>On 2020-07-29 at 10:20 -0700, Ayoub Misherghi via Gnupg-users 
>wrote:
>> A gpg says "encrypted with 1 passphrase". Are there situations 
>where a message gets encrypted with multiple passphrases?

=

Not exactly, 
but there are situations where GnuPG can simultaneously encrypt conventionally 
with a passphrase, and also to a Public Key

Here is an example:

-BEGIN PGP MESSAGE-
Version: GnuPG v2
Comment: Acts of Kindness better the World, and protect the Soul
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=H/WI
-END PGP MESSAGE-

This was encrypted simultaneously conventionally, and to a test key 1, and, 
(by default, also to my default key).

The command used to encrypt is:
gpg -a -c -e -r 1 c:\h\jadeT1.txt

this produces the encrypted file jadeT.txt.asc  (listed at the beginning).

The passphrase is sss


Here is the keypair of the public key 1 that the message was simultaneously 
encrypted to, 
(an RSA V4 key, but generated many years ago in GnuPG 1.x):

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1
Comment: Acts of Kindness better the World, and protect the Soul
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=9vYT
-END PGP PUBLIC KEY BLOCK-

-BEGIN PGP PRIVATE KEY BLOCK-
Version: GnuPG v1
Passphrase 1
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Re: Traveling without a secret key

2020-07-08 Thread vedaal via Gnupg-users



On 7/8/2020 at 3:49 PM, "Juergen Bruckner via Gnupg-users" 
 wrote:

>Basically, it has to be said that you should definitely have a 
>backup of your key. And you have to be very careful with your SC or tokens.
>In principle it is almost the same as losing your credit card or
>passport etc. while traveling; you have to provide alternatives 
>(e.g.
>multiple smartcards).

=

There is an alternative travel approach that works for me:

[1] No real keyring on my laptop, (just a dummy one to be able to use GnuPG 2.x 
on the laptop)

[2] Bootable 1 tb usb,(same size as ordinary usb drive), which has bootable 
ubuntu OS on it, 
with the keyrings in a Veracrypt container after Ubuntu loads.
(Ubuntu allows for the entire bootable drive to be encrypted, doesn't need 
yubi, or other programs. 
It can make the usb drive bootable using ubuntu OS installation options).

Laptop can be used for everything not requiring a secret key.

In event that a secret key needs to be used, (decrypt, sign, authenticate, 
etc), the laptop can be booted from the usb drive.

Also, have a backup of the keyring in a Veracrypt container that easily fits on 
an microSD card on any android phone with microSD slots.


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: decrypt aes256 encrypted file without gpg-agent

2020-06-29 Thread vedaal via Gnupg-users



On 6/29/2020 at 12:40 PM, "Fourhundred Thecat" <400the...@gmx.ch> wrote:

>I don't have gpg-agent installed, on this particular server, where 
>I
>need to decrypt one file.

=
Try this very long workaround :

[1] Install a fake homedirectory
[2] Install a fake keyring (1 public and secret key that you never use)

Then try this command:

gpg --agent-program --no-use-agent --passphrase yourpassphrasestring --decrypt 
filename

This is a way of making the --no-use-agent option active.
GnuPG still needs a homedirectory and a keyring before trying to use the 
passphrase to decrypt

(n.b.  I have not actually tried the above, so am unsure if it is effective)

otherwise , just use GnuPG 1.4.x , and unless you ever need an elliptic key, it 
should do everything you want.

vedaal



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: decrypt aes256 encrypted file without gpg-agent

2020-06-26 Thread vedaal via Gnupg-users



On 6/26/2020 at 4:54 AM, "Fourhundred Thecat" <400the...@gmx.ch> wrote:
>
>Hello,
>
>I have file encrypted with symmetric cipher (aes256) and not 
>signed.
>
>How can I decrypt it without using gpg agent ?
>
>I get these errors:
>
>$ gpg -d file.gpg
>gpg: failed to start gpg agent
>...
>gpg: decryption failed: no secret key

=

Also can't get it without using agent.  
Tried using option of --no-use-agent  and gpg2 says 'obsolete option, has no 
effect'.
The option of --no-default-keyring doesn't help if the home directory is not 
open.

Agent will not start unless home directory is open  ( my home directory is in 
an encrypted container)
Once the home directory is there (when I unencrypted mine), agent starts, and a 
pinentry window opens asking for the symmetric passphrase, 

When I unencrypt the home directory, but not the keyring, 
gpg will still decrypt when using the option of --no-default-keyring

(feature request:  can GPG2 be made to work from only the command-line without 
a pine entry window, and without gpg-agent?)

TIA

vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: The GnuPR FAQ

2020-05-12 Thread vedaal via Gnupg-users
Robert J. Hansen rjh at sixdemonbag.org wrote on
Tue May 12 16:41:09 CEST 2020:

>You can get by just fine in most everyday English with a vocabulary of
>5,000 words.  Stick to those words and you'll have an easy-to-remember
>passphrase.

=

That's absolutely correct, Horse! Battery Staple

https://xkcd.com/936/

8^)

vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: The GnuPR FAQ

2020-05-11 Thread vedaal via Gnupg-users
On 5/11/2020 at 6:15 PM, "Robert J. Hansen"  wrote:
>
>This arrived in my inbox: I'm presenting it here without comment.  
>My
>response will be following in a moment.
>
>
> Forwarded Message 
>Subject:   The GnuPR FAQ
>Date:  Mon, 11 May 2020 14:19:07 -0600
>From:  James Long 
>To:r...@sixdemonbag.org
-
>You've advised people to use a HORRIBLE practice of using 
>dictionary words solely for their password. I tested this theory myself back 
>in the day, so I can 100% guaranty you of this fact: A brute force 
>dictionary based attack can crack a password like that in LESS THAN 5 
>minutes!! 

=
How many words were in your passphrase??

Here is some data on the Diceware list:
https://theworld.com/~reinhold/diceware.html

The Diceware list has only 7776 words.   A complete dictionary has almost 2 
orders of magnitude more.

"Webster's Third New International Dictionary, Unabridged, together with its 
1993 Addenda Section, includes some 470,000 entries. The Oxford English 
Dictionary, Second Edition, reports that it includes a similar number."
https://www.merriam-webster.com/help/faq-how-many-english-words

10 diceware words provides a greater Brute Force space, than 2^128 (a gnupg 
session key for older defaults of CAST-5)
(  7776^10 = 8.08x10^382^128 = 3.40×10^38  )

20 Diceware words  provides a greater Brute Force space, than 2^256
(  7776^20 =  6.53×10^77 2^256 =1.157×10^77  )

Even using only English words greater than 5 letters and unrelated to each 
other, an extremely low-bound estimate, would be 77760 words. (in reality, far 
greater, but let's use an example people would agree on).

So using 8 words chosen semi-randomly from a dictionary, 77760^8 = 1.336×10³⁹, 
still greater than a a 2^128 Brute Force Space.

So, not only is is NOT *horrible* advice, it should be enough for anyone's 
threat model.


vedaal



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Proposal - variable line width for ASCII armor output

2020-02-26 Thread vedaal via Gnupg-users
On 2/26/2020 at 2:03 PM, "Michał Górny"  wrote:
>

>Why 'change it back'?  Unless I'm mistaken, GPG shouldn't have any 
>real
>problem with a different base64 width, as long as the overall 
>layout is
>preserved.  I've just did a quick test and GPG is entirely happy 
>with
>the result after rewrapping at 50 chars, as well as after cheap
>rewrapping with uneven lines.

Yes,
but not if the header, footer, comment line, or checksum are altered.

If a comment line is wrapped, and the new line does not begin with a ':'
 
Example:

This should verify:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

just a test
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
Comment: Acts of Kindness better the World, and protect the Soul

iQIcBAEBCAAGBQJeVsTLAAoJEFBvT6HTX7GGNRIP/1Wf7wnKYc8EF6iff3ZT6x6h
TI/ipE5X5jvQNo+rhsQm2AMQXHfTY7o9gYVFqkpy2XC3mTcKi/kKeFqRr6gHjPZS
DcDhsLlMEMWix/QGx8v8JAARjoaHSoXMIegOjhkjAJs07nz16EbfhIoN9AnKUcap
e4/KqzpVjAjT/Q1kToV8x2gllLBtAnwp/aOG0PAYEFkgOv7RwAKpNblI5+X1skCx
1c00i5J0hyXTmIe2vp2fPJzkyuIqhAkb9IG37rH0Rm1uTq/yIeYEuw16U5OBQABy
JIiBVQQDdClPuAKHKZElT/TfRsfXgDpkj5NTV3AREJGESwrQeqrGdkwU8454pivB
Ukhso5KQ3iseds/qmUSMsb4G8lJ+qu1Hri1GlRGurGcjhwIeQ8TQQ2BfQ8pbVHIZ
UTCOIcqIpHbgAVzRVa/UsUFiqiCkPkS3sHIF1lz5tLbnoC0E1p6e2uA2mlXtvNNt
HaXPFll+Xk7U1/OuNjnFFyjUs30yDpxLT4O+46I/hioH7zGisTFjJO1iEuSO0RqO
QZ3jsyjjBEhIOC9Aiko9FMhXa6MvCqIembcFQUm2v0XoZSl6PBvtBJDmVmGvLt1P
GvSmaHRbRCZaiYk/KmV3d7axJQHXmt2CyFIJvw28yFh85PrGnZN6F/0TZmwZSEKh
fGTZanDrJYrys3425Fd4
=/Rbe
-END PGP SIGNATURE-


This, with the comment line wrapped, will not:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

just a test
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
Comment: Acts of Kindness better the World, and protect the 
Soul
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=/Rbe
-END PGP SIGNATURE-

And, this will verify, but needs the gpg.conf line of  
ignore-mdc-error
ignore-crc-error

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

just a test
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
Comment: Acts of Kindness better the World, and protect the Soul
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/Rbe-END PGP SIGNATURE-


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Proposal - variable line width for ASCII armor output

2020-02-26 Thread vedaal via Gnupg-users



On 2/26/2020 at 11:27 AM, "Stefan Claas via Gnupg-users" 
 wrote:

>I like to make a proposal for future versions of GnuPG,
>where a user can change the line witdh of ASCII armor
>output.

=

It would not be compatible with older versions.

The simplest thing for you, (or any users who prefer the aesthetics of a 
particular custom line width),
would be to first make the GnuPG ascii armored message, then change it as you 
want to and copy, paste, and post,
with a little note of how to change it back for verification.

(fwiw, in my own experience, even the GnuPG clearsigned messages with it''s 
header and footer, are somewhat 'resented' in any non-crypto group, and often 
don't verify anyway because of minor alterations by the media posting)

vedaal




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Maybe a good date to create a new key pair ...

2020-02-03 Thread vedaal via Gnupg-users
On 2/3/2020 at 4:48 PM, "Stefan Claas via Gnupg-users"  wrote:Mark
wrote:

> I know the palindrome day was yesterday (although the article missed
> several others in the 21st century). I am curious on how you were
able
> to create a key with a certain fingerprint.

I used the (Windows) program scallion, from GitHub, with the following
parameters: scallion --gpg -k 2048 02022020

That's all and it took less than five seconds to generate the private
key. :-)

That way you can also create keys with your birthday or deadbeef etc.

After key generation you have to import the private key into GnuPG
with '--allow-non-selfsigned-uid' to add a proper UID and passphrase.

=

So, could you pipe in a script to create a fingerprint with the
following form:

n1 n2 n3 n4 n5 n6 n7 n8 n9 n10 n11 n12 n13 n14 n15 n16 n17 n18 n19 n20
 
n20 n19 n18 n17 n16 n15 n14 n13 n12 n11 n10 n9 m8 n7 n6 n5 n4 n3 n2 n1

where each n is a character of (1, 2, 3, 4, 5, 6, 7, 8, 9, 0, A, B, C,
D, E, F),
and where each n is allowed to be repeated, as long as it is the same
in its' corresponding mirror position,

i.e.,  n1 can = n3  as long as it is present in the first, and third
and thirty-eighth and fortieth position of the fingerprint).

It might not be that simple, but it doesn't seem impossible, to create
a Palindromic fingerprint,
(and just reset your computer clock to 02/20/2020 at 02:20 am)  8^))
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Maybe a good date to create a new key pair ...

2020-02-02 Thread vedaal via Gnupg-users


On 2/2/2020 at 4:44 PM, "Stefan Claas via Gnupg-users"  wrote:Since
this day is so special (for me) I decided to do it again with a new
(RSA)
key. But this time with a 'proper' Fingerprint, to celebrate this day.
:-)

0202 2020 D638 E78F 4DFE  737C 419F 025C 897D B2E6

=

Maybe try generating new keys until you have a keypair of palindromic
primes,
or at least a palindromic fingerprint

http://mathworld.wolfram.com/PalindromicPrime.html

8^))
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Extraction of public key from an encrypted etc. message

2019-11-17 Thread vedaal via Gnupg-users



On 11/15/2019 at 7:26 PM, "Steffen Nurpmeso"  wrote:The 
public key _is_ in there, no?
=
No.

Only the public Key ID is in there, not the entire public key, and and even 
this keyID can be hidden too,
if the sender uses the option of --hidden-encrypt-to


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg encrypt always creates a new encrypted file

2019-10-28 Thread vedaal via Gnupg-users
On 10/28/2019 at 3:43 PM, "Phillip Susi"  wrote:Anil Kumar 
Pippalapalli via Gnupg-users writes:

> Hello,
> I am trying to encrypt a file on my system using gpg —encrypt command but it 
> always creates a new encrypted file I want to overwrite the original file 
> instead so that I can only open it using passphrase. Is this possible.

gpg -encrypt foo && mv foo.gpg foo

=

Alternatively, if you want no record of the plaintext  written to a file at 
all, you can type it into the command line, and have only the encrypted output 
written:

printf "whatever you write as plaintext" | gpg -a -e -r -o -filename.gpg | more

(obviously not intended for big files, or non-text files, but occasionally a 
useful workaround if you aren't comfortable with your system's 'wipe' process.)


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: How to improve our GUIs (was: We have GOT TO make things simpler)

2019-10-05 Thread vedaal via Gnupg-users
On 10/5/2019 at 12:58 PM, "Werner Koch via Gnupg-users"  
wrote:

>I agree with you and, although I sometimes hack on GPA, I would 
>suggest
>Kleopatra.  On Windows Kleopatra and the Explorer plugin do 
>actually do
>what you suggest and we LOTS of folks using Gpg4win.  Be it for 
>plain
>file encryption or for its Outlook plugin.

...

>If you have concrete suggestions for Kleopatra, 

=

Kleopatra already has an export keys menu. 

Right Click on any key, and a menu opens, with the options of 
'Export Key'
and then a separate option of
"Export Secret Keys"

and works on Ubuntu
(and probably on other Linux flavors too, but have not tested them)


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how to recover secret key passphrase?

2019-08-20 Thread vedaal via Gnupg-users
On 8/20/2019 at 12:57 PM, "ilf"  wrote:

> My problem is getting a usable input for john 
>from the current the current private-keys-v1.d/ gpg-agent private key key 
>store format.

=

Try This:

[1] Open a new terminal command prompt window
[2] Type  gpg -a --export-secret-key keyname

The private key block should then appear in your terminal window.

No passphrase is necessary unless you want to 'edit' the key.

This works in both GnuPG 1.x and 2.x 
assuming that your keyrings are in your home directory.

Don't use gpg-agent for this.


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: was Re: PGP Key Poisoner // now "Binding one person's subkey to another person's primary key"

2019-08-13 Thread vedaal via Gnupg-users



On 8/13/2019 at 7:59 AM, "Kristian Fiskerstrand" 
 wrote:

>As you correctly point out its really not that relevant for 
>encryption
>subkeys. It does have security implementations for signing 
>subkeys; see
>[cross-certification section] for some details on that.
>
>References:
>[cross-certification section]
>https://gnupg.org/faq/subkey-cross-certify.html


GnuPG has been requiring cross-certification for a very long time, 
which would mean that an attacker who attaches a person's listed subkey to a 
different masterkey, 
would still not be able to do anything with it, because the attacker can't make 
it cross-certify.

Being simplistically naive here,
How difficult would it be to get keyservers to agree that only the key owners 
can submit new signatures to their own keys?
(i.e., The owner's detached signature of the public keyblock having the new 
signature, required together with any submitted key with a new signature.) 

A Denial-of Service attack will still always be possible against a keyserver, 
since it is easy for an attacker to generate a large volume of legitimate keys, 
with only a self-signature, 
and upload them to the keyserver,
but at least then, no individual key by a real user, could be attacked.


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


was Re: PGP Key Poisoner // now "Binding one person's subkey to another person's primary key"

2019-08-12 Thread vedaal via Gnupg-users



On 8/12/2019 at 7:28 AM, "Juergen Bruckner via Gnupg-users" 
 wrote:

>Am 11.08.19 um 23:47 schrieb Anonymous Remailer (austria):
>> 
>> https://github.com/skeeto/pgp-poisoner

=
Here is a quote from the above site:

=[ begin quoted material ]=

As far as keyserver weaknesses go, key poisoning attacks are really just 
scratching the surface. 
For example, did you know other people can bind your subkeys to their primary 
key?

=[ end quoted material ]=

Can this really be done?

(Does not matter so much to me personally, as I grew up with v3 keys, 
and even when using a V4 key, I don't generate a subkey, 
but allow all the functions (sign, encrypt. certify) to be done with the master 
key).

Does matter a lot if I can't trust the subkey of someone whom I want to encrypt 
to.

How real is this threat, and is it any threat at all, 
if simply binding the subkey to a different master key, 
won't allow for anyone else other than the 'real' owner, to decrypt messages 
encrypted to that subkey?

TIA

vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Essay on PGP as it is used today

2019-07-23 Thread vedaal via Gnupg-users


On 7/22/2019 at 7:12 AM, "Robert J. Hansen"  wrote:

>Mathematicians have come up with different ways to estimate how 
>many
>primes there were under a certain value 
...
>The first estimate for π(x) was "x divided by the natural 
>logarithm of x".
...
>If we do that same equation for a 2048-bit key, it turns out there 
>are
>10 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 000 
>000 000
>000 000 000 000 000 000 000 different prime numbers that could go 
>into it.

=

not really, for GnuPG keys, but for the default size GnuPG key of 4096, it's 
actually bigger than the number you quoted above ;-)

For a GnuPG key of 4096, it's only necessary to compute for primes up to 2^2048.

But, 

Since GnuPG uses 2 primes only in the 2^2048 size, for a 4096 bit key,
then the amount of primes is actually:

[ (2^2048) / ln(2^2048) ]  -  [ (2^2047) / ln (2^2047) ]  =  1.37 x 10^613


So, not to worry about someone creating a 'database' to crack GnuPG ...


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: I've been hacked and now I only use a key pair on keybase.

2019-05-26 Thread vedaal via Gnupg-users
On 5/25/2019 at 1:38 PM, "Stefan Claas"  wrote:

>P.S. I have generated my new key pair at keybase and will use
>keybase for encryption / decription until I have the funds to
>buy me a new *offline* usage Notebook.

=

Consider this one,

Toshiba NB100-11R notebook
https://www.pocket-lint.com/laptops/reviews/toshiba/70711-toshiba-no100-11r-notebook-review

it's small, easily portable,  comes with a toshiba linux variant installed, but 
you can easily install ubuntu or any other OS you prefer

it came our in 2008
and should be relatively inexpensive after 11 years


Good Luck

vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Ok this is a stupid questions

2019-02-26 Thread vedaal via Gnupg-users


On 2/26/2019 at 3:28 PM, "Stefan Claas"  wrote:And maybe 
another FOSS point? How about issuing Warrant Canaries?

I have seen that VeraCrypt does this.

=

Yes.
The latest one is here:
https://www.idrix.fr/VeraCrypt/canary.txt

Interesting, but it still boils down to *trust*.

I would trust WK and the GnuPG team even if they didn't *sign* a Warrant Canary
(i / we all, sort-of trust the verification of the new GnuPG releases, with his 
sig), 

And if we *don't trust*, then signing a Warrant Canary with the same signing 
key as the GnuPG release,
wouldn't help ;-)


vedaal



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: AW: Ok this is a stupid questions

2019-02-26 Thread vedaal via Gnupg-users


On 2/26/2019 at 10:29 AM, "Stefan Claas"  wrote:
    Von: vedaal via Gnupg-users
Gesendet: Montag, 25. Februar 2019 22:09
An: justina colmena; gnupg-users@gnupg.org
Betreff: Re: Ok this is a stupid questions
Why do you think GnuPG is useless if you check the source-code, run
it on hardware you trust, and a Linux variant you trust, with a
Chromium/Iron browser, and avoid anything google or microsoft or apple
or any non-FOSS product? 
I have learned in the past trust nobody. Therefore I would not rely

on  people from the GnuPG ecosystem and what they say.

 =

It depends on how realistic your threat model is.

For someone in a politically repressive regime who is being targeted,
yes, trust should be very limited, and clearly earned.

For those  whose threat model is criminal hacking by individual
opportunists,  there is a certain leeway.

When i first started out, I knew people who read every single line of
PGP 2.x sourcecode, and even today, refuse to migrate to gnupg because
they haven't the time to read all the code.

(Although some have considered that if there would be a minimalist
version, with a small enough code to read, they would definitely use
it.)

These people routinely 'airgap' their encrypting functions.

I respect it, 

but there is literally no end to how paranoid one can be ...

For example, has anyone you know, ever checked how the compilers
work?  (Reviewed gcc's source code, and the hardware necessary to make
it run, to ensure that nothing is 'added/subtracted/altered' when it
gets to machine language? Even more difficult when it is a proprietary
compiler.)

GnuPG is offering a FOSS privacy tool.

One can scrutinize it, appreciate it, and say thank you,

or be paranoid enough to never use it,

or some other in-between balance, that's comfortable for the
individual's threat model.
The gnupg-users list can help with clearing up technical questions
and let the users decide for themselves.
vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Ok this is a stupid questions

2019-02-25 Thread vedaal via Gnupg-users


On 2/25/2019 at 2:29 PM, "justina colmena via Gnupg-users"  wrote:   
That's why I have to call foul play on proprietary operating systems.
Encryption is theoretical only: in practice useless, moot, crippled,
broken, and terminally back-doored with all the malware, adware,
spyware, worms, viruses, trojans, keyloggers, and screenscrapers
inherent to such systems as Google Android, Microsoft Windows, and
Apple OS. The Democrats will stop at nothing to keep it that way at
all costs, and the Republicans just don't care.

=
Maybe *proprietary* encryption is theoretical only.What problems do
you have with GnuPG as a FOSS program ?
Ordinarily, I'm on the cautious, [maybe even borderline paranoid ;-) 
] side of things, and I don't just trust things lightly.
But I *DO* trust GnuPG, WK, and the host of other people who have put
the time and effort into GnuPG, releasing the source code routinely so
that it can be compiled by the end user on FOSS platforms (Linux,
Ubuntu. etc.)
You sound capable enough to review source-code, and use a Linux
variant.
Why do you think GnuPG is useless if you check the source-code, run it
on hardware you trust, and a Linux variant you trust, with a
Chromium/Iron browser, and avoid anything google or microsoft or apple
or any non-FOSS product? 
If I misunderstand you, and your beef is not with GnuPG, only with
Google, Android, MS, apple etc.then I apologize.
That said, can i ask you to trim your posts from the political rants,
much as they may be deserved.
There are other forums ideally suited to that.
Thanks.
vedaal

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [k9mail/k-9] Makes PGP sign-only mails very difficult (#2375)

2019-02-05 Thread vedaal via Gnupg-users


On 2/5/2019 at 4:50 PM, "justina colmena via Gnupg-users"  wrote:>THE
DATE PROBLEM. Only the body of the email is signed, not the envelope
headers, namely the subject and intended >recipients, and probably
most importantly, the date. It would be nice to have an option to
automatically include some of >these headers in the body of the signed
message when composing a signed email message.

>THE STRIPPING PROBLEM. Currently, each attachment is signed
separately and independently by the PGP-MIME >standard. It would be
preferable to digitally sign SHA hashes of the main message and all
attachments in a single >additional attachment. This would leave an
indication of any attachments that may have been "stripped" from the
email >message, but without breaking the signatures of remaining
attachments in such cases.

=

In this case, there is a simple workaround :
[1] Put the subject, the intended recipients, and the date, in the
introductory line(s) in the plaintext.

[2] enarmor all the attachments, [ using the GnuPG --enarmor command  
(-a command in PGP) ], and paste the enarmored text into the body of
the message, at the end of the message, right after a line saying;  
here are the following attachments :[3] Sign and encrypt the entire
message composed of parts [1] and [2] and send it off

this has the following 3 advantages:

(a) no one knows what kind of attachments are being sent, or how many.
(b) all the important data is in the Plaintext, where it belongs, and
not vulnerable to MIMT attacks
(c) backward compatibility in maintained, and no new standards have to
be designed
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pgp-phone (was Gnupg-users Digest, Vol 184, Issue 22)

2019-02-02 Thread vedaal via Gnupg-users


On 2/1/2019 at 2:48 PM, "Stefan Claas"  wrote:Maybe someone, in the
future, can pick-up the idea of PGPfone and develop it further
so that it can be used on Linux too or modern macOS. The old Windows
version still runs
fine, under Windows 7, for example.

=
Can be done on Ubuntu, or any Linux OS running Oracle Virtual Box with
win 7, (and maybe on VB with old dos 6,2, but have not actually tried
it on dos)
vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg - difference --encrypt-to and --recipient

2019-01-06 Thread vedaal via Gnupg-users


On 1/3/2019 at 10:14 PM, "MFPA"  wrote:> [3] only for the overly
paranoid who revel in tedious
> work-arounds  8^) :

> (a)  Encrypt to both yourself and the recipient
> (b)  Remove your own id packet from the ciphertext,
> (c)  Re-calculate  the crc of the ciphertext
> (d)  Send the 'hacked' ciphertext along to the
> original recipient
> (e)  Store the first ciphertext from (a) along with
> the one from (d), in your sent folder
> (f)   now you will always be able to decrypt and
> retrieve the original plaintext

Would the ciphertext at (d) be much different than encrypting to the
recipient and hidden-encrypt-to your own key?

=

Yes.
The ciphertext in (d) would have no indication that it was being
encrypted to anyone else.

Using 'hidden-encrypt' to your own key, would show that it was
encrypted to another key, but undetectable to whom.
As a concrete difference, if you used the command:   gpg
--try-all-secrets  
on the file encrypted to the recipient and hidden-encrypt-to your own
key,
it would decrypt to your own key.

Even from the ciphertext, it is detectable because it is 'longer'
(i.e., has another key-packet).

Try encrypting to only one recipient, and the encrypting the same
plaintext to the same recipient, while also using hidden-encrypt to,
and look at the difference in length.

vedaal___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg - difference --encrypt-to and --recipient

2019-01-02 Thread vedaal via Gnupg-users


On 1/2/2019 at 3:59 PM, "justina colmena via Gnupg-users"  wrote:
>My opinion is that should be the case. However, most MUAs I've used
>include the BCC recipients' keys in the encryption along with the To
>and CC recipients' keys, so any email addresses in the user-IDs of
>these keys are visible to all recipients.

>As an exception, one MAU I used with an OpenPGP add-on would instead
>send an individual copy of the message to each BCC recipient,
>encrypted only to their key.

>This seems like better practice. Also I would want to encrypt the
transmitted email message only to the intended recipient, >and the
copy stored in my "Sent" folder only to myself.
>With hidden-recipient or hidden-encrypt-to or throw-keyids, it is
>clear how many keys were encrypted to, but the key IDs and user-IDs
>are not present.
I am not terribly comfortable with this situation. It almost seems
rather creepy to me to receive an encrypted message that is also
encrypted for the benefit or verification of one or more unknown and
unidentified third parties. I start suspecting things like a foreign
government mandated key escrow or secret government backdoor on behalf
of some foreign spy or law enforcement agency.

=
 you have 3 tedious options, 1 more tedious than the other  8^)   :

[1]  use default-recipient-self, and explain in an n.b. in your
plaintext that you want to have a record of what you sent, but don't
want to leave it in plaintext,  and you will have an encrypted copy in
your sent box openable by you  
(this is very common).

[2] encrypt only to the sender, but also encrypt the plaintext only to
you, and store the encrypted file in your sent or other convenient
folder, with the date and the recipient.

[3] only for the overly paranoid who revel in tedious work-arounds 
8^) :

(a)  Encrypt to both yourself and the recipient
(b)  Remove your own id packet from the ciphertext, 
(c)  Re-calculate  the crc of the ciphertext
(d)  Send the 'hacked' ciphertext along to the original recipient
(e)  Store the first ciphertext from (a) along with the one from (d),
in your sent folder
(f)   now you will always be able to decrypt and retrieve the original
plaintext

btw,

I don't recommend this, 
but it is *possible* to add a (not yet done, but not terribly
complicated either) patch to gnupg to 'display' the session key in the
terminal window, 
(while you are encrypting only to one recipient),
and then you can encrypt that session key to your key, and store it,

or

a (also not yet done, but not terribly complicated either) patch,
 to allow gnupg to use a session key supplied by the user as an entry
in the command line(i.e.  --use-session-key  (64 character string from
step (a) above)

That session key is as random as any done by gnupg, and isn't really
being 're-used', 
it's just being stored in the encrypted file from step (a) and is
being sent with the same message encrypted to the same recipient as in
step (a)

This is just to point out, that if someone wants to think paranoidly
about 'who else knows' what is encrypted in your encrypted e-mail that
was encrypted only to you, it 'can' be done,
(extremely tedious, and afaik , has not been implemented by any
open-pgp variant program out there   8^)  )
vedaal
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP key verification + legal framework

2018-11-05 Thread vedaal via Gnupg-users
On 11/5/2018 at 3:39 PM, "Viktor"  wrote:

>You can register a Google account with any email address. Simply, 
>instead of creating an account on our service (another password 
>that 
>needs to be saved), you create an account on Google, or use an 
>existing one.

=
Ok,

But suppose I want to use my existing key that I made over 10 years ago,
and it is known and trusted by the people I deal with, but it happens to have 
more than 1 e-mail ID
(not rare to switch an e-mail account in 10 years)

Does this mean that it cannot be used in your system, 
even if you can get the preferred email to register in google, and you have 
passport personal verification,
just because there is another ID attached?

It seems unnecessarily restrictive.


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG on Android

2018-11-04 Thread vedaal via Gnupg-users



On 11/4/2018 at 4:58 PM, "Roland"  wrote:
>
>Hello list,
>
>I share the wish for encrypted email on Android, but I am afraid 
>of storing a secret key on my android phone. (theft, hacking, 
>loss, etc) 
>
>How do you feel about that?

=

Exactly the same way.

Android phones (software) are made by Google.
Google archives data from every source connecting to one of its applications, 
Chrome, search engine, gmail, etc.

I don't trust them, and have no way of verifying any claim of what they do, or 
do not, store.

Also, if you have any app that required 'rooting' of your phone, then even 
Google doesn't trust it, and expressly says that it will not guarantee false 
(malicious) expenditures by Google Wallet. 

So the 'rooted' app probably does have access to your android gnupg data.


Annoying, I know,  to not use gnupg on android, but prudently safe.

fwiw,  the gnupg apps work well on android, but I just don't trust the phone.


vedaal





___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Slightly OT - i need the proper wording for a signed document

2018-11-01 Thread vedaal via Gnupg-users
Am Donnerstag, den 01.11.2018, 17:42 +0100 schrieb Stefan Claas:
> On Thu, 01 Nov 2018 16:09:56 +0100, Dirk Gottschalk wrote:



> That is the reason why i like to sign the .pdf, containing my key
> data, with a qualified eIDAS conform signature. The detached GnuPG
> sig should be an additional info, that matches the key data in the
> document. 

=

This will work well in that if the signature verifies, then the information in 
the .pdf  can be considered reliable.

It is, however, very easy for a MITM attack to 'break' the signature by very 
subtly altering the pdf.


Try this:

[1] Take your finished pdf and select all the text and copy it into a new Libre 
Office document.

[2]  At the end of your text, just add a period.

[3] Use Libre Office's font coloring to change the color of the added period to 
white.

[4] Export this new document as a pdf with the same file name as your original 
pdf, and the same metadata.

[5] The pdf looks exactly the same, but the signature will no longer verify.


I don't trust a detached, signed pdf
(Again, I do, if it verifies, but am not sure if it doesn't verify).

A simple, but slightly tedious workaround, would be to  GnuPG Armor Sign the 
.pdf

The elDAS signature will still work, but the Armored Signed message is much 
harder to alter, and such alteration is detectable as malicious rather than a 
'mistake.


Also,
If you are planning to post your public keyblock in this pdf, please be aware 
that pdf treats a line return as empty whitespace, so when trying to import the 
key,
GnuPG does not recognize the empty whitespace, and reads the version line as 
continuous with the keyblock, and it won't import.


vedaal




___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: cannot decrypt file symmetric encrypted

2018-08-07 Thread vedaal via Gnupg-users
On 8/2/2018 at 3:01 PM, "Dirk Gottschalk via Gnupg-users" 
 wrote:

>Am Donnerstag, den 02.08.2018, 14:11 +0200 schrieb Stefano
>Tranquillini:
>> Hi all,
>> last year I encrypted some files, today i tried to decrypt them 
>but
>> the
>> decryption fails
>
>> stefano@~/Downloads/words$ gpg -d words.1.gpg
>> gpg: AES256 encrypted data
>> gpg: encrypted with 1 passphrase
>> gpg: decryption failed: Bad session key

...

>Are you sure you used the correct passphrase to decrypt?

=

It was probably not the correct passphrase.
The error that gpg2 gives when entering the wrong passphrase for a 
symmetrically encrypted message is exactly:  

gpg: decryption failed: Bad session key


This is the same whether you are off for even 1 character of the passphrase, or 
even if you just press 'enter' without a passphrase at all.


Here is a sample symmetrically encrypted message:

-BEGIN PGP MESSAGE-
Version: GnuPG v1
Comment:  Passphrase: sss

jA0EBwMCPJYegoCPRBRg0jkBnZym0Pr+ggBpBJYtHlYJgf90SL6YbWa1vcbLdl7H
jwxeR5cIFoNhytyUIFxdvrLNP59qkqzLKkI=
=pHIB
-END PGP MESSAGE-


First enter the correct passphrase,  sss

gpg (V1 and V2)  decrypts it as is should be.


now enter just ss or anything except the correct passphrase, or just press 
enter, and you get:

gpg: decryption failed: bad key   (when using Version 1.4.x)

gpg: decryption failed: Bad session key  (when using Version 2.x)


(Something to do with the string-to-key formation.

When the passphrase is off, the 'key' generated from it, is wrong, and when 
that wrong 'key' is used to attempt decryption, 
gpg rightfully gives an error message that the 'key' is bad.

maybe worthy of a note in the FAQ ...  )


vedaal



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users