Re: MD5 is an unreliable digest algorithm [was: Re: Key Transition Letter 2009-05-21]

2009-05-24 Thread Robert J. Hansen
Daniel Kahn Gillmor wrote:
> Actually, it is fairly common in certain circumstances: Certifying
> that another user's key is correctly bound to their User ID (a.k.a.
> "signing someone's key") is effectively making a signature over a
> document that you did not originate.

Yes.  And then if you take a look at how often this happens with MD5 in
OpenPGP, you'll find the answer is effectively never, since SHA-1
generally gets used instead.  So this attack is mostly a nonissue for
OpenPGP usage.

> MD5 *is* broken in that it does not provide the exepcted level of 
> security that a digest of its length implies, particularly for 
> collision-resistance.

I am getting pretty frustrated with how people are misreading,
misinterpreting, or outright not listening to the qualifications I am
putting on the things I'm saying.

My original text was, "it's kind of a stretch to say that it is entirely
broken for purposes of email cryptography."  The word "entirely" is
pretty important there.

Algorithms are not, as is commonly believed, to be either "secure" or
"insecure".  OpenPGP in particular is used in a variety of different
ways.  There is a continuum of "secure for all known uses of OpenPGP" at
one end, and "insecure for all known uses of OpenPGP" at the other, and
a lot of gray area in the middle where "secure for some uses" lives.

MD5 is in that continuum.  It is not /entirely/ broken, as seems to be
the common misperception.

> So MD5 should indeed be avoided today, and we should be methodically
> and reasonably moving away from reliance on SHA-1 in circumstances
> where collision-resistance is necessary.

Yes.  Which is exactly what I've been saying.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


MD5 is an unreliable digest algorithm [was: Re: Key Transition Letter 2009-05-21]

2009-05-24 Thread Daniel Kahn Gillmor
On 05/24/2009 02:15 AM, Robert J. Hansen wrote:
> It depends on what sort of threat you're facing.  In this case, the MD5
> attack is predicated on the victim signing documents they did not
> originate.  This is often considered bad policy, since it tends to
> facilitate attacks like this.  This usage case is kind of rare for GnuPG
> -- not unheard of, but rare.

Actually, it is fairly common in certain circumstances: Certifying that
another user's key is correctly bound to their User ID (a.k.a. "signing
someone's key") is effectively making a signature over a document that
you did not originate.  The only element in a standard OpenPGP
certification which changes is the timestamp of the certification
itself.  The timestamp is fairly predictable (the hash-clash rogue CA
X.509 MD5 compromise in December 2008 relied on timestamping with the
same granularity that OpenPGP uses).  Furthermore, the timestamp is
*appended* to the element in question that is signed (as are any
additional subpackets that the issuer of the certification elects to
include).  Certifier-authored appended data is less useful for defeating
a collision attack, since signatures are made over digests that are
one-pass.  With a one-pass digest, an attacker needs only to find a
collision in the lead-up to the appended data, and then subsequent
appended data can simply be copied from the tail of one message to the
other to maintain the collision in the digest output space.

> MD5 is best avoided, yes, please don't get me wrong -- but it's kind of
> a stretch to say that it is entirely broken for purposes of email
> cryptography.

MD5 *is* broken in that it does not provide the exepcted level of
security that a digest of its length implies, particularly for
collision-resistance.  The ability to find two messages with identical
digests should be no less expensive than a so-called "birthday attack",
which is 2^64 digest calculations for a 128-bit digest like MD5.  MD5's
collision resistance is demonstrably less than 2^64 today.  Wikipedia
notes attacks that find MD5 collisions in a few hours on a notebook
computer.

Collision attacks have significant utility in subverting all kinds of
crypto-systems including e-mail cryptography, particularly because so
many mail clients are willing to ignore invalid or garbage-y data in an
e-mail message.

SHA-1's collision resistance is weakened as well, reportedly to the
level of 2^52 operations (it should be 2^80, since SHA-1 is a 160-bit
hash), but (a) no one has seen an exploit of this in the wild yet, and
(b) 2^52 is a fairly big number anyway (within reach of well-funded
organizations, but not nearly as bad as MD5).

So MD5 should indeed be avoided today, and we should be methodically and
reasonably moving away from reliance on SHA-1 in circumstances where
collision-resistance is necessary.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-24 Thread gpg2 . 20 . maniams
Wow Felipe ... WowT


On Sun, May 24, 2009 at 8:38 AM, webmas...@felipe1982.com
<+gpg2+maniams+aec56db6fa.webmaster#felipe1982@spamgourmet.com> wrote:

>
> > As of this writing, no algorithm supported by GnuPG has been
> > compromised.  Even MD5 is still on its feet.
> i don't think this is correct. See:
> http://th.informatik.uni-mannheim.de/People/lucks/HashCollisions/
>
>
> felipe
>
>
I say Wow here to the simple presentation of the collision and also
forwarding this great piece here. The technical gurus of this board may have
found the above link boringbut a novice like me found it very
interesting

I'm looking for similar simple explanations like the above on what a hash
functions is and what algorithms are and what other basics should some one
know before making _their_own_ choice of algos, hash etc

any pointers would be most appreciated


regards
maniams
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-23 Thread Robert J. Hansen
webmas...@felipe1982.com wrote:
> i don't think this is correct. See:
> http://th.informatik.uni-mannheim.de/People/lucks/HashCollisions/

It depends on what sort of threat you're facing.  In this case, the MD5
attack is predicated on the victim signing documents they did not
originate.  This is often considered bad policy, since it tends to
facilitate attacks like this.  This usage case is kind of rare for GnuPG
-- not unheard of, but rare.

MD5 is best avoided, yes, please don't get me wrong -- but it's kind of
a stretch to say that it is entirely broken for purposes of email
cryptography.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-23 Thread webmaster

> As of this writing, no algorithm supported by GnuPG has been
> compromised.  Even MD5 is still on its feet.
i don't think this is correct. See:
http://th.informatik.uni-mannheim.de/People/lucks/HashCollisions/


felipe


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-23 Thread gpg2 . 20 . maniams
Dear Robert

On Sun, May 24, 2009 at 6:42 AM, Subu  wrote:

>
>
> On Sun, May 24, 2009 at 6:15 AM, Robert J. Hansen - r...@sixdemonbag.org
> <+gpg2+maniams+ba4eefb302.rjh#sixdemonbag@spamgourmet.com> wrote:
>
>> gpg2.20.mani...@dfgh.net wrote:
>> > What are the algos that are compromised ? or NOT to be used ? If this is
>> > too long a list
>>
>> Sorry to be so late to the party --
>>
>> As of this writing, no algorithm supported by GnuPG has been
>> compromised.  Even MD5 is still on its feet.
>>
>> That said, the SHA-1 and MD5 algorithms are both looking a little shaky,
>> and generally the recommendation seems to be to move away from those
>> algorithms.
>>
>> All other algorithms supported by GnuPG are in good shape.
>>
>> > I understand that choosing the key size and algo is something personal
>> > and others cant decide. but I'm trying to know the choice 
>>
>> Please don't do this.  The defaults are the defaults for a very good
>> reason: they're good defaults.  With the exception of "move away from
>> SHA1", please do not mess around with the defaults more than you
>> absolutely have to.
>>
>


>
>
>
> Thanks for the reply and advice. I shall follow the same
>
> Regards
> maniams
>
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-23 Thread Robert J. Hansen
gpg2.20.mani...@dfgh.net wrote:
> What are the algos that are compromised ? or NOT to be used ? If this is
> too long a list

Sorry to be so late to the party --

As of this writing, no algorithm supported by GnuPG has been
compromised.  Even MD5 is still on its feet.

That said, the SHA-1 and MD5 algorithms are both looking a little shaky,
and generally the recommendation seems to be to move away from those
algorithms.

All other algorithms supported by GnuPG are in good shape.

> I understand that choosing the key size and algo is something personal
> and others cant decide. but I'm trying to know the choice 

Please don't do this.  The defaults are the defaults for a very good
reason: they're good defaults.  With the exception of "move away from
SHA1", please do not mess around with the defaults more than you
absolutely have to.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread gpg2 . 20 . maniams
Dear Members

What are the algos that are compromised ? or NOT to be used ? If this is too
long a list

What are the Algos that are _to_be_
/or/
 _could_be_ used
/or/
_not_yet_compromised_

I understand that choosing the key size and algo is something personal and
others cant decide. but I'm trying to know the choice 


regards
maniams
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Allen Schultz escribió:
> For the reason of SHA1 issues in the news, I've recently set up
> a new OpenPGP key, and
> will be transitioning away from my old one.
...
> To fetch my new key from a public key server, you can simply do:
> 
>  gpg --keyserver pgp.mit.edu --recv-key DAD4736B

  Don't use that keyserver, it can damage your key. Try
pool.sks-keyservers.net

  Probably most people won't sign your new key, unless they have signed
your old key. WoT usually requires people exchanging keys face-to-face
or relying on other signatures to know the key belongs to the right
person...

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQEcBAEBCAAGBQJKFbEmAAoJEMV4f6PvczxArfkH/jb/nH5hjvr7DAE2SPNHvbOg
N6Lexa1krIwbY815WNGWmkGLsRnQWxbJ0OiCEIhR9OIfSo4aki69pBKh1PC72R9U
b4xalL/5G58Wo3gAJEnaeKEmIYc437RS8kYwVt9kYAd0gPq1zSO3zqAhCtc8F1pw
A7tJoXkGmbZOf6XzHAEXtA548P0f6rOWpVityJ8Sto5NZB5Qf/G1T5wMWJyoSed/
PR5orl7poPRNZoTUR+REivqYUU9JTCoGvFLMWvGQf5vAErcZ93lwqNDMJdfK+fx7
Wbsd9NGDFppXzcCgf9sN7w+1oek6GfeX3qFdVzvI5ymfHWDuGmOfjAH3qZ/36VM=
=qDQ2
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Allen Schultz wrote:

> Thank you for the information. I will clearsign this using the
> new key only.

> Let me know if this signature does not work either.

OpenPGP Security Info

UNTRUSTED Good signature from Allen Schultz (aldaek)

Key ID: 0xF55651E0 / Signed on: 5/21/2009 12:47 PM
Key fingerprint: 16AD EFE1 D68F C8A8 B086 68CD 1A35 85C7 DAD4 736B

Works much better with just a single Signature.  :-D

JOHN 8-)
Timestamp: Thursday 21 May 2009, 14:17  --400 (Eastern Daylight Time)

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10-svn5019: (MingW32)
Comment: Public Key at:  http://tinyurl.com/8cpho
Comment: Gossamer Spider Web of Trust: https://www.gswot.org
Comment: Homepage:  http://tinyurl.com/yzhbhx

iQEcBAEBCgAGBQJKFZreAAoJEBCGy9eAtCsPooYIAJvpfHU++TMnzzIk+WeK2TJt
/aHasNt68bdMw0O9MDc7pHkzuH4tEpW5LSa9sf9M6/EexbNovLBkb1JFMeGajHSc
VrTtiozjXos33qcL9D155gCHb//T0QtFKvDKZWCsYP403wtlMEiQL8YiP3lwGmLk
H3+g0O0/rS0k+ZSyiEYjYk0n92W40SoOOJyBtN87DEjW/av66OQRJSFjSO2Avk1j
OZRHvkh+HM/xZWbNI1ffCaaGJKMSTLHKA/xtMOiC+NdUpWuNo+pZvVQTZLqjI4NW
JM+qQU0aeS5tSo9EwqMKflBGOWPDm5VL6+mVBMe76+uawOqSXQL45Tp8dBeBons=
=jnd6
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Allen Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Thu, May 21, 2009 at 7:31 AM, Raimar Sandner  wrote:
> After all the _old_ key could have been compromised, that is
what I meant :)

Thank you for the information. I will clearsign this using the
new key only.

EE79C636 has already been updated [and uploaded] with an
expiration date. This key is outdated due to the SHA-1 break in
collisions.

pub   1024D/EE79C636 2009-04-24 [expires: 2009-08-19]
  Key fingerprint = 0DC0 D8F6 A3A7 C107 59C4  1512 579A F712
EE79 C636
uid  Allen Schultz 
uid  [jpeg image of size 6128]
sub   2048g/762B1E36 2009-04-24

As far as signing or verifying through email. The subject has
already been discussed. Again, it's your choice. I may sign at a
"unverified - fingerprint through unsecure medium" per the
questions gpg asks. It does not validate the rest of my public
ring. But that was only done with the older EE79C636 as of the
signing of this email.

Let me know if this signature does not work either.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32) - GPGshell v3.72

iQEcBAEBCAAGBQJKFYWWAAoJEMNyjCz1VlHgo3YH/05JARgW8utXay9rR7nIe7lI
b1aRHYxTVslXKEKOiGk4PqAWkVCPbdly2dOzta/q1r+yq1HOXDe9v8mfMFstJdMd
MTDhZd7QF9Cc2o586Nz1zHbGqkNvBb4U3oO+4AkgjmZMzL3IMXeYvUCvWbKHm7uh
Bd0ofmYC/ABFCKR0jSrn/Zfs3Qf0fAXomPuuPSSpTghVZyeTyAvwtnda5tqvmjmh
2DK2SGJ0c6yC8GbHFzS2np8plL957FpnEHfrTkxfuOw6GVNixOvrcAlyepkX2rW+
Vi3KfSrVIp2KOxTy6pOSkXLnweFY5C9fKsgEpS2hnUpy43L0YeChu7bQDRWHKlA=
=wFD0
-END PGP SIGNATURE-


-- 
Allen Schultz 
pub   3072R/DAD4736B 2009-05-20
  Key fingerprint = 16AD EFE1 D68F C8A8 B086  68CD 1A35 85C7 DAD4 736B
uid  Allen Schultz (aldaek) 
uid  [jpeg image of size 6128]
sub   2048R/F55651E0 2009-05-20 [expires: 2010-05-20]
sub   2048R/5687B83E 2009-05-20 [expires: 2010-05-20]

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Raimar Sandner
On Thursday 21 May 2009 15:15:18 Raimar Sandner wrote:
> I believe (an I think others do too) it is good praxis to not sign new keys
> even if you have signed the old one and the new key is signed by the old
> one, without personally checking with the keyholder first. After all, the
> new key could have been compromised.

After all the _old_ key could have been compromised, that is what I meant :)


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Raimar Sandner
Hello

On Thursday 21 May 2009 11:35:44 Allen Schultz wrote:
> For the reason of SHA1 issues in the news, I've recently set up
> a new OpenPGP key, and
> will be transitioning away from my old one.

> This message is signed by
> both keys to certify the
> transition.

I have not recieved signatures with your mail, but Charly's reply implicates 
that there is a signature, though it does not validate. I have switched to a 
new mail system, I hope it does not strip away signatures :-/


> If you already know my old key, you can now verify that the new
> key is
> signed by the old one:
>
>  gpg --check-sigs DAD4736B

I believe (an I think others do too) it is good praxis to not sign new keys 
even if you have signed the old one and the new key is signed by the old one, 
without personally checking with the keyholder first. After all, the new key 
could have been compromised.

> If you don't already know my old key, or you just want to be
> double
> extra paranoid, you can check the fingerprint against the one
> above:
>
>  gpg --fingerprint DAD4736B

If someone does _not_ know the old key, checking the fingerprint against an 
untrusted source like an eMail is certainly not enough. It is crucial for the 
web of trust that key/UID combinations are only signed after the fingerpint has 
been confirmed by the keyholder in person, and the UID has been checked against 
an official identification.

I think the best way to have your new key integrated in the web of trust is to 
visit a keysigning party, or to look up key signers in your area at 
biglumber.com.

  Raimar




signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Charly Avital
Allen Schultz wrote the following on 5/21/09 5:35 AM:
[...]

> 
> Please let me know if there is any trouble, and sorry for the
> inconvenience.

[...]

No inconvenience.

Results of signature verification and key usage:

-BEGIN GPG OUTPUT-
gpg: Signature made Thu May 21 05:34:13 2009 EDT using RSA key ID F55651E0
gpg: BAD signature from "Allen Schultz (aldaek) "
-END GPG OUTPUT-


$ gpg --edit-key F55651E0
gpg (GnuPG) 1.4.9; Copyright (C) 2008 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.


pub  3072R/DAD4736B  created: 2009-05-20  expires: never   usage: SC
 trust: unknown   validity: unknown
sub  2048R/F55651E0  created: 2009-05-20  expires: 2010-05-20  usage: S
sub  2048R/5687B83E  created: 2009-05-20  expires: 2010-05-20  usage: E
[ unknown] (1). Allen Schultz (aldaek) 
[ unknown] (2)  [jpeg image of size 6128]


Command> check
uid  Allen Schultz (aldaek) 
sig!3DAD4736B 2009-05-20  [self-signature]
sig! EE79C636 2009-05-20  Allen Schultz 
uid  [jpeg image of size 6128]
sig!3DAD4736B 2009-05-20  [self-signature]

To sum up (as far as I can sum up).

1. Your message (who shows in the PGP headers both SHA1 and SHA256)
shows that signature has been done using the signing subkey F55651E0 of
primary key DAD4736B.

2. Signature does not verify. Your photo file can be displayed.

3. Your primary key DAD4736B has been signed using EE79C636 (as you said
it would be):

$ gpg --edit-key EE79C636
gpg (GnuPG) 1.4.9; Copyright (C) 2008 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.


pub  1024D/EE79C636  created: 2009-04-24  expires: never   usage: SC
 trust: unknown   validity: unknown
sub  2048g/762B1E36  created: 2009-04-24  expires: never   usage: E
[ unknown] (1). Allen Schultz 

Command> check
uid  Allen Schultz 
sig!3EE79C636 2009-04-24  [self-signature]

4. I cannot sign your key, not because I am double extra paranoid or
even simple basic paranoid (which I am), but because I don't know you, I
can't ascertain that you are who to claim to be, or that the above key
or keys belong to you.

There are some basic rules to the Web of Trust.

Best regards,
Charly


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Key Transition Letter 2009-05-21

2009-05-21 Thread Allen Schultz
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256,SHA1

For the reason of SHA1 issues in the news, I've recently set up
a new OpenPGP key, and
will be transitioning away from my old one.

The old key will continue to be valid for some time, but i
prefer all future

correspondence to come to the new one.  I would also like this
new key to be re-

integrated into the web of trust.  This message is signed by
both keys to certify the

transition.

the old key was:

pub   1024D/EE79C636 2009-04-24
     Key fingerprint = 0DC0 D8F6 A3A7 C107 59C4  1512 579A F712
EE79 C636
uid                  Allen Schultz 
uid                  [jpeg image of size 6128]
sub   2048g/762B1E36 2009-04-24

And the new key is:

pub   3072R/DAD4736B 2009-05-20
     Key fingerprint = 16AD EFE1 D68F C8A8 B086  68CD 1A35 85C7
DAD4 736B
uid                  Allen Schultz (aldaek)

sub   2048R/F55651E0 2009-05-20 [expires: 2010-05-20]
sub   2048R/5687B83E 2009-05-20 [expires: 2010-05-20]

To fetch my new key from a public key server, you can simply do:

 gpg --keyserver pgp.mit.edu --recv-key DAD4736B

If you already know my old key, you can now verify that the new
key is
signed by the old one:

 gpg --check-sigs DAD4736B

If you don't already know my old key, or you just want to be
double
extra paranoid, you can check the fingerprint against the one
above:

 gpg --fingerprint DAD4736B

If you are satisfied that you've got the right key, and the UIDs
match
what you expect, I'd appreciate it if you would sign my key:

 gpg --sign-key DAD4736B

Lastly, if you could upload these signatures, i would appreciate
it.
You can either send me an e-mail with the new signatures (if you
have
a functional MTA on your system):

 gpg --armor --export DAD4736B | mail -s 'OpenPGP Signatures'
allen.schu...@gmail.com

Or you can just upload the signatures to a public keyserver
directly:

 gpg --keyserver pgp.mit.edu --send-key DAD4736B

Please let me know if there is any trouble, and sorry for the
inconvenience.

Regards,

   --ads

PS: Transiition Letter idea copied from dkg
(http://fifthhorseman.net/key-

transition-2007-06-15.txt).

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32) - GPGshell v3.72

iQEcBAEBCAAGBQJKFSAVAAoJEMNyjCz1VlHgjWMH/iU0U/VR1/zdpM93pL72/sfc
E4OBBaz6LtHmvYJTS+lQ8EYBf9dMTd+R8r2Nh4tKCYj8oY6HhffCIhGUrgE73Gba
QQbZTE56pmWtwGwiki2a+rhK9y8du8X2pajBJurTqeSNRMv8q3iGkQPI/Wn6J/l3
gBdZYZ1zqJcFIYXzzm4y10+rOtShOuOwz43DrGas6cW4FETJGWA1WUQfoLYQ5L2c
mVf4y1zR6DY4nJ8zgpsJeWO5J3UJQaqpRKDvl2Ls3OdcZHJ0n1S3v1J1MK2X5Q5K
A5dKauvO82YGpq5c8JR1Zp2XCdDKTZ2qxRdgESCRj3X68uGceRTS9gd7WN5whZqI
RgQBEQIABgUCShUgFQAKCRBXmvcS7nnGNlcqAJ9l352qqohUIVoVE/Z+EA1HzXPQ
+gCfYCXuRN9aDq/HIwig5s9ElXBWVbQ=
=BThX
-END PGP SIGNATURE-


--
Allen Schultz 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users