Re: how vulnerable is hidden-encrypt-to

2012-08-22 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Monday 20 August 2012 at 9:42:31 PM, in
mid:20120820204231.2fbace6...@smtp.hushmail.com, ved...@nym.hush.com
wrote:


 The simplest way to do that is to send the message
 encrypted to  only one recipient at a time.

If I recall correctly, the QDPGP plugin for using PGP with Pegasus
Mail does that. I don't know about the GnuPG version, QDGPG.
http://www.grt.net.tt/qdgpg.html


- --
Best regards

MFPAmailto:expires2...@rocketmail.com

Ballerinas are always on their toes.  We need taller ballerinas!
-BEGIN PGP SIGNATURE-

iQCVAwUBUDVDCaipC46tDG5pAQpVKgP/bhVnEQXpld09uguIT8uvhm05EuXxXzj8
wYF2uZThmYVBN3phHr0l808MBtZTT1VbI95ZgGrkrN5MYrkIJb0YInZw4B+2Y+0F
JuyiFgeOfN8870hPtQGazucxJs62Mkv5ZiUjd16ZgpsG3cXMSfY8EJe/lczanc67
Rcz33NY8HYE=
=+cz/
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-21 Thread Jens Lechtenboerger
On Mo, Aug 20 2012, ved...@nym.hush.com wrote:

 On Mon, 20 Aug 2012 13:57:41 -0400 Jens Lechtenboerger
 clou...@informationelle-selbstbestimmung-im-internet.de wrote:

In contrast, I interpreted the original question in terms of
recipient anonymity: Bob wants to encrypt a message to some
undisclosed list of recipients (say, including Alice and Eve), and
nobody should be able to figure out who (else) is on the list.
Clearly, the fact whether I can decrypt the message tells me
whether I'm on the list or not; however, I should not be able to
learn more than that.  In particular, I should not be able to
identify any other recipient.

 The simplest way to do that is to send the message encrypted to
 only one recipient at a time.

That's correct, but severely restricted.

 Now, if the sender *wanted* to mislead, she could, in addition to
 sending encrypted messages to the 'real' people she wanted to send
 to, she could also use hidden-encrypt to anyone else's public key,
 and send people on a wild chase of trying to see who else it was
 encrypted to.

I'm not convinced.  First, I don't want to enable lots of
unnecessary parties to read those messages.  Second, I may be
interested in real protection, not just in having fun with false
traces.

In that situation, my previous posting was meant to suggest that
Eve (if she has access to the public RSA key of Alice used by Bob)
will be able to figure out that the message was also encrypted to
Alice.

 =

 I'm not sure about this.

 The way RSA works, is that the session key has *padding* added
 before it is encrypted to a public key.  It may even have
 *different* padding for each public key it is encrypted to in the
 same gnupg command.  (Maybe those who really know about this,
 could comment if the padding is the same or different for each
 public key RSA encrypted packet in one encrypted gnupg message).

 If so, and there is different padding, then you will not be able
 to determine whose key it is just by trying to re-encrypt the
 session key to a trial list of public keys, and comparing the
 ciphertext.

Also, different would need to be random and of sufficient
length...

 Even if it is not so, (i.e. that there is no 'different' padding),
 it will not be easy for an average user to re-encrypt, as (afaik),
 gnupg doesn't list the padding upon decryption.
  
 (It could be done though, by decrypting that packet directly with
 RSA tools, but probably not by the averaqe user :-) ...  )

I'm not concerned whether the average user can do this right now or
not.  I'm concerned about experts (that could also provide attack
tools to average users).

Many thanks for your input!
Jens

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-21 Thread vedaal
On Tue, 21 Aug 2012 11:59:20 -0400 Jens Lechtenboerger 
clou...@informationelle-selbstbestimmung-im-internet.de wrote:

Also, different would need to be random and of sufficient
length...

=

It is.  See RFC4880, 
(it's one of the 'MUST' implementations for all open-pgp's) 

http://tools.ietf.org/html/rfc4880

(specific sections will be quoted below)

=

I'm not concerned whether the average user can do this right now 
or not.  I'm concerned about experts (that could also provide 
attack
tools to average users).

=

Even the experts should not be able to.
See the quoted sections below.


=[ begin quoted sections ]=


5.1.  Public-Key Encrypted Session Key Packets (Tag 1)

...

Note that when an implementation forms several PKESKs with one
session key, forming a message that can be decrypted by several 
keys,
   the implementation MUST make a new PKCS#1 encoding for each key.

...


7.2 RSAES-PKCS1-v1_5

* It is recommended that the pseudorandom octets in step 2 in
  Section 7.2.1 be generated independently for each encryption
  process, especially if the same data is input to more than 
one
  encryption process.  Haastad's results [24] are one 
motivation for
  this recommendation.

* The padding string PS in step 2 in Section 7.2.1 is at least 
eight
  octets long, which is a security condition for public-key
  operations that makes it difficult for an attacker to recover 
data
  by trying all possible encryption blocks.

...
  
13.1.1.  EME-PKCS1-v1_5-ENCODE

   Input:

   k  = the length in octets of the key modulus

   M  = message to be encoded, an octet string of length mLen, 
where
mLen = k - 11

   Output:

   EM = encoded message, an octet string of length k

   Error:   message too long

 1. Length checking: If mLen  k - 11, output message too 
long and
stop.

 2. Generate an octet string PS of length k - mLen - 3 
consisting of
pseudo-randomly generated nonzero octets.  The length of PS 
will
be at least eight octets.

 3. Concatenate PS, the message M, and other padding to form an
encoded message EM of length k octets as

EM = 0x00 || 0x02 || PS || 0x00 || M.

 4. Output EM.


=[ end quoted sections ]=


vedaal

n.b.

If you are interested in looking into this rigorously further, I 
recommend you contact Professor Dan Boneh.

http://crypto.stanford.edu/~dabo/

(He is an authority on RSA, teaches a free online Cryptography 
course at Stanford University, and has a clear style and is 
reasonably accessible.)



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread Jens Lechtenboerger
On Sa, Aug 18 2012, Daniel Kahn Gillmor wrote:

 On 08/17/2012 11:16 AM, Hauke Laging wrote:
 Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
 or what key ID
 had been used in conjunction with that option? Thanks.
 
 You need the private recipient key in order to find out that key
 ID. It's the  use of this option that you cannot get this
 information in another way.

 It's worth observing that you can still detect the algorithm used
 and the size of the key, even when the keyid is all zeros.  So if
 someone has a particularly unusual key size (or is an early
 adopter of an unusual key type, like ECC), the pool of possible
 known recipients could actually be pretty small.

In addition, as explained by Barth et al. in 2006 in
http://www.adambarth.com/papers/2006/barth-boneh-waters.pdf 
When GPG generates an ElGamal public key, it does so in the group
of integers modulo a random prime. Thus, different principals are
very likely to have public keys in different groups, making GPG
encryptions vulnerable to passive key privacy attacks. [...]
GPG could defend against these attacks by using the same prime for
every public key, for example one standardized by NIST

What is the state of this recommendation?  Has it been implemented?

I'm not a crypto expert but I also think the following:
Encryption is performed symmetrically using a randomly generated
session key K, that is encrypted to the public keys of all (hidden)
recipients.  Thus, if a message M is encrypted to you and other
recipients using RSA, then you are of course able to obtain the
session key K.  Now, if you suspect Alice to be a recipient then you 
download her public key from a key server and encrypt the session
key K under her public key.  If the result matches one of the
encrypted session keys contained in M, then Alice is a recipient of
M.

If I'm not mistaken this attack works with RSA but not with ElGamal
(as ElGamal does randomized encryption).

Best wishes
Jens

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread vedaal
On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger 
clou...@informationelle-selbstbestimmung-im-internet.de wrote:

 if a message M is encrypted to you and other
recipients using RSA, then you are of course able to obtain the
session key K.  Now, if you suspect Alice to be a recipient then 
you download her public key from a key server and encrypt the 
session
key K under her public key.  If the result matches one of the
encrypted session keys contained in M, then Alice is a recipient 
of M.

=

The one sending the message really is in control here ;-)
The sender can use hidden encrypt to ANY public key.

i.e. if Alice is sending the message and wants to hide her 
identity,
nothing prevents her from using throw-keyid with Bob's public key 
instead of her own, or NIST's, or PGP Corporation's, or any onyone 
else's.

If the message is unsigned, the receiver cannot tell,
(assuming it's sent from an appropriately anonymized e-mail 
address),
and if it is signed, then the throw -keyid doesn't hide the 
sender's identity from the receiver.


vedaal

(sorry about thread-breaking ;-((
sent from a site that doesn't allow e-mail clients)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread Jens Lechtenboerger
On Mo, Aug 20 2012, ved...@nym.hush.com wrote:

 On Mon, 20 Aug 2012 09:38:49 -0400 Jens Lechtenboerger 
 clou...@informationelle-selbstbestimmung-im-internet.de wrote:

 if a message M is encrypted to you and other
recipients using RSA, then you are of course able to obtain the
session key K.  Now, if you suspect Alice to be a recipient then 
you download her public key from a key server and encrypt the session
key K under her public key.  If the result matches one of the
encrypted session keys contained in M, then Alice is a recipient 
of M.

 =

 The one sending the message really is in control here ;-)
 The sender can use hidden encrypt to ANY public key.

 i.e. if Alice is sending the message and wants to hide her 
 identity,
 nothing prevents her from using throw-keyid with Bob's public key 
 instead of her own, or NIST's, or PGP Corporation's, or any onyone 
 else's.
 [...]

I'm not sure whether I understand you correctly.  If I'm not
mistaken then you are referring to sender anonymity.

In contrast, I interpreted the original question in terms of
recipient anonymity: Bob wants to encrypt a message to some
undisclosed list of recipients (say, including Alice and Eve), and
nobody should be able to figure out who (else) is on the list.
Clearly, the fact whether I can decrypt the message tells me whether
I'm on the list or not; however, I should not be able to learn more
than that.  In particular, I should not be able to identify any
other recipient.

In that situation, my previous posting was meant to suggest that Eve
(if she has access to the public RSA key of Alice used by Bob) will
be able to figure out that the message was also encrypted to Alice.
Thus, hidden-encrypt-to, throw-key-id, and hidden-recipient do not
help here.  I'd be happy to be corrected if I'm missing something,
though...

Best wishes
Jens

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread Sin Trenton
 =
 
 The one sending the message really is in control here ;-)
 The sender can use hidden encrypt to ANY public key.
 
 i.e. if Alice is sending the message and wants to hide her 
 identity,
 nothing prevents her from using throw-keyid with Bob's public key 
 instead of her own, or NIST's, or PGP Corporation's, or any onyone 
 else's.
 
 If the message is unsigned, the receiver cannot tell,
 (assuming it's sent from an appropriately anonymized e-mail 
 address),
 and if it is signed, then the throw -keyid doesn't hide the 
 sender's identity from the receiver.
 
 
 vedaal

I got a bit intrigued by this discussion, having posted a question once
relating to it.

I'm not sure if this input really shows anything or is of any real
contribution to the discussion, but to me it seems all recipients,
including your own are hidden for you when you decrypt a message or a
file? (You get how many keys, but only ID  for each).
Note that the file was not signed.

So I made a test in my GPG workshop (where I have four 'dummy' keys I
created just for testing things out). A file was encrypted with
--hidden-recipients ( -R ); a friend's key, one of my dummy keys [key
four], playing the recipient and sender, plus two keys serving as 'red
herrings', random keys I downloaded from The Guardian (UK newspaper)
and Deutsche Telekom. I then ran a --decrypt and got this output:

gpg: anonymous recipient; trying secret key [key one] ...
gpg: anonymous recipient; trying secret key [key two] ...
gpg: anonymous recipient; trying secret key [key three] ...
gpg: anonymous recipient; trying secret key [key four] ...
gpg: cipher algorithm 122 is unknown or disabled
gpg: anonymous recipient; trying secret key [key one] ...
gpg: anonymous recipient; trying secret key [key two] ...
gpg: anonymous recipient; trying secret key [key three] ...
gpg: anonymous recipient; trying secret key [key four] ...
gpg: anonymous recipient; trying secret key [key one] ...
gpg: anonymous recipient; trying secret key [key two] ...
gpg: anonymous recipient; trying secret key [key three] ...
gpg: anonymous recipient; trying secret key [key four] ...
gpg: anonymous recipient; trying secret key [key one] ...
gpg: anonymous recipient; trying secret key [key two] ...
gpg: anonymous recipient; trying secret key [key three] ...
gpg: anonymous recipient; trying secret key [key four] ...
gpg: okay, we are the anonymous recipient.
gpg: encrypted with RSA key, ID 
gpg: encrypted with RSA key, ID 
gpg: encrypted with RSA key, ID 
gpg: encrypted with RSA key, ID 

/Sin T.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-20 Thread vedaal
On Mon, 20 Aug 2012 13:57:41 -0400 Jens Lechtenboerger 
clou...@informationelle-selbstbestimmung-im-internet.de wrote:

In contrast, I interpreted the original question in terms of
recipient anonymity: Bob wants to encrypt a message to some
undisclosed list of recipients (say, including Alice and Eve), and
nobody should be able to figure out who (else) is on the list.
Clearly, the fact whether I can decrypt the message tells me 
whether
I'm on the list or not; however, I should not be able to learn 
more
than that.  In particular, I should not be able to identify any
other recipient.

=

The simplest way to do that is to send the message encrypted to 
only one recipient at a time.

Now, if the sender *wanted* to mislead, she could, in addition to 
sending encrypted messages to the 'real' people she wanted to send 
to, she could also use hidden-encrypt to anyone else's public key, 
and send people on a wild chase of trying to see who else it was 
encrypted to.

=

In that situation, my previous posting was meant to suggest that 
Eve (if she has access to the public RSA key of Alice used by Bob) 

will be able to figure out that the message was also encrypted to 
Alice.

=

I'm not sure about this.

The way RSA works, is that the session key has *padding* added 
before it is encrypted to a public key.
It may even have *different* padding for each public key it is 
encrypted to in the same gnupg command.
(Maybe those who really know about this, could comment if the 
padding is the same or different for each public key RSA encrypted 
packet in one encrypted gnupg message).

If so, and there is different padding, then you will not be able to 
determine whose key it is just by trying to re-encrypt the session 
key to a trial list of public keys, and comparing the ciphertext.

Even if it is not so, (i.e. that there is no 'different' padding), 
it will not be easy for an average user to re-encrypt, as (afaik), 
gnupg doesn't list the padding upon decryption.
 
(It could be done though, by decrypting that packet directly with 
RSA tools,
but probably not by the averaqe user :-)  ...  )


vedaal


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Saturday 18 August 2012 at 3:36:21 PM, in
mid:502fa865.80...@fifthhorseman.net, Daniel Kahn Gillmor wrote:

 And it's also possible to rule out a given person as an
 intended recipient, e.g. if they have a 2048-bit RSA
 key and the ESK packet targets 4096-bit el gamal.

You can rule out a key. But not a person can have more than one key.


- --
Best regards

MFPAmailto:expires2...@rocketmail.com

Reality is nothing but a collective hunch.
-BEGIN PGP SIGNATURE-

iQCVAwUBUDD3BKipC46tDG5pAQr1ZgQAvpRfGjPFNUfpFAfsxkhuNdH1TNAG7vUI
+yfF0tYTB9sm1HTP+JxMpAzMD//mqsnkecShy4AU5ZStTLueE9Fy60O+w3K7/nKp
VrSogWdNMl6FFCNE46VvIqs1sZUkkGC6es1ZjO1FX8PS2V1HbLmMhynDaRUTpWHO
FXAJsur920g=
=Z93Y
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-18 Thread Daniel Kahn Gillmor
On 08/17/2012 11:16 AM, Hauke Laging wrote:
 Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
 or what key ID
 had been used in conjunction with that option? Thanks.
 
 You need the private recipient key in order to find out that key ID. It's the 
 use of this option that you cannot get this information in another way.

It's worth observing that you can still detect the algorithm used and
the size of the key, even when the keyid is all zeros.  So if someone
has a particularly unusual key size (or is an early adopter of an
unusual key type, like ECC), the pool of possible known recipients could
actually be pretty small.

And it's also possible to rule out a given person as an intended
recipient, e.g. if they have a 2048-bit RSA key and the ESK packet
targets 4096-bit el gamal.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-18 Thread Hauke Laging
Am Sa 18.08.2012, 10:36:21 schrieb Daniel Kahn Gillmor:

 It's worth observing that you can still detect the algorithm used and
 the size of the key, even when the keyid is all zeros.  So if someone
 has a particularly unusual key size (or is an early adopter of an
 unusual key type, like ECC), the pool of possible known recipients could
 actually be pretty small.

 And it's also possible to rule out a given person as an intended
 recipient, e.g. if they have a 2048-bit RSA key and the ESK packet
 targets 4096-bit el gamal.

I think these hints should be added to the documentation.


Hauke
--
☺
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


how vulnerable is hidden-encrypt-to

2012-08-17 Thread auto15963931
Is there any way on heaven or earth for someone to discover from a
message, one sent to them or to another person, whether the encrypted
message had been made with an option hidden-encrypt-to or what key ID
had been used in conjunction with that option? Thanks.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-17 Thread Hauke Laging
Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
 Is there any way on heaven or earth for someone to discover from a
 message, one sent to them or to another person, whether the encrypted
 message had been made with an option hidden-encrypt-to

Sure.

start cmd: LC_ALL=C gpg --list-packets test.gpg
:pubkey enc packet: version 3, algo 1, keyid 8E75E2184AD27C5B
data: [4095 bits]
:pubkey enc packet: version 3, algo 1, keyid 
data: [2046 bits]
gpg: anonymous recipient; trying secret key 0x25D4FD8B ...


 or what key ID
 had been used in conjunction with that option? Thanks.

You need the private recipient key in order to find out that key ID. It's the 
use of this option that you cannot get this information in another way.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-17 Thread auto15963931
Hauke Laging:
 Am Fr 17.08.2012, 09:56:56 schrieb auto15963931:
 Is there any way on heaven or earth for someone to discover from a
 message, one sent to them or to another person, whether the encrypted
 message had been made with an option hidden-encrypt-to
 
 Sure.
 
 start cmd: LC_ALL=C gpg --list-packets test.gpg
 :pubkey enc packet: version 3, algo 1, keyid 8E75E2184AD27C5B
 data: [4095 bits]
 :pubkey enc packet: version 3, algo 1, keyid 
 data: [2046 bits]
 gpg: anonymous recipient; trying secret key 0x25D4FD8B ...
 
 
 or what key ID
 had been used in conjunction with that option? Thanks.
 
 You need the private recipient key in order to find out that key ID. It's the 
 use of this option that you cannot get this information in another way.
 
 
Hello, Hauke

Apparently, that it was used could be seen, but to whom it had been
encrypted could not unless one happened to have that key. In the example
of yours it appears as though the message was encrypted to two different
keys, one of which was hidden and the other not. Is that right?

Incidentally, when I looked at your reply and noticed it was signed, I
tried verifying the signature. However, the signature appeared to be
invalid according to the message I got:

OpenPGP Security Info

Error - signature verification failed

gpg command line and output:
gpg2.exe
gpg: Signature made 08/17/12 10:16:27 Central Daylight Time
gpg:using RSA key 5BA0F8B53A403251
gpg: BAD signature from Hauke Laging ha...@laging.de [unknown]


Why is the signature failing? Thanks.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-17 Thread Hauke Laging
Am Fr 17.08.2012, 21:05:32 schrieb auto15963931:

 In the example
 of yours it appears as though the message was encrypted to two different
 keys, one of which was hidden and the other not. Is that right?

That is right. --hidden-encrypt-to needs other recipients. But you may use
‑‑throw-keyids or --hidden-recipient instead.


 Incidentally, when I looked at your reply and noticed it was signed, I
 tried verifying the signature.

 Why is the signature failing? Thanks.

That's a bug in my MUA which is triggered by the email being encoded as ascii:

https://bugs.kde.org/show_bug.cgi?id05171

This bug (or rather: problem) has been discovered here on the list – it occurs
almost only in English emails. I have added a non-ASCII char to my text
signature thus forcing a charset different from ascii. Thus the signature of
this email should be OK.


Hauke
--
☺
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: how vulnerable is hidden-encrypt-to

2012-08-17 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hauke Laging wrote:
 Am Fr 17.08.2012, 21:05:32 schrieb auto15963931:
 
 In the example
 of yours it appears as though the message was encrypted to two different
 keys, one of which was hidden and the other not. Is that right?
 
 That is right. --hidden-encrypt-to needs other recipients. But you may use 
 ‑‑throw-keyids or --hidden-recipient instead.
 
 
 Incidentally, when I looked at your reply and noticed it was signed, I
 tried verifying the signature.
 
 Why is the signature failing? Thanks.
 
 That's a bug in my MUA which is triggered by the email being encoded as ascii:
 
 https://bugs.kde.org/show_bug.cgi?id=305171
 
 This bug (or rather: problem) has been discovered here on the list – it 
 occurs 
 almost only in English emails. I have added a non-ASCII char to my text 
 signature thus forcing a charset different from ascii. Thus the signature of 
 this email should be OK.

Hey!

OpenPGP Security Info

UNTRUSTED Good signature from Hauke Laging mailinglis...@hauke-laging.de
Key ID: 0x3A403251 / Signed on: 08/17/2012 10:24 PM
Key fingerprint: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814



- --
  .~.  Jean-David Beyer  Registered Linux User 85642.
  /V\  PGP-Key:3EDBB65E 9A2FC99A Registered Machine   241939.
 /( )\ Shrewsbury, New Jerseyhttp://counter.li.org
 ^^-^^ 23:10:01 up 30 days, 3:11, 3 users, load average: 4.42, 4.42, 4.43
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org/

iD8DBQFQLwgZPtu2XpovyZoRAiU2AKDVSMsLyT5eg5DfPYLsyFAnpgQP6gCfaHlK
dYa2u4OhhM8+1yLfPtM7z48=
=ylCp
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users