OpenPGP smartcard and crpyto fs

2005-04-18 Thread Joerg Schmitz-Linneweber
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi all! I would like to use my O.card to securely hold an encryption key to be used by the Linux "crypto filesystem". This fs uses an utiulity "losetup" at startup which asks for a passphrase/keyword to be used as encryption/decryption key. losetup

Revocation certificate still valid after changing subkeys?

2005-04-18 Thread Adam Funk
When I created my keypair I dutifully created and safely stored a revocation certificate for it. I recently added a new subkey and revoked the old subkey (as discussed on this list). I've also added and revoked a few UIDs since the key was created. Is there any reason to generate a new revocatio

Re: Revocation certificate still valid after changing subkeys?

2005-04-18 Thread David Shaw
On Mon, Apr 18, 2005 at 05:11:10PM +0100, Adam Funk wrote: > When I created my keypair I dutifully created and safely stored a > revocation certificate for it. > > I recently added a new subkey and revoked the old subkey (as discussed > on this list). I've also added and revoked a few UIDs since

Retrieving signature from message that was encrypted and signed in one step

2005-04-18 Thread Patrick Chkoreff
I have a message that was encrypted and signed in one step. When I decrypt it, I can read the message and see that the signature is valid. So far so good. I would now like to relay this message to a third party so he can verify the signature too. But as far as I know, GPG has no way to do t

Re: Retrieving signature from message that was encrypted and signed in one step

2005-04-18 Thread Atom Smasher
On Mon, 18 Apr 2005, Patrick Chkoreff wrote: I have a message that was encrypted and signed in one step. When I decrypt it, I can read the message and see that the signature is valid. So far so good. I would now like to relay this message to a third party so he can verify the signature too. B

Re: Retrieving signature from message that was encrypted and signed in one step

2005-04-18 Thread Patrick Chkoreff
On Apr 18, 2005, at 8:10 PM, Atom Smasher wrote: for now, the only way to do it is to extract the session key from the message (--show-session-key) and send that along with the encrypted message to your 3rd party. they can use "--override-session-key" to decrypt the message and verify the signat