On Tuesday 27 December 2005 4:51 am, Thorsten Haude wrote:
> Hi,
>
> * Chris wrote (2005-12-27 03:30):
> >On the Mandriva Newibe list signatures using OpenPGP/MIME show up as
> >bad while those using Inline OpenPGP show up as good.
>
> They show up as good where? Are the Mails coming back from the
[EMAIL PROTECTED] wrote:
might be interesting to see the year 2020 gnupg version,
the max keylength proposed then,
and then link back to this thread ;-)
Perhaps in 2020 gpg uses quantum cryptography,... (of course one would
need a special dongle attached via USB version 42)
RSA/SHA/ElG/EEC
Pawel Shajdo wrote:
Can somebody point me to RFC or IETF draft (or other info) about this special
DNS recodrds?
I'm not sure, but perhaps this utilizes the SIG resrouce record,... have
a look at RFC 2535 about DNSSEC (http://www.ietf.org/rfc/rfc2535.txt).
Perhaps David or Werner could con
On Dec 27, 2005 at 16:30 -0500, John W. Moore III wrote:
> -BEGIN PGP SIGNED MESSAGE-
> While waiting for Werner or David; I'll share what I "know" about PKA in
> 1.4.3cvs:
>
> * Implemented Public Key Association (PKA) trust sub model. This
> is an optional trust model on top o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Pawel Shajdo wrote:
> On Dec 26, 2005 at 23:21 -0500, John W. Moore III wrote:
>
>>>Without context it is difficult to tell.
>>>My guess would be Public Key Authentication; e.g. OpenSSH.
>>
>>I believe your "Guess" to be correct. Since the Release
On Dec 26, 2005 at 23:21 -0500, John W. Moore III wrote:
> > Without context it is difficult to tell.
> > My guess would be Public Key Authentication; e.g. OpenSSH.
>
> I believe your "Guess" to be correct. Since the Release of GnuPG 1.4.3
> *will* contain support for PKA Key retrieval (among oth
Am Dienstag, 27. Dezember 2005 17:16 schrieb Thomas Widhalm:
I must have been blind: It's "gpgsm --passwd [keyid]"
Sorry.
Thomas
> Hi!
>
> I managed to get my keys from CaCert.org into gpgsm via the openssl tools
> exporting them from Firefox. Considering it just for transport I used a far
> too
Hi!
I managed to get my keys from CaCert.org into gpgsm via the openssl tools
exporting them from Firefox. Considering it just for transport I used a far
too simple passphrase while exporting and importing as I thought the
passphrase of CaCert.org was written into the key itself. I tried to del
On Thu, Dec 22, 2005 at 04:22:51PM -0800, amit bhalerao wrote:
> Hi ,
>
> We are decrypting a file using GPG mechanism. We have send the
> GPG keys to vendor . However when i decrypt the file i get the
> following Log message :-
>
> COMMAND:-
> ---
> echo AA | /ngs/lpp/gp
Hi ,
We are decrypting a file using GPG mechanism. We have send the
GPG keys to vendor . However when i decrypt the file i get the
following Log message :-
COMMAND:-
---
echo AA | /ngs/lpp/gpg/bin/gpg --no-tty --passphrase-fd 0 --
output decyryted_file.TXT --decrypt en
On 22.12.2005 10:35 Uhr, Johan Wevers wrote:
> Christoph Anton Mitterer wrote:
>
>> - And even from a cryptographic point of view this wouldn't make sense
>> (as far as I know), as currently hashfunctions are the weak point of the
>> whole system.
>
> That depends on what you consider important
Hi,
* John Clizbe wrote (2005-12-27 04:08):
>You could try Thunderbird + Enigmail. Enigmail will allow you to create
>per-recipient rules, so that you may send either inline-signed or
>PGP/MIME-signed messages depending on which list you're posting.
Mutt can do that, too.
>You can't spell fiasc
Hi,
* Chris wrote (2005-12-27 03:30):
>On the Mandriva Newibe list signatures using OpenPGP/MIME show up as
>bad while those using Inline OpenPGP show up as good.
They show up as good where? Are the Mails coming back from the list
not verifyable? Is there some kind of status attached?
Thorsten
13 matches
Mail list logo