Re: Paperkey for Revocation Certificates? (Feature-Request :-)

2008-10-06 Thread Sven Radde
Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw: A revocation certificate, on the other hand, doesn't have all that much that can be removed. Luckily revocation certificates are pretty short to begin with. The only real advantage that paperkey could bring to revocation

Re: keyserver with gpgme

2008-10-06 Thread Florian Schwind
Werner Koch wrote: The latest stable one is 1.1.6,from January. However you should better use the SVN version or this snapshot: ftp://ftp.g10code.com/g10code/scratch/gpgme-1.1.7-svn1327.tar.bz2 (that one my be removed at any time) How do I know which one is stable? And why isn't the

Re: Bypass Invalid Public key

2008-10-06 Thread Peter Pentchev
On Thu, Oct 02, 2008 at 05:01:39PM -0500, Duwaine Robinson wrote: Hi All, Is there a way to get GnuPG to complete encryption, if there is at least one valid public key specified? I am trying automate my encryption process, and I am hoping to be able to get away with not having to specify

RE: Bypass Invalid Public key

2008-10-06 Thread Duwaine Robinson
Thank you. I actually decided last week to verify whether the each key is valid before I perform the encryption. I used the --list-keys command along with a loop to accomplish this with ease. Duwaine Robinson -Original Message- From: Peter Pentchev [mailto:[EMAIL PROTECTED] Sent:

GPG --symmetric option and passphrases

2008-10-06 Thread Kevin Hilton
When using gpg with the --symmetric flag (as when symmetrically encrypting a file with a passphrase), is the passphrase salted and hashed? Is so, how many times is it hashed, and what hashing algorithm is used for this process? Is this controlled by some parameter in the gpg.conf file or command

Computational Efficiency of GnuPG ciphers and hashes

2008-10-06 Thread Kevin Hilton
Its often been mentioned on this mailing list, that 3DES is notoriously slow. On the flipside, what cipher is considered the fastest -- or the most computationally efficient (if this term even applies)? Are there similar relative results among the GnuPG hashes? Thanks -- Kevin Hilton

Re: GPG --symmetric option and passphrases

2008-10-06 Thread David Shaw
On Oct 6, 2008, at 10:54 AM, Kevin Hilton wrote: When using gpg with the --symmetric flag (as when symmetrically encrypting a file with a passphrase), is the passphrase salted and hashed? Yes. Unless you change that safe default with --s2k-mode. Is so, how many times is it hashed, and

Maximum file size

2008-10-06 Thread Thomas Chitwood
Is there a maximum file size that gpg 1..4.5 can encrypt? Tom Chitwood MCP, MCSE, CNA Wellpoint Account Information Technology Services Americas Global Services, IBM ___ Gnupg-users mailing list Gnupg-users@gnupg.org

Re: GPG --symmetric option and passphrases

2008-10-06 Thread Kevin Hilton
On Mon, Oct 6, 2008 at 10:17 AM, David Shaw [EMAIL PROTECTED] wrote: On Oct 6, 2008, at 10:54 AM, Kevin Hilton wrote: When using gpg with the --symmetric flag (as when symmetrically encrypting a file with a passphrase), is the passphrase salted and hashed? Yes. Unless you change that safe

Re: Maximum file size

2008-10-06 Thread David Shaw
On Mon, Oct 06, 2008 at 08:03:10AM -0700, Thomas Chitwood wrote: Is there a maximum file size that gpg 1..4.5 can encrypt? There are quite a few bits and details around this, but in general, it is whatever the maximum file size your OS supports. How big are the files you're talking about?

Re: GPG --symmetric option and passphrases

2008-10-06 Thread David Shaw
On Mon, Oct 06, 2008 at 10:28:21AM -0500, Kevin Hilton wrote: Thanks -- very clear explanations. How long can the passphrase be? I assume it would be truncated at a particular length. For example if I passes a Whirlpool Hash as the passphrase, would the entire 128-digit hexadecimal hash be

Re: Paperkey for Revocation Certificates? (Feature-Request :-)

2008-10-06 Thread David Shaw
On Mon, Oct 06, 2008 at 08:03:12AM +0200, Sven Radde wrote: Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw: A revocation certificate, on the other hand, doesn't have all that much that can be removed. Luckily revocation certificates are pretty short to begin with. The only

Re: Computational Efficiency of GnuPG ciphers and hashes

2008-10-06 Thread Robert J. Hansen
Kevin Hilton wrote: Its often been mentioned on this mailing list, that 3DES is notoriously slow. On the flipside, what cipher is considered the fastest -- or the most computationally efficient (if this term even applies)? Are there similar relative results among the GnuPG hashes? AES is

Re: Computational Efficiency of GnuPG ciphers and hashes

2008-10-06 Thread David Shaw
On Mon, Oct 06, 2008 at 10:14:44AM -0500, Kevin Hilton wrote: Its often been mentioned on this mailing list, that 3DES is notoriously slow. On the flipside, what cipher is considered the fastest -- or the most computationally efficient (if this term even applies)? Are there similar relative

Re: Paperkey for Revocation Certificates? (Feature-Request :-)

2008-10-06 Thread Morton D. Trace
David Shaw wrote: On Mon, Oct 06, 2008 at 08:03:12AM +0200, Sven Radde wrote: Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw: A revocation certificate, on the other hand, doesn't have all that much that can be removed. Luckily revocation certificates are pretty short to begin

re: GPG --symmetric option and passphrases

2008-10-06 Thread vedaal
David Shaw dshaw at jabberwocky.com wrote on Mon Oct 6 19:44:40 CEST 2008 : There is no limit in OpenPGP for a passphrase length, beyond that of the inherent limit imposed by the hash used for string-to-key conversion interesting, am way out of my depth here, in that i don't understand the

Testing a build

2008-10-06 Thread Andrew Berg
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 How would one go about making sure everything works? I built GPG for Windows following the instructions at http://clbianco.altervista.org/gnupg/eng/gnupg.html (a link at gnupg.org/download.html). Unfortunately, I cannot find the libcurl package

Re: GPG --symmetric option and passphrases

2008-10-06 Thread David Shaw
On Oct 6, 2008, at 6:17 PM, [EMAIL PROTECTED] wrote: [1] a 64 character passphrase should be more than enough for even the most paranoid user, if it could even be remembered reliably accurately ;-) or [2] a passphrase for a block cipher that has a 64 character session key *somehow* wouldn't

Re: Paperkey for Revocation Certificates? (Feature-Request :-)

2008-10-06 Thread David Shaw
On Oct 6, 2008, at 3:25 PM, Morton D. Trace wrote: David Shaw wrote: On Mon, Oct 06, 2008 at 08:03:12AM +0200, Sven Radde wrote: Am Sonntag, den 05.10.2008, 19:49 -0400 schrieb David Shaw: A revocation certificate, on the other hand, doesn't have all that much that can be removed. Luckily