On Mon, Jun 28, 2010 at 8:35 PM, Doug Barton wrote:
> On Mon, 28 Jun 2010, Nicholas Cole wrote:
>
>> On Sun, Jun 27, 2010 at 8:55 PM, Dan Mahoney, System Admin
>> wrote:
>>
>>> Is there some reasonable way that gpg can detect that it has a
>>> controlling
>>> termainal (or even, a config file opt
Anyone know if it's possible to generate a subkey for signing purposes
via batch operations or a script? I can't seem to find anything that
references a way to do that.
Mark
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mai
On 6/28/10 6:47 AM, Schmocki wrote:
> does anyone know if there is a frontend for GnuPG or a software that uses
> GnuPG where one can on-the-fly encrypt files thar are to be saved into a
> distinct folder with a public key so they can only be read by a user that
> has the private key?
This seems l
Hello everyone,
does anyone know if there is a frontend for GnuPG or a software that uses
GnuPG where one can on-the-fly encrypt files thar are to be saved into a
distinct folder with a public key so they can only be read by a user that
has the private key?
Best Regards,
Schmocki
--
View this m
On Mon, 28 Jun 2010, Nicholas Cole wrote:
On Sun, Jun 27, 2010 at 8:55 PM, Dan Mahoney, System Admin
wrote:
Is there some reasonable way that gpg can detect that it has a controlling
termainal (or even, a config file option) and just ask me for my passphrase
on stdin?
Can you start gpg-agen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi
On Monday 28 June 2010 at 4:41:16 PM, in
, David Shaw
wrote:
> auto-key-locate hkp://pgp.mit.edu
> hkp://subkeys.pgp.net hkp://some.other.server.etc
> ldap://even.a.ldap.server.works
> List as many as you like, they'll be tried in order.
On Sun, Jun 27, 2010 at 8:55 PM, Dan Mahoney, System Admin
wrote:
> Is there some reasonable way that gpg can detect that it has a controlling
> termainal (or even, a config file option) and just ask me for my passphrase
> on stdin?
Can you start gpg-agent separately - ie. before the passphrase
On Jun 28, 2010, at 12:47 AM, Dan Mahoney, System Admin wrote:
> On Sun, 27 Jun 2010, David Shaw wrote:
>
> However, you raise another question: How does a keyserver know who is
> uploading the key?
At the moment, it doesn't. That would need to be addressed if you want
Dan Mahoney, System Admin wrote:
>
> I'm also not aware of how servers synchronize, but if it's a different
> protocol than the standard single-key-request protocol, then there's an
> easy metric to say "don't hand out keys with this flag via this protocol".
For SKS (taken from the current SKS