The problem is "motivational"

2011-10-19 Thread M.R.
> Over the last year Marcus and me discussed ideas on how to make > encryption easier for non-crypto geeks. > We prepared a short paper... Interesting. However, the problem of widening email encryption practice is not technical, it is motivational. Broadly speaking, there are those that "have no

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Marcus Brinkmann
Hi Peter, thanks for your feedback. On 10/19/2011 09:30 PM, Peter Lebbing wrote: > However, I think you're not ambitious enough when you opt for using DNS for > key > distribution. Yes, the infrastructure and RR types[1] are already there. But > it > brings this nasty dependency on the provider

Re: private key protection

2011-10-19 Thread Robert J. Hansen
On 10/19/2011 4:54 PM, Peter Lebbing wrote: > Because in the latter case, I hardly think commonality matters. As an example: Three years ago I was thrown into a week-long sink-or-swim course on malware analysis, taught by an instructor who was a principal scientist at a company that's a big name

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Hubert Kario
On Wednesday 19 of October 2011 22:10:30 Ingo Klöcker wrote: > On Wednesday 19 October 2011, Harakiri wrote: > > > > Also - inventing just ANOTHER protocol for email encryption that mail > > clients should implement? Heck, the only protocol available in all > > major mail clients right now for out

Re: private key protection

2011-10-19 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 19-10-2011 17:54, Peter Lebbing escribió: > On 19/10/11 22:43, Faramir wrote: >> Ok, but if the online computer uses Windows, and the offline one >> uses Linux, then it would be a multiplataform trojan horse... >> that is not likely to be a commo

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 19 October 2011 at 9:49:20 PM, in , Peter Lebbing wrote: > By default the STEED system as proposed creates a new > certificate for every e-mail address. So unless > manually overridden, there is a one-to-one relation > between e-

Re: private key protection

2011-10-19 Thread Robert J. Hansen
On 10/19/2011 4:43 PM, Faramir wrote: > Ok, but if the online computer uses Windows, and the offline one > uses Linux, then it would be a multiplataform trojan horse... that is > not likely to be a common case. At this point we're throwing conjecture onto conjecture. If the offline one happened

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Jerome Baum
On 2011-10-19 22:49, Peter Lebbing wrote: > On 19/10/11 22:22, Jerome Baum wrote: >>> It would be awesome if this could be achieved without revealing other >>> email addresses or UIDs that might happen to map to the same >>> key/certificate. >> >> Hash the UID many times. (Didn't someone propose th

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Ingo Klöcker
On Wednesday 19 October 2011, Harakiri wrote: > --- On Mon, 10/17/11, Werner Koch wrote: > > From: Werner Koch > > Subject: STEED - Usable end-to-end encryption > > To: gnupg-de...@gnupg.org > > Cc: "Marcus Brinkmann" , gnupg-users@gnupg.org > > Date: Monday, October 17, 2011, 2:11 PM > > Hi! > >

Re: private key protection

2011-10-19 Thread Peter Lebbing
On 19/10/11 22:43, Faramir wrote: > Ok, but if the online computer uses Windows, and the offline one > uses Linux, then it would be a multiplataform trojan horse... that is > not likely to be a common case. Define your threat model... are we talking random trojan infection or a focused attacker

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Peter Lebbing
On 19/10/11 22:22, Jerome Baum wrote: >> It would be awesome if this could be achieved without revealing other >> email addresses or UIDs that might happen to map to the same >> key/certificate. > > Hash the UID many times. (Didn't someone propose that a while ago?) By default the STEED system as

Re: private key protection

2011-10-19 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 18-10-2011 10:07, Peter Lebbing escribió: ... > A capable enough hacker might infect the USB pendrive while it is > in your internet-connected PC and that way still gain access to the > non-connected system. Ok, but if the online computer uses

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Jerome Baum
>> If you could do something similar for >> mapping e-mail addresses to certificates > > It would be awesome if this could be achieved without revealing other > email addresses or UIDs that might happen to map to the same > key/certificate. Hash the UID many times. (Didn't someone propose that a

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 19 October 2011 at 8:30:48 PM, in , Peter Lebbing wrote: > If you could do something similar for > mapping e-mail addresses to certificates It would be awesome if this could be achieved without revealing other email addresses or

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 19 October 2011 at 7:07:45 PM, in , Harakiri wrote: > Also - inventing just ANOTHER protocol for email > encryption that mail clients should implement? Heck, > the only protocol available in all major mail clients > right now for

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Peter Lebbing
On 19/10/11 21:30, Peter Lebbing wrote: > that is a really major hurdle; probably a too steep one, IMHO. Given that all normal, literal hurdles are at right angles to the ground, they are all equally steep. Obviously I meant high :D. Peter. -- I use the GNU Privacy Guard (GnuPG) in combination

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Peter Lebbing
Werner, Marcus, Thank you for thinking about taking end-to-end e-mail encryption to the next level. I really like your ideas. However, I think you're not ambitious enough when you opt for using DNS for key distribution. Yes, the infrastructure and RR types[1] are already there. But it brings this

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Harakiri
--- On Mon, 10/17/11, Werner Koch wrote: > From: Werner Koch > Subject: STEED - Usable end-to-end encryption > To: gnupg-de...@gnupg.org > Cc: "Marcus Brinkmann" , gnupg-users@gnupg.org > Date: Monday, October 17, 2011, 2:11 PM > Hi! > >   http://g10code.com/docs/steed-usable-e2ee.pdf > > The

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread via GPGTools
Hi, On 19.10.2011, at 15:11, Tom Ritter wrote: > Other Security Folks: Absolutely NO javascript cryptography. Zero, none. well, JavaScript itself is just another programming language and combined with modern technologies like HTML5 Web Storage there is nowadays technically no need to implement

Re: Expired keys

2011-10-19 Thread Hauke Laging
Am Mittwoch, 19. Oktober 2011, 16:09:26 schrieb Jerry: > I have several keys listed as expired. The key is listed as having > only a public part. All attempts at deleting these keys has failed. How > do I go about removing them? It would be helpful to know what you have done and what happened. Hav

Expired keys

2011-10-19 Thread Jerry
I have several keys listed as expired. The key is listed as having only a public part. All attempts at deleting these keys has failed. How do I go about removing them? -- Jerry ✌ gnupg.u...@seibercom.net ___ Gnupg-users mailing list Gnupg-users@gnupg.o

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Tom Ritter
On 18 October 2011 12:00, Werner Koch wrote: > On Tue, 18 Oct 2011 16:35, jer...@jeromebaum.com said: > >> operations will be the most important part to making that work, and the >> ISPs don't have to help out there (modulo webmail which isn't even >> end-point). > > Even webmail.  It is easy to w

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread yyy
- Original Message - From: "Werner Koch" To: "Jerome Baum" Cc: Sent: Tuesday, October 18, 2011 7:00 PM Subject: Re: STEED - Usable end-to-end encryption On Tue, 18 Oct 2011 16:35, jer...@jeromebaum.com said: operations will be the most important part to making that work, and the

Problems with clearsign option

2011-10-19 Thread cord-henning . fricke
Hi Folks, I'm new to this site and I have a prob with the gpg --clearsign option. My mails to RIPE NCC are signed with my PGP-Key. This worked well for the last 6 years. Now I have the prob, that the signature is called bad from the RIPE mailer I' using: gpg (GnuPG) 1.4.11 on ubuuntu the email