Problems with clearsign option

2011-10-19 Thread cord-henning . fricke
Hi Folks, I'm new to this site and I have a prob with the gpg --clearsign option. My mails to RIPE NCC are signed with my PGP-Key. This worked well for the last 6 years. Now I have the prob, that the signature is called bad from the RIPE mailer I' using: gpg (GnuPG) 1.4.11 on ubuuntu the email

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread yyy
- Original Message - From: Werner Koch w...@gnupg.org To: Jerome Baum jer...@jeromebaum.com Cc: gnupg-users@gnupg.org Sent: Tuesday, October 18, 2011 7:00 PM Subject: Re: STEED - Usable end-to-end encryption On Tue, 18 Oct 2011 16:35, jer...@jeromebaum.com said: operations will be

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Tom Ritter
On 18 October 2011 12:00, Werner Koch w...@gnupg.org wrote: On Tue, 18 Oct 2011 16:35, jer...@jeromebaum.com said: operations will be the most important part to making that work, and the ISPs don't have to help out there (modulo webmail which isn't even end-point). Even webmail.  It is easy

Expired keys

2011-10-19 Thread Jerry
I have several keys listed as expired. The key is listed as having only a public part. All attempts at deleting these keys has failed. How do I go about removing them? -- Jerry ✌ gnupg.u...@seibercom.net ___ Gnupg-users mailing list

Re: Expired keys

2011-10-19 Thread Hauke Laging
Am Mittwoch, 19. Oktober 2011, 16:09:26 schrieb Jerry: I have several keys listed as expired. The key is listed as having only a public part. All attempts at deleting these keys has failed. How do I go about removing them? It would be helpful to know what you have done and what happened. Have

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread via GPGTools
Hi, On 19.10.2011, at 15:11, Tom Ritter wrote: Other Security Folks: Absolutely NO javascript cryptography. Zero, none. well, JavaScript itself is just another programming language and combined with modern technologies like HTML5 Web Storage there is nowadays technically no need to implement

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Harakiri
--- On Mon, 10/17/11, Werner Koch w...@gnupg.org wrote: From: Werner Koch w...@gnupg.org Subject: STEED - Usable end-to-end encryption To: gnupg-de...@gnupg.org Cc: Marcus Brinkmann mar...@gnu.org, gnupg-users@gnupg.org Date: Monday, October 17, 2011, 2:11 PM Hi!  

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Peter Lebbing
Werner, Marcus, Thank you for thinking about taking end-to-end e-mail encryption to the next level. I really like your ideas. However, I think you're not ambitious enough when you opt for using DNS for key distribution. Yes, the infrastructure and RR types[1] are already there. But it brings

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Peter Lebbing
On 19/10/11 21:30, Peter Lebbing wrote: that is a really major hurdle; probably a too steep one, IMHO. Given that all normal, literal hurdles are at right angles to the ground, they are all equally steep. Obviously I meant high :D. Peter. -- I use the GNU Privacy Guard (GnuPG) in combination

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 19 October 2011 at 7:07:45 PM, in mid:1319047665.75751.yahoomailclas...@web130223.mail.mud.yahoo.com, Harakiri wrote: Also - inventing just ANOTHER protocol for email encryption that mail clients should implement? Heck, the

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 19 October 2011 at 8:30:48 PM, in mid:4e9f2568.6080...@digitalbrains.com, Peter Lebbing wrote: If you could do something similar for mapping e-mail addresses to certificates It would be awesome if this could be achieved

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Jerome Baum
If you could do something similar for mapping e-mail addresses to certificates It would be awesome if this could be achieved without revealing other email addresses or UIDs that might happen to map to the same key/certificate. Hash the UID many times. (Didn't someone propose that a while

Re: private key protection

2011-10-19 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 18-10-2011 10:07, Peter Lebbing escribió: ... A capable enough hacker might infect the USB pendrive while it is in your internet-connected PC and that way still gain access to the non-connected system. Ok, but if the online computer uses

Re: private key protection

2011-10-19 Thread Peter Lebbing
On 19/10/11 22:43, Faramir wrote: Ok, but if the online computer uses Windows, and the offline one uses Linux, then it would be a multiplataform trojan horse... that is not likely to be a common case. Define your threat model... are we talking random trojan infection or a focused attacker

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Ingo Klöcker
On Wednesday 19 October 2011, Harakiri wrote: --- On Mon, 10/17/11, Werner Koch w...@gnupg.org wrote: From: Werner Koch w...@gnupg.org Subject: STEED - Usable end-to-end encryption To: gnupg-de...@gnupg.org Cc: Marcus Brinkmann mar...@gnu.org, gnupg-users@gnupg.org Date: Monday, October

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Jerome Baum
On 2011-10-19 22:49, Peter Lebbing wrote: On 19/10/11 22:22, Jerome Baum wrote: It would be awesome if this could be achieved without revealing other email addresses or UIDs that might happen to map to the same key/certificate. Hash the UID many times. (Didn't someone propose that a while

Re: private key protection

2011-10-19 Thread Robert J. Hansen
On 10/19/2011 4:43 PM, Faramir wrote: Ok, but if the online computer uses Windows, and the offline one uses Linux, then it would be a multiplataform trojan horse... that is not likely to be a common case. At this point we're throwing conjecture onto conjecture. If the offline one happened

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 19 October 2011 at 9:49:20 PM, in mid:4e9f37d0.50...@digitalbrains.com, Peter Lebbing wrote: By default the STEED system as proposed creates a new certificate for every e-mail address. So unless manually overridden, there is

Re: private key protection

2011-10-19 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 19-10-2011 17:54, Peter Lebbing escribió: On 19/10/11 22:43, Faramir wrote: Ok, but if the online computer uses Windows, and the offline one uses Linux, then it would be a multiplataform trojan horse... that is not likely to be a common

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Hubert Kario
On Wednesday 19 of October 2011 22:10:30 Ingo Klöcker wrote: On Wednesday 19 October 2011, Harakiri wrote: Also - inventing just ANOTHER protocol for email encryption that mail clients should implement? Heck, the only protocol available in all major mail clients right now for out of the

Re: private key protection

2011-10-19 Thread Robert J. Hansen
On 10/19/2011 4:54 PM, Peter Lebbing wrote: Because in the latter case, I hardly think commonality matters. As an example: Three years ago I was thrown into a week-long sink-or-swim course on malware analysis, taught by an instructor who was a principal scientist at a company that's a big name

Re: STEED - Usable end-to-end encryption

2011-10-19 Thread Marcus Brinkmann
Hi Peter, thanks for your feedback. On 10/19/2011 09:30 PM, Peter Lebbing wrote: However, I think you're not ambitious enough when you opt for using DNS for key distribution. Yes, the infrastructure and RR types[1] are already there. But it brings this nasty dependency on the provider.