Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread fuzzykitties
Upon decryption of the attached message, the program requests a new passphrase. Then after any arbitrary string is entered (or nothing), decryption of the message fails. It does not matter if any private keys are held in gnupg (including the key of the intended recipient). Here is the message in

Re: Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread Laurent Jumet
Le 19/11/2013 08:28, fuzzykitt...@riseup.net a écrit : Upon decryption of the attached message, the program requests a new passphrase. Then after any arbitrary string is entered (or nothing), decryption of the message fails. It does not matter if any private keys are held in gnupg (including the

Re: [tor-talk] [liberationtech] BitMail.sf.net v 0.6 - Secure Encrypting Email Client

2013-11-19 Thread grarpamp
I don't think that's possible at the moment. There are no deterministically built operating systems yet. This is rather sad. I think FreeBSD has a project somewhere trying to move that way. Hopefully all of the unix-likes are at least aware of the concept, if not having an actual project for

Re: Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread Peter Lebbing
On 19/11/13 10:15, Laurent Jumet wrote: In my opinion, this is a symetric crypted message. You need the exact password (called passphrase as well) to decrypt it, but it's not a double key cipher. You're only partly correct. Letting 'gpg2 --list-packets --list-only' inspect the message, I

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread adrelanos
Pete Stephenson: 1. If you set the keyprefs in your gpg.conf configuration file before you generate a new key it will generate new keys with these stronger defaults rather than having you need to edit them later. See http://www.debian-administration.org/users/dkg/weblog/48 for details and

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread adrelanos
Hauke Laging: Am Mo 18.11.2013, 17:21:22 schrieb adrelanos: Hi, An article about air gapped OpenPGP keys has been written by me: https://www.whonix.org/wiki/Air_Gapped_OpenPGP_Key Please leave feedback or hit the edit button. By default GPG creates

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread adrelanos
Robert J. Hansen: Please leave feedback or hit the edit button. Maybe it's useful for someone. It's under public domain. A major omission: What is this, why should I care, and what security risks does it mitigate? Without that, the article is useful only to people who have already been

Re: Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread vedaal
On Tuesday, November 19, 2013 at 3:51 AM, fuzzykitt...@riseup.net wrote: Upon decryption of the attached message, the program requests a new passphrase. Then after any arbitrary string is entered (or nothing), decryption of the message fails. It does not matter if any private keys are held in

Unusual (unintended?) behavor upon decryption of a message // follow-up correction

2013-11-19 Thread vedaal
vedaal at nym.hush.com vedaal at nym.hush.com wrote onTue Nov 19 18:14:31 CET 2013 : gpg: public key decryption failed: bad passphrase gpg: encrypted with unknown algorithm 163 gpg: decryption failed: unknown cipher algorithm (the passphrase used was: 12345) Now here is the last part of the

Re: Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread Peter Lebbing
On 19/11/13 18:14, ved...@nym.hush.com wrote: Why does gnupg give these types of error message, as opposed to simply stating 'decryption failed: bad passphrase' ?? What kind of relationship is there between the number listed for the 'unknown algorithm' and the passphrase string that was

Re: Unusual (unintended?) behavor upon decryption of a message // follow-up correction

2013-11-19 Thread Peter Lebbing
On 19/11/13 20:47, ved...@nym.hush.com wrote: This is still unusual, as gnupg already identified it as TWOFISH, not as an unknown algorithm, TWOFISH was used to encrypt the session key. What was used to encrypt the data is still unknown, since that knowledge is encrypted. (With TWOFISH. Are

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread Johan Wevers
On 19-11-2013 7:07, Robert J. Hansen wrote: Even then, scrubbing data is usually a sign you've misunderstood the problem you're trying to solve. If you're concerned about sensitive data lurking on your hard drive the solution isn't to scrub the drive, it's to use an encrypted filesystem.

Re: Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread Peter Lebbing
On 19/11/13 22:37, ved...@nym.hush.com wrote: But this isn't the way hybrid gnupg messages work. Gnupg does not use one symmetric algorithm to encrypt the session key, and then another to encrypt the message. The user can choose 'which' symmetric algorithm to use, but it will be the same for

Unusual (unintended?) behavor upon decryption of a message // follow-up correction

2013-11-19 Thread vedaal
If the message is encrypted to one public key, and also encrypted symmetrically instead of to a second public key, then the symmetric algorithm used by gnupg is the same for the encryption of the session key to the public key, as well as the session key to the symmetrically encrypted part, as

Re: Unusual (unintended?) behavor upon decryption of a message

2013-11-19 Thread vedaal
On Tuesday, November 19, 2013 at 3:02 PM, Peter Lebbing pe...@digitalbrains.com wrote: On 19/11/13 18:14, ved...@nym.hush.com wrote: Why does gnupg give these types of error message, as opposed to simply stating 'decryption failed: bad passphrase' ?? What kind of relationship is there

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread Leo Gaspard
On Tue, Nov 19, 2013 at 09:06:18PM +0100, Johan Wevers wrote: On 19-11-2013 7:07, Robert J. Hansen wrote: Even then, scrubbing data is usually a sign you've misunderstood the problem you're trying to solve. If you're concerned about sensitive data lurking on your hard drive the solution

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread Robert J. Hansen
That depends on your threat model. If you fear juridical problems (say, for example, some encrypted mails have been intercepted by the police but they can't decrypt them), destroying the key will prevent you from having to hand it over. In some jurisdictions this may be seen as contempt of court,

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread Chris De Young
On 11/19/2013 3:50 PM, Robert J. Hansen wrote: [...] then used to do all further crypto operations. To put the data forever beyond recovery, you generate a new nonce, encrypt it with the same passphrase, and write it over the old nonce. If someone demands your cryptographic key you can

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread Leo Gaspard
On Tue, Nov 19, 2013 at 02:50:20PM -0800, Robert J. Hansen wrote: That depends on your threat model. If you fear juridical problems (say, for example, some encrypted mails have been intercepted by the police but they can't decrypt them), destroying the key will prevent you from having to hand

Re: article about Air Gapped OpenPGP Key

2013-11-19 Thread Robert J. Hansen
On 11/19/2013 6:03 PM, Chris De Young wrote: I'd be surprised if this gets you very far in a US court. Depends on when you did it and why. Many businesses have document retention policies (crafted with the assistance of counsel) that specify old documents are to be put beyond recovery, and