Re: Defaults

2015-03-18 Thread Werner Koch
On Tue, 17 Mar 2015 20:44, r...@sixdemonbag.org said: > Given that 2.1 introduces a lot of new capabilities (mostly with respect > to ECC), I think now, early on in the 2.1 series, would be a good time > to discuss changing the defaults for newly-generated certificates. Let's do a quick check of t

Re: Defaults

2015-03-18 Thread Damien Goutte-Gattat
On 03/18/2015 01:34 AM, Robert J. Hansen wrote: I think this shouldn't be supported; CAST5 should only be used if (a) it's in the recipient's key prefs and (b) it's explicitly listed in default-cipher-prefs. I don’t think that ignoring the recipient’s preferences should be the default behavio

What am I doing wrong?

2015-03-18 Thread Mark Walter
Hello all. I'm having issues with encrypt and decrypt and I know it's something I'm doing wrong. I created a key with Kelopatra. Imported it into GNU Privacy Assistant. It shows up as Fully Valid. Next, to test, I created the text file test.txt and used the following command to encrypt it. gpg

Re: What am I doing wrong?

2015-03-18 Thread Daniel Kahn Gillmor
On Wed 2015-03-18 08:18:11 -0400, Mark Walter wrote: > I'm having issues with encrypt and decrypt and I know it's something > I'm doing wrong. I created a key with Kelopatra. Imported it into GNU > Privacy Assistant. It shows up as Fully Valid. > > Next, to test, I created the text file test.txt a

RE: What am I doing wrong?

2015-03-18 Thread Mark Walter
No, Only the Private keys show up. What I tried to create and test was a public key to give to a partner for encrypting files sent to us. Thanks. Mark Walter Business to Business Data Integration Specialist Certified IBM System i Specialist Paragon Consulting Services, Inc. mwal...@paragon-csi.

Re: What am I doing wrong?

2015-03-18 Thread da...@gbenet.com
On 18/03/15 12:18, Mark Walter wrote: > Hello all. > > I'm having issues with encrypt and decrypt and I know it's something I'm > doing wrong. I created a key with Kelopatra. Imported it into GNU Privacy > Assistant. It shows up as Fully Valid. > > Next, to test, I created the text file test.tx

RE: What am I doing wrong?

2015-03-18 Thread Mark Walter
Thanks so much for the help everyone. I believe I have this working as I need it. Mark Walter Business to Business Data Integration Specialist Certified IBM System i Specialist Paragon Consulting Services, Inc. mwal...@paragon-csi.com 717-764-7909 ext. 20 -Original Message- From: Gnup

SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
Hello, I originally posted this on the sks-devel mailing list, but after thinking about it, I believe this might be something I am doing wrong on the GnuPG side.: I set up a keyserver at keyserver.myriapolis.net. What I have done so far: Installed sks (1.1.5) from wheezy-backports SKS is beh

Email-only UIDs and verification (was: Making the case for smart cards for the average user)

2015-03-18 Thread Jose Castillo
On Mar 16, 2015, at 8:55 PM, MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote: > I would urge you to > reconsider your decision to drop the angle brackets. At > least one MUA (the MUA I am using to write this message) > sends the email address enclosed in angle brackets as the > search string

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/18/2015 03:54 PM, Samir Nassar wrote: > Hello, > > I originally posted this on the sks-devel mailing list, but after > thinking about it, I believe this might be something I am doing > wrong on the GnuPG side.: > > I set up a keyserver at key

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
On Wednesday, March 18, 2015 07:28:31 PM Kristian Fiskerstrand wrote: > Likely related to the PTR issues[0, 1], its already in the roadmap[2] Thank you Kristian, So I understand this better. When using non-encrypted connections GnuPG doesn't have a problem, but when I am using a wildcard certifi

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/18/2015 08:39 PM, Samir Nassar wrote: > On Wednesday, March 18, 2015 07:28:31 PM Kristian Fiskerstrand > wrote: >> Likely related to the PTR issues[0, 1], its already in the >> roadmap[2] > > Thank you Kristian, > > So I understand this bette

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
On Wednesday, March 18, 2015 08:54:47 PM Kristian Fiskerstrand wrote: > Hmm, I didn't notice that it was a wildcard cert, that should also > support holdfast.myriapolis.net in the cert matching, however it > results a redirect and404 for [0]. If you add this as a vhost I > suspect it will w

Re: what is the proper way to load gpg-agent with systemd

2015-03-18 Thread Jacky Alcine
On Tuesday, March 17, 2015 03:48:54 PM Paulo Lopes wrote: > Hello, > > I've been using my gpg card with success in Ubuntu for a while but as > everyone knows the init system is switching from upstart to systemd as it > is happening on Debian and the vast majority of other distributions. > > In th

Re: Defaults

2015-03-18 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Wednesday 18 March 2015 at 8:09:30 AM, in , Werner Koch wrote: > > created: 2015-03-18 expires: never Just wondering why we want keys to never expire by default. Why is that better than a default validity period of "X" years? - -- Best

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/18/2015 09:13 PM, Samir Nassar wrote: > On Wednesday, March 18, 2015 08:54:47 PM Kristian Fiskerstrand > wrote: >> Hmm, I didn't notice that it was a wildcard cert, that should >> also support holdfast.myriapolis.net in the cert matching, >>

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
On Wednesday, March 18, 2015 09:21:08 PM Kristian Fiskerstrand wrote: > 11371 is expected to be for HKP, so requiring this to be TLS is bad > practice. Oh oops. Fixed now. > > gpg-connect-agent --verbose --dirmngr 'keyserver > > hkps://keyserver.myriapolis.net:11371' 'ks_get 1e42b367' /bye > >

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/18/2015 10:08 PM, Samir Nassar wrote: > On Wednesday, March 18, 2015 09:21:08 PM Kristian Fiskerstrand > wrote: >> 11371 is expected to be for HKP, so requiring this to be TLS is >> bad practice. > ... > gpg: DBG: chan_4 <- ERR 1 General err

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
On Wednesday, March 18, 2015 10:14:53 PM Kristian Fiskerstrand wrote: > gpg-connect-agent --dirmngr 'KEYSERVER --help' /bye > S # Known schemata: > S # hkp > S # hkps > S # http > S # finger > S # kdns Same. When I set the keyserver to: hkp://keyserver.myriapolis.net everything works.

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 03/18/2015 10:33 PM, Samir Nassar wrote: > On Wednesday, March 18, 2015 10:14:53 PM Kristian Fiskerstrand > wrote: >> gpg-connect-agent --dirmngr 'KEYSERVER --help' /bye S # Known >> schemata: S # hkp S # hkps S # http S # finger S # >> kd

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
On Wednesday, March 18, 2015 10:40:57 PM Kristian Fiskerstrand wrote: > try renaming /home/snassar/.gnupg/myriapolis.net.crt to > /home/snassar/.gnupg/myriapolis.net.pem Done. > if that doesn't help , can you increase debug verbosity in > dirmngr.conf and set the logfile? > $ cat dirmngr.conf >

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Daniel Kahn Gillmor
On Wed 2015-03-18 18:03:11 -0400, Samir Nassar wrote: > On Wednesday, March 18, 2015 10:40:57 PM Kristian Fiskerstrand wrote: >> try renaming /home/snassar/.gnupg/myriapolis.net.crt to >> /home/snassar/.gnupg/myriapolis.net.pem > > Done. It looks to me like you're using the server's certificate a

Re: SKS Keyserver, HKPS, and GnuPG 2.1

2015-03-18 Thread Samir Nassar
On Wednesday, March 18, 2015 06:18:53 PM Daniel Kahn Gillmor wrote: > It looks to me like you're using the server's certificate as the CA > certificate. I don't think that's going to work. Maybe you want to use > the Addtrust root cert (attached here) Ahem. You are so very right. Somehow it esca

SKS Keyserver, HKPS and GnuPG 2.1

2015-03-18 Thread David Wood
Dear all, Apologies for the thread break - I was reading via the archives and have only just subscribed. I debugged this issue a few days ago. I've posted a patch for testing and hopefully incorporation into a future GnuPG 2.1 build at https://bugs.g10code.com/gnupg/issue1792 With this patch, hk