Not to ask a stupid question but how can you tell which algorithm your
keys are using and if using SHA1 update them to a more secure one?
Thanks,
On 11/17/2020 4:13 PM, Phil Pennock via Gnupg-users wrote:
The current state of SHA1 is "dangerously exposed, you should be
hurrying for the exits,
On 2020-11-17 at 15:47 +, Stefan Claas wrote:
>} Since 2005, SHA-1 has not been considered secure against well-funded
>} opponents;[4] as of 2010 many organizations have recommended its
>} replacement.[5][6][7] NIST formally deprecated use of SHA-1 in 2011
>} and disallowed its use for digital
The answer to the second question is:
A SHA-1 collision of two documents D1 and D2 means that the hash values
Hash(D1) and Hash(D2) are equal, which in turn means that (regardless
who signs) any signature of D1 (be it OpenPGP or SMIME) can also be used
as a signature of D2. Any signer and any key,
On Mon, Nov 2, 2020 at 2:25 PM Phil Pennock via Gnupg-users
wrote:
>
> On 2020-11-02 at 13:49 +0100, Werner Koch via Gnupg-users wrote:
> > On Fri, 30 Oct 2020 00:10, Phil Pennock said:
> > > recipient. That's fine. I'd rather create pressure for people to fix
> > > their systems to use modern c
On Tue, 17 Nov 2020 02:28, Gao Xiaohui said:
> conf.conf". At present, the "--s2k-count" option can be used in both
> gpg.exe and gpg-agent.exe.Thank you.
In gpg.conf this is used for deriving a passphrase for symmetric
encryption.
In gpg-agent.conf it is used to override the calibrated iteratio
Thank you for your reply to my question.
In "https://dev.gnupg.org/T1800";, Werner responded: "It is an open question
whether gpg should be allowed to change the s2k options because the keys are a
property of the agent and not of gpg. For export it might hwoever make sense to
be able to change t
Hello!
We are pleased to announce the availability of a new GnuPG release:
version 2.2.24. This is maintenace release fixing some long standing
bugs. See below for details.
What is GnuPG
=
The GNU Privacy Guard (GnuPG, GPG) is a complete and free implementation
of the OpenPGP and