die, and a new generation grows up that is familiar with it.
-- Max Planck
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key:3EDBB65E 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
^^-^^ 14:10:01 up 13 days, 24 min, 3
have any evidence that such collisions are possible with the
resultant keysize being the same as the target keysize, please
post, thanks.
I just sent you a private mail containing a key with your key ID ;)
David
___
Gnupg-users mailing list
Gnupg
regards
David
--
*
David W. Chadwick, BSc PhD
Professor of Information Systems Security
School of Computing, University of Kent, Canterbury, CT2 7NF
Skype Name: davidwchadwick
Tel: +44 1227 82 3221
Fax +44 1227 762 811
Mobile: +44
problem was somewhat different, in that a new window appeared in
the GPA window and my password was entered and echoed to it, then the
window disappeared again. What I do not know is what caused this new
window to pop up. I suspect it was a hacker
regards
David
On 22/06/2012 18:04, Robert J
regards
David
--
*
David W. Chadwick, BSc PhD
Professor of Information Systems Security
School of Computing, University of Kent, Canterbury, CT2 7NF
Skype Name: davidwchadwick
Tel: +44 1227 82 3221
Fax +44 1227 762 811
Mobile: +44
, the embedded preference list stored in the
self-sig is chosen by this value.
You are correct. default-preference-list is to give the, well, default
preference list for new keys or the list that is set when you do updpref in
--edit-key and don't give an explicit list.
David
that you can't/won't handle.
However, note that the sender (if they choose to), can override this default
and pick whatever they like. This is not recommended as it can result in a
message that you, the recipient, can't read, but senders do have that power.
David
by having an old
copy of your key with a pref that you removed at some point, but you never
know).
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
algorithm so that more votes for that algorithm can increase the chance of it
being chosen, but it is equally correct (though perhaps not particularly
friendly) for an implementation to always pick 3DES, for example.
David
___
Gnupg-users mailing list
Gnupg
On Jun 17, 2012, at 7:36 AM, Michel Messerschmidt wrote:
On Sat, Jun 16, 2012 at 05:32:36PM -0400, David Shaw wrote:
Yes, I understand that spreading out keyserver requests can help avoid this
sort of tracking, but remember that the keyserver URL feature allows the
keyholder to bypass
On Jun 17, 2012, at 4:13 PM, Sam Smith wrote:
Doesn't the IETF openPGP standard call for 256-bit key for TWOFISH?
Could someone verify that the TWOFISH cipher uses 256-bit key length in GnuPG?
Yes.
See section 9.2 of RFC-4880 for confirmation.
David
through
TOR or something similar.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
at different intervals (i.e. refresh on every use vs refresh on
every use but not more than once a week, etc).
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
code.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
fonts in the PGP
documentation (or at least they were last time I looked - I haven't seen the
docs for the Symantec PGP). The bug here would seem to be the word
resistant. TEMPEST should be capitalized, too.
Does anyone happen to have Symantec PGP and know if they even still do this?
David
a passphrase before exporting the key.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ones who paid their dues. Real communists could not afford it.
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key: 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
^^-^^ 17:40:01 up 1 day, 2:00, 4 users, load average
.
That doesn't mean we can't start encouraging people to use 64-bit IDs, but I
don't expect it to be a quick process.
What is your concern here, though - accidental or intentional collision?
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
a V5 key format might even be accomplished sooner than
rooting out all the (now-incorrect) FAQs and general knowledge of people using
OpenPGP to get them to use 64-bit key IDs instead of 32. ;)
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
On May 29, 2012, at 2:05 PM, Sam Whited wrote:
On Tue, May 29, 2012 at 1:47 PM, David Shaw ds...@jabberwocky.com wrote:
On May 29, 2012, at 11:51 AM, Daniel Kahn Gillmor wrote:
What is your concern here, though - accidental or intentional collision?
Certainly both; while accidental
On May 29, 2012, at 3:34 PM, Daniel Kahn Gillmor wrote:
On 05/29/2012 02:18 PM, David Shaw wrote:
The reason I bring it up is that using the v3 key attack, 64-bit key IDs
have no particular benefit over 32-bit IDs for intentional collisions (i.e.
an attacker generating a key with the same
http://2.bp.blogspot.com/-v15Nbl_zG7s/T6BFiQoGDEI/AHs/U5eU7O6MG3o/s1600/security-fail.jpg
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key: 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
^^-^^ 07:40:01
in hand. Or
for that matter, perhaps a question #11 How come my signatures from my
2048-bit DSA key use a different hash than those from my 1024-bit DSA key?
would be interesting.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
size like 1536.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
computer out on a couple of
web sites that told my how hard it would be to crack it. One of them
said more than 10 million years. I guess that one is good enough, though
my current ones have two more characters. Maybe I should shorten them.
- --
.~. Jean-David Beyer Registered Linux User
(AES256) isn't available for a particular recipient,
GPG will use something else.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the scripts are working on the new
system.
And gpg2 is still installed for all the dependencies linked to it under RHEL6.
David M. Roberts
Iowa State University
Information Technology Services
dmro...@iastate.edu
515-294-0288
-Original Message-
From: gnupg-users-boun...@gnupg.org [mailto:gnupg
with the agent: Bad passphrase
gpg: skipped signing-key: General error
We don't need S/MIME or Mail on this system, just GPG in batch mode.
Any help or insight is appreciated.
Thanks,
Dave
David M. Roberts
Iowa State University
Information Technology Services
dmro...@iastate.edu
515-294-0288
with the agent: Bad passphrase
gpg: skipped signing-key: General error
We don't need S/MIME or Mail on this system, just GPG in batch mode.
Any help or insight is appreciated.
Thanks,
Dave
David M. Roberts
Iowa State University
Information Technology Services
dmro...@iastate.edu
515-294-0288
that date. They could give any
revocation reason they like, or no reason. They can put whatever they want to
in the string. What they can't do (modulo serious crypto failure and/or bugs)
is generate a revocation without access to the secret key.
David
starting to break
at the 2gb mark.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
, though, any unmodified GPG should be able to handle it.
2) It will match some things other than mail1.example.com and mail2.example.com
as well (like mailQ.example.com, or foobar.mail1.example.com, etc).
David
___
Gnupg-users mailing list
Gnupg-users
back from the keyserver for that ID...
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659905
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Davi Barker wrote:
Werner,
Thanks for you help. I discovered a list of libraries that needed to be
installed prior to GnuPG. I got that figured out, but now I'm getting a
new error message:
compress.c:34:18: fatal error: zlib.h: No such file or directory
compilation terminated.
It looks
will be disappeared. The time for that has not yet
come. I hope it is postponed until after I can no longer use a computer.
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key: 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
your posts.
OK. I stand behind this post. But other than amusing myself, does it
really make any difference?
- --
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key: 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
is on keyserver.pgp.com to sign a key and send the update to the keyserver. So
you can always sign someone else's key if you desire.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
a user ID of Anonymous or similar, but you do need something
there. Note that if you are intending to get your key signed by others, most
people won't sign a user ID that just reads Anonymous.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
back when PGP version 2 didn't automatically do it.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
of saying if a key is the right one or not. They're
just a searchable database that anyone can submit to. A person who trusts a
particular key is correct just because they found it on a keyserver is fooling
themselves. That's what we have a web of trust and/or fingerprint checking for.
David
litter keys with repeated signatures. If I recall, it is (or perhaps was)
the default keyserver for PGP installations.
Of necessity, this server does not synchronize with other keyservers, which is
either a good or bad thing, depending on who you ask ;)
David
On Dec 17, 2011, at 10:25 AM, Jerome Baum wrote:
On 2011-12-17 16:17, David Shaw wrote:
It's an interesting server, with different semantics than the
traditional keyserver net that we were talking about earlier. Most
significantly, it emails the keyholder (at the address on the key)
before
not missing something obvious.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
,
if the point is photo distribution, there are more efficient ways to go about
it, but if your goal is to hurt the keyserver network…
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
verification that.
Yes. When listing a DSA key or subkey, the lengths given in pkd:0 or pkey[0]
are for p, and the lengths given in pkd:1 or pkey[1] are for q.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
this might
actually be a Curl question. Curl (at least on Linux) uses getaddrinfo to
resolve out the IPv4 vs IPv6 question. What happens if you do curl -v
http://grepular.com:11371; on the command line?
See also http://manpages.ubuntu.com/manpages/natty/man5/gai.conf.5.html
David
On Nov 30, 2011, at 11:43 AM, gn...@lists.grepular.com wrote:
On 30/11/11 16:25, David Shaw wrote:
mike@Fuzzbutt:~$ gpg --keyserver grepular.com --recv-key
gpg: requesting key from hkp server grepular.com
gpgkeys: HTTP fetch error 7: Failed to connect to
2001:470:1f09
://zimmermann.mayfirst.org ca-cert-file=path to
gnupghome\mfpl.crt
keyserver-options verbose
Yes, you can. It's different options per keyserver, not per type.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo
a (different) error.
Note that the MDC is on by default, but can be turned off, either via the
command line/config file or by a particular key.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
appreciated.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
2011-11-19 16:32:27 scdaemon[17659] listening on socket `/tmp/gpg-dNT4ZZ/S.scdaemon'
2011-11-19 16:32:27 scdaemon[17659] handler for fd -1
Robert J. Hansen wrote:
IIRC, it was a response to laws like the United Kingdom's RIPA which
allows the authorities to demand encryption keys from users. By
separating encryption and signing into separate subkeys, and making the
signing subkey the 'master' one, it allows users to divulge
m.aflakpar...@ut.ac.ir wrote:
I need to decrypt .gz.gpg files (e.g. 70195_C1_WTCCCT442627.CEL.gz.gpg).
I have the encryption key(passphrase).
Remember that the passphrase is not the key. The key is stored in a
file, and that file is protected by the passphrase so that only people
who know the
Please remember to keep the GnuPG users' mailing list in copy in case
anyone else has any better ideas.
m.aflakpar...@ut.ac.ir wrote:
Thank you Dave,
I tried again with this command:
gpg --decrypt-file myfile.gpg
and entered the passphrase when I was asekd to enter it.
But, this error
on this list carry a cell phone?
--dan
I carry one about half the time, but it is usually powered off unless I
am expecting a call, or when I need to make one. Also about once every
other month to use the GPS navigation feature.
--
.~. Jean-David Beyer Registered Linux User 85642.
/V
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Roland,
What version of Windows are you running? Could you start Kleopatra from
cmd and then paste the output for us? Is Gpg4win running fine on its own?
Thank you,
David Manouchehri
m...@davidmanouchehri.com
http://www.davidmanouchehri.com
way. 8-(
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key: 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
^^-^^ 10:05:01 up 19:11, 4 users, load average: 4.93, 4.98, 5.11
instead of a tool designed for disk
encryption? TrueCrypt is cross-platform and works well... if you're
Windows-only, there's BitLocker, and for Linux there's LUKS/dm-crypt
and eCryptFS.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http
fingerprint when signing keys.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Robert J. Hansen wrote:
On 10/11/2011 05:14 PM, Jean-David Beyer wrote:
Let us assume you are the bad guy
Okay.
Unless you have my encrypted keys, you have to access my computer
(unless you have already stolen it, in which case
/nistpubs/800-63/SP800-63V1_0_2.pdf
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org
David Tomaschik wrote (in part):
If you value your OpenPGP key, I would not trust it to 24 bits of
entropy. My off-card backup of my key is protected by a 32-character
passphrase that I believe to be highly resistant to dictionary
attack (and contains sufficient special characters that I
throw it out on the off chance there were others who
hadn't noticed it.
--
.~. Jean-David Beyer Registered Linux User 85642.
/V\ PGP-Key: 9A2FC99A Registered Machine 241939.
/( )\ Shrewsbury, New Jerseyhttp://counter.li.org
^^-^^ 17:05:02 up 5 days, 1:38, 4 users
probably fine.
In general, once you've lost confidence in the security of the key,
you should revoke it. I personally only take around subkeys that
expire every six months, so even if I lose that key, soon enough it
won't matter.
David Manouchehri
On Sun, Oct 9, 2011 at 5:30 PM, takethe
, IIRC.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg
Possibly a bit off-topic, but...
Does anyone have any experience of using an MS Exchange server, where it
corrupts PGP-MIME emails by re-encoding the encrypted data in base64?
If I'm going to complain to our local IT about it, I need some hard
evidence about how it's breaking the PGP-MIME RFC.
were I can verify signature of signed data by both
keys (the last octet of One-Pass Signature Packets (Tag 4) packet should be
equal to zero).
Just repeat -u as many times as you need:
gpg -u the-first-key -u the-second-key -u the-third-key -u etc --sign thefile
David
is not a valid header, and is confusing gpg.
Most likely, this is caused by the email client on the sending side
wrapping the text. (Although maybe some receiving clients re-wrap
text, I'm not aware of any.)
Can you provide information on the client(s) in use?
--
David Tomaschik, RHCE, LPIC-1
System
the GPG_AGENT_INFO ebvar which might have
been set by another script.
I tried this:
david@david-desktop-debian:~$ unset GPG_AGENT_INFO
david@david-desktop-debian:~$ gpg-agent --use-standard --daemon sh
gpg-agent[7657]: a gpg-agent is already running - not starting a new one
david@david-desktop-debian
I don't have a ~/.gnupg/gpg-agent.conf and starting gpg-agent with
--use-standard-socket doesn't work:
david@david-desktop-debian:/$ gpg-agent --use-standard-socket
gpg-agent[4092]: can't connect to `/tmp/gpg-ZGPhgS/S.gpg-agent': No such
file or directory
gpg-agent[4092]: can't connect to `/home
are as
follows:
david@david-desktop-debian:~$ gpg2 --card-status
gpg: selecting openpgp failed: Card error
gpg: OpenPGP card not available: Card error
david@david-desktop-debian:~$ gpg --card-status
gpg: selecting openpgp failed: ec=6.108
gpg: OpenPGP card not available: general error
david@david
On 09/07/2011 04:13 PM, David Robertson wrote:
I posted this earlier:
Hello,
I've just bought myself a Gemplus/Gemalto GemPC twin USB smartcard
reader and a V2.0 OpenPGP card. I'm running Debian Squeeze. I've set up
udev rules as described here
http://www.gnupg.org/howtos/card-howto/en
get a different output for gpg 1.4.10:
gpg: pcsc_establish_context failed: no service (0x8010001d)
gpg: card reader not available
gpg: OpenPGP card not available: general error
How can I fix this?
Thanks in advance,
David Robertson.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (GNU/Linux
: pcsc_establish_context failed: no service (0x8010001d)
gpg: card reader not available
gpg: OpenPGP card not available: general error
How can I fix this?
Thanks in advance,
David Robertson.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http
On 03/09/11 20:42, Martin Gollowitzer wrote:
* David Robertson djpeterrobert...@gmail.com [110903 11:18,
mID 4e61eaae.20...@gmail.com]:
Hello,
I've just bought myself a Gemplus/Gemalto GemPC twin USB smartcard
reader and a V2.0 OpenPGP card. I'm running Debian Squeeze. I've set up
Ben McGinnes wrote:
On 2/09/11 3:02 AM, Julian H. Stacey wrote:
(talk about a long password). However, which tool is used to encrypt it?
Would running the unix 'file' command give a clue ?
Nope, it just comes up as data and the only clue as to what type is
the .aes256 extension it's been
that would be an issue, but I can't be sure. Keep in
mind that as long as the card is left in the reader, it would be
considered unlocked -- do you want to leave that laying around? (It
depends on your threat model, of course.)
Thanks!
Richard
--
David Tomaschik, RHCE, LPIC-1
System
On Tue, Aug 30, 2011 at 2:56 PM, Richard rich...@r-selected.de wrote:
On Tue, Aug 30, 2011 at 20:49, David Tomaschik da...@systemoverlord.com
wrote:
No, you can store a primary key. And you can use the 3 slots for any
purpose (though I believe they must all tie to the same primary key
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Run sudo apt-get install bzip2 and see if that helps. Have you
changed your kernel at all?
David Manouchehri
On 8/25/2011 11:22 AM, Lance W. Haverkamp wrote:
gpg: invalid item `BZIP2' in preference string
-BEGIN PGP SIGNATURE
that nowadays more and more low-processing power devices are used.
Such keys are at best a political statement and a good laugh for some
NSA folks.
Shalom-Salam,
Werner
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da
, wrong. Suggested readings:
https://secure.wikimedia.org/wikipedia/en/wiki/Entropy_%28information_theory%29,
https://secure.wikimedia.org/wikipedia/en/wiki/Password_strength and
NIST publication 800-63.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP
by Ironkey, you could
even take those in the shower with you! ;)
Hope that clears it up,
David Manouchehri
On 8/26/2011 5:00 PM, Anthony Papillion wrote:
On 8/26/2011 3:53 PM, David Manouchehri wrote:
The Evil Maid attack can't really be defeated, but what you can do to
help
try to update my keyring every few weeks.
David Manouchehri
On 8/24/2011 1:46 PM, Grant Olson wrote:
On 8/24/11 11:47 AM, Mike Acker wrote:
given that I have loaded my public key to a key-server ( e.g.
keys.gnupg.net )
when i upload information to be merged into my keyblock (e.g
for my regular PIN. (The
admin PIN is somewhat longer.) Would this be considered a reasonable
length?
(Someone who can read the memory on a smart card by opening it up is
NOT in my threat model -- if they can do that, they have much easier
ways to coerce me into giving up my PIN.)
--
David
you can't do that
instantly.
Shalom-Salam,
Werner
Thanks Werner!
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing
Regards
I don't see a windows binary, but it looks to be written in pure C with
no external dependencies, so I would assume you could easily build it
under Cygwin.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
one, so I posted here.
You might also try the ietf-openpgp list: http://www.imc.org/ietf-openpgp/
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
model of GPG - either way, you're not giving key signatures made by that key
any weight in your web of trust.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
the script. However the script fails, when no
one is logged in. Other than setting the --homedir in the script, is
there another solution?
Thanks,
Greg E. Smith
I don't use GPG on Windows, but I think
HKLM\Software\GNU\GnuPG\HomeDir will work for those cases.
David
character. (Aka \r.)
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman
is text.
So, on the *encrypting* side, add --textmode to the command, and that will
tell GPG to store things appropriately, and the decrypting side will recognize
this and use the appropriate line endings in the resulting file.
David
___
Gnupg-users
wallet in a front pocket -- I know some people sit on
theirs which might be a bit worse for it.)
David
On Wed, Jul 27, 2011 at 11:56 PM, Robert J. Hansen r...@sixdemonbag.org wrote:
Are there any particular problems the durability of a smartcard,
particularly an OpenPGP card? Are there any damage
for me right now. Am I
missing something? Decimal values are not accepted, nor seconds,
minutes, or hours.
When GPG asks you for the value, enter seconds=X. You can go down to as low
as a single second.
David
___
Gnupg-users mailing list
Gnupg-users
impolite (just as any 32+ line .sig file would
be), especially when a simple link to the keyserver is so easy to include.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
. That may or may not be an issue in your situation.
Signing does help there since Fred presumably doesn't have access to your
secret key.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
www.keysigning.org. That site has some event info as well.
There are other sites, but those are good starting points.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Sorry, this was intended to be sent to the entire list, but I composed
it in a hurry my apologies.
On Tue, Jul 12, 2011 at 4:24 PM, David Tomaschik
da...@systemoverlord.com wrote:
assert() kills the program if the value in the parentheses evaluates
to FALSE. In this case, that means
of that there is a bunch of general OpenPGP overhead
(encrypted session key, etc).
The cipher does make a difference here, but it's small and dwarfed by other
factors.
David
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo
. The default of 65536 would encode to 96.
You might file an enhancement bug to print the decoded value in --list-packets.
We already print it for symmetric encryption, and it's reasonable to print it
for secret keys as well.
David
___
Gnupg-users mailing
On Jul 8, 2011, at 2:35 PM, Chris Poole wrote:
On 8 Jul 2011, at 17:31, David Shaw ds...@jabberwocky.com wrote:
Yes. Note that the list-packets output shows the internal packed value:
6553600 should come out to 201. The default of 65536 would encode to 96.
I do indeed get 201. Out
301 - 400 of 1823 matches
Mail list logo