On 11/06/13 23:57, Smith, Cathy wrote:
> Hi
>
> A couple of years ago I created a gpg key for an account that is use to
> transfer documents with vendors. It's worked fine. We now have a new vendor
> that won't accept the public key because of the expiration date. I don't see
> a way to crea
On 09/10/13 21:42, Jan wrote:
> 10/9/2013 14:19, Werner Koch wrote :
>> So what about using that free USB stack for AVR's to implement a flash
>> device? You would be able to audit about everything; flylogic even has
>> these nice pictures of the ATmega88 masks...
&g
On 09/10/13 15:16, Jan wrote:
> I don't understand this, what does AVR etc. mean? Is there a substituion for
> USB? I'd be grateful for an explanation.
AVR is a semiconductor manufacturer who make microcontrollers (amongst
other things).
___
Gnupg-user
the general gist of the way it works. So, provided your secret
key is kept secret, and your addressees verify that the public keys they
have really do belong to you, you can be confident that the signature
mechanism is safe.
--
David SmithWork Email: dave.sm...@st.com
STMicroelectro
On 07/26/13 22:20, Johan Wevers wrote:
> Yes, I know the mantra, and I'm sure that obvious backdoors are not
> present because they would be found rather quickly. However, more subtle
> bugs leading to decipherable messages can take more time to find. The
> infamous PRNG bug in pgp 5 on Unix is a w
On 06/12/13 10:49, Nils Faerber wrote:
> Am 12.06.2013 07:24, schrieb Navin:
>> Since GnuPG comes under the GPL, I would like to clarify if a person's
>> proprietary software makes use of GnuPG purely by invocation of the
>> commandline commands, and the GnuPG exe's and DLL's are bundled
>> unmodif
On 05/22/13 09:59, Zece Anonimescu wrote:
> Hey fellas!
>
> For the sake of portability I was reading about keeping the keyring on a
> removable drive. I searched online but I get other things. Is it
> possible to have the keys some other place? How do I tell GnuPG on some
> other computer that it
On 05/03/13 15:02, Lema KB wrote:
> can a symmetric cipher be/use also public-private-keys?
No. The whole point of public/private cryptography is to use asymmetric
ciphers.
(caveat: actually, this is an over-simplification. In reality, gpg DOES
use symmetric ciphers, but in a way that makes it
On 05/03/13 12:58, Lema KB wrote:
> Hi Werner
>
> let's say, user_1 created public-private-key_1. then senders should
> encrypt it with public-key_1 but for all user_1, user_2, etc.
>
> with which private key will user_2, user_3,.. decrypt this file.csv,
> which is encrypted with public-key_1?
N
On 03/26/13 10:30, Jan Chaloupecky wrote:
> Sorry, I sent the last mail only to Hubert.
>
>
> I was saying that Squeeze does not have in any of its repositories the
> versions that support IDEA:
>
> Max version of GnuPG is 1.4.12
> http://packages.debian.org/search?keywords=gnupg&searchon=names
On 03/25/13 20:05, Jan Chaloupecky wrote:
> On Monday, March 25, 2013 at 8:36 PM, Werner Koch wrote:
>> On Mon, 25 Mar 2013 16:00, chal...@gmail.com
>>> so the question is .. can I ship the idea shared object with my software?
>>> The idea.c contains the following comments. So if I understand it
>>
On 03/05/13 16:45, BassToGo123 wrote:
> I apologize for my inpatients. I have scoured the internet for a
> discussion board or some other way of finding support for this program,
> and this board is the only one I could find. Not that it matters to
> anyone here, but not resolving this problem in a
On 01/04/13 17:31, David Shaw wrote:
> Sure, paperkey supports piping the output into whatever code generator you
> like:
>
> gpg --export-secret-key mykey | paperkey --output-format raw |
> your-bar-code-generator
>
> However, 2D bar codes have some of the problems that paperkey is intended
On 09/13/12 16:47, ved...@nym.hush.com wrote:
> The discussion about 'safe' text editors brings about an
> interesting question:
>
> Is an editor needed at all?
>
> Why not just input text into gnupg and then encrypt the inputted
> txt without saving it as file at all ?
>
> example:
>
> $ pri
Davi Barker wrote:
> Werner,
>
> Thanks for you help. I discovered a list of libraries that needed to be
> installed prior to GnuPG. I got that figured out, but now I'm getting a
> new error message:
>
> compress.c:34:18: fatal error: zlib.h: No such file or directory
> compilation terminated.
I
Robert J. Hansen wrote:
> IIRC, it was a response to laws like the United Kingdom's RIPA which
> allows the authorities to demand encryption keys from users. By
> separating encryption and signing into separate subkeys, and making the
> signing subkey the 'master' one, it allows users to divulge e
Please remember to keep the GnuPG users' mailing list in copy in case
anyone else has any better ideas.
m.aflakpar...@ut.ac.ir wrote:
> Thank you Dave,
>
> I tried again with this command:
>
> gpg --decrypt-file "myfile.gpg"
>
> and entered the passphrase when I was asekd to enter it.
> But, th
m.aflakpar...@ut.ac.ir wrote:
> I need to decrypt .gz.gpg files (e.g. 70195_C1_WTCCCT442627.CEL.gz.gpg).
> I have the encryption key(passphrase).
Remember that the passphrase is not the key. The key is stored in a
file, and that file is protected by the passphrase so that only people
who know the
Possibly a bit off-topic, but...
Does anyone have any experience of using an MS Exchange server, where it
corrupts PGP-MIME emails by re-encoding the encrypted data in base64?
If I'm going to complain to our local IT about it, I need some hard
evidence about how it's breaking the PGP-MIME RFC.
I
Ben McGinnes wrote:
> On 2/09/11 3:02 AM, Julian H. Stacey wrote:
>>> (talk about a long password). However, which tool is used to encrypt it?
>> Would running the unix 'file' command give a clue ?
>
> Nope, it just comes up as "data" and the only clue as to what type is
> the .aes256 extension it
m...@vp.pl wrote:
> Hello
> I have a question. I want to encrypt file that consists of one word for
> example 'home with AES'. When I did encryption I got file that is 49
> bytes. How can I separate my encrypted 4-byte word from the rest of
> file. I need only encrypted part of my word, I don't wan
griffmcc wrote:
> Although I can encrypt a file using a script, when crontab runs the same
> script, it returns the error message “no default secret key: No secret
> key”. I have one secret key:
>
> sananselmo backupscripts.d # gpg --list-secret-keys
> /root/.gnupg/secring.gpg
> --
jimbob palmer wrote:
> In Firefox I can sign or encrypt or encrypt+sign an e-mail.
>
> In what case would I want my encrypted emails also signed? Does it
> provide any additional benefit over a pure encrypted email?
Signing and encrypting serve different purposes.
Encrypting a mail ensures that
Jameson Rollins wrote:
> We should be careful not to overstate the impatience of users too much.
> I've seen plenty of people wait many seconds for google maps to load on
> phones without giving up on the whole process. I also have an extremely
> slow machine were I routinely have to wait a long t
Jean-David Beyer wrote:
> David Smith wrote:
>> Not truly "quantitative", but I notice a significant difference
>> between encrypting emails to people with 1024-bit keys vs people with
>> 4096-bit keys. I'd say that the difference is in the order 3-6
>> s
Daniel Kahn Gillmor wrote:
> On 09/24/2010 09:54 AM, David Shaw wrote:
>> It won't work with the current generation of OpenPGP smartcards. It also
>> will be dreadfully slow if you (or someone you are communicating with) ever
>> uses the key on a small machine (think smart phone). If you are usu
Snaky Love wrote:
> Hi David,
>
> thank you very much for your explanation!
>
> May I ask a few final questions about this issue:
>
> - are there any tools at all that handle the "group crypto + archive"
> use-case satisfactory? (Yes, PM me your ads :)
> - what is the current state of research
Snaky Love wrote:
> Hi,
>
> thank you very much for the interesting discussion.
>
> About GSWoT - does this cover my described use-case? I don´t quite get
> it from a first glance on the website...
Well, I've only just learned about it by reading the website, but...
Not really.
>From what I
m...@proseconsulting.co.uk wrote:
> I need to be able to ultimately trust a public key in batch mode, that I
> have downloaded automatically with wget from an internal server over HTTPS.
>
> I don't want to do --trust-model always, apart from the fact I want to
> use a trusted key anyway, gpg --tr
Robert wrote:
> 7) I assume the key rings themselves, holding the keys, are encrypted.
> How strong is this encryption in GPG? What algorithm is used, etc? One
> requirement is about compromising the machine with the keys, how easy it
> would be to export the keys. Since the keyring is physically l
Robert wrote:
> Hi, we're using GnuPG 1.4.5 to encrypt and store sensitive files at
> work. We have been given some requirements to comply with, spawning some
> general questions. I tried searching in help files but haven't found
> answers to everything so I'm trying here. If this questions are ask
Jean-David Beyer wrote:
> Well, the stuff I get from the Gnupg-users@gnupg.org list has
> "precedence: list" set. Other lists to which I subscribe use "Precedence
> normal" or "precedence: bulk". Regular e-mail does not have precedence
> set at all. It seems to me that mailing lists should get the
Jean-David Beyer wrote:
> David Smith wrote:
>> Mailing lists programs normally send mails with the "Precedence: bulk"
>> or "Precedence: junk" header, and then the autoresponder should
>> recognise this and choose not to respond to mails with the "b
Gorugantu, Prakash wrote:
> Our project has a requirement where we need to pull a file using PGP
> encryption/decryption from one of our clients ftp servers. Please let us
> know if we can use GNUPG to encrypt/decrypt files with PGP. We read
> somewhere in your licensing agreement that GNUPG for P
erythrocyte wrote:
> On 3/11/2010 3:29 PM, Dan Mahoney, System Admin wrote:
>> On Thu, 11 Mar 2010, erythrocyte wrote:
>>> Ref:
>>> http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/
>>>
>> Okay, let me sum up this article for you:
>>
>> Researchers
ind of UNIX system.
It sounds like the problem is that it's looking for a C compiler (e.g.
gcc) and you haven't got one installed.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Az
se it can be fooled
intentionally, but for most likely scenarii (i.e. where people aren't
deliberately trying to fool it), it would work.
If you're running on UNIX (particularly Linux), look at 'man file'.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 6
ossibility of malicious intentions - trying to frame
someone by putting encrypted data onto someone's computer and tipping
off the authorities.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 64
that the RIP bill was being
pushed through about the difficulty of proving that you don't have
access to a particular piece of information.
The RIPA is a particularly nasty piece of legislation in this respect.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMic
cally secure with a one-time pad.
Of course, you then have the key exchange problem.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13
es, the key arriving from the keyserver might not
look the same in its ASCII-armoured form. Unless you see a problem
with the key once it's been imported into GPG, don't worry about it.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | F
ing Bourne shell, you can redirect stdout
and stderr separately:
my_command 1> stdout_goes_here.txt 2> stderr_goes_here.txt
Otherwise, you need to be a bit more specific as to exactly what you want
to do (and which shell you're running in).
--
David Smith| Tel: +44 (0)14
and its attachments from your system immediately
> and notify us by return e-mail. Do not disclose copy, circulate or use any
> information contained in this e-mail.
>
> § The content of this e-mail is to be read subject to our terms of
> business, as applicable.
[snip]
HT
the webmaster but the email is bouncing
>
> I can't access http://www.gnupg.org/mailing-lists.en.html to see if
> there's a better list to send to than this one either!
>
> I'm hoping someone here can do something about it
Works OK for me, so either someone's alr
On Thu, Mar 26, 2009 at 07:51:15PM +1000, Felipe Alvarez wrote:
> I was unable to find adequate explanations online.
http://www.gnupg.org/gph/en/manual/x209.html
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile:
pg will be ElGamal for the asymmetric public/private
key bit, and AES for the symmetric cipher.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key:
doing some keysigning.
I suggest reading the GNU Privacy Handbook, on the GnuPG website, and
if you still have questions, come back and ask...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 64272
forced.
Like I said, interesting project... :-)
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work Email: [EMAIL PROTECTED
;t even know
what algorithm is used, so my comment is purely speculation.
[1] subject to the usual discussions of key length, algorithm strength and
speed of development of computing hardware
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | F
ing passphrase protection on the secret keyring, when you can
just export the secret key from the secret keyring unencrypted without
having to know the passphrase?
Maybe it's considered a security risk because it doesn't necessarily
have the usual UNIX (or other OS) permissions set to make it acc
On Thu, Aug 07, 2008 at 09:54:13AM -0600, Eliot, Christopher wrote:
> gpg `find . -type f`
> will get you pretty close.
Close, but if you've got lots of files, you'll hit the maximum command
line length limit.
--
David Smith| Tel: +44 (0)1454 462380Home: +4
On Thu, Aug 07, 2008 at 03:49:52PM +0200, Farkas, Illes wrote:
> Do you happen to know how to use gpg recursively on a directory, similarly
> to "gzip -r" and "gunzip -r" ?
find -type f -exec gpg --encrypt-files '{}' --recipient \;
HTH...
--
David Sm
xport-secret-key
You can then give them this exported secret key. Of course, you need to
be very careful about how you transport this secret key around.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7
ning, and keysigning parties.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work Email: [EMAIL PROTECTED]
BRI
>
> Ha. Me and my Outlook at work. Bargh.
On that subject, and dragging things vaguely back to GnuPG...
Does anyone know of a way to get M$ LookOut to support PGP/MIME properly
(in particular, mails with attachments)?
I'm fed up of having to re-send mails to colleagues because they can'
I suspect that this is a bad thing to do. What
problems does it cause?
TIA...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF1319
-edit-keysign or edit a key
|
+-> adduid add a user ID
HTH...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
s your private key, what can they do with it? Thanks
> in advance.
Sign messages as you, and decrypt all messages sent to you. Don't give
it away.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)793
the public key is, well, public).
The secret key can't be generated from the public key, for obvious
reasons.
Somehow I think you've lost the secret part of the subkey.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 4
24D/F13192F2 2002-02-12
uid David Smith (STMicroelectronics) <[EMAIL PROTECTED]>
uid David Smith (Home) <[EMAIL PROTECTED]>
sub 1024g/FA5EA4A2 2002-02-12 [expired: 2002-08-11]
sub 1024g/BE299CC1 2002-07-20 [expired: 2003-01-16]
sub 1024g/C8D6DAB9
you won't be able to decrypt your encrypted
information (short of brute-force cracking it).
Sorry for being the bearer of bad news...
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Azt
out when you do 'gpg --list-secret-keys'?
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462305 Mobile: +44 (0)7932 642724
1000 Aztec West| TINA: 065 2380 GPG Key: 0xF13192F2
Almondsbury| Work E
u've got eight working variables, and you only have 64
loop iterations per 64 bytes of data, but the operations in the loop
are much more complicated.
If you want more info, FIPS180-2 is the document you're after.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 6169
hat I still find incredible).
Of course, encryption is more about integer performance than FLOPS, but
I suspect that integer performance has scaled in the same orders of
magnitude.
--
David Smith| Tel: +44 (0)1454 462380Home: +44 (0)1454 616963
STMicroelectronics | Fax: +44 (0)1454 462
On Fri, Oct 27, 2006 at 07:26:24PM +0200, Werner Koch wrote:
> On Fri, 27 Oct 2006 16:10, David SMITH said:
> > I'm having some problems with my GnuPG-generated key. I have one
> > primary DSA for signing (which does not expire), and then every 6 months
> > I generate
or "[EMAIL PROTECTED]" from hkp server wwwkeys.bri.st.com
(1) David Smith (Home) <[EMAIL PROTECTED]>
David Smith (STMicroelectronics) <[EMAIL PROTECTED]>
1024 bit DSA key F13192F2, created: 2002-02-12
Enter number(s), N)ext, or Q)uit > 1
66 matches
Mail list logo