If anyone knows of other free implementations, i'd be happy to hear
about them too.
cryptlib.
mo
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
This bugs me because I'm working on the console and have to move my
fingers from the keyboard to my mouse (or whatever) to enter the pin
into the X widget instead of console!
Actually, the graphical pinentry should capture the keyboard focus and
thus make it unnecessary to use the mouse in
Is it true to say then,
that if you wanted someone to be able to decrypt a
(symmetrically encrypted) file, they'd need to know the algorithm used,
the key and they'd also have to use the same program to decrypt as used
to encrypt the file?
Not quite. In general: you shouldn't base the
the latter cannot be attacked without the keypair and the
passphrase,
Keep in mind that we are talking about a hybrid crypto system. Your
hidden assumption seems to be that the session key which is generated
during encryption to a public key is not worth attacking. Then, nothing
prevents you
Hi,
But there is a problem with kdesu. It only works when the PIN of my card
is already cached.
I cannot really see right now, what's wrong in respect to kdesu. But it
needs to be debugged of course.
Please add to your poldi.conf file something like:
# Specify the log file:
log-file
Poldi 0.4 has been released. Poldi is our PAM module, which implements
authentication through the OpenPGP smartcard.
It can be fetched from:
ftp://ftp.gnupg.org/gcrypt/alpha/poldi/poldi-0.4.tar.bz2
ftp://ftp.gnupg.org/gcrypt/alpha/poldi/poldi-0.4.tar.bz2.asc
Changes since version 0.3 are:
*
1. Is it possible to have only one key pair (public secret pref. DSA) that
can be used for both GPG OpenSSH? (as a sys admin of some interest in
cryptography, this is an important question)
Uhm, possible... sure, why not. I just don't know right now how one
would achive that.
2. Is