Re: OpenPGP cards and on-device subkeys

2016-02-09 Thread Peter Lebbing
On 06/02/16 19:40, Sam Pablo Kuper wrote: >> In [this] scenario one would be able to revoke the subkeys and >> generate new, without using an off-card copy of the master key > > I believe that is correct. [...] You should just be able to use your smartcard to do all operations with the master key

Re: GnuPG 2.1 how to delete card based secret key ?

2016-02-09 Thread Peter Lebbing
On 05/02/16 19:51, Oleg Gurevich wrote: > ... to delete key from the keyring It doesn't work for me either. Your error message is a lot more descriptive, though. I just get: > $ gpg2 --delete-secret-keys de500b3e > gpg (GnuPG) 2.1.11; Copyright (C) 2016 Free Software Foundation, Inc. > This is fr

Re: Usage text

2016-02-09 Thread Peter Lebbing
On 06/02/16 15:17, Robert J. Hansen wrote: > Proposed FAQ language -- feel free to criticize, to suggest alternate > phrasings, or anything else. :) While the primary key is certainly in a subordinate position to the certificate, I don't think it's common to refer to it as a subkey of the certifi

Re: Minor FAQ updates

2016-02-06 Thread Peter Lebbing
On 06/02/16 12:51, Robert J. Hansen wrote: > There are no other changes to speak of. The FAQ is current, the > contents are accurate. I disagree on one point. It's about this[1] thread from November 2014: On 11/11/14 12:09, Werner Koch wrote: > On Tue, 11 Nov 2014 11:00, pe...@digitalbrains.com

Re: GnuPG 2.1 how to delete card based secret key ?

2016-02-05 Thread Peter Lebbing
On 05/02/16 15:08, Oleg Gurevich wrote: > with GnuPG modern (2.1) i can't delete anymore a secret key based on > smartcard. Is there an known workaround ? Do you want the key off your keyring or off your smartcard? Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You

Re: FAQ maintenance

2016-02-05 Thread Peter Lebbing
On 05/02/16 13:34, Robert J. Hansen wrote: > Or did I miss something? No, I don't think so. But I was under the impression that for a while now, people were generally advised not to rely on the uniqueness of long key ID's. And since this seems to be all you rely on with encrypt-to, key validity no

Re: FAQ maintenance

2016-02-05 Thread Peter Lebbing
On 05/02/16 13:06, Robert J. Hansen wrote: > What's the justification? If somebody can create a long-keyID-collision, and you download your own key by that key ID and also import the other one, they might be able to be the one that gets "encrypted-to", I think? Another way to get on your keyring

Re: FAQ maintenance

2016-02-05 Thread Peter Lebbing
On 05/02/16 11:55, Peter Lebbing wrote: > In fact, "things to put in gpg.conf" would seem directly opposed to: Okay, I take that back, since section 8.7 clearly shows options you could put in gpg.conf :). Regarding that section, I think > # Always add these two certificates

Re: FAQ maintenance

2016-02-05 Thread Peter Lebbing
On 03/02/16 21:12, Robert J. Hansen wrote: > Beyond that, if there's anything > you've always thought the FAQ should mention, now's a great time to > suggest it. :) I just notice section 8.19. It says to verify a download: > gpg foo.zip.asc As became clear in this[1] discussion, you should alwa

Re: FAQ maintenance

2016-02-05 Thread Peter Lebbing
On 05/02/16 00:25, da...@gbenet.com wrote: > A list of do's and don'ts Don't use --expert > - weird and impracticable keys ... Don't use --expert ;P > common sense usage - common sense Stick to the defaults > things to put in your gpg.conf :) keyserver ... And that's it. Really. Having a l

Re: GNU Privacy Handbook

2016-02-05 Thread Peter Lebbing
On 05/02/16 12:01, Robert J. Hansen wrote: > IMO, the GPH needs to be taken down. I agree. I was composing a mail on the subject when I started... eh... composing a different mail on a different subject ;). Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send

Re: Glossary. Please add definitions to a Glossary...

2016-02-05 Thread Peter Lebbing
On 04/02/16 19:20, st...@mailbox.org wrote: > Yes, that would be useful, and the wiki is the right place to publish it. There's already a list of terms in the FAQ as well. "Signature" is not in it, but I don't think that's a Frequently Asked Question. The other word Don Saklad asked, "key", is the

Re: FAQ maintenance

2016-02-05 Thread Peter Lebbing
On 04/02/16 09:56, Robert J. Hansen wrote: > What say y'all? When the GnuPG default was not to show the key usage, I would have said: unnecessary detail. In my opinion, in a very broad sense, the FAQ should be aimed at people sticking to the defaults, not the people who tinker. But now GnuPG show

Re: Error when signing

2016-02-03 Thread Peter Lebbing
On 02/02/16 19:35, Ludovic Hirlimann wrote: > Sure I'm trying to gpg --edit-key XX > > Setup works with my other and older key. Your gpg.conf seems okay, but when I download your key from the keyserver, it's telling me that you revoked the key on the day you created it. The error "secret key

Re: Error when signing

2016-02-02 Thread Peter Lebbing
On 02/02/16 13:47, Ludovic Hirlimann wrote: > I've recently created a new key. When I try to sign with it I get the > following error : Could you show the exact command you're trying, and also, do you have a gpg.conf? If so, could you include it as well. Peter. -- I use the GNU Privacy Guard (G

Re: GnuPG and the debian-archive-keyring

2016-01-31 Thread Peter Lebbing
On 31/01/16 16:07, st...@mailbox.org wrote: > Hi, > > recently, I refreshed some keys of my GnuPG public keyring, did a check > and learned that > > 1) the RSA key 46925553 Debian Archive Automatic Signing Key (7.0/wheezy) > has been revoked [output translated into English in > square brackets]

Re: User experience of --hidden-recipient encryption

2016-01-31 Thread Peter Lebbing
On 31/01/16 13:20, Andrey Utkin wrote: > Leakage of exact number of hidden recipients can be mitigated by > adding random number of pseudo-recipients There is a lot of literature on masking the length of packets with random padding. It's not as straightforward as it seems. I think this has anologu

Re: User experience of --hidden-recipient encryption

2016-01-30 Thread Peter Lebbing
On 29/01/16 19:32, Bjarni Runar Einarsson wrote: > If the user only has one public/private key pair, I assume the > experience isn't too bad, GnuPG will just make a guess. But if > the user has multiple keys, do they have to enter the passphrase > for each in succession, as gpg tries to guess how t

Re: BAD signatures for GnuPG Stable

2016-01-28 Thread Peter Lebbing
On 2016-01-28 16:31, Aaron Tovo wrote: I did file diffs between the new and the previous downloads with 'diff' and they are identical. So I tried verify on the previous download and it worked this time. Very confusing. My guess is that sharp-eyed Damien Goutte-Gattat was correct and you were

Re: Rotating encryption keys

2016-01-21 Thread Peter Lebbing
On 21/01/16 16:17, Kristian Fiskerstrand wrote: > Not following this thread too closely, but I expect --show-session-key > and --override-session-key has been discussed. No, not in this thread. I hadn't mentioned it since I focussed on the archival and rotation aspect, not access to a specific ses

Re: problem signing with a smart card

2016-01-21 Thread Peter Lebbing
On 21/01/16 15:47, Andrew Gallagher wrote: > overwrite the smartcard key with a newly generated key Wait... Maybe I'm not following correctly, but to me it sounds like: - Antoine has an encryption key on his smartcard, but no backup. - If it is no longer possible to use the smartcard to decrypt d

Re: Rotating encryption keys

2016-01-21 Thread Peter Lebbing
On 21/01/16 13:34, Lachlan Gunn wrote: > Then you rotate to the new key with little or no data loss because all of > the session keys are logged. You can generate the key on-chip so that it is > unable to ever leave the smartcard, which is obviously desirable from a > security point of view. I do

On-card key generation (was: Rotating encryption keys)

2016-01-21 Thread Peter Lebbing
On 21/01/16 13:34, Lachlan Gunn wrote: > You can generate the key on-chip so that it is unable to ever leave the > smartcard, which is obviously desirable from a security point of view. I think I prefer off-card generation, with GnuPG's random number generator, rather than some low-power, propriet

Rotating encryption keys (was: problem signing with a smart card)

2016-01-21 Thread Peter Lebbing
(oops, accidentally forgot copy to list, sorry for thread breaks) On 2016-01-21 11:29, Lachlan Gunn wrote: > Speaking of which, is there any solution around for session key > archiving? Not that I'm aware of. > Key transition would be a bit more convenient if there > were some way to automatical

Re: Rotating encryption keys

2016-01-21 Thread Peter Lebbing
On 21/01/16 12:32, Lachlan Gunn wrote: > The first reason is that you can't do it if the key only exists on a > smart card. I'd say that's a bad idea anyway. What if the smartcard breaks? > The second is that you now have to do one decryption per > message, so if the key is on a smartcard then it

Re: problem signing with a smart card

2016-01-21 Thread Peter Lebbing
On 21/01/16 09:54, Tzafrir Cohen wrote: > So I guess I should just create new subkeys in the card. That's fine for the signature key, although you could also extend its expiration date. But rotating signature keys is generally no more work than distributing the extended expiration date, so IMHO yo

Re: How to export ASCII armored secret key without passphrase?

2016-01-20 Thread Peter Lebbing
On 20/01/16 17:48, Felix E. Klee wrote: > Is there any workaround? Install GnuPG 1.4 alongside your 2.1.10 (they co-exist perfectly, but they store keys separately). It then should be something like this: $ gpg2 --export-secret-keys | gpg --import Give some temporary passphrase, passes key from

Re: Key selection order

2016-01-18 Thread Peter Lebbing
On 18/01/16 14:10, Andrew Gallagher wrote: > I find it funny that on a gpg users mailing list, out of 80 emails since > new year, only 15 have signatures at all, and three of those are mine*. > Even Werner doesn't sign his mails. Since it's been debated over and over again on this mailing list, I

Re: basic identity mgmt

2016-01-18 Thread Peter Lebbing
On 17/01/16 21:00, Doug Barton wrote: > You glossed over the points in my previous messages about the fact > that we cannot know for sure if the person sending the message is > actually who we think it is [...] Well, to me it sounded like you said "Signature subkeys aren't enough by themselves, so

Re: basic identity mgmt

2016-01-17 Thread Peter Lebbing
On 17/01/16 03:19, Doug Barton wrote: > Further I don't see signing as all that interesting either. > [...] > We can infer things about these topics from our knowledge/beliefs > about the sender, but I can't think of any rational person would go > along with a request to "Pay Joe $10,000" just beca

Re: Yubikey, GnuPG 2.1 Modern, and SSH on OS X

2016-01-15 Thread Peter Lebbing
On 15/01/16 21:17, Glenn Rempe wrote: > I added it at the suggestion of Werner in this post: > > https://lists.gnupg.org/pipermail/gnupg-users/2012-July/045059.html > > And these blog posts: > http://incenp.org/notes/2015/gnupg-for-ssh-authentication.html > http://budts.be/weblog/2012/08/ssh-auth

Re: Key selection order

2016-01-15 Thread Peter Lebbing
On 15/01/16 00:12, Andrew Gallagher wrote: > No, because mitm doesn't mean one identity replaces another, but that the two > identities become conflated. Ah, we are ascribing different attributes to an "identity". I think you mean an identity belongs to a specific person, an individual. If you MI

Re: Key selection order

2016-01-14 Thread Peter Lebbing
On 2016-01-14 21:06, Andrew Gallagher wrote: Granted. And it does provide a speed bump to a potential attacker, so is preferable to nothing. But it's not a long term solution. I disagree. It's a "good enough" solution for many circumstances. And we know by now how well the WoT works in many ci

Re: Key selection order

2016-01-14 Thread Peter Lebbing
On 14/01/16 19:48, Lachlan Gunn wrote: > so unless you can find the key through some out-of-band source, then for the > initial contact you have to choose between either making an educated guess as > to what the key is, or sending in the clear. Or send them an e-mail saying "I've got something to

Re: GPG-Agent not recognising SSH keys

2016-01-14 Thread Peter Lebbing
Hi Jacques, Your guide highlighted a silly error where I had accidentally chopped some of the trailing characters of the appropriate keygrip in sshcontrol (Doh!). BTW I am using GnuPG 2.1.9 That's hard to spot... "Is this jumble of characters the same as the one I just saw?" I can now succ

Re: GPG-Agent not recognising SSH keys

2016-01-12 Thread Peter Lebbing
On 12/01/16 12:58, Jacques Kotze wrote: > Hi All, Hi, > First time post, so please excuse me if it is a ignorant noob question :) It's not an ignorant question, and even if it were, that wouldn't be a problem :). > $> unset GPG_AGENT_INFO SSH_AGENT_PID SSH_AUTH_SOCK > $> eval $(/usr/local/MacGP

Re: basic identity mgmt

2016-01-11 Thread Peter Lebbing
On 11/01/16 17:35, Lachlan Gunn wrote: > I actually ran into this issue the other day. For me it's problematic because > my certification key is on an offline machine, so it's inconvenient to have to > power it up and do a round-trip through the airgap when I'm not going to > propagate the signatu

Re: basic identity mgmt

2016-01-11 Thread Peter Lebbing
On 11/01/16 18:06, Martin Behrendt wrote: > Without thinking a lot about it on my part, but wouldn't a separate > signing sub-key help with this? Signing other people's keys is called certifying, and certification is a capability only the primary key has. The "Sign" capability indicates it can cre

Re: basic identity mgmt

2016-01-11 Thread Peter Lebbing
Hi! > Do I have to sign it? Is there no way to configure gpg locally to > say "the info in this key (fingerprint) is accurate", without having > to sign? You have to sign it; that's how it works :). > Is the semantics of signing with lsign or sign "the info in this key > is accurate"? Yes. "Th

Re: about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2015-12-26 Thread Peter Lebbing
On 26/12/15 01:39, ma...@wk3.org wrote: > do you have an estimate on the number of unique sentences published on > the Internet? Hm how many of those would have been generated by a Markov chain generator that a spammer used to generate some filler text in a spam mail? I bet you've seen the

Re: about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2015-12-25 Thread Peter Lebbing
On 25/12/15 06:19, Ineiev wrote: > I assume the amount of entropy is what really matters. for instance, > if on every next step you are free to choose any of 4 random words > taken from 6-word dictionary, you may put it in a grammatically > correct form[*], then you must get a certain entropy p

Re: about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2015-12-24 Thread Peter Lebbing
Hello, > Correct, horse! Battery staple! My understanding is that these words in such a passphrase are chosen by a random number generator in a computer. I use such a passphrase; I've let my computer pick words out of a word list based on reading /dev/random; or actually, I'm fairly sure I

Re: GPGrelay does not recognize Gpg-2.1 keys; Gpg4win-3beta...

2015-12-21 Thread Peter Lebbing
On 21/12/15 11:33, gnupgpacker wrote: > So, how to work around and supply keys to GPGrelay even if using gpg version > 2 and up? Install GnuPG 1.4 alongside 2.1 and manually sync all keys from GnuPG 2.1 to 1.4, with for instance: $ gpg2 --export | gpg --import I'm not sure how large the overhead

Re: GPA - import keys more easily?..

2015-12-11 Thread Peter Lebbing
On 10/12/15 21:00, Dark Penguin wrote: > And I usually import the keys from email attachments, which I know > are correct, because I've helped them set up PGP and I've created > their email account. I just want to be able to have them imported > with simply opening them with GPA and not have to sav

Re: GPA - import keys more easily?..

2015-12-11 Thread Peter Lebbing
On 10/12/15 21:00, Dark Penguin wrote: > (or not even seeing it, because I think it would normally close > immediately after the program has finished running). Oh, okay, I misunderstood your request. I thought you wanted to invoke GPA from the command line, since you called it a command line optio

Re: Please consider joining Bountysource Salt to collect recurring donations

2015-12-11 Thread Peter Lebbing
On 10/12/15 20:53, Werner Koch wrote: > I just modified it to put an submenu item as an alias there. Is that > better? While I think it's a good idea to include an alias, I think you should do that consistently for all the menus, otherwise "Documentation" and "Related software" are going to end u

Re: cache gpg passphrase for mutt on os x

2015-12-10 Thread Peter Lebbing
On 09/12/15 21:00, Rejo Zenger wrote: > As I understand it, this is a problem with the session mutt runs in: each > new mutt decryption and signing operation runs in a new session and hence > can't access the previous' one. > > Probably, I can work around this, but to avoid spending hours of searc

Re: GPA - import keys more easily?..

2015-12-10 Thread Peter Lebbing
On 09/12/15 19:11, Dark Penguin wrote: > Of course, I could use other software if I don't like this one, but the > question > is "wouldn't it be convenient to add a simple commandline option to GPA to > import a key". For commandline usage, you can simply use GnuPG directly: $ gpg2 --import pubk

Re: GPA - unsupported certificate

2015-12-08 Thread Peter Lebbing
On 08/12/15 13:16, Peter Lebbing wrote: > The problem > is that two software projects want opposite things; this would lead to > an arms race. What might be a better "fix", IMHO, would be to have GPA also warn about this, so people know what to do. Perhaps with another e

Re: GPA - unsupported certificate

2015-12-08 Thread Peter Lebbing
On 08/12/15 00:00, Dark Penguin wrote: > Erm... sorry, I am still not very good with understanding the bug > report flow; I would have checked the Debian GPA bug page before > writing here if I knew about its existence. ^_^' And yes, here it is, > my "Unsupported certificate" bug!.. No problem, it

Re: GPA - unsupported certificate

2015-12-07 Thread Peter Lebbing
On 07/12/15 01:24, da...@gbenet.com wrote: > Every Linux distro has gnupg installed - so at a terminal just type gpg - > this will create ALL the folders and files needed (.gnupg) it's pointless > installing GPA without running gpg first - I think it's pretty silly. Eh? I don't find it silly at al

Re: Why gpg 2.1.9 cannot export secret key without passphrase?

2015-12-03 Thread Peter Lebbing
On 03/12/15 05:25, Andrey Utkin wrote: > Is the approach of using "s2kmode = 0" and "protection sha1" together > correct? Shouldn't "protection none" be used? Why is all this hackery necessary? Why don't you just install GnuPG 1.4 next to your 2.1, instead of compiling a special hacked 2.1? Peter

Re: Why gpg 2.1.9 cannot export secret key without passphrase?

2015-12-01 Thread Peter Lebbing
On 30/11/15 23:54, Andrey Utkin wrote: > Could you please direct me to exact S2K-stuff modes for exporting it > which would be compliant with earlier GnuPG branches 1.4 and 2.0? > [...] > But for unattended processing cases, I'd like a mode that makes utils > skip all passphrase entry prompts. I g

Re: Why gpg 2.1.9 cannot export secret key without passphrase?

2015-11-30 Thread Peter Lebbing
On 30/11/15 20:10, Andrey Utkin wrote: > Is it impossible straight from RFC 4880 in any defined mode, or is > it just a wrong behaviour in GnuPG/Libgcrypt? It is a specific bug of GnuPG 2.1, and Werner's comment on the bug entry mentioned here makes me believe he intends to fix it eventually. Gnu

Re: [RFC] Keychain for GPG, SSH, X.509 etc. (inspired by Split GPG)

2015-11-28 Thread Peter Lebbing
On 27/11/15 22:55, Andrey Utkin wrote: > Any comments? Could you outline a sequence of steps that goes wrong without your solution and right with it? Like: - SSH to compromised PC - Use SSH agent forwarding - While logged in to compromised PC, SSH from there to another Wrong: - Compromised PC o

Re: best practices for creating keys

2015-11-27 Thread Peter Lebbing
On 27/11/15 12:41, Andrew Gallagher wrote: > There's a post about how to do this in the list archives: > > https://lists.gnupg.org/pipermail/gnupg-users/2009-May/036505.html Thanks for the pointer! > ... but it's really not worth your while. So long as your primary key > doesn't have E usage set

Re: Why gpg 2.1.9 cannot export secret key without passphrase?

2015-11-27 Thread Peter Lebbing
On 27/11/15 10:39, Dmitrii Tcvetkov wrote: > Private key exports in cleartext. Are you sure? I can't export an unprotected private key. The topic has come up earlier on this mailing list, in [1]. If I have a passphrase on a private key, and I export it, it prompts me for the passphrase and the ex

Re: best practices for creating keys

2015-11-27 Thread Peter Lebbing
On 23/11/15 21:31, James wrote: > It appears that information I had read previously was erroneous. I was > under the impression the capabilities (at least for the primary key) > were set in stone, hence my apprehension at avoiding those insatiable > knobs and gears I like to tinker with. ;) Well,

Re: best practices for creating keys

2015-11-23 Thread Peter Lebbing
On 23/11/15 17:20, James wrote: > If you create a primary key, upload it to a public > keyserver and later decide: "hrm, my public key should really only > certify, not sign," it's a bit too late. (although not impossible, > difficult to change ex post facto). Okay, so let me answer this one detai

Re: Crowdfunding USB Security Key for Email- and Data-Encryption - Nitrokey Storage

2015-11-23 Thread Peter Lebbing
On 23/11/15 08:54, Jan Suhr wrote: > 2nd factors are usually not access protected at all e.g. may have a > display (which allows funny hacks[1]). Ah, that makes sense! I forgot about that because I myself would actually like an OTP protected by PIN as complete two-factor solution (have the device

Re: Crowdfunding USB Security Key for Email- and Data-Encryption - Nitrokey Storage

2015-11-22 Thread Peter Lebbing
On 21/11/15 18:23, NdK wrote: > I didn't look at the code (so this could be completely wrong and I'd be > happy!), but if the OTP key is decrypted using a key in the chip after > verifying that the card accepts the PIN, then it's even worse, since > that master key is in cleartext somewhere outside

Re: backing up keys

2015-11-21 Thread Peter Lebbing
On 21/11/15 13:09, Peter Lebbing wrote: > GnuPG outputs both a "Secret-Key Packet" as well as all UID's and > binding signatures. It might output all certifications by others on the > key as well; I'm going to write a separate mail about this. Okay, it turns out

Re: backing up keys

2015-11-21 Thread Peter Lebbing
On 17/11/15 15:53, Andrew Gallagher wrote: > No, there is no public key data embedded in the private key, but you can > regenerate the important mathematical bits of the public key from the > private key, and you can fill in your name, email etc. from memory. So > it's not absolutely necessary - bu

Re: Crowdfunding USB Security Key for Email- and Data-Encryption - Nitrokey Storage

2015-11-21 Thread Peter Lebbing
On 21/11/15 09:00, Jan Suhr wrote: > All serious findings are fixed already. Look for the "Note" at the end > of each issue description. I suppose by "serious" you mean "defined as 'Critical' in the pentest"? There are unfixed issues with severity "High": Firmware: NK-01-008 OTP can be unlocked b

Re: What causes this bad signature

2015-11-18 Thread Peter Lebbing
On 18/11/15 16:59, da...@gbenet.com wrote: > 0x5E5CCCB4A4BF43D7 has expired - that's the only thing "bad" about it. I could not reproduce this: > $ gpg2 -k 2C53B2ED > pub rsa2048/2C53B2ED 2015-08-21 [expired: 2015-08-28] > uid [ expired] Test Teststra Jr. > $ gpg2 --check-sig DCDFDFA4

Re: What causes this bad signature

2015-11-18 Thread Peter Lebbing
On 18/11/15 13:53, da...@gbenet.com wrote: > I downloaded the key and all sub-keys. Neither GPA Kgpg or Kleopatra give > any warnings > about this key. You don't say what's bad about it - which is why your not > getting much help > here. Actually, I understand what he means, I just don't know h

Re: best practices for creating keys

2015-11-18 Thread Peter Lebbing
On 17/11/15 15:33, Andrew Gallagher wrote: >> https://alexcabal.com/creating-the-perfect-gpg-keypair/ > > This is a fairly good article - I've used it myself for reference in the > past. Also have a look at: I disagree, I'd recommend people not to read that article, let alone follow its advice.

Re: TOFU for GnuPG

2015-10-29 Thread Peter Lebbing
On 29/10/15 17:23, Daniel Baur wrote: > isn’t it a little bit problematic that GPG now logs how often I received > emails by someone else? I would think that in most situations, that is not a problem. If you exclusively use webmail, there isn't such a record directly on your computer's disk, but y

Re: How can it be made even easier!?

2015-10-12 Thread Peter Lebbing
On 12/10/15 17:32, Mark H. Wood wrote: > Dare I suggest that people who need private and/or integrity-protected > email for professional use should hire a professional to interview > them, set up the software according to the client's standards for > professional practice, and explain its use? Exc

Re: (OT) Blocking ICMP

2015-10-08 Thread Peter Lebbing
On 08/10/15 21:51, Antony Prince wrote: > I haven't had a single issue with any of the traffic I route through it, so > I'm assuming it is fine. The issue with PMTU discovery only happens when there is a smaller MTU in the middle of the path from you to another system. This can be a very rare occ

(OT) Blocking ICMP (was: Re: ?: keys.gnupg.net: Host not found)

2015-10-08 Thread Peter Lebbing
On 08/10/15 21:26, Antony Prince wrote: > I host a server in this pool and it is set to drop all IPv4 ICMP packets I hope you mean specifically dropping all ICMP echo-request packets, not all ICMP packets. Because some ICMP packets are *essential* for proper functioning of your internet connection

Re: Unsubscription Request (was: Re: How to get your first key signed)

2015-10-04 Thread Peter Lebbing
On 04/10/15 20:05, Richard Höchenberger wrote: > I find the repeated explanations of how to unsubscribe extremely unhelpful, > bordering to disrespect, since it does not provide the kind of help this > users needs. Even though I might share your sentiment on the rest of your mail, I personally fin

Re: How to get your first key signed

2015-10-04 Thread Peter Lebbing
On 04/10/15 17:04, joe.asmod...@sigaint.org wrote: > Therefore, I agree that a blanket holding that all digital > signatures are non-repudiable is unlikely. I think you're moving the goal posts. I think Rob says that he's unaware of any case where a specific digital signature was argued to be non-

Re: How to get your first key signed

2015-10-03 Thread Peter Lebbing
On 03/10/15 14:04, Guan Xin wrote: > What happened to being guilty once proven guilty until > proven innocent? > Your key is the proof. Please stop trolling. Peter. -- I use the GNU Privacy Guard (GnuPG) in combination with Enigmail. You can send me encrypted mail if you want some privacy. My k

Re: How to get your first key signed

2015-10-01 Thread Peter Lebbing
On 01/10/15 13:08, Bob Henson wrote: > If the program has been altered the signature will fail, will it not? Well, first of all, a checksum is not a cryptographic hash. It has different properties: a checksum usually has no collision resistance. Which is why the designers of WEP should have never

Re: How to get your first key signed

2015-10-01 Thread Peter Lebbing
On 01/10/15 10:33, Bob Henson wrote: > There might be a possible exception where there is no individual > person to meet - the verification signature with software, say. When > you have downloaded the software from the same, known website for > some time it might be reasonable to sign the verificat

Re: Local PAM authentication with OpenPGP Card (was Re: PAM authentication with gpg or ssh key)

2015-10-01 Thread Peter Lebbing
On 01/10/15 08:06, NIIBE Yutaka wrote: > Although I have a bit of experience with Poldi, frankly speaking, I > don't quite understand the need for local login authentication with > OpenPGPcard. For me, if I do some access control for my own PC, it > would be better to consider removing keyboard fr

Re: Non-interactive PIN not accepted, gpg hangs

2015-09-30 Thread Peter Lebbing
On 30/09/15 15:37, Laurent Blume wrote: > Ultimately, a lot will depend on that, LUKS volumes, file encryption > before transfer (GPG and SMIME), Apache secret keys (I've not dared yet > think about that one), maybe some others if the PCI auditor feels like it. Yes. I have no experience in highly

Re: Non-interactive PIN not accepted, gpg hangs

2015-09-30 Thread Peter Lebbing
On 30/09/15 14:04, Laurent Blume wrote: > There are human resource issues there, but let's focus on the technical > side. Yes, I realise that. > I've thought about it, but it's not that obvious to set up. It depends > on scdaemon, which is started by gpg-agent. > It means I would need to create a

Re: Non-interactive PIN not accepted, gpg hangs

2015-09-30 Thread Peter Lebbing
On 30/09/15 11:20, Laurent Blume wrote: > I really, really need it to be non-interactive. You can't unlock the card when the server is booted and then leave it unlocked for the whole time the server is up? You could do it in an SSH session, when correctly set up. The OpenPGP Card does not permit

Local PAM authentication with OpenPGP Card (was Re: PAM authentication with gpg or ssh key)

2015-09-30 Thread Peter Lebbing
On 30/09/15 02:17, NIIBE Yutaka wrote: > Perhaps, if there are some demands, I should write U2F module using > gpg-agent (and revive Scute, accordingly). I believe that this is a > way to go, for those users who want to consolidate things cleanly. Personally, my main interest lies with authentica

Re: Own Mail: PGP running on local server; Is it secure

2015-09-29 Thread Peter Lebbing
On 28/09/15 20:39, sam...@riseup.net wrote: > Hi all Hi! > Thanks for your comments, not exactly a ringing endorsement! Well, for some reason I never got the mail that started this discussion, a reply by Robert J. Hansen was the first I saw of it. And I didn't check the website. But the quotes f

Re: Own Mail: PGP running on local server; Is it secure

2015-09-28 Thread Peter Lebbing
On 28/09/15 20:12, Robert J. Hansen wrote: > First, I love the Thorn Letter Agency: I'm going to have to steal it. Hehe, go ahead ;). > I mean, taken at their word, that's what they seem to be saying, right? Absolutely. And it's curious that they're sprinkling technical terms in the rest of what

Re: Own Mail: PGP running on local server; Is it secure

2015-09-28 Thread Peter Lebbing
On 28/09/15 19:00, Robert J. Hansen wrote: > Cryptography is not like virginity, where once you lose it it's gone > forever. I think they mean that your private key material is compromised, meaning "þey"[1] can decrypt any future messages encrypted to that key. Sloppily formulated, but I don't thi

Re: "g13" tool in GnuPG 2.1

2015-09-16 Thread Peter Lebbing
On 16/09/15 17:39, Werner Koch wrote: > For my own needs I am working on yet another dm-crypt wrapper which will > be another backend for g13. I'd much prefer dm-crypt as backend, so all the better! In fact, I think LUKS might be better than plain dm-crypt; it seems to be getting the most love fro

Re: Scdaemon log

2015-09-10 Thread Peter Lebbing
On 09/09/15 22:17, Kostiantyn Chertov wrote: > log-file /var/log/scd.log The user you're running GnuPG as probably doesn't have permission to create files in /var/log. So this can only work when the file is already created with the correct permissions, and even then there might be a reason GnuPG n

Re: GnuPG modern can't genereate keys on my Windows

2015-09-06 Thread Peter Lebbing
On 06/09/15 10:11, Dongsheng Song wrote: > On 2015-09-05 17:40, Werner Koch wrote: >> - The random number generator may not produce random output. > > Why not trust Windows CryptoAPI (CryptGenRandom) like libressl ? May I suggest that you take down your compiled 64-bits versions and issue a warn

Re: FAQ: drop mention of 1.4?

2015-09-01 Thread Peter Lebbing
Hello, On 31/08/15 21:08, Crissy Lynn wrote: > I have tried any and everything the be taken OFF of this random > mailing list!!! I've 'Unsubscribed' 10 times. Can someone PLEASE > explain why I keep getting these emails!?? I might have an idea about that. Gmail has an unusual feature: you can

Re: The best practice of master/sub key capabilities

2015-08-30 Thread Peter Lebbing
On 22/08/15 17:25, Dongsheng Song wrote: > Now I want to create my new key like this: > > sec rsa4096/93D374EB 2015-08-22 [C] > uid [ultimate] example > ssb rsa2048/466D08E1 2015-08-22 [S] > ssb rsa2048/AD92E667 2015-08-22 [E] > ssb rsa2048/07DEFA25 2015-08-22 [A] > ssb ed25519/

Re: The FAQ's 4GiB recommendation

2015-08-30 Thread Peter Lebbing
On 27/08/15 23:11, Robert J. Hansen wrote: > For a 64-bit cipher, you'll probably wind up [...] > A 128-bit cipher will begin to repeat after [...] I think it's a good idea to stress you're talking about the block size, not about the key size. Something like "a cipher with a 64 bit block size".

Re: FAQ: drop mention of 1.4?

2015-08-28 Thread Peter Lebbing
On 28/08/15 16:12, Johan Wevers wrote: > I see this attitude a lot among software developers and it irritates me: > drop support for "obsolete" features and still try to force everyone to > upgrade, [...] 1.4 is fully supported, but occupies a niche. Support is not dropped, nobody forces you to up

Re: Mixing Authenticate capability with others

2015-08-24 Thread Peter Lebbing
On 21/08/15 11:00, Peter Lebbing wrote: > Does GnuPG (or GPG-Agent in 2.1) actually check that the challenge sent > by the server is not a validly formatted OpenPGP signature or certification? I should note that it is not possible for an SSH server to evoke a data signature from gpg-agent r

Re: The best practice of master/sub key capabilities

2015-08-21 Thread Peter Lebbing
On 21/08/15 11:31, Dongsheng Song wrote: > But I still did't know why the master key have sign and certify > capabilities in the default ? I suppose because it doesn't hurt. They're both signatures in essence; cryptographically they are the same and exchangable. The difference only lies in the int

Mixing Authenticate capability with others

2015-08-21 Thread Peter Lebbing
In the thread "The best practice of master/sub key capabilities", Dongsheng Song asked for advice and gave an example where a master key has both Certify and Authenticate set, and an example where a subkey has both Sign and Authenticate set. I wrote in a reply in that thread: > But it suddenly daw

Re: The best practice of master/sub key capabilities

2015-08-21 Thread Peter Lebbing
On 20/08/15 17:01, Peter Lebbing wrote: > Most importantly, it's generally advised not to do encryption and > signing with the same key material. This is just a general recommendation, and abusing the fact a key is used for both encryption and signatures is an intricate matter. But si

Re: The best practice of master/sub key capabilities

2015-08-20 Thread Peter Lebbing
> When I create new master/sub key, in the following 2 choice, I'm > wondering which is better? I'd recommend the defaults as best practice. They're there for a reason. Why are you restricting yourself to "the following 2 choices"? They both seem ill-advised (and unusual as well). Most importantly

Re: signing failed with master key when I have stronger subkeys

2015-08-14 Thread Peter Lebbing
On 14/08/15 14:45, Dongsheng Song wrote: > D:\>gpg -u "7547A8A9\!" --clearsign relay.txt > gpg: skipped "7547A8A9\!": No secret key > gpg: relay.txt: clearsign failed: No secret key I think the escape of the exclamation mark might not be correct for Windows shell usage. > D:\>gpg -u "7547A8A9!"

Re: Possible bug when using smartcards and gpg-agent2.0 as the ssh-agent

2015-08-12 Thread Peter Lebbing
On 12/08/15 20:55, Víctor Cuadrado Juan wrote: > This seems like a bug. The serial number is part of the application ID, it's not a bug. The one is more verbose than the other. The AID ends in four zeroes, but the part before that is the serial number and manufacturer ID. HTH, Peter. -- I use

Re: Inability to export and then import my secret key

2015-08-12 Thread Peter Lebbing
On 12/08/15 12:25, Mirimir wrote: > I got that OP is migrating to new hardware, so I don't see why identical > installations would be problematic. Right, yes, then a full copy makes a whole lot more sense. I got thrown off by the fact that the error message seems to indicate the key already existe

Re: Inability to export and then import my secret key

2015-08-12 Thread Peter Lebbing
On 12/08/15 04:00, Mirimir wrote: > It's simplest to just copy the gpg folder. Importing private keys is > broken by design. I don't think I agree with either statement. Copying the folder comes with its own caveats: don't copy random_seed, and you might not want two identical installations with r

<    2   3   4   5   6   7   8   9   10   11   >