Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Raimar Sandner
On Thursday 21 May 2009 15:15:18 Raimar Sandner wrote: > I believe (an I think others do too) it is good praxis to not sign new keys > even if you have signed the old one and the new key is signed by the old > one, without personally checking with the keyholder first. After all, the

Re: Key Transition Letter 2009-05-21

2009-05-21 Thread Raimar Sandner
Hello On Thursday 21 May 2009 11:35:44 Allen Schultz wrote: > For the reason of SHA1 issues in the news, I've recently set up > a new OpenPGP key, and > will be transitioning away from my old one. > This message is signed by > both keys to certify the > transition. I have not recieved signatures

Re: Question from GPG

2009-05-21 Thread Raimar Sandner
On Wednesday 20 May 2009 19:53:47 Fayina Zaporozhets wrote: > I did trust and signed the key before: > > > > C:\GNU\GnuPG>gpg --edit-key E3655B17 > > gpg (GnuPG) 1.4.9; Copyright (C) 2008 Free Software Foundation, Inc. > > This is free software: you are free to change and redistribute it. > > Ther

Re: Problems changing hash algo for clearsign

2009-05-10 Thread Raimar Sandner
On Sunday 10 May 2009 14:52:21 Tyler Spivey wrote: > Hello. I'm trying to make any message I clearsign > have a hash of SHA256. > Here is what I've done so far: > I've added "personal-digest-preferences SHA256" to the end of my gpg.conf > file. According to the manpage, this should be enough; since

Re: Use other hash than SHA-1

2009-05-08 Thread Raimar Sandner
On Friday 08 May 2009 09:14:27 Raimar Sandner wrote: > On Friday 08 May 2009 02:09:31 David Shaw wrote: > > One fear that I've seen talked about for SHA-1 is that an attacker can > > create a duplicate document such that if you signed document or key A, > > they could

Re: Use other hash than SHA-1

2009-05-08 Thread Raimar Sandner
On Friday 08 May 2009 02:09:31 David Shaw wrote: > One fear that I've seen talked about for SHA-1 is that an attacker can > create a duplicate document such that if you signed document or key A, > they could come up with a document or key B that your signature would > equally apply to. That fear

Re: How to 'un-sign' a key?

2009-05-07 Thread Raimar Sandner
On Thursday 07 May 2009 16:50:06 Joel C. Salomon wrote: > Joel C. Salomon wrote: > > I foolishly signed a key I had not verified well, and the signed version > > is on a keyserver. How can I unsign it? > > > > I have tried the following (changing the key ID to 0xDEADBEEF): > > > > I tried the comm

Re: Use other hash than SHA-1

2009-05-04 Thread Raimar Sandner
On Monday 04 May 2009 04:56:24 David Shaw wrote: > If you want a DSA2 key: > >gpg --enable-dsa2 --gen-key > > Select option 1, and enter 3072 for the DSA key size. > If you want an RSA key: > > gpg --cert-digest-algo sha256 --gen-key > > Select option 5. Enter a RSA key size. The defau

Re: Use other hash than SHA-1

2009-05-02 Thread Raimar Sandner
On Saturday 02 May 2009 15:45:11 David Shaw wrote: > On May 2, 2009, at 6:25 AM, Simon Ruderich wrote: > > I would like to use a different hash than SHA-1. I tried setting > > personal-digest-preferences SHA256 in my gpg.conf but it didn't > > work. What hash can I use with my key (default DSA/Elga

Re: Use other hash than SHA-1

2009-05-02 Thread Raimar Sandner
On Saturday 02 May 2009 14:11:46 John W. Moore III wrote: > Simon Ruderich wrote: > > I would like to use a different hash than SHA-1. I tried setting > > personal-digest-preferences SHA256 in my gpg.conf but it didn't > > work. What hash can I use with my key (default DSA/Elgamel key) > > and how?

Re: Help! Please with decryption failed: No secret key (gpg in batch mode)

2009-04-29 Thread Raimar Sandner
> I have to use GnuPG in batch mode to enable a running process to decrypt > encrypted file. If I run the shell script through ssh (with the specific > user that was previously used to set the keys and has its proper .gnupg > directory) this works fine despite the following warning: WARNING: messa

Re: How easy would it be to create (and prevent the creation of) a fake pinentry?

2009-04-29 Thread Raimar Sandner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wednesday 29 April 2009 15:40:47 Peter Pentchev wrote: > On Wed, Apr 29, 2009 at 03:31:51PM +0200, Raimar Sandner wrote: > > On Wednesday 29 April 2009 12:09:02 Olivier Mehani wrote: > > > Let me explain: having several backgroun

Re: How easy would it be to create (and prevent the creation of) a fake pinentry?

2009-04-29 Thread Raimar Sandner
On Wednesday 29 April 2009 12:09:02 Olivier Mehani wrote: > Let me explain: having several background-ish applications making use of > the agent, it happens that the pinentry sometimes pops out when the > passphrase cache has expired. One of my first concerns is that there's > no way to identify w

Re: certificate chain depth (technical)

2009-04-26 Thread Raimar Sandner
On Sunday 26 April 2009 07:00:52 you wrote: > On Apr 25, 2009, at 6:27 PM, Raimar Sandner wrote: > > On Saturday 25 April 2009 18:27:44 Raimar Sandner wrote: > >> Hello, > >> > >> when gnupg trusts a key as a result of trustdb calculations, I > >> wo

Re: certificate chain depth

2009-04-25 Thread Raimar Sandner
On Saturday 25 April 2009 22:00:05 John W. Moore III wrote: > Raimar Sandner wrote: > > In the end it is of course a people thing whether you trust a key or not, > > no mathematical model ever can replace your final decision. So there is a > > big difference in gpg saying &q

Re: certificate chain depth (technical)

2009-04-25 Thread Raimar Sandner
On Saturday 25 April 2009 18:27:44 Raimar Sandner wrote: > Hello, > > when gnupg trusts a key as a result of trustdb calculations, I would > like to know what the chain depth for the given key is. [snip] > As of now I can only think of gradually reducing max-cert-depth, > recalcu

Re: certificate chain depth

2009-04-25 Thread Raimar Sandner
On Saturday 25 April 2009 20:58:44 david wrote: > Raimar Sandner wrote: > > Hello, > > > > when gnupg trusts a key as a result of trustdb calculations, I would > > like to know what the chain depth for the given key is. [snip] > > Hi, I don't wish to be over-

certificate chain depth

2009-04-25 Thread Raimar Sandner
Hello, when gnupg trusts a key as a result of trustdb calculations, I would like to know what the chain depth for the given key is. I know that I can control the maximal acceptable depth with the max-cert-depth configuration parameter. I would like to keep the default of 5, but it is still a diff