"key algorithm" in GnuPG's signature verification output

2014-12-10 Thread gnupgpacker
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Hugo, yes, I am sorry: it seems to be like this assumption, but only if you are using other quotation marks than standard "something". Regards, Chris > -Original Message- > From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Beh

Re: "key algorithm" in GnuPG's signature verification output

2014-12-10 Thread Hugo Hinterberger
Hi Chris, So, are you saying that my messages break your signatures of replies to my messages? Regards, Hugo ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

RE: "key algorithm" in GnuPG's signature verification output

2014-12-10 Thread gnupgpacker
Hi Hugo, I did make some test with your last post: Outlook-incoming as Content-Transfer-Encoding: base64 Content-Type: text/plain; charset="utf-8"; Format="flowed" If signing “something” (your choice) and resending, signature is broken. If signing „something“ and resending, signature is broken.

Re: "key algorithm" in GnuPG's signature verification output

2014-12-10 Thread Hugo Hinterberger
Hi Chris, Why break quotation marks "1AF778E4" and "good" or "bad" in OP signature verification while answering? I hope I understood you correctly. I use “"” when it is required. In regular text I try to follow typographical conventions for text. Nothing seems to be broken on my end. It mi

Re: "key algorithm" in GnuPG's signature verification output

2014-12-09 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Tuesday 9 December 2014 at 10:58:47 AM, in , gnupgpacker wrote: > Gpg-1.4.8 isn't captable using edDAS. In my opinion > output would be ok if a new edDSA key has been used!? > If RSA signing key has been used, there might be some > fault... Bo

Re: "key algorithm" in GnuPG's signature verification output

2014-12-09 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Tuesday 9 December 2014 at 9:22:07 AM, in , Hugo Hinterberger wrote: > Hi, > It seems that you (MFPA) changed your signing practice > after I noted that I can't verify signatures created > with your key “1AF778E4”. I did not know that one cou

"key algorithm" in GnuPG's signature verification output

2014-12-09 Thread gnupgpacker
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, by the way: Pls refer to OP: http://lists.gnupg.org/pipermail/gnupg-users/2014-December/051872.html Why break quotation marks "1AF778E4" and "good" or "bad" in OP signature verification while answering? Some charset settings needed? Thx +

"key algorithm" in GnuPG's signature verification output

2014-12-09 Thread gnupgpacker
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hello, signing with two keys in one block can be done. But also, if unequal technology used (e.g. RSA+edDSA)? Verifying of MFPA's signature with Gpg-1.4.18 gave me: gpg: Unterschrift vom 06.12.2014 16:56:22 mittels RSA-Schlüssel ID B31F25F0 gpg:

Re: "key algorithm" in GnuPG's signature verification output

2014-12-09 Thread Hugo Hinterberger
Hi, It seems that you (MFPA) changed your signing practice after I noted that I can't verify signatures created with your key “1AF778E4”. I did not know that one could sign a message with two keys in one signing block. I am wondering if there is a way to collapse the verification result for

"key algorithm" in GnuPG's signature verification output

2014-12-06 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 When verifying a signature using GnuPG, it seems the line (eg):- textmode signature, digest algorithm SHA512 has become:- textmode signature, digest algorithm SHA512, key algorithm rsa2048 Unless I am mistaken, the key algorithm given is that