On 02/11/14 09:42, Cpp wrote:
I see that command will print out the passphrase in clear text. Is
this secure to use just like that?
This is the same channel as where session keys are exchanged. With a
session key, you can decrypt an encrypted message: very sensitive
information. So the channel
On Friday, October 31, 2014 12:33:13 AM Hauke Laging wrote:
gpg-connect-agent GET_PASSPHRASE --data --no-ask
4F7E9F723D197D667842AE115F048E6F0E4B4494 t1 t2 t3 /bye
D fubar
OK
It prints the GPG passphrase in plain text. Is the password cached in plain
text?
--
Regards,
Sudhir Khanger,
On Fri, 31 Oct 2014 06:51, m...@sudhirkhanger.com said:
It prints the GPG passphrase in plain text. Is the password cached in plain
text?
Catch-22. How would you protect the key used to decrypt the cache?
Actually the content of the passphrase cache is stored encrypted in RAM
but the key for
Hey!
I use gpg to store my password-protected private key(s) and some
public keys, but there is also gpg-agent daemon that is used to act as
a backend (key and password manager) to certain applications. I have
configured this agent to remember the secret key passphrase for 15
minutes and then
Am Do 30.10.2014, 23:14:12 schrieb Cpp:
Is there a way to query gpg-agent to
see whether a correct passphrase has been recently entered for a
particular secret key, and has not yet been forgotten?
Yes and no.
There is an easy way to find out whether a certain passphrase (make sure
to