Re: gpg-agent cache keygrip

2017-07-27 Thread Mario Figueiredo
On Thu, 27 Jul 2017 14:23:44 +0200 Peter Lebbing wrote: > Now let's get on to a passphrase manager and GnuPG specifically. A > different way to look at it is this: would you use GnuPG to protect > your passphrase manager? This is actually a feature request I've seen > multiple times: please provi

Re: gpg-agent cache keygrip

2017-07-27 Thread Mario Figueiredo
On Thu, 27 Jul 2017 11:46:33 +0200 Peter Lebbing wrote: [...] > shared the passphrase. If you can't remember which is 1 and which is > 2, use something you can recognise. For instance, if the pinentry > asks you "Please unlock key 0x6228A8BC", you could append a C, the > very last digit of the id

Re: gpg-agent cache keygrip

2017-07-27 Thread Mario Figueiredo
On Thu, 27 Jul 2017 12:27:30 +0100 MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote: > > The single point of failure stops being a passphrase used across > multiple keys; it becomes the password required to open the password > manager that protects the multiple passphrases. I already use a p

Re: gpg-agent cache keygrip

2017-07-27 Thread Peter Lebbing
On 27/07/17 13:27, MFPA wrote: > I guess I should have trimmed my quote less severely. Using a password > manager would enable somebody who says they cannot remember multiple > decent-quality unique passwords to not share passwords between > different keys. Ah yes :-). I agree. > The single point

Re: gpg-agent cache keygrip

2017-07-27 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Thursday 27 July 2017 at 10:46:33 AM, in , Peter Lebbing wrote:- > On 27/07/17 11:24, MFPA wrote: >> Have you considered using a password manager to >> remember them? > What would be the purpose? I guess I should have trimmed my quote less s

Re: gpg-agent cache keygrip

2017-07-27 Thread Peter Lebbing
On 27/07/17 11:24, MFPA wrote: > Have you considered using a password manager to remember them? What would be the purpose? I already fail to see the problem of GnuPG filling in a passphrase it already knows... surely an attacker would try the same thing as well, I don't know what GnuPG not trying

Re: gpg-agent cache keygrip

2017-07-27 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Wednesday 26 July 2017 at 8:08:28 PM, in , Mario Figueiredo wrote:- > The sharing of passwords between different keys > becomes inevitable > after a certain threshold. And I suspect for > everyone, not just old > people. Have you considered

Re: gpg-agent cache keygrip

2017-07-26 Thread Kristian Fiskerstrand
On 07/26/2017 09:08 PM, Mario Figueiredo wrote: > On Wed, 26 Jul 2017 08:52:12 +0200 > Werner Koch wrote: > >> There is a kludge in gpg and gpg-agent described in this comment: >> [...] > > Hello Werner, > > Thank you for the information and debug method. And hopefully this > problem will be fi

Re: gpg-agent cache keygrip

2017-07-26 Thread Mario Figueiredo
On Wed, 26 Jul 2017 08:52:12 +0200 Werner Koch wrote: > There is a kludge in gpg and gpg-agent described in this comment: > [...] Hello Werner, Thank you for the information and debug method. And hopefully this problem will be fixed sometime in the near future. My brain is old and tired and it

Re: gpg-agent cache keygrip

2017-07-26 Thread Werner Koch
On Tue, 25 Jul 2017 22:30, mar...@gmx.com said: > I've been trying to understand gpg-agent cache behavior in the presence > of two distinct keys with the same passphrase. Namely, why is that it > only asks for the passphrase once, regardless of the key being used? There is a kludge in gpg and gpg

gpg-agent cache keygrip

2017-07-25 Thread Mario Figueiredo
Hello everyone, I've been trying to understand gpg-agent cache behavior in the presence of two distinct keys with the same passphrase. Namely, why is that it only asks for the passphrase once, regardless of the key being used? So I've read the Assuan protocol documentation at (1), in particular t