Hi everyone,
This will be my second update email to mm-dev after gsoc started, i'll be
sending weekly summaries in the future. The ci-tool(please suggest some
nice name) is almost finished, i need few more days to get it working on
multiple projects under mailman suite. The following parts of
Daniel Kahn Gillmor writes:
On 08/30/2013 12:56 AM, Stephen J. Turnbull wrote:
The last time I looked (~10 days ago), that was the implementation:
look only at the message-level Content-Type, ensure it's
multipart/signed, check that there are exactly two parts and that the
second is
Hi Abhilash--
I haven't looked at the code much yet, but this is a pretty exciting
report! I'm glad to hear everything you've done.
On 08/28/2013 09:37 PM, Abhilash Raj wrote:
1) There is a 'signature rule'[1] that can verify signature from the
users whose public key is stored in 'var/gpg'
Daniel Kahn Gillmor writes:
On 08/28/2013 09:37 PM, Abhilash Raj wrote:
1) There is a 'signature rule'[1] that can verify signature from the
users whose public key is stored in 'var/gpg' directory insider
'pubring.gpg'. This rule also verifies that the email has only two parts
one
On 08/30/2013 12:56 AM, Stephen J. Turnbull wrote:
The last time I looked (~10 days ago), that was the implementation:
look only at the message-level Content-Type, ensure it's
multipart/signed, check that there are exactly two parts and that the
second is application/pgp-signature.
hum, what
Hi all,
So I think my work inside mailman for signing and verification is almost
complete, here are a few things that I have now working and it would be
very nice if some of you can have a look at the code and let me know if
the implementation is correct(the logical and the pythonic way).
1)
On 08/14/2013 04:35 AM, Stephen J. Turnbull wrote:
Abhilash Raj writes:
After midterm evaluations I have been working on signing the message
using one the keys associated with the list, now since `python-gnupg`
does not allow selecting keys with key credentials( like address or
Daniel Kahn Gillmor writes:
On 08/14/2013 04:35 AM, Stephen J. Turnbull wrote:
Python 2.7.5 (default, Aug 1 2013, 23:58:20)
from gnupg import GPG
gpg =
GPG(gnupghome='/Users/steve/.gnupg',keyring='test-pub',secret_keyring='test-sec')
crypted = gpg.encrypt(u'A bit of random
Abhilash Raj writes:
I think the address should be $LIST-owner@fqdn. For other parameters,
defaults are OK I think (size=2048, type=RSA IIRC).
Here should not the address be the list's posting address? Like for
mm-dev list should it not be mailman-developers@python.org?
Maybe. But
I agree with everything written elsewhere by Steve and Richard.
On Aug 14, 2013, at 05:35 PM, Stephen J. Turnbull wrote:
[1] Has anybody else noticed that both gpg's UI and its documentation
seem designed to make it as hard to use as possible?
Sadly, I think this is one of the biggest reasons
On 13-08-14 2:35 AM, Stephen J. Turnbull wrote:
Footnotes: [1] Has anybody else noticed that both gpg's UI and its
documentation seem designed to make it as hard to use as possible?
Not only have people noticed, but Why Johnny Can't Encrypt: A
Usability Evaluation of PGP 5.0 is often required
Barry Warsaw writes:
On Aug 14, 2013, at 05:35 PM, Stephen J. Turnbull wrote:
[1] Has anybody else noticed that both gpg's UI and its documentation
seem designed to make it as hard to use as possible?
Sadly, I think this is one of the biggest reasons why we've never
seen
Hi all,
After midterm evaluations I have been working on signing the message
using one the keys associated with the list, now since `python-gnupg`
does not allow selecting keys with key credentials( like address or
list-name name) so we need key_id. As barry suggested we can create a
mapping of
Abhilash,
I see no reason to have more that one keyring for public keys and another for
the private ones.
In both cases, those key rings are a flat table indexed by the Key_id. It
doesn't matter if the owner of the key is a list or a subscriber (or any
other user) As for user keys, I think
14 matches
Mail list logo