Hi,

I have a symmetrically encrypted pgp file here:

http://16s.us/word_machine/downloads/pgp-easy.tgz.pgp

gpg will accept the three characters !=X as the password and exit with a
return status of 0 (although it does not actually decrypt the file):

$ gpg -d pgp-easy.tgz.pgp
gpg: CAST5 encrypted data
gpg: encrypted with 1 passphrase
gpg: WARNING: message was not integrity protected

$ echo $?
0

!=X is not the plaintext password that was used to encrypt the file. I was
hoping someone on the list might be able to help me understand why this
might happen. Could it be a bug in gpg, or OpenPGP itself? Here is my gpg
version:

$ gpg --version
gpg (GnuPG) 1.4.12

Here is --list-packets:

$ gpg --list-packets pgp-easy.tgz.pgp
:symkey enc packet: version 4, cipher 3, s2k 3, hash 2
        salt 8dd17929c3935452, count 65536 (96)
gpg: CAST5 encrypted data
:encrypted data packet:
        length: unknown
gpg: encrypted with 1 passphrase
gpg: WARNING: message was not integrity protected

I don't yet know the actual plaintext password or the exact
commands/program used to encrypt the file, but I should know in a few
days. This is a file that's apart of the defcon password cracking contest
and I came across this and wanted to mention it here.

I'm not subscribed to this list, so please cc me if you want to reach me.

Thanks,

Brad


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to