invalid packet - ignore errors?
*Is it possible to make gnupg ignore errors when decrypting files?* I'm trying to decrypt a symmetrically encrypted file, but get the following error message(s): C:\gpg\gpg>gpg -v -o c:\out.bkf -d d:\data.bkf.gpg gpg: CAST5 encrypted data gpg: encrypted with 1 passphrase gpg: original file name='data.bkf' gpg: [don't know]: invalid packet (ctb=63) gpg: [don't know]: invalid packet (ctb=66) gpg: WARNING: message was not integrity protected gpg: [don't know]: invalid packet (ctb=37) The outfile is written, but only partially. Does this simply mean that the .gpg file is corrupt and that the archive can not be recovered? It has been burned on a dvdrom, and I had some issues getting a 3GB+ file burned. This is gnupg 1.4.0 running on Windows XP The error messages aren't all that informative, not even in verbose mode. Note: I sent this earlier, but got no response. If someone could help, or point me to any resources of help, I'd be grateful! KG ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyserver communications errors on Cygwin's GnuPG
Ismael Valladolid Torres <[EMAIL PROTECTED]> writes: > gpg: keyserver send failed: general error Are you running a virus scanner on this computer? If so, try disabling it temporarily and running the send-keys operation again. -- Steven E. Harris ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Large file issues again (win32)
Hi all. I recently encrypted (for testing purposes) 4,36 GB file using my public key. I used official debian 3.1r0a DVD ISO image #1 as initial file. The command was: gpg -e -r [recipient] -v [file] Then I unsuccessfully tried to decrypt file using the same way, after this I use method which was decribed here: http://lists.gnupg.org/pipermail/gnupg-users/2005-September/026966.html http://lists.gnupg.org/pipermail/gnupg-users/2005-September/026661.html Now I'm trying to decrypt file and receive the following: - C:\folder>gpg -d -v < file.gpg > file gpg: public key is 0xBF3D3DC2 gpg: using subkey 0xBF3D3DC2 instead of primary key 0x500B8987 gpg: encrypted with 4096-bit ELG-E key, ID 0xBF3D3DC2, created 2005-08-06 "lusfert <[EMAIL PROTECTED]>" gpg: TWOFISH encrypted data gpg: original file name='debian-dvd-1.iso' gpg: buffer shorter than attribute subpacket gpg: [don't know]: invalid packet (ctb=45) node 00B1A160 00/00 type=gpg-control ctrl=3 len=0 node 00B1A028 00/00 type=user-id "[bad attribute packet of size 135]" gpg: invalid root packet detected in proc_tree() node 00B1A028 00/00 type=user-id "[bad attribute packet of size 135]" gpg: [don't know]: invalid packet (ctb=10) gpg: WARNING: encrypted message has been manipulated! gpg: [don't know]: invalid packet (ctb=30) Every time only 391 739 392 bytes of output file were written before error occurs. Thus it seems workaround described in previous messages doesn't help. GnuPG 1.4.2 official build, Windows XP SP2 Pro, standard cmd.exe Is it possible to solve this problem? -- With best regards, Current OpenPGP key ID: 0x500B8987 Fingerprint: E883 045D 36FB 8CA3 8D69 9C79 9E35 3B56 500B 8987 Encrypted e-mail preferred. signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Keyserver communications errors on Cygwin's GnuPG
Werner Koch wrote: > On Tue, 18 Oct 2005 10:49:22 +0200, Ismael Valladolid Torres said: > >> Is this to be reported to GnuPG developers or to Cygwin developers? > > That seems to be a Cygwin problem. I'll agree on it being a problem with Cygwin. Most likely something in your installation. Works fine on Cygwin for me. [EMAIL PROTECTED] ~ $ uname -a CYGWIN_NT-5.0 Yogi 1.5.18(0.132/4/2) 2005-07-02 20:30 i686 unknown unknown Cygwin [EMAIL PROTECTED] ~ $ gpg --version gpg (GnuPG) 1.4.3-cvs-3913-2005-10-19 Copyright (C) 2005 Free Software Foundation, Inc. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions. See the file COPYING for details. Home: ~/.gnupg Supported algorithms: Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512 Compression: Uncompressed, ZIP, ZLIB, BZIP2 [EMAIL PROTECTED] ~ $ gpg --send-keys 0x608d2a10 gpg: sending key 608D2A10 to hkp server minsky.surfnet.nl [EMAIL PROTECTED] ~ $ -- John P. Clizbe Inet: John (a) Mozilla-Enigmail.org You can't spell fiasco without SCO. PGP/GPG KeyID: 0x608D2A10/0x18BB373A "what's the key to success?"/ "two words: good decisions." "what's the key to good decisions?" / "one word: experience." "how do i get experience?" / "two words: bad decisions." "Just how do the residents of Haiku, Hawai'i hold conversations?" signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Delete key from keyserver
I'm still in the process of learning how to use GPG for signing and encrypting messages. I use MacGPG on, you guessed it, OS X. The interface of the GPG Keychain app makes it really easy to do some powerful stuff. And you know how it is, if powerful stuff is put in the hands of ignorant people: Now I'm stuck with what you never want to get stuck with: I have keys on the keyserver that I don't want to be there and I don't want have the private key anymore. The keys are of unlimited validity. I have the passphrase, though, and I thought that this must be the key (no pun intended) to everything. Unfortunately, the more I read about it, the more I learn how wrong I am. I understand that technically there is no software command that I could send off anywhere that could fix the situation, right? But somebody must be owning and administrating the keyserver subkeys.pgp.net. How can I get to this person? And how can I prove that I am the rightful fool to request deletion of those keys from the server? I cannot believe that minutes of stupidity will leave the servers running with in a sense corrupt entries for the rest of the lifetime of gpg/pgp technologies. Surely this whole scheme must have a method, maybe manual and not-free support, for such a scenario? Any help? Thanks, Björn ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users
Re: Delete key from keyserver
On Fri, Oct 21, 2005 at 11:47:06PM +0200, B. Kuestner wrote: > I'm still in the process of learning how to use GPG for signing and > encrypting messages. I use MacGPG on, you guessed it, OS X. > > The interface of the GPG Keychain app makes it really easy to do some > powerful stuff. And you know how it is, if powerful stuff is put in > the hands of ignorant people: > > Now I'm stuck with what you never want to get stuck with: I have keys > on the keyserver that I don't want to be there and I don't want have > the private key anymore. The keys are of unlimited validity. > > I have the passphrase, though, and I thought that this must be the > key (no pun intended) to everything. Unfortunately, the more I read > about it, the more I learn how wrong I am. > > I understand that technically there is no software command that I > could send off anywhere that could fix the situation, right? If you don't have the private key, then yes, right. There is nothing you can do about it. > But somebody must be owning and administrating the keyserver > subkeys.pgp.net. How can I get to this person? And how can I prove > that I am the rightful fool to request deletion of those keys from > the server? You really can't. Even if one operator did remove the key, keyservers synchronize with each other, so the others could just put it back later. You'd have to remove it from all keyservers... and even then if someone accidentally resubmitted it, you'd have to go through this again. > I cannot believe that minutes of stupidity will leave the servers > running with in a sense corrupt entries for the rest of the lifetime > of gpg/pgp technologies. Surely this whole scheme must have a method, > maybe manual and not-free support, for such a scenario? Nope. It's an inherent scaling problem of the keyserver net. I've seen estimates that the majority of the keys on the keyserver net are not used for one reason or another, but can't be deleted. Even with the garbage keys, the keyserver database isn't too large to be served though. The PGP company is running a different sort of keyserver at http://keyserver.pgp.com. This type of keyserver allows you to remove keys if you can prove (by answering an email challenge) that you have access to the email address on the key. This keyserver obviously does not synchronize with the others, however. David ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users