Security Concern: Unsigned Windows Executable

2009-06-02 Thread Doug Bateman
Dear GnuPG Team,

I challenged myself to verify all software that I download on my new machine
is verified and signed.  Sadly, Win-GnuPG let me down.  Heres why.

Most software was distributed as a signed .exe file (using the Windows
signed .EXE format).  Some was not signed, but available via an https
connection, allowing me to verify the originating source.  And some, such as
Gygwin, WinGnuPG, and sha1sum, required I already have GnuPG or sha1sum
already installed to verify the .sig.  Of course, this creates a
bootstrapping problem for several reasons: 1) These .exe's aren't signed
windows .exe's, 2) They aren't available via https (and thus can't ensure
there isnt' a man-in-the middle), and 3) Even if I had sha1sum, I'd have to
use http and not https to download the .sig file, allowing for the
man-in-the-middle to deliver a checksum matching his hacked version.

Using GnuPG to verify downloads does nothing, if I can't verify that GnuPG
itself isn't valid.

Now yes, you'll say "You're running Windows XP, that's your problem".  Yes,
yes, this is true.  However, it still leaves the issue... why isn't an HTTPS
download or a Signed Windows .EXE available, so that users can have
confidence in what is downloaded from the GnuPG project?

Regards,
Doug Bateman

P.S.  Please CC: me on the reply if possible.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: S/MIME certs and GPG

2009-06-02 Thread Sauman Mahata
Sorry for the multiple emails. I was having a slow connection. Frustration =
multiple clicks.

Regards,
Sauman
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Running GPG from a PHP Script under Windows

2009-06-02 Thread jnhemley

I'm trying to run gpg in a php script under Windows using Apache. It works
fine using a batch file but using the same code using exec calls fails. Any
suggestions ?
-- 
View this message in context: 
http://www.nabble.com/Running-GPG-from-a-PHP-Script-under-Windows-tp23822809p23822809.html
Sent from the GnuPG - User mailing list archive at Nabble.com.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


S/MIME certs and GPG

2009-06-02 Thread Sauman Mahata
Hi,
I'm having problems using S/MIME certificates in GPG. After importing my
keys into gpg(they appear in Kleopatra when I'm done), signing and
encrypting with S/MIME is unsuccessful. Using Kleopatra's system tray
Clipboard function to sign with the S/MIME cert gives me the error:
*Signing Failed: General Error*

And using Kleopatra's Clipboard function to encrypt with the S/MIME cert
gives the following error:
*Encryption Failed: Not Found*

I'm using Gpg4Win 1.9.16 BETA and the certs are issued by my CA(Windows
Server 2008, Exchange Server).

So far (after much effort) I have managed to export the certs(private and
public keys) via Internet Explorer (.pfx files) and using OpenSSL, convert
the bundle into .pem and extract the key, issuer cert and user cert.

The method I go through to get the cert into gpg is as follows:

gpgsm --call-protect-tool --p12-import --store charliekey.p12

gpgsm --import

(after which I copy+paste the details from the pem file from Bag Attributes
to ---END CERTIFICATE--- for the issuer cert and then repeated for the
user's cert)

However, the secret key does not show in --list-secret-keys. It shows
however if I do this:
gpgsm --import charliesign.pfx
Output:

gpgsm: gpg-protect-tool: 1240 bytes of 3DES encrypted text

gpgsm: gpg-protect-tool: 2728 bytes of RC2 encrypted text

gpgsm: gpg-protect-tool: processing certBag

gpgsm: gpg-protect-tool: processing certBag

gpgsm: gpg-protect-tool: keygrip: 8069846C970B7CC3FADEBE2B7995400817694359

gpgsm: gpg-protect-tool: AllowSetForegroundWindow(2188) failed: Access is
denied.

gpgsm:

gpgsm: gpg-protect-tool: AllowSetForegroundWindow(3116) failed: Access is
denied.

gpgsm:

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: secret key stored as `C:\Documents and
Settings\user\Application
Data\gnupg\private-keys-v1.d\8069846C970B7CC3FADEBE2B7995400817694359.key'

gpgsm: total number processed: 2

gpgsm:  unchanged: 2

As can be seen in the output, the secret key has been stored, and shows when
I type gpgsm --list-secret-keys.
Importing the pfx works in xp, but does not work in Vista. Does anyone know
why my secret key can't be imported? I might have been doing something
wrong.
The command I use to extract the secret key is:
 openssl pkcs12 -in charliebundle.pem -export -out charliekey.p12 -nocerts
-nodes

Also, I have read that after importing the certs I have to make them
trusted. How do I do so? I cannot find the file  ~/.gnupg/trustlist.txt
mentioned in these tutorials.

Any help is much appreciated!

Thanks!

Regards,
Sauman
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


S/MIME certs and GPG

2009-06-02 Thread Sauman Mahata
Hi,
I'm having problems using S/MIME certificates in GPG. After importing my
keys into gpg(they appear in Kleopatra when I'm done), signing and
encrypting with S/MIME is unsuccessful. Using Kleopatra's system tray
Clipboard function to sign with the S/MIME cert gives me the error:
*Signing Failed: General Error*

And using Kleopatra's Clipboard function to encrypt with the S/MIME cert
gives the following error:
*Encryption Failed: Not Found*

I'm using Gpg4Win 1.9.16 BETA and the certs are issued by my CA(Windows
Server 2008, Exchange Server).

So far (after much effort) I have managed to export the certs(private and
public keys) via Internet Explorer (.pfx files) and using OpenSSL, convert
the bundle into .pem and extract the key, issuer cert and user cert.

The method I go through to get the cert into gpg is as follows:

gpgsm --call-protect-tool --p12-import --store charliekey.p12

gpgsm --import

(after which I copy+paste the details from the pem file from Bag Attributes
to ---END CERTIFICATE--- for the issuer cert and then repeated for the
user's cert)

However, the secret key does not show in --list-secret-keys. It shows
however if I do this:
gpgsm --import charliesign.pfx
Output:

gpgsm: gpg-protect-tool: 1240 bytes of 3DES encrypted text

gpgsm: gpg-protect-tool: 2728 bytes of RC2 encrypted text

gpgsm: gpg-protect-tool: processing certBag

gpgsm: gpg-protect-tool: processing certBag

gpgsm: gpg-protect-tool: keygrip: 8069846C970B7CC3FADEBE2B7995400817694359

gpgsm: gpg-protect-tool: AllowSetForegroundWindow(2188) failed: Access is
denied.

gpgsm:

gpgsm: gpg-protect-tool: AllowSetForegroundWindow(3116) failed: Access is
denied.

gpgsm:

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: NOTE: you should run 'diskperf -y' to enable the
disk statistics

gpgsm: gpg-protect-tool: secret key stored as `C:\Documents and
Settings\user\Application
Data\gnupg\private-keys-v1.d\8069846C970B7CC3FADEBE2B7995400817694359.key'

gpgsm: total number processed: 2

gpgsm:  unchanged: 2

As can be seen in the output, the secret key has been stored, and shows when
I type gpgsm --list-secret-keys.
Importing the pfx works in xp, but does not work in Vista. Does anyone know
why my secret key can't be imported? I might have been doing something
wrong.
The command I use to extract the secret key is:
 openssl pkcs12 -in charliebundle.pem -export -out charliekey.p12 -nocerts
-nodes

Also, I have read that after importing the certs I have to make them
trusted. How do I do so? I cannot find the file  ~/.gnupg/trustlist.txt
mentioned in these tutorials.

Any help is much appreciated!

Thanks!

Regards,
Sauman
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread John Clizbe
Doug Bateman wrote:
> I challenged myself to verify all software that I download on my new
> machine is verified and signed.  Sadly, Win-GnuPG let me down.  Heres why.

What's Win-GnuPG? Are you referring to the windows installer build of
GnuPG from http://www.gnupg.org/download/ as such? It's just GnuPG.

> Most software was distributed as a signed .exe file (using the Windows
> signed .EXE format).  Some was not signed, but available via an https
> connection, allowing me to verify the originating source.  And some,
> such as Gygwin, WinGnuPG, and sha1sum, required I already have GnuPG or
> sha1sum already installed to verify the .sig.  Of course, this creates a
> bootstrapping problem for several reasons: 1) These .exe's aren't signed
> windows .exe's, 2) They aren't available via https (and thus can't
> ensure there isnt' a man-in-the middle), and 3) Even if I had sha1sum,
> I'd have to use http and not https to download the .sig file, allowing
> for the man-in-the-middle to deliver a checksum matching his hacked version.
> 
> Using GnuPG to verify downloads does nothing, if I can't verify that
> GnuPG itself isn't valid.

I believe the Windows signed .EXE format is X.509 cert based and as such
isn't going to help much if the signing certificate doesn't chain back
to Windows set of root certs. COTS products will probably invest the
money to implement this, it's unlikely for F/OSS. It also assumes the
Microsoft technology to create Authenticode signatures is available to
F/OSS developers.

Your MITM scenarios leave out the crucial step of your attacker also
needing to possess Werner Koch's signing key. The .SIG is not just a
checksum, it is a digital signature. The verification looks like this:

$ gpg -v gnupg-w32cli-1.4.9.exe.sig
gpg: assuming signed data in `gnupg-w32cli-1.4.9.exe'
gpg: Signature made 03/26/08 12:51:54 using RSA key ID 1CE0C630
gpg: using PGP trust model
gpg: Good signature from "Werner Koch (dist sig) "
gpg: binary signature, digest algorithm SHA1

Your #3 comment is confusing. There is no .SIG to download if verifying
with sha1sum. You run sha1sum against the file you wish to verify and
compare the program output with the published value.

Are you proposing some MITM attack of a replaced installer executable
with an /identical/ SHA-1 value?

sha1sum and md5sum are widely available as source.  If you're so
committed to this verified and signed thing that you're unwilling to
trust anything, you probably should look into building some things of
your own.

sha1sum is available as source and/or windows executable along  with the
respective digital signatures from ftp://ftp.gnupg.org/gcrypt/binary/

Sooner or later you have to establish a base trust.

OH! Maybe you could use an eval version of PGP to verify the
cryptographic signature on the GnuPG installer. Of course that probably
hinges on its installer being a Windows signed-executable right? ;-)

Links discussed in this message:
Installer:
ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.9.exe

Installer signature
ftp://ftp.gnupg.org/gcrypt/binary/gnupg-w32cli-1.4.9.exe.sig

SHA-1 checksum for Installer
c2efad983dfe50e6d8007257bad2c76604be389a  gnupg-w32cli-1.4.9.exe

> P.S.  Please CC: me on the reply if possible.

-- 
John P. Clizbe  Inet:John (a) Mozilla-Enigmail.org
You can't spell fiasco without SCO. hkp://keyserver.gingerbear.net  or
 mailto:pgp-public-k...@gingerbear.net?subject=help

Q:"Just how do the residents of Haiku, Hawai'i hold conversations?"
A:"An odd melody / island voices on the winds / surplus of vowels"



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Avoid pinentry-gtk-2 when using console!

2009-06-02 Thread Werner Koch
On Sun, 31 May 2009 07:49, rog...@sdf.lonestar.org said:

> if {environmental variable is set to console/gtk/qt3}
>   use the specified pinentry flavor

You can easily implement this with a little pinentry wrapper script and
using the PINENTRY_USER_DATA envvar which is passed all the way from gpg
to Pinentry.

> I'm guessing, the current solution is to assume the user is a dumb X
> user. ;-)

Definitely not.  Pinentry pops up and grabs the keyboard for a good
reasons: This makes it much harder to preset a faked Pinentry prompt and
sniff the Passphrase entered by the user.  The curses version can't do
that and thus the default is to use an X window if XDISPLAY is set.  If
you fear faked popup windows you may modify pinentry to show a custom
image.

I am using gpg-agent for many years now and do almost all my work in
xterms and Emacs.  It does not bother me if Pinentry popups due to
background jobs every hour or so.


Salam-Shalom,

   Werner


-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread Robert J. Hansen
John Clizbe wrote:
> Your #3 comment is confusing. There is no .SIG to download if verifying
> with sha1sum. You run sha1sum against the file you wish to verify and
> compare the program output with the published value.
> 
> Are you proposing some MITM attack of a replaced installer executable
> with an /identical/ SHA-1 value?

Alternately, he could be implying an active MitM attack, where the
attacker is intercepting both the downloaded hash value (replacing it
with the trojaned version's hash value) and the application itself
(replacing it with a trojaned version).

That said, if you're presently being targeted by people who are capable
of intercepting and modifying your network traffic in realtime, neither
GnuPG nor Authenticode signatures can help you.  You need professional
help: lawyers and security geeks will help you an awful lot more than
HTTPS or Authenticode.

> sha1sum and md5sum are widely available as source.  If you're so
> committed to this verified and signed thing that you're unwilling to
> trust anything, you probably should look into building some things of
> your own.

Insert mandatory "reflections on trusting trust" reference here.

The sentiment of "I must build it from source if I'm going to trust it"
is great, but then you have to ask questions about your compiler, your
system libraries, etc., until you're left hand-hacking Assembly
instructions for a low transistor count CPU you've personally
lithographed yourself from your own personal design.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Running GPG from a PHP Script under Windows

2009-06-02 Thread Daniel Kahn Gillmor
On 06/01/2009 05:38 PM, jnhemley wrote:
> I'm trying to run gpg in a php script under Windows using Apache. It works
> fine using a batch file but using the same code using exec calls fails. Any
> suggestions ?

This sounds more like a question for php folks than gpg folks to me.  I
recommend you try asking on one of the many php forums.

And if you want to get a helpful answer, you should probably consider
including more detail.  For example, show the code you are using
exactly, the output it produces under the different circumstances, and
the exact error codes and messages produced during a failure.

hth,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Changing the expiration date after the key has expired

2009-06-02 Thread Vincent Panel
Hi,

I just wondered if it was possible to postpone the expiration date
after it has been set and/or after the deadline has been reached.

2 years ago, I created a personal key and set the expiration to 2y, so
it has now expired. It looks like I can change the expiration date (of
the primary key) in gnupg software "using edit-key". My subkey expired
too, so I have generated a new one.

I've tried to export the result and put it on the mit keyserver but it
failed. According to the message I've read, it was because my userids
wer signed by two keys (which is more or less wrong : I've checked and
they are signed twice by the same key, but at different dates). What
is strange is I've tried another keyserver and it worked (without
removing the expired signature).

But, well, the real problem is that now, even if my new subkey has
been imported successfully, the primary key on the keyserver still has
the old expiration date set - i.e. the primary key has expired : do
you know if I can update the key on the keyserver so that it is aware
of the new expiration date ?

Thanks,

Vincent

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread Jean-David Beyer

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Robert J. Hansen wrote:

| Insert mandatory "reflections on trusting trust" reference here.
|
| The sentiment of "I must build it from source if I'm going to trust it"
| is great, but then you have to ask questions about your compiler, your
| system libraries, etc., until you're left hand-hacking Assembly
| instructions for a low transistor count CPU you've personally
| lithographed yourself from your own personal design.
|
Let's say I did all that. But do I trust the guy who looked over my shoulder
to be sure I did not make a mistake in my own personal design?

And if I believe, in principle, in automatically proving programs (or
hardware, their equivalent) correct, do I trust the program that does that?
And the rules given that program that the program to be verified is to meet?

We get into the very problem Rene Descartes was stuck in until he came up
with "Cogito, ergo sum." Which I do not think was a solution at all.

- --
~  .~.  Jean-David Beyer  Registered Linux User 85642.
~  /V\  PGP-Key: 9A2FC99A Registered Machine   241939.
~ /( )\ Shrewsbury, New Jerseyhttp://counter.li.org
~ ^^-^^ 08:50:01 up 69 days, 15:04, 3 users, load average: 4.06, 4.24, 4.31
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org

iD8DBQFKJSFOPtu2XpovyZoRAmheAKC7PlUg4LWQsz9HdbP09cXdu/mIHwCcDrYG
X15Zb0CWZ1SbmpgFl+JibYs=
=NdyX
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing the expiration date after the key has expired

2009-06-02 Thread Daniel Kahn Gillmor
On 06/02/2009 10:14 AM, Vincent Panel wrote:
> I just wondered if it was possible to postpone the expiration date
> after it has been set and/or after the deadline has been reached.

yes, this is possible.  Assming you're talking about 56B55C11, it looks
like you've successfully done so.

> I've tried to export the result and put it on the mit keyserver but it
> failed. According to the message I've read, it was because my userids
> wer signed by two keys (which is more or less wrong : I've checked and
> they are signed twice by the same key, but at different dates).

It's actually self-signed three times by the same key:

 * the original self-signature
 * the new self-signature with the updated expiration
 * a third self-signature which moves the "primary User ID" flag from
one UID to another.


If pgp.mit.edu rejected the key, that's a bug in that keyserver.

I just tried pulling this key from pgp.mit.edu and from
pool.sks-keyservers.net, and found that pgp.mit.edu only had the first
two self-sigs on each UID, while pool.sks-keyservers.net had all three.

then i tried pushing the full key (with all three self-sigs) back to
pgp.mit.edu.  After that, pgp.mit.edu returned all three self-sigs.

So it seems there was a buggy propagation in there, but i might have
just fixed it manually for this specific key.

(the explicit steps described above were:

umask 077
mkdir yohonet yohonet/mit yohonet/sks
GNUPGHOME=yohonet/mit gpg --keyserver pgp.mit.edu --recv 56B55C11
GNUPGHOME=yohonet/sks gpg --keyserver pool.sks-keyservers.net --recv
56B55C11
GNUPGHOME=yohonet/sks gpg --list-sigs 56B55C11
GNUPGHOME=yohonet/mit gpg --list-sigs 56B55C11
GNUPGHOME=yohonet/sks gpg --keyserver pgp.mit.edu --send 56B55C11
GNUPGHOME=yohonet/mit gpg --keyserver pgp.mit.edu --recv 56B55C11
GNUPGHOME=yohonet/mit gpg --list-sigs 56B55C11

)

I'd be interested in seeing the error output you got from sending the
key to pgp.mit.edu.  When i sent the full key back to pgp.mit.edu, i got
no error message at all, just the expected line from gpg:

 gpg: sending key 56B55C11 to hkp server pgp.mit.edu

> What
> is strange is I've tried another keyserver and it worked (without
> removing the expired signature).

It's probably a good idea to use the other keyserver then, and avoid
pgp.mit.edu.

> But, well, the real problem is that now, even if my new subkey has
> been imported successfully, the primary key on the keyserver still has
> the old expiration date set - i.e. the primary key has expired : do
> you know if I can update the key on the keyserver so that it is aware
> of the new expiration date ?

this is already done.  the old self-signature with the old expiration
date will persist forever, but the new self-sig has a more recent
creation date, and RFC-compliant OpenPGP implementations will respect it.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing the expiration date after the key has expired

2009-06-02 Thread David Shaw

On Jun 2, 2009, at 10:14 AM, Vincent Panel wrote:


Hi,

I just wondered if it was possible to postpone the expiration date
after it has been set and/or after the deadline has been reached.


Yes, you can.


2 years ago, I created a personal key and set the expiration to 2y, so
it has now expired. It looks like I can change the expiration date (of
the primary key) in gnupg software "using edit-key". My subkey expired
too, so I have generated a new one.


This is fine.  Note that you can also change the expiration date of a  
subkey by selecting it ("key X") and then doing the usual "expire".



I've tried to export the result and put it on the mit keyserver but it
failed. According to the message I've read, it was because my userids
wer signed by two keys (which is more or less wrong : I've checked and
they are signed twice by the same key, but at different dates). What
is strange is I've tried another keyserver and it worked (without
removing the expired signature).


This is a problem with the MIT keyserver.  It runs an older keyserver  
software package, that is not fully compatible with standard keys (the  
software was written before the standard was finalized).



But, well, the real problem is that now, even if my new subkey has
been imported successfully, the primary key on the keyserver still has
the old expiration date set - i.e. the primary key has expired : do
you know if I can update the key on the keyserver so that it is aware
of the new expiration date ?


Your best bet is simply to not use the MIT keyserver.  The other  
keyservers (try "pool.sks-keyservers.net") should handle this case  
without any problems.


David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread Daniel Kahn Gillmor
On 06/02/2009 08:55 AM, Jean-David Beyer wrote:
> obert J. Hansen wrote:
> 
> | you're left hand-hacking Assembly
> | instructions for a low transistor count CPU you've personally
> | lithographed yourself from your own personal design. 
> 
> We get into the very problem Rene Descartes was stuck in until he came up
> with "Cogito, ergo sum." Which I do not think was a solution at all.

guys, with all due respect, the original poster was not asking for a
philosophical digression.  he was asking how he could practically
identify the provenance of the copy of gpg he was hoping to use.  It's
neat to point out how each layer of trust rests on another one, but we
should be giving practical advice which helps the OP push the leaps of
faith necessary to run gpg back by a few levels.

John Clizbe has offered one practical choice (see if PGP Corp. offers a
demo version with a signed executable).  Another choice would be to use
a local, trusted GNU/Linux or *BSD installation to verify Werner's
signature on the package (e.g. put it on a USB stick) and then transfer
the package back to the windows machine for installation.

A third way (if you don't currently have a local trusted free OS
installation) would be to reboot the machine with a liveCD (if you can
find a satisfactory trust path to a LiveCD) or with something like wubi
[0] which itself might offer a signed windows installer (i haven't
checked).  You can use wubi or the liveCD to verify Werner's signature
on the packages, and then transfer them back to the windows machine to
install.

hth,

--dkg

[0] http://wubi-installer.org/



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


AUTO: Richard Hamilton is out of the office (returning 06/08/2009)

2009-06-02 Thread Richard Hamilton


I am out of the office until 06/08/2009.

I am out of the office until June 8th 2009.  If this is a production
problem, please call the solution center at 918-573-2336 or email Bob Olson
at robert.ol...@williams.com. I will have limited mail and cell phone
access.


Note: This is an automated response to your message  "Re: Running GPG from
a PHP Script under Windows" sent on 6/2/09 9:58:59.

This is the only notification you will receive while this person is away.___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Avoid pinentry-gtk-2 when using console!

2009-06-02 Thread Roger
On Tue, 2009-06-02 at 12:31 +0200, Werner Koch wrote:
> On Sun, 31 May 2009 07:49, rog...@sdf.lonestar.org said:
> 
> > if {environmental variable is set to console/gtk/qt3}
> >   use the specified pinentry flavor
> 
> You can easily implement this with a little pinentry wrapper script and
> using the PINENTRY_USER_DATA envvar which is passed all the way from gpg
> to Pinentry.

Again, still sounds like a hack as (I could have done this here).  It's
the reason for posting this issue to this list (since others have the
same issue on the Internet).

> > I'm guessing, the current solution is to assume the user is a dumb X
> > user. ;-)
> 
> Definitely not.  Pinentry pops up and grabs the keyboard for a good
> reasons: This makes it much harder to preset a faked Pinentry prompt and
> sniff the Passphrase entered by the user.  The curses version can't do
> that and thus the default is to use an X window if XDISPLAY is set.  If
> you fear faked popup windows you may modify pinentry to show a custom
> image.

Think it's paranoia unless one is on a public network or is being
aggressively sought after all the time.  If this is a issue, it sounds
more sensible for the administrator to use a compile time flag
(or .gnupg/option statement or environmental variable) which seeks to
make gpg/pinentry usage stricter.

Of course, then you run into a problem with users having access to their
$HOME/.gnupg option versus an /etc/gnupg file preventing writing for
enabling such a feature.  Hence, a compile time option being better.

> I am using gpg-agent for many years now and do almost all my work in
> xterms and Emacs.  It does not bother me if Pinentry popups due to
> background jobs every hour or so.

This is what drove me up the wall with Evolution.  Granted, it enhances
security if you're always entering the pin, but quickly hinders if a
user rarely uses gpg/pgp.

(Granted, I find X useful and prefer still strongly prefer the console.
Just don't try forcing the X windows down my throat like Windows
does. ;-)


In summary -- from info gathered from this thread -- there is no coded
solution besides hacking the current files with a script that will
permit the user to use the terminal /usr/bin/pinentry
or /usr/bin/pinentry-curses while within X. (Except unsetting the X
display variable which which then would cause all X apps to fail when
starting from the terminal.)


-- 
Roger
http://rogerx.freeshell.org


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread Robert J. Hansen
Daniel Kahn Gillmor wrote:
> guys, with all due respect, the original poster was not asking for a
> philosophical digression.  he was asking how he could practically
> identify the provenance of the copy of gpg he was hoping to use.

John Clizbe answered, "[i]f you're so committed to this verified and
signed thing that you're unwilling to trust anything, you should
probably look into building some things of your own."  My remark was a
very serious warning: if the OP is so committed, my "philosophical
digression" is what lies at the bottom of that rabbit-hole.

> John Clizbe has offered one practical choice (see if PGP Corp. offers a
> demo version with a signed executable).

Active MitM assumes that you have an attacker who is technically skilled
and highly motivated.  It is ludicrous to think that an attacker skilled
enough to do active MitM and motivated enough to go after you directly
would for some reason be constrained to play within the carefully
defined box the crypto community has created.  Rule number one of
successful attacks: get outside the box.

If the OP is seriously concerned that there's an active MitM attack
going on against him, he needs get off the internet and obtain the
professional services he needs to end the threat.

No, I'm not kidding.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread Daniel Kahn Gillmor
On 06/02/2009 07:02 PM, Robert J. Hansen wrote:
>  my "philosophical
> digression" is what lies at the bottom of that rabbit-hole.

I understand (and i very much appreciate the warning), but sometimes
it's useful to go a little way into the rabbit hole instead of all the
way to the bottom, no?  otherwise, why bother with crypto software at
all, built as it is upon a teetering edifice of trust-in-others?

> Active MitM assumes that you have an attacker who is technically skilled
> and highly motivated.  

I beg to differ.  In today's wireless network, active MitM can be done
by a moderately-skilled hacker on a lark, or by an unskilled user who
can follow directions:

  http://www.ex-parrot.com/~pete/upside-down-ternet.html

it's a small step from there to a script kiddie's bot on a WAP replacing
everything that looks like a windows executable or installer crossing
the network with a program of his own choosing (even a signed one!).

Even checking sha1sums from a web page would defeat this basic attack
though, which is why i think it's reasonable for the OP to ask his question.

The OP wanted to to know how to make a few more checks than zero,
forcing any possible attacker to be marginally more clever than the
hypothesized bot above.

> It is ludicrous to think that an attacker skilled
> enough to do active MitM and motivated enough to go after you directly
> would for some reason be constrained to play within the carefully
> defined box the crypto community has created.  Rule number one of
> successful attacks: get outside the box.

But that's exactly the OPs point: "the box" on windows is a "signed
executable", whatever that is.  Since gpg is distributed outside of that
framework, he's concerned that an attacker could exploit it.
Fortunately, we can offer the OP some other techniques to put things
back "in the box" of secured communications -- he still has to trust our
 recommendations, but he can research those as well and make his own
decisions.

> If the OP is seriously concerned that there's an active MitM attack
> going on against him, 

The MitM attack doesn't need to be "against him", it just needs to be
going on.  Do you cryptographically check the integrity of software you
downoload?  Do you check the host keys of machines you ssh into?  these
are both reasonable actions, based on a concern that there may be an
active MitM attack.

> he needs get off the internet and obtain the
> professional services he needs to end the threat.

The OP may not have the resources to do what you're suggesting, or may
want to see what other options are available before resorting to such
lengths.  Practical approaches exist, and while they are imperfect, they
do have an effect against some non-zero subset of real-world threats.

let's not overstate their capabilities (the phrase "100% secure" is
meaningless), but let's offer practical approaches even as we warn of
their limitations.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Security Concern: Unsigned Windows Executable

2009-06-02 Thread Robert J. Hansen
Daniel Kahn Gillmor wrote:
> I beg to differ.  In today's wireless network, active MitM can be done
> by a moderately-skilled hacker on a lark, or by an unskilled user who
> can follow directions:
> 
>   http://www.ex-parrot.com/~pete/upside-down-ternet.html

There is a big difference between hack-in-a-box stunts like that and
serious attacks by people intent on succeeding.

> Even checking sha1sums from a web page would defeat this basic attack
> though, which is why i think it's reasonable for the OP to ask his question.

You can't have it both ways.  You can't say, "it's really easy to do
active MitM, you just need to follow these basic instructions," and then
say, "but an attacker wouldn't be able to change sha1sums."  No, of
course they'd be able to: if you're assuming the attacker can inject
whatever they like into the data stream, then you have to assume the
attacker will use that capability intelligently.

> The OP wanted to to know how to make a few more checks than zero,
> forcing any possible attacker to be marginally more clever than the
> hypothesized bot above.

And now you're arguing my point for me: there is a big difference
between hack-in-a-box stunts and serious attempts to subvert your system.

> But that's exactly the OPs point: "the box" on windows is a "signed
> executable", whatever that is.  Since gpg is distributed outside of that
> framework, he's concerned that an attacker could exploit it.

You are not understanding the metaphor; that may be my own fault.  "The
box" refers to the popular phrase, "think outside the box."

> let's not overstate their capabilities (the phrase "100% secure" is
> meaningless), but let's offer practical approaches even as we warn of
> their limitations.

I do not see that what you are presenting is practical.  The presence of
a serious attacker who can subvert your traffic in ways of the
attacker's choosing is a massive game-changer.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Avoid pinentry-gtk-2 when using console!

2009-06-02 Thread Werner Koch
On Tue,  2 Jun 2009 22:43, rog...@sdf.lonestar.org said:

> Again, still sounds like a hack as (I could have done this here).  It's

Or write your own pinentry; it is a separate package for a reason.

> Think it's paranoia unless one is on a public network or is being
> aggressively sought after all the time.  If this is a issue, it sounds

Depends on how you work; I have heard that some users have Javascript
and popup windows enabled in their browser and also read mail with a GUI
tool.  Malicious webpages could easily take advantage of that and popup
a PInentry like window.

> (or .gnupg/option statement or environmental variable) which seeks to
> make gpg/pinentry usage stricter.

Right; that is why a standard solution would not work.

> (Granted, I find X useful and prefer still strongly prefer the console.
> Just don't try forcing the X windows down my throat like Windows

No need to.  There is the curses pinentry and the gpg-agent options 

 --keep-tty
 --keep-display
 Ignore requests to change the current tty or X window system's
 DISPLAY variable respectively.  This is useful to lock the
 pinentry to pop up at the tty or display you started the agent.

Originally added to support running gpg-agent in screen(1).  Still you
will have the annoyance/security_feature to switch to the other tty.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Avoid pinentry-gtk-2 when using console!

2009-06-02 Thread Roger
On Wed, 2009-06-03 at 08:02 +0200, Werner Koch wrote:
> On Tue,  2 Jun 2009 22:43, rog...@sdf.lonestar.org said:
> > (or .gnupg/option statement or environmental variable) which seeks to
> > make gpg/pinentry usage stricter.
> 
> Right; that is why a standard solution would not work.
> 
> > (Granted, I find X useful and prefer still strongly prefer the console.
> > Just don't try forcing the X windows down my throat like Windows
> 
> No need to.  There is the curses pinentry and the gpg-agent options 
> 
>  --keep-tty
>  --keep-display
>  Ignore requests to change the current tty or X window system's
>  DISPLAY variable respectively.  This is useful to lock the
>  pinentry to pop up at the tty or display you started the agent.
> 
> Originally added to support running gpg-agent in screen(1).  Still you
> will have the annoyance/security_feature to switch to the other tty.
> 
> 
> Salam-Shalom,
> 
>Werner

Ah. Bingo. So really I should go file a (nagging) bug for Evolution PIM
client (nagging) me to enter a passphrase each time I start the
Evolution application.

Ten to one, it's using a gpg keyring for encrypting the email account
passwords. (ie. standard POP & IMAP which are sent unecrypted anyways!)

Looks like I need to go back, re-enable the gpg-agent compile time
option, ensure it's configured to my liking per your above notes
concerning "keep-*" options.  Gather accurate data & go bug them! ;-)

-- 
Roger
http://rogerx.freeshell.org


signature.asc
Description: This is a digitally signed message part
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users