Does the SCM SCR3320 work with GnuPG?

2009-09-12 Thread Peter Lebbing
Hello list,

Does anybody know if the SCM SCR3320 USB card reader works with GnuPG under
Linux? Specifically, I was thinking of buying the "ChipDrive MyKey 2" from
Conrad[1] in The Netherlands. It's only 20 euros.

If you look at the product page for the SCR3320[2] and compare the photo
with the product page for the MyKey[3], it looks like a different stick. I
hope this is just a change in the housing, because the MyKey description
still says it's the SCR3320.

I want to use it in combination with an OpenPGP v2 card, although I'm also
considering cutting up my v1 card to fit in the SIM size.

I don't think it is relevant, but I'm running Debian Squeeze/testing with
stock kernel and stock gnupg. But this can be changed if necessary, it's
just convenient (I mean the kernel and gnupg can be custom compiled, not
changing the distro).

Thank you for your time,

Peter Lebbing.

[1]http://www.conrad.nl/goto.php?artikel=971780
[2]http://www.scmmicro.com/products-services/smart-card-readers-terminals/multifunctional-token/scr3320.html
[3]http://www.scmmicro.com/products-services/chipdriveR/solutions/mykeyy.htm

-- 
I'm using the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://wwwhome.ewi.utwente.nl/~lebbing/pubkey.txt

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Does the SCM SCR3320 work with GnuPG?

2009-09-12 Thread David Shaw

On Sep 12, 2009, at 11:38 AM, Peter Lebbing wrote:


Hello list,

Does anybody know if the SCM SCR3320 USB card reader works with  
GnuPG under
Linux? Specifically, I was thinking of buying the "ChipDrive MyKey  
2" from

Conrad[1] in The Netherlands. It's only 20 euros.

If you look at the product page for the SCR3320[2] and compare the  
photo
with the product page for the MyKey[3], it looks like a different  
stick. I
hope this is just a change in the housing, because the MyKey  
description

still says it's the SCR3320.


I can't speak to the MyKey device, but I have a SCR3320 and it works  
just fine with GnuPG and the v2 card.


I like the smaller "USB stick" form factor a lot more than the larger  
"credit card" sized cards.  They're much easier to deal with when you  
don't have smartcard readers wherever you go.


David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Does the SCM SCR3320 work with GnuPG?

2009-09-12 Thread Peter Lebbing
David Shaw wrote:
> I can't speak to the MyKey device, but I have a SCR3320 and it works
> just fine with GnuPG and the v2 card.

Great, thanks for the info. One more question, does your reader look like
[1] or like [2]?

I must say I like the supposedly "new housing" ([2]) better than the "old"
one. Swapping cards seems easier and more logical with the new model. The
Conrad links have some more pictures showing how to swap cards.

> I like the smaller "USB stick" form factor a lot more than the larger
> "credit card" sized cards.  They're much easier to deal with when you
> don't have smartcard readers wherever you go.

I totally agree. I like the idea of the separate keypad of, f.e., the SPR532
I have (even though I don't use it currently), but mobility is worth more.

Peter Lebbing.

PS: I accidentally backspaced over the 'l' in '.html' in the link to the
MyKey on the SCM site in the previous mail.

[1]http://www.conrad.nl/goto.php?artikel=971793
[2]http://www.conrad.nl/goto.php?artikel=971780

-- 
I'm using the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me encrypted mail if you want some privacy.
My key is available at http://wwwhome.ewi.utwente.nl/~lebbing/pubkey.txt

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Does the SCM SCR3320 work with GnuPG?

2009-09-12 Thread David Shaw

On Sep 12, 2009, at 1:40 PM, Peter Lebbing wrote:


David Shaw wrote:

I can't speak to the MyKey device, but I have a SCR3320 and it works
just fine with GnuPG and the v2 card.


Great, thanks for the info. One more question, does your reader look  
like

[1] or like [2]?

I must say I like the supposedly "new housing" ([2]) better than the  
"old"

one. Swapping cards seems easier and more logical with the new model.


I have [1] (the white plastic one with the black card carrier on the  
side and black cap).  While it is possible, it isn't very convenient  
to swap cards very often in this model.  The card carrier seems  
somewhat fragile and not really up for frequent opening and closing.


David


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: howto secure older keys after the recent attacks

2009-09-12 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

David Shaw escribió:
...
>> So my question is basically,..
>> If gpg would use this,... does it only improve the already existing
>> entropy and randomness of the kernel PRNG? I mean that gpg somehow
>> "merges" the different sources?
>> Or is it more or less a,.. either use the kernel PRNG or the hardware
>> RNG.
> 
> The kernel merges several sources of entropy into the /dev/random pool. 
> The entropy key would just be another source (though a very prolific
> source) of entropy.

  I remember an example from one of the Bruce Schneier book, where 2
people (Alice and Bob, of course) wanted to get a random bit. They
thought about each one flipping a coin, and then mixing the results. And
Bob said "what if one of us don't do it randomly", and Alice said as
long as one of the results was truly random, the final result would be
random. So I suppose as long as the entropy generator output is mixed
with other sources of entropy, it can't lower the quality of the final
entropy. But of course, maybe I didn't understand it right.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJKrFK7AAoJEMV4f6PvczxAk6cIAKfa64/reW57fOGrHcAxapEI
eOdCLI8MDvUVPVb5+dVVJL6WQXy6jbDAikkjbJuT8sSNaUpK8nkvPccVuI3mNVkg
8PExrLS2fnXqk3HtVWcXRd/TxoQNL454SZ9EXsjaRwqZvijDqpuwuwDmfg4EvWhY
SYgzJCboRTnbJhzpaAt+z23IrdSLKdV5EvRtK6RPwjQkvu84Y+EJKiT8qdf11hQe
sIzQQoi79k+sBuq8xn+JDRcSFbfjSIdU7erXDK9F2UchB9j7OXAtdqv3ChQN6Med
LXfmuqfd+GUeuFYYaBMgKj5S5IFsTiBc3mitcj1ulstPy2MlRHI/KTX9h9R1OMI=
=90/F
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: howto secure older keys after the recent attacks

2009-09-12 Thread Robert J. Hansen
Faramir wrote:
> I remember an example from one of the Bruce Schneier book, where 2
> people (Alice and Bob, of course) wanted to get a random bit. They
> thought about each one flipping a coin, and then mixing the results.

[puts on his voting security hat]

This is part of some voting protocols.  Let's say you have two
candidates who tie in an election.  Each candidate sends their own
representative to the election with a ten-sided die (you can find these
in any hobby store).  The election commissioner collects the dice, then
distributes them out randomly to the representatives.  Everyone throws
the dice and the numbers are added up together modulo 10.  If it comes
up 0 through 4, candidate A wins the election; if it comes up 5 through
9, candidate B wins the election.  Thanks to the magic of random
distributions and modulo math, as long as there's one fair die in the
system, the entire system is fair.

Anyway.  This is apropos of nothing except to show you that such schemes
really are used in the real world.  :)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Quick advice about FAQ 4.14

2009-09-12 Thread oscar . getstring

Hi,

I would like to point a quick advice related to FAQ 4.14 available at the GNUpg website  url: http://www.gnupg.org/documentation/faqs.en.html#q4.14 
section: How can I use GnuPG in an automated environment? 


I believe that the points 4,5 and 6 should be reviewed and maybe correct to 
reflect the real procedure.

Several posts on this mailing list have already pointed out the necessity to 
rename the secring.auto in secring.pgp or to use the option --secret-keyring 
secring.auto.
I can list one of them. 
http://lists.gnupg.org/pipermail/gnupg-users/2001-October/010397.html


 Thank you,

Oscar Cassetti. 


 



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: howto secure older keys after the recent attacks

2009-09-12 Thread Robert J. Hansen
Faramir wrote:
> I remember an example from one of the Bruce Schneier book, where 2
> people (Alice and Bob, of course) wanted to get a random bit. They
> thought about each one flipping a coin, and then mixing the results.

[puts on his voting security hat]

This is part of some voting protocols.  Let's say you have two
candidates who tie in an election.  Each candidate sends their own
representative to the election with a ten-sided die (you can find these
in any hobby store).  The election commissioner collects the dice, then
distributes them out randomly to the representatives.  Everyone throws
the dice and the numbers are added up together modulo 10.  If it comes
up 0 through 4, candidate A wins the election; if it comes up 5 through
9, candidate B wins the election.  Thanks to the magic of random
distributions and modulo math, as long as there's one fair die in the
system, the entire system is fair.

Anyway.  This is apropos of nothing except to show you that such schemes
really are used in the real world.  :)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users