batch program to find my password - help please!!!

2010-08-07 Thread wegwerf4
Unfortunately I forgot my passphrase but can  remember some
characters and the position of them in the phrase. 
I wrote a bash-script to check a list of passwords which
are all candidates. 

I also created a test-gpg-account to test the script before
I run it with the quite longer list. 

Now the output of the test-script shows me that it works
at a speed of about three tests per second and it finds the
correct phrase.  
But if I run the same script in my actual
environment, in the .gnupg directory I see the passwords
running at a much higher speed.  The output per check is
the same. But this script doesn't find the passphrase.  

The script reads:


#!/bin/bash
echo $1
while read -r line
do
echo $line
gpg --batch --yes --homedir /home/user/.gnupg -o zahl.txt --passphrase 
$line --decrypt zahl.gpg
success=$?
if [ $success -eq 0 ]; then echo "success: $line"; exit 0; fi
done < $1
echo "No success"
---

Does anybody have any idea?

Best
Josef

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-07 Thread Vlad "SATtva" Miller
David Smith (06.08.2010 19:51):
> Note that there are no solutions that will prevent a user keeping a
> decrypted copy of a previously-downloaded document, unless you use your
> own custom-written browser and document viewer.

How's that? A DRM? Don't forget a custom OS and a custom monitor to
prevent a user making photo shots.

-- 
Vlad "SATtva" Miller
3d viz | security & privacy consulting
www.vladmiller.info | www.pgpru.com


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-07 Thread Dotan Cohen
On Wed, Aug 4, 2010 at 03:51, Snaky Love  wrote:
> Hi,
> I would like to better understand: is gnupg good for big groups?
>
> I would like to encrypt communication in groups - not instant communication
> like e.g. messengers like pidgin, but like on a forum or web-group - the
> data persists in an archive,  where the communication can be read. Members
> are coming and leaving a group constantly - that means if somebody leaves
> the group, she should not be able to read the content decrypted anymore, and
> if anybody attaches the group all the old content optionally must be
> encrypted with her key so she can read all data belonging to this group.
> well, maybe you get the idea. It´s basically like a forum or mailing list
> with an archive.
> With my understanding of gnupg I see no other way than to store the data NOT
> encrypted - in a database or wherever, perhaps on an encrypted disc to
> compensate for the data not being encrypted - and then to encrypt the data
> on the fly with the pubkey of the user after the user logged into the
> website and is checked to belong to the right group.
> But doing this would be stupid, as it would basically use gnupg only for
> transport - but there is already SSL and TLS existing for this purpose.
> So is there any trick to encrypt data at creation time for unknown future
> users?
> And how can I remove users from the group of allowed users without
> re-encrypting the content? Is this possible to realize at all without having
> to keep the original unencrypted content?
> Is this scenario - group communication - not a use-case for gnupg at all?
> Thank you very much for your attention!
> Have a nice day,
> Snaky
>

Sounds to me like you just need a password-protected online forum such
as PHPbb or such.

-- 
Dotan Cohen

http://gibberish.co.il
http://what-is-what.com

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keypair is expiring.

2010-08-07 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

El 06-08-2010 10:07, Klaus Vink Slott escribió:
...
> offered to extend the life of the primary key. This let me to the conclusion 
> that is was not possible to extend the validity on a subkey. My fault and now 
> every thing is great for the next 5 years ;-)

  Yes, it will be good until 05-08-2015

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMXYX4AAoJEMV4f6PvczxAWv0IAKpATPaBuW0yagSdTBY7iu7q
f/ZWmpjreyHRy9o8tnseeQd9lF7miYLLQB4p5Qecw/JV+3qApN0mYvp87qqJaSKK
vpe1q8Rc1F9K3/5+LxQvHcmNqvcaeGEQC25bbqOYlwGzn9rkXdrlPX1UnR43WZzs
ZoAiYe8fUAoCwowZUEmdyRw2unQDVAkm2mJDvRWxPxfp9N2WKVmS0m+chPrby3mo
o8M8tfuJOlAGnGg4rGAeJanzx/DACB2BDlBPNZoxVcOI5FKEw4ZRIxjq8DViaetG
zTjaqayUhysExu6rZ5CA9YYgG1r7/ItsnpbsfqW6LBkAy1smHx6Ui0naCSBTN/A=
=kkc6
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-07 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 5 August 2010 at 11:32:37 PM, in
, Robert J. Hansen wrote:

> So the question isn't whether key management is the
> major reason why people sign up and don't hang around
> -- the question is more whether key management is a
> major expense which adversely affects the cost-benefit
> ratio.

Fair enough.



> As an example, if I were to start posting tomorrow's
> winning lottery numbers to PGPNET,

If you have them, could you PM them to me, please? (-;



> Some years ago I offered to write a tool for the group
> which would help manage the key problem.  (Kind of.)
> The idea was to write a small Windows app that would
> automatically download the membership list once a day
> and update Enigmail's pgprules.xml file.  This meant
> Enigmail users would no longer be maintaining
> per-recipient rule lists by hand (which is tedious,
> error-prone, and frustrating for newbies).  The process
> would be entirely automated.

> Ultimately, the group decided not to take me up on the
> offer -- the overwhelming opinion was that they'd
> rather get experience editing pgprules.xml by hand.
> C'est la vie.  :)

Whether fully automated or ran on demand, I'm quite surprised *nobody*
was interested. I don't use Thunderbird/Enigmail, so it wouldn't help
me; I make use of jasontik's group line generator to update the group
line in my gpg.conf after roll-calls or after a period of absence from
the group - other than that I just edit that line manually to add or
delete the odd key ID.



> It sounds like a great idea, up until you consider that
> even if the spam overhead problem is reduced by a
> factor of 10, that gain gets obliterated once a few
> more people join the network.  The spam overhead
> follows an exponential growth.  When dealing with
> exponential curves, linear reductions -- even large
> linear reductions -- are pretty much meaningless.

I take it the "spam overhead problem" you refer to is things like "not
encrypted to my key" messages?


- --
Best regards

MFPAmailto:expires2...@ymail.com

A closed mouth gathers no foot
-BEGIN PGP SIGNATURE-

iQCVAwUBTF2eu6ipC46tDG5pAQqU2gP/d/x/NR6CpcNe/b/HLHhy6T0EQNGUuuPr
6qqyoZXxeTDHtSq834p529CY3RRAJxded7IDkEkkcaXPajhQ4V28CU9ZGplMm6Nb
HlHW5cj09XOeDY+VLEQt9b7iw0uGbWWBXv96LHMtQH4hYQsGf+6O6lNyiihcMCFs
wrCwjaAzfaY=
=XMAh
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Keypair is expiring.

2010-08-07 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Friday 6 August 2010 at 3:07:31 PM, in
, Klaus Vink Slott wrote:

> I
> find it quite confusing that if you start the program
> with --edit-key [subkey-id] and issue a expire command
> - then I am offered to extend the life of the primary
> key. This let me to the conclusion that is was not
> possible to extend the validity on a subkey.

Yes, this is one of the situations in which the subkey ID stands as an
alias for the primary key ID. FWIW, I tried prepending an exclamation
mark to the subkey ID but it didn't help.


- --
Best regards

MFPAmailto:expires2...@ymail.com

I hit the CTRL key but I'm still not in control!
-BEGIN PGP SIGNATURE-

iQCVAwUBTF2h16ipC46tDG5pAQr5EgQAhWFo1akt8ZkMJUFTfRNLajygLvqgzJkT
FRZtb8qTxCQyLWEOPXFy+j+Rl23z7rcLLyxaEI0af3y6l8005zDo3y9gYJ20ZwBd
Qgu4a1EA1mFaCXBB82kXRNSP9oIjt/hp+wTWHOT0SqUHVSMFkfPMDTImSxA6VjvC
EK0WOUInIvQ=
=UUJU
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-07 Thread Robert J. Hansen
On 8/7/2010 1:58 PM, MFPA wrote:
> Whether fully automated or ran on demand, I'm quite surprised *nobody*
> was interested.

One person said they would use it.  The overall reaction was negative.
These things happen.  Sometimes, the tool you think people need isn't
the tool they want.  :)

> I take it the "spam overhead problem" you refer to is things like "not
> encrypted to my key" messages?

Yep.



smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-07 Thread Paul Richard Ramer
On Wed, 04 Aug 2010 13:57:57 -0400, Robert J. Hansen wrote:
> It is also worth noting that PGPNET has some very big problems with key
> management.  PGPNET users are apparently comfortable wrestling with
> these problems (more power to them for that), but we shouldn't pretend
> the problems don't exist.
> 
> In a completely connected graph of N nodes there are (N^2 - N)/2
> different edges.  Or, in English, 40 members equals 780 separate
> communications links, each one of which can fail and produce problems
> for other people.  The network begins to get spammed with "that last
> message wasn't encrypted to my new key, please re-send."  The network
> slowly begins to drown with communications overhead: key
> synchronization, resend requests, failure notifications, etc.  PGPNET is
> probably operating pretty close to the limits of OpenPGP.  At some point
> the math bites you hard and doesn't let go.

Well, I have some numbers to show the frequency of NETMK (Not
Encrypted To My Key) messages.  I was on the PGPNET mailing list for
just over three months, and these are my findings (note that all of
these numbers are from the day that I joined to the day that roll call
ended and my key was removed).

681 Messages sent by members of the list
628 Encrypted messages
36 NETMK messages
37-41 Keys
37-40 Members
32 Members sent encrypted messages
13 Members were responsible for not encrypting to someone's key
12 Members sent NETMK messages

And for what it's worth:

22 Messages weren't encrypted to my key

So for me that makes approximately 1 in 29 encrypted messages was not
encrypted to my key, 1 in 19 of all messages was a NETMK message, and 1
in 12 of all messages was either not encrypted to my key or a NETMK
complaint.

Hope this is enlightening. :-)


-Paul

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Gnupg good for big groups?

2010-08-07 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

El 07-08-2010 15:59, Paul Richard Ramer escribió:
...
> So for me that makes approximately 1 in 29 encrypted messages was not
> encrypted to my key, 1 in 19 of all messages was a NETMK message, and 1
> in 12 of all messages was either not encrypted to my key or a NETMK
> complaint.
> 
> Hope this is enlightening. :-)

  The interesting thing, is a lot of times the NETMK messages are caused
by less active members who (somehow) broken their configurations.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJMXfqdAAoJEMV4f6PvczxAcOMH/24oZnWBGWeipdn09Sbt3Kg2
nhaKFaoebB91EUHVUioEEnuUtuVDsa5M8MXV101wSTjOAk/otIoL4nvJ/I55aXJZ
gcsCo7HYF0lvFBhDdAGhJTwdyZ2Xo24yIW3A+V7JEYIjMz+0N1/1dHtDv8GDTK+F
RPmX3WMbMiAYEpOuoA4LdBHuKvR2KCG7nyqRFjf7UB7SB2y3k3a1+fmdGBOAvPAU
YYZKjneeinCdxeq7uQ/L/xmjXuzXNs2iQKZD6XI0tt22485TZghS2GD0wzXlCGVY
1vtSpy0Zig+2wcakwprAVjXotUN+7xSQX7WO1AlhiV1KzUKK5v2O6yzGxU2g3Ng=
=iVBn
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users