Re: photo-ID

2015-01-01 Thread Nicholas Cole
On Thursday, 1 January 2015, Robert J. Hansen  wrote:

> > I’ve discussed this attack vector on the keyserver mailing list.  The
> general consensus is that the attack that I’m concerned about is real, and
> would result in serious disruption to the global keyserver network for an
> extended period until we developed countermeasures — but those
> countermeasures would fundamentally transform the keyserver network and
> force us to radically redefine our expectations of service.
>
> Before people think I’m overreacting —
>

No. It is a realistic attack. Key servers might legitimately strip photo
ids if it were ever a problem, IMHO.

But in fact, a UID packet can contain arbitrary data anyway, can't it?
Isn't that just the same problem.

N.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: photo-ID

2015-01-01 Thread Sandeep Murthy
Hi

Sorry if I misunderstood, but I didn’t say that the photo ID should
be allowed to be as large as possible, and this is not allowed anyway
by, for example, apps like GPG Keychain.

But I was wondering … instead of attaching a photo to a public key,
why not attach a hash of the photo using an image hashing
algorithm?  I don’t know much about image hashing (but this
discussion has now made me more curious to learn) but such an
algorithm is supposed to calculate a hash value for an image that
could be compared against **perceptually similar** images.  Since this will
be a string it would not lead to the blob attack scenario described before.

I found some interesting resources including a paper describing some
algorithms

http://www.phash.org/docs/pubs/thesis_zauner.pdf

and there are also several API implementations

http://www.phash.org/ (C++)
https://pypi.python.org/pypi/ImageHash (Python).

Would it not be possible for gpg to incorporate these so that a user
can attach a set of hash values for their photo(s) to their public key that
recipients could check against some other source?

Sandeep Murthy
s.mur...@mykolab.com





> On 1 Jan 2015, at 02:30, Robert J. Hansen  wrote:
> 
>> I don’t agree.
> 
> With what?
> 
>> Why isn’t the photo ID feature not useful?
> 
> I never said it wasn’t.
> 
> I said the photo ID feature, *as used within OpenPGP certificates*, isn’t.  
> There’s a big difference there.
> 
> Frankly, the possibility of allowing arbitrarily-sized binary blobs to be 
> attached to OpenPGP certificates scares the ever-living bloody f*ck out of 
> me.  (I try to avoid vulgarity, but I’m using it here to underline just how 
> critical this problem is.)  The keyserver network, as currently configured, 
> is susceptible to a total worldwide denial-of-service attack that can be 
> conducted by just one malicious individual who figures out how to turn the 
> photo ID feature into an attack vector.
> 
> I’ve discussed this attack vector on the keyserver mailing list.  The general 
> consensus is that the attack that I’m concerned about is real, and would 
> result in serious disruption to the global keyserver network for an extended 
> period until we developed countermeasures — but those countermeasures would 
> fundamentally transform the keyserver network and force us to radically 
> redefine our expectations of service.
> 
> So, yeah.  Photo IDs on OpenPGP certificates is really another way of saying 
> “OpenPGP supports putting arbitrarily-sized binary blobs on certificates that 
> will be replicated worldwide and, depending on local jurisdictions, will 
> immediately convert keyserver operators into felons.”  That’s enough for me 
> to declare the entire OpenPGP implementation of photo IDs a staggering 
> clusterf*ck of failure, and something that I really wish would get dropped 
> from the OpenPGP spec.
> 
> (I’m not going into specifics about the attack because I don’t want to give 
> anyone ideas, not in any expectation that it really matters a damn.  My 
> write-up is available, but I’m not going to help you find it.)
> 
> 
>> Surely any piece of
>> information that would help another person, with whom you
>> are proposing to communicate, to identify you first, is a good
>> thing.
> 
> Sure, but it would be nice if it didn’t expose people to phenomenal risk 
> while we’re at it.
> 
> We have better ways of doing photo IDs — e.g., keybase.io.  I think we should 
> use them.
> 
> You’re arguing against something I never said and don’t believe.
> 



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: photo-ID

2015-01-01 Thread Johan Wevers
On 01-01-2015 14:33, Sandeep Murthy wrote:

> Sorry if I misunderstood, but I didn’t say that the photo ID should
> be allowed to be as large as possible, and this is not allowed anyway
> by, for example, apps like GPG Keychain.

Huge size would not be the only problem. Wait until the first person
uploads a key with a child porn image as photo-id, and then wildly posts
"to download this child porn image, get GnuPG and download key
0x12345678. It might even be done by someone who deliberately wishes to
get all keyservers offline.

-- 
ir. J.C.A. Wevers
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Updating public key problem

2015-01-01 Thread Linux Debian
Hi guys,


  I've updated my GnuPG key and send to keyservers.
What I updated ?
I've just deleted 2 expired subkeys and added one with a longer (in
2015) expiration.
But as I can see in a keyserver -
http://pgpkey.org/pks/lookup?op=vindex&search=0x5935a6bfb301c1aa2218e0e57d58bae0dbeb2b6a&fingerprint=on

those 2 expired subkeys still appear and that's why, in my opinion, why
the sending an encrypted message doesn't work by the free service like -
https://encrypt.to/linuxdeb...@zoho.com
Before the expirationd date of those 2 keys, the encrypt.to service worked.

Try to send me an e-mail via encrypt.to
or compare the publick key information with the attached (updated).
If the attachment is not included, I add the the ASCII format below.

Thanks for any tip how to correctly update or what to do, so my public
key would be possible to be used by encrypt.to for those who wanna send
me a private message.

Btw, I use Debian Wheezy, KDE, 32b., mostly Kgpg app or CLI gpg commands.


My updated public key:

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.12 (GNU/Linux)
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SkZJRgABAQEASABIAAD/4QkZRXhpZgAATU0AKggAAA4AAgIBAAQB
LAICAAQBAAAI5QD/2P/gABBKRklGAAEBAAABAAEAAP/bAEMADwoL
DQsJDw0MDREQDxEWJRgWFBQWLSAiGyU1Lzg3NC80MztCVUg7P1A/MzRKZEtQV1pf
YF85R2hvZ1xuVV1fW//bAEMBEBERFhMWKxgYK1s9ND1bW1tbW1tbW1tbW1tbW1tb
W1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW1tbW//AABEIAGQAUQMBIgAC
EQEDEQH/xAAfAAABBQEBAQEBAQAAAQIDBAUGBwgJCgv/xAC1EAACAQMD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gpg vs smime, snowden etc

2015-01-01 Thread Uwe Brauer
Hello

I am sorry if this is a little off-topic but I am not sure where to ask.
I use both, gpg and smime (the later either with gpgsm or with
thunderbird)

Recently the German news magazine «Der Spiegel» [1] published more of
the «Snowden files», which reveal that gpg is NSA safe[2].

Does anybody know whether smime has the same level of security? There
are at least two possible weak spots. 

-  the generation and sign of the certificate, ideally the
   generation of the keypair should be done by the crypto module of
   the browser, but that could be hacked...

-  the length of the key for the symmetric encryption.

Maybe there are others. 

Any comments?

Thanks

Uwe Brauer  

Footnotes:
[1]  and I presume the Guardian and the New York Times as well.

[2]  although the documents do not provide any information concerning
 the key length and the gpg version



smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg vs smime, snowden etc

2015-01-01 Thread Heinz Diehl
On 01.01.2015, Uwe Brauer wrote: 

> Recently the German news magazine «Der Spiegel» [1] published more of
> the «Snowden files», which reveal that gpg is NSA safe[2].
> 
> Does anybody know whether smime has the same level of security? There
> are at least two possible weak spots. 

Nobody really knows, unless there is transparent and reviewable
evidence which supports either direction.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


[blog] Happy gnu year

2015-01-01 Thread Werner Koch
Hi,

find below a plain text copy of a blurb i wrote today:

  https://gnupg.org/blog/20150101-happy-gnu-year.html

if you like to comment, please group reply to this mail.


Salam-Shalom,

   Werner



Happy gnu year


  to everyone and a big *thank you* to all supporters of GnuPG.  It is
  awesome to see that GnuPG and its makers received a lot of attention
  in the last weeks of 2014.  This is really appreciated by all of us.
  Speaking of me, the donations allow me to keep on working on free
  software and GnuPG in particular — at least for the next months.

  Early December friends reminded me that it is the time to kick off a
  donation campaign to secure the future of GnuPG.  They supported me
  with a [press release] which was republished by others (e.g.  [Cory
  Doctorow]) and soon many small and larger donations started to fill up
  the donation status bar with a bit of green.  I was not just amazed by
  the financial support but also by the many encouraging messages to us
  developers like /Keep the excellent work! Please!/, /Thanks for
  keeping us safe an protecting our basic human rights./, /You guys are
  great! Safe communication should be a right./, /Thank you so much for
  this hard work.  You're truly directing us toward a better world/,
  /GPG is important software for our society's future/, /Thanks for
  doing great work. I know it's under appreciated, but it's absolutely
  necessary/, /Please keep it up, guys, and run further donation rounds
  if you need money. If GPG goes down, we'll all be at a loss/, or
  /freedom of thought, freedom of speech, freedom of information/.  Up
  until today we received more than a quarter of the campaign’s goal and
  donations are still coming in.  Let me add that my work on GnuPG would
  have not been possible without the incredible support of my family who
  deserve all my thanks.

  At the 31C3 the [Reconstructing narratives] lecture ([video]) told us
  again about the depressingly sad state of our world regarding to
  freedom and humanity.  It was also reported that most of our secure
  electronic communication methods don’t do what we expected from them –
  with the exception of a very few tools, GPG (i.e. GnuPG) being one of
  them.

  With the raised attention towards securing our communication and to
  help preserving us from a world nobody wants to have, we need to
  improve GnuPG and its frontends.  They need to be easy usable by
  everyone and be a standard part of every communication device much
  like the ubiquitous web browser. It will take time and a lot of effort
  to do that.  I am confident that with enough support we can achieve
  that goal.  Now let us look forward and see what is on the list.

  As a prerequisite we need to establish a solid organizational
  framework to free developers of tasks they are not best in, like
  looking for money, running funding campaigns, preparing paperwork for
  donation programs, and talking to ties and non-techies.

  We need better and streamlined documentation. For example, there are
  lots of different HOWTOs and other documents explaining the use of
  GnuPG and frontend applications.  Many of them are outdated and some
  documents contradicts each other.  Thus the goal is to prepare a
  canonical set of documentation to support all kind of users.  See and
  use the [Wiki] if you are interested to help.

  [Enigmail] is one of the most used mailer frontends for GnuPG and thus
  should be a primary target for improvements.  There are currently only
  two spare time developers for it — despite that some smaller bugs make
  it sometimes hard to use for a beginner.  This needs to be changed by
  improving the communication between the developers and finding the
  resources to assign a paid developer to it.

  The network of OpenPGP keyservers works quite well for the relatively
  small active user base.  For a mass use of it we need to add a few
  things or start to deploy an easier method for retrieving keys.  This
  is essential for making mail encryption the default on the net.

  Although the use or proprietary platforms supports the spook’s
  surveillance programs, it is a pipe dream to believe that free
  operating systems like Linux or FreeBSD can completely replace
  Windows, Mac OS, and Android any time soon.  Improving our crypto
  tools on those platforms is thus essential to help those users and to
  trigger a network effect to make encrypted communication the default.
  For GnuPG this means to make the core components available on these
  platforms using a standard unattended installer, so that frontend
  applications (like Enigmail) can easily install it if not yet
  available.  Separating the GnuPG core from the frontend applications
  also allows for an automatic update procedure to be prepared for
  possible security relevant bugs and to be able to easily deploy new
  algorithms as soon as the needs arises.

  As stated in the press r

PGP and BeID

2015-01-01 Thread gabriel rosseel
Besides Mozilla Thunderbird (v31.3.0) en Enigmail (1.7.2) I installed
GpG4Win (2.2.3) in order to encrypt/sign emails.
Works like a charm (no pun intended).
The only problem I have is that, when I try to open the "Manage Smartcard"
option in Enigmail, I receive an error saying that the smartcard is not
supported (gpg: OpenPGP card not available: Not supported).

As smartcard I use my Belgian EiD card with the the ACR38U as cardreader.
Additional software installed:
1. middleware (4.0.7 7453)
2. OpenPGP Smartcard Minidriver (OpenPGPmdrv-1.0.0.0)
Works also a like a charm.

As OS I use Windows 8.1 64bit

I suspect that the OpenPGP software is the culprit and doesn't support
my smartcard.

Is this correct and can I do something to make it work?


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG (v. 1.4.12) is not user-friendly

2015-01-01 Thread Kelly Dean
Ryan Sawhill wrote:
> I disagree with your subject, and propose that you google for a tutorial
> since the man page clearly didn't work for you.

The man page did work for me, and I was able to accomplish my goal.

> (As far as I can tell, you were trying to import someone's pubkey, in which
> case you should simply have used: gpg --import FILE)

No, I was trying to get the key's fingerprint, _without_ importing it. I 
thought my original message made clear that I was trying to get the 
fingerprint. The point of my message was that GPG apparently requires pointless 
circumlocution for this simple function.

Now I'm afraid you'll just ask, ‟why not just import it?”, even though that 
misses the point. The answer is: I don't want it on my keyring, if it's the 
wrong key. How do I know whether it's the right key? By checking the 
fingerprint! And to check it, I have to get it.

Then you might answer that I should import the key, get the fingerprint, check 
that it's the right one, and remove the key if it's the wrong one. But it's 
more straightforward to simply check the fingerprint first, and not import the 
key in the first place if it's the wrong one. Which was my goal.

Getting the fingerprint should not require importing the key. Getting the 
fingerprint should not require writing to any file at all. It should only 
require reading.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: Re: [Announce] GnuPG 2.1.1 released

2015-01-01 Thread Dominyk Tiller
Hi Werner,

Apologies, I'm an idiot. The option is still there.


Optional Features:
  --disable-option-checking  ignore unrecognized --enable/--with options
  --disable-FEATURE   do not include FEATURE (same as
--enable-FEATURE=no)
  --enable-FEATURE[=ARG]  include FEATURE [ARG=yes]
  --disable-dependency-tracking  speeds up one-time build
  --enable-dependency-tracking   do not reject slow dependency extractors
  --disable-gpg   do not build the gpg program
  --disable-gpgsm do not build the gpgsm program
  --disable-agent do not build the agent program
  --disable-scdaemon  do not build the scdaemon program
  --disable-g13   do not build the g13 program
  --disable-dirmngr   do not build the dirmngr program
  --disable-tools do not build the tools program
  --disable-doc   do not build the doc program
  --enable-symcryptrunbuild the symcryptrun program
  --disable-gpgtardo not build the gpgtar program
  --enable-gpg2-is-gpgSet installed name of gpg2 to gpg


Apologies for the false positive before.

Cheers, and Happy New Year,

Dom

Sent from OS X. If you wish to communicate more securely my PGP Public
Key is 0x872524db9d74326c.


 Forwarded Message 
Subject: Re: [Announce] GnuPG 2.1.1 released
Date: Thu, 18 Dec 2014 20:19:56 +
From: Dominyk Tiller 
To: gnupg-users@gnupg.org
CC: w...@gnupg.org

Apologies, that option is indeed gone.

I was trying to pass it anyhow, in order to use an external (but
up-to-date) gpg-agent as my agent, because that's how I was configuring
the 2.0.x branch, "--disable-agent
--with-agent-pgm=/usr/local/opt/gpg-agent/bin/gpg-agent".

When I went to build this new release of the 2.1.x branch I just
automatically passed those configure options, and when the configure
script didn't flag the option as unrecognised I wondered if it was a bug
that it was erroring out. I should have probably double-checked to see
if I was just being stupid ;).

Cheers for the reply,

Dom

Sent from OS X. If you wish to communicate more securely my PGP Public
Key is 0x872524db9d74326c.

On 18/12/2014 08:35, Werner Koch wrote:
> On Wed, 17 Dec 2014 13:54, dominyktil...@gmail.com said:
> 
>> I'm still hitting a new one though. If you attempt to compile using an
>> external gpg-agent, rather than one with the package, you hit this:
> 
> You mean an option --disable-agent?  Do we still have this option - it
> needs to be removed.  gpg-agent is not optional.
> 
> 
> 
> Salam-Shalom,
> 
>Werner
> 







signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG (v. 1.4.12) is not user-friendly

2015-01-01 Thread Kristian Fiskerstrand
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 01/01/2015 05:59 AM, Kelly Dean wrote:
> Ryan Sawhill wrote:
>> I disagree with your subject, and propose that you google for a 
>> tutorial since the man page clearly didn't work for you.
> 
> The man page did work for me, and I was able to accomplish my 
> goal.
> 


...

> 
> Now I'm afraid you'll just ask, ‟why not just import it?”, even 
> though that misses the point. The answer is: I don't want it on my
>  keyring, if it's the wrong key.

At this point I would just like to point out that nobody should rely
on the existence of a key in the keyring for security. After a proper
key validation the key should be signed, either locally or as an
exportable signature to form part of the WoT. As such the existence of
the key on the keyring really does not pose any issue (maybe except
for aesthetically)

> 
> Getting the fingerprint should not require importing the key. 
> Getting the fingerprint should not require writing to any file at 
> all. It should only require reading.

Just looking at the file in question the fingerprint is not stored
along with the data, but you can get the long keyid using

$ gpg --list-packets Tmp/kf.asc
...
:public key packet:
version 4, algo 1, created 1197735934, expires 0
...
keyid: 0B7F8B60E3EDFAE3

For the fingerprint the key will have to be parsed and the fingerprint
calculated. This doesn't have to be done in the primary user keyring
however, but you can easily use a temporary keyring - see "--keyring file"

- -- 
- 
Kristian Fiskerstrand
Blog: http://blog.sumptuouscapital.com
Twitter: @krifisk
- 
Public OpenPGP key 0xE3EDFAE3 at hkp://pool.sks-keyservers.net
fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3
- 
"Action is the foundational key to all success"
(Pablo Picasso)
-BEGIN PGP SIGNATURE-
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=YG2W
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG (v. 1.4.12) is not user-friendly

2015-01-01 Thread Ingo Klöcker
On Thursday 01 January 2015 04:59:37 Kelly Dean wrote:
> Getting the fingerprint should not require importing the key. Getting the
> fingerprint should not require writing to any file at all. It should only
> require reading.

I haven't tried with gpg 1.4, but with gpg 2.0.22 it's as easy as

# gpg --with-fingerprint key.gpg


Regards,
Ingo


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg vs smime, snowden etc

2015-01-01 Thread Ingo Klöcker
On Thursday 01 January 2015 19:19:58 Uwe Brauer wrote:
> Hello
> 
> I am sorry if this is a little off-topic but I am not sure where to ask.
> I use both, gpg and smime (the later either with gpgsm or with
> thunderbird)
> 
> Recently the German news magazine «Der Spiegel» [1] published more of
> the «Snowden files», which reveal that gpg is NSA safe[2].
> 
> Does anybody know whether smime has the same level of security? There
> are at least two possible weak spots.
> 
> -  the generation and sign of the certificate, ideally the
>generation of the keypair should be done by the crypto module of
>the browser, but that could be hacked...
> 
> -  the length of the key for the symmetric encryption.
> 
> Maybe there are others.

The PKI resp. the CAs are the weakest spot of S/MIME (if you rely on the 
S/MIME PKI for certificate verification).


Regards,
Ingo

signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Updating public key problem

2015-01-01 Thread Gabriel Niebler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Am 01.01.2015 um 18:10 schrieb Linux Debian:
(...)
> I've updated my GnuPG key and send to keyservers. What I updated ?
>  I've just deleted 2 expired subkeys and added one with a longer 
> (in 2015) expiration. But (...) those 2 expired subkeys still 
> appear (...)

Yes, key servers are purely cumulative.
Information cannot be deleted or made to disappear from them,
including revoked or expired (sub)keys.
This is by design, so that noone can e.g. remove someone else's
(sub)key(s), signatures, preferences etc. from the key server network.

> (...) and that's why, in my opinion, why the sending an encrypted 
> message doesn't work by the free service like - 
> https://encrypt.to/linuxdeb...@zoho.com Before the expirationd
> date of those 2 keys, the encrypt.to service worked.

I don't know that service, but if that is the case, then I suggest you
take it up with the people who run the encrypt.to service. If it
cannot handle expired subkeys then they don't implement the OpenPGP
standard correctly.

Cheers
gabe

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJUpbwIAAoJEO7XEikU4kSzr0gH/jWaRd2+8f/uv74iRjRkVdyK
w8/wNFC1kgnnpCknabtQWZsyIdtltSSuH3Eg8RxuGQWqLAcguJ/5rvPO1DxyW142
7kuUZhOFHWKKzH6oK8jqCnf/FGEu4TSg20Qzf3KGiOB+AKGYAMEfEHo5KjwZfxYi
WRwMRhLj/eLa9HNbUQvTPTpVlZFhy7ueXB0kt7mhXt5yasa9QQIEX1YlPgr/QTL+
R8uHC3GMBHzHzcj/YqzXCx/dPX8gsnfdodEMgSzPvuGsnj3YJ65kuCSdYYgUpoJ4
MKJp+rldUQAFb/zMDObSHCgTOej3hP+yNHoTPnGC4JFiW7RJUBYhL+NVWG9wcaM=
=5yoP
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG (v. 1.4.12) is not user-friendly

2015-01-01 Thread Doug Barton

On 12/31/2014 08:59 PM, Kelly Dean wrote:

I thought my original message made clear that I was trying to get the 
fingerprint. The point of my message was that GPG apparently requires pointless 
circumlocution for this simple function.


No, your original message contained nothing but the output of various 
commands. I'm sure it was clear to you, and it may even have been clear 
to some on the list. But assuming that people can infer meaning from 
such a post is not really a strategy for success. :)


Doug


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: The praise of GnuPG @31C3

2015-01-01 Thread Doug Barton

On 12/31/2014 06:40 PM, Robert J. Hansen wrote:

The protocol was secure: you just had to configure it correctly.


Yes, thank you for your tidy summary of "Security 101." :)

What I'm looking for is some sort of concrete information about "When 
ssh is configured  the NSA can break it." I've seen quite a 
few sites make the claim that "zomg, ssh is broken!" but haven't yet 
seen any specifics.


Doug


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: photo-ID

2015-01-01 Thread Robert J. Hansen
> Sorry if I misunderstood, but I didn’t say that the photo ID should
> be allowed to be as large as possible, and this is not allowed anyway
> by, for example, apps like GPG Keychain.

It *is* allowed by the spec, and it’s the spec that’s the problem here.

> But I was wondering … instead of attaching a photo to a public key,
> why not attach a hash of the photo using an image hashing
> algorithm?

This is sort of what keybase.io does; it lets you post cryptographically-signed 
statements like “this is my Twitter account” to let other people have 
confidence that a given social media account really does belong to you.



smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GPG (v. 1.4.12) is not user-friendly

2015-01-01 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 1 January 2015 at 9:55:18 PM, in
, Ingo Klöcker
wrote:


> I haven't tried with gpg 1.4, but with gpg 2.0.22 it's
> as easy as

> # gpg --with-fingerprint key.gpg


I just tested with GnuPG 1.4.18 and it worked.



- --
Best regards

MFPAmailto:2014-667rhzu3dc-lists-gro...@riseup.net

The man who really wants to do something finds a way,
the other finds an excuse.
-BEGIN PGP SIGNATURE-
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=
=NIoa
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: The praise of GnuPG @31C3

2015-01-01 Thread Robert J. Hansen
> What I'm looking for is some sort of concrete information about "When ssh is 
> configured  the NSA can break it." I've seen quite a few sites make 
> the claim that "zomg, ssh is broken!" but haven't yet seen any specifics.

First, my usual reminder: don’t focus on the three-letter Voldemort.  The world 
is a bigger place than that and there are lots of threats, including many 
non-government actors.

Second — I suspect those who know won’t tell, and those who claim to know will 
steadfastly refuse to demonstrate it.  Which tells you nothing you didn’t 
already know, I’m sorry.  :(



smime.p7s
Description: S/MIME cryptographic signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users