Re: Explicit command for particular behavior

2017-09-13 Thread Werner Koch
On Tue, 12 Sep 2017 21:07, r...@splintermail.com said:

>   gpg --export --armored some_key_id  >  keyfile

(Please try to use the fingerprint instead of the key_id.)

> But then I wanted perform some basic checks on the file submitted, and I
> found this fantastic behavior:
>
>   cat keyfile | gpg --with-colons --with-fingerprints

There is actually a better way since 2.1.23:

   gpg --with-colons --import-options show-only --import 

pgpzsN_719FTv.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Re: [Feature Request] Multiple level subkey

2017-09-13 Thread lesto fante
>Such a thing already exists, at least here in Italy: CIE/CNS. X509-based certs.

exactly, this is what started the idea; we have no power over those
certificate for revoke, and i have no idea if a new certificate is
issued if you loose your document.

What I found out is that the CA seems to be region-based, so i will
have to track all of them. If you know something more, I am very
interesting to hear, all the info i got is pieces found here and
there. I also hope the same apply on the rest of the EU, since AFAIK
that certificate is on the European Health Insurance Card.

BUT, of course using a card reader is not possible, especially if we
think the smartphone as main device. So would be nice if somehow the
certificate can sign (and revoke! that is also important!) a "normal"
key, that is stored on the phone, and act as main key that generate
the subkey for all the application requiring it.

All the application save the user by the "certificate" identity, so
even changing key the user is automatically recognized.

Do you think this is feasible and i should research in this direction?

>Anyway that's something that IMVHO does not fit well with GPG.

Can you explain why? also, i said in my first email i am not sure
there is the right place, but i didn't know anywhere else where to
have this discussion, so tips on this regards are also appreciated.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Re: [Feature Request] Multiple level subkey

2017-09-13 Thread lesto fante
>Until and unless you present a usability study involving 100+ people composing 
>a representative sample of an identifiable community, you don't know a thing.

* I think * is NOT * I know *. I may be wrong: I don't care. First of
all i want to implement this for myself, and if i'm right and is
something that people like, that is good for them.

I will expose my reasoning instead; unfortunately i don't have the
resources or knowledge for a full study.

- smartphone outnumber pc since 2011
(http://www.marketwatch.com/story/one-chart-shows-how-mobile-has-crushed-pcs-2016-04-20)

- smartphone are already carried everyday by most people owning them
(http://www.nydailynews.com/life-style/addicted-phones-84-worldwide-couldn-single-day-mobile-device-hand-article-1.1137811)

- smartphone have NFC, BT, WiFi, making contacless payment or key
exchange extremly easy, convenient, and fast. In fact, i know payment
and even public transport access by NFC is already a reality. (no
source needed, i hope)

- smartphone are easy to loose or get stolen (45% of 18-24 years hold
has lost at least one phone according
https://www.statista.com/statistics/241365/us-cell-phone-users-whose-device-has-been-lost-or-stolen-by-age-group/)

- many smartphone are not safe
(http://thehackernews.com/2016/08/hack-android-phone.html)

- some documents in different country already come with a personal
certificate/key bound to the person

My idea is to make possible for the everyday user to add/manage new
services with a main password (by using the level 2 key, encrypted),
accessing services eventually passwordless (level 3 key), but in case
of the loss of the device, reissue all certificate in a automatic
fashion on the new device, staring from the  safe key describing the
original identity (level1)

Now, from the *user* point of view, I think we can all agree that the
reissuing of the key is quite a pain, and having safe way to do it
automatically is quite nice. but no stat on that.

On the server side, we already have something going in the right
direction with openID (but i don't think can be made
transparent-compatible, that is another big discussion)

>And without exception, not one has been successful.

better one more try, that one less

>Househusband. English has used this word since 1858.

TIL

>They may lack sophisticated technical skills, but that's not the same as being 
>foolish or clueless.

But my target is not fools or clueless, my target is who is lacking
the technical skill.
For those person is all about convenience; 50% of android user does
NOT lock the phone
(https://www.elie.net/blog/survey-most-people-dont-lock-their-android-phones-but-should).
Since apple has implemented touchID, they say >80% of the user use it.
(http://appleinsider.com/articles/16/04/19/average-iphone-user-unlocks-device-80-times-per-day-89-use-touch-id-apple-says)

This, in my opinion, is exactly the target, make the deploy of the key
easier, especially in case of device loss (aka level 2 and 3 key
compromised)

>Your "average internet user" is a 1940s-style way of thinking. We need to do 
>better than that.

Then explain FB, google, youtube, amazon... all of them does NOT
provide a great deal of personalization, if at all.
UX, usability, all is about create a "average user" out of your target
audience, and make things work for most of them. It is extremely hard
to do, but now we have much more literature.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Feature Request] Multiple level subkey

2017-09-13 Thread Robert J. Hansen
>> Your "average internet user" is a 1940s-style way of thinking. We need to do 
>> better than that.
> 
> Then explain FB, google, youtube, amazon... all of them does NOT
> provide a great deal of personalization, if at all.

They all provide intensely personalized experiences.  Just because they
don't expose the dials and switches to you doesn't mean they don't exist.

As an example: Google Chrome scans the content of webpages you visit,
and uses that to guide autocomplete in the search bar.  Your
autocomplete settings are automatically personalized based on your
browsing history with no user intervention needed.

Automatic personalization of user experience based on the software
learning the user's behavior is pretty much the gold standard in UX
design nowadays.  It's a commendable goal and worth pursuing.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Unable to sign or decrypt with card

2017-09-13 Thread NIIBE Yutaka
Philip Jackson  wrote:
> I have the log file which I attach.
>
> It shows  a number of reports of the same error  (lines 89,91,97,99,101)
> ERR 83886254 Unknown option , before it asks me for the pin
> (line 111). It says 'confidential data not shown' three times but I only
> entered the pin once.
>
> Can you determine anything from this ?

Not much.  It fails just after sending a command to the card.  It seems
that there is some communication problem between host and card reader.

How 'gpg --card-status' works?

You can try to debug scdaemon by having .gnupg/scdaemon.conf:

=
debug-level guru
debug-all
verbose
debug-ccid-driver
log-file /run/user/1000/scd.log
=

Here is what we can see in your log.

> 2017-09-11 18:10:21 gpg-agent[8972] gpg-agent (GnuPG) 2.1.11 started
[...]

gpg-agent started.

> 2017-09-11 18:10:22 gpg-agent[8972] no running SCdaemon - starting it
[...]

And then, scdaemon started after PKDECRYPT command from gpg to gpg-agent.

> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_7 -> SERIALNO
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_7 <- S SERIALNO 
> D2760001240102052870 0
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_7 <- OK
[...]

Card works fine to answer its serial number.

> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_7 -> PKDECRYPT OPENPGP.2
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_7 <- INQUIRE NEEDPIN ||Please 
> enter the PIN
> 2017-09-11 18:10:22 gpg-agent[8972] starting a new PIN Entry
[...]

gpg-agent asks PKDECRYPT command to scdaemon, and scdaemon inquires PIN
for the authentication.

> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_8 -> SETDESC Please enter the 
> PIN
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_8 <- OK
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_8 -> SETPROMPT PIN
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_8 <- OK
> 2017-09-11 18:10:22 gpg-agent[8972] DBG: chan_8 -> [[Confidential data not 
> shown]]
> 2017-09-11 18:10:23 gpg-agent[8972] SIGUSR2 received - updating card event 
> counter
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_8 <- [[Confidential data not 
> shown]]
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_8 <- [[Confidential data not 
> shown]]
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_8 -> BYE
[...]

This is interaction between pinentry and gpg-agent.

SIGUSR2 (it means: a card is found) comes from scdaemon to gpg-agent,
because scdaemon periodically checks if card is inserted.

> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_7 -> END
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_7 <- ERR 100663395 Operation 
> cancelled 
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_7 -> CAN
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_7 <- ERR 100663571 Unknown IPC 
> command 
> 2017-09-11 18:10:30 gpg-agent[8972] smartcard decryption failed: Operation 
> cancelled
> 2017-09-11 18:10:30 gpg-agent[8972] command 'PKDECRYPT' failed: Operation 
> cancelled 
> 2017-09-11 18:10:30 gpg-agent[8972] DBG: chan_6 -> ERR 100663395 Operation 
> cancelled 
[...]

gpg-agent sends the PIN to scdaemon (until "END"), and I think that
scdaemon sends command to the card through card reader.  But it fails.

There are two ways to access card reader for GnuPG.  One is through
PC/SC, and another is internal CCID driver of GnuPG.  If it doesn't work
well with PC/SC, it's worth to try the internal CCID driver (or vice virsa).
-- 

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users