Re: gpg-agent 2.1 persistent socket between sessions

2017-10-26 Thread Laurent Lavaud
Ok great enabling lingering works, i don't know why but on previous Ubuntu 
version lingering is not enabled but the /run/user/PID folder was not cleaned...

Thanks !


- Original Message -
From: "Kostis Anagnostopoulos" 
To: "Laurent Lavaud" 
Cc: "GNUPG-Users" 
Sent: Wednesday, October 25, 2017 11:21:34 PM
Subject: Re: gpg-agent 2.1 persistent socket between sessions

On 25 October 2017 at 12:27, Laurent Lavaud  wrote:
> Hello,
>
> I would like to know what is the correct way to get a gpg-agent 2.1 
> persistent socket between session ?
>
> I have some cronjob that must use a key stored in the agent.
>
> Actually the first time a gpg-agent is launch, it create a socket in 
> /run/user/PID/gnupg/ but when i logout this folder is cleaned by systemd and 
> then if i come back i can't reconnect to the running gpg-agent because the 
> socket has disapear...

Have you tried to tell `systemd` to "linger" your user account?
https://askubuntu.com/a/859583/251379


Best,
  Kostis

>
> This problem appears since i uprade to Ubuntu 17.10, it seems before systemd 
> don't clean the /run/user/PID folder so the socket persist between session.
> I don't think it is an Ubuntu bug, it seems to be a normal behavior that 
> systemd clean this folder so how i could get a persistent socket for my 
> gpg-agent ?
>
> thanks in advance for your help.
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpg 2.2.x devuan jessie no TOFU TLS

2017-10-26 Thread Fulano Diego Perez

cannot work this out

installed sqlite3 and gnutls available packages and -dev packages

anybody confirm a working devuan jessie 2.2.x install and care to explain ?

many thank yous

--
--

GnuPG v2.2.1 has been configured as follows:

Revision:  355ca9e  (13660)
Platform:  GNU/Linux (x86_64-pc-linux-gnu)

OpenPGP:   yes
S/MIME:yes
Agent: yes
Smartcard: yes (without internal CCID driver)
G13:   no
Dirmngr:   yes
Gpgtar:yes
WKS tools: no

Protect tool:  (default)
LDAP wrapper:  (default)
Default agent: (default)
Default pinentry:  /usr/bin/pinentry
Default scdaemon:  (default)
Default dirmngr:   (default)

Dirmngr auto start:  yes
Readline support:yes
LDAP support:yes
TLS support: no
TOFU support:no
Tor support: yes


checking for SQLITE3... no
configure: WARNING:
***
*** Building without SQLite support - TOFU disabled
***
***
***
checking for encfs... /usr/bin/encfs
checking for fusermount... /bin/fusermount
checking for openpty in -lutil... yes
checking for shred... /usr/bin/shred
checking for npth-config... /usr/local/bin/npth-config
checking for NPTH - version >= 1.2... yes (1.5)
checking NPTH API version... okay
checking for ntbtls-config... no
checking for NTBTLS - version >= 0.1.0... no
checking for LIBGNUTLS... no
configure: WARNING:
***
*** Building without NTBTLS and GNUTLS - no TLS access to keyservers.
***
***



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Verify that the file is from who I expect it to be from

2017-10-26 Thread Dan Horne
Hi all

maybe I'm missing something, but how do I verify not only that an encrypted
file is signed, but that it is signed by the party I expect to have signed
it? In other words, if two parties can supply a file with the same name I
want to make sure that when I think I'm dealing with a file from party A,
it is actually signed by party A. At the the moment, when I decrypt the
file, it seems to simply be checking that the signature is valid.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Verify that the file is from who I expect it to be from

2017-10-26 Thread Robert J. Hansen
> maybe I'm missing something, but how do I verify not only that an
> encrypted file is signed, but that it is signed by the party I expect to
> have signed it?

Look for output like:

=
Signature made 10/26/17 22:01:37 Eastern Daylight Time
   using RSA key CC11BE7CBBED77B120F37B011DCBDC01B44427C7
Good signature from "Robert J. Hansen " [ultimate]
aka "Robert J. Hansen " [ultimate]
aka "Robert J. Hansen "
=

See that line reading "Good signature"?  That's what you're looking for.
 Hope this helps.  :)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpg 2.2.x devuan jessie no TOFU TLS

2017-10-26 Thread Fulano Diego Perez



 Forwarded Message 
Subject: gpg 2.2.x devuan jessie no TOFU TLS
Date: Fri, 27 Oct 2017 01:00:36 +1100
From: Fulano Diego Perez 
To: GnuPG Users , d...@lists.dyne.org


cannot work this out

installed sqlite3 and gnutls available packages and -dev packages

anybody confirm a working devuan jessie 2.2.x install and care to explain ?

many thank yous

--
--

GnuPG v2.2.1 has been configured as follows:

Revision:  355ca9e  (13660)
Platform:  GNU/Linux (x86_64-pc-linux-gnu)

OpenPGP:   yes
S/MIME:yes
Agent: yes
Smartcard: yes (without internal CCID driver)
G13:   no
Dirmngr:   yes
Gpgtar:yes
WKS tools: no

Protect tool:  (default)
LDAP wrapper:  (default)
Default agent: (default)
Default pinentry:  /usr/bin/pinentry
Default scdaemon:  (default)
Default dirmngr:   (default)

Dirmngr auto start:  yes
Readline support:yes
LDAP support:yes
TLS support: no
TOFU support:no
Tor support: yes


checking for SQLITE3... no
configure: WARNING:
***
*** Building without SQLite support - TOFU disabled
***
***
***
checking for encfs... /usr/bin/encfs
checking for fusermount... /bin/fusermount
checking for openpty in -lutil... yes
checking for shred... /usr/bin/shred
checking for npth-config... /usr/local/bin/npth-config
checking for NPTH - version >= 1.2... yes (1.5)
checking NPTH API version... okay
checking for ntbtls-config... no
checking for NTBTLS - version >= 0.1.0... no
checking for LIBGNUTLS... no
configure: WARNING:
***
*** Building without NTBTLS and GNUTLS - no TLS access to keyservers.
***
***



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Verify that the file is from who I expect it to be from

2017-10-26 Thread Antony Prince
You need to verify the key that signed it. A valid signature means nothing. A 
malicious actor could sign any message or days with a valid, verifiable key and 
send it to you. The heart of the matter is the key that signed it. Gnupg tells 
you which key signed the data, usually by long key ID IIRC. You have to make 
sure the key that signed the data is the key that you expect, basically. If you 
need something more in-depth, there are many more qualified individuals to 
assist on the list.

On October 26, 2017 7:52:33 PM EDT, Dan Horne  wrote:
>Hi all
>
>maybe I'm missing something, but how do I verify not only that an
>encrypted
>file is signed, but that it is signed by the party I expect to have
>signed
>it? In other words, if two parties can supply a file with the same name
>I
>want to make sure that when I think I'm dealing with a file from party
>A,
>it is actually signed by party A. At the the moment, when I decrypt the
>file, it seems to simply be checking that the signature is valid.

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Verify that the file is from who I expect it to be from

2017-10-26 Thread Dan Horne
Thanks - I get the line saying "good signature" i n my message, but are you
saying that I have to grep the output for the message and the email address
of the encryptor?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Verify that the file is from who I expect it to be from

2017-10-26 Thread Dan Horne
Yes - that's what my OP meant - Verifying the key. But I'm hoping to avoid
greping the output. What I'd love to do is provide the key I want verified
and for GnuPG to confirm e.g. something like the following would be fab:

gpg2 --verify-sign  



On 27 October 2017 at 15:08, Antony Prince  wrote:

> You need to verify the key that signed it. A valid signature means
> nothing. A malicious actor could sign any message or days with a valid,
> verifiable key and send it to you. The heart of the matter is the key that
> signed it. Gnupg tells you which key signed the data, usually by long key
> ID IIRC. You have to make sure the key that signed the data is the key that
> you expect, basically. If you need something more in-depth, there are many
> more qualified individuals to assist on the list.
>
> On October 26, 2017 7:52:33 PM EDT, Dan Horne 
> wrote:
>>
>> Hi all
>>
>> maybe I'm missing something, but how do I verify not only that an
>> encrypted file is signed, but that it is signed by the party I expect to
>> have signed it? In other words, if two parties can supply a file with the
>> same name I want to make sure that when I think I'm dealing with a file
>> from party A, it is actually signed by party A. At the the moment, when I
>> decrypt the file, it seems to simply be checking that the signature is
>> valid.
>>
>>
>>
>>
> --
> Sent from my Android device with K-9 Mail. Please excuse my brevity.
>
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Verify that the file is from who I expect it to be from

2017-10-26 Thread Shawn K. Quinn
On 10/26/2017 11:01 PM, Dan Horne wrote:
> Yes - that's what my OP meant - Verifying the key. But I'm hoping to
> avoid greping the output. What I'd love to do is provide the key I want
> verified and for GnuPG to confirm e.g. something like the following
> would be fab:
> 
> gpg2 --verify-sign  

Maybe use gpgv2 instead and put only that one key in the trustedkeys.gpg
or trustedkeys.kbx file?

-- 
Shawn K. Quinn 
http://www.rantroulette.com
http://www.skqrecordquest.com

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg 2.2.x devuan jessie no TOFU TLS

2017-10-26 Thread Daniel Kahn Gillmor
On Fri 2017-10-27 01:00:36 +1100, Fulano Diego Perez wrote:
> cannot work this out
>
> installed sqlite3 and gnutls available packages and -dev packages

what versions of these packages did you install?  can you provide more
explicit details?

the debian packages build fine on stretch and later, but i'm reluctant
to try to backport them to jessie myself these days.  Such a port would
introduce too many platform-level incompatibilities.

 --dkg


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users