pubring.kbx, no secring?

2015-12-22 Thread Matthias Apitz

Hello,

I was using GnuPG v1.x mostly to cipher some private files, i.e. not for
mail and information exchange with other. I will now create a new key to use
this for mail and move to GnuPG v2.x. I have a short question. I created
(until now for test) the key like this:

$ gpg2 --version
gpg (GnuPG) 2.1.6
libgcrypt 1.6.3
...

$ gpg2 --full-gen-key

$ gpg2 --armor --output revoke.asc --gen-revoke guru

the list keys show:

$ gpg2 --list-secret-keys
/home/guru/.gnupg/pubring.kbx
  ^^^
-
sec   dsa2048/FFEE762B922A6CBB 2015-12-22
uid   [ultimate] Matthias Apitz (GnuPGv2) 
ssb   elg2048/6C7E963A56E2D675 2015-12-22

$ gpg2 --list-public-keys
/home/guru/.gnupg/pubring.kbx
-
pub   dsa2048/FFEE762B922A6CBB 2015-12-22
uid   [ultimate] Matthias Apitz (GnuPGv2) 
sub   elg2048/6C7E963A56E2D675 2015-12-22

and I have the following files:

$ find .gnupg
.gnupg
.gnupg/gpg.conf
.gnupg/trustdb.gpg
.gnupg/pubring.kbx~
.gnupg/private-keys-v1.d
.gnupg/private-keys-v1.d/EF8AE0E0D3D7EBBFA6A0230CD105E0DFC04D9DE1.key
.gnupg/private-keys-v1.d/8FB0DD8249EC4A24E2A73B4721098FCDE815FEBB.key
.gnupg/pubring.kbx
.gnupg/openpgp-revocs.d
.gnupg/openpgp-revocs.d/812E69DC246DB739AE84473BFFEE762B922A6CBB.rev
.gnupg/S.gpg-agent
.gnupg/revoke.asc

Question: Why I do not have a file .gnupg/secring.kbx (as I have had
with v1.x)? And, why are the keys stored in .gnupg/private-keys-v1.d?

Thanks


matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pubring.kbx, no secring?

2015-12-22 Thread Matthias Apitz
El día Tuesday, December 22, 2015 a las 02:41:24PM +0100, Neal H. Walfield 
escribió:

> Hi Matthias,
> 
> On Tue, 22 Dec 2015 13:28:28 +0100,
> Matthias Apitz wrote:
> > Question: Why I do not have a file .gnupg/secring.kbx (as I have had
> > with v1.x)? And, why are the keys stored in .gnupg/private-keys-v1.d?
> 
> The short answer is that we are using a new format.
> 
> Note: GnuPG 2 will automatically migrate keys from secring.kbx to
> .gnupg/private-keys-v1.d the first time it is run.

Hi Neal,

Just to make sure: there have been no v1.x keys (I move away the old
.gnupg dir), why are the new v2 keys in a dir named .gnupg/private-keys-v1.d?

Thx

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: pubring.kbx, no secring?

2015-12-22 Thread Matthias Apitz
El día Tuesday, December 22, 2015 a las 03:03:39PM +0100, Neal H. Walfield 
escribió:

> > Just to make sure: there have been no v1.x keys (I move away the old
> > .gnupg dir), why are the new v2 keys in a dir named 
> > .gnupg/private-keys-v1.d?
> 
> I don't really understand your question, but I'll try to answer what I
> think you are asking:
> 
> secring is the old format; private-keys-v1.d is the new format.  GnuPG
> 1 doesn't know about the new format; GnuPG 2 only uses the new format,
> but the first time it is run it will migrate any existing keys from
> the old format to the new format.

I understand the migration of the old v1 keys to a new form/directory; but
why the new keys of v2 are stored in a dir private-keys-v1.d and not in
a dir for example private-keys-v2.d; don't you think that such name *v1.d* 
confuses
people (like me)?

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


keysearch fails

2015-12-23 Thread Matthias Apitz
.4.1.7.0.5.1.0.8.f.4.0.1.0.a.2.ip6.arpa. (90)
09:15:58.173415 IP 10.42.0.1.53 > 10.42.0.152.32030: 45608 1/0/0 PTR 
alita.karotte.org. (121)
09:15:58.173779 IP 10.42.0.152.48813 > 10.42.0.1.53: 38867+ PTR? 
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.e.4.2.1.8.f.6.0.1.0.0.2.ip6.arpa. (90)
09:15:59.037424 IP 10.42.0.1.53 > 10.42.0.152.48813: 38867 FormErr 0/0/0 (90)
09:15:59.037986 IP 10.42.0.152.57139 > 10.42.0.1.53: 19220+ PTR? 
0.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.5.7.d.1.9.0.f.1.0.7.4.0.1.0.0.2.ip6.arpa. (90)
09:15:59.043902 IP 10.42.0.1.53 > 10.42.0.152.57139: 19220 NXDomain 0/0/0 (90)
09:15:59.044301 IP 10.42.0.152.52403 > 10.42.0.1.53: 1040+ PTR? 
6.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.a.7.0.1.0.a.2.ip6.arpa. (90)
09:15:59.053424 IP 10.42.0.1.53 > 10.42.0.152.52403: 1040 1/0/0 PTR key.ip6.li. 
(114)
09:15:59.053950 IP 10.42.0.152.25246 > 10.42.0.1.53: 33858+ PTR? 
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.e.2.0.2.6.0.0.0.0.0.0.4.3.0.a.2.ip6.arpa. (90)
09:15:59.056508 IP 10.42.0.1.53 > 10.42.0.152.25246: 33858 1/0/0 PTR 
metalgamer.eu. (117)
09:15:59.057051 IP 10.42.0.152.28425 > 10.42.0.1.53: 31847+ PTR? 
1.0.0.b.d.0.6.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.8.0.0.8.8.a.4.0.6.2.ip6.arpa. (90)
09:15:59.058008 IP 10.42.0.1.53 > 10.42.0.152.28425: 31847 1/0/0 PTR 
openpgp.us. (114)

-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: keysearch fails

2015-12-23 Thread Matthias Apitz
El día Wednesday, December 23, 2015 a las 09:23:12AM +0100, Matthias Apitz 
escribió:

> Hello,
> 
> I can not manage to get a keysearch via dirmngr to work; when I use:
> 
> $ gpg2 --keyserver pool.sks-keyservers.net --debug 1024 --search 
> x...@freebsd.org
> gpg: reading options from '/home/guru/.gnupg/gpg.conf'
> gpg: enabled debug flags: ipc
> gpg: DBG: chan_3 <- # Home: /home/guru/.gnupg
> gpg: DBG: chan_3 <- # Config: /home/guru/.gnupg/dirmngr.conf
> gpg: DBG: chan_3 <- OK Dirmngr 2.1.6 at your service
> gpg: DBG: connection to the dirmngr established
> gpg: DBG: chan_3 -> KEYSERVER --clear hkp://pool.sks-keyservers.net
> gpg: DBG: chan_3 <- OK
> gpg: DBG: chan_3 -> KS_SEARCH -- x...@freebsd.org
> gpg: DBG: chan_3 <- [eof]
> gpg: error searching keyserver: End of file
> gpg: búsqueda del servidor de claves fallida: End of file
> gpg: DBG: chan_3 -> BYE
> gpg: secmem usage: 0/32768 bytes in 0 blocks

Seems to be a known bug:

$ dirmngr
# Home: ~/.gnupg
# Config: /home/guru/.gnupg/dirmngr.conf
OK Dirmngr 2.1.6 at your service
KEYSERVER hkps://hkps.pool.sks-keyservers.net
OK
KS_SEARCH matt...@freebsd.org
Assertion failed: (a >= 0 && a < hosttable_size), function
sort_hostpool, file ks-engine-hkp.c, line 179.
Abort trap (core dumped)

https://bugs.gnupg.org/gnupg/issue2107


-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045
«(über die DDR)... Und allein dieser Mangel (an Sozialismus) und nichts anderes 
führte zum Tod.
Und wer da nicht trauert, hat kein Herz, und wer da nicht neu anpackt, hat auch 
keins verdient.»
«(sobre la RDA)... Y solo esta escasez (de socialismo) y no otra cosa, le llevó 
a la muerte.
Y quien no está de luto, no tiene corazón, y quien no se lanza a luchar de 
nuevo, no se merece
corazón.», junge Welt del 3 de octubre 2015, p. 11

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


signing mails with MUA mutt fails

2015-12-23 Thread Matthias Apitz


Hello,

To sign mails one configure in the MUA the command in the following
form:

gpg2 --batch --output - --passphrase-fd 0 --armor --sign --detach-sign 
--textmode -u %a %f

where %a is the actual user and %f the mail attachment to be signed; it
does not work and I digged into this;

this works as it should:

$ gpg2  --output - --armor --sign --detach-sign -u guru msg.asc
Please enter the passphrase to unlock the OpenPGP secret key:
"Matthias Apitz (GnuPGv2) "
2048-bit DSA key, ID FFEE762B922A6CBB,
created 2015-12-22.

 Passphrase: 
-BEGIN PGP SIGNATURE-

iF4EABEIAAYFAlZ63U8ACgkQ/+52K5IqbLuC+wD/RnSo6soMzg0wxTdAFEbD2ykB
Yc15kIv7SPBXDoKohvcA/jUN2FNNEhlrrh5B/gAldFyYsJ7ruD5ktPa3b/DfpEP3
=DXMS
-END PGP SIGNATURE-

while this gives an error:

$ killall gpg-agent
$ echo  | gpg2 --batch --output - --passphrase-fd 0 --armor --sign 
--detach-sign --textmode -u guru msg.asc gpg: signing failed:
gpg: signing failed: Invalid IPC response
gpg: signing failed: Invalid IPC response

running with --debug gives some kind of error in the communication with
the agent: 

$ killall gpg-agent
$ echo  | gpg2 --debug 1024 --batch --output - --passphrase-fd 0 
--armor --sign --detach-sign --textmode -u guru msg.asc
gpg: reading options from '/home/guru/.gnupg/gpg.conf'
gpg: enabled debug flags: ipc
gpg: DBG: chan_7 <- OK Pleased to meet you
gpg: DBG: connection to agent established
gpg: DBG: chan_7 -> RESET
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> OPTION ttytype=rxvt
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> OPTION display=:0
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> OPTION xauthority=/tmp/kde-guru/xauth-1001-_0
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> OPTION 
putenv=DBUS_SESSION_BUS_ADDRESS=unix:path=/tmp/dbus-O4oooGN9t0,guid=4cf4542b4bf772f2892b2ac3567aaf2d
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> OPTION allow-pinentry-notify
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> OPTION agent-awareness=2.1.0
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> AGENT_ID
gpg: DBG: chan_7 <- ERR 67109139 Unknown IPC command 
gpg: DBG: chan_7 -> HAVEKEY EF8AE0E0D3D7EBBFA6A0230CD105E0DFC04D9DE1 
8FB0DD8249EC4A24E2A73B4721098FCDE815FEBB
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> RESET
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> SIGKEY EF8AE0E0D3D7EBBFA6A0230CD105E0DFC04D9DE1
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> SETKEYDESC 
Please+enter+the+passphrase+to+unlock+the+OpenPGP+secret+key:%0A%22Matthias+Apitz+(GnuPGv2)+%22%0A2048-bit+DSA+key,+ID+FFEE762B922A6CBB,%0Acreated+2015-12-22.%0A
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> SETHASH 8 
B0E553EDE7C732CA26D96C45C32E6143AB642BF28E03217400C893CCB0F14B62
gpg: DBG: chan_7 <- OK
gpg: DBG: chan_7 -> PKSIGN
gpg: DBG: chan_7 <- INQUIRE PINENTRY_LAUNCHED 4886
gpg: DBG: chan_7 -> END
gpg: DBG: chan_7 <- ERR 83886340 Invalid IPC response 
gpg: signing failed: Invalid IPC response
gpg: signing failed: Invalid IPC response
gpg: secmem usage: 1568/32768 bytes in 3 blocks

What do I miss or do wrong?

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: signing mails with MUA mutt fails

2015-12-23 Thread Matthias Apitz
El día Wednesday, December 23, 2015 a las 08:40:24PM +0100, Werner Koch 
escribió:

> On Wed, 23 Dec 2015 18:54, g...@unixarea.de said:
> 
> > To sign mails one configure in the MUA the command in the following
> > form:
> 
> You should put
> 
>   set crypt_use_gpgme

Thanks for that hint! I have had to re-compile the mutt port (on
FreeBSD) to get this option to work, but it now works nicely.

    matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045


pgpHmOKHGj8L1.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: signing mails with MUA mutt fails

2015-12-24 Thread Matthias Apitz
El día Wednesday, December 23, 2015 a las 08:40:24PM +0100, Werner Koch 
escribió:

> On Wed, 23 Dec 2015 18:54, g...@unixarea.de said:
> 
> > To sign mails one configure in the MUA the command in the following
> > form:
> 
> You should put
> 
>   set crypt_use_gpgme
> 
> into your ~/.muttrc to use the modern (ie. from ~2003) version of Mutt's
> crypto layer. it works much better that the bunch of configured commands.
> 
> > gpg2 --batch --output - --passphrase-fd 0 --armor --sign --detach-sign 
> > --textmode -u %a %f
> 
> --passphrase-fd 0
> 
> does not work with gpg2 (since 2.1) because the gpg-agent is responsible
> for the private keys and the passphrase to protect them.  If you are
> using an xterm the GUI Pinentry pops up from the background (controlled
> by the existence of the DISPLAY envvar).  If you are using a plain tty,
> either the curses pinentry or the dump tty only pinentry can be used.
> The curses pinentry is used part of the GUI pinentry and used if DISPLAY
> is not set.  Take care to set the GPG_TTY envvar (man gpg-agent).
> ...

As I said, it works very well; only pinentry is not popping up as an X
application (which I do not want either); a ps shows:

$ ps ax | egrep 'gnu|pin|mutt'
2374  -  Ss0:00,01 gpg-agent --homedir /home/guru/.gnupg 
--use-standard-socket --daemon
2392  -  S 0:00,03 pinentry --display :0 (pinentry-tty)
2394  1  S+0:00,00 egrep gnu|pin|mutt
2354  3  S+0:00,23 mutt

and of course, I have DISPLAY=:0 in my env;

I only wanted to mention this for the records; for me it is fine;

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045
«(über die DDR)... Und allein dieser Mangel (an Sozialismus) und nichts anderes 
führte zum Tod.
Und wer da nicht trauert, hat kein Herz, und wer da nicht neu anpackt, hat auch 
keins verdient.»
«(sobre la RDA)... Y solo esta escasez (de socialismo) y no otra cosa, le llevó 
a la muerte.
Y quien no está de luto, no tiene corazón, y quien no se lanza a luchar de 
nuevo, no se merece
corazón.», junge Welt del 3 de octubre 2015, p. 11


pgpbVgkL6dVgv.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2015-12-24 Thread Matthias Apitz

Hello,

I do not fully understand why some 4 random words like 

Correct, horse! Battery staple!

is a better passphrase like, for example 

Und allein dieser Mangel und nichts anderes führte zum Tod.

i.e. some phrasing which could be memorized better?

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


self signing the pub key

2015-12-25 Thread Matthias Apitz

Hello,

I read that I should self-sign my pub key, but when I do this after
creation, it says:

$ LANG=C gpg2 --sign-key Matthias

pub  rsa2048/AA1EF4741F9046D4
 created: 2015-12-25  expires: never   usage: SC  
 trust: ultimate  validity: ultimate
sub  rsa2048/D6AD2EFF41863FE4
 created: 2015-12-25  expires: never   usage: E   
[ultimate] (1). Matthias Apitz (GnuPG v2) 

"Matthias Apitz (GnuPG v2) " was already signed by key 
AA1EF4741F9046D4
Nothing to sign with key AA1EF4741F9046D4

Key not changed so no update needed.

What I do wrong?

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: about cartoon in FAQ 10.1. 'Correct, horse! Battery staple!'

2015-12-25 Thread Matthias Apitz
El día Friday, December 25, 2015 a las 06:50:07PM +0100, Ingo Klöcker escribió:

> > Und allein dieser Mangel und nichts anderes führte zum Tod.
> > 
> > i.e. some phrasing which could be memorized better?
> 
> The second sentence is found by search engines (2 hits in DuckDuckGo). Don't 
> use it or any other phrase that's has been published on the internet. A 
> phrase 
> of 4 random words has a high probability that it has not been published on 
> the 
> internet (or anywhere else). The tricky part is that you must never put your 
> 4-random-words phrase into a search engine to check this.
> 
> Instead of using a 4-random-words phrase you can use a proper sentence with 
> equivalent entropy provided that you do not use a sentence that has been 
> published anywhere. Come up with your own sentence. Ideally come up with a 
> sentence that doesn't make any sense like "The horse was correct. You cannot 
> staple batteries." This phrase might be easier to remember and has a similar 
> entropy as the above mentioned 4-random-words phrase.

Ofc, I would not have used this phrase, which is part of my signature :-)
This was only an example. I'd have used something from a book or
poem which was written before Internet-times and perhaps never published
afterwards.

Thanks for all hints in this thread.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, 🌐 http://www.unixarea.de/  ☎ 
+49-176-38902045
«(über die DDR)... Und allein dieser Mangel (an Sozialismus) und nichts anderes 
führte zum Tod.
Und wer da nicht trauert, hat kein Herz, und wer da nicht neu anpackt, hat auch 
keins verdient.»
«(sobre la RDA)... Y solo esta escasez (de socialismo) y no otra cosa, le llevó 
a la muerte.
Y quien no está de luto, no tiene corazón, y quien no se lanza a luchar de 
nuevo, no se merece
corazón.», junge Welt del 3 de octubre 2015, p. 11

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Documentation format

2016-02-06 Thread Matthias Apitz
On Saturday, 6 February 2016 13:14:37 CET, Lachlan Gunn 
 wrote:



...
Does anyone have any particular preferences?


What about Markdown and gitbook? Here you have a living example:

https://www.gitbook.com/book/gurucubano/bq-aquaris-e-4-5-ubuntu-phone/details

matthias




--
Sent from my Ubuntu phone
http://www.unixarea.de/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: What am I missing?

2016-03-30 Thread Matthias Apitz
El día Wednesday, March 30, 2016 a las 01:26:23PM -0400, Mauricio Tavares 
escribió:

> On Wed, Mar 30, 2016 at 1:13 PM, Peter Lebbing  
> wrote:
> > (I think this is too far off-topic actually, but hey)
> >
> > On 30/03/16 15:46, Robert J. Hansen wrote:
> >> I try not to get involved in conspiracy theories, but this one's just...
> >> outrageous.
> >
> > Can I ask why the conspiracy theory is "outrageous"? Can't you imagine that 
> > the
> > FBI, or at least part of it, would like to have a backdoor? They even got 
> > the US
> > ...

Hello,

The thread in general has less or nothing todo with GnuPG, but I
understand the interest in the technical background, used tools etc.

But we should not discuss here opinions about the politics of the "bad",
whoever could be named with this word. This would be really off-topic
and should be discussed elsewhere.

Just my 0.02 pesos cubanos

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Top-posting

2016-04-28 Thread Matthias Apitz
El día Thursday, April 28, 2016 a las 11:02:30AM +0200, Paolo Bolzoni escribió:

> I think this text (or variants) are old as email itself and actually,
> while funny, makes little sense.
> 
> When you follow an email thread you do not read everything, you just
> read the new email and it makes little difference if it is in the top.
> Besides most email clients actually put an indentation in the quoted
> text so it should look like:

I have the feeling (and even could proof this with examples) that top
posters do not even read about what they are posting on top of. They just
want to say something, sometimes useless, because it is already
said/answered a few lines down).

Speaking more technically, the problem is that 'modern' MUA, like
OutLook crap, thunderbird or other browser-like MUA do not invite to
post and quote correctly. They put the cursor above the first line
(sometimes you can not even configure this, and also not the correct
citation with '> ') and they do not provide the required tools/commands to trim
the old text, i.e. for example delete 150 lines with just saying '150dd'
or '.,$-20d' or others. In these 'modern' MUA you must carefully place
the cursor with the mouse, highlight even more carefully the text you
want to delete, and doing this with the limitation of a smartphone is
really a PITA.

That's why I do prefer 'mutt' and 'vim'.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
¡Dios querido denos otra vez los problemas de ayer, los que tuvimos en la RDA!
My Lord, give us back the problems of yesterday, those we have had in the GDR.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Top-posting

2016-04-28 Thread Matthias Apitz
El día Thursday, April 28, 2016 a las 02:28:56PM +0200, Guan Xin escribió:

> Your feeling is basically wrong.

Here comes the proofing example you asked for:

https://lists.launchpad.net/ubuntu-phone/msg20309.html

Someone put on top of some mails a question which has nothing todo with
the problems the other posters have faced.

HIH

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
¡Dios querido denos otra vez los problemas de ayer, los que tuvimos en la RDA!
My Lord, give us back the problems of yesterday, those we have had in the GDR.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Top-posting

2016-04-28 Thread Matthias Apitz
El día Friday, April 29, 2016 a las 03:25:10PM +1000, Ben McGinnes escribió:

> I don't have an answer for all smartphone and tablet users (other than
> the sensible ones who will SSH from their phone into another system
> and use Mutt or some other CLI MUA), but for the iPhone and iPad users
> I did find this solution from John Gruber (the guy who invented
> Markdown):

I have mutt+vim on my Ubuntu mobile phone 
https://www.gitbook.com/book/gurucubano/bq-aquaris-e-4-5-ubuntu-phone/details

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
¡Dios querido denos otra vez los problemas de ayer, los que tuvimos en la RDA!
My Lord, give us back the problems of yesterday, those we have had in the GDR.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Top-posting

2016-04-29 Thread Matthias Apitz
El día Friday, April 29, 2016 a las 04:35:40PM +0200, Guan Xin escribió:

> This post is just another example to show that your feeling is wrong
> because I read your example of hijacked thread.
> Now you need one more example to show top posters not reading before
> replying.

You may look for more examples yourself, just open your eyes and you
will find them any day. 

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
¡Dios querido denos otra vez los problemas de ayer, los que tuvimos en la RDA!
My Lord, give us back the problems of yesterday, those we have had in the GDR.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Top-posting

2016-04-30 Thread Matthias Apitz
El día Saturday, April 30, 2016 a las 01:24:23AM +0200, Guan Xin escribió:

> A mailing list may recommend bottom posting, and users had better follow it.
> This is perfectly fine.

Fine, that we agree in something. If you sign some contract, you do it
below the text after reading it, and your signature *below* is expression
of "yes I have read it". If you sign (post above) someone could think,
he/she has not read it. To avoid such thinking, it's better to not top
post.

> ...
> This is my concluding remark of this thread.

Mine too.

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
¡Dios querido denos otra vez los problemas de ayer, los que tuvimos en la RDA!
My Lord, give us back the problems of yesterday, those we have had in the GDR.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Using a GnuPG CCID card in another computer

2017-05-15 Thread Matthias Apitz

Hello,

I have a GnuPG smart card OMNIKEY 6121 Mobile USB and configured its
use in my FreeBSD 12-CURRENT netbook, generated keys and I'm able to use
it to login with SSH into other servers (after moving the pub key to
the server into ~/.ssh/authorized_keys); the only tricky part was to figure
out how to enter the PIN behind 'ssh' --> 'gpg-agent' --> 
/usr/local/bin/pinentry

So far so good.

Now I wanted the same SIM in another FreeBSD workstation (at work), but when
I do use it there, for example with 'gpg2 --card-status', there is no key in the
card and as well 'gpg2 --export-ssh-key guru' does not know how to
export the key due to missing pub key. 

Should I move the full content of ~/.gnupg as well to the 2nd computer?
And if so, why? I was thinking that all the key material (apart of the
backup) is on the SIM and I only need its PIN...

Thanks

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using a GnuPG CCID card in another computer (follow-up)

2017-05-15 Thread Matthias Apitz
El día lunes, mayo 15, 2017 a las 07:25:12p. m. +0200, Matthias Apitz escribió:

> 
> Hello,
> 
> I have a GnuPG smart card OMNIKEY 6121 Mobile USB and configured its
> use in my FreeBSD 12-CURRENT netbook, generated keys and I'm able to use
> it to login with SSH into other servers (after moving the pub key to
> the server into ~/.ssh/authorized_keys); the only tricky part was to figure
> out how to enter the PIN behind 'ssh' --> 'gpg-agent' --> 
> /usr/local/bin/pinentry
> 
> So far so good.
> 
> Now I wanted the same SIM in another FreeBSD workstation (at work), but when
> I do use it there, for example with 'gpg2 --card-status', there is no key in 
> the
> card and as well 'gpg2 --export-ssh-key guru' does not know how to
> export the key due to missing pub key. 
> 
> Should I move the full content of ~/.gnupg as well to the 2nd computer?
> And if so, why? I was thinking that all the key material (apart of the
> backup) is on the SIM and I only need its PIN...

Follow-up.

I have now copied all the files below to the other workstation and now all is
fine there too, i.e. I can export the pub key with 'gpg2 --export-ssh-key guru'
and use it for SSH being asked for the PIN of the card. The files are:

$ ls -lR .gnupg
total 52
-rw---  1 guru  wheel  2649 12 may.  22:41 dirmngr.conf
-rw-r--r--  1 guru  wheel19 15 may.  11:41 gpg-agent.conf
-rw---  1 guru  wheel  5191 12 may.  22:41 gpg.conf
drwx--  2 guru  wheel   512 14 may.  20:30 openpgp-revocs.d
drwx--  2 guru  wheel   512 14 may.  20:29 private-keys-v1.d
-rw-r--r--  1 guru  wheel  3573 14 may.  20:30 pubring.kbx
-rw---  1 guru  wheel32 12 may.  22:41 pubring.kbx~
-rw---  1 guru  wheel   600 15 may.  09:58 random_seed
-rw-r--r--  1 guru  wheel 7 15 may.  15:21 reader_0.status
-rw---  1 guru  wheel  1865 14 may.  20:29 sk_61F1ECB625C9A6C3.gpg
-rw-r-  1 guru  wheel   676 15 may.  11:45 sshcontrol
-rw---  1 guru  wheel  1280 15 may.  09:23 trustdb.gpg

.gnupg/openpgp-revocs.d:
total 4
-rw---  1 guru  wheel  1799 14 may.  20:30 
5E69FBAC1618562CB3CBFBC147CCF7E476FE9D11.rev

.gnupg/private-keys-v1.d:
total 24
-rw---  1 guru  wheel  1873 14 may.  20:17 
147F71A678B411855B4BCCC48FAEC8689B5E1C23.key
-rw---  1 guru  wheel   615 14 may.  20:29 
314DE72F03D41683E06A504769970A1643825B38.key
-rw---  1 guru  wheel   617 14 may.  20:09 
45BDBABA30A3511D507B8A08A28D425F7CD417C6.key
-rw---  1 guru  wheel   615 14 may.  20:29 
7E22A904DB3BE5A98F98AFDEED61DF1364DD949B.key
-rw---  1 guru  wheel   615 14 may.  20:29 
937BA1F6A95F68222EC2C6F9573100E17EE9522E.key
-rw---  1 guru  wheel   617 14 may.  20:17 
B0E0BFC22F116B541848DF6593B418BBB63C0CC0.key

When I generated the keys on the card (gpg2 --cardedit --> admin --> generate)
on May 14, I have had to do this twice because I was logged out from the card 
due to
to long thinking about the passphrase for the backup of the key to the file
sk_61F1ECB625C9A6C3.gpg; one can see this on the time of the files below
.gnupg/private-keys-v1.d; the 2nd run started around 20:20 and was
successful at 20:29.

The question remains: Why I do have to move the files below .gnupg/ to
the other workstation? And, what are the files below .gnupg/private-keys-v1.d
are exactly?

Thanks

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using a GnuPG CCID card in another computer (follow-up)

2017-05-16 Thread Matthias Apitz
El día martes, mayo 16, 2017 a las 11:12:18a. m. +0200, Peter Lebbing escribió:

> On 16/05/17 07:55, Matthias Apitz wrote:
> > The question remains: Why I do have to move the files below .gnupg/ to
> > the other workstation?
> 
> The card only holds the basic cryptographic material. But a certificate
> ("public key") holds much more information: your name, the relations
> between the cryptographic keys and how they are used, your preferences
> with regard to algorithms, how long the key is valid, and certifications
> by other users who have signed your key, to name some important ones.
> 
> So before you can use the smartcard, you need to import your
> certificate/public key. You could publish this to the keyserver network,
> or put it on the web. If the latter, you /can/ enter the URL in a data
> field on the smartcard, enabling you to use the "fetch" command of
> --card-edit.

Thanks for the two tips re/ the pub key; I did so and now it works:

I exported the pub key with:

$ gpg2 --export --armor > ccid--export-key-guru.pub

placed it on my webserver and configured its URL with the card's url-command
as

URL of public key : http://www.unixarea.de/ccid--export-key-guru.pub

On the 2nd workstation I moved away the GNUPGHOME:
$ env | grep GNU
GNUPGHOME=/home/guru/.gnupg-ccid
$ mv .gnupg-ccid .gnupg-ccid-saved

gpg2 is unwilling to start due to missing dir and I have had
to create it with mkdir:

$ gpg2 --card-status
gpg: keyblock resource '/home/guru/.gnupg-ccid/pubring.kbx': No such file or 
directory
gpg: failed to create temporary file 
'/home/guru/.gnupg-ccid/.#lk0x000802616210.r314251-amd64.65213': No such 
file or directory
gpg: can't connect to the agent: No such file or directory
gpg: OpenPGP card not available: No agent running

$ mkdir /home/guru/.gnupg-ccid
$ chmod 0700 /home/guru/.gnupg-ccid

As you can see the keys are completely missing in the card's status:

$ gpg2 --card-status
gpg: keybox '/home/guru/.gnupg-ccid/pubring.kbx' created
Reader ...: HID Global OMNIKEY 6121 Smart Card Reader 00 00
Application ID ...: D2760001240102010005532B
Version ..: 2.1
Manufacturer .: ZeitControl
Serial number : 532B
Name of cardholder: Matthias Apitz
Language prefs ...: en
Sex ..: unspecified
URL of public key : http://www.unixarea.de/ccid--export-key-guru.pub
Login data ...: [not set]
Signature PIN : forced
Key attributes ...: rsa4096 rsa4096 rsa4096
Max. PIN lengths .: 32 32 32
PIN retry counter : 3 0 3
Signature counter : 4
Signature key : 5E69 FBAC 1618 562C B3CB  FBC1 47CC F7E4 76FE 9D11
  created : 2017-05-14 18:20:07
Encryption key: EB62 00DA 13A1 9E80 679B  1A13 61F1 ECB6 25C9 A6C3
  created : 2017-05-14 18:20:07
Authentication key: E51D D2D6 C727 35D6 651D  EA4B 6AA5 C5C4 51A1 CD1C
  created : 2017-05-14 18:20:07
General key info..: [none]

but after fetching the pub key, all is fine:

[guru@r314251-amd64 ~]$ gpg2 --card-edit  

Reader ...: HID Global OMNIKEY 6121 Smart Card Reader 00 00
Application ID ...: D2760001240102010005532B
Version ..: 2.1
Manufacturer .: ZeitControl
Serial number : 532B
Name of cardholder: Matthias Apitz
Language prefs ...: en
Sex ..: unspecified
URL of public key : http://www.unixarea.de/ccid--export-key-guru.pub
Login data ...: [not set]
Signature PIN : forced
Key attributes ...: rsa4096 rsa4096 rsa4096
Max. PIN lengths .: 32 32 32
PIN retry counter : 3 0 3
Signature counter : 4
Signature key : 5E69 FBAC 1618 562C B3CB  FBC1 47CC F7E4 76FE 9D11
  created : 2017-05-14 18:20:07
Encryption key: EB62 00DA 13A1 9E80 679B  1A13 61F1 ECB6 25C9 A6C3
  created : 2017-05-14 18:20:07
Authentication key: E51D D2D6 C727 35D6 651D  EA4B 6AA5 C5C4 51A1 CD1C
  created : 2017-05-14 18:20:07
General key info..: [none]

gpg/card> fetch
gpg: requesting key from 'http://www.unixarea.de/ccid--export-key-guru.pub'
gpg: /home/guru/.gnupg-ccid/trustdb.gpg: trustdb created
gpg: key 47CCF7E476FE9D11: public key "Matthias Apitz (GnuPG CCID) 
" imported
gpg: Total number processed: 1
gpg:   imported: 1


gpg/card> list

Reader ...: HID Global OMNIKEY 6121 Smart Card Reader 00 00
Application ID ...: D2760001240102010005532B
Version ..: 2.1
Manufacturer .: ZeitControl
Serial number : 532B
Name of cardholder: Matthias Apitz
Language prefs ...: en
Sex ..: unspecified
URL of public key : http://www.unixarea.de/ccid--export-key-guru.pub
Login data ...: [not set]
Signature PIN : forced
Key attributes ...: rsa4096 rsa4096 rsa4096
Max. PIN lengths .: 32 32 32
PIN retry counter : 3 0 3
Signature counter : 4
Signature key : 5E69 FBAC 1618 562C B3CB  FBC1 47CC F7E4 76FE 9D11
  created : 2017-05-14 18:20:07

Re: Unknown key type

2017-05-22 Thread Matthias Apitz
El día lunes, mayo 22, 2017 a las 02:06:56p. m. -0400, Brian Minton escribió:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> On Mon, May 22, 2017 at 12:07 PM, David Vallier 
> wrote:
> >  Can someone please explain why I am getting a yellow bar on  a LOT of
> >  signed msgs saying that the key type is unknown??
> >
> >  the exact msg is "Part of the message signed with unknown key; the key
> >  type is not supported by your version of GnuPG"
> >
> >  I am running GnuPG 2.0.30 (Gpg4Win 2.3.3) on a win 7 box.
> 
> 
> If I had to guess, Id say the sender of those messages is using ECC keys.
>  They are only supported in GnuPG 2.1.  In fact, Im using such a key to
> sign this message (but my key also has a DSA subkey, so gpg 2.0 should
> still verify the signature). So, you may see the warning on this message.
> -BEGIN PGP SIGNATURE-
> 
> iHUEARYIAB0WIQTu0BWAE9wubW4AHqQ3uVB6z/IBbgUCWSMoqQAKCRA3uVB6z/IB
> bphCAQDgR8N3EWlJX5sfzfXCVHFi3rWpXfinGtRbl8tlVxEm8AEA7gwKWQ5f3Z5s
> F20WPXhNIxnHF+UnIY4T829pSim4TQiIdQQBEQgAHRYhBPnEu3YOeD8N7BCmimuO
> s6Blz7qpBQJZIyipAAoJEGuOs6Blz7qpeN0A/R8IwSrOQreTFVB4gga79xz6XIKA
> MdBvmMhXY8LSuUhNAP0Z8bv/rQWSOtf7dGPTEDYPKRCs1kYguHULVlhs/Bcc3Q==
> =MOy5
> -END PGP SIGNATURE-

piping the above mail to gpg2 (2.1.19) gives:

If I had to guess, Id say the sender of those messages is using ECC keys.
 They are only supported in GnuPG 2.1.  In fact, Im using such a key to
sign this message (but my key also has a DSA subkey, so gpg 2.0 should
still verify the signature). So, you may see the warning on this message.
gpg: Signature made Mon May 22 20:06:33 2017 CEST
gpg:using EDDSA key EED0158013DC2E6D6E001EA437B9507ACFF2016E
gpg: Can't check signature: No public key
gpg: Signature made Mon May 22 20:06:33 2017 CEST
gpg:using DSA key F9C4BB760E783F0DEC10A68A6B8EB3A065CFBAA9
gpg: Can't check signature: No public key

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


about how the MUA mutt signs mails

2017-05-31 Thread Matthias Apitz

Hello,

When I send signed mails to me with the MUA mutt (just for test) the
received mail is verified fine in mutt, i.e. it says in mutt:

[-- Begin signature information --]
Good signature from: Matthias Apitz (GnuPG CCID) 
created: Wed May 31 21:40:19 2017
[-- End signature information --]

[-- The following data is signed --]

hello


[-- End of signed data --]

but when I save the signature part into a file 'signature.asc' and the
ASCII content of the mail as a file 'data' from the menu in mutt:

q:Exit  s:Save  |:Pipe  p:Print  ?:Help
  I 1   
[text/plain, 7bit, utf-8, 0.1K]
  I 2 signature.asc
[applica/pgp-signat, 7bit, 0.8K]

and run:

$ gpg2 --verify signature.asc data
gpg: Signature made Wed May 31 21:40:19 2017 CEST
gpg:using RSA key 5E69FBAC1618562CB3CBFBC147CCF7E476FE9D11
gpg: BAD signature from "Matthias Apitz (GnuPG CCID) " 
[ultimate]

it says 'BAD signature'.

Why the file 'data' has BAD signature? The file 'data' after saving from
mutt from the above menu just contains:

$ cat data
hello

$ od -c data
000h   e   l   l   o  \n  \n
007

I digged into this trussing the mutt-gpg2 process chain and it turned out that
the netto data which verifies mutt is:

$ od -c data.asc
000C   o   n   t   e   n   t   -   T   y   p   e   :   t   e
020x   t   /   p   l   a   i   n   ;   c   h   a   r   s   e
040t   =   u   t   f   -   8  \r  \n   C   o   n   t   e   n   t
060-   D   i   s   p   o   s   i   t   i   o   n   :   i   n
100l   i   n   e  \r  \n  \r  \n   h   e   l   l   o  \r  \n  \r
120   \n
121

i.e. containes as well some mail header line about the content and charset and 
esp.
as well \r\n line terminators. If I modify the file to this it is fine:

$ gpg2 --verify signature.asc data.asc
gpg: Signature made Wed May 31 21:40:19 2017 CEST
gpg:using RSA key 5E69FBAC1618562CB3CBFBC147CCF7E476FE9D11
gpg: Good signature from "Matthias Apitz (GnuPG CCID) " 
[ultimate]

Is this correct how mutt signs such mail bodies?

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: about how the MUA mutt signs mails

2017-06-01 Thread Matthias Apitz
El día Thursday, June 01, 2017 a las 10:00:12AM +0100, Darac Marjal escribió:

> >Is this correct how mutt signs such mail bodies?
> 
> This is "PGP-MIME" format, as refined in
> <https://tools.ietf.org/html/rfc3156>. Section 5 of that clearly states:
> 
> ...

Darac,

Thank you very much for your enlightened explanation and ...

> -- 
> For more information, please reread.

... and for your nice signature.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


setting GnuPG card to 'not forces' does not let sign

2017-06-08 Thread Matthias Apitz

Hello,

I was tired of having always enter the PIN when sending mails to sign them
and switched the card to 'not forces':

Signature PIN : not forced

After this (without withdrawing the card, i.e. the PIN was already
entered around 10 times and the card unlocked), the signing says:

$ echo bla > test.doc
$ LANG=C
$ gpg2 --armor --output test.doc.signed --sign test.doc
gpg: signing failed: Bad PIN
gpg: signing failed: Bad PIN

The bad PIN counter in the card is not decremented. Switching the card
back to 'forced' makes signing with PIN working again.

What do I wrong?

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: RE: setting GnuPG card to 'not forces' does not let sign

2017-06-08 Thread Matthias Apitz

Every time I write to gnupg-users@gnupg.org I get this crap from a robot
or from Sarah about dating. Can someone do anything that he/she/it is not
triggered.

Sarah, I have no intention to click on the URL and much less to click on
you. Crap.

matthias

- Forwarded message from Sarah  -

Date: Thu, 8 Jun 2017 06:41:21 -0400
From: Sarah 
To: g...@unixarea.de
Subject: RE: setting GnuPG card to 'not forces' does not let sign
X-Mailer: JAS STD

Have you finally got my pix?
Let's meet tomorrow!
Write me only here: 
http://free-new-dating.online/?&s=35&:uni:2g-17&Profile=Sarah212





On Jun 08, 2017, at 10:29 AM, Matthias Apitz  wrote:

>
>--k1lZvvs/B4yU6o8G
>Content-Type: text/plain; charset=utf-8
>Content-Disposition: inline
>Content-Transfer-Encoding: quoted-printable
>
>
>Hello,
>
>I was tired of having always enter the PIN when sending mails to sign them
>and switched the card to 'not forces':
>
>Signature PIN : not forced
>
>After this (without withdrawing the card, i.e. the PIN was already
>entered around 10 times and the card unlocked), the signing says:
>
>$ echo bla > test.doc
>$ LANG=3DC
>$ gpg2 --armor --output test.doc.signed --sign test.doc
>gpg: signing failed: Bad PIN
>gpg: signing failed: Bad PIN
>
>The bad PIN counter in the card is not decremented. Switching the card
>back to 'forced' makes signing with PIN working again.
>
>What do I wrong?
>
>   matthias
>
>
>--=20
>Matthias Apitz, =E2=9C=89 g...@unixarea.de, =E2=8C=82 http://www.unixarea.d=
>e/  =E2=98=8E +49-176-38902045
>Public GnuPG key: http://www.unixarea.de/key.pub
>8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
>8 de mayo de 1945: Quien no festeja perdi=C3=B3 la Guerra.
>May 8, 1945: Who does not celebrate lost the War.
>
>--k1lZvvs/B4yU6o8G
>Content-Type: application/pgp-signature; name="signature.asc"
>
>-BEGIN PGP SIGNATURE-
>
>iQIzBAABCAAdFiEEXmn7rBYYViyzy/vBR8z35Hb+nREFAlk5JxMACgkQR8z35Hb+
>nRG0Pg//XxtBaoPPQN3uinfxxExnoNQcScfx/Eycxr1kDZjFQxp6LVIK1KZy+Dht
>V5Sx+ssn0lids22szU5uZlT60dqbaUAASzsBo74FPxsvJ03BishsCIvCCqArpj5S
>kZLe/iUExNj+hq4XRUh0Ia0MllI20rzjEF1sC0EC2r1YfYv2ePdFzgQtD8HvDMqo
>v0vPISHoPF7Xsswu9q3TFQGbiim6HEoOLgQlYGMB1egP4NS66RGWU/s3fVVXqEw5
>c8btka/S64hNVMiFEzNl573csiQDLdT/OHk9DvDpHDqzcSCZVuutCznj4sDmMIEx
>7GKZsfv4xLJT4CuKHDedm7AOctRw9fV2GqFCeIlc/sdELxg4MX+pYpmd6gN79Dno
>wDe5oCXXSmUvodvGS5iSfVYCmoJZ+Ww1oxWFG2YHl6kAGZP6h3Lam6GjOhoaoXLJ
>P4MD+4EG9GAs8cMpCtiCjbqW27eV6KeglGu2RCLhSp3pWGTXFxuXW2X4fMbhZrNC
>3pc2X3QTClcbmPaRActZ3Kt5KqxbHS7iAAWJr/Rna+SRsCxFpCQYnl+m6BOdJs9X
>rx86Ca/NAZBOtWbrnVlT5yCgUAZ2gNaQPVDXhKRNUmosdwC8RKG1y+JyEav8CmKc
>UbJa6pIIYknZQ+UGTbIuuZX/VM2PR+86Tr3FihuDKt/VA9IBpq4=
>=EM3I
>-END PGP SIGNATURE-
>
>--k1lZvvs/B4yU6o8G--
>
>

- End forwarded message -

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: RE: setting GnuPG card to 'not forces' does not let sign

2017-06-08 Thread Matthias Apitz
El día jueves, junio 08, 2017 a las 01:18:35p. m. +0200, Peter Lebbing escribió:

> On 08/06/17 12:48, Matthias Apitz wrote:
> > Every time I write to gnupg-users@gnupg.org I get this crap from a robot
> > or from Sarah about dating. Can someone do anything that he/she/it is not
> > triggered.
> 
> Yes, same here. I thought it was rather funny that she told me:
> 
> > Hello again! My boyfriend can read my email!
> > It is not secure.
> 
> and later:
> 
> > Honey, I've told you, email is not secure enough!
> 
> How a spambot can be oddly on-topic for this mailing list...

Perhaps, when the spambot sees part of his 1st message in the incoming
mail, it reacts on this.

I have it blacklisted now in my spamassassin config.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: RE: setting GnuPG card to 'not forces' does not let sign

2017-06-08 Thread Matthias Apitz
El día viernes, junio 09, 2017 a las 08:06:50a. m. +0200, Werner Koch escribió:

> On Thu,  8 Jun 2017 12:48, g...@unixarea.de said:
> > Every time I write to gnupg-users@gnupg.org I get this crap from a robot
> > or from Sarah about dating. Can someone do anything that he/she/it is not
> 
> That bot is subscribed.  I enabled the moderation flag and disabled
> delivery.
> 

Thanks for this.

Re/ the issue itself, it seems that a complete restart of the chain
gpg-agent -- scdaemon -- /usr/local/sbin/pcscd
fixed the issue. It asks now once for the PIN for signing and then not
again until reboot.

Thanks as well for the nice hint about X-message-flag: header line.
The warning looks really nice in the crappy MS OutLook.

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: setting GnuPG card to 'not forces' does not let sign

2017-06-08 Thread Matthias Apitz
El día viernes, junio 09, 2017 a las 08:09:12a. m. +0200, Werner Koch escribió:

> 
> > The bad PIN counter in the card is not decremented. Switching the card
> > back to 'forced' makes signing with PIN working again.
> 
> Interesting.  Did you also try to reset the card (i.e. re-insert) whit
> non-forced set?

As I wrote in the last mail, it works now like it should and for signing
as for SSH I only have to enter the PIN once.

I have one last remaining issue with this GnuPG card and/or my USB
device HID Global OMNIKEY 6121 Smart Card Reader and/or FreeBSD, i.e.
its totally unclear at the moment what is causing it:

Sometimes (let's say in 50% of the cases) the USB device is not seen by
the FreeBSD kernel on power-on boot, even if the OMNIKEY is already inserted 
before
power-on. When it is not seen on boot, it is not seen on withdraw and
re-insert. When it is seen, it is always seen, i.e. one can re-insert as
much as you want, it always works. Sometimes not even a re-boot helps, it
takes 2-3 re-boots to get the OMNIKEY seen.

I know, this is not a GnuPG issue, but I wanted to mention it here to
ask if others has similar experiences, even on Linux or other OS, or if
it worth to get a new OMNIKEY device or even another device.

Comments?

Thanks

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


changing the passphrase of the secret key stored in the GnuPG card

2017-06-11 Thread Matthias Apitz

How could I change the passphrase I have entered while generating the
keys on the GnuPG card? I tried with no success:

$ LANG=C gpg2 --edit-key Matthias passwd
gpg (GnuPG) 2.1.19; Copyright (C) 2017 Free Software Foundation, Inc.
...

Secret key is available.

sec  rsa4096/47CCF7E476FE9D11
 created: 2017-05-14  expires: never   usage: SC  
 card-no: 0005 532B
 trust: ultimate  validity: ultimate
ssb  rsa4096/6AA5C5C451A1CD1C
 created: 2017-05-14  expires: never   usage: A   
 card-no: 0005 532B
ssb  rsa4096/61F1ECB625C9A6C3
 created: 2017-05-14  expires: never   usage: E   
 card-no: 0005 532B
[ultimate] (1). Matthias Apitz (GnuPG CCID) 

Key has only stub or on-card key items - no passphrase to change.

gpg> 

Thanks

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: changing the passphrase of the secret key stored in the GnuPG card

2017-06-11 Thread Matthias Apitz
El día domingo, junio 11, 2017 a las 08:51:58p. m. +0200, Werner Koch escribió:

> On Sun, 11 Jun 2017 20:07, g...@unixarea.de said:
> > How could I change the passphrase I have entered while generating the
> > keys on the GnuPG card? I tried with no success:
> 
> To change the PINs on the card you need to use 
> 
>   gpg --card-edit

I know, but I want to change the passphrase, not the PIN.

    matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: changing the passphrase of the secret key stored in the GnuPG card

2017-06-11 Thread Matthias Apitz
El día domingo, junio 11, 2017 a las 09:37:51p. m. +0200, Peter Lebbing 
escribió:

> On 11/06/17 21:05, Matthias Apitz wrote:
> > I know, but I want to change the passphrase, not the PIN.
> 
> They are the same thing, it's just a choice of terminology. Since user
> authentication to a smartcard is traditionally done using numerics only
> and card readers with PINpads also usually only use numerics, the term
> PIN has become commonly used (Personal Identification Number[1]). But
> under GnuPG, you can use alphanumerics and symbols, and it is more
> correct to call it a passphrase.

I have the feeling, we talk about different things. When I generated the
keys on the card, the following part of the dialog appeared in my
recording:

...
This key (or subkey) is not protected with a passphrase.  Please enter a new 
passphrase to export it.
Passphrase: 
Repeat:
gpg: Note: backup of card key saved to 
'/home/guru/.gnupg/sk_61F1ECB625C9A6C3.gpg'
gpg: /home/guru/.gnupg/trustdb.gpg: trustdb created
gpg: key 47CCF7E476FE9D11 marked as ultimately trusted
gpg: directory '/home/guru/.gnupg/openpgp-revocs.d' created
gpg: revocation certificate stored as 
'/home/guru/.gnupg/openpgp-revocs.d/5E69FBAC1618562CB3CBFBC147CCF7E476FE9D11.rev'
public and secret key created and signed.
...

My question remains: How can I change (or verify) the above Passphrase I
have used?

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: changing the passphrase of the secret key stored in the GnuPG card

2017-06-11 Thread Matthias Apitz
El día domingo, junio 11, 2017 a las 10:00:00p. m. +0200, Peter Lebbing 
escribió:

> On 11/06/17 21:48, Matthias Apitz wrote:
> > My question remains: How can I change (or verify) the above Passphrase I
> > have used?
> 
> Ah! That's the encryption of the backup key, not of the secret key
> stored in the smart card. Well, it's ultimately the same key, but it's
> not the copy of it stored in the smart card but rather the copy stored
> in the backup file.
> 
> That's actually a difficult question, since AFAIK, the backups are not
> complete OpenPGP messages but just the relevant parts of an OpenPGP
> secret key message. I actually can't think of the answer to your
> question. I'd know how to use packet surgery to reconstruct a normal
> on-disk secret key from that partial message, and subsequently change
> the passphrase on that key. I could also subsequently extract the
> fragment again. But this is all not normal use of GnuPG, it's "Look, I
> can make it do this as well!". Hopefully somebody else can answer if it
> is possible, and how.

Now we are on track with my question. The background is/was: what
exactly I have todo with this backup key, for example in case the GnuPG
card gets lost or stolen? How can I simulate this and check if the
passphrase works correctly.

Thx

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: setting GnuPG card to 'not forces' does not let sign

2017-06-12 Thread Matthias Apitz
El día domingo, junio 11, 2017 a las 08:59:37p. m. +0200, Werner Koch escribió:

> On Fri,  9 Jun 2017 08:39, g...@unixarea.de said:
> 
> > I know, this is not a GnuPG issue, but I wanted to mention it here to
> > ask if others has similar experiences, even on Linux or other OS, or if
> > it worth to get a new OMNIKEY device or even another device.
> 
> You better avoid everything with an Omnikey chip in it.  I had only
> trouble with it and they never responded to questions.  Well, it works
> on Windows because they fix their hardware with their Windows driver.

Do you know of any other CCID reader for ID-000 size cards?

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: changing the passphrase of the secret key stored in the GnuPG card

2017-06-12 Thread Matthias Apitz
El día lunes, junio 12, 2017 a las 01:28:28p. m. +0200, Damien Goutte-Gattat 
escribió:

> On 06/12/2017 07:31 AM, Matthias Apitz wrote:
> > Now we are on track with my question. The background is/was: what
> > exactly I have todo with this backup key, for example in case the GnuPG
> > card gets lost or stolen?
> 
> You would have to import your backup key into your private keyring using 
> gpg's --import command.
> 
> First, remove the private key stubs:
> 
>$ rm ~/.gnupg/private-keys-v1.d/*.key
> 
> Then, import your backup:
> 
>$ gpg2 --import backup.gpg
> 
> You will then be prompted for the passphrase you choose when the backup 
> was created.

I did what you suggested, but:

$ pwd
/home/guru/.gnupg-test
$ rm -f private-keys-v1.d/*.key
$ GNUPGHOME=/home/guru/.gnupg-test export GNUPGHOME
gpg2 --import sk_61F1ECB625C9A6C3.gpg
gpg: key 61F1ECB625C9A6C3: no user ID
gpg: Total number processed: 1
gpg:   secret keys read: 1
$ ls -l sk_61F1ECB625C9A6C3.gpg
-r  1 guru  wheel  1865 May 14 20:29 sk_61F1ECB625C9A6C3.gpg

the file is what was swritte as backup on May 14.

Any idea what I do wrong?

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG card && using the backup secret key

2017-06-12 Thread Matthias Apitz

Please note: I have changed the Subject: of the thread to match better
the real problem. 

During generating the keys on the GnuPG card, one can (and should)
create some backup of the secret key into a file. It is totally unclear
to me how to make something usefull out of this file, for example import
it into a "normal" secret keyring to use it in case of the GnuPG acrd
gots lost.

I followed some hints of  Damien Goutte-Gattat (thanks) and did:

> > First, remove the private key stubs:
> > 
> >$ rm ~/.gnupg/private-keys-v1.d/*.key
> > 
> > Then, import your backup:
> > 
> >$ gpg2 --import backup.gpg
> > 
> > You will then be prompted for the passphrase you choose when the backup 
> > was created.
> 
> I did what you suggested, but:
> 
> $ pwd
> /home/guru/.gnupg-test
> $ rm -f private-keys-v1.d/*.key
> $ GNUPGHOME=/home/guru/.gnupg-test export GNUPGHOME
> $ gpg2 --import sk_61F1ECB625C9A6C3.gpg
> gpg: key 61F1ECB625C9A6C3: no user ID
> gpg: Total number processed: 1
> gpg:   secret keys read: 1
> $ ls -l sk_61F1ECB625C9A6C3.gpg
> -r  1 guru  wheel  1865 May 14 20:29 sk_61F1ECB625C9A6C3.gpg
> 
> the file is what was swritte as backup on May 14.
> 

With Don Google I found this older thread in this mailing list here:

https://lists.gt.net/gnupg/users/40851

where Werner said after some (today outdated) hints:

«... 
Put a "disable-scdaemon" into gpg-agent.conf, give gpg-agent a HUP and
check that no scdaemon is running anymore (you may just kill it). Then
use "gpg --no-use-agent --edit-key". The command "bkuptocard" may then
be used to store a backup key on a card.

Yes, we really need a howto on recovering smartcard keys. ...»

Was such a howto ever written?

Thanks

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG card && using the backup secret key

2017-06-13 Thread Matthias Apitz
El día martes, junio 13, 2017 a las 11:52:46a. m. +0200, Thomas Jarosch 
escribió:

> > Please note: I have changed the Subject: of the thread to match better
> > the real problem. 
> > 
> > During generating the keys on the GnuPG card, one can (and should)
> > create some backup of the secret key into a file. It is totally unclear
> > to me how to make something usefull out of this file, for example import
> > it into a "normal" secret keyring to use it in case of the GnuPG acrd
> > gots lost.
> 
> AFAIK the "backup process" during key creation for the OpenPGP smartcard
> is a bit different: There is no interface / function on the card to
> export a key. Therefore, if you decide to create a backup, a key is
> first created on the host and *then* transferred onto the card.
> At least that's my understanding of it.

Hi Thomas,

Thanks for your posting, but now I'm really confused. The howto about
the card in https://gnupg.org/howtos/card-howto/en/smartcard-howto-single.html
says:

...
3.3.2. Generating keys

To generate a key on the card enter generate. You will be asked if you would 
like to make an off-card copy of the encryption key. It is useful to say yes 
here.
Note

Without a backup you will not be able to access any data you encrypted
with the card if it gets lost or damaged.
...


and as well in the dialog of the key creation on the card it said:

...
Please enter a new passphrase to export it.
Frase contraseña: 
Repeat:
gpg: Note: backup of card key saved to 
'/home/guru/.gnupg/sk_61F1ECB625C9A6C3.gpg'
gpg: /home/guru/.gnupg/trustdb.gpg: trustdb created
gpg: key 47CCF7E476FE9D11 marked as ultimately trusted
gpg: directory '/home/guru/.gnupg/openpgp-revocs.d' created
gnupg-card.txtgpg: revocation certificate stored as 
'/home/guru/.gnupg/openpgp-revocs.d/5E69FBAC1618562CB3CBFBC147CCF7E476FE9D11.rev'
public and secret key created and signed.

gpg/card> quit
...



> 
> When we developed the paper backup tool
> (https://github.com/intra2net/paperbackup/blob/master/README.md)
> we created several keys on the host machine, transferred the key
> to the card and created a backup on paper.
> 

I will have a look into the paper backup tool; sounds handy.

Thx

matthias



-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG card && using the backup secret key

2017-06-13 Thread Matthias Apitz
El día martes, junio 13, 2017 a las 11:58:51a. m. +0200, Werner Koch escribió:

> On Mon, 12 Jun 2017 20:12, g...@unixarea.de said:
> 
> > create some backup of the secret key into a file. It is totally unclear
> > to me how to make something usefull out of this file, for example import
> > it into a "normal" secret keyring to use it in case of the GnuPG acrd
> 
> To try it you best insert a new or scratch card.  Make sure your
> _public key_ exists.  Then run
> 
>   gpg --edit-key YOURKEY
> 
> and at the prompt enter
> 
>   bkuptocard FILENAME
> 
> the FILENAME is the sk_foo file.  You will then be asked where to store
> the key on the card (Signing, encryption, or authentication key).
> 

I tried (~/.gnupg-test is a copy of my normal GNUPGHOME):

$ cd .gnupg-test/
$ GNUPGHOME=`pwd`
$ env | grep GNU
GNUPGHOME=/home/guru/.gnupg-test

$ ls -l sk_61F1ECB625C9A6C3.gpg
-r  1 guru  wheel  1865 May 14 20:29 sk_61F1ECB625C9A6C3.gpg

$ gpg2 --edit-key sk_61F1ECB625C9A6C3.gpg
gpg (GnuPG) 2.1.19; Copyright (C) 2017 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpg: key "sk_61F1ECB625C9A6C3.gpg" not found: No public key

$ gpg2 --import ../GnuPG/ccid--export-key-guru.pub
gpg: key 47CCF7E476FE9D11: "Matthias Apitz (GnuPG CCID) " not 
changed
gpg: Total number processed: 1
gpg:  unchanged: 1

The file "ccid--export-key-guru.pub" was created from the card with:

$ gpg2 --export --armor > ccid--export-key-guru.pub

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG card && using the backup secret key

2017-06-13 Thread Matthias Apitz
El día martes, junio 13, 2017 a las 02:30:05p. m. +0300, Teemu Likonen escribió:

> Matthias Apitz [2017-06-13 12:51:01+02] wrote:
> 
> > $ gpg2 --edit-key sk_61F1ECB625C9A6C3.gpg
> 
> Command --edit-key edits a key in your keyring. I'd guess that you want

I did 1:1 what Werner suggested;

> to import keys:
> 
> gpg2 --import sk_61F1ECB625C9A6C3.gpg

This is not working as I said yesterday:

$ gpg2 --import sk_61F1ECB625C9A6C3.gpg
gpg: key 61F1ECB625C9A6C3: no user ID
gpg: Total number processed: 1
gpg:   secret keys read: 1

Btw: the publickey is there:

gpg2 --list-keys
/home/guru/.gnupg-test/pubring.kbx
--
pub   rsa4096 2017-05-14 [SC]
  5E69FBAC1618562CB3CBFBC147CCF7E476FE9D11
uid   [ultimate] Matthias Apitz (GnuPG CCID) 
sub   rsa4096 2017-05-14 [A]
sub   rsa4096 2017-05-14 [E]
...

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: setting GnuPG card to 'not forces' does not let sign

2017-06-16 Thread Matthias Apitz
El día lunes, junio 12, 2017 a las 12:58:23p. m. +0200, Werner Koch escribió:

> On Mon, 12 Jun 2017 12:38, g...@unixarea.de said:
> 
> > Do you know of any other CCID reader for ID-000 size cards?
> 
> I have a sample of the Gemalto Shell Token here.  It has been around for
> quite some time and the kernelconcept folks that it works nicely.  See
> 
>   https://www.floss-shop.de/en/security-privacy/
> 
> On that page you also find the a bit more expensive uTrust token which
> would be my preferred choice. I used it for many years until it broke due
> to my fault.  In fact I recycled the case for my gnuk token.

I bought the uTrust token in the above mentioned FLOSS-shop and it arrived 
today.
It shows in my netbook the same problem as the other one from Omnikey:
it is not always detected at power-on boot:

In the boot at 14:17:02 it is seen, while later it takes three boot to be
seen by the kernel:

Jun 16 14:17:02 c720-r314251 syslogd: kernel boot file is /boot/kernel/kernel
Jun 16 14:17:02 c720-r314251 kernel: ugen0.2:  at usbus0

Jun 16 20:20:48 c720-r314251 syslogd: kernel boot file is /boot/kernel/kernel

Jun 16 20:23:28 c720-r314251 syslogd: kernel boot file is /boot/kernel/kernel

Jun 16 20:25:49 c720-r314251 syslogd: kernel boot file is /boot/kernel/kernel
Jun 16 20:25:49 c720-r314251 kernel: ugen0.4:  at usbus0

Perhaps, it is more a netbook's (Acer C720) or FreeBSD issue.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


about CCID USB readers (Re: setting GnuPG card to 'not forces' does not let sign)

2017-06-21 Thread Matthias Apitz
El día lunes, junio 12, 2017 a las 12:58:23p. m. +0200, Werner Koch escribió:

> On Mon, 12 Jun 2017 12:38, g...@unixarea.de said:
> 
> > Do you know of any other CCID reader for ID-000 size cards?
> 
> I have a sample of the Gemalto Shell Token here.  It has been around for
> quite some time and the kernelconcept folks that it works nicely.  See
> 
>   https://www.floss-shop.de/en/security-privacy/
> 
> On that page you also find the a bit more expensive uTrust token which
> would be my preferred choice. I used it for many years until it broke due
> to my fault.  In fact I recycled the case for my gnuk token.

Some days ago I acquired this uTrust token. And surprise, surprise, it
showed the same symptoms as the other one, the HID Global OMNIKEY 6121
Smart Card Reader: My operating system does not always recognises the
USB device, not even when plug'ed in before power-on. This smells
somehow as a hardware issue in the Acer C720 or in the kernel of the
FreeBSD (and I do run CURRENT on it, i.e. compiled directly from SVN).
Here is the bug issue I filed against our beloved FreeBSD:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220127
Only if someone has similar experiences.

I tested a lot with this issue and now have some trick which seems to
make it at least less often fail: I insert the uTrust token before
power-on, start the laptop but hold the boot in the moment when you can
modify certain boot options, i.e. the device is powered on but awaiting
a keyboard input to continue loading the kernel. Only a few seconds.
Then the booting kernel sees the device as:

ugen0.2:  at usbus0

Is there something in the cards firmware which needs some time to come
up?

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: about CCID USB readers (Re: setting GnuPG card to 'not forces' does not let sign)

2017-07-02 Thread Matthias Apitz
El día jueves, junio 22, 2017 a las 08:28:57a. m. +0200, Matthias Apitz 
escribió:

> Some days ago I acquired this uTrust token. And surprise, surprise, it
> showed the same symptoms as the other one, the HID Global OMNIKEY 6121
> Smart Card Reader: My operating system does not always recognises the
> USB device, not even when plug'ed in before power-on. This smells
> somehow as a hardware issue in the Acer C720 or in the kernel of the
> FreeBSD (and I do run CURRENT on it, i.e. compiled directly from SVN).
> Here is the bug issue I filed against our beloved FreeBSD:
> https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220127
> Only if someone has similar experiences.
> 
> ...

At the end of the day it turned out that this was an issue in the
FreeBSD' drivers and/or some raise conditions or electrical problem. I
removed some of the drivers which were searching the USB bus for devices
and now have only the XHCI driver in the kernel (disabled UHCI, OHCI and EHCI)
and with this, the detection of both cards (uTrust and Omnikey) is fine.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


using GnuPG card for Firefox master password

2017-07-02 Thread Matthias Apitz

Hi,

I have a bunch of saved logins in Firefox, protected by some so called
master password. Is there a way for using the GnuPG card as the master
password, maybe some plug-in for FF?

Thanks

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


scdaemon does not "see" card insertion

2017-07-04 Thread Matthias Apitz

Hello,

I have now the GnuPG card working fine for signing mails, SSH access and
even for using GnuPG crypted credentials in Firefox. The last issue I'm
struggling with is the use of card removal and card insert via the
'scd-event' to lock and unlock the KDE desktop.

The script 'scd-event' is only invoked on card removal (I do just en
echo of the args):

scd-event --reader-port 0 --old-code 0x0007 --new-code 0x --status NOCARD

A card insert is only seen *after* some agent requires something, for
example the SSH client needs access to the secret key on the card; than
it says:

scd-event --reader-port 0 --old-code 0x --new-code 0x0007 --status 
USABLE

On the UNIX system level the card insert triggers via devd(8) the start
of /usr/local/sbin/pcscd and the card removal triggers a 'killall pcscd'.
This is working fine, i.e. an inserted card is useable immediately, requesting 
the PIN entry.

I created a file scdaemon.conf to get debug information, here is the
resulting log:

...
2017-07-04 11:33:51 scdaemon[4945.802016000] DBG: enter: apdu_get_status: 
slot=0 hang=0
2017-07-04 11:33:51 scdaemon[4945.802016000] DBG: leave: apdu_get_status => 
sw=0x0 status=7
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: enter: apdu_get_status: 
slot=0 hang=0

now the card is removed and /usr/local/sbin/pcscd is killed

2017-07-04 11:33:52 scdaemon[4945.802016000] pcsc_get_status_change failed: no 
service (0x8010001d)
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: leave: apdu_get_status => 
sw=0x1000c status=0
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: Removal of a card: 0
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: enter: apdu_close_reader: 
slot=0
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: enter: apdu_disconnect: slot=0
2017-07-04 11:33:52 scdaemon[4945.802016000] pcsc_disconnect failed: no service 
(0x8010001d)
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: leave: apdu_disconnect => 
sw=0x1000a
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: apdu_close_reader => 0x1000a 
(apdu_disconnect)
2017-07-04 11:33:52 scdaemon[4945.802016000] DBG: leave: apdu_close_reader => 
0x0 (close_reader)

now scdaemon sits there, the card was already inserted again, nothing
happens

now SSH needs the key, this awakes scdaemon again and it sees the card:

2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: chan_7 <- SERIALNO
2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: enter: apdu_open_reader: 
portstr=(null)
2017-07-04 11:34:28 scdaemon[4945.802017900] detected reader 'Identiv uTrust 
3512 SAM slot Token (55511514602745) 00 00'
2017-07-04 11:34:28 scdaemon[4945.802017900] detected reader ''
2017-07-04 11:34:28 scdaemon[4945.802017900] reader slot 0: not connected
2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: leave: apdu_open_reader => 
slot=0 [pc/sc]
2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: enter: apdu_connect: slot=0
2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: feature: code=12, len=4, 
v=42330012
2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: TLV properties: tag=01, 
len=2, v=
2017-07-04 11:34:28 scdaemon[4945.802017900] DBG: TLV properties: tag=03, 
len=1, v=

What should be changed too let scdaemon see the card insertion?

Thanks

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: scdaemon does not "see" card insertion

2017-07-04 Thread Matthias Apitz
El día miércoles, julio 05, 2017 a las 09:23:06a. m. +0900, NIIBE Yutaka 
escribió:

> Hello,
> 
> Matthias Apitz  wrote:
> > The script 'scd-event' is only invoked on card removal (I do just en
> > echo of the args):
> [...]
> > A card insert is only seen *after* some agent requires something, for
> > example the SSH client needs access to the secret key on the card;
> 
> Right.  Scdaemon only watches the event of card removal and card reader
> removal.
> 
> ...

Hello,

Thanks for all explanations. For now I implemented the scd-event script
as:

...

DISPLAY=:0 export DISPLAY
if [ x$status = xNOCARD ]; then
nohup /usr/local/lib/kde4/libexec/kscreenlocker_greet --immediateLock &
while true; do
  # Signature key : 5E69 FBAC ...
  gpg2 --card-status | grep '5E69 FBAC' >> /tmp/scd-event.log  && {
  killall kscreenlocker_greet
  break
  }
  sleep 1  
done
fi

which works nice: on card removal it locks the screen and on card insert
it unlocks it fine.

> > On the UNIX system level the card insert triggers via devd(8) the start
> > of /usr/local/sbin/pcscd and the card removal triggers a 'killall pcscd'.
> > This is working fine, i.e. an inserted card is useable immediately, 
> > requesting 
> > the PIN entry.
> 
> IIUC, system level service like devd can only handle the event of card
> reader insertion, not card insertion.  I may be wrong here.

No, you are correct, I was inprecise.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


storing PINs of credit / EC cards with GnuPG

2017-07-10 Thread Matthias Apitz

Hello,

This question is perhaps only for German users of GnuPG. In the past
German banks and credit institutes prohibited the storing of PIN numbers
etc. on personal computer systems, even claiming that in the case of storing
they would not have been responsible anymore for the abuse of stolen
credit cards.

What is the current situation about this issue in the German law if such
PIN numbers are stored ciphered with GnuPG?

Thanks

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing PINs of German bank card

2017-07-10 Thread Matthias Apitz
El día lunes, julio 10, 2017 a las 11:42:12p. m. +0800, Guan Xin escribió:

> This is probably a general question --
> 
> I have never seen a German bank that allows changing the PIN of a card.
> So I wonder if it is because using a fixed (non-changeable) 4-digit PIN
> mailed in clear text really safer than using a 4 to 6 digit variable length
> PIN that never explicitly appears anywhere.

Nowadays some German banks allow changing the PIN in the Teller
Machines. I saw it today in an ATM of the Sparkasse. Amex allows (or 
allowed) requesting a new personal PIN by fax.

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing PINs of German bank card

2017-07-11 Thread Matthias Apitz
El día martes, julio 11, 2017 a las 07:38:08p. m. +0100, MFPA escribió:

> On Tuesday 11 July 2017 at 8:44:48 AM, in
> , Binarus wrote:-
> 
> 
> > I am not sure if this is an intentional limitation of
> > the cards (to
> > prevent users from choosing idiotic pins like 1234 or
> > their birthday).
> 
> 
> Surely things like 1234 can be prevented by software.

Why 1234 is an idiotic PIN? What are idiotic PINs? Of course, idiotic is
any PIN which has in your pocket hints about this (like a sticker attached
or your birthday). But remember, you normally have 3 tries only to test
all "idiotic" PINs. 1234 is same idiotic as 2345 or as 3456 or .... or as
, or , or ...

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


use policy of the GnuPG-card

2017-07-13 Thread Matthias Apitz

Hello,

I'm using the GnuPG card for signing, SSH, password-store (Firefox web 
passwords)
and locking un-locking the KDE desktop on card-insert or withdraw.
After resolving some technical (FreeBSD) issues, I now have it on daily
usage on my netbook and my workstation in the office.

One problem comes obviously in mind: Someone with priv access to your 
workstation,
for example IT personal, could relatively easy steal your passwords, just 
setting your
environment and waiting for the moment that you have unlocked the card with the 
PIN;
than he/she could run as root:

# GNUPGHOME=/home/guru/.gnupg-ccid export GNUPGHOME
# PASSWORD_STORE_DIR=/home/guru/.password-store export PASSWORD_STORE_DIR
# pass Business/cheese-whiz-factory
gpg: WARNING: unsafe ownership on homedir '/home/guru/.gnupg-ccid'
cheese

It would also not help to just withdraw the card after any short usage, for 
example to
fire up a SSH session. The attacker could just sit in background waiting for 
this short moment,
which is long enough to copy all your passwords in to clear mode and send them 
away.

How is this supposed to be managed?


 matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Changing PINs of German bank card

2017-07-15 Thread Matthias Apitz
On Saturday, 15 July 2017 11:17:18 CEST, Andy Ruddock 
 wrote:

Just as a point of interest


I am not sure if this is an intentional limitation of the cards (to
prevent users from choosing idiotic pins like 1234 or their birthday).


I know of somebody who had 1234 issued as their PIN for a UK bank
account (it IS as random a selection as any other 4-digit number).



One of every 10.000 will get this number, you need only luck to get ro know 
someone, as you had.


matthias



--
Sent from my Ubuntu phone
http://www.unixarea.de/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: use policy of the GnuPG-card

2017-07-16 Thread Matthias Apitz
El día jueves, julio 13, 2017 a las 03:57:47p. m. +0200, Werner Koch escribió:

> ...
> 
> For the signing key we have a signature counter and if you can memorize
> the count and the number of signatures you did, you have a way to detect
> malicious use of that key.  Better malware could of course also present
> you a different count - checking on a clean machine would detect that,
> though.

Why we only have a counter for the signing key?

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Extraction of decryption session key without copying complete encrypted file

2017-08-04 Thread Matthias Apitz
El día viernes, agosto 04, 2017 a las 01:59:57p. m. +0200, Werner Koch escribió:

> On Wed,  2 Aug 2017 15:52, roman.fied...@ait.ac.at said:
> 
> > How to decrypt large files, e.g. gpg-encrypted backups, without copying 
> > them to the machine with the GPG private key?
> 
> With GnuPG 2.1 this is easy:  You use ssh's socket forwarding feature to
> forward gpg-agent's restricted remote socket, for example
> 
>   /run/user/1000/gnupg/S.gpg-agent.extra
> 
> to the host and there you run gpg which will then connect back to the
> agent on your desktop.  For details see
> 
> https://wiki.gnupg.org/AgentForwarding

But this implies that everyone with priv access on the remote host could
abuse your secret key on your localhost, especially when a GnuPG-card is
used and you entered the PIN to unlock the secret key. I'm wrong?

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: Which smartphone would you use

2017-09-18 Thread Matthias Apitz
On Monday, 18 September 2017 17:32:51 CEST, Thomas Hejze  
wrote:

Hello everyone,
I know this is off-topic, but since it is related to IT 
security and therefore 
more or less to GNUPG, I hope that I get some helping answers, though.


Having been objecting to smartphones for a long time I fear 
that the time has 
come that I get one for myself. The question is which one.


IPhone is not an option, Android probably not, due to security 
considerations.

...


I'm using for more than two years an Ubuntu phone BQ E4.5. The project was 
driven by Canonical and BQ as the hardware OEM. The project died in March 
of this year, but is now moved to a community of OpenSource entusiast. The 
software novadays is mostly Ubuntu 15.04, with some Android blobs in the 
kernel for the hardware access.


Check https://forums.ubports.com/

matthias



--
Sent from my Ubuntu phone
http://www.unixarea.de/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: Which smartphone would you use

2017-09-18 Thread Matthias Apitz
On Monday, 18 September 2017 20:07:38 CEST, Mauricio Tavares 
 wrote:




I'm using for more than two years an Ubuntu phone BQ E4.5. The 
project was
driven by Canonical and BQ as the hardware OEM. The project 
died in March of

this year, but is now moved to a community of OpenSource entusiast. The
software novadays is mostly Ubuntu 15.04, with some Android blobs in the
kernel for the hardware access.


  Wasn't there also at least one company in Europe selling the
Ubuntu phones?


Yes, as I said BQ.com




--
Sent from my Ubuntu phone
http://www.unixarea.de/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: Which smartphone would you use

2017-09-21 Thread Matthias Apitz
El día jueves, septiembre 21, 2017 a las 07:09:01p. m. +0200, Thomas Hejze 
escribió:

> Am Montag, 18. September 2017, 20:13:14 CEST schrieb Matthias Apitz:
> > >> I'm using for more than two years an Ubuntu phone BQ E4.5. The
> > >> project was
> > >> driven by Canonical and BQ as the hardware OEM. The project
> > >> died in March of
> > >> this year, but is now moved to a community of OpenSource entusiast. 
> 
> > >   Wasn't there also at least one company in Europe selling the
> > > 
> > > Ubuntu phones?
> > 
> > Yes, as I said BQ.com
> 
> Unfortunately their hardware dos not seem to support Ubuntu any more. I found 
> the "Ubuntu Edition" under "obsolete models", even a cyanogen edition, but 
> all 
> their current models run on Android. The rest of their homepage is all 
> marketing gibberish as it is the use, nowadays.

Look for second hand devices of the BQ "Ubuntu Edition" (BQ does not
produce nor sell them anymore). Such devices you could reflash to the
software available at ubports.com

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: Which smartphone would you use

2017-09-21 Thread Matthias Apitz
El día jueves, septiembre 21, 2017 a las 06:54:43p. m. +0200, Thomas Hejze 
escribió:

> Hi Dotan,
> 
> 
> Am Montag, 18. September 2017, 19:55:49 CEST schrieb Dotan Cohen:
> > The answer pretty much depends on what smartphone features you are
> > looking for. Do you need to run a web browser? Email integration?
> 
> 
> well first of all I would like to make phone calls.
> 
> I use kdepim for contacts, calendar and email, so kdepim should run on it or 
> at least be syncable.
> 
> And gnupg should run on it. And yes, a secure browser, too.

I have ported gpg2 and the password storage manger 'pass' to my Ubuntu
phone BQ E4.5. I'm still working on the pcscd daemon to get the
GnuPG-card working in the phone. The tricky part is that you normally can
not install or compile additional software in the root file system of
the device (because it's mounted for good reasons read-only). You must
setup an additional complete system and chroot to it. If you later want
to run such compiled/installed software from outside the chroot, you
must set LD_IBRARY_PATH (...) so the software can find its stuff, for
example in a small shell wrapper script:

cat gpg2.sh
#!/bin/sh

LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/home/phablet/myRoot/usr/lib/arm-linux-gnueabihf
export LD_LIBRARY_PATH
/home/phablet/myRoot/usr/bin/gpg-agent --homedir /home/phablet/.gnupg \
   --use-standard-socket --daemon \
   --pinentry-program /home/phablet/myRoot/usr/bin/pinentry-curses
/home/phablet/myRoot/usr/bin/gpg-connect-agent /bye
PATH=$PATH:myRoot/usr/bin export PATH
/home/phablet/myRoot/usr/bin/gpg2 $*

This way I have gpg2 and pass working. I can SSH into the phone (or do
the same on the terminal-app) and run: 

$ ssh phablet@ubphone
Welcome to Ubuntu 15.04 (GNU/Linux 3.4.67 armv7l)

phablet@ubuntu-phablet-bq:~$

phablet@ubuntu-phablet-bq:~$ ls -l .password-store/web/bla.gpg
-rw--- 1 phablet phablet 356 Sep 20 12:58 .password-store/web/bla.gpg
phablet@ubuntu-phablet-bq:~$

phablet@ubuntu-phablet-bq:~$ ./pass.sh web/bla

   
┌┐
   │ Please enter the passphrase to unlock the secret key for the OpenPGP 
certificate:  │
   │ "Matthias Apitz "
│
   │ 2048-bit RSA key, ID 76254069, 
│
   │ created 2017-09-20 (main key ID CBE83911). 
│
   │
│
   │
│
   │ Passphrase 
___ │
   │
│
   │  
  │
   
└────┘

abc123
Username: g...@unixarea.de


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


gpg 2.1.19 fails to generate key pair

2017-09-22 Thread Matthias Apitz
= 
:+c5f805b24c36a4b1d0c65d73c3b156dac637c5d7e97b65a623e25d81d46418b8 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
3f10dff24eee59bea7e73f176de3a189912935edde7b37abd44bdfa4a1e91444 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
91a79cc263b02aa2e602e1a41db4709d7226b9bece6cb6e70429b1a151de371b \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
b27ed9eb762cb88890a9bf29bc3b75a3168f84b38b29c918c25bd12a269a9d56 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
05156f32358c1bd9196e5df4c73c05e7fea0e57275f716873b04198770db812e \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
f23e8089e24ed64a959c5fe2db5be0f04ea17804c6bd4a74c7a8a650c647 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
c0a62c4431df2a5fc4044512f04e74cf69ce1ae8cf551258b29565c6ed729d0a \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
621b074013e8fad687028343147d8deae1de815b1c767a1646c7a649601c0441
2017-09-22 16:51:21 gpg-agent[15166] DBG:   e= :+010001
2017-09-22 16:51:21 gpg-agent[15166] DBG:   d= 
:+266b12bdee74e742972cad5437c1069911bbac2b9e871ead220cdd391ca3 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
fad72d42a2873662ddc62e73ff471ed4e9d707c874f5d010b8470e2c6ea06326 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
c86670f13773db5e5809449d3b078698436c18fd5aa575dc40ae4fb2b906c906 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
86bdffcfe653d8eee5b60f6b4bc47538945aff3b719d0711d73c06cc29883552 \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
815cce3d275f8b678f08fe1bfcc96eab0179a85ab01f67cf7a95ad4d8cbe9b8a \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
e07df9687bfb16e786bc7825cb55d304eb17db4c5058851dbd2753c8ddd7fa4d \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
37348da093cc894fe52c368cc9d9b1d5b15f280dd59a50bb5dae12d9da0e0bad \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
d9e45924bebff8ff007f0fefc43916d87b587beca31fb7807a659a337f57d2ed
2017-09-22 16:51:21 gpg-agent[15166] DBG:   u= 
:+0338a9db6d7bd87e4293cec0b4c2e73b842a6df53d8279417fc97036f8bd7e4d \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
a3b68dd0daa2bac2ee1a656dc1a2c528e2bdb9cefc43b181495e302c3cf6c2df \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
73afc1853abcc24d21db6335b636cc973a9da8face1780ff2bb55abc8e2deb8e \
2017-09-22 16:51:21 gpg-agent[15166] DBG:
b4004a3d7ee48aab59b5a22f15702fed255b4c8bb97ff22c95a9ac2c1b6c4b4c
2017-09-22 16:51:22 gpg-agent[15166] DBG: storing private key
2017-09-22 16:51:25 gpg-agent[15166] S2K calibration: 2466816 -> 100ms
2017-09-22 16:51:25 gpg-agent[15166] DBG: agent_put_cache 
'72C072DF8E8A7E956E83631D' (mode 5) requested ttl=900
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> S CACHE_NONCE 
72C072DF8E8A7E956E83631D
2017-09-22 16:51:25 gpg-agent[15166] DBG: returning public key
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> [ 44 20 28 31 30 3a 70 75 
62 6c 69 63 2d 6b 65 79 ...(286 byte(s) skipped) ]
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> OK
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 <- RESET
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> OK
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 <- SIGKEY 
7A4385DA9EB9353BB10B23B473A005546A5DAE36
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> OK
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 <- SETKEYDESC 
Please+enter+the+passphrase+to+unlock+the+OpenPGP+secret+key:%0A%22[User+ID+not+found]%22%0A2048-bit+RSA+key,+ID+E63AE41B03128A87,%0Acreated+2017-09-22.%0A
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> OK
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 <- SETHASH 8 
C32083165BB1A88A814A1BB2F62984D2B521AEAB1210B9B32648E0FAEC28F206
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 -> OK
2017-09-22 16:51:25 gpg-agent[15166] DBG: chan_9 <- PKSIGN -- 
72C072DF8E8A7E956E83631D
2017-09-22 16:51:25 gpg-agent[15166] DBG: agent_get_cache 
'72C072DF8E8A7E956E83631D' (mode 5) ...
2017-09-22 16:51:25 gpg-agent[15166] DBG: ... hit




-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg 2.1.19 fails to generate key pair

2017-09-22 Thread Matthias Apitz
El día viernes, septiembre 22, 2017 a las 08:19:14p. m. +0200, Werner Koch 
escribió:

> On Fri, 22 Sep 2017 17:24, g...@unixarea.de said:
> 
> > I instructed via gpg-agent.conf the gpg-agent to do a debug log which
> > follows. The proc gpg-agent crashes with SIG_BUS.
> 
> That is why you see and EOF error from gpg.
> 

I can imagine. That's why I attached the log of the gpg-agent.

> We did a few more release after 2.1.19, which was released on March 1.
> Not all fixed bugs are noted in the NEWS and it is also possible that
> the SIGBUS comes from Libgcrypt.  (run gpg-agent --version to see the
> version of Libgcrypt).
> 
> Please first try to build with a recent version (2.2.1 is current but
> 2.1.23 should be okay) and the latest version of the respective
> Libgcrypt branch.  That would be easier for us than to try to figure out
> a bug we might have already fixed.

Ok. I will update to the most recent version. Btw: libcrypt is 1.7.0.

> What OS and which platform are you using?  I assume it is a BSD (or
> Plan-9 ;-).

No, wrong guess in this case. It is:

phablet@ubuntu-phablet-bq:~$ uname -a
Linux ubuntu-phablet 3.4.67 #1 SMP PREEMPT Mon Jun 6 12:04:40 UTC 2016 b75400e 
armv7l armv7l armv7l GNU/Linux

an Ubuntu based smartphone.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: gpg 2.1.19 fails to generate key pair

2017-09-22 Thread Matthias Apitz

it works with:

phablet@ubuntu-phablet-bq:~$ ./gpg2.sh --version
gpg-agent[28499]: enabled debug flags: mpi crypto memory cache memstat hashing 
ipc
gpg-agent: a gpg-agent is already running - not starting a new one
gpg-agent: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0
  outmix=0 getlvl1=0/0 getlvl2=0/0
gpg-agent: secmem usage: 0/32768 bytes in 0 blocks
gpg (GnuPG) 2.2.1
libgcrypt 1.8.1
...


phablet@ubuntu-phablet-bq:~$ ~/gpg2.sh --full-generate-key
...
  ┌──┐
  │ Please re-enter this passphrase  │
  │  │
  │ Passphrase: ***_ │
  │  │
  │  │
  └──┘











We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: /home/phablet/.gnupg/trustdb.gpg: trustdb created
gpg: key 3FECB79DDDA409E4 marked as ultimately trusted
gpg: directory '/home/phablet/.gnupg/openpgp-revocs.d' created
gpg: revocation certificate stored as 
'/home/phablet/.gnupg/openpgp-revocs.d/41E0B3688FDD76C9337ECD873FECB79DDDA409E4.rev'
public and secret key created and signed.

pub   rsa2048 2017-09-22 [SC]
  41E0B3688FDD76C9337ECD873FECB79DDDA409E4
uid      Matthias Apitz (test) 
sub   rsa2048 2017-09-22 [E]

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG-card works in the Ubuntu smartphone

2017-09-23 Thread Matthias Apitz

I have the GnuPG-card working in the Ubuntu smartphone BQ E4.5, details
here: https://forums.ubports.com/topic/554/support-for-gnupg-smartcard/3

I could post a small how-to to some place because due to the nature of
the phone (read-only mounted root file system) the installation needs
some tricks.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: GnuPG-card works in the Ubuntu smartphone

2017-09-24 Thread Matthias Apitz
El día domingo, septiembre 24, 2017 a las 08:56:56a. m. +0200, Werner Koch 
escribió:

> On Sat, 23 Sep 2017 10:47, g...@unixarea.de said:
> > I have the GnuPG-card working in the Ubuntu smartphone BQ E4.5, details
> > here: https://forums.ubports.com/topic/554/support-for-gnupg-smartcard/3
> 
> Cool.
> 
> > I could post a small how-to to some place because due to the nature of
> 
> Would you like to write a blog entry for gnupg.org?  Needs to be done in
> org-mode formaty but I can offer to copyedit it for you.  One or two
> picture would also be nice.

I would be happy to write something in this blog, but I never wrote
something in 'org-mode' format, any pointer to some guide? I'm attaching
below a text version of the write-up. A photo is here:
http://www.unixarea.de/UbuntuPhone-GnuPG-card.jpg
If it should be og better quality, I have to look for some equipment.
For the connection between the USB token and the phone, I used some OTG
(USB On-The-Go) cable. I own as well a small connector receiving on one
end the token and to be plugged in into the phones port, but this
connection is very unstable, with the cable it's fine.

matthias


Using GnuPG-card in the UbuntuPhone BQ E4.5:

phablet@ubuntu-phablet-bq:~$ 
phablet@ubuntu-phablet-bq:~$ sudo chroot myRoot/
...

root@ubuntu-phablet:/# apt-get install pinentry-curses
root@ubuntu-phablet:/# apt-get install pass
root@ubuntu-phablet:/# apt-get install libudev-dev



Installing GnuPG 2.2.1 into the 'myRoot' system 

compile in ~phablet (in myRoot) the following pieces:

libassuan-2.4.3
libgpg-error-1.27
libksba-1.3.5
npth-1.5
libgcrypt-1.8.1
gnupg-2.2.1

always with ./configure && make && sudo make install; the software ends
up below /usr/local (i.e. /home/phablet/myRoot/usr/local when one looks
from outside the chroot'ed phone system);

note: 'gpg2' is /usr/local/bin/gpg


Now from the phone system configure:

$ mkdir ~/.gnupg

$ cat .gnupg/gpg.conf
#
agent-program  /home/phablet/myRoot/usr/local/bin/gpg-agent

$ cat .gnupg/gpg-agent.conf 
pinentry-program /home/phablet/myRoot/usr/bin/pinentry-curses
scdaemon-program /home/phablet/myRoot/usr/local/libexec/scdaemon
log-file /home/phablet/gpg-agent.log
log-file /dev/null
debug-level guru

Due to the nature of the installation in the chrooted system we
need small wrapper scripts to set PATH, LD_LIBRARY_PATH, ... and
other stuff;

$ cat ~/gpg.sh
#!/bin/sh
LD_LIBRARY_PATH=/home/phablet/myRoot/usr/local/lib export LD_LIBRARY_PATH
PATH=/home/phablet/myRoot/usr/local/bin:$PATH  export PATH
GNUPGHOME=/home/phablet/.gnupgexport GNUPGHOME
GPG_TTY=$(tty)export GPG_TTY
/home/phablet/myRoot/usr/local/bin/gpg-agent\
--homedir /home/phablet/.gnupg  \
--daemon\
--pinentry-program /home/phablet/myRoot/usr/bin/pinentry-curses
/home/phablet/myRoot/usr/local/bin/gpg-connect-agent /bye
/home/phablet/myRoot/usr/local/bin/gpg $*

run and create for test a keypair (later we want to use the GnuPG-card
for this)

$ ~/gpg.sh --full-generate-key
gpg-agent[2973]: enabled debug flags: mpi crypto memory cache memstat hashing 
ipc
gpg (GnuPG) 2.2.1; Copyright (C) 2017 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Please select what kind of key you want:
   (1) RSA and RSA (default)
   (2) DSA and Elgamal
   (3) DSA (sign only)
   (4) RSA (sign only)
Your selection? 
...

This starts the gpg-agent as:

$ ps ax | grep gpg-a
 2974 ?Ss 0:00 /home/phablet/myRoot/usr/local/bin/gpg-agent 
--homedir /home/phablet/.gnupg --daemon --pinentry-program 
/home/phablet/myRoot/usr/bin/pinentry-curses


Now we can use the the 'pass' command we installed in the chroot'es system
with

$ cat pass.sh
#!/bin/sh
LD_LIBRARY_PATH=/home/phablet/myRoot/usr/local/lib export LD_LIBRARY_PATH
PATH=/home/phablet/myRoot/usr/local/bin:$PATH  export PATH
GNUPGHOME=/home/phablet/.gnupgexport GNUPGHOME
GPG_TTY=$(tty)export GPG_TTY
unset GPG_AGENT_INFO
/home/phablet/myRoot/usr/bin/pass $*


Init the pass storage as:

$ ./pass.sh init Matthias

 
┌────┐
 │ Please enter the passphrase to unlock the OpenPGP secret 
key:  │
 │ "Matthias Apitz (test) "  
  │
 │ 2048-bit RSA key, ID 93A6FBF52FA76DB0,   
  │
 │ created 2017-09-22 (main key ID 3FECB79DDDA409E4).   
  │
 │ 

Re: GnuPG-card works in the Ubuntu smartphone

2017-09-24 Thread Matthias Apitz
El día domingo, septiembre 24, 2017 a las 05:31:56p. m. +0200, Werner Koch 
escribió:

> On Sun, 24 Sep 2017 10:59, g...@unixarea.de said:
> 
> > I would be happy to write something in this blog, but I never wrote
> > something in 'org-mode' format, any pointer to some guide? I'm attaching
> 
> If you are on Emacs it is already included and part of Emacs help
> system.  It's website is org-mode.org.   The markup is easy:

I'm not on Emacs, but vim. But, with the example you gave and looking on
some sources in the blog at gnupg.org I think I can do it. Groff was
more challenging in the past :-)

I will look for some slot next week. I will have to send it to you as I
don't see a way to create an account in the blog...

matthias



-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Smartcard not seen when reinserted

2017-10-01 Thread Matthias Apitz
El día domingo, octubre 01, 2017 a las 06:37:46p. m. +0200, Franck Routier 
escribió:

> Hi,
> 
> I have a problem where my OpenPGP smartcard is not recognized when I
> remove it from the reader and reinsert it.
> 
> Moreover I like to remove the card and reinsert it when needed, as when
> used for authentication with Poldi, I'm only asked for the PIN once, and
> then the PIN is cached (at the smardcard level if I am to believe this
> https://security.stackexchange.com/questions/147267/gpg-agent-keeps-saving-pin-for-a-smartcard/168312)
> 
> ...

I'm using a GnuPG-card for SSH and signing. I do not think, that it
would be a good idea, that the secre on the card remain unlocked after
withdraw (power reset) of the card, and mine does not cash it. It works
like this:

card insert
ssh server  --> PIN requested
ssh server  --> no PIN requested
gpg2 ... --sign ... --> no PIN requested
gpg2 ... --decrypt  --> no PIN requested
card remove
card insert
gpg2 ... --sign ... --> PIN requested
ssh server  --> PIN requested
ssh server  --> no PIN requested

i.e. it seems that unlocking the SSH key unlocks the signing key as
well, but not the other way around.

Imagine you pull-out the card in your office/restaurant, loose the card,
someone finds it before you note the lost and insert the card in your
system... No, that a card "survives" unlocked a withdraw is not a good
idea.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Smartcard not seen when reinserted

2017-10-02 Thread Matthias Apitz
El día lunes, octubre 02, 2017 a las 01:35:16p. m. +0200, Franck Routier 
escribió:

> My problem, in addition to the pin being cached "forever" (as long as
> the card is inserted, with no time limit), is that when I remove and
> reinsert the card, it is not recognized unless I restart gpg-agent.
> 
> So here is what happens:
> 
> card inserted
> pam_poldi.so called (sudo)   --> PIN requested
> pam_poldi.so called (sudo)   --> no PIN requested 
> pam_poldi.so called (sudo)   --> no PIN requested
> card removed (I don't like to let my card inserted, with no PIN
> validation needed !)
> card inserted--> card not seen (card error,
> OpenPGP card unavailable)
> gpgconf --kill gpg-agent   --> card seen
> pam_poldi.so called (sudo)   --> PIN requested
> pam_poldi.so called (sudo)   --> no PIN requested 
> etc...
> 
> Hence my questions:
> 1) can I force PIN for authentication each time I use it (it seems that
> the forcesig option is for signature only, not for authentication)
> 2) what can I do to have my card recognized on reinsert, without
> ressorting to killing gpg-agent
> --> probably with some scd-event magic that's beyond my know-how for
> now...

I'm using the attach 'scd-event' script to lock my display on card
removal and to unlock it on card-insert. The real work in the script is
at line 107++

Maybe it can serve you a bit.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.
#!/bin/sh
#
# this script must be placed into GNUPGHOME dir and named 'scd-event';
# it is triggered by the scdaemon on card removal with the arg 'NOCARD'
# it will also run delayd after card insertion and *after* the first access to 
the card
#
# we use this to lock the KDE screen on card removal and run a loop of
# 'gpg2 --card-status' to unlock the screen after card insertion
#
# g...@unxarea.de, July 2017

echo $0 $* >> /tmp/scd-event.log

PGM=scd-event

reader_port=
old_code=0x
new_code=0x
status=

tick='`'
prev=
while [ $# -gt 0 ]; do
  arg="$1"
  case $arg in
  -*=*) optarg=$(echo "X$arg" | sed -e '1s/^X//' -e 's/[-_a-zA-Z0-9]*=//')
;;
 *) optarg=
;;
  esac
  if [ -n "$prev" ]; then
eval "$prev=\$arg"
prev=
shift
continue
  fi
  case $arg in
  --help|-h)
  cat <&2
  exit 1
  ;;

  *)
  break
  ;;
  esac
  shift
done
if [ -n "$prev" ]; then
  echo "$PGM: argument missing for option $tick$prev'" >&2
  exit 1
fi

cat <> /tmp/scd-event.log

port: $reader_port
old-code: $old_code
new-code: $new_code
status:   $status
EOF

DISPLAY=:0 export DISPLAY
if [ x$status = xNOCARD ]; then
echo DISPLAY: $DISPLAY >> /tmp/scd-event.log
echo /usr/local/lib/kde4/libexec/kscreenlocker_greet --immediateLock >> 
/tmp/scd-event.log
nohup /usr/local/lib/kde4/libexec/kscreenlocker_greet --immediateLock &
pid=$!
echo ${pid}  > /tmp/scd-event.pid
echo locked by PID ${pid} >> /tmp/scd-event.log
echo killing fetchmail >> /tmp/scd-event.log
fetchmail -q
while true; do
  # is the kscreenlocker_greet still running? user might have unlocked it 
with PAM
  /bin/kill -0 ${pid} || {
echo kscreenlocker_greet ${pid} disappeared >> /tmp/scd-event.log
break
  }
  # gpg2 --card-status >> /tmp/scd-event.log 2>> /tmp/scd-event.log
  # Signature key : 5E69 FBAC 1618 562C B3CB  FBC1 47CC F7E4 76FE 9D11
  gpg2 --card-status | grep '5E69 FBAC 1618 562C B3CB  FBC1 47CC F7E4 76FE 
9D11' >> /tmp/scd-event.log  && {
# OK, key is fine unlocking the movies
echo OK, key is fine unlocking the movies, killall kscreenlocker_greet 
>> /tmp/scd-event.log
killall kscreenlocker_greet
fetchmail
break
  }
  sleep 1  
done
fi


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Is there some writeable memory on the OpenPGP-card

2017-10-10 Thread Matthias Apitz

Hello,

I often switch at work with my OpenPGP-card among the workstations I'm
using. Some of them do not have (for security reasons) any network connection
between and it would be nice transfer some small files together with the
USB OpenPGP-card. Is there some memory for read/write on them, maybe
with some commands of the card daemon?

Thanks

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OT: FAQ and GNU

2017-10-13 Thread Matthias Apitz
El día viernes, octubre 13, 2017 a las 09:05:52a. m. -0500, Mario Castelán 
Castro escribió:

> Your argument is unsound, because the inference is unjustified. The
> possibilities that a language is regulated by an official body or
> defined by majority usage are not exhaustive.
> 
> ...

Could you please discuss this off-list. Thanks.

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: 20171005-gnupg-ccid-card-daemon-UbuntuPhone

2017-10-13 Thread Matthias Apitz
El día viernes, octubre 13, 2017 a las 12:44:01p. m. -0400, Daniel Villarreal 
escribió:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
> 
> re:
> https://www.gnupg.org/blog/20171005-gnupg-ccid-card-daemon-UbuntuPhone.h
> tml
> 
> Matthias, I appreciate your doing this tutorial. You put a lot of
> effort into it. I'm wanting to make some suggestions. Please forgive
> me if I'm misunderstanding anything.
> 
> Cheers,
> Daniel Villarreal

Daniel,

Thanks for your comments and the suggested changes. I can't change the
blog page due to missing write access there. The suggested changes are
fine with me if someone is in the position to do them.

Re/ your question:

> Now we can use the 'pass' command we installed in the chroot'es system
> with
> 
> could be perhaps...
> 
> Now we can use the 'pass' command we installed in the chrooted system
> with
> 
> Question: Why is there an asterisk after the prompt at the end of
> pass.sh ?

The '$' sign there is not a prompt. 'pass.sh' is a small shell script and
in this the expression '$*' passes all arguments given to 'pass.sh' to
the called command.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Using the OpenPGP Card on Unix && Win7

2017-11-15 Thread Matthias Apitz

Hello,

I'm using the OpenPGP Card on Unix (FreeBSD) and on my Ubuntu mobile
phone (see 
https://gnupg.org/blog/20171005-gnupg-ccid-card-daemon-UbuntuPhone.html)
mostly for storing credentials with the password manager 'pass' and using them
from the browser, and as well for signing mails.

At work I have to use a Win7 desktop and OutLook for the company mails
and FreeBSD with GnuPG must run in a Vbox, which works fine with the OpenPGP
Card too.

I'd like to use the same Card with OutLook (please don't blame me :-))
and have already installed gpg4win-3.0.0.exe which seems to work
together with OutLook.

Before digging into all the details by my own and esp. because in Windows I'm 
only a
DAU(*), is there some step by step guide to configure the OpenPGP Card in
Windows and using the files from the GNUPGHOME on FreeBSD in Windows?

Thanks

matthias

DAU(*): This is German spelled for "Dümmster Anzunehmender User" (the most
stupid imaginable user)

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-16 Thread Matthias Apitz
El día miércoles, noviembre 15, 2017 a las 12:19:30p. m. +0100, Werner Koch 
escribió:

> On Wed, 15 Nov 2017 09:06, g...@unixarea.de said:
> 
> > Before digging into all the details by my own and esp. because in Windows 
> > I'm only a
> > DAU(*), is there some step by step guide to configure the OpenPGP Card in
> > Windows and using the files from the GNUPGHOME on FreeBSD in Windows?
> 
> Actually you could copy the entire GNUPGHOME to the respective Windows
> directory.  The name of the lock files and some temporary files are
> different but that does matter.  "gpg --version" (or "gpgconf
> --list-dirs") shows you the standard home directory on Windows.
> 
> If you only want to copy some keys, you can use the same procedure you
> would use between Unix boxes.
> 
> Kleopatra's card manager is pretty basics.  If you don't like it you can
> use the one in gpa (which can optionally be installed), or just resort
> to the command line.  

I copied over GNUPGHOME and gpa and OutLook can see/use the pub key. To
get access to the Card, I need some driver in Win7. Do you know any
reliable place to fetch from.

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-18 Thread Matthias Apitz
El día jueves, noviembre 16, 2017 a las 07:23:03p. m. +0100, Werner Koch 
escribió:

> Usually the Windows hardware detection (a menu item like "Install new
> hardware", ot a small icon in the taskbar) can locate all common reader
> types and their drivers.  It not, you need to check the website of the
> reder's vendor.

Hi,

It seems that the USB token is fine, but the Card is not (see
http://www.unixarea.de/SnipToolPlusImg.jpg )

I installed some driver and after this the the problem symbol (!) is away,
but neither GPA nor Kleopatra can use the Card.

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-18 Thread Matthias Apitz
El día jueves, noviembre 16, 2017 a las 07:23:03p. m. +0100, Werner Koch 
escribió:

> Usually the Windows hardware detection (a menu item like "Install new
> hardware", ot a small icon in the taskbar) can locate all common reader
> types and their drivers.  It not, you need to check the website of the
> reder's vendor.

Hi,

It seems that the USB token is fine, but the Card is not (see
attachment).

I installed some driver and after this the the problem symbol is away,
but neither GPA nor Kleopatra can use the Card.

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-20 Thread Matthias Apitz
El día domingo, noviembre 19, 2017 a las 03:20:16p. m. +0100, Peter Lebbing 
escribió:

> On 17/11/17 16:09, Matthias Apitz wrote:
> > It seems that the USB token is fine, but the Card is not (see
> > attachment).
> 
> I don't use Windows myself, but AFAIK, this is normal and not a problem.
> 
> AFAIK, the exclamation mark triangle on the smartcard means that the OS
> has no driver to work with that specific smartcard. But GnuPG
> communicates directly with the smartcard; the "driver" so to speak is
> inside GnuPG. In fact, if you found another OS-level driver that is
> happy to work with your smartcard, you are probably /creating/ an issue
> since it will keep a lock on the smartcard so GnuPG no longer can get
> access to it. While shared access to a smartcard is not impossible per
> se, often you'll find that programs want exclusive access, and you can't
> use two programs with the same smartcard at the same time.
> 
> An exclamation mark triangle on the /reader/ would probably indicate an
> issue, but an exclamation mark triangle on the /smartcard/ is probably
> for the best.
> 
> Still, I've only used different types of smartcards on Windows, and only
> very sporadically, so I don't think I can be of much further help.

Hello,

Thanks for your feedback, Peter.

I killed a running SmartCard Service on Win7 and tested GnuPG on a
Cygwin command line. It says:


$ uname -a
CYGWIN_NT-6.1 APITZM-LTOH 2.7.0(0.306/5/3) 2017-02-12 13:18 x86_64 Cygwin

$ gpg --version
gpg (GnuPG) 2.2.1
libgcrypt 1.8.1
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Home: C:/Users/apitzm/AppData/Roaming/gnupg
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2

$ gpg --card-status --debug-all --debug-level guru 
gpg: reading options from 'C:/Users/apitzm/AppData/Roaming/gnupg/gpg.conf'
gpg: enabled debug flags: packet mpi crypto filter iobuf memory cache memstat 
trust hashing ipc clock lookup extprog
gpg: DBG: [not enabled in the source] start
gpg: DBG: chan_0x00d8 <- OK Pleased to meet you
gpg: DBG: connection to agent established
gpg: DBG: chan_0x00d8 -> RESET
gpg: DBG: chan_0x00d8 <- OK
gpg: DBG: chan_0x00d8 -> OPTION ttytype=xterm
gpg: DBG: chan_0x00d8 <- OK
gpg: DBG: chan_0x00d8 -> GETINFO version
gpg: DBG: chan_0x00d8 <- D 2.2.1
gpg: DBG: chan_0x00d8 <- OK
gpg: DBG: chan_0x00d8 -> OPTION allow-pinentry-notify
gpg: DBG: chan_0x00d8 <- OK
gpg: DBG: chan_0x00d8 -> OPTION agent-awareness=2.1.0
gpg: DBG: chan_0x00d8 <- OK
gpg: DBG: chan_0x00d8 -> SCD GETINFO version
gpg: DBG: chan_0x00d8 <- D 2.2.1
gpg: DBG: chan_0x00d8 <- OK
gpg: DBG: chan_0x00d8 -> SCD SERIALNO openpgp
gpg: DBG: chan_0x00d8 <- ERR 100696144 No such device 
gpg: selecting openpgp failed: No such device
gpg: OpenPGP card not available: No such device
gpg: DBG: [not enabled in the source] stop
gpg: keydb: handles=0 locks=0 parse=0 get=0
gpg:build=0 update=0 insert=0 delete=0
gpg:reset=0 found=0 not=0 cache=0 not=0
gpg: kid_not_found_cache: count=0 peak=0 flushes=0
gpg: sig_cache: total=0 cached=0 good=0 bad=0
gpg: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0
  outmix=0 getlvl1=0/0 getlvl2=0/0
gpg: rndjent stat: collector=0x calls=0 bytes=0
gpg: secmem usage: 0/32768 bytes in 0 blocks

It does not make any difference, if I also start the scdaemon with
$ scdaemon --daemon &

or not.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-20 Thread Matthias Apitz
El día lunes, noviembre 20, 2017 a las 03:07:44p. m. +0100, Peter Lebbing 
escribió:

> On 20/11/17 08:56, Matthias Apitz wrote:
> > I killed a running SmartCard Service on Win7 and tested GnuPG on a
> > Cygwin command line.
> 
> Involving Cygwin is yet another non-trivial hurdle to take. I think it's
> best if you get it working on Windows first, and only then try to
> involve another layer in the form of Cygwin.
> 
> You can see what happens when you use gpg.exe from the Windows command
> prompt. If that works out, see what happens in the GUI manager(s)
> included with gpg4win-3.0.0.exe. Assuming it does include GUI software :-).


This gives the same output as from Cygwin:


C:\Users\apitzm\vb\GnuPG\bin>gpg.exe --card-status --debug-all --debug-level 
guru
gpg: Optionen werden aus
'C:/Users/apitzm/AppData/Roaming/gnupg/gpg.conf' gelesen
gpg: enabled debug flags: packet mpi crypto filter iobuf memory cache
memstat trust hashing ipc clock lookup extprog
gpg: DBG: [not enabled in the source] start
gpg: DBG: chan_0x00d0 <- OK Pleased to meet you
gpg: DBG: connection to agent established
gpg: DBG: chan_0x00d0 -> RESET
gpg: DBG: chan_0x00d0 <- OK
gpg: DBG: chan_0x00d0 -> GETINFO version
gpg: DBG: chan_0x00d0 <- D 2.2.1
gpg: DBG: chan_0x00d0 <- OK
gpg: DBG: chan_0x00d0 -> OPTION allow-pinentry-notify
gpg: DBG: chan_0x00d0 <- OK
gpg: DBG: chan_0x00d0 -> OPTION agent-awareness=2.1.0
gpg: DBG: chan_0x00d0 <- OK
gpg: DBG: chan_0x00d0 -> SCD GETINFO version
gpg: DBG: chan_0x00d0 <- D 2.2.1
gpg: DBG: chan_0x00d0 <- OK
gpg: DBG: chan_0x00d0 -> SCD SERIALNO openpgp
gpg: DBG: chan_0x00d0 <- ERR 100696144 No such device 
gpg: selecting openpgp failed: No such device
gpg: OpenPGP Karte ist nicht vorhanden: No such device
gpg: DBG: [not enabled in the source] stop
gpg: keydb: handles=0 locks=0 parse=0 get=0
gpg:build=0 update=0 insert=0 delete=0
gpg:reset=0 found=0 not=0 cache=0 not=0
gpg: kid_not_found_cache: count=0 peak=0 flushes=0
gpg: sig_cache: total=0 cached=0 good=0 bad=0
gpg: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0
  outmix=0 getlvl1=0/0 getlvl2=0/0
gpg: rndjent stat: collector=0x calls=0 bytes=0
gpg: secmem usage: 0/32768 bytes in 0 blocks

C:\Users\apitzm\vb\GnuPG\bin>

I saw the next mail from Werner, and will try to follow this.
Thanks

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-21 Thread Matthias Apitz
on[3868.2] DBG: chan_0x00b0 -> # END
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # HELP
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # SERIALNO 
[--demand=] []
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # LEARN [--force] 
[--keypairinfo]
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # READCERT 
|
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # READKEY 
[--advanced] 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # SETDATA 
[--append] 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # PKSIGN 
[--hash=[rmd160|sha{1,224,256,384,512}|md5]] 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # PKAUTH 

2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # PKDECRYPT 

2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # INPUT
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # OUTPUT
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # GETATTR 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # SETATTR  

2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # WRITECERT 

2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # WRITEKEY 
[--force] 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # GENKEY [--force] 
[--timestamp=] 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # RANDOM 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # PASSWD [--reset] 
[--nullpin] 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # CHECKPIN 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # LOCK [--wait]
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # UNLOCK
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # GETINFO 
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # RESTART
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # DISCONNECT
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # APDU 
[--[dump-]atr] [--more] [--exlen[=N]] [hexstring]
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> # KILLSCD
2017-11-21 08:26:46 scdaemon[3868.2] DBG: chan_0x00b0 -> OK
2017-11-21 08:27:09 scdaemon[3868.2] DBG: chan_0x00b0 <- restart
2017-11-21 08:27:09 scdaemon[3868.2] DBG: chan_0x00b0 -> OK
2017-11-21 08:28:18 scdaemon[3868.2] DBG: chan_0x00b0 <- RESTART
2017-11-21 08:28:18 scdaemon[3868.2] DBG: chan_0x00b0 -> OK
2017-11-21 08:29:15 scdaemon[3868.2] DBG: chan_0x00b0 <- serialno
2017-11-21 08:29:15 scdaemon[3868.2] DBG: enter: apdu_open_reader: 
portstr=(null)
2017-11-21 08:29:15 scdaemon[3868.2] detected reader 'Broadcom Corp Contacted 
SmartCard 0'
2017-11-21 08:29:15 scdaemon[3868.2] detected reader 'Broadcom Corp Contactless 
SmartCard 0'
2017-11-21 08:29:15 scdaemon[3868.2] detected reader 'BROADCOM NFC Smartcard 
Reader 1'
2017-11-21 08:29:15 scdaemon[3868.2] detected reader 'Identiv uTrust 3512 SAM 
slot Token 0'
2017-11-21 08:29:15 scdaemon[3868.2] detected reader ''
2017-11-21 08:29:15 scdaemon[3868.2] reader slot 0: not connected
2017-11-21 08:29:15 scdaemon[3868.2] DBG: leave: apdu_open_reader => slot=0 
[pc/sc]
2017-11-21 08:29:15 scdaemon[3868.2] DBG: enter: apdu_connect: slot=0
2017-11-21 08:29:15 scdaemon[3868.2] pcsc_connect failed: removed card 
(0x80100069)
2017-11-21 08:29:15 scdaemon[3868.2] reader slot 0: not connected
2017-11-21 08:29:15 scdaemon[3868.2] DBG: leave: apdu_connect => sw=0x10008
2017-11-21 08:29:15 scdaemon[3868.2] DBG: enter: apdu_close_reader: slot=0
2017-11-21 08:29:15 scdaemon[3868.2] DBG: enter: apdu_disconnect: slot=0
2017-11-21 08:29:15 scdaemon[3868.2] DBG: leave: apdu_disconnect => sw=0x0
2017-11-21 08:29:15 scdaemon[3868.2] DBG: leave: apdu_close_reader => 0x0 
(close_reader)
2017-11-21 08:29:15 scdaemon[3868.2] DBG: chan_0x00b0 -> ERR 100696144 No 
such device 
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
8. Mai 1945: Wer nicht feiert hat den Krieg verloren.
8 de mayo de 1945: Quien no festeja perdió la Guerra.
May 8, 1945: Who does not celebrate lost the War.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-21 Thread Matthias Apitz
El día martes, noviembre 21, 2017 a las 06:50:18p. m. +0900, NIIBE Yutaka 
escribió:

> Matthias Apitz  wrote:
> > The produced log is:
> >
> > $ cat ../AppData/Local/VirtualStore/Windows/SysWOW64/scdaemon.log
> [...]
> > 2017-11-21 08:24:04 scdaemon[3868.2] DBG: enter: apdu_open_reader: 
> > portstr=(null)
> > 2017-11-21 08:24:04 scdaemon[3868.2] detected reader 'Broadcom Corp 
> > Contacted SmartCard 0'
> > 2017-11-21 08:24:04 scdaemon[3868.2] detected reader 'Broadcom Corp 
> > Contactless SmartCard 0'
> > 2017-11-21 08:24:04 scdaemon[3868.2] detected reader 'BROADCOM NFC 
> > Smartcard Reader 1'
> > 2017-11-21 08:24:04 scdaemon[3868.2] detected reader 'Identiv uTrust 3512 
> > SAM slot Token 0'
> > 2017-11-21 08:24:04 scdaemon[3868.2] detected reader ''
> > 2017-11-21 08:24:04 scdaemon[3868.2] reader slot 0: not connected
> 
> You have five card readers (the last one looks strange, though).
> 
> GnuPG's scdaemon select the first one as default.  IIUC, you want to use
> 'Identiv uTrust 3512 SAM slot Token 0'.
> 
> In .gnupg/scdaemon.conf, you should have something like:
> ===
> reader-port "Identiv uTrust 3512 SAM slot Token"
> ===
> 
> ... to select the token.

Thanks! Adding the above line to GNUPGHOME/scdaemon.conf makes it all work,
even the GPA and other GUI tools.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using the OpenPGP Card on Unix && Win7

2017-11-24 Thread Matthias Apitz

One last question on this. The gpg4win-3.0.0.exe installs among others an
OutLook plugin (GpgOl DLL) which let you encrypt and sign mails in
OutLook. Ofc, my keypair I'm using with the OpenPGP Card was built for 
'Matthias Apitz  ' and not for my company mail addr 
matthias.ap...@oclc.org; this brings always on signing up a Window like this
http://www.unixarea.de/kleo3.jpg of Kleopatra because it can not choose
by its own the correct certificate. Is there a way to configure this
within Kleopatra or GpgOl?

Thanks

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: SHA1 collision found

2017-11-25 Thread Matthias Apitz
On Saturday, 25 November 2017 14:24:29 CET, Jerry  
wrote:

On Fri, 24 Nov 2017 00:10:44 -0800, Brent Small stated:

What’s up 


up

ADVERB

...


Maybe the OP wanted to sent this to What's Ape.

matthias




--
Sent from my Ubuntu phone
http://www.unixarea.de/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


pinentry fails with gpg-agent for ssh, but works for gpg

2018-01-25 Thread Matthias Apitz

Hello,

A bit triggered by the last thread "Why exactly does pinentry fails with
gpg-agent and ssh support?" I want to report a similar issue which I do not
understand.

I have the 'pinentry' in /usr/local/bin/pinentry as a sym-link to the qt5
version:

$ ls -l /usr/local/bin/pinentry
lrwxr-xr-x  1 root  wheel  27 15 may.   2017 /usr/local/bin/pinentry -> 
/usr/local/bin/pinentry-qt5

Most of the time I work within the KDE desktop and when the PIN is required to
unlock the keys on the OpenPGP card, it pops up a small Qt5 window asking for 
it.

Sometimes I work in the alpha console where `tty` gives /dev/ttyv0 (and
GPG_TTY env var is set to this). What I do not get to understand is:

$ gpg2 -d file

pops up some curses window asking for the PIN, i.e.  /usr/local/bin/pinentry-qt5
falls back to this at the end because has no DISPLAY to connect to.

$ ssh some-host

fails to ask for the PIN.

Why, or what could I do?

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Etoken pro windows 10

2018-01-29 Thread Matthias Apitz
El día lunes, enero 29, 2018 a las 01:45:24p. m. +, kip papa via 
Gnupg-users escribió:

> Hi, everybody has anyone been able to use etoken pro gpg with windows 10. Is 
> there any guide about it; 
> gpg: selecting openpgp failed: No such device
> gpg: OpenPGP card not available: No such device
> thank you.

Hi,

Check this thread 'Using the OpenPGP Card on Unix && Win7' in the list's
archives. I have had a similar issue and have had to configure which of
the devices should be used.

HIH

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


OpenPGP card && exporting secret keys

2018-02-05 Thread Matthias Apitz


Hello,

I'm using an OpenPGP card and gnupg 2.1.19 on my FreeBSD workstations
and my Ubuntu mobile device to store crypted passwords (tool: password-store),
to lock/unlock desktop sessions and to sign emails. This is all working
fine and without any hick-ups.

What makes me worry, is that single point of failure: the OpenPGP card.

While I do backups of alls the encrypted password files, they would be
all useless in case of lost/teft of the token or hardware fault of the SIM
card.

What I do at the moment is something like:

$ find ~/.password-store -name '*.gpg' -exec printf "%s:\n" {} \;
  -and -exec gpg2 -d {} 2> /dev/null \; 
  -and -exec echo \; > /tmp/clear-password-store.txt

$ GNUPGHOME=...
$ gpg -ea /tmp/clear-password-store.txt
$ mv /tmp/clear-password-store.txt.asc $GNUPGHOME
$ rm -P /tmp/clear-password-store.txt

where the other GNUPGHOME contains secret and pub-keys created for this
special purpose and living outside (i.e. without) the OpenPGP card.
ANd in case of lost/teft of the token I could recover at least all
passwords again...

Is there any way to export the secret keys from the OpenPGP card to use
them directly (with a passphrase) and without the OpenPGP card?

Thanks

    matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

Thanks to the Soviet Army for the Victory in Stalingrad! -- Победа в 
Сталинградской битве!


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


problems sending to the list

2018-02-11 Thread Matthias Apitz

Hello,

Sometimes I do SSH into my server of my ISP and send email to the list
from there. This always failes with the message below.

Can some list admin please check, why? Thanks

matthias

- Forwarded message from Mail Delivery System  
-

Date: Fri, 09 Feb 2018 11:14:13 +0100
From: Mail Delivery System 
To: ftp51246-2575...@sh4-5.1blu.de
Subject: Mail delivery failed: returning message to sender

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  gnupg-users@gnupg.org
host kerckhoffs.g10code.com [217.69.77.222]
SMTP error from remote mail server after RCPT TO::
451 Could not complete sender verify callout:
retry timeout exceeded

Reporting-MTA: dns; sh4-5.1blu.de

Action: failed
Final-Recipient: rfc822;gnupg-users@gnupg.org
Status: 5.0.0
Remote-MTA: dns; kerckhoffs.g10code.com
Diagnostic-Code: smtp; 451 Could not complete sender verify callout: retry 
timeout exceeded

Date: Mon, 5 Feb 2018 11:12:12 +0100
From: Matthias Apitz 
To: gnupg-users@gnupg.org
Subject: OpenPGP card && exporting secret keys


Hello,

I'm using an OpenPGP card and gnupg 2.1.19 on my FreeBSD workstations
and my Ubuntu mobile device to store crypted passwords (tool: password-store),
to lock/unlock desktop sessions and to sign emails. This is all working
fine and without any hick-ups.

What makes me worry, is that single point of failure: the OpenPGP card.

While I do backups of alls the encrypted password files, they would be
all useless in case of lost/teft of the token or hardware fault of the SIM
card.

What I do at the moment is something like:

$ find ~/.password-store -name '*.gpg' -exec printf "%s:\n" {} \;
  -and -exec gpg2 -d {} 2> /dev/null \; 
  -and -exec echo \; > /tmp/clear-password-store.txt

$ GNUPGHOME=...
$ gpg -ea /tmp/clear-password-store.txt
$ mv /tmp/clear-password-store.txt.asc $GNUPGHOME
$ rm -P /tmp/clear-password-store.txt

where the other GNUPGHOME contains secret and pub-keys created for this
special purpose and living outside (i.e. without) the OpenPGP card.
ANd in case of lost/teft of the token I could recover at least all
passwords again...

Is there any way to export the secret keys from the OpenPGP card to use
them directly (with a passphrase) and without the OpenPGP card?

Thanks

matthias

- End forwarded message -

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

Thanks to the Soviet Army for the Victory in Stalingrad! -- Победа в 
Сталинградской битве!


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: problems sending to the list

2018-02-11 Thread Matthias Apitz
El día domingo, febrero 11, 2018 a las 12:56:40p. m. +0100, Peter Lebbing 
escribió:

> I think you're not setting the "envelope from" correctly. While the
> e-mail itself has your normal e-mail address, the bounce is going to the
> address I quoted above, so apparently that is the envelope sender.

Yes. This was the issue. The MUA in question is mutt which uses sendmail to 
send the
mail. There was (I don't know why) the -f ... missing.

    matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

Thanks to the Soviet Army for the Victory in Stalingrad! -- Победа в 
Сталинградской битве!


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: gnupg SmartCard V3.3

2018-03-01 Thread Matthias Apitz
El día Thursday, March 01, 2018 a las 09:14:15AM +0900, NIIBE Yutaka escribió:

> Hello,
> 
> Werner Koch  wrote:
> > @gniibe: Do you have any more up to date information on macOS and
> > smartcard readers?
> 
> If possible, I recommend to use GnuPG's in-stock driver to access
> smartcard.  It is direct access by libusb, not using PC/SC service.
> 
> For GNU/Linux, if you don't have any other use of PC/SC service, please
> uninstall it, or disable the service, and try again with GnuPG's
> in-stock driver.
> 
> For the driver, I maintain this list:
> 
> https://wiki.debian.org/GnuPG/CCID_Driver
> 
> For macOS, I think that it still uses old PC/SC and libccid library.
> I'm afraid that new readers (with new features like pinpad support)
> don't work well, or don't work at all.
> 

Hello,

I do yous the following USB token ond FreeBSD-12 CURRENT and the 'pcscd'
is configured to be started by devd on device attach:

Mar  1 08:00:56 r314251-amd64 kernel: ugen0.2:  at usbus0
Mar  1 08:00:56 r314251-amd64 root: CCID uTrust, type: ATTACH, system: USB, 
subsystem: INTERFACE
Mar  1 08:00:56 r314251-amd64 root: /usr/local/sbin/pcscd
Mar  1 08:00:56 r314251-amd64 root: Unknown USB device: vendor 0x04e6 product 
0x5816 bus uhub0

The OpenPGP card works fine as:

$ gpg2 --card-status

Reader ...: Identiv uTrust 3512 SAM slot Token (55511514602745)
00 00
Application ID ...: D2760001240102010005532B0000
Version ..: 2.1
Manufacturer .: ZeitControl
Serial number : 532B
Name of cardholder: Matthias Apitz
...

Do I have any chance to use the USB token and the card directly without
'pcscd'?

Thanks

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


using the SSH secret key fails sometimes

2018-03-05 Thread Matthias Apitz

Hello,

This is on FreeBSD with:

$ gpg2 --version
gpg (GnuPG) 2.1.19
libgcrypt 1.7.6

$ ps ax | egrep 'gnu|pcs'
1034  -  Ss 0:00,59 gpg-agent --homedir /home/guru/.gnupg-ccid 
--use-standard-socket 
1036  -  S  0:02,24 scdaemon --multi-server --homedir /home/guru/.gnupg-ccid
3844  -  S  0:01,04 /usr/local/sbin/pcscd

From time to time (let's say 1-2 times a day) the access to the SSH secret on
the OpenPGP card fails. The card is already unlocked in this moment
because the unlocking the KDE desktop has asked for the PIN.
Initializing a SSH session produces the attached error in the scdaemon's
log file.

It helps to withdraw the card and insert it again (which starts a new
proc /usr/local/sbin/pcscd).

Any idea where to look? Thanks

matthias


2018-03-05 10:53:40 scdaemon[1036.802017e00] manejador del descriptor 13 
iniciado
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK GNU Privacy 
Guard's Smartcard server ready
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- SERIALNO
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S SERIALNO 
D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- GETINFO card_list
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S SERIALNO 
D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- SERIALNO 
--demand=D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S SERIALNO 
D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- GETATTR $AUTHKEYID
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S $AUTHKEYID 
OPENPGP.3
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- GETATTR SERIALNO
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S SERIALNO 
D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- READKEY OPENPGP.3
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> [ 44 20 28 31 30 
3a 70 75 62 6c 69 63 2d 6b 65 79 ...(548 byte(s) skipped) ]
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- GETATTR 
$DISPSERIALNO
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S $DISPSERIALNO 
0005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- SERIALNO 
--demand=D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> S SERIALNO 
D2760001240102010005532B
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- SETDATA 
3021300906052B0E03021A05000414579704ECB5FC67E700FAD99C8080277E86DCAD94
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> OK
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 <- PKAUTH OPENPGP.3
2018-03-05 10:53:40 scdaemon[1036.802017e00] pcsc_transmit failed: not 
transacted (0x80100016)
2018-03-05 10:53:40 scdaemon[1036.802017e00] apdu_send_simple(0) failed: 
general error
2018-03-05 10:53:40 scdaemon[1036.802017e00] operation auth result: General 
error
2018-03-05 10:53:40 scdaemon[1036.802017e00] app_auth failed: General error
2018-03-05 10:53:40 scdaemon[1036.802017e00] DBG: chan_13 -> ERR 100663297 
General error 
2018-03-05 10:54:04 scdaemon[1036.802017e00] DBG: chan_13 <- BYE
2018-03-05 10:54:04 scdaemon[1036.802017e00] DBG: chan_13 -> OK closing 
connection
2018-03-05 10:54:04 scdaemon[1036.802017e00] manejador del descriptor 13 
terminado

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


OpenPGP card bricked

2018-03-10 Thread Matthias Apitz
c:379:IFDHGetCapabilities() tag: 0xFB1, 
usb:04e6/5816:libusb-1.0:0:2:0 (lun: 0)
0012 ifdhandler.c:379:IFDHGetCapabilities() tag: 0xFB2, 
usb:04e6/5816:libusb-1.0:0:2:0 (lun: 0)
0011 eventhandler.c:201:EHDestroyEventHandler() Request stopping of polling 
thread
0011 ifdhandler.c:344:IFDHStopPolling() usb:04e6/5816:libusb-1.0:0:2:0 
(lun: 0)
00401709 eventhandler.c:502:EHStatusHandlerThread() Die
0177 eventhandler.c:216:EHDestroyEventHandler() Thread stomped.
0019 readerfactory.c:1130:RFUnInitializeReader() Attempting shutdown of 
Identiv uTrust 3512 SAM slot Token (55511514602745) 00 00.
0025 ifdhandler.c:282:IFDHCloseChannel() usb:04e6/5816:libusb-1.0:0:2:0 
(lun: 0)
9467 ccid_usb.c:189:close_libusb_if_needed() libusb_exit
0089 readerfactory.c:991:RFUnloadReader() Unloading reader driver.
0133 winscard_svc.c:152:ContextsDeinitialize() remaining threads: 0
0059 pcscdaemon.c:781:at_exit() cleaning /var/run/pcscd
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

Thanks to the Soviet Army for the Victory in Stalingrad! -- Победа в 
Сталинградской битве!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP card bricked

2018-03-13 Thread Matthias Apitz
El día martes, marzo 13, 2018 a las 06:54:25p. m. +0900, NIIBE Yutaka escribió:
> 
> > What can I do?
> [...]
> > Identiv uTrust 3512 SAM slot Token
> 
> I believe that GnuPG's in-stock driver just works fine with this reader,
> because it runs at TPDU level exchange.
> 
> Please try without PC/SC-lite, and see how it goes.
> 
> With following ~/.gnupg/scdaemon.conf, you can get debug log.
> 
>  ~/.gnupg/scdaemon.conf
> verbose
> verbose
> debug-level guru
> debug-all
> debug-ccid-driver
> log-file /some/where/scdaemon-debug.log
> 

I moved the /usr/local/sbin/pcscd out of the way. The scdaemon writes
the following log:

2018-03-13 15:28:10 scdaemon[2508.802016000] listening on socket 
'/home/guru/.gnupg-ccid/S.scdaemon'
2018-03-13 15:28:10 scdaemon[2508.802017900] manejador del descriptor -1 
iniciado
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 -> OK GNU Privacy 
Guard's Smartcard server ready
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 <- GETINFO socket_name
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 -> D 
/home/guru/.gnupg-ccid/S.scdaemon
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 -> OK
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 <- OPTION 
event-signal=31
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 -> OK
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 <- SERIALNO
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: enter: apdu_open_reader: 
portstr=(null)
2018-03-13 15:28:10 scdaemon[2508.802017900] pcsc_establish_context failed: no 
service (0x8010001d)
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: leave: apdu_open_reader => 
slot=-1 [pc/sc]
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 -> ERR 100696144 
Operation not supported by device 
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 <- RESTART
2018-03-13 15:28:10 scdaemon[2508.802017900] DBG: chan_7 -> OK

Is there some config missing so that scdaemon opens directly the reader?
What does 'pcsc_establish_context failed' mean?

Thanks for your help

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP card bricked

2018-03-13 Thread Matthias Apitz
El día martes, marzo 13, 2018 a las 04:00:04p. m. +0100, Peter Lebbing escribió:

> On 13/03/18 15:34, Matthias Apitz wrote:
> > Is there some config missing so that scdaemon opens directly the reader?
> > What does 'pcsc_establish_context failed' mean?
> 
> A notable difference between the built-in CCID driver and pcscd is probably 
> the
> user credentials that open the USB device. Make sure you have write access to
> the character device in /dev/bus/usb that corresponds to your smartcard:

Please note, this is not Linux but FreeBSD. But you pointed in the
correct direction: missing rw perms in /dev/usb/* device files; I'm in
the group operator, but they have had only 0600 perms; I fixed this to:

# ls -l /dev/usb
total 0
crw-rw  1 root  operator  0x2c 13 mar.  15:17 0.1.0
crw-rw  1 root  operator  0x3d 13 mar.  15:17 0.1.1
crw-rw  1 root  operator  0x40 13 mar.  15:17 0.2.0
crw-rw  1 root  operator  0x42 13 mar.  15:17 0.2.1
crw-rw  1 root  operator  0x43 13 mar.  15:17 0.2.7
crw-rw  1 root  operator  0x44 13 mar.  15:17 0.3.0
crw-rw  1 root  operator  0x46 13 mar.  15:17 0.3.1
crw-rw  1 root  operator  0x47 13 mar.  15:17 0.3.2
crw-rw  1 root  operator  0x48 13 mar.  15:17 0.3.3
crw-rw  1 root  operator  0x7e 13 mar.  15:26 0.4.0
crw-rw  1 root  operator  0x80 13 mar.  15:26 0.4.1
crw-rw  1 root  operator  0x81 13 mar.  15:26 0.4.2
crw-rw  1 root  operator  0x82 13 mar.  15:26 0.4.3

and this gives more log; see below;

> Also, if I were you, I'd clean the smartcard contacts with isopropyl alcohol.
> I'm not sure what other cleaning agents would work well, I just use that one.
> 
> It could be that your card has just died. Smartcards are not the most robust
> devices, and they are subjected to stress usually.

Thanks for this hint too.


2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: chan_7 <- GETINFO version
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: chan_7 -> D 2.1.19
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: chan_7 -> OK
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: chan_7 <- SERIALNO openpgp
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: apdu_open_reader: BAI=400
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: apdu_open_reader: new 
device=400
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: using CCID 
reader 0 (ID=04E6:5816:55511514602745:0)
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: idVendor: 04E6  
idProduct: 5816  bcdDevice: 0202
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: ChipCard 
Interface Descriptor:
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   bLength
54
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
bDescriptorType33
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   bcdCCID
  1.10  (Warning: Only accurate for version 1.0)
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   nMaxSlotIndex  
 0
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
bVoltageSupport 7  ?
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwProtocols
 3  T=0 T=1
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwDefaultClock 
  4800
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
dwMaxiumumClock 16000
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
bNumClockSupported  0
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwDataRate 
 12903 bps
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwMaxDataRate  
60 bps
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
bNumDataRatesSupp.  0
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwMaxIFSD  
   252
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
dwSyncProtocols   
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwMechanical   
   
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   dwFeatures 
  000100BA
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: Auto 
configuration based on ATR (assumes auto voltage)
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: Auto voltage 
selection
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: Auto clock 
change
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: Auto baud 
rate change
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: Auto PPS 
made by CCID
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver: TPDU level 
exchange
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
dwMaxCCIDMsgLen   271
2018-03-13 16:23:16 scdaemon[2508.802017900] DBG: ccid-driver:   
bClassGetResponseecho
2018-03-13 16:23:16 scdaemon[

Re: OpenPGP card bricked

2018-03-14 Thread Matthias Apitz
o_PC_DataBlock:
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   dwLength 
..: 0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bSlot 
.: 0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bSeq 
..: 4
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bStatus 
...: 65
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bError 
: 254
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver: CCID command 
failed: CCID timed out while talking to the ICC
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: leave: apdu_reset => 
sw=0x10009
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: leave: apdu_connect => 
sw=0x10009
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: enter: apdu_close_reader: 
slot=0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: enter: apdu_disconnect: slot=0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: leave: apdu_disconnect => 
sw=0x0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver: 
PC_to_RDR_IccPowerOff:
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   dwLength 
..: 0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bSlot 
.: 0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bSeq 
..: 5
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   [0007]  00 00 
00
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver: 
RDR_to_PC_SlotStatus:
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   dwLength 
..: 0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bSlot 
.: 0
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bSeq 
..: 5
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bStatus 
...: 1
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver:   bClockStatus 
..: 0x01 (stopped-L)
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver: 
libusb_cancel_transfer
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: ccid-driver: 
libusb_handle_events_completed
2018-03-14 16:33:10 scdaemon[2735.802280a00] DBG: ccid-driver: CCID: interrupt 
callback 3
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: leave: apdu_close_reader => 
0x0 (close_reader)
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: enter: apdu_open_reader: 
portstr=(null)
2018-03-14 16:33:10 scdaemon[2735.802017900] pcsc_establish_context failed: no 
service (0x8010001d)
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: leave: apdu_open_reader => 
slot=-1 [pc/sc]
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: chan_7 -> ERR 100696144 
Operation not supported by device 
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: chan_7 <- RESTART
2018-03-14 16:33:10 scdaemon[2735.802017900] DBG: chan_7 -> OK

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: WKD planned for Purism's laptops and Librem 5 phone

2018-03-15 Thread Matthias Apitz
El día Thursday, March 15, 2018 a las 10:27:04AM +0100, Bernhard Reiter 
escribió:

> https://puri.sm/posts/purism-collaboration-with-cryptography-expert-werner-koch/
> 
>   have joined forces with leading cryptography pioneer, Werner Koch, to   
>   integrate hardware encryption into the company’s Librem laptops and 
>   forthcoming Librem 5 phone. 
> ..
>to include encryption by default into its hardware, software, and services.
> ..
>by default into communications such as email and messaging
>through a new process called Web Key Directory
> 
> ...

I have ordered in the crowd funding on October 7, 2017 one of these
Librem 5 phones (~600 Euro) and I'm keen to get hands on it next year in
spring.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Vulnerable clients (was: US-CERT now issuing a warning for OpenPGP-SMIME-Mail-Client-Vulnerabilities)

2018-05-16 Thread Matthias Apitz
El día Tuesday, May 15, 2018 a las 10:44:16AM +0200, Werner Koch escribió:

> On Tue, 15 May 2018 03:31, je...@seibercom.net said:
> > NCCIC encourages users and administrators to review CERT/CC’s Vulnerability
> > Note VU #122919.
> 
> Doesn't CERT read the paper before produciong a report?  The table of
> vulnerable MUAs is easy enough to read.  To better see what we are
> discussing, here is the table in plain text format with the check marks
> replaced by yes and no.
> 
> --8<---cut here---start->8---
>   TABLE OF VULNERABLE MAIL CLIENTS
> 
> | OS  | Client  | S/MIME | PGP   |
> | | || -MDC | +MDC | SE  |
> |-+-++--+--+-|
> | Windows | Outlook 2007| yes| yes  | yes  | no  |
> | | Outlook 2010| yes| no   | no   | no  |
> | | Outlook 2013| user   | no   | no   | no  |
> | | Outlook 2016| user   | no   | no   | no  |
> | | Win. 10 Mail| yes| –| –| –   |
> | | Win. Live Mail  | yes| –| –| –   |
> | | The Bat!| user   | no   | no   | no  |
> | | Postbox | yes| yes  | yes  | yes |
> | | eM Client   | yes| no   | yes  | no  |
> | | IBM Notes   | yes| –| –| –   |
> | Linux   | Thunderbird | yes| yes  | yes  | yes |
> | | Evolution   | yes| no   | no   | no  |
> | | Trojitá | yes| no   | no   | no  |
> | | KMail   | user   | no   | no   | no  |
> | | Claws   | no | no   | no   | no  |
> | | Mutt| no | no   | no   | no  |
> | macOS   | Apple Mail  | yes| yes  | yes  | yes |
> | | MailMate| yes| no   | no   | no  |
> | | Airmail | yes| yes  | yes  | yes |
> | iOS | Mail App| yes| –| –| –   |
> | | Canary Mail | –  | no   | no   | no  |
> | Android | K-9 Mail| –  | no   | no   | no  |
> | | R2Mail2 | yes| no   | yes  | no  |
> | | MailDroid   | yes| no   | yes  | no  |
> | | Nine| yes| –| –| –   |
> | Webmail | United Internet | –  | no   | no   | no  |
> | | Mailbox.org | –  | no   | no   | no  |
> | | ProtonMail  | –  | no   | no   | no  |
> | | Mailfence   | –  | no   | no   | no  |
> | | GMail   | yes| –| –| –   |
> | Webapp  | Roundcube   | –  | no   | no   | yes |
> | | Horde IMP   | user   | no   | yes  | yes |
> | | AfterLogic  | –  | no   | no   | no  |
> | | Rainloop| –  | no   | no   | no  |
> | | Mailpile| –  | no   | no   | no  |
> 
> 
> -= Encryption not supported
> no   = Not vulnerable
> yes  = Vulnerable
> user = Vulnerable after user consent
> 
> -MDC = with stripped MDC, +MDC = with wrong MDC, SE = SE packets
> --8<---cut here---end--->8---
> 
> My conclusion is that S/MIME is vulnerable in most clients with the
> exception of The Bat!, Kmail, Claws, Mutt and Horde IMP.  I take the
> requirement for a user consent as non-vulnerable.  Most of the
> non-vulnerable clients use GnuPG as their engine.

Werner, my conclusion in addition is that the table is incorrect.
Most (if not even all) of the MUA which are noted for Linux do run on
nearly any other UNIX flavor, FreeBSD, OpenBSD, ... and mutt in addition
runs  on Canonical Ubuntu for smartphones/tablets and UBports devices.

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Using gnupg to crypt credentials used by application to access a database server

2018-07-14 Thread Matthias Apitz

Hello,

We have large application servers (written in C and C++), but also Perl
and Java applications which all contact a Sybase database server over
the network to do its work. They have to present a USER and a PASSWORD
information to connect to the Sybase ASE listening on some port. As the USER
and the PASSWORD are not entered by humans, at least not in the moment
when the access of the application is made, they are stored in clear
text in files in the UNIX (Linux, SunOS) file system. They are entered
once, when the software is installed, or get modified with a text editor,
when the credentials for whatever reason should be changed. Ofc, storing
them in clear text was always a bad idea. Any person with access to the
server and a bit of knowledge could read and misuse them, even for
dropping the complete database or manipulating accountancy data.

We are looking for a way to change this situation and one of the options
or ideas I have, is crypt the credentials with GnuPG in some file. Any
application have to decrypt this file on the flight (perhaps with a shell
command) to get the USER and PASSWORD into its environment variables or
internal variables to make use of them to connect to the database
server, and will forget the credentials again asap.

Decrypting with GnuPG needs a passphrase, normally read from /dev/tty
which can not be done here in this case. My idea here is to write a
special 'pinentry' program which provides the passphrase, which is crypted 
itself
with blowfish internally in the 'pinentry' program, and the 'pinentry' will
only work, if the proc which is calling GnuPG send over a socket or a
file some information to authorize the access to this special 'pinentry'.

Any other and better ideas for this?

Thanks in advance.

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Using gnupg to crypt credentials used by application to access a database server

2018-07-16 Thread Matthias Apitz
El día Monday, July 16, 2018 a las 09:06:58AM +0200, Michael Kesper escribió:

> Hi all,
> 
> Am Samstag, den 14.07.2018, 15:15 +0200 schrieb Matthias Apitz:
> > We are looking for a way to change this situation and one of the
> > options
> > or ideas I have, is crypt the credentials with GnuPG in some file. 
> 
> I use pass [0] for this.
> It uses gnupg under the hood and also has ansible integration.
> Adding and removing users is a bit of hassle but it integrates much
> better with git than e.g. keepass or the like.
> 

Hi,

Michael, I do use pass too for all my firefox credentials for access of
webpages and services, i.e. I know how this works. I use for this GnuPG
together with an OpenPGP card and to unlock the password storage I have
to provide the 6 digit PIN of the card. The storage remains unlocked
until card removal. This works all fine.

But, I do not see how this could fit into the scene I described. When an
application server starts on the UNIX host, it needs the database access
credentials and there is no human to key in any PIN, for example when
the server start at boot time ...

How do you think, that pass could fit? Maybe I do overlook something...

Thanks

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  📱 
+49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


OpenPGP card: how to lock the card again so that PIN is required

2019-01-01 Thread Matthias Apitz

Hello,

This is with gnupg-2.2.12 and pcsc-lite-1.8.23. After an update of the
System (FreeBSD CURRENT) the /usr/local/sbin/pcscd does no work anymore
with the OpenPGP card (HID Global OMNIKEY 6121 Smart Card Reader) after
withdraw and re-insert. It works fine after boot, I have to enter
the PIN to unlock the card and all tested functions are working.

I have to investigate this further or change the 'scdaemon' to let it
directly access the OpenPGP bypassing the 'pcscd' (comments on this are
welcome).

How can I meanwhile 'reset' the OpenPGP card so that on next request for
the secrets (decrypt, signing, ssh) the PIN is requested?

Thanks

    matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP card: how to lock the card again so that PIN is required

2019-01-01 Thread Matthias Apitz
El día martes, enero 01, 2019 a las 06:40:56p. m. +0100, Dirk Gottschalk 
escribió:

> Hello Matthias.
> 
> Am Dienstag, den 01.01.2019, 08:36 +0100 schrieb Matthias Apitz:
> > Hello,
> 
> > This is with gnupg-2.2.12 and pcsc-lite-1.8.23. After an update of
> > the System (FreeBSD CURRENT) the /usr/local/sbin/pcscd does no work
> > anymore with the OpenPGP card (HID Global OMNIKEY 6121 Smart Card
> > Reader) after withdraw and re-insert. It works fine after boot, I
> > have to enter the PIN to unlock the card and all tested functions are
> > working.
> 
> Did you check the config for pcscd? Probably it was overwrittenby the
> update process.

There is no config file for pcscd, only for serial devices.

Interestingly the pcscd started via devd at boot time works fine:

$ ps ax | grep pc
 536 v0- S 0:00,98 /usr/local/sbin/pcscd --debug --foreground

When I disable this start at boot time and start the same command as
root from the shell (to investigate/debug), this just hangs. Also system
USB commands, like 'ucbconfig list', show the same problem. It looks
like something in the boot process after start of the above PID damages
the USB stack.

> > I have to investigate this further or change the 'scdaemon' to let it
> > directly access the OpenPGP bypassing the 'pcscd' (comments on this
> > are welcome).
> 
> You can use the internal ccid-reader of scdaemon. This should work with
> the OmniKey readers, AFAIK. You have to disable PC/SC, oherwise this
> won't work.

I did so, it shows (as started after boot) the same problem.

> > How can I meanwhile 'reset' the OpenPGP card so that on next request
> > for the secrets (decrypt, signing, ssh) the PIN is requested?
> 
> For the signature PIN just enable the forcepin option as admin with
> --card-edit. The for the other functions you need to power cycle the
> card, easiest done by removal and re-insertion.

Yes, this was what I did before the update :-)

Thanks for your replay anyway.

mattihas
-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP card: how to lock the card again so that PIN is required

2019-01-02 Thread Matthias Apitz
El día miércoles, enero 02, 2019 a las 11:36:54a. m. +0100, Werner Koch 
escribió:

> On Tue,  1 Jan 2019 08:36, g...@unixarea.de said:
> 
> > with the OpenPGP card (HID Global OMNIKEY 6121 Smart Card Reader) after
> 
> Take care: Usual Omnikey problems with creating and using large keys
> apply.

Thanks. But I'm using this card and reader for a long time. And the same 
problem is
with the uTrust reader.

> > How can I meanwhile 'reset' the OpenPGP card so that on next request for
> > the secrets (decrypt, signing, ssh) the PIN is requested?
> 
>   gpgconf --reload scdaemon
> 
> is the easiest way.  You can also use --kill as it is the same for
> scdaemon.

THANKS!!! This works and I now at least can disable the card when I go a
way from the laptop.

BTW: The CCID and the readers have no manuals how, i.e. in which
directions, one has to insert the CCID. Yesterday I took pictures to
have this clear now :-)

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: OpenPGP card: how to lock the card again so that PIN is required

2019-01-05 Thread Matthias Apitz
El día martes, enero 01, 2019 a las 06:40:56p. m. +0100, Dirk Gottschalk 
escribió:

> Hello Matthias.
> 
> Am Dienstag, den 01.01.2019, 08:36 +0100 schrieb Matthias Apitz:
> > Hello,
> 
> > This is with gnupg-2.2.12 and pcsc-lite-1.8.23. After an update of
> > the System (FreeBSD CURRENT) the /usr/local/sbin/pcscd does no work
> > anymore with the OpenPGP card (HID Global OMNIKEY 6121 Smart Card
> > Reader) after withdraw and re-insert. It works fine after boot, I
> > have to enter the PIN to unlock the card and all tested functions are
> > working.
> 
> Did you check the config for pcscd? Probably it was overwrittenby the
> update process.

To close this thread: It turned out being an issue in the USB chips in
my laptop which was not correctly handeled by the USB driver in the
kernel. It is fixed since yesterday with this commit:
https://svnweb.freebsd.org/changeset/base/342778

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


GnuPG: Bad Passphrase (try 2 of 3)

2019-01-07 Thread Matthias Apitz

Hello,

I've GnuPG 2.1.12 on my mobile device (without any OpenPGP card) and
generated there a new secret key to encrypt credentials I'm using on
this device. I was a bit surprised reading (after entering a bas
passphrase for testing):

 
┌┐
 │ Please enter the passphrase to unlock the OpenPGP secret 
key:  │
     │ "Matthias Apitz (BQ E4.5 key) "
  │
 │ 4096-bit RSA key, ID FA46903FD2B8E5E9,   
  │
 │ created 2019-01-07 (main key ID 8F3E3E3C247AB779).   
  │
 │  
  │
 │  
  │
 **> │ Bad Passphrase (try 2 of 3)  
  │
 │  
  │
 │ Passphrase: 
__ │
 │  
  │
 │  
  │
 
└┘

Note: This is not with the PIN of an OpenPGP-card. What would happen
exactly after the 3rd bad value? Destroy of the key or my device? :-)

Thanks

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


OpenPGP card: reader with 2 USB connectors

2019-01-13 Thread Matthias Apitz

Hello,

I'm using an OpenPGP card in my FreeBSD laptop and my Ubuntu mobile
phone (see photo http://www.unixarea.de/UbuntuPhone-GnuPG-card2.jpg )
The read is an Identiv uTrust 3512 SAM slot Token which works just fine
(after solving an issue in the FreeBSD USB driver). To connect it to the
mobile device one needs an small adapter or a cable. See the photo. All
this is not very stable, esp. the connector in the mobile device. Are there any
readers with two USB connectors like some USB memory sticks have?

Thanks

matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Please start a new thread

2019-03-26 Thread Matthias Apitz
El día Tuesday, March 26, 2019 a las 05:00:33PM +0530, Shweta Tyagi escribió:

> Hi Peter,
> How can start a new thread? Please advise.
> if you any solution for this please help me find out the solution.
> 

Hi,

This depends on your Mail User Agent. It means "start a new mail with a
new Subject" to the addr gnupg-users@gnupg.org. DO NOT reply to another
thread when you have a new issue/problem/question.

And, DO NOT top post, btw.

    matthias
-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
October, 7 -- The GDR was different: Peace instead of Bundeswehr and wars, 
Druschba
instead of Nazis, to live instead of to survive.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: ProtonMail and Anonymity

2019-05-05 Thread Matthias Apitz
El día lunes, mayo 06, 2019 a las 07:15:06a. m. +0200, Stefan Claas escribió:

> > > https://protonmail.com/
> > >   
> > 
> > I suppose like anything else it all comes down to whether you believe
> > them or not.  I do.
> 
> [snip]
> 
> Well, I just asked myself ...
> 
> What is the purpose behind an unlinked hash. 
> 
> 

Well, I'm asking myself: What has all this thread to do with GnuPG?

matthias


-- 
Matthias Apitz, ✉ g...@unixarea.de, http://www.unixarea.de/ +49-176-38902045
Public GnuPG key: http://www.unixarea.de/key.pub
May, 9: Спаси́бо освободители! Thank you very much, Russian liberators!


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


  1   2   >