Re: Memory forensics

2010-03-05 Thread Robert J. Hansen
> > Thanks a million for all this. The company "Volatile Systems" was > really messing with my google-fu. Err -- why? Volatile Systems is behind the Volatility framework, which is probably the best FOSS tool going right now for Windows memory analysis. (Admittedly, it only works on Windows X

OpenPGPCard Max PIN length changes?

2010-03-05 Thread KT
>From what I understand, the v1.1 cards had a max pin length of 254 characters. Is this not the case with the newer v2.0 cards? My v2.0 card shows Max. PIN lengths .: 32 32 32. Is this a setting that can be changed? I didn't see anything in card-edit, and have I been digging around online, but ha

Re: Memory forensics

2010-03-05 Thread Grant Olson
On 03/05/2010 05:18 PM, Robert J. Hansen wrote: > On 3/5/10 5:04 PM, Grant Olson wrote: >> That article was a little vague. And I don't know much about memory >> forensics in practice. Do you know that it actually was a hibernation >> file and not swap space? > > Note Jesse's phrasing: "volatile

Re: Memory forensics

2010-03-05 Thread Robert J. Hansen
On 3/5/10 5:04 PM, Grant Olson wrote: > That article was a little vague. And I don't know much about memory > forensics in practice. Do you know that it actually was a hibernation > file and not swap space? Note Jesse's phrasing: "volatile memory forensics." Swap space is nonvolatile storage.

Re: Memory forensics

2010-03-05 Thread Grant Olson
On 3/5/2010 4:30 PM, Robert J. Hansen wrote: > http://jessekornblum.livejournal.com/259124.html > > For quite some time we've known that hibernation files present risks for > information security. However, there are always those who say "until I > see an actual demonstration, I won't believe it."

Re: Memory forensics

2010-03-05 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert J. Hansen wrote: > http://jessekornblum.livejournal.com/259124.html > > For quite some time we've known that hibernation files present risks for > information security. However, there are always those who say "until I > see an actual demonst

Memory forensics

2010-03-05 Thread Robert J. Hansen
http://jessekornblum.livejournal.com/259124.html For quite some time we've known that hibernation files present risks for information security. However, there are always those who say "until I see an actual demonstration, I won't believe it." The upshot: we now have an actual demonstration. The

Re: Migrating from PGP to GPG question

2010-03-05 Thread John Clizbe
Daniel Kahn Gillmor wrote: > On 03/05/2010 01:30 AM, Smith, Cathy wrote: >> The gpg --list-sig shows that the keys are signed. Do I need to create a >> new signature key, and re-sign all the public keys that I imported? > > I think the simplest thing for you to do is to modify the ownertrust of >

RE: Migrating from PGP to GPG question

2010-03-05 Thread Smith, Cathy
Folks Thanks for your suggestions. They worked. Regards, Cathy --- Cathy L. Smith IT Engineer Pacific Northwest National Laboratory Phone:  509.375.2687 Fax:    509.375.2330 Email: cathy.sm...@pnl.gov -Original Message- From: gnupg-users-boun...@gnupg.org [mailto:gnupg-use

Re: manipulating the set of keys that can decrypt a file/message

2010-03-05 Thread David Shaw
On Mar 5, 2010, at 9:51 AM, Nicolas Boullis wrote: > On Thu, Mar 04, 2010 at 06:13:17PM -0500, David Shaw wrote: >> On Mar 4, 2010, at 4:34 PM, Nicolas Boullis wrote: >> >>> Reading RFC 4880 (OpenPGP standard), if I am able to decrypt the session >>> key, it should be possible to create a new Pu

Re: manipulating the set of keys that can decrypt a file/message

2010-03-05 Thread Robert J. Hansen
On 3/5/10 9:51 AM, Nicolas Boullis wrote: > I will now have a look at how things are organised in GnuPG code. > Would you suggest that I look at the GnuPG 1 or GnuPG 2 code? If memory serves, the codebases are identical with respect to this. Shouldn't matter which one you use. > And if I succeed

Re: manipulating the set of keys that can decrypt a file/message

2010-03-05 Thread Nicolas Boullis
On Thu, Mar 04, 2010 at 06:13:17PM -0500, David Shaw wrote: > On Mar 4, 2010, at 4:34 PM, Nicolas Boullis wrote: > > > Reading RFC 4880 (OpenPGP standard), if I am able to decrypt the session > > key, it should be possible to create a new Public-Key Encrypted Session > > Key packet to allow a ne

Re: Migrating from PGP to GPG question

2010-03-05 Thread Daniel Kahn Gillmor
On 03/05/2010 01:30 AM, Smith, Cathy wrote: > The gpg --list-sig shows that the keys are signed. Do I need to create a > new signature key, and re-sign all the public keys that I imported? I think the simplest thing for you to do is to modify the ownertrust of your old signing key on the new in

Re: Migrating from PGP to GPG question

2010-03-05 Thread David Shaw
On Mar 5, 2010, at 7:39 AM, John W. Moore III wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Laurent Jumet wrote: >> >> Hello Smith, ! >> >> "Smith, Cathy" wrote: >> >>> I've tried using the --yes option without success to suppress this >>> interactive prompt doesn't pop up.

Re: Migrating from PGP to GPG question

2010-03-05 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Laurent Jumet wrote: > > Hello Smith, ! > > "Smith, Cathy" wrote: > >> I've tried using the --yes option without success to suppress this >> interactive prompt doesn't pop up. This encryption does need to run in a >> batch job. What do I need t