Re: Using pinentry-curses interactively in Linux boot process fails (SOLVED)

2010-07-24 Thread Malte Gell
Hi there, > Besides, holding a GPG encrypted keyfile on unencrypted space to open a > LUKS/dmcrypt encrypted device, opening/decrypting the keyfile in the boot > process by entering the correct passphrase, to finally open the > LUKS/dmcrypt secured device seems broken to me. Can you explain, why

Re: GPG2 SSH SmartCard Private Key Auth

2010-07-24 Thread Frank Stefan Sundberg Solli
On 24.07.10 08:21, Werner Koch wrote: The problem though is when I'm trying to get SSH to work with it. It wont authenticate. Does "ssh-add -l" sdhow the key? Yes it shows up here 2010-07-23 20:01:57 gpg-agent[1315] gpg-agent (GnuPG) 2.0.13 started It would better to try 2.0.16 becuase that

Re: SHA2 digest, V2 smartcard and gpg-agent problem

2010-07-24 Thread Werner Koch
Stanislav Sidorenko writes: > I've made a quick&dirty fix that enables using SHA256 instead of RIPEMD160. > hashalgo == GCRY_MD_SHA256? "--hash=sha256 ": "", > Okay. I just fixed that and gnupg 1 will now allow all hash algorithms. Note that this change is only required if

Re: GPG2 SSH SmartCard Private Key Auth

2010-07-24 Thread Werner Koch
> The problem though is when I'm trying to get SSH to work with it. It > wont authenticate. Does "ssh-add -l" sdhow the key? > 2010-07-23 20:01:57 gpg-agent[1315] gpg-agent (GnuPG) 2.0.13 started It would better to try 2.0.16 becuase that is the one I can test. > 2010-07-23 20:03:38 gpg-agen

Re: Using pinentry-curses interactively in Linux boot process fails (SOLVED)

2010-07-24 Thread Heinz Diehl
On 23.07.2010, Grant Olson wrote: > Just keep in mind that if you're not encrypting the whole disk, your > sensitive data can leak to /tmp and swap. I'm only bringing this up > because it seems like you've taken some elaborate steps to protect your > data. I second that. Besides, holding a GP