Re: adding text to detached signature files

2011-10-13 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Friday 14 October 2011 at 12:08:12 AM, in , Hauke Laging wrote: > Probably most of you have experienced the "What strange > attachment have you sent to me in your email? I can't > open that..." effect. In order to minimize that I think > of

Re: adding text to detached signature files

2011-10-13 Thread Doug Barton
Wouldn't --comment be easier? -- Nothin' ever doesn't change, but nothin' changes much. -- OK Go Breadth of IT experience, and depth of knowledge in the DNS. Yours for the right price. :) http://SupersetSolutions.com/

adding text to detached signature files

2011-10-13 Thread Hauke Laging
Hello, I am building a system at work for automatic creation of PDF files and sending them by mail. I am thinking about adding a signature file (not by the key of the sendig person but by a key belonging to the mail system; similar to a gateway signing solution just not singing the whole mail

Re: Useful factoid

2011-10-13 Thread Michel Messerschmidt
On Thu, Oct 13, 2011 at 10:03:56AM -0400, Jean-David Beyer wrote: > It seems to me that to do much damage to my machine, you need to get a > shell with root access. Depends on what you regard as damage. Do you need root privileges to use your private gpg keys ??? > I never run a web browser as

Re: Useful factoid

2011-10-13 Thread Jerry
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thu, 13 Oct 2011 10:03:56 -0400 Jean-David Beyer articulated: > At one extreme, the only way to be pretty safe is to have a machine > that is not connected to the Internet, and have U.S.Marines to guard > the hardware and access to it. "The only s

Re: Useful factoid

2011-10-13 Thread Robert J. Hansen
On 10/13/11 10:03 AM, Jean-David Beyer wrote: > It seems to me that to do much damage to my machine, you need to get a > shell with root access. And to do that, do you not pretty much need the > root password? Nope. Local exploits are enough. Take a look at the kernel.org exploit as an example.

Re: Useful factoid

2011-10-13 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Robert J. Hansen wrote: > On 10/11/2011 05:14 PM, Jean-David Beyer wrote: >> Let us assume you are the bad guy > > Okay. > >> Unless you have my encrypted keys, you have to access my computer >> (unless you have already stolen it, in which case ther

Re: Useful factoid

2011-10-13 Thread Melvin Carvalho
On 11 October 2011 22:32, Robert J. Hansen wrote: > Accurate to 6%, there are 2**25 seconds in a year.  Worth remembering: > it makes certain kinds of computations much easier.  (It follows there > would be about 2**35 seconds in a thousand years, or 2**45 seconds in a > million.) > > E.g., let's

Key revocation UI confusion

2011-10-13 Thread Andy Bennett
Hi, I've been happily using my key for many years. It started off in PGP on Windows and I imported it into GnuPG 1.4.9 on Debian Lenny a few years ag= o. At that time I revoked a few of the old UIDs and the encryption subkey. I then created a new encryption subkey which I've been using ever since.

Re: Useful factoid

2011-10-13 Thread Robert J. Hansen
On 10/13/2011 8:29 AM, Jerome Baum wrote: > I didn't say anything (modulo "Take a look"). At this point it seems to me you're being deliberately obtuse. Have a nice day. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/

Re: Useful factoid

2011-10-13 Thread Jerome Baum
On 2011-10-13 14:14, Robert J. Hansen wrote: > On 10/13/11 7:51 AM, Jerome Baum wrote: >> Take a look: > > I did. You said I have to access your computer, to try logging in > through the Internet. I don't. I just have to find an exploit. I didn't say anything (modulo "Take a look"). > Saying

Re: Useful factoid

2011-10-13 Thread Robert J. Hansen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/13/11 7:51 AM, Jerome Baum wrote: > Take a look: I did. You said I have to access your computer, to try logging in through the Internet. I don't. I just have to find an exploit. Saying "my front door is locked" is great, but it's not so gr

Re: Useful factoid

2011-10-13 Thread Jerome Baum
> Hold on a second there. You seem to be making some extremely > unwarranted assumptions. Take a look: >> Unless you have my encrypted keys, you have to access my computer >> (unless you have already stolen it, in which case there are much >> easier ways to invade the machine), you will have

Re: Useful factoid

2011-10-13 Thread Robert J. Hansen
On 10/11/2011 05:14 PM, Jean-David Beyer wrote: > Let us assume you are the bad guy Okay. > Unless you have my encrypted keys, you have to access my computer > (unless you have already stolen it, in which case there are much > easier ways to invade the machine), you will have to try logging in >