Re: Mac OS X 10.8 and OpenPGP Cards

2012-07-29 Thread Kevin Kammer
On Fri, Jul 27, 2012 at 08:45:51PM +0200 Also sprach Richard Höchenberger: > On 27/7/2012 20:12, Kevin Kammer wrote: > > It has been so long since I had to mess with it (on my mac anyway) that > > I don't remember. Which libraries do you mean? > > I never had to install any additional libraries,

Re: GPG key to authenticate to SSH?

2012-07-29 Thread Jeroen Budts
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 07/25/2012 12:04 PM, Werner Koch wrote: > On Tue, 24 Jul 2012 22:04, jer...@budts.be said: > >> apparently they didn't work. Now I completely disabled 'Launch >> GNOME services on startup' in XFCE so gnome-keyring is not >> started anymore. Now I

Re: Possible bug in gpg?

2012-07-29 Thread David Shaw
On Jul 29, 2012, at 9:29 AM, Johan Wevers wrote: > On 29-07-2012 6:48, David Shaw wrote: > >> To combat this, OpenPGP has two "quick check" bytes in the encrypted data >> packet. >> Basically, they're a repetition of two random bytes from earlier in > the message. > > Does this not lead to a po

Re: Possible bug in gpg?

2012-07-29 Thread Robert J. Hansen
On 7/29/2012 9:29 AM, Johan Wevers wrote: > Does this not lead to a possible known-plaintext attack on gpg? At risk of seeming condescending -- There is no such thing as a known-plaintext attack on GnuPG. There are only known-plaintext attacks against the algorithms in GnuPG. Since there are no

Re: Possible bug in gpg?

2012-07-29 Thread Johan Wevers
On 29-07-2012 6:48, David Shaw wrote: > To combat this, OpenPGP has two "quick check" bytes in the encrypted data > packet. > Basically, they're a repetition of two random bytes from earlier in the message. Does this not lead to a possible known-plaintext attack on gpg? -- ir. J.C.A. Wevers PG

Re: Possible bug in gpg?

2012-07-29 Thread Brad Tilley
>> Hi, >> I have a symmetrically encrypted pgp file here: >> http://16s.us/word_machine/downloads/pgp-easy.tgz.pgp >> gpg will accept the three characters !=X as the password and exit with a return status of 0 (although it does not actually decrypt the file): >> $ gpg -d pgp-easy.tgz.pgp gpg: CAST5