RNG: is it possible to spoil /dev/random by seeding it from (evil) TRNGs (was: howto secure older keys after the recent attacks)

2012-10-08 Thread Christoph Anton Mitterer
Hi David. Long time ago, the following[0] ;) I recently stumbled across that question again,... when I deployed haveged on our faculty's HPC cluster... So I've asked[1] around at lkml, whether a malicious (or just bad) entropy source could spoil the kernel's RNG. Ted Ts'o, who currently maintain

[gnupg-users] Change key password in batch mode

2012-10-08 Thread Jaime Fernández
Hi, I want to edit the password in batch mode, I try this: (where 12345 is the old password) $ gpg --batch --passphrase-fd 0 --status-fd 2 --command-fd 0 --edit-key user 12345 [GNUPG:] GET_LINE keyedit.prompt passwd [GNUPG:] GOT_IT [GNUPG:] USERID_HINT 4565CE*** User1 [GNUPG:] NEED_PASSPHR