Re: How much load are keyservers willing to handle?

2013-12-18 Thread adrelanos
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Jason Harris: > On Wed, Dec 18, 2013 at 10:20:26PM +, adrelanos wrote: > >> I am planing to write a script, which will refresh the apt >> signing key before updating using "apt-get update". The script >> might get accepted in Debian. [1] With my

Re: How much load are keyservers willing to handle?

2013-12-18 Thread adrelanos
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert J. Hansen: >> I am planing to write a script, which will refresh the apt >> signing key before updating using "apt-get update". > > The question I have is, "What problem are you trying to solve?" What in case the apt signing key gets comprom

Re: How much load are keyservers willing to handle?

2013-12-18 Thread Robert J. Hansen
> I am planing to write a script, which will refresh the apt signing key > before updating using "apt-get update". The question I have is, "What problem are you trying to solve?" I am certain that Debian Security already has a protocol in place for how to handle compromised certificates. Is this

Re: How much load are keyservers willing to handle?

2013-12-18 Thread Jason Harris
On Wed, Dec 18, 2013 at 10:20:26PM +, adrelanos wrote: > I am planing to write a script, which will refresh the apt signing key > before updating using "apt-get update". The script might get accepted in > Debian. [1] With my Whonix hat on, it's safe to say, that this script > will be added to

How much load are keyservers willing to handle?

2013-12-18 Thread adrelanos
Hi, I am planing to write a script, which will refresh the apt signing key before updating using "apt-get update". The script might get accepted in Debian. [1] With my Whonix hat on, it's safe to say, that this script will be added to Whonix (which is a derivative of Debian). Writing that script

Re: Sharing/Storing a private key

2013-12-18 Thread Mindiell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Well, I'm really sorry to have set up such a conversation :o) As I said earlier I'm not quite good at crypto-things, all I wanted to do was to protect my private key easily in case of HDD error. And all I wanted to do with this little tool was to

Re: gpgsm, certificate expired, different certificate, epa does not encrypt

2013-12-18 Thread Uwe Brauer
>> "Jens" == Jens Lechtenboerger >> writes: > On Mi, Dez 18 2013, Uwe Brauer wrote: >> I am using Xemacs, gnus the epa pkg for encrypting s/mime using gpgsm. >> > Hi Uwe, > if I understand you correctly, you fail to encrypt to your From > address, right? Not really, my fro

Re: encryption algorithm

2013-12-18 Thread David Shaw
On Dec 18, 2013, at 5:41 AM, Werner Koch wrote: > On Wed, 18 Dec 2013 02:27, r...@sixdemonbag.org said: > >> because you just shifted to arguing that "since GnuPG defaults to >> AES-256, we need to use RSA-15000 by default otherwise the asymmetric > > FWIW: > >The rationale why we use the

Re: Sharing/Storing a private key

2013-12-18 Thread Robert J. Hansen
On 12/18/2013 1:25 PM, Doug Barton wrote: > (Robert, please ignore my tortuous use of "secure" in that sentence.) :) Hey, I was being *nice*. I wasn't even pointing out that 3DES only has 112 bits of keyspace... ;) ___ Gnupg-users mailing list Gnupg-u

Re: Sharing/Storing a private key

2013-12-18 Thread Doug Barton
On 12/18/2013 08:53 AM, Peter Lebbing wrote: On 16/12/13 23:41, Doug Barton wrote: but one argument against what you're suggesting is that it's only as secure as the encryption used in step 1 of the hybrid approach. If only everything in cryptoland was "only as secure as 3DES"... I understan

GPG Blog: Getting Goteo approval

2013-12-18 Thread Sam Tuke
Getting Goteo approval == Posted 18th December 2013 by Sam Tuke http://blog.gnupg.org/20131218-getting-goteo-approval.html The targets are set, the rewards are prepared, the press release has been edited and translated, and now we’re waiting for approval from the crowdfunding

Re: gpg-rsa-key decryption with a mobile

2013-12-18 Thread Werner Koch
On Wed, 18 Dec 2013 18:31, sys...@ioioioio.eu said: > "Here, we describe a new acoustic cryptanalysis key extraction attack, > applicable to GnuPG's current implementation of RSA. The attack can Well that is what I posted a few hours ago to this list ;-). Salam-Shalom, Werner -- Die Gedan

Re: Another step towards crowdfunding

2013-12-18 Thread Doug Barton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/18/2013 07:32 AM, Sam Tuke wrote: | On 18/12/13 00:01, Micah Lee wrote: |> The problem is you're wanting to make GnuPG go mainstream but then you end |> up with people seeing this: http://i.imgur.com/53nvUqm.png | | Yup. That should be avoided

gpg-rsa-key decryption with a mobile

2013-12-18 Thread sys...@ioioioio.eu
"Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the de

Re: gpgsm, certificate expired, different certificate, epa does not encrypt

2013-12-18 Thread Jens Lechtenboerger
On Mi, Dez 18 2013, Uwe Brauer wrote: > I am using Xemacs, gnus the epa pkg for encrypting s/mime using gpgsm. > > I have several email accounts with different (comodo certificates). > Now one certificate for the address addre...@gmail.com has expired. > > However I want to send an email from add

Re: Sharing/Storing a private key

2013-12-18 Thread Peter Lebbing
On 16/12/13 23:41, Doug Barton wrote: > but one argument against what you're suggesting is that it's only as secure > as the encryption used in step 1 of the hybrid approach. If only everything in cryptoland was "only as secure as 3DES"... > The ability to apply SSS to the entire secret would be

Re: [Announce] [security fix] GnuPG 1.4.16 released

2013-12-18 Thread Charly Avital
Werner Koch wrote on 12/18/13, 4:05 PM: > Hello! > > Along with the publication of an interesting new side channel attack by > Daniel Genkin, Adi Shamir, and Eran Tromer we announce the availability > of a new stable GnuPG release to relieve this bug: Version 1.4.16. > > This is a *security fix*

Re: FAQ? Re: please give us safer defaults for gnupg

2013-12-18 Thread Werner Koch
On Wed, 18 Dec 2013 16:09, bernh...@intevation.de said: > What about placing this as an FAQ in the wiki.gnupg.org? We have a FAQ which answers a lot of questions around key sizes in “Advanced Topics” section. If something is missing it can easily be added. Salam-Shalom, Werner -- Die Ged

Re: Another step towards crowdfunding

2013-12-18 Thread Sam Tuke
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 18/12/13 00:01, Micah Lee wrote: > The problem is you're wanting to make GnuPG go mainstream but then you end > up with people seeing this: http://i.imgur.com/53nvUqm.png Yup. That should be avoided. However there are only a few pages that critic

FAQ? Re: please give us safer defaults for gnupg

2013-12-18 Thread Bernhard Reiter
Am Montag, 16. Dezember 2013 20:42:54 schrieb Werner Koch: > May I suggest to read the archives of just a few weeks to collect the > reasons why suggestions of using SHA-512 are missing the point.  Some > folks here must have bleeding fingertips from repeating the arguments > over and over. What a

Re: [Announce] [security fix] GnuPG 1.4.16 released // workaround

2013-12-18 Thread vedaal
On Wednesday, December 18, 2013 at 9:25 AM, "Werner Koch" wrote: >The paper describes two attacks. The first attack allows to >distinguish >keys: An attacker is able to notice which key is currently used for >decryption. ... > While listening to the acoustic >emanations of >the targeted ma

Re: Another step towards crowdfunding

2013-12-18 Thread Werner Koch
On Tue, 17 Dec 2013 20:40, c...@rheloud.net said: > How about an RSS-Feed. We used to have one for the News. It is currently disabled but will come back with the new website. Shalom-Salam, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. ___

[Announce] [security fix] GnuPG 1.4.16 released

2013-12-18 Thread Werner Koch
Hello! Along with the publication of an interesting new side channel attack by Daniel Genkin, Adi Shamir, and Eran Tromer we announce the availability of a new stable GnuPG release to relieve this bug: Version 1.4.16. This is a *security fix* release and all users of GnuPG versions 1.x are advise

Re: encryption algorithm

2013-12-18 Thread Robert J. Hansen
On 12/18/2013 2:18 AM, Daniel Kahn Gillmor wrote: > Sorry, but NIST does face a crisis of trust, particularly in the area of > cryptography, whether either of us wants that to happen or not. Perhaps: but *not over the PRNG they published*. Please stay on point. You are demonstrating a tendency h

Re: Synchronize UID lists on public and private key -- how?

2013-12-18 Thread Hauke Laging
Am Di 17.12.2013, 10:40:21 schrieb Doug Barton: > On 12/17/2013 01:09 AM, Lev Serebryakov wrote: > | Is it possible to synchronize UID list without transferring "new" > > version > > | of private key from B to A by external means? > > No. I can reproduce the problem but it doesn't make any se

Re: encryption algorithm

2013-12-18 Thread Matt D
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/18/2013 12:05 AM, Robert J. Hansen wrote: >> So in other words the message can not be read by some govt genius >> with a rack of computers?? > > How would I know? Ask a government genius with a rack of > computers. > > I don't know the extent

Re: encryption algorithm

2013-12-18 Thread Werner Koch
On Wed, 18 Dec 2013 02:27, r...@sixdemonbag.org said: > because you just shifted to arguing that "since GnuPG defaults to > AES-256, we need to use RSA-15000 by default otherwise the asymmetric FWIW: The rationale why we use the order AES256,192,128 is for compatibility reasons with PGP.

gpgsm, certificate expired, different certificate, epa does not encrypt

2013-12-18 Thread Uwe Brauer
Hello I am using Xemacs, gnus the epa pkg for encrypting s/mime using gpgsm. I have several email accounts with different (comodo certificates). Now one certificate for the address addre...@gmail.com has expired. However I want to send an email from address2 (whose certificate is *not* expired

Re: ECC curves used in gnupg?

2013-12-18 Thread Werner Koch
On Tue, 17 Dec 2013 20:01, anth...@cajuntechie.org said: > I know that gnupg is experimenting with ECC and I'm wondering which > curves the team has decided to use. I know there are some curves that > are now suspected of being tainted by the NSA through NIST. Has the > gnupg team ruled using those

Re: ECC curves used in gnupg?

2013-12-18 Thread Michael Anders
On Tue, 2013-12-17 at 13:01 -0600, Anthony Papillion wrote: > I know that gnupg is experimenting with ECC and I'm wondering which > curves the team has decided to use. I know there are some curves that > are now suspected of being tainted by the NSA through NIST. Has the > gnupg team ruled using th