Re: gnutls heartbleed equivalent?

2014-06-02 Thread David Tomaschik
It's actually a memory corruption leading to remote code execution, though it's not clear how reliable the RCE is. (Possibly, if you can heap spray the client?) Technical analysis here: http://radare.today/technical-analysis-of-the-gnutls-hello-vulnerability/. Affects clients only. On Mon, Jun

gnutls heartbleed equivalent?

2014-06-02 Thread Doug Barton
I'm noticing this in today's Ubuntu updates: SECURITY UPDATE: memory corruption due to server hello parsing -debian/patches/CVE-2014-3466.patch: validate session_id_len in lib/gnutls_handshake.c I haven't looked at the code, and the CVE referenced is simply reserved, not populated yet. But that

Re: Installing gnupg-2.022

2014-06-02 Thread Kendrick A. Eastes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Try looking here: http://www.gpg4win.org/doc/en/gpg4win-compendium.html For the most part any Windows 7+ install instructions should work. On June 1, 2014 6:24:49 AM MDT, Jose OCampo wrote: >Hi, > >I spent hours trying to figure out how to get a  

Re: How to determine who signed what

2014-06-02 Thread Rejo Zenger
++ 01/06/14 19:45 +0200 - frank ernest: > Hi again, I have been browsing and downloading gpg signed files and I'm > acctually been downloading the sigs! However, I'm having trouble figuring > out who signed what. Is there some way to determin this using the sig? > Perhaps it has the keys fi

encrypt timestamp file

2014-06-02 Thread Einio, Toni
Hello I like to automate encryption but what parameters I need to use for file which name is changing? Here is my command: gpg -sear --homedir e:\gnu\keys --batch --default-key private...@.fi --passphrase x "E:\Inetpub\wwwroot\usrImport_timestamp.csv" So th

How to determine who signed what

2014-06-02 Thread frank ernest
Hi again, I have been browsing and downloading gpg signed files and I'm acctually been downloading the sigs! However, I'm having trouble figuring out who signed what. Is there some way to determin this using the sig? Perhaps it has the keys fingerpinnt in it or something. For obvious things like th

Installing gnupg-2.022

2014-06-02 Thread Jose OCampo
Hi, I spent hours trying to figure out how to get a  gpg key i was wondering if you can you assist me in installing the gnupd on my windows 8.1 computer so i can get a key. Thanks!___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.or

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread ------ ------
unsubscribe 2014-06-01 16:17 GMT+02:00 Hauke Laging : > Am So 01.06.2014, 12:54:30 schrieb Suspekt: > > > But I yet have to find someone recommending to use the offline mainkey > > also for encryption/decryption of files, that are so important that > > subkey encryption/decryption is not secure

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread Robert J. Hansen
Am also not familiar with any legal tests or precedents, but the following could hypothetically just as easily be argued: The government wants you to do X; you're apparently not complying; you're now before the judge who has to decide whether the government has the power to make you do X. T

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread David Shaw
On Jun 2, 2014, at 11:30 AM, Suspekt wrote: > Am 02.06.2014 17:01, schrieb David Shaw: > > One problem with multiple encryption subkeys is that the person > > encrypting to you doesn't know which one to use. As things stand in > > OpenPGP clients today, unless the person encrypting explicitly > >

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread Hauke Laging
Am Mo 02.06.2014, 17:30:15 schrieb Suspekt: > Correct me if I'm wrong but doesn't GPG prefer the keys created last > over keys created earlier? So it would use the every-day keys by > default and use the high-security keys only if told specifically? What can possibly go wrong... -- Crypto für a

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread Daniel Kahn Gillmor
On 06/02/2014 11:30 AM, Suspekt wrote: > Am 02.06.2014 17:01, schrieb David Shaw: >> One problem with multiple encryption subkeys is that the person >> encrypting to you doesn't know which one to use. As things stand in >> OpenPGP clients today, unless the person encrypting explicitly >> specifies

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread Suspekt
Am 02.06.2014 17:01, schrieb David Shaw: > One problem with multiple encryption subkeys is that the person > encrypting to you doesn't know which one to use. As things stand in > OpenPGP clients today, unless the person encrypting explicitly > specifies which subkey to use (and not all clients eve

Re: fulldisc encryption

2014-06-02 Thread Johan Wevers
On 02-06-2014 16:43, ved...@nym.hush.com wrote: > Is there any crypto-archive that has TrueCrypt 7.1 for Ubuntu? > > (am so used to just doing; ' sudo apt-get install truecrypt ' > which doesn't work anymore because it's no longer on the truecrypt or > sourceforge site) >From what I downloaded

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread vedaal
On 6/1/2014 at 10:55 AM, "David Shaw" wrote: >One reason is that in some places there are legal issues around >this. You can be legally required to give up your encryption key >to the authorities or suffer the consequences (arrest / jail / >etc). The idea is that if you have a different encr

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread David Shaw
On Jun 1, 2014, at 3:25 PM, Suspekt wrote: > OK,lets take the forced-by-law-theory in account. Than the "best" way from a > pure security-standpoint in this regard would be: > 0. OFFline-mainkey (certification of own keys and other people's keys) > -> 1. OFFline-subkey (signing) > -> 2. OFFline-

Re: fulldisc encryption

2014-06-02 Thread vedaal
On 5/30/2014 at 4:55 PM, "Johan Wevers" wrote: >All other solutions I have seen so far are much more limited than >TrueCrypt: they are either for only one OS (usually windows or >Linux), >they are only focussed on whole drive encryption (TrueCrypt >containers >can be ptretty usefull too and wor