Re: symmetric email encryption

2014-07-18 Thread Mirimir
On 07/18/2014 08:37 PM, Hauke Laging wrote: > I have prepared a mail file for those who want to give this a try: > > http://www.crypto-fuer-alle.de/docs/mail-symmetric/mail.cr-lf.eml I just emailed that to myself using Thunderbird + Enigmail in Ubuntu. I was prompted for a password, and "foo"

Re: symmetric email encryption

2014-07-18 Thread Hauke Laging
Am Sa 19.07.2014, 01:42:19 schrieb Ingo Klöcker: > If we add enough buttons then users will > eventually start pressing them. (Sorry, for being sarcastic, but I > really don't see how adding another button can possibly improve the > users' willingness to use email encryption.) Yeah and this works

Re: symmetric email encryption

2014-07-18 Thread Hauke Laging
Am Fr 18.07.2014, 22:51:13 schrieb Robert J. Hansen: > > Are symmetric keys more probable to be compromised than asymmetric > > ones? > Immensely. An asymmetric key is a secret held by one person; a > symmetric key is a secret shared by two or more. A factor of two is "immense" to you...? Furthe

Re: symmetric email encryption

2014-07-18 Thread Robert J. Hansen
> Are symmetric keys more probable to be compromised than asymmetric ones? Immensely. An asymmetric key is a secret held by one person; a symmetric key is a secret shared by two or more. > What I am suggesting is neither an alternative to regular OpenPGP > encryption nor meant as "real crypto"

Re: symmetric email encryption

2014-07-18 Thread Hauke Laging
Am Fr 18.07.2014, 13:49:54 schrieb Robert J. Hansen: > If/when a key is compromised, all traffic that has been generated or > will be generated with that key gets compromised, and there's no > guarantee about whether you'll know the key is compromised -- so it's > only sane to have an agreed-upon

Re: symmetric email encryption

2014-07-18 Thread Ingo Klöcker
On Friday 18 July 2014 17:20:27 Hauke Laging wrote: > Am Fr 18.07.2014, 15:40:34 schrieb Ingo Klöcker: > > > And, quite important: It would not require serious > > > > > > development effort as this possibility is built-in with GnuPGP. > > > > I think you underestimate the development effort. >

Re: Mutt: Decrypting inline gpg format directly

2014-07-18 Thread Mathias Bauer
Hello, * Heinz Diehl wrote on Fri, 18 Jul 2014, at 20:59 (+0200): > On 18.07.2014, The Fuzzy Whirlpool Thunderstorm wrote: > > > I wonder if Mutt can be configured to decrypt inline pgp > > messages automatically, without piping the attachment to `gpg > > --decrypt`. > > You can't. Put this into

Re: Mutt: Decrypting inline gpg format directly

2014-07-18 Thread The Fuzzy Whirlpool Thunderstorm
Yeah, thanks for giving me this idea. I've asked on mutt mailing list and got the answer that inline pgp messages can be manually decrypted using ESC + P button. Automatic decryption is invoked by putting `set pgp_auto_decode=yes` on ~/.muttrc file. So this is the most convenient method for me. Aga

Re: symmetric email encryption

2014-07-18 Thread Ingo Klöcker
On Friday 18 July 2014 21:01:54 Peter Lebbing wrote: > On 18/07/14 15:40, Ingo Klöcker wrote: > > OpenPGP keys are created and uploaded to some key server > > automatically, and they are looked up and used automatically > > This creates a privacy issue with key lookup. It exposes > correspondents

Re: symmetric email encryption

2014-07-18 Thread Garreau, Alexandre
On 2014-07-18 at 19:39, Ingo Klöcker wrote: > Sure. But the fingerprint is only used once (for verifying the key). And > it's not even secret information, so exchange via an insecure channel is > not an issue (at least, not a severe issue). > > OTOH, symmetric keys really should be exchanged via

Re: Mutt: Decrypting inline gpg format directly

2014-07-18 Thread Bob Holtzman
On Fri, Jul 18, 2014 at 06:18:39PM +0200, The Fuzzy Whirlpool Thunderstorm wrote: > Hello, > I wonder if Mutt can be configured to decrypt inline pgp messages > automatically, without piping the attachment to `gpg --decrypt`. > I know, piping works, but it'd be more convenient to have mutt do the

Re: symmetric email encryption

2014-07-18 Thread Robert J. Hansen
> I think what Hauke meant was an exchange of the *passphrase* for the > symmetric encryption, not the session key. Same issue, although now you're sharing the seed to a random number generator for which you want the seed to expire very quickly. You can mitigate this somewhat using gating and som

Re: symmetric email encryption

2014-07-18 Thread vedaal
On 7/18/2014 at 1:52 PM, "Robert J. Hansen" wrote: > >> Symmetric keys and fingerprints have to be exchanged through a >secure = I think what Hauke meant was an exchange of the *passphrase* for the symmetric encryption, not the session key. The symmetric keys would always change with ea

Re: Mutt: Decrypting inline gpg format directly

2014-07-18 Thread Heinz Diehl
On 18.07.2014, The Fuzzy Whirlpool Thunderstorm wrote: > I wonder if Mutt can be configured to decrypt inline pgp messages > automatically, without piping the attachment to `gpg --decrypt`. You can't. Put this into your .procmailrc. It'll transform your inline pgp mails accordingly: :0 * !^Con

Re: symmetric email encryption

2014-07-18 Thread Peter Lebbing
On 18/07/14 15:40, Ingo Klöcker wrote: > OpenPGP keys are created and uploaded to some key server > automatically, and they are looked up and used automatically This creates a privacy issue with key lookup. It exposes correspondents to the keyserver, including time-of-use. Also, you need to defin

Re: symmetric email encryption

2014-07-18 Thread Robert J. Hansen
> Symmetric keys and fingerprints have to be exchanged through a secure > channel only once. Whoa, let's back that up a moment. Fingerprints and symmetric keys need to be exchanged *as often as they change*. Which, in the case of symmetric keys, is quite frequently. If/when a key is compromised

Re: symmetric email encryption

2014-07-18 Thread Ingo Klöcker
On Friday 18 July 2014 19:21:05 Hauke Laging wrote: > Am Fr 18.07.2014, 09:46:14 schrieb Doug Barton: > > Hauke, > > > > I think you skated past a previous question about your idea, and I'm > > also interested in the answer so I'll ask it again. :) > > > > If you have a secure channel of communic

Re: Different passwords for subkeys

2014-07-18 Thread Deacon Symeon
On 07/16/2014 09:24 PM, Phillip Susi wrote: > I would like to protect the master key with a password that is different > from that used on the daily use subkey I take the Low Road and use two different key rings, the "master" key ring in a non-default location ("gpg --homedir /path/to/master .

Re: symmetric email encryption

2014-07-18 Thread Hauke Laging
Am Fr 18.07.2014, 09:46:14 schrieb Doug Barton: > Hauke, > > I think you skated past a previous question about your idea, and I'm > also interested in the answer so I'll ask it again. :) > > If you have a secure channel of communication by which you can > exchange the symmetric password (which yo

Re: symmetric email encryption

2014-07-18 Thread Doug Barton
Hauke, I think you skated past a previous question about your idea, and I'm also interested in the answer so I'll ask it again. :) If you have a secure channel of communication by which you can exchange the symmetric password (which you would need to make your scheme work), why don't you use

APDU buffer in pcsc-wrapper too short

2014-07-18 Thread Andreas Schwier
While scd/apdu.c assumes a maximum length of 4096 byte for an extended length APDU, scd/pcsc-wrapper allocates only 1024 byte for the response. As most certificates are larger than 1024, reading them with extended length fails. The attached patch fixes the buffer size. Andreas >From 937a7660c83c

Mutt: Decrypting inline gpg format directly

2014-07-18 Thread The Fuzzy Whirlpool Thunderstorm
Hello, I wonder if Mutt can be configured to decrypt inline pgp messages automatically, without piping the attachment to `gpg --decrypt`. I know, piping works, but it'd be more convenient to have mutt do the piping task and automatically display the decrypted message inside. If anyone has an idea o

Re: symmetric email encryption

2014-07-18 Thread Hauke Laging
Am Fr 18.07.2014, 15:40:34 schrieb Ingo Klöcker: > > And, quite important: It would not require serious > > development effort as this possibility is built-in with GnuPGP. > > I think you underestimate the development effort. That is easily possible. But what would have to be done (at least)?

scdaemon support for SmartCard-HSM

2014-07-18 Thread Andreas Schwier
Hi list, we've added support for the SmartCard-HSM to scdaemon. Please find the patch that applies to master at [1]. The driver allows read/only operations with keys and certificates on a SmartCard-HSM. To generate keys and certificates please use OpenSC, XCA or the tools in OpenSCDP. There are

Re: symmetric email encryption

2014-07-18 Thread Ingo Klöcker
On Friday 18 July 2014 02:03:24 Hauke Laging wrote: > Hello, > > is there any OpenPGP mail client which supports symmetric encryption? KMail does not. At least, KMail does not support creating such messages. It's possible that KMail would be able to read such messages since the decryption is de

Re: symmetric email encryption

2014-07-18 Thread Thomas Asta
Evaluate http://bitmail.sf.net Am 18.07.2014 02:04 schrieb "Hauke Laging" : > Hello, > > is there any OpenPGP mail client which supports symmetric encryption? > > I think that would be a nice feature for recipients who don't have an > asymmetric key (those 99%). Many new communication systems have

Aw: Re: Encrypt directly to keyfile

2014-07-18 Thread Matthias Fischer
Hauke schrieb: > Why should a feature be added that can so easily be emulated by a simple > script? To spare people the work of writing the same „simple script“ over and over again. > gpgdir="/tmp/keyring.$$" > test -d "$gpgdir" && rm -r "$gpgdir" > gpg --homedir "$gpgdir" --import KEYFILE > KE