Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Wednesday 23 November 2016 at 3:48:19 AM, in , Carola Grunwald wrote:- > This concept of an enhanced transport security layer > offers external > adversaries least possible information while it > doesn't preclude the > sender from adding anoth

Re: How to prevent passphrase caching in 2.1

2016-11-23 Thread Carola Grunwald
Daniel Kahn Gillmor wrote: >On Wed 2016-11-23 03:46:57 -0500, Carola Grunwald wrote: >> With GnuPG 1.4 I had no agent. And, in case it is, I've no idea why with >> 2.x such a passphrase cache with all its risks has to be mandatory. > >in 2.0, the agent is a passphrase cache. in 2.1, the agent is

Re: Trying to figure out what's going on with a key update failure...

2016-11-23 Thread Anthony Papillion
On 11/23/2016 3:10 PM, Stephan Beck wrote: > > > Anthony Papillion: >> Hello Everyone, >> >> When I run >> >> gpg2 --keyserver --refresh-keys >> >> I get a list of all of the keys in my keyring with the message that they >> have not been changed (this is expected). At the bottom of the output, I

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Carola Grunwald
Peter Lebbing wrote: >On 23/11/16 18:54, Carola Grunwald wrote: >> Which relevant information does the single Received: header, describing >> the recipient MTA's interaction with the exit remailer, leak? > >If you sign the data just before the interaction, the signature time and >the time noted i

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Carola Grunwald
Andrew Gallagher wrote: >On 23/11/16 17:54, Carola Grunwald wrote: >> Andrew Gallagher wrote: >> >>> If you are worried about an attacker on the wire doing statistical >>> analysis of your message sizes and patterns of use, you will >>> probably have to go the whole hog and transport over Tor. A

Re: Trying to figure out what's going on with a key update failure...

2016-11-23 Thread Stephan Beck
Anthony Papillion: > Hello Everyone, > > When I run > > gpg2 --keyserver --refresh-keys > > I get a list of all of the keys in my keyring with the message that they > have not been changed (this is expected). At the bottom of the output, I > see the following message: > > gpg: Total number p

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Peter Lebbing
On 23/11/16 18:54, Carola Grunwald wrote: > Which relevant information does the single Received: header, describing > the recipient MTA's interaction with the exit remailer, leak? If you sign the data just before the interaction, the signature time and the time noted in the Received:-header are vi

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Andrew Gallagher
On 23/11/16 17:54, Carola Grunwald wrote: > Andrew Gallagher wrote: > >> If you are worried about an attacker on the wire doing statistical >> analysis of your message sizes and patterns of use, you will >> probably have to go the whole hog and transport over Tor. And even >> that is no panacea.

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Carola Grunwald
Andrew Gallagher wrote: > >> On 23 Nov 2016, at 03:48, Carola Grunwald wrote: >> >> But why does a person have to be in control of a signature key? Why not >> a server in the name of a company resp. its employees. > >There is no problem having a server in control of a key. Just so long as we >

Re: How to prevent passphrase caching in 2.1

2016-11-23 Thread Daniel Kahn Gillmor
On Wed 2016-11-23 03:46:57 -0500, Carola Grunwald wrote: > With GnuPG 1.4 I had no agent. And, in case it is, I've no idea why with > 2.x such a passphrase cache with all its risks has to be mandatory. in 2.0, the agent is a passphrase cache. in 2.1, the agent is a proper cryptographic agent, whi

Trying to figure out what's going on with a key update failure...

2016-11-23 Thread Anthony Papillion
Hello Everyone, When I run gpg2 --keyserver --refresh-keys I get a list of all of the keys in my keyring with the message that they have not been changed (this is expected). At the bottom of the output, I see the following message: gpg: Total number processed: 31 gpg: unchanged: 3

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Carola Grunwald
Peter Lebbing wrote: >On 23/11/16 10:53, Andrew Gallagher wrote: >> If the message is being automatically decrypted at the MTA then it >> provides no more security than TLS. > >I could concur with this statement if we amend it a little: when two >MTA's are explicitly configured as TLS peers. They

Re: configure warnings and errors upon ./configure for Pinentry v0.9.7

2016-11-23 Thread Stephan Beck
Peter Lebbing: > On 23/11/16 11:14, Stephan Beck wrote: >> [...] and properly symlink >> /usr/bin/pinentry to the pinentry-curses you actually would like to use >> if you are using text-mode only, I don't know why it should not work. > [...]So by installing the Debian pinentry-curses > package,

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Stephan Beck
Peter Lebbing: > On 23/11/16 10:53, Andrew Gallagher wrote: >> If the message is being automatically decrypted at the MTA then it >> provides no more security than TLS. > > I could concur with this statement if we amend it a little: when two > MTA's are explicitly configured as TLS peers. They h

Re: Primary and Signing Key on Different Smart Cards

2016-11-23 Thread Peter Lebbing
On 21/11/16 12:04, Peter Lebbing wrote: > Ah! I don't have time right now, but once I do, I'll try to see to write > up some instructions... Here are instructions for doing this on 2.1. First let me point out: On 20/11/16 22:50, Anton Marchukov wrote: > I think you will have to keep it as backup

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Andrew Gallagher
On 23/11/16 10:19, Peter Lebbing wrote: > I could concur with this statement if we amend it a little: when two > MTA's are explicitly configured as TLS peers. Absolutely. But if you're using a non-standard protocol, then you also need to explicitly configure both sides. So in practical terms ther

Re: configure warnings and errors upon ./configure for Pinentry v0.9.7

2016-11-23 Thread Peter Lebbing
On 23/11/16 07:44, David Adamson wrote: > Werner was GTK+-2.0 a potential option for an appropriate development > package for the GUI platform? (I'm not Werner :) Yes, GTK+-2 is one of the pinentries. It's the one I use, on my XFCE Debian jessie. > gpg: lookup_hashtable failed: Unknown system err

Re: configure warnings and errors upon ./configure for Pinentry v0.9.7

2016-11-23 Thread Peter Lebbing
On 23/11/16 11:14, Stephan Beck wrote: > [...] and properly symlink > /usr/bin/pinentry to the pinentry-curses you actually would like to use > if you are using text-mode only, I don't know why it should not work. Good one, the symlink. It makes me wonder: is the agent looking in the right place f

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Peter Lebbing
On 23/11/16 10:53, Andrew Gallagher wrote: > If the message is being automatically decrypted at the MTA then it > provides no more security than TLS. I could concur with this statement if we amend it a little: when two MTA's are explicitly configured as TLS peers. They have to abort the mail excha

Re: configure warnings and errors upon ./configure for Pinentry v0.9.7

2016-11-23 Thread Stephan Beck
Hi, David Adamson: > On Mon, Nov 21, 2016 at 8:15 PM, Stephan Beck wrote: >> Ah, I forgot one thing: you have to add the following to your ~/.bashrc >> file: >> GPG_TTY=$(tty) >> export GPG_TTY >> >> Does it work now? >> >> HTH >> >> Stephan > > Stephan I updated the .bashrc file in my home dire

Re: Implications of a common private keys directory in 2.1

2016-11-23 Thread Andrew Gallagher
> On 23 Nov 2016, at 03:48, Carola Grunwald wrote: > > But why does a person have to be in control of a signature key? Why not > a server in the name of a company resp. its employees. There is no problem having a server in control of a key. Just so long as we understand that the key is now the

Re: How to prevent passphrase caching in 2.1

2016-11-23 Thread Carola Grunwald
Daniel Kahn Gillmor wrote: >On Tue 2016-11-22 11:20:26 -0500, Carola Grunwald wrote: >> They don't have direct access to any key. Nevertheless by using someone >> else's cached passphrase with 2.1 and its all-embracing keyring they may >> succeed in decoding data not meant for them. > >fwiw, the