On 13.06.17 14:16, Peter Lebbing wrote:
> On 13/06/17 09:43, Stefan Claas wrote:
>> Another thing i will do in the future, which i haven't read in popular
>> tutorials,
>> is that once checking the hash/sig of the provided package i will also hash
>> the binaries after unpacking and print them out
On 13/06/17 09:55, Chris Horrocks wrote:
> At first I thought it may be a mechanism for revalidating private
> key ownership but key expiration doesnt appear to impact on trust or
> validity.
An expired key will definitely not be able to issue valid signatures
after the expiration date. So any cer
On 13/06/17 12:51, Matthias Apitz wrote:
> $ gpg2 --edit-key sk_61F1ECB625C9A6C3.gpg
Unfortunately you got lost in the advice from multiple people :-).
This file sk_... is not a public key. It is just the backup of the
material that is in one of the slots of the card.
When Werner said "make sure
On 13/06/17 09:43, Stefan Claas wrote:
> Another thing i will do in the future, which i haven't read in popular
> tutorials,
> is that once checking the hash/sig of the provided package i will also hash
> the binaries after unpacking and print them out on a piece of paper, so
> that i
> can frequen
Hi,
I have a question around key expiry that I can't seem to find any thorough
documentation on; & the @Gnupg twitter account pointed me here.
What purpose does key expiration have?
At first I thought it may be a mechanism for revalidating private key ownership
but key expiration doesnt appear
El día martes, junio 13, 2017 a las 02:30:05p. m. +0300, Teemu Likonen escribió:
> Matthias Apitz [2017-06-13 12:51:01+02] wrote:
>
> > $ gpg2 --edit-key sk_61F1ECB625C9A6C3.gpg
>
> Command --edit-key edits a key in your keyring. I'd guess that you want
I did 1:1 what Werner suggested;
> to im
Matthias Apitz [2017-06-13 12:51:01+02] wrote:
> $ gpg2 --edit-key sk_61F1ECB625C9A6C3.gpg
Command --edit-key edits a key in your keyring. I'd guess that you want
to import keys:
gpg2 --import sk_61F1ECB625C9A6C3.gpg
Then you can edit them with --edit-key.
--
/// Teemu Likonen - .-..
Am 13.06.2017 um 12:20 schrieb Matthias Apitz:
>> AFAIK the "backup process" during key creation for the OpenPGP smartcard
>> is a bit different: There is no interface / function on the card to
>> export a key. Therefore, if you decide to create a backup, a key is
>> first created on the host and *
Hi Matthias,
Am 12.06.2017 um 20:12 schrieb Matthias Apitz:
>
> Please note: I have changed the Subject: of the thread to match better
> the real problem.
>
> During generating the keys on the GnuPG card, one can (and should)
> create some backup of the secret key into a file. It is totally unc
El día martes, junio 13, 2017 a las 11:58:51a. m. +0200, Werner Koch escribió:
> On Mon, 12 Jun 2017 20:12, g...@unixarea.de said:
>
> > create some backup of the secret key into a file. It is totally unclear
> > to me how to make something usefull out of this file, for example import
> > it into
El día martes, junio 13, 2017 a las 11:52:46a. m. +0200, Thomas Jarosch
escribió:
> > Please note: I have changed the Subject: of the thread to match better
> > the real problem.
> >
> > During generating the keys on the GnuPG card, one can (and should)
> > create some backup of the secret key
On Mon, 12 Jun 2017 20:12, g...@unixarea.de said:
> create some backup of the secret key into a file. It is totally unclear
> to me how to make something usefull out of this file, for example import
> it into a "normal" secret keyring to use it in case of the GnuPG acrd
To try it you best insert
Am 12.06.2017 um 23:50 schrieb Duane Whitty:
Thanks for your input much appreciated!
I would also add one word about USB sticks: It is very difficult to
know if they've been compromised and there are no tell-tale signs when
an attack is taking place. I never put a USB in my computer that has
13 matches
Mail list logo