El día lunes, junio 12, 2017 a las 12:58:23p. m. +0200, Werner Koch escribió:
> On Mon, 12 Jun 2017 12:38, g...@unixarea.de said:
>
> > Do you know of any other CCID reader for ID-000 size cards?
>
> I have a sample of the Gemalto Shell Token here. It has been around for
> quite some time and t
On Thu, 15 Jun 2017 22:47:00 +0200
Stefan Claas wrote:
> Well, then let's wait and see what other people say, who know the code.
> Maybe members can confirm the same behaviour under Windows and Linux.
O.k., i checked the Windows version of modern GnuPG and there it is correct.
The Mac version,
On 16.06.2017 14:46, Juan Miguel Navarro Martínez wrote:
[..]
> If you want to use OpenPGP, tell your partner to make an OpenPGP
> certificate using GnuPG or any OpenPGP supported software. You can them
> make PGP/Inline or PGP/MIME (if your email client/plugin supports it,
> Enigmail does) email.
On 2017-06-16 at 10:27, Binarus wrote:
> Here is where my worry begins. AFAIK, all PGP variants are using RSA key
> pairs. A public X.509 certificate is just a container for such keys (and
> possibly has information about the certificate chain). Given that, in my
> naive world, it should be no prob
On 16.06.2017 11:32, Damien Goutte-Gattat wrote:
> Well, there is the Monkeysphere's pem2openpgp tool [1], but AFAIK it
> only works with *private* keys, not public keys.
Most articles / tutorials I came across during my research were dealing
with private keys ... that should have made me mistrus
Hi,
On 06/16/2017 10:27 AM, Binarus wrote:
Unfortunately, I didn't find any hint on how to extract that key. It is
in the certificate for sure, and I think I will eventually be able to
dump it after playing some time with OpenSSL, but then I eventually
won't know how to integrate it into Enigmai
On 16/06/17 10:27, Binarus wrote:
> [...] or if the whole software / data exchange protocol depends on
> the sort of key. In other words, even if I would manage to extract
> the key and to integrate it into the Enigmail / gpg4win world, would
> the communication partner be able to decrypt the respe
On 16/06/17 08:17, listo factor via Gnupg-users wrote:
>> An expired key will definitely not be able to issue valid
>> signatures after the expiration date.
>
> There is nothing ~in the key itself~ that prevents any key from
> being used to create signatures
There is nothing ~in the key itself~
At first, I'd like to thank you for the great explanations.
On 14.06.2017 19:21, Juan Miguel Navarro Martínez wrote:
> As far as I know, GPGSM is a GPG tool to use X.509 certificates. That's
> not the OpenPGP protocol. With this said...
Here is where my worry begins. AFAIK, all PGP variants are
My question is simple (kind of): In what situations would you revoke a
certificate that you have made on someone else's key? (Technically:
--edit-key + revsig.)
Background concepts: When we sign a key (--edit-key + sign) we certify a
particular user id, the link between the user id and person (or
10 matches
Mail list logo