On Jun 20, 2018, at 11:28 AM, Damien Cassou wrote:
>
> David Shaw writes:
>> Which version of paperkey is this?
>
> both the version from source and from Fedora package are 1.5.
>
>> If that doesn't resolve your problem, can you send me a sample secret
>
On Jun 20, 2018, at 5:14 AM, Damien Cassou wrote:
>
> Hi,
>
> The output of paperkey is just "interrupt" instead of being a printable
> output. I've tried to use paperkey on 2 different main private keys and
> failed twice. I tried with both the Fedora package and from paperkey's
> source. Same
On Oct 31, 2017, at 8:10 PM, murphy wrote:
>
> I got a signed notification from facebook (good signature, enigmail)
> that claims my GnuPG generated public key has a "recently disclosed
> vulnerability". This is the full text:
>
> We have detected that the OpenPGP key on your Facebook profile m
On May 16, 2017, at 9:47 AM, Janne Inkilä wrote:
>
> I made a key search with my name and found something suspicious.
>
> The search:
>
> https://pgp.mit.edu/pks/lookup?search=janne+inkila&op=index&fingerprint=on
>
> I have used my old key since 2007. Fingerprint F4DB 40F8 BF22 8B9D 9B8F F679
On Jan 16, 2017, at 11:52 AM, John Lane wrote:
>
> I'm trying to experiment with trust signatures but I can't work out how
> the 'domain' question is used ?
>
> I think I understand what it is for, but I can't enter a value and get
> it to work.
>
> I have a key A that has signed b...@example.c
On Aug 19, 2016, at 11:56 AM, Scott Linnebur wrote:
>
> I have an issue that I just cannot figure out. What I’m trying to do is move
> a file between two organizations using two different transports while
> encrypting the file. On one side they use ipswitch movit to encrypt the file
> and po
On Mar 8, 2016, at 6:54 AM, Marco A.G.Pinto
wrote:
>
> Hello!
>
> I have made the mistake of adding the same photo with different file sizes
> using Enigmail and export it to the servers.
>
> I have already deleted two of the three photos using the CLI, but the key in
> the server still has
On Feb 24, 2016, at 9:11 AM, Josef Carnap wrote:
>
> Hello everyone,
>
> I have a question to the options --compress-level and
> --bzip2-compress-level. Which are the supportet (possible)
> values of each of the options? -- Numbers from 0 up to 6?
1 through 9, with 1 being the least compression
On Jan 17, 2015, at 5:48 PM, Robert J. Hansen wrote:
> quorra:~ rjh$ grep default-pref .gnupg/gpg.conf
> default-preference-list SHA256 RIPEMD160 AES256 CAMELLIA256 TWOFISH 3DES
>
>
> ... As I understand the way algorithms are selected, GnuPG uses the
> most-preferred algorithm in my list that
On Jan 16, 2015, at 7:56 AM, Salih Kardan wrote:
>
> Hi everyone,
>
> I have two simple questions about subkey mechanism. I search gnupg
> documentations and mailing list, but could not find answers to my questions.
> I would be so glad, if someone can answer below questions.
>
> 1) Is it po
On Jan 13, 2015, at 10:11 PM, Sandeep Murthy wrote:
>
> Hi
>
>> Only the right key will actually work for verification, but the program may
>> not be able to find that right key.
>
> Wouldn’t this issue of possible collisions in the long key ID (64 bits / 16
> hex digits)
> causing problems f
On Jan 13, 2015, at 2:53 PM, NdK wrote:
>
> Il 13/01/2015 16:34, David Shaw ha scritto:
>
>> I like the idea of adding a proper fingerprint to signature packets. I seem
>> to recall this was suggested once in the past, but I don't recall why it
>> wasn'
On Jan 13, 2015, at 3:10 AM, Werner Koch wrote:
>
> On Mon, 12 Jan 2015 21:51, gn...@lists.grepular.com said:
>
>> Apparently some of the funds will be donated to the GnuPG project. I suspect
>> he hasn't been in contact, and I imagine the funds would not be welcome?
>
> I have not heard about
On Nov 10, 2014, at 8:56 AM, Robert J. Hansen wrote:
>> FIPS-186-3, the document that specifies DSS (aka DSA with some
>> additional restrictions as to algorithm, key length, etc) specifies 4
>> key sizes:
>
> Five, but nobody uses DSA-512 and I think it's been formally obsoleted.
> But yes, DSA
On Nov 10, 2014, at 7:00 AM, Nicholas Cole wrote:
> Just out of curiosity: DSA key sizes are now rounded to one of 3
> values, whereas RSA keys are available in a range of sizes between two
> limits. Why the difference?
FIPS-186-3, the document that specifies DSS (aka DSA with some additional
On Sep 17, 2014, at 3:54 PM, MFPA <2014-667rhzu3dc-lists-gro...@riseup.net>
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi
>
>
> On Tuesday 16 September 2014 at 11:03:29 PM, in
> , Doug Barton wrote:
>
>
>
>> When you get into the edit-key menu you can do 'uid *'
>> (or s
On Sep 15, 2014, at 3:06 PM, Hauke Laging wrote:
> Am Mo 15.09.2014, 09:47:21 schrieb David Shaw:
>
>> I disagree with this. Expiration is the way the key owner (the person
>> who knows best whether the key should be used or not) tells the
>> world, "Do not
On Sep 14, 2014, at 9:05 PM, Hauke Laging wrote:
> Hello,
>
> after filing a bug report for my mail client because it does not allow
> me to encrypt to an expired certificate (neither does Enigmail) I was
> surprised to notice that I didn't manage to encrypt to an expired
> certificate with
On Aug 13, 2014, at 4:20 PM, Bill HT wrote:
> We are on HP-UX ver 11.11 U 9000/800. GnuPG 2 was installed at
> /usr/local/bin, we have to call it with the at path to do anything with it:
> /usr/local/bin/gpg2. I can list keys and import keys. However, when trying to
> generate keys or encrypt,
On Aug 14, 2014, at 1:08 AM, Doug Barton wrote:
> On 08/12/2014 11:27 PM, shm...@riseup.net wrote:
>> i've seen a multitude of ways people input data into this pref
>>
>> for example, some people put a link to their public key .asc or .txt file
>>
>> some others put a link to an actual keyserve
On Aug 13, 2014, at 2:27 AM, shm...@riseup.net wrote:
> i've seen a multitude of ways people input data into this pref
>
> for example, some people put a link to their public key .asc or .txt file
>
> some others put a link to an actual keyserver
>
> from the name of the actual pref, it states
On Aug 14, 2014, at 5:46 AM, Peter Lebbing wrote:
> On 13/08/14 23:51, David Shaw wrote:
>> Try this:
>>
>> gpg2 --expert -u (thekey) --edit-key (thekey)
>
> Ah! I never thought of trying good old --expert. Thanks!
It may be appropriate to not need --expert f
On Aug 14, 2014, at 1:20 AM, Doug Barton wrote:
> On 08/12/2014 08:41 PM, David Shaw wrote:
>> Maybe the answer is to remove the things to generate PGP 2 messages
>> specifically, and leave the other stuff?
>
> Yes please. :)
>
> Not being able to encrypt/sign
On Aug 13, 2014, at 3:56 AM, Werner Koch wrote:
>> state. One place that comes to mind is in --gen-revoke. GPG can
>> import a bare revocation certificate. No version of PGP can, so there
>> is code to push out a minimal public key before the revocation
>> certificate. We'd need to add some s
On Aug 13, 2014, at 8:22 AM, Peter Lebbing wrote:
> It is precisely as you said, GnuPG does allow reinstigating a revoked
> UID. However, there is a slight hitch in the UI that means you can't do
> it completely straight-forwardly. You need to delete the offending UID
> before re-adding it, but o
On Aug 12, 2014, at 3:33 AM, Werner Koch wrote:
> On Tue, 12 Aug 2014 00:08, ds...@jabberwocky.com said:
>
>> Rather than fixing RFC-1991 support, why not go in the other direction
>> and make it clear that it isn't supported, and won't work? I did a
>> bunch of work to make --pgp2 work well an
On Aug 11, 2014, at 1:31 PM, Johan Wevers wrote:
> On 11-08-2014 8:49, Robert J. Hansen wrote:
>
>> On Enigmail, I recently had a frustrating
>> experience helping a user who was trying to use GnuPG to exchange
>> traffic with a PGP *2.6* user... a codebase which is about 20 years old now.
>
>
On Jun 29, 2014, at 6:23 AM, Werner Koch wrote:
> On Sat, 28 Jun 2014 15:22, ds...@jabberwocky.com said:
>
>> I put a limited workaround in GnuPG at the time - that's why the
>> encryption key is always written to the card after the auth key (so
>> the encryption key would always be the "newest"
On Jun 28, 2014, at 5:20 AM, MFPA <2014-667rhzu3dc-lists-gro...@riseup.net>
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi
>
>
> On Friday 27 June 2014 at 11:35:00 PM, in
> , David Shaw
> wrote:
>
>
>> Incidentally, since subk
On Jun 27, 2014, at 4:24 PM, John Clizbe wrote:
> Kristian Fiskerstrand wrote:
>> On 06/27/2014 03:54 PM, shm...@riseup.net wrote:
>>
>>
>>> Robert J. Hansen:
On 6/26/2014 5:57 PM, Daniel Kahn Gillmor wrote:
> PGP 8 was released over a decade ago, that's hardly a modern
> implemen
On Jun 27, 2014, at 6:45 AM, Viktar Siarheichyk wrote:
> On 26.06.2014 23:28, Paul R. Ramer wrote:
>> On June 26, 2014 8:26:16 AM PDT, Daniel Kahn Gillmor
>> wrote:
>>
>>> As for arguments about use on smartcards -- if you plan to get a
>>> smartcard, and you have a primary key that is too lar
On Jun 25, 2014, at 1:53 PM, Jérôme Pinguet wrote:
> Hello!
>
> Thanks to Werner, I learned a new english word today: bikeshedding! :-)
>
> This guide
> http://spin.atomicobject.com/2013/11/24/secure-gpg-keys-guide/ suggests
> creating a subkey with authentication capability. Most other sources
On Jun 4, 2014, at 4:32 AM, Werner Koch wrote:
> On Wed, 4 Jun 2014 04:43, ds...@jabberwocky.com said:
>
>> I haven't looked at the fine details yet, but on the surface it seems
>> like they're aiming at Gmail (mainly, but not solely).
>
> Interesting. This is in contrast to a recent online a
Likely of interest to this group:
http://googleonlinesecurity.blogspot.com/2014/06/making-end-to-end-encryption-easier-to.html
Briefly, it's a Chrome extension for doing OpenPGP. It can import and use RSA
keys generated elsewhere, but only has code to generate ECC keys internally.
I haven't
On Jun 2, 2014, at 11:30 AM, Suspekt wrote:
> Am 02.06.2014 17:01, schrieb David Shaw:
> > One problem with multiple encryption subkeys is that the person
> > encrypting to you doesn't know which one to use. As things stand in
> > OpenPGP clients today, unless the pe
On Jun 1, 2014, at 3:25 PM, Suspekt wrote:
> OK,lets take the forced-by-law-theory in account. Than the "best" way from a
> pure security-standpoint in this regard would be:
> 0. OFFline-mainkey (certification of own keys and other people's keys)
> -> 1. OFFline-subkey (signing)
> -> 2. OFFline-
On Jun 1, 2014, at 6:54 AM, Suspekt wrote:
> Hi there,
> I understand the concept of using a secure offline key and than creating one
> or multiple subkeys to use in rather insecure environments like a
> internet-connected laptop or a smartphone. Depending on which tutorial you
> look at, the
On May 22, 2014, at 1:04 PM, martijn.list wrote:
> According to RFC 4880
>
> "For subkeys that can issue signatures, the subkey binding signature
> MUST contain an Embedded Signature subpacket with a primary key binding
> signature (0x19) issued by the subkey on the top-level key."
>
> The sub
On May 14, 2014, at 9:35 AM, Sin Trenton wrote:
> Hello everyone,
>
> Just out of curiousity, are there any plans for including Threefish into
> GnuPG?
> Or does it have to be incorprorated into the OpenPGP standard first and
> *then* perhaps baked into GnuPG?
Yes. GnuPG follows the OpenPGP
On May 13, 2014, at 7:15 PM, Aaron Toponce wrote:
> I don't know if this is a bug, or if I am doing something wrong, so I might as
> well ask here. I ran the following command from my terminal, and cannot
> retrieve the fingerprint from the file:
>
>$ gpg --output 0xBB065B251FF4945B.gpg --ex
On May 5, 2014, at 1:05 AM, Hauke Laging wrote:
> Hello,
>
> from time to time when changes to GnuPG's behaviour (about validity and
> trust) are suggested, Werner responds kind of: "No, that should be done
> on top of GnuPG." This attitude makes sense but in the current situation
> I would a
On May 2, 2014, at 9:08 PM, gn...@tim.thechases.com wrote:
> So I guess I'm looking for
>
> 1) something that doesn't leak identities across signatures
> 2) a single passphrase to manage the multiple identities
> 3) can be identified by the signing email address (Claws seems to
> make this easy f
On Apr 30, 2014, at 3:23 PM, Doug Barton wrote:
> ... your whole premise seems to be invalid as there is no clear evidence at
> this time (that I'm aware of, and I've been paying attention) that any actual
> secret keys have been compromised by Heartbleed. It was listed as a potential
> risk w
On Apr 29, 2014, at 6:40 PM, Koen wrote:
> Hi,
>
> I use '--keyserver --search-keys to get info on a number of
> keys. As far as I can tell, that doesn't return an expiration date (if
> that exists).
GPG's keyserver code is capable of displaying expiration date, if the keyserver
provides it.
On Apr 24, 2014, at 9:15 AM, helices wrote:
> Thank you, for your response.
>
> [1]
> -BEGIN PGP PUBLIC KEY BLOCK-
> Version: Encryption Desktop 10.3.0 (Build 8741)
[..]
> -END PGP PUBLIC KEY BLOCK-
Interesting! This definitely has a selfsig, but the key itself is very odd.
On Apr 23, 2014, at 11:14 PM, David Shaw wrote:
> On Apr 23, 2014, at 3:24 PM, helices wrote:
>
>> No matter how I try, I cannot encrypt a file using that public key, even
>> using --edit-key to assign trust:
>>
>> gpg: 845F5188: skipped: Unusable public
On Apr 23, 2014, at 6:13 PM, t...@piratemail.se wrote:
> Greetings,
>
> This is a tiny bit philosophical. Perhaps a little off-topic. I think this is
> probably the best list to ask never-the-less.
>
> So I've been working on this pgp base web based mail service.
> https://github.com/timprepsci
On Apr 23, 2014, at 3:24 PM, helices wrote:
> No matter how I try, I cannot encrypt a file using that public key, even
> using --edit-key to assign trust:
>
> gpg: 845F5188: skipped: Unusable public key
>
> gpg: /tmp/test.txt: encryption failed: Unusable public key
>
>
> The owner of the pu
On Apr 8, 2014, at 1:48 AM, Johan Wevers wrote:
> On 07-04-2014 15:16, David Shaw wrote:
>
>> When you change preferences you add another selfsig for your
>> user ID that contains the new preferences.
>
>> If you want to make the old preferences go away completely,
&
On Apr 7, 2014, at 2:06 AM, Johan Wevers wrote:
> Hallo,
>
> I changed the preferences for my gpg key to add the new Camelia ciphers
> and move IDEA more backward as I got problems with people with old pgp
> keys using old gnupg versions claiming they supported it but actually
> didn't support i
On Apr 1, 2014, at 9:01 PM, Tim Chase wrote:
> I've been trying to find a good explanation on how something like
>
> gpg -r DEADBEEF -r CAFEBABE -r 8BADFOOD -o output.gpg -e input.txt
>
> works. The best I've been able to find is this:
>
> http://lists.gnupg.org/pipermail/gnupg-users/2007-Oc
On Mar 31, 2014, at 2:18 PM, Barnet Wagman wrote:
> In symmetric encryption (AES256), is it possible for me to supply my own key,
> rather than entering a passphrase and having a key generated by pgp?
No. Not without patching the source.
David
___
On Mar 26, 2014, at 5:37 PM, -- -- wrote:
> Hi,
> is it possible to encrypt a file with a symmetric cipher (e.g., AES256) using
> a key file (e.g., a binary file) instead of a password?
Not really, but you can sort of weakly approximate it via something like this:
base64 -w0 binary-
On Mar 23, 2014, at 8:37 AM, -- -- wrote:
> Hi!
>
> Just for the sake of curiosity, is it possible to store a 8192 bit RSA key on
> the OpenPGP smart card? Two keys ? Three keys?
No. You can store three 4096-bit RSA keys. Larger than that is not possible
on the card (and not support
On Mar 17, 2014, at 10:39 AM, Daniel Kahn Gillmor
wrote:
> On 03/15/2014 03:53 PM, Juha Heljoranta wrote:
>
>> I am not able to get the gpg to verify a signature.
>>
>> Any advice how to fix this?
>> Or could the key 9C973C92 be invalid/broken?
>>
>>
>> $ mkdir -m 700 newgnupg
>> $ echo foo
On Mar 15, 2014, at 3:53 PM, Juha Heljoranta wrote:
> Hi,
>
> I am not able to get the gpg to verify a signature.
>
> Any advice how to fix this?
> Or could the key 9C973C92 be invalid/broken?
The key may be fine, but the signature is invalid. DSA keys specify how many
bits of hash are neces
On Mar 13, 2014, at 6:17 PM, MFPA <2014-667rhzu3dc-lists-gro...@riseup.net>
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
> NotDashEscaped: You need GnuPG to verify this message
>
> Hi
>
>
> On Thursday 13 March 2014 at 2:31:06 PM, in
> , Hauke Laging wrote:
>
>
>
>> gpg --reci
On Mar 12, 2014, at 9:07 AM, Kumar, Vikash X
wrote:
> Hi Team,
>
> Could you please help me to understand the following query.
>
> We are using gpg encryption method for encryption and decryption in our
> application. We have generated the keypairs on server A and public key is
> imported
On Feb 26, 2014, at 8:43 AM, Óscar Pereira wrote:
> Hello all,
>
> I've just stumbled across this question, on Security StackExchange,
> but it has no satisfactory answers, so I'd thought to relay it here.
> Basically, it asks whether after a GPG signing party, you still have
> to assign trust v
On Feb 23, 2014, at 10:54 AM, Laurent Jumet wrote:
>
> Hello David !
>
> David Shaw wrote:
>
>>> With 1.4.16, I suppose there is no way to change the size of the main
>>> key (actual 1024), isn't it?
>>> I'm limited to RIPEMD160.
>
On Feb 23, 2014, at 2:33 AM, Laurent Jumet wrote:
>With 1.4.16, I suppose there is no way to change the size of the main key
> (actual 1024), isn't it?
>I'm limited to RIPEMD160.
If you're limited to using RIPEMD160 for some reason (or SHA-1, also a 160-bit
hash), then you are limited
On Feb 21, 2014, at 7:06 PM, john s. wrote:
> Having had no trouble generating a key pair, I am having some problems of
> understanding.
>
> I am going around in circles trying to understand something i am sure is quite
> straightforward.
>
> The command:
>
> gpg --edit-key UID takes me
On Jan 28, 2014, at 9:37 AM, Uwe Brauer wrote:
> Hello
>
> I have a problem to import my secret key into a iOS app called iPGmail.
>
> The problem is that of course the key is password protected and the app
> seem to have difficulties with the password.
>
> So I just deleted the password and
On Jan 27, 2014, at 3:26 PM, Uwe Brauer wrote:
>>> "David" == David Shaw writes:
>
>> On Jan 27, 2014, at 3:02 PM, Uwe Brauer wrote:
>>> Hello
>>>
>>> I just tried out iPGmail a app for the iPhone which supports
>>> pgp. However
On Jan 27, 2014, at 3:02 PM, Uwe Brauer wrote:
> Hello
>
> I just tried out iPGmail a app for the iPhone which supports
> pgp. However I want to import my private key and here the trouble
> starts. For some reason iPGmail only supports private keys in armor
> format which are password protected.
On Dec 19, 2013, at 7:10 PM, Eric Swanson wrote:
> I'm trying to import a "raw" RSA secret key into GnuPG.
>
> I have p, q, d and the creation timestamp, as well as anything else
> that can be computed from them (n, u, e, etc etc).
>
> I've been implementing bits of RFC 4880 in an attempt to ge
On Dec 18, 2013, at 5:41 AM, Werner Koch wrote:
> On Wed, 18 Dec 2013 02:27, r...@sixdemonbag.org said:
>
>> because you just shifted to arguing that "since GnuPG defaults to
>> AES-256, we need to use RSA-15000 by default otherwise the asymmetric
>
> FWIW:
>
>The rationale why we use the
On Dec 17, 2013, at 12:41 PM, Matt D wrote:
> How can I find whats on my list?
gpg --edit-key (thekey)
showpref
You can see your own, or anyone else's preference list that way. Note that
each user ID (or photo ID) has its own preference list.
David
_
On Dec 17, 2013, at 1:53 PM, Matt D wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 12/17/2013 01:37 PM, David Shaw wrote:
>> On Dec 17, 2013, at 12:41 PM, Matt D wrote:
>>
>>> How can I find whats on my list?
>>
>> gpg --edit-key
On Dec 17, 2013, at 11:31 AM, Matt D wrote:
> On 12/17/2013 11:09 AM, Daniel Kahn Gillmor wrote:
>> Hi Matt--
>>
>> On 12/17/2013 10:07 AM, Matt D wrote:
>>> Hi! What encryption algorithm do we use in OpenPGP
>>
>> OpenPGP has "algorithm agility", meaning that it's possible to use
>> differen
On Nov 20, 2013, at 5:33 PM, Johan Wevers wrote:
> Hello,
>
> I communicate with someone whose key tells me it supports IDEA, and
> since that's my prefered algorithm my gpg uses it to encrypt the
> message. However, het setup does not in fact support it (any more, it
> used to do in the past).
On Nov 20, 2013, at 1:21 PM, Josef G. Bauer wrote:
> Hi,
>
> I wonder how easily my private key(s) ('secgring.gpg') can be cracked
> once somebody get access to it.
Not at all easily, *if* you have a good passphrase on your private key(s).
> Q: Is the password stored as an hash and can it be c
On Nov 13, 2013, at 6:08 PM, adrelanos wrote:
> Hi!
>
> I would like to partition my key like this:
>
> - long term identity key (air gapped, master key) [a]
> -- short term e-mail encryption key (less secured sub key, only on mail
> machine) [b]
> -- short term e-mail signing key (less secured
On Oct 24, 2013, at 4:47 PM, "VINEETA DESHMUKH (CRGL-THIRDPARTY.COM)"
wrote:
> Hello,
>
> I am facing an issue with the Signature verification from one of our clients
> – JP Morgan. We currently have FTP+encryption+signature of all the files
> which they send to us. However, they recently ha
On Oct 24, 2013, at 3:05 PM, Sylvain wrote:
> Hi,
>
> I saw a lot of activity in the Debian project about upgrading to a
> 4096 RSA key,
> e.g. http://lists.debian.org/debian-devel-announce/2010/09/msg3.html
>
> However GnuPG's default is 2048.
>
> Is this zealotry on the Debian front, or
On Oct 16, 2013, at 8:04 AM, "Brian J. Murrell" wrote:
> If you worked in a corporate environment, would you trust the HR
> department there to have verified the identity of employees well enough
> to leverage that into signing a GPG key?
>
> Let's say such an environment had an messaging system
On Oct 15, 2013, at 7:30 PM, Hauke Laging wrote:
> Hello,
>
> I think it would be a good idea to change the handling of local signatures. I
> suggest to import local signatures even without
>--import-options import-local-sigs
> if the local signature is by one of the secret keys in the
On Oct 10, 2013, at 1:45 PM, "Brian J. Murrell" wrote:
> I was told by a developer of a piece of software that my key does not
> conform to rfc4800. He said:
>
> According to http://tools.ietf.org/html/rfc4880#section-5.2.2
> signatures of version 3 don't have subpackets, which are only
> av
On Sep 27, 2013, at 9:58 AM, Paul Taukatch wrote:
> Really appreciate the help and the quick response!
>
> I just wanted to clarify, where exactly is the public key information stored
> within the exported secret key data? Is it part of the Secret key packet as
> part of the "Encrypted stuff
On Sep 26, 2013, at 12:54 PM, Paul Taukatch wrote:
> I had a question regarding exporting a private key using GPG.
>
> I generated a Key pair using GPG 1.4.13 and then used the export command to
> export the private key into another file.
>
> Based on the RFC 4880 documentation:
>A Secret
On Sep 25, 2013, at 9:18 AM, "Robert J. Hansen" wrote:
> I'm working on adding support for GnuPG keyrings to a file carver (a
> forensic tool that recovers data from damaged filesystems, or recovers
> things that have been deleted but not overwritten). Detecting an
> ASCII-armored keyblock is pr
On Sep 13, 2013, at 1:22 AM, Daniel Kahn Gillmor wrote:
> GnuPG is currently not able to create a non-exportable self-sig. If you
> try to do this, it gives an error:
>
> WARNING: the signature will not be marked as non-exportable.
This is by design (hence the warning message), as an unsigned
On Aug 29, 2013, at 2:01 PM, Csabi wrote:
> Hi all,
>
> Why does not support GNUPG the CAST6 (256 bit key) variant of the CAST
> algorithm?
> It supports the CAST5 (128 bit key) variant and it is the default cipher.
There never was a really good reason to support it. The OpenPGP working group
On Aug 22, 2013, at 10:15 AM, Daniel Kahn Gillmor
wrote:
> On 08/22/2013 09:56 AM, Robert J. Hansen wrote:
>> GnuPG extends this with support for Camellia-128, Camellia-192 and
>> Camellia-256. I don't know the reasoning for introducing Camellia, but
>> I'm sure there's a solid basis for it.
>
On Aug 22, 2013, at 9:56 AM, "Robert J. Hansen" wrote:
> GnuPG extends this with support for Camellia-128, Camellia-192 and
> Camellia-256. I don't know the reasoning for introducing Camellia, but
> I'm sure there's a solid basis for it.
I think it was implemented in GnuPG first, but it's not a
On Aug 18, 2013, at 11:45 AM, ashish tiwari
wrote:
> echo test123|/usr/local/bin/gpg --no-tty --passphrase-fd 0 -o
> /apploatr/.gnupg/ab.pgp --debug-level advanced --log-file a.log --sign
> --encrypt -r nkumar /apploatr/.gnupg/test.txt
>
> gpg: O j: ... this is a bug (getkey.c:2696:lo
On Aug 12, 2013, at 4:40 AM, Martin T wrote:
> Hi,
>
> one can sign the message with "--clearsign" option which adds ASCII
> armored(Radix-64 encoding) "PGP signature" at the end of the text.
> This "PGP signature" contains the UID of the signer, timestamp and key
> ID. However, two questions:
>
On Aug 9, 2013, at 2:43 AM, Khelben Blackstaff
wrote:
> I only replied to Mr. Shaw and not to the list so i send this again.
>
> On Fri, 9 Aug 2013 00:09:29 -0400
> David Shaw wrote:
>
>> There are two namespaces here. If a tag is defined by the IETF
>> process,
On Aug 8, 2013, at 5:17 PM, Khelben Blackstaff
wrote:
> Greetings.
>
> I am sorry if this is already answered but i could not find anything
> relevant in the archive.
>
> Quick introduction: I got a new smart card and reader so i thought to
> create a temporary test key and document on my blog
On Aug 6, 2013, at 9:22 AM, Kenneth Jones wrote:
> I'm referring to the information you see for example in the prompt to
> enter your private key when you have received an encrypted message in
> Thunderbird/Enigmail. The window "pinetry" prompts "Please enter the
> pass...2048-bit RSA key, ID DEA
On Aug 6, 2013, at 6:38 AM, Kenneth Jones wrote:
>
> Good day, and hello to the autoresponder (%]##{}#%^!!!) (just my opinion,
> mind you).
> I've been toying with PGP GPG GnuPG and whatever on and off since mid 1995,
> but recently have become interested again as the political situation in th
On Aug 2, 2013, at 1:17 AM, Philip Jägenstedt wrote:
> Hi all,
>
> I'm new to GnuPG and have probably been a little too ambitious for my
> own good. I originally signed key AB4DFBA4 at level 3 after a meetup,
> but was later paranoid that I was too lax and wanted to resign it at
> level 2, but d
On Aug 2, 2013, at 3:56 AM, Martin T wrote:
> Hi,
>
> thanks for the reply!
>
>>> I think "method" in the example above is just indicating that this is a PGP
>>> key.
>
> Exactly. However, how does RIPE server-side software detect that it's
> a PGP key? Is this information(besides other infor
On Aug 1, 2013, at 6:58 PM, Martin T wrote:
> Hi,
>
> RIPE(RIR in European region) database allows one to upload ASCII armored PGP
> public keys: http://www.ripe.net/data-tools/support/security/pgp Server-side
> software is able to generate some "key-cert" object attributes automatically.
> F
On Jun 19, 2013, at 8:19 AM, Hauke Laging wrote:
> Hello,
>
> in RfC4880 I read this:
>
> https://tools.ietf.org/html/rfc4880#section-7
>
> «If the "Hash" Armor Header is given, the specified message digest
> algorithm(s) are used for the signature. If there are no such headers, MD5
> is
On Apr 26, 2013, at 12:18 PM, Mason Loring Bliss wrote:
> On Thu, Apr 25, 2013 at 11:47:49PM -0400, Robert J. Hansen wrote:
>
>> A preimage attack on SHA-1 is my house being on fire: avoiding SHA-1 for
>> self-signatures is making sure to turn off the coffeepot.
>
> While I agree with what you'
or me, if I made a work key, I'd probably cross sign
(or at least sign my work key using my personal key) as it would give a better
path to the work key in the web of trust. At the same time, though, if I made
a key for a particular community where I wasn't directly known as "Davi
On Mar 25, 2013, at 8:46 AM, Jan Chaloupecky wrote:
> Hi,
> is the IDEA algorithm licensed? Under which conditions am I allowed to use
> the idea extension in a commercial product?
It was a patented algorithm which required a license. The patent has since
expired (and in fact it was difficult
On Feb 19, 2013, at 9:27 PM, John A. Wallace wrote:
> A lot of the documentation I see online includes references to files with
> names like “foo.pub” or “foo.sec” as if these were public key rings and
> secret key rings. However, I am accustomed to seeing keyrings like
> “pubring.gpg” and “se
On Feb 12, 2013, at 11:20 AM, refresh...@tormail.org wrote:
> When key is created gpg asks for e-mail address and it must be in proper
> format email@domain.
>
> I saw keys without valid email already.
>
> How to do it?
gpg --allow-freeform-uid --gen-key
--allow-freeform-uid
1 - 100 of 1718 matches
Mail list logo