Thanks for the reply David. The file was actually cracked so we'll know
the plaintext sometime soon, although that may likely matter not.
> However, people being people, they can easily typo the passphrase, and
> given the method above, if the passphrase is wrong, the session key will
> be wrong
> I'd be curious to find out what the real password is, once it is revealed.
The actual password is glucose.
Brad
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
Thanks for the reply David. The file was actually cracked so we'll know
the plaintext sometime soon, although that may likely matter not.
> However, people being people, they can easily typo the passphrase, and
> given the method above, if the passphrase is wrong, the session key will
> be wrong
>> Hi,
>> I have a symmetrically encrypted pgp file here:
>> http://16s.us/word_machine/downloads/pgp-easy.tgz.pgp
>> gpg will accept the three characters !=X as the password and exit with
a return status of 0 (although it does not actually decrypt the file):
>> $ gpg -d pgp-easy.tgz.pgp gpg: CAST5
Hi,
I have a symmetrically encrypted pgp file here:
http://16s.us/word_machine/downloads/pgp-easy.tgz.pgp
gpg will accept the three characters !=X as the password and exit with a
return status of 0 (although it does not actually decrypt the file):
$ gpg -d pgp-easy.tgz.pgp
gpg: CAST5 encrypted
Tar it up and symmetrically encrypt it. Use a strong pass phrase.
Store the encrypted tar file in various places (USB, gmail, bank
safety deposit box, lawyers office, girlfriend's house, etc.) Write
the pass phrase down and keep it in your bank box.
I (personally) don't do this. I just tar up .gnu
On linux, would it be possible to use the Linux Key retention service
to overcome this:
http://www.ibm.com/developerworks/linux/library/l-key-retention.html
On Jan 2, 2008 3:46 AM, Werner Koch <[EMAIL PROTECTED]> wrote:
> Note that all users on the machine will see the passphrase in the output
>
I can do this from a python cgi script from a browser:
os.system("gpg --version > gpg.out")
However, I cannot do this from a browser:
os.system("echo %s | gpg --batch --password-fd 0 -d %s > d.out"
%(pass, filename))
The output file is produced, but it's zero byte. I want the decrypted
file's c
Hi folks,
Hope this isn't too inappropriate. It is OK to redistribute the GnuPG
Windows binary installer? We'd like to distribute it with some scripts
that by default setup the path, etc.
Thanks,
Brad
___
Gnupg-users mailing list
Gnupg-users@gnupg.or
John Clizbe wrote:
> Brad Tilley wrote:
>> OK, thanks for the tip. So, I won't need to change anything publicly?
>> Currently, I publish the public keys on a website... nothing to change
>> there? To go from three to one, I will import two of the private keys
>>
John W. Moore III wrote:
> Simply Importing all the Secret Keys into Your 'Main' Keyring should do
> the trick. They will then be in the same place but listed separately.
> It may be necessary to then designate one of the Secret Keys as the
> 'Default' Keypair so that gpg.exe will know which Secr
Hello all,
I have three separate gpg secret keys. Initially, I wanted to keep the
keys seperate, but today I'd like to have them all together. Is there a
way to merge the keys into one key keeping them as they are now?
Many Thanks,
Brad
___
Gnupg-us
On Wed, 2005-07-20 at 09:10 -0400, David Shaw wrote:
> On Tue, Jul 19, 2005 at 01:21:00PM -0400, Brad Tilley wrote:
> > Hello Gnupg users,
> >
> > I am writing a script to automate the downloading and building of Linux
> > kernels. As a part of the script, I use gpg
Hello Gnupg users,
I am writing a script to automate the downloading and building of Linux
kernels. As a part of the script, I use gpg to check and make sure that
the kernel key is installed:
check = os.popen('gpg --list-keys')
data = check.read()
check.close()
This works well. I can
14 matches
Mail list logo