pg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ANG=de_DE.UTF-8 but that LANGUAGE has neither the _ part nor a
> character encoding?
>
>
> Hauke
> --
> Crypto für alle: http://www.openpgp-schulungen.de/fuer/unterstuetzer/
> http://userbase.kde.org/Concepts/OpenPGP_Help_Spread
> OpenPGP: 7D82 FB9F D25A 2CE4 5241 6C37 BF4B 8EEF 1A57 1DF5
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
t;
> I downloaded th package from a uk mirror for gnugp, have tried witha
> couple of them now and still get the same error.
>
> am i possibly missing something on my OS?
>
> many thanks
>
> sam
>
> ___
> Gnupg-users
to symmetric encryption methods as well?
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
--
David Tomaschik
OpenPGP: 0x5DEA789B
http:
On Sat, Jan 11, 2014 at 1:05 PM, Sam Kuper wrote:
> On Jan 9, 2014 7:16 PM, "David Tomaschik"
> wrote:
> >
> > if the machine you are using for crypto operations is compromised, you
> have lost (at least for the operations conducted while it is compromised)
>
py to
> stand corrected.
>
> In the meantime, I hope I can find a small form-factor
> OpenPGP-compatible smart card reader with a pin pad. I would be
> grateful for pointers :)
>
> Regards,
>
> Sam
>
> ___
> Gnupg-users m
. (One story here:
https://www.schneier.com/blog/archives/2013/11/badbios.html) I haven't
decided yet if I believe all of it, but it's still a scary thought.
>
> Cheers!
> -Pete
>
> Cheers!
> -Pete
>
> ___
> Gnu
;
> * [scdaemon] Install into libexecdir to avoid accidental execution
>from the command line.
>
>
> The code also builds for Windows and we plan to do a Gpg4win release
> soon after 2.0.20.
>
>
> Shalom-Salam,
>
>Werner
>
--
David Tomaschik
OpenPGP
2013 at 6:49 PM, Ken Kundert wrote:
> On Mon, Apr 01, 2013 at 02:15:44PM -0700, David Tomaschik wrote:
> > This isn't really a direct answer, but you can use your GPG key material
> > for SSH purposes and then you only need to unlock the GPG keys...
>
> David,
> I
On Mon, Apr 1, 2013 at 3:38 PM, Melvin Carvalho wrote:
>
>
>
> On 1 April 2013 22:50, David Tomaschik wrote:
>
>> On Mon, Apr 1, 2013 at 10:46 AM, Daniel Kahn Gillmor <
>> d...@fifthhorseman.net> wrote:
>>
>>> On 04/01/2013 12:24 PM, adrelanos wr
gt; 1000 years into the future seems like a dubious proposition. Consider
> the state of mechanical computation and mathematics 100 or 1000 years
> ago. Do you think that even a skilled mathematician at the time could
> have predicted where we are today?
>
> The longevity of any publi
swer, but you can use your GPG key material
for SSH purposes and then you only need to unlock the GPG keys...
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
> Please help.
>
> AO
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
_
rt card
in this way.
Even better would be a new smart card with a form factor similar to the
Yubikey Nano (https://www.yubico.com/products/yubikey-hardware/yubikey-nano/)
but that might be a pipe dream.
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemov
the problem...
>
> Regards.
>
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
--
David Tomaschik
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
may be a 50 chars random
> concatenating of numbers, letters and special chars).
>
> What am I missing?
>
>
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo
anything... hope I'm not missing something obvious.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
2011 7:24 AM, "Jerry" wrote:
On Sat, 19 Nov 2011 16:35:21 -0500
David Tomaschik articulated:
> I actually have an SCR3340 based reader that just doesn't want to work
> on my new laptop. It ma...
Have you tried this device on any other PC just to insure it is not a
localized
upported
I've enabled debugging on scdaemon and attached the log file.
Any insight would be greatly appreciated.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
2011-11-19 16:32:27 scdaemon[17659] li
Accidentally responded off-list...
-- Forwarded message --
From: David Tomaschik
Date: Fri, Nov 11, 2011 at 5:27 PM
Subject: Re: Signing already-encrypted files (all to self)?
To: Chris Poole
I would just produce a list of SHA1s of the files and then sign that.
sha1sum
d of a tool designed for disk
encryption? TrueCrypt is cross-platform and works well... if you're
Windows-only, there's BitLocker, and for Linux there's LUKS/dm-crypt
and eCryptFS.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
ht
mbol). But perhaps I'm
delusional.
[1] http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
. PCBC also incorporates the plaintext into the input for the
encryption process, IIRC.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users
tien
It looks like the "Version" header is too long and is wrapping onto a
2nd line. The 2nd line is not a valid header, and is confusing gpg.
Most likely, this is caused by the email client on the sending side
wrapping the text. (Although maybe some receiving clients re-wrap
text, I
ge when I saw it on my phone,
but then promptly forgot. It looks like gpg2 can't find your gpg-agent
socket. Try adding "use-standard-socket" to ~/.gnupg/gpg-agent.conf (or
starting gpg-agent with --use-standard-socket) and see if that helps.
Also, make sure seahorse and other
On Tue, Aug 30, 2011 at 2:56 PM, Richard wrote:
> On Tue, Aug 30, 2011 at 20:49, David Tomaschik
> wrote:
>
>> No, you can store a primary key. And you can use the 3 slots for any
>> purpose (though I believe they must all tie to the same primary key.).
>> It
again.
> Will that cause any problems in later GnuPG use as the cards' IDs are
> different?
I don't think that would be an issue, but I can't be sure. Keep in
mind that as long as the card is left in the reader, it would be
considered unlocked -- do you want to leave that lay
es 8 bits of entropy per symbol, which is, as
Aaron pointed out, wrong. Suggested readings:
https://secure.wikimedia.org/wikipedia/en/wiki/Entropy_%28information_theory%29,
https://secure.wikimedia.org/wikipedia/en/wiki/Password_strength and
NIST publication 800-63.
--
David Tomaschik,
e such keys and also consider
> that nowadays more and more low-processing power devices are used.
>
> Such keys are at best a political statement and a good laugh for some
> NSA folks.
>
>
> Shalom-Salam,
>
> Werner
--
David Tomaschik, RHCE, LPIC-1
Sys
On 08/23/2011 06:52 PM, Faramir wrote:
> El 03-08-2011 9:40, ved...@nym.hush.com escribió:
> > Sorry, wrong link extension,
>
> > here is the correct one: http://www.pgpdump.net/
>
> By the way, what would be required to run pgpdump locally? I guess
> there is no compiled version for windows...
>
Better use only digits - if you need to use a keypad you can't do that
> instantly.
>
>
> Shalom-Salam,
>
> Werner
Thanks Werner!
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@sys
s for my regular PIN. (The
admin PIN is somewhat longer.) Would this be considered a reasonable
length?
(Someone who can read the memory on a smart card by opening it up is
NOT in my threat model -- if they can do that, they have much easier
ways to coerce me into giving up my PIN.)
--
On 08/10/2011 12:32 PM, Smith, Greg E wrote:
>
> Hello,
>
>
>
> I am having an issue where we have set a custom home directory for GPG
> and configured the registry entry for HKCU\GNU\GNUPG\HomeDir=... The
> script functions fine when someone is logged into the system with the
> user account exe
rriage return character. (Aka \r.)
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://systemoverlord.com
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://li
e any damage concerns from wallet
> storage, for instance?
>
>
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
--
David Tomaschik, RHCE, LPIC-1
System Administr
Sorry, this was intended to be sent to the entire list, but I composed
it in a hurry my apologies.
On Tue, Jul 12, 2011 at 4:24 PM, David Tomaschik
wrote:
> assert() kills the program if the value in the parentheses evaluates
> to FALSE. In this case, that means that "data&qu
a way to get at
your key (or rather, your plaintexts).
The ability to "casually" decrypt even 1024-bit keys is nowhere near.
(And by "casually", I mean a difficulty similarly to what it takes to
wiretap a phone.)
[1] http://eprint.iacr.org/2010/006
--
David Tomaschik, RH
> I am not aware of any GnuPG command in Terminal that would display or
> warn about this situation. Is there any, or should there be any?
>
>
> [...]
>
> TIA.
> Charly
>
>
>
>
>
>
> ___
> Gnupg-users mailing
lot of time - time we can
> only spend as part of a paid project.
>
>
> Shalom-Salam,
>
> Werner
>
> --
> Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source Advocate
OpenPGP: 0x5DEA789B
http://syst
uot;same key" on that page only
applies where the RSA encryption was done to the plain text directly.
Likewise, OpenPGP signing is done on a hash of the plain text.
(Again, not on the plain text directly.)
David
--
David Tomaschik, RHCE, LPIC-1
System Administrator/Open Source
On 02/28/2011 08:59 PM, Daniel Kahn Gillmor wrote:
> On 02/28/2011 08:41 PM, David Tomaschik wrote:
>> Other than on systems where $HOME is on a filesystem that does not
>> support sockets (e.g., NFS/CIFS/etc.), is anyone aware of an issue with
>> the use of --use-standard-s
On 02/28/2011 08:20 PM, Daniel Kahn Gillmor wrote:
> On 02/28/2011 06:49 PM, David Tomaschik wrote:
>> Each process has its own copy of the environment inherited from its
>> parent, so it's not possible to change the GPG_AGENT_INFO variable for
>> all processes. You
On 02/28/2011 05:40 PM, MFPA wrote:
> Hi
>
>
> On Monday 28 February 2011 at 3:47:16 PM, in
> ,
> Guy Halford-Thompson wrote:
>
>
>> Thanks for the help, didnt really occur to me how much
>> info is available in the public keyring, guess you cant
>> do much about it tho.
>
>
> I think key UID
On 02/28/2011 06:17 PM, Marco Steinacher wrote:
> Hi,
>
> I use a OpenPGP smartcard with gnupg 2.0.14 and Ubuntu for different
> tasks. From time to time I face the following problem: The gpg-agent
> crashes for some reason after entering the PIN, 'ps' reports the daemon
> process as a zombie
>
>
On 02/28/2011 05:38 PM, Denise Schmid wrote:
> Thanks all for your help.
>
> Now, the story gets even more funny: They claim to have used PGP split-key,
> then encrypted the files with a randomized key, then encrypted the key with
> individual keys.
>
> So far so bad. But now comes the best: Th
On 02/27/2011 12:21 PM, Robert J. Hansen wrote:
> On 2/26/11 9:24 PM, Jameson Rollins wrote:
>> http://josefsson.org/inline-openpgp-considered-harmful.html
>
> * IT DOESN'T HANDLE ATTACHMENTS. That's fine with me: 95%+ of my
> messages don't require attachments. Any technology that can hit 95% o
On 02/26/2011 10:29 PM, Grant Olson wrote:
> On 02/26/2011 08:52 PM, David Tomaschik wrote:
>> I have a 3310 and with pcscd, I haven't even found the need to use the
>> scard group. I have found that occasionally I have to restart
>> scdaemon in order to get new re
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have a 3310 and with pcscd, I haven't even found the need to use the
scard group. I have found that occasionally I have to restart
scdaemon in order to get new readers/cards recognized. I haven't
narrowed it down specifically yet. (I just got my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I've recently received my smart card, but was wondering what the "best
practices" are, mainly from a physical standpoint. When I use it in
my laptop reader, it sticks about 2" out of the side, and I have some
concern about this (i.e., getting damaged
ndensed form of the message.
Then you encrypt that with your PRIVATE key. That is a signature A
recipient can attempt to decrypt the signature using your public key.
If they are able to, they know your private key was used to produce the
signature, and if you have kept control of your private key,
While I realize that the ID-1 (full size) cards can be used with card
readers that support PIN entry, are there any other
advantages/disadvantages to one size over the other? At present, I feel
like the ID-000 form factor has more advantages because of the
portability and the lower cost of the read
to end
up with any import taxes/customs trouble.
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
GPG: 0x5DEA789B
da...@systemoverlord.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
not for a lab.
>
>
> Shalom-Salam,
>
> Werner
>
> As usual, it all depends on your threat model. If you're really paranoid,
don't use gpg-agent. :)
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
GPG: 0x5DEA789B
da...@systemoverlord.com
t; particular group. Is there anyone who could, please, fix this?
>
> PS. I send this message via Gmane with an ID:
>
> <874oaiocpp.fsf%lukasz.stelm...@iem.pw.edu.pl<874oaiocpp.fsf%25lukasz.stelm...@iem.pw.edu.pl>
> >
> --
> Miłego dnia,
> Łukasz Stelmach
>
>
> _
"right".
David
On Sat, Dec 11, 2010 at 11:24 AM, Robert J. Hansen wrote:
> On 12/10/2010 9:16 PM, David Tomaschik wrote:
> > Are there any disadvantages to distinct signature & encryption keys?
>
> None that I've found.
>
> > Is the weakness in the hash
I appreciate everyone's feedback on this matter. Comments/questions
below...
On Fri, Dec 10, 2010 at 9:41 AM, Robert J. Hansen wrote:
> On 12/9/2010 11:08 PM, David Tomaschik wrote:
> > I feel bad for the "litter" this introduces to the keyservers.
>
> Don'
f encryption is changing so rapidly, I thought the insights of
this group might be useful in my next steps. Your help is appreciated.
--
David Tomaschik, RHCE, LPIC-1
GNU/Linux System Architect
da...@systemoverlord.com
___
Gnupg-users mailing list
Gn
57 matches
Mail list logo