Re: Infrastructure support for GnuPG post-quantum keys

2025-01-06 Thread Robert J. Hansen via Gnupg-users
A question of netiquette:  Is it acceptable to do this on a first post to a public list? IIRC, Autocrypt specifies a way for public keys to be transferred in an email header that's parsed by Autocrypt-aware clients and not rendered or acted upon by non-aware clients. Seems like the best thing

Re: deflating heffalumps

2025-01-03 Thread Robert J. Hansen via Gnupg-users
In theory, with long-enough (perhaps too long for practical use) RSA keys, conventional factoring would be /easier/ than Shor's algorithm. Is there such a "turnover" point? When talking about science fiction technologies, the only answer is "who knows?" You'll hear me say that a lot here. If

Re: GnuPG meets the standard of care set by Signal (Re: Betamax v. VHS, and the future of PQ-PGP)

2025-01-03 Thread Robert J. Hansen via Gnupg-users
Breaking RSA-4096 via Shor's algorithm is straight out of science fiction. No, *this* is science fiction: I stand by my statement. RSA-4096 via Shor's requires science fiction level technology advances. Signal is acting ethically and responsibly:  They have had hybrid-PQC fully deployed to

Re: deflating heffalumps

2025-01-02 Thread Robert J. Hansen via Gnupg-users
Do I understand correctly that, while the complexity of conventional factoring scales with a logarithm of RSA key length, Shor's algorithm has a space requirement that scales linearly, but the engineering challenges implied by that linear growth scale exponentially? The keyspace equivalency is m

Re: deflating heffalumps

2025-01-02 Thread Robert J. Hansen via Gnupg-users
Following the (very rough) rule of thumb that each additional bit requires two additional qubits... Five. Five additional qubits. Apparently the wrong constant is stuck in my head, I'm sorry. OpenPGP_signature.asc Description: OpenPGP digital signature __

Re: deflating heffalumps

2025-01-02 Thread Robert J. Hansen via Gnupg-users
I have been looking for hard numbers for the applicability of Shor's algorithm to RSA for a long time. They're hard to come by, because we mostly only know theoretical limits. It requires a flat minimum, last I checked, of quantum gates on the order of (lg N)^2(lg lg N)(lg lg lg N) to run the

Re: Betamax v. VHS, and the future of PQ-PGP

2025-01-02 Thread Robert J. Hansen via Gnupg-users
A disquisition could here ensue on the long-term security reasons why everyone should start using ky1024_cv448 encryption subkeys RIGHT NOW. This could only be true if everyone holds to a threat model in which their data being collected by the MDR and potentially decrypted by a First World nat

Re: GnuPG 1.4 for OS X / macOS

2024-12-04 Thread Robert J. Hansen via Gnupg-users
But our users know what GnuPG is, and they would, we assume, trust it without any prompting from us. As a guy who's been supporting users in communications security issues since 1991, please forgive me for sharing some very hard-earned wisdom. Never assume anything about your clients. If some

Re: GnuPG 1.4 for OS X / macOS

2024-12-03 Thread Robert J. Hansen via Gnupg-users
We distribute a particular set of symmetrically-encrypted files, and would like to give Apple users the ability to decrypt those using a simple terminal command-line, without the need for them to "install" anything on their computers. At risk of sounding disloyal to GnuPG, this isn't a very good

Re: import of GPG key doesn't work and doesn't give an error message

2024-11-18 Thread Robert J. Hansen via Gnupg-users
A question to both Robert and Marco: Where did you get your gnupg(s) from? GnuPG 2.4.6 from Homebrew on Apple Silicon. OpenPGP_signature.asc Description: OpenPGP digital signature ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lists.gnupg

Re: import of GPG key doesn't work and doesn't give an error message

2024-11-16 Thread Robert J. Hansen via Gnupg-users
It won't be listed by --list-keys and doesn't give an error message. It does, in fact. rjh@sarah ~ % gpg --recv-keys 0x020898F03962F8B76B42D9F1E805C860F0E3CCB5 --verbose gpg: Note: '--verbose' is not considered an option gpg: "--verbose" not a key ID: skipping gpg: key E805C860F0E3CCB5: no us

Re: using aes256

2024-10-30 Thread Robert J. Hansen via Gnupg-users
Counter modes are evil and thus not used. Evil? Howso? I know there's a malleability problem, but GnuPG has used an HMAC since what, 1999, so that problem was mitigated decades ago. Is there another set of problems I'm unaware of? OpenPGP_0x1E7A94D4E87F91D5.asc Description: OpenPGP publ

Re: using aes256

2024-10-29 Thread Robert J. Hansen via Gnupg-users
Please don't send HTML to this list. Some of the people you really hope will see your email won't look at HTML email. :) I am having no luck with trying to encrypt a file with a key that I would like to use. This isn't really a GnuPG use case. If you're looking for an AES256 encryption or

Re: using aes256

2024-10-29 Thread Robert J. Hansen via Gnupg-users
Is AES256 using ecb or cbc mode? Depends on which version of GnuPG you're using. Older versions used an idiosyncratic cipher feedback mode, newer versions use counter mode (I believe). ___ Gnupg-users mailing list Gnupg-users@gnupg.org https://lis

Re: HOW to upgrade: 2.0.22 --> 2.3.3 ???

2024-10-04 Thread Robert J. Hansen via Gnupg-users
I am not suggesting that world leaders should continue to use 1024 bit RSA to store their nuclear installation locations or sign their offical pronouncements. "So for current OpenPGP usage, 1024 bit RSA is for all practical purposes secure." That was you, two messages ago. Now you're saying 10

Re: HOW to upgrade: 2.0.22 --> 2.3.3 ???

2024-10-04 Thread Robert J. Hansen via Gnupg-users
A nation state with the ability to crack 1024 bit RSA would not spend years and billions of dollars on the messages/files of a single entity. They absolutely would, in a heartbeat, and they'd consider it a bargain. Imagine some major world power has a copy of an old message from Vladimir Putin

Re: HOW to upgrade: 2.0.22 --> 2.3.3 ???

2024-10-04 Thread Robert J. Hansen via Gnupg-users
to skip PGP-2 keys in existing keyrings. And of course the PGP-2 encryption has not been broken - only signatures are vulnerable to the full MD5 hash algorithm attacks we know for 25 years. Given that PGP 2.6 offered "military-grade" 1k RSA keys, I think it's dangerous to think PGP 2.6 encrypt

Re: website charset encoding for manual

2024-10-01 Thread Robert J. Hansen via Gnupg-users
Unfortunately the GPH is way to old to be useful. I also doubt that we have a working docbook toolchain availabale to build the GPH from source. The FAQ is also increasingly out of date. Since I put it down years ago (as a protest against RMS' continued involvement in the Free Software movem

Re: All CPU threads

2023-09-09 Thread Robert J. Hansen via Gnupg-users
Thank you for reply. I was thinking about speeding up the encryption process. But if that's not possible then that's how it is. Thank you for sending a plain-text email to the list! :) The answer is a little complicated, but this should be an accurate-enough explanation. Encryption speed is

Re: All CPU threads

2023-09-09 Thread Robert J. Hansen via Gnupg-users
Please do not send HTML to this list. Many of the people you very much hope to read your questions will not read HTML email. Anyone knows if there is a way to use all CPU threads with *gnupg-desktop-2.4.3.0-x86_64.AppImage* ? What exactly are you hoping to speed up? The classic mode of encr

Re: gpg: signing failed: No secret key

2023-09-07 Thread Robert J. Hansen via Gnupg-users
Please don't send HTML to this list. gpg: key "6O0PDA84A36B6C98B261AC2020546703CDADFA53" not found That's not a valid key ID. Key IDs are strings of hexadecimal digits. Your second 'digit' there is the letter O, which is not a valid hexit. gpg --delete-secret-keys CDSXFA53 That's not a

Re: 32768-bit key

2023-08-27 Thread Robert J. Hansen via Gnupg-users
My name is Snowden. I don't care. And I cannot send a decrypted version of the mail. Then please learn how to do so. To recap: 1. There is no point in a 32kbit RSA key. 2. For that reason, GnuPG doesn't allow you to generate one. 3. I will not help you do something that has no point. 4.

Re: 32768-bit key

2023-08-26 Thread Robert J. Hansen via Gnupg-users
I will not answer encrypted messages posted to the list. This is a public mailing list. Signatures are fine, but encrypted person-to-person messages are not. Also, please do not send HTML email to the list. Many of the people you hope will read your email refuse to read HTML email. OpenPG

Re: 32768-bit key

2023-07-10 Thread Robert J. Hansen via Gnupg-users
I don't know that there's anything to file a bug about. I don't see any non-rsa4096 keys on the Tails website: One of their certificates has a Curve-25519 subkey. I wonder if that's what the original poster saw, and mistook it for being a 25,519-bit subkey.

Re: 32768-bit key

2023-07-09 Thread Robert J. Hansen via Gnupg-users
How do I upp the limit of the RSA-key to 32768? First, come up with a reason why you need one. A 2048-bit key is hypothesized to possess about 112 bits of entropy; a 3072-bit key, about 128; a 16k-bit, about 256. You very rapidly reach a point of dramatically diminishing returns. A 32k key

Re: Multithreading with GPGME Python Bindings

2023-01-16 Thread Robert J. Hansen via Gnupg-users
(Please forgive the HTML email, sending from my phone)Given Python is effectively single-threaded through the global interpreter lock, this may turn out to be a total non-issue. Although I don't have an immediate answer for you I'd suggest starting by learning how Python's multi-threading support i

Re: Difference between versions--Question

2023-01-03 Thread Robert J. Hansen via Gnupg-users
It would be helpful to know why I can't get compression in my build. I've tried to build from source three times now. The answer is very simple: because you are building it incorrectly. We can provide you with the answers, but we can't give you the software development skills needed to correc

Re: symmetric encryption of '[stdin]' failed

2022-10-15 Thread Robert J. Hansen via Gnupg-users
why can't gpg accept passphrase in the terminal? Depending on how you invoke GnuPG, it can. It supports a lot of different ways of providing the passphrase. The one that might work best for your purposes is to put the passphrase in a file, passphrase.txt, and then invoke GnuPG like this:

Re: symmetric encryption of '[stdin]' failed

2022-10-15 Thread Robert J. Hansen via Gnupg-users
Why does gpg-agent interject itself into symmetric encryption at all? Where in that command line do you specify a passphrase? You don't. gpg-agent is getting fired up in order to ask you what passphrase to use for the symmetric encryption. ___ Gnu

Re: How to create v4 key

2022-10-08 Thread Robert J. Hansen via Gnupg-users
When I choose a RSA3076 key, keyserver.pgp.com will accept it. When i choose an ed25519 key, keyserver.pgp.com tells me it is a v3-key. keyserver.pgp.com is *old* and doesn't understand how to use ed25519 keys. It is erroneously telling you it's a v3 key, when the reality is keyserver.pgp.com

Status of original PGP?

2022-09-07 Thread Robert J. Hansen via Gnupg-users
On a lark I went looking for the current iteration of PGP. It was bought by Symantec some years ago, and the last I heard they'd renamed it to "Symantec Encryption Desktop". However, Symantec no longer has it available for sale or download, and scouring their site turns up basically nothing.

Re: How did Edward Joseph Snowden use GnuPG to uncover the secrets of the National Security Agency?

2022-08-11 Thread Robert J. Hansen via Gnupg-users
Subject: How did Edward Joseph Snowden use GnuPG to uncover the secrets of the National Security Agency? Short answer: he didn't. GnuPG is one of the tools that Snowden used to uncover the secrets of the NSA. This is incorrect. According to Glenn Greenwald, he used GnuPG to communicate priv

Re: Does the PGP public key at https://www.washingtonpost.com/anonymous-news-tips/

2022-08-06 Thread Robert J. Hansen via Gnupg-users
Some years ago after they first published their OpenPGP certificate, Enigmail reached out to them offering training on effective use of OpenPGP and technical support for GnuPG and Enigmail. No cost, Enigmail had a core member who lived near their offices (namely, me), let us know how we can support

Re: a bit off topic, how to find encrytped files (ransom attack)

2022-08-04 Thread Robert J. Hansen via Gnupg-users
3. I could use the ent command which measure the entropy, high entropy is an indication of encryption (but jpg have also high entropy). However I should then study the distribution of each letter to be sure. A JPEG *body* has high entropy. The JPEG *header* has very

Re: gnupg2 vs gnupg

2022-06-03 Thread Robert J. Hansen via Gnupg-users
It seems not as much the binary name seemed the problem but the dnf/yum/rpm dependency. Here's where I hate to sound like a jerk, but I can't help you. I'm not an AIX guy and I don't do packaging for it. This is a packaging issue, not a GnuPG one. :( There might be an AIX person on the li

Re: gnupg-users@gnupg.org

2022-06-02 Thread Robert J. Hansen via Gnupg-users
1 What is the difference between gnupg2 and gnupg-2.X.X? Possibly quite a lot. GnuPG exists in three different branches. For sake of simplicity I'll call them "modern", "standard", and "classic". Modern: GnuPG 2.3 and later. Standard: GnuPG 2.2 Classic: GnuPG 1.4 The differences among them

Re: Backing up your PGP key by hand

2022-05-25 Thread Robert J. Hansen via Gnupg-users
Since paper as we know it today doesn't even exist so long that can't be true. Maybe you are pointing to the few surviving papyrus texts? Most have not survived. I've personally seen paper ballots from elections in the Senate of ancient Rome. Admittedly, this was 15 years ago so I can no lon

Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Robert J. Hansen via Gnupg-users
You're barking up the wrong tree: It wasn't me who brought politics to this list. You're the one who is turning a single throwaway line in someone's signature block into an angry argument. Nonsense. The OP issued a statement, I replied and that could have been it. It is you who is obviously

Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Robert J. Hansen via Gnupg-users
Just as I am free to comment on a political statement that I find provocative, blatantly wrong and in the context of current events almost derisive. Excepting that this is not a mailing list for politics. Matthias has a line in his signature that you object to. I object to it, too, but the on

Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Robert J. Hansen via Gnupg-users
Given recent events: can't you spare us your stupid signature? Matthias should be, and is, free to advocate for his beliefs in his signature. If we don't stand up for people's right to peacefully say things we don't like, we have failed as a community. I say this as an American who's a fan

Re: Help with "config.h file not found error" on Gnupg version 1.4.13

2022-04-01 Thread Robert J. Hansen via Gnupg-users
First of all, thank you for taking your time to reply to this email. I tried it using the -l flag. The config file was found in the directory before that. Below is the command I executed. I don't want to sound dismissive or discouraging, but you may want to consider whether you have the necessa

Re: Help with "config.h file not found error" on Gnupg version 1.4.13

2022-03-30 Thread Robert J. Hansen via Gnupg-users
You will have much better luck if you send only plain-text emails to this list. Some of the people you'd really like to see your email refuse to read HTML email, on the grounds that it's a security risk. I've quoted your entire message below as plaintext to help you reach these people. To re

Re: TB weirdness

2022-02-24 Thread Robert J. Hansen via Gnupg-users
Sounds like a defect to me, do you have a problem report ticket with Thunderbird or a forum entry which described the problem in more detail (like which version is affected). It turns out the actual behavior is a little different than I originally described. If you have a valid certificate wit

Re: Who protects the private key (was: Changing the encryption algorithm used for PGP/GPG private key)

2022-02-20 Thread Robert J. Hansen via Gnupg-users
Whoever told you SHA-1 is broken was gravely in error. There are certain areas of the cryptographic space where it is no longer recommended. There are others where it's strong as a rock.As part of an iterated key derivation function, SHA-1 is still believed safe.  There's no reason to shy away from

Re: Can't synchronize keys using Seahorse

2022-02-17 Thread Robert J. Hansen via Gnupg-users
How can I fix this? Specify a different keyserver. keyserver.pgp.com was a commercial keyserver run by PGP Corporation, or whichever corporate entity owned the PGP intellectual property at the time. Network Associates gave way to PGP Security gave way to Symantec gave way to... The PGP in

TB weirdness

2022-02-17 Thread Robert J. Hansen via Gnupg-users
Yes, I know, Thunderbird doesn't use GnuPG. However, for those who do: apparently, Thunderbird is a big fan of attaching public certificates (and/or revocation certificates, for revoked keys) to outgoing emails for *every private certificate on your keyring*, regardless of whether that private

Re: Current state and contact (various questions)

2022-02-02 Thread Robert J. Hansen via Gnupg-users
this is my first post here. I'm an experienced Dev and FOSS contributor which worked quite some with gpg recently. Welcome to the party, pal! :) 1. Who takes care for tasks like updating the website? Ingo already addressed this fully and correctly, so I'll skip. 2. Difference of pu

Re: Current state and contact (various questions)

2022-02-02 Thread Robert J. Hansen via Gnupg-users
Forgive my terseness, on from my phone. The OP may find this message from the archives to be useful:https://lists.gnupg.org/pipermail/gnupg-users/2021-December/065639.htmlOn Feb 2, 2022 3:59 AM, Ingo Klöcker wrote:On Mittwoch, 2. Februar 2022 08:30:56 CET B1773rm4n via Gnupg-users wrote: > Hello,

Re: First Amendment and Marines?

2022-01-30 Thread Robert J. Hansen via Gnupg-users
However, the opposite also occurs: some US companies appear to be shocked when I, as a European without any ties to the US, claim I won't comply to a DMCA request because we don't have such a law here. Yes! And when American companies are so foolish as to demand an EU citizen comply with a DMC

Re: pgp263iamulti06

2022-01-29 Thread Robert J. Hansen via Gnupg-users
If person1 has a signed and encrypted email to person 2, but which used IDEA and MD 5, and now wants to decrypt, and re-encrypt and sign, and send to person 2, who will then destroy the original email, why shouldn't they be allowed to know if this is safe. They *are* allowed. Th

Re: Preventing public key upload to key-servers

2022-01-29 Thread Robert J. Hansen via Gnupg-users
Unrelated note: I find the rhetoric of a few posts in this thread absolutely astounding. From a crypto question to red scare and "my army is going to kick your country's ass if it dares talk to me" in two easy steps ? This is vile. "Tell it to the Marines" is a standard American and British prov

Re: pgp263iamulti06

2022-01-29 Thread Robert J. Hansen via Gnupg-users
Ok, you made me actually look at pgp263iamulti06. :-) I almost feel like I should apologize. However, the entropy gathering seems overly optimistic: *wince* That's quite a bit worse than I remember. (I haven't looked at 2.6.3 source code in probably 25 years.) So, yeah. I'm comfortable

Re: Preventing public key upload to key-servers

2022-01-29 Thread Robert J. Hansen via Gnupg-users
PS: I guess by the "emotional reactions" you mean Robert J. Hansen mails, since replies by other people seem much more technical in nature. If by 'emotional' people mean 'amused', then yes. I thought it was cuter than a pailful of kittens. :) If by 'em

Re: First Amendment and Marines?

2022-01-29 Thread Robert J. Hansen via Gnupg-users
I was simply trying to help an organization that is, for *their own good business reasons* very much motivated to adhere to GDPR, use existing IT infrastructure to move to a more secure method of communication. And, for those people and businesses who have to do business with the EU, the GDPR i

Re: Preventing public key upload to key-servers

2022-01-28 Thread Robert J. Hansen via Gnupg-users
If an individual that requests his personal information is removed (i.e., the "right to be forgotten") is EU resident, GDPR applies regardless of the jurisdiction in which the information server is located. "Right to be forgotten" doesn't exist in the United States. It's a violation of our Fir

Re: pgp263iamulti06

2022-01-24 Thread Robert J. Hansen via Gnupg-users
Would you be able to suggest the version to use in "portable" mode? GnuPG 1.4, but I'd honestly prefer to run a bootable Linux distro. Portable apps are a monstrous security hazard if they're used on computers beyond your control. USB malware is a very real thing. __

Re: pgp263iamulti06

2022-01-23 Thread Robert J. Hansen via Gnupg-users
I remember using a Windows-95-native PGP years ago that also used keyboard and mouse events to acquire entropy; presumably, there was not that much determinism, or every PGP key generated on Windows is likely to be weak. Win95 still allowed direct access to underlying hardware. In the XP-and

Re: pgp263iamulti06

2022-01-23 Thread Robert J. Hansen via Gnupg-users
Is this also used when generating symmetric keys? Or only used by secret key generation? If the last is the case, then existing keys generated on DOS (or Linux?) might be safe (apart from a possibly short key length). Existing certificates would be unaffected, but since the CSPRNG is used for a

Re: pgp263iamulti06

2022-01-23 Thread Robert J. Hansen via Gnupg-users
When generating the key-pair with Re: pgp263iamulti06, the "randomness" is obtained by user's keyboard input. Is it then that the above applies only when the session key is generated? No, the whole CSPRNG is (probably) compromised. PGP 2.6.3 used keyboard interrupts harvested directly from the

Re: pgp263iamulti06

2022-01-22 Thread Robert J. Hansen via Gnupg-users
Are there known, documented security deficiencies in it? The CSPRNG is almost certainly broken. PGP 2.6.3 was a DOS program, which meant it could easily get direct access to hardware. That meant it could use the uncertainty of the physical world as a key factor in the CSPRNG. But ever sinc

Re: Short question regarding config

2022-01-22 Thread Robert J. Hansen via Gnupg-users
What's the difference between `|--personal-cipher-preferences' and `default-preference-list'?| The former is your preferences for the traffic you generate. The latter is your advertised list of preferences that are affixed to new certificates you generate. E.g.: if you have p-c-p of CAMELLI

Re: Side-channel attacks

2022-01-20 Thread Robert J. Hansen via Gnupg-users
Migrate? That data is in my mail archive. While it would be possible for me to write a program to scan the mail file for pgp blockes, check which pgp version is used, decrypt the data, re-encrypt it with a modern gpg version and replace that textblock, it would still lose information about dates a

Re: Side-channel attacks

2022-01-20 Thread Robert J. Hansen via Gnupg-users
Lucky for me I never use that version, as I never respected the copyright of the RSA and IDEA algorithms (questionable in Europe anyway). Patents, not copyrights. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listi

Re: Side-channel attacks

2022-01-18 Thread Robert J. Hansen via Gnupg-users
1.4 should be able to decrypt all 2.6 generated data. Not from the Disastry builds, which extended 2.6 to support newer algorithms. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Side-channel attacks

2022-01-18 Thread Robert J. Hansen via Gnupg-users
Well, a bit more respect for backwards compatibility would help a lot by that. Now I'm forced to keep an 1.4 and pgp 2.6 version installed just to be able to read all my old data. Some people just refuse to update to versions that routinely break backwards compatibility. You've had literally 27

Side-channel attacks

2022-01-16 Thread Robert J. Hansen via Gnupg-users
On this mailing list we sometimes see requests for help from people running dangerously antique versions of GnuPG. Wasn't all that long ago I was asked for help with something in the 1.2 series (!!). Without exception, our first response is usually "for the love of God, upgrade!" They rarely

Re: one ecc key-pair for both encryption and signature?

2022-01-10 Thread Robert J. Hansen via Gnupg-users
Likewise, Edwards DSA can be tortured into becoming a Curve25519 key. But once you do that, *you're no longer using Edwards DSA*. Can you be more specific why this is a problem? I apologize in advance for sounding grumpy (I am, it's been an annoying day so far) and condescending (which I'm tr

Re: GPG key generated on Windows...

2022-01-08 Thread Robert J. Hansen via Gnupg-users
5) Importing the key on Linux does not generate any warning or error. And I can also properly use the keypair generated on Windows to encrypt, decrypt, sign and verify files between Linux clients without problem. It's just encrypting on Windows and decrypting on Linux with a keypair generated on a

Re: one ecc key-pair for both encryption and signature?

2022-01-07 Thread Robert J. Hansen via Gnupg-users
There is anequivalence given (two functions) in the Ed25519 wikipedia page, but I don't know if this allows the same curve used in both algorithms. Yes, in the same way that if you torture a DSA key long enough you can get the Elgamal encryption algorithm out of it. But once you do that, *you

Re: one ecc key-pair for both encryption and signature?

2022-01-07 Thread Robert J. Hansen via Gnupg-users
I know that "ed25519" and "cv25519" are different algorithms, but from my limited understanding the same key-pair should be usable for both encrypting and signing in theory? Ed25519 is (effectively) a Schnorr signature done over an Edwards curve. Schnorr signatures have really no capability of

Re: [Announce] A New Future for GnuPG

2022-01-03 Thread Robert J. Hansen via Gnupg-users
I did spend about six months doing a clean-room implementation of RFC2440 in PHP3.  It was a vile experience and one I don't recommend. I am simultaneously shocked, impressed, and disgusted. ;-) I rarely talk about that job because it's sort of like saying you made a healthy and tasty meal ou

Re: [Announce] A New Future for GnuPG

2022-01-03 Thread Robert J. Hansen via Gnupg-users
Werner, this is amazing news. Thank you for sharing it! For the list: as you may remember, each Christmas I run a fundraiser for GnuPG. You pledge $X and I match it, that sort of thing. I didn't do one this year because Werner contacted me earlier asking me not to, saying he would soon have

Re: detached signature, "can't hash datafile: No data"

2022-01-01 Thread Robert J. Hansen via Gnupg-users
> I would've thought that a clearsign signature preserves the data above the pgp signature, in plaintext. Isn't the plaintext above the signature the original data? In that case, it is. I spoke inartfully: I meant to say that detached signatures can be done in either a binary format or in

Re: detached signature, "can't hash datafile: No data"

2021-12-31 Thread Robert J. Hansen via Gnupg-users
Shouldn't I be able to verify the signature independently? Why? A signature is a piece of data that attests another piece of data is unchanged. If it doesn't have a second piece of data to compare to, all it can say is "I have a good digital signature that attests to a hash value of XYZ for

Re: fingerprint associated public key does not match displayed public key

2021-12-20 Thread Robert J. Hansen via Gnupg-users
seems as though my entry into this realm was clearly... bad. I wanted to learn the system without using separate encryption software like kleopatra. I wanted to know how to do it with just gpg and any email provider. It's difficult, and I have a lot to learn. Don't do that. Seriously. This

Re: fingerprint associated public key does not match displayed public key

2021-12-17 Thread Robert J. Hansen via Gnupg-users
What other keys would it hold? Behold: pub ed25519/1E7A94D4E87F91D5 2021-02-22 [SC] 7D8EC4B85B6FEDD6C10D3C791E7A94D4E87F91D5 uid [ultimate] Robert J. Hansen uid [ultimate] Robert J. Hansen sub cv25519/7D6CCDB66CA1202F 2021-02-22 [E] My public

Re: fingerprint associated public key does not match displayed public key

2021-12-17 Thread Robert J. Hansen via Gnupg-users
The document snapshot analogy really helps. I'm glad it's helped! No, and I'm going to strongly encourage you to stop asking implementation questions. I think I'll take that advice. When you think you're ready, we'll be here to answer your implementation questions. It would break my hear

Re: fingerprint associated public key does not match displayed public key

2021-12-17 Thread Robert J. Hansen via Gnupg-users
That key block did not match the one on his profile. That’s what confused me. But I’m learning (from you guys) that the key blocks don’t necessarily have to match. So I can assume that: More accurately, they're very unlikely to match. The version on his site may lack some signatures or user I

Re: fingerprint associated public key does not match displayed public key

2021-12-16 Thread Robert J. Hansen via Gnupg-users
when i compared the imported pgp public key block (which I obtained using the import command and the provided fingerprint) to the displated pgp public key block, they didn't match shouldn't they match? No. The key block is not a human-readable format. It's a binary format that's meant to be

Re: Continuing 2.3 weirdness

2021-12-08 Thread Robert J. Hansen via Gnupg-users
I make different observations (using self-compiled gpg installed to /opt/ gnupg/master with a non-standard GNUPGHOME): It turns out the source of the trouble was systemd, which was starting gpg-agent on demand, and was forcing it to use /usr/bin/gpg-agent. Setting a user override file fixed th

Continuing 2.3 weirdness

2021-12-07 Thread Robert J. Hansen via Gnupg-users
Turns out the problem was keyboxd was waiting for a lock. Unfortunately I wasn't able to find the lock: so, after making a backup, I decided to resort to harsh measures: I nuked my .gnupg directory. Now GnuPG is getting a little further along, but it's still not working properly. Let's start

Re: 2.3 --list-keys weirdness

2021-12-06 Thread Robert J. Hansen via Gnupg-users
"gpgconf --kill all" solved my problem, but I'd still advise y'all to look into where it got wedged and why -- this was an incredibly annoying problem to solve, and the total lack of debugging output elevated it to tremendously frustrating. I'm such an idiot, I forgot I was sshed into another

Re: 2.3 --list-keys weirdness

2021-12-06 Thread Robert J. Hansen via Gnupg-users
Try attaching gdb to see where it hangs. (gdb) run Starting program: /usr/local/bin/gpg --list-keys [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". [Detaching after fork from child process 41865] ^C "gpgconf --kill all" s

Re: 2.3 --list-keys weirdness

2021-12-06 Thread Robert J. Hansen via Gnupg-users
Which version exactly are you using? 2.3.3. Try attaching gdb to see where it hangs. (gdb) run Starting program: /usr/local/bin/gpg --list-keys [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". [Detaching after fork from

2.3 --list-keys weirdness

2021-12-05 Thread Robert J. Hansen via Gnupg-users
rjh@ripley:~$ gpg - --list-keys gpg: using character set 'utf-8' gpg: Note: RFC4880bis features are enabled. gpg: key 1DCBDC01B44427C7: accepted as trusted key gpg: key 1E7A94D4E87F91D5: accepted as trusted key gpg: key A3C418D1C6F3453A: accepted as trusted key ... No output is ever produced

Re: User id's without person's name, only email

2021-11-17 Thread Robert J. Hansen via Gnupg-users
Mapping a "Real Name" to an email address is a conceptually different thing from mapping an email address to a public key. Except that should we be mapping keys to email addresses in the first place? When we sign a certificate we make an assertion that this cryptographic material is controll

Re: Using gpg to add digital signature to a linux executable

2021-10-26 Thread Robert J. Hansen via Gnupg-users
Why not do a detached signature using e.g. gpg -sb --output file.sig file? Then, someone can run gpg --verify file.sig file to ensure that the signature is valid. (a) because the OP specifically said he was looking for integrated signatures, and (b) detached signatures have a way of getting l

Re: v2.3 of gnupg for automation?

2021-10-26 Thread Robert J. Hansen via Gnupg-users
We’ve been using v1.4 of gnupg because I read in the documentation and user comments and in my testing, that v2.X couldn’t be used in software automation workflows. This might have been true several years ago, but it isn't true today. there was a feature (that seemed intentional) that the pass

Re: Using gpg to add digital signature to a linux executable

2021-10-26 Thread Robert J. Hansen via Gnupg-users
all is well and good. At least, on Windows. But what about linux? As a general rule, Windows signs executables more than it signs packages; Linux signs packages more than it signs executables. The best practice seems to be to use GnuPG to attach a digital signature to an RPM or DEB (or Snap

Re: how to add a passphrase to a keypair

2021-10-03 Thread Robert J. Hansen via Gnupg-users
gpg -k and gpg -K both show my main key.  I compiled a copy of gpg1 (not installed to the system) to try to use locally, since it doesn't enforce the use of a passphrase for the secret key.  Unfortunately, without secring.gpg, it doesn't see the secret key at all. I haven't tried this, but it

Re: Call me crazy, but ...

2021-07-15 Thread Robert J. Hansen via Gnupg-users
Is 'Стефан Васильев ' the same person that was ban from this very list a fiew month back? No, because no one was ever banned. One user, also named Stefan, was set to moderation (his messages had to be approved by an admin before appearing on list), but this was only for two weeks, and he was ne

Re: GPG : "No secret key found" error

2021-06-10 Thread Robert J. Hansen via Gnupg-users
I am trying to write in plain text mode so hopefully you won't be seeing it in HTML. Success! Thank you. Can you please suggest to me the steps that I should follow to redesign my solution, considering the password security? I already have, twice. For the third time: remove the passphrase

Re: GPG : "No secret key found" error

2021-06-09 Thread Robert J. Hansen via Gnupg-users
61 4204= 10228On Thu, 10 Jun 2021, 02:58 Robert J. Hansen, <mailto:r...@sixdemonbag.org";>r...@sixdemonbag.org> wrote:>.8ex;border-left:1= px #ccc solid;padding-left:1ex">I'm not going to respond to this until = you re-send it as plain text without HTML.=C2=A0

Re: GPG : "No secret key found" error

2021-06-09 Thread Robert J. Hansen via Gnupg-users
But, this command had a risk of exposing *$PASSPHRASE* to the UNIX console if any user executes *ps -ef* command while the code is running. This was a huge security breach so I chose the *--passphrase-file* option to read the decryption password from a file. Now, all I need is to place the fil

Re: GPG : "No secret key found" error

2021-06-09 Thread Robert J. Hansen via Gnupg-users
I'm not going to respond to this until you re-send it as plain text without HTML. The very first thing I wrote in my last email was that this mailing list strongly prefers plain text without HTML. We're willing to help you, but you need to follow the rules. ___

Re: GPG : "No secret key found" error

2021-06-08 Thread Robert J. Hansen via Gnupg-users
Please do not send HTML to this mailing list. Many of our members refuse to open HTML emails from unknown parties, so when you send HTML email to this list you're limiting the number of people who can see your question -- and maybe be able to help you! Step 2. Instead, I have thought of stori

Re: How would you do that ...

2021-05-04 Thread Robert J. Hansen via Gnupg-users
,and use it as an OTP, and throw it into a garbage >incinerator afterwards. >If you are up against adversaries where this is necessary,this methods >may ultimately not help ... >= > >On 5/4/2021 at 1:19 PM, "Ingo Klöcker" wrote:On Dienstag, 4. Mai >2021 18:47:50 C

Re: How would you do that ...

2021-05-04 Thread Robert J. Hansen via Gnupg-users
Modern harddisks don't allow that anymore. Should I assume that "low-level format" in this case means something like dd if=/dev/zero of=/dev/sdX [puts on forensics professional hat] Good question! The tl;dr of it is that the technique to wipe a hard drive will vary according to the kind of t

Re: How would you do that ...

2021-05-04 Thread Robert J. Hansen via Gnupg-users
Neal Stephenson's novel Cryptonomicon is excellent. I strongly recommend it to anyone who enjoys reading & is interested in crypto. Part of the plot involves a cipher that operates a bit like RC-4, permuting an array, but the array is a deck of cards. https://www.schneier.com/academic/solitaire/

Re: How would you do that ...

2021-05-03 Thread Robert J. Hansen via Gnupg-users
I have dealt with a similar problem in real life, as a real problem with real people. We created a custom Linux environment, burned it to Blu-Ray, and Alice crossed the border with her Linux environment tucked into her CD player. On the other side she acquired a laptop, Blu-Ray drive, and USB d

  1   2   3   4   5   6   7   8   9   10   >