Re: On the fly encryption of files possible?

2010-06-29 Thread Roscoe
GnuPG FUSE FS would be very hard. -- Roscoe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Crypto Stick released!

2010-05-20 Thread Roscoe
On Thu, May 20, 2010 at 9:17 AM, Frank wrote: ... > The stick is yes, a openpgp smartcard with a USB > interface not more than that. Well, the programmable 32bit ARM MCU in there isn't to be forgotten :) -- Roscoe ___ Gnupg-users mailing

Re: Split keys

2010-05-06 Thread Roscoe
disappearing anymore than you have to worry about gpg disappearing. Also being pretty simple to begin with and five years old now, there's not much maintaining to be done. If you lack the skill to port it and need it done pay someone to do it :) (I'd talk to

Re: Shamir's Secret Sharing Scheme integration?

2010-02-23 Thread Roscoe
not implement Shamir's scheme. And what makes you think that? -- Roscoe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Web of Trust itself is the problem

2010-01-12 Thread Roscoe
. I think signing of software to be a pretty important thing, and represents a relatively large userbase that's not to be overlooked. Though, admittedly, some proportion of them are indifferent towards it. -- Roscoe ___ Gnupg-users mailing list Gnupg-

Re: Two convicted in U.K. for refusal to decrypt data

2009-08-14 Thread Roscoe
oducts. In Australia you can also end up in jail for not handing over encryption keys. -- Roscoe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: 8192bit RSA keys

2009-07-09 Thread Roscoe
On Thu, Jul 9, 2009 at 3:36 AM, David Shaw wrote: ... > If you're looking for a more immediate reason, though, note that if you make > a RSA key larger than 2048 bits you can't use it with the spiffy new OpenPGP > smartcard. Oh, something I've been for. Any

Re: Security Concern: Unsigned Windows Executable

2009-06-05 Thread Roscoe
or an attack to work, you're pretty confidently fine. HTTPS doesn't buy us much in my opinion, webservers are being cracked all the time. -- Roscoe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: encryption bloats file

2009-01-09 Thread Roscoe
Dunno how likely it is, but maybe someone made an attempt at hiding the size of the file in transit via appending arbitrary data. 2009/1/10 Scott Lambdin : > Hello - > > Someone sends us a big ~700MB pgp encrypted file and when we decrypt it the > resulting file is about half that size. Anyone ha

Re: identical files -> non-identical encrypted files

2008-08-02 Thread Roscoe
On Tue, Jul 22, 2008 at 12:08 PM, Ian Zimmerman <[EMAIL PROTECTED]> wrote: > I have a local file that I want to encrypt and upload to a remote > machine in encrypted form. Encrypting is farily quick, but uploading is > slow, so I use rsync for the other (unencrypted) files. But the fact > that th

Re: One Time Password and GnuPG

2008-06-08 Thread Roscoe
Would a smartcard address this private key compromising problem? On Mon, Jun 9, 2008 at 2:52 AM, Andrew Berg <[EMAIL PROTECTED]> wrote: > Robert J. Hansen wrote: >> >> If you don't have physical security over your hardware, you don't have >> anything. You cannot use GnuPG safely on a malicious ma

Re: Protecting private key on USB flash drive: how to? // secret-sharing

2008-05-12 Thread Roscoe
I would have thought the 'secret' in shamirs secret sharing scheme could be an arbitrary piece of data? On Mon, May 12, 2008 at 1:28 PM, <[EMAIL PROTECTED]> wrote: > Roscoe eocsor at gmail.com > wrote Mon May 12 09:02:32 CEST 2008 : > > >> For my curiosity

Re: [Fwd: Re: Protecting private key on USB flash drive: how to?]

2008-05-12 Thread Roscoe
http://point-at-infinity.org// works good for passwords to keys :) On Mon, May 12, 2008 at 12:00 AM, <[EMAIL PROTECTED]> wrote: > > For my curiousity, has anyone used threshold (split-key) > crypto for key protection? One can do a lot of things > w/ threshold, but probably not so easily w/

Re: Offloading encryption to crypto card?

2008-03-13 Thread Roscoe
Not really answering your question but... openssl could be an option, as I gather that supports a few crypto accelerators. I presume it would use them when calling openssl enc. 2008/3/13 pub crawler <[EMAIL PROTECTED]>: > We are new to GnuPG started using this in the past few weeks. > > We ha

Social networking

2007-12-31 Thread Roscoe
ould allow two modes of registration, one requiring a trusted key and the other requiring ID of some sort. (Now you've made yourself effectively a certificate authority, though) -- Roscoe On Jan 1, 2008 2:10 AM, Hardeep Singh <[EMAIL PROTECTED]> wrote: > Hi All > > Current

Re: Encryption keys: RSA vs. ElGamal

2007-11-26 Thread Roscoe
http://www.samsimpson.com/cryptography/pgp/pgpfaq.html PGP DH vs. RSA FAQ Copyright (c) 1999 S.Simpson - All Rights Reserved A bit old, but I still found it interesting when I read it (wasn't quite so old then :). -- Roscoe On Nov 26, 2007 7:26 PM, <[EMAIL PROTECTED]> wrote: >

Re: Key safety vs Backup : History of a bad day (key-restoration problem)

2007-11-02 Thread Roscoe
<[EMAIL PROTECTED]> wrote: > On Fri, 2007-11-02 at 14:20 +0930, Roscoe wrote: > > I don't see any worthwhile gain over setting a strong passphrase, and > > then secret sharing that passphrase with . > > Fewer things can go wrong. > > Secret shared passphrase

Re: Key safety vs Backup : History of a bad day (key-restoration problem)

2007-11-01 Thread Roscoe
I don't see any worthwhile gain over setting a strong passphrase, and then secret sharing that passphrase with . In Roberts example if you were to use +paperkey you'd merely export an encrypted secret key, and then print in the line above it an share. As far as I can see this would p

Re: Key safety vs Backup : History of a bad day (key-restoration problem)

2007-10-31 Thread Roscoe
ord of their password for when their memory fails them. (I think splitting a password into a few shares and distributing them in suitable places is a sane way of writing down passwords. Other people may disagree.) http://www.point-at-infinity.org// BW laser printers are pretty cheap now :) -

Re: Possible to pass the private key?

2007-09-12 Thread Roscoe
ther users private keys on that host, unless file permissions are setup as such. You didn't make any mention of automated decryption, but your consultants quote makes more sense if you replace encrypt with decrypt. -- Roscoe On 8/24/07, Greg Motter <[EMAIL PROTECTED]> wrote: > > Hel

Re: RSA 1024 ridiculous

2007-06-17 Thread Roscoe
RSA keysize will influence how long it takes you to encrypt or sign a message. But how long the RSA signing/encryption step takes is going to be the same no matter what the message length. That's because you are only ever signing a hash of the message or encrypting the symmetric session key used to

Re: Printing Keys and using OCR.

2007-05-20 Thread Roscoe
Thanks for all the replies :) I just tried OCR-A but with limited success. Will add in par2 and see how things go with that. 2D barcode seems alot more suited to the problem, will report back on how well that goes :) And yes, the ctan ocr package does have +=-/ http://www.ctan.org/tex-archive/m

Printing Keys and using OCR.

2007-05-15 Thread Roscoe
ming to do this with just Free/Open software.) -- Roscoe ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Secure text editor?

2007-05-14 Thread Roscoe
Swap is indeed optional. I've been running Debian with X/e16/screen/vim/irssi/xmms/mozilla for a a while (a year? or two?) and never noticed any performance difference. I doubt anyone else would either. (DDR2-800 2048MB, 2GHz dual core Athlon, before that DDR-400 1024MB, 2GHz single core Athlon).

Re: Key Revocation

2007-04-13 Thread Roscoe
Rather than revoke the key why not create a new uid (and revoke the old uid)? On 4/14/07, Chris <[EMAIL PROTECTED]> wrote: > This may sound simple, but I want to make sure I get it done right. My ISP/DSL > provider, Embarq, has dumped Earthlink as their mail provider sine 9 April > and setup their

Re: FSFE Smart Card

2006-11-24 Thread Roscoe
I'm a bit confused about this too. http://fsfe.org/en/card/howto/subkey_howto says: This howto describes setting up your computer to use the Fellowship card with subkeys only. We recommend this, as it is the most secure usage." For what reasons is it more secure than putting (or generating) your

Re: encrypted mail and gmail / remote

2006-03-22 Thread Roscoe
I noticed this plugin for squirrelmail if you wanted to do it on your own server: http://www.squirrelmail.org/plugin_view.php?id=153 Aside from that there are a few services around, like hushmail.com that'll do what you want. On 3/23/06, D_C <[EMAIL PROTECTED]> wrote: > hello group - > > apolo

Re: file encryption and integrity check

2006-02-20 Thread Roscoe
Sure will. gpg -c is what you want. Make sure you are using a MDC, which means either using one of the 128bit blocksize ciphers (your gpg will probably use AES256 by default, which is good - gpg -vc to find out) or passing the --force-mdc option. If you want protection in the way of recovering

Re: Remote signing?

2006-02-19 Thread Roscoe
Seeing as a detached sig is just a signed hash, you could hash the file remotely then copy the hash over and construct a detached sig from that. I imagine no current app supports that kind of thing(??) so that might involve X amount of pissing about coding your own solution. Many folk just run sha

Re: Password length paranoia

2006-02-07 Thread Roscoe
(I know. We already have lots of threads about the net on password length). Heres my two cents, from someone who has zero security/cryptographic background (: Bruteforcing 256bit keys is on a level of hardness that pretty much renders it impossible. So I wouldn't really bother trying to make a p

Re: Using other compression algos with GnuPG

2006-01-21 Thread Roscoe
LZMA seems to be notably[1] faster/better than BZIP2, which has made it into the standard so I wouldn't immediately rule out its suitability for OpenPGP. That said I don't much think it should be included. It could *replace* BZIP2 but replacing BZIP2 with LZMA would break backwards compatibility a

Re: Create key's over 4096 bit ????

2005-12-22 Thread Roscoe
Well, I don't think the difficulty of breaking a asymmetrical key doubles per bit like it does for symmetical keys. >From wikipedia: "As of 2003 RSA Security claims that 1024-bit RSA keys are equivalent in strength to 80-bit symmetric keys, 2048-bit RSA keys to 112-bit symmetric keys and 3072-bit

Re: No Debian package for 1.4.2

2005-09-08 Thread Roscoe
I imagine it's because stable is frozen. Hence only fixes will get in - and not new vewsions. (I maybe wrong on that.) (Naturally that only applies to stable..) Building and installing your own gnupg.deb from gnupg.org sources has significant merits though. (For those unfamilar its a three command

Re: Transparent keyboards

2005-09-05 Thread Roscoe
First: Sure, with enough anything can be brute forced. But what happens when that "enough" isn't possible? Brute forcing (alone) 256-bit keys is a joke. It's just not a issue. Second: Being investigated by animal rights folk does *not* make you a terrorist. Now back to being on topic but still

Re: Forgot the key passowrd

2005-08-09 Thread Roscoe
Curious, anyone know how many passwords/second that gets? On 8/10/05, Folkert van Heusden <[EMAIL PROTECTED]> wrote: > If it is not too long (too many characters), try 'nasty': > http://www.vanheusden.com/nasty/ > > On Tue, Aug 09, 2005 at 10:10:20PM +0530, Thutika, Srinivas (ODC - Satyam) > wro

Re: Automaticaly import public keys by e-mails

2005-08-08 Thread Roscoe
number processed: 1 gpg: imported: 1 gpg: 3 marginal(s) needed, 1 complete(s) needed, classic trust model gpg: depth: 0 valid: 4 signed: 4 trust: 0-, 0q, 0n, 0m, 0f, 4u gpg: depth: 1 valid: 4 signed: 0 trust: 1-, 0q, 0n, 3m, 0f, 0u gpg: next trustdb check due at 2005-10-06 g

Re: throughput of GnuPG symmetric ciphers

2005-08-04 Thread Roscoe
On 8/4/05, Ryan Malayter <[EMAIL PROTECTED]> wrote: > My test show 7-zip yields ~228 Mbps on a 2.4 GHz P4. The only cipher > available with this program is AES256 in (I believe) ECB mode. You seem pretty knowledgeable, but I'll say it anyway: ECB in general shouldn't be used. Especially in the c

Re: throughput of GnuPG symmetric ciphers

2005-08-04 Thread Roscoe
I suggest looking at openssl. I'd hazard a guess that most nix OS's end up with it installed. The speed command does benchmarking :) Barton 2Ghz: $ openssl speed aes-256-cbc bf-cbc Doing aes-256 cbc for 3s on 16 size blocks: 6396149 aes-256 cbc's in 2.98s Doing aes-256 cbc for 3s on 64 size bloc

Re: Protecting signing key]

2005-08-03 Thread Roscoe
loop-aes is not in the vanilla kernel sources. dm-crypt and cryptoloop are. cryptoloop is depreciated, use dm-crypt instead. dm-crypt'd main advantage is that it's already in the kernel, whereas loop-aes is a add-on. Look at the different modes of encryption supported and make a decision from ther

Re: Binary public key explained in detail anywhere?

2005-06-07 Thread Roscoe
http://www.ietf.org/internet-drafts/draft-ietf-openpgp-rfc2440bis-13.txt That would be all you need I think. On 6/8/05, Oskar L. <[EMAIL PROTECTED]> wrote: > Hi, > > I export a public key in binary format and open it in a hex editor. Is > there any documentation explaining what I see? Like if t

Re: Passphrase Encoding and Entropy

2005-06-07 Thread Roscoe
Bit early in the morning to try to comprehend your main question, but I can answer the question about the string to key part :). There are 3 ways to generate a key from a password outlined in the rfc: 1. Merely hashing password. 2. Salting then hashing. 3. Salting then hashing, then hashing aga

Re: passphrase or random characters the safest

2005-05-28 Thread Roscoe
Well, A 128bit key has 340282366920938463463374607431768211456 possible combinations Lets say there are about 10 words in your dictionary. Lets also say there are about 100 different characters on your keyboard. Now for password of random characters we would need: log(34028236692093846346337

Re: Feature request: Add date and time to filename of encrypted file

2005-05-22 Thread Roscoe
Well, this is generally what I do to achieve that effect: ... | gpg -r $YOU -o backup.`date +%y%m%d`.cpio.gpg -e On 5/22/05, Per Tunedal Casual <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hi again, > I just thought of a new feature: > Add date and time to f

Modifying the number of iterations in S2K generation

2005-04-25 Thread Roscoe
loop-aes comes with the following patch for gnupg: " --- gnupg-1.4.1/g10/passphrase.c.oldTue Feb 15 13:02:31 2005 +++ gnupg-1.4.1/g10/passphrase.cWed Mar 16 17:35:20 2005 @@ -1331,7 +1331,7 @@ if( create && !pass ) { randomize_buffer(s2k->salt, 8, 1);

Re: online email usage with gnupg

2005-03-30 Thread Roscoe
gmail supports pop so thats one way with the help of a pop3 speaking email client. I personally just write my email in my text editor then pipe it through gpg --clearsign [or -ae] then paste it into the webmail interface. Sure its not the worlds fastest operation but hey, its <5% of the time it to