On Sat, 16 Jun 2007, Snoken wrote:
> I suppose this means that 1024 bit RSA-keys are ridiculous and the
> Open PGP Card is a joke. And what about all web sites protected by
> SSL with a 1024-bit RSA-certificate?
The only thing that is ridiculous is this flame-bait language. Feel the freedom
to p
I do this but don't use the module, just the shell.
You have to confirm the environment for the user. I reset HOME.
$ENV{'HOME'}="/home/gnupg";
.gnupg directory permission has to be 0700 owned by the webserver user, with
0600 on the files.
Plaintext is encrypted to the key and then securely de
Check error_log for the problem (if you can) - permissions on ~/.gnupg files
will cause things to not work and you must have environment exported for the
nobody user. I reset $ENV{'HOME'} in perl... there must be something
similar in php. If you can view the environment the server provides in th
get over it, publishing your email results in spam; I don't think that this
suprises anyone anymore - deal with it in your own way and move on. The rage
against spam has resulted in excellent filtering software, but the
energy on both sides amounts to equilibrium.
Stef
http://caunter.ca/contac
"`date` `hostname` backup $OK" | mail -s "`hostname` backup $OK" you
Stef Caunter
http://caunter.ca/contact.html
Is there any documentation on how to do that?
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
The documentation does not recommend this.
Since you appear to not want to store the ciphertext but the plaintext, an
encrypted network transfer seems appropriate and less expensive. Write the
backup to an ssh pipe instead of a temporary file.
Stef
http://caunter.ca/contact.html
On Wed, 22 M
I'm sure I have just missed this in the archives, but I cannot see mention of a
way to get sufficient randomness when running gpg remotely in a shell account
to batch generate key pairs, i.e.
gpg --gen-key --batch tmp
where tmp is populated according to doc/DETAILS example. Here is what I've d