Jim,
I don't use modern but I do have a script for classic that works in unattended
mode on a Linux box. The caller knows the input file name and the script knows
my passphrase -- default gpg_pass2. Hope this helps with gpg2! --Steve
$ cat gpg_encrypt
#!/bin/ksh
usage="gpg_encrypt [ -a -b -e
Go to any public key server and get that key ID.
However, before doing that, I'd first verify the checksum without using GnuPG.
That process should also have been described on the download page.
-Original Message-
From: Gnupg-users [mailto:gnupg-users-bounces+sbutler=fchn@gnupg.or
-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of Hariharan
Shweta
Thanks for the response. We have provided them our public key.
The key 31743B64 is not our public key. I'm confused as our vendor is able to
decrypt our message but we are not able
Any "secure" storage for the passphrase will itself need a mechanism to
"unlock". This only digs the hole one more level down. Only you can decide
when to stop digging. But remember, whatever the automated script can do, a
human following the script can also do. [Note to self, use "hacker" i
Did you say this was on a VM? We've had corrupted files with 'cp' from one
file system to another on a VM box if it decided to do a vmotion while the copy
was in progress.
Just remember -- "To err is human, but to really foul things up you need a
computer."(Paul Ehrlich)
-Original Messag
Perhaps an ASCII download instead of binary? That would make the download file
larger!
-Original Message-
From: Gnupg-users [mailto:gnupg-users-bounces+sbutler=fchn@gnupg.org] On
Behalf Of Aaron Tovo
Sent: Tuesday, January 26, 2016 8:45 PM
To: gnupg-users@gnupg.org
Subject: Re: BAD
Either set --homedir on the command line or in the options file.
-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of Jarle
Hammen Knudsen
Sent: Wednesday, December 16, 2015 8:19 AM
To: Gnupg-users@gnupg.org
Subject: Get gpg to use keyring files in the
There is under 1.4. Don't know if it is in v2. I'm not at my desk to pop the
script open. But you could pipe the passphrase via stain and tell gpg to
grab it from there. Be careful as that still leaves it in the clear to those
reading your script. Potential local users could also see it
-Original Message-
From: Werner Koch [mailto:w...@gnupg.org]
Sent: Friday, July 24, 2015 4:24 AM
On Thu, 23 Jul 2015 19:11, sbut...@fchn.com said:
> This is a snippet of the script I use to decrypt any file coming to me that
> has my private key (or my companies private key)
>
> $DFLT
This is a snippet of the script I use to decrypt any file coming to me that has
my private key (or my companies private key)
$DFLT gpg_pass2 \
| gpg --homedir $homedir --quiet --passphrase-fd 0 --no-tty --skip-verify \
--no-permission-warning --no-mdc-warning --batch \
--outp
Biggest pitfall -- new users sending me both their public and private keys.
Most have a mental block on how these are used.
I generated a set of documents about a decade ago that someone asked permission
to post on the web. Just did a search and could not find. I'll try to dig
through my thum
MFPA:
>
>
> On Monday 1 June 2015 at 5:37:33 PM, in
> ,
> gnupg-us...@henk.geekmail.org wrote:
>
>
>> A comment worth reading in case one does not see it oneself IMHO:
>> https://blogs.fsfe.org/gerloff/2015/06/01/facebook-offers-to-send-you
>> -encrypted-emails-this-wont-help-you/
>
> Whatev
Client with PGP is encrypting files that we can usually decrypt with GnuPG
1.4.16 on an Oracle Enterprise Linux (2.6.8-274.17.1.0.1.e15).
Occasionally gpg reports: gpg: block_filter: 1st length byte missing.
Client will re-encrypt and resend. That file always (even with different name)
is not
13 matches
Mail list logo