Seeking Assurance on Security and Memory Leaks in SuSE GnuPG

2022-10-03 Thread Tony Lee via Gnupg-users
TL > I was pleased to receive a rapid response from Werner Koch, who explained that the nominated count_value of 1024 actually used a default count_value compatible with gpg 1.4, and then went on to explain that OpenPGP used an SHA1-based Key Distribution Function (KDF). Jacob B > KDF here is

Seeking Assurance on Security and Memory Leaks in SuSE GnuPG

2022-10-01 Thread Tony Lee via Gnupg-users
On Aug 27 I submitted a query to this mailing list on the same Subject as headed here, with further details on the software used. Specifically, I timed the encryption (primarily the KDF aspect) of alternative cleartext_files with various legal count_value values (1024, 131072, 2097152, 6501171

Re: Seeking Assurance on Security and Memory Leaks in SuSE GnuPG

2022-08-30 Thread Tony Lee via Gnupg-users
First: I am impressed, and honoured, to have had a fast response from Werner. I vaguely understand your explanation that the 1024 "Count" value was interpreted for backward compatibility with 1.4. However, according to the info gpg, I had followed their instructions in asking for some specific alg

Seeking Assurance on Security and Memory Leaks in SuSE GnuPG

2022-08-27 Thread Tony Lee via Gnupg-users
I have recently been seeking assurances on protection of sensitive data on my SuSE Leap 15.4 system, and protection of passwords. Issues discussed concern gpg2 2.2.27-150300.3.5.1, and keepassxc 2.7.1-bp154.3.3.1; together with hypothetical queries on Youbikey as libykpers-1-1 1.19.0-4.19. Prote