1.4 branch (with regrets, since I like some of the functionality that is
> provided in 2.x now).
Same here. Maybe i'm missing something, but it seems without the ability
to have multiple keyrings in GPG configuration one will lose an ability
to use detached subkeys (or actually any private key
the web UI
unfortunately).
The notation could have some (close to negligible) use in those cases,
however i as well as Werner don't see much practical sense in
timestamp-only sig type discussed in another subthread as all
timestamping operations are performed with a dedicated key anyway.
--
Vla
fore encryption.
Or unless compression is disabled explicitly with "--compress-algo none".
--
Vlad "SATtva" Miller
3d viz | security & privacy consulting
www.vladmiller.info | www.pgpru.com
___
Gnupg-users mailing list
Gnupg-u
PG computes
validity automatically. Trust doesn't gets transferred from one key to
another. Validity does (in a sense).
--
Vlad "SATtva" Miller
3d viz | security & privacy consulting
www.vladmiller.info | www.pgpru.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
a custom monitor to
prevent a user making photo shots.
--
Vlad "SATtva" Miller
3d viz | security & privacy consulting
www.vladmiller.info | www.pgpru.com
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
kr aid (09.06.2009 05:23):
> What's interesting to me is that the top half of the public keys are the
> same, only the bottom half changes. What I want to know is
> 1. Why did this happen?
> 2. Will this be a problem on my end? To me it looks like the public key
> that gpg uses is completely diff
skl99...@gmx.net (02.02.2009 23:25):
> Hello,
>
> is there a possibility to have gpg2 make a detached cleartext
> signature? I only seem to be able to have it do either the one or the
> other.
gpg --armor --detach-sign --sign
> And the more complex follow on question for all the crypto experts
>
David Newman (25.01.2009 01:15):
> Michael Lucas' gpg/pgp book recommends setting a relatively short
> expiration time, such as a year, for personal keys.
>
> Would an expired key still work into the future? If, for example, I
> sign/encrypt a file today using a key that expires next year, would I
Lai, Thomas (19.01.2009 07:15):
> Hello Vlad "SATtva" Miller,
>
> Your answer is very helpful.
>
> The first option is ok, however about the second,
> I could not find the option --passphrase-file in command gpg.
> The gpg version I used is gpg (GnuPG) 1.2.1.
Yo
Chris Walters (16.01.2009 10:32):
> Hello,
>
> I was wondering if anyone else was having this problem. I am running an AMD64
> arch, and when I try to "emerge notification-daemon", it will not compile
> because libnotify is not present. If I try to emerge libnotify, it tries to
> merge notifica
Lai, Thomas (16.01.2009 15:35):
> Is there any way to decrypt files without entering my private key's
> passphrass?
Yes. You could remove passphrase from your private key (do --edit-key
[your_key], then passwd, and finally save). Or you could write your
passphrase in some text file and supply it t
Marc Young (15.12.2008 01:18):
> How to remove "Version: GnuPG v1.4.9 (MingW32)" using enigmail?
Open Enigmail preferences, make sure the "Display expert settings" is
set in Basic tab, open Advanced tab, and add this to "Additional
parameters for GnuPG" field:
--no-emit-version
Alternatively, yo
Duwaine Robinson (29.10.2008 19:11):
> Hi All,
>
> I would like to be able to create a batch file or a script that allows
> me to decrypt multiple encrypted files within a given folder. Has anyone
> done this before? Any help would be greatly appreciated.
On Linux that's easy.
To encrypt:
$ find
Kevin Hilton (21.10.2008 22:52):
>> If the hash output is not enough, then extra 0x00 byte will be added to
>> your passphrase and hashed again to produce additional and different
>> hashing output. If even this isn't enough, then two 0x00 bytes will be
>> added and hashed again, and so on.
>
>
>
Kevin Hilton (21.10.2008 21:48):
>> Depends on what algorithm you're using for the symmetric cipher. A 128-bit
>> cipher gets a 128-bit session key, a 256-bit cipher gets a 256-bit session
>> key. The only exception might be 3DES, which >technically requires a
>> 192-bit session key, but since
Faramir (14.10.2008 03:53):
> David Shaw escribió:
>> On Mon, Oct 13, 2008 at 01:32:51AM -0300, Faramir wrote:
>
>>> So, is there a way to ask a keyserver about "keys signed by"?
>>>
>> Sure, use Wotsap: http://www.lysator.liu.se/~jc/wotsap/search.html
>
>> Plug your keyid into the "Key stat
Robert J. Hansen (20.08.2008 09:12):
> Bhushan Jain wrote:
>> I wanted to know how could the file be deleted securely using PGP?
>
> Assuming you meant GnuPG, the answer is 'no'.
>
> Assuming you meant PGP, the answer is 'maybe'. PGP provides a secure
> deletion tool, but as far as I know there
Werner Koch (23.06.2008 16:59):
> On Sat, 21 Jun 2008 21:46,
> [EMAIL PROTECTED] said:
>
>> With it, in complains "gpg: Sorry, no terminal at all requested - can't
>> get input"
>
> Add option "--batch".
Or, if interactive mode is desired, place this in your initrd script:
mv /dev/tty /dev/tty.
Funaki, Yasuhiro (07.05.2008 10:31):
> Dear expert,
>
> I understand as below when hash is used at decrypting operation.
>> Hash algo is used to generate a key to decrypt a private key from
> passphrase at decrypting operation.
> When above my understanding is correct,
> could you advice me how to
Chilupuri, Vishwarupachary (Chary) (AU - Sydney) (08.05.2008 12:08):
> Hi ,
> I got a situation like below:
> Web form with name,address,creditcard details so on. so i'm encrypting
> using the public key,and storing it in the database.
> Later i'm exporting the results from the database to the Exce
Johannes Graumann (23.04.2008 21:26):
> Hi all,
>
> I've done some superficial googleing, but didn't get far ... so I'm asking
> here:
> Is anybody aware of a software project implementing a time stamping service
> via gnupg: you submit your signature of a file and it comes back signed by
> a time
Robert J. Hansen (15.04.2008 06:06):
> ... Rijndael is AES, incidentally. Rijndael was the name it was
> submitted under to the AES competition. Once it was chosen as the
> winner, it became AES. And yes, I have seen people passionately
> advocating for the inclusion of Rijndael in OpenPGP, desp
Karl Voit wrote on 17.03.2008 21:42:
But: what if an employee quits the company? Can I revoke the
signature? <...>
Sure! Just $ gpg --edit-key , then select the corresponding UID
and issue revsig command. Search gpg man for revsig command for details.
--
SATtva | security & privacy consultin
Brent Hagany wrote on 22.01.2008 01:10:
> I have found and corrected the problem: it should be
> "--homedir=/home/daemon/.gnupg". Also, for some reason, setting
> GNUPGHOME directly does not work.
>
> Getting a useful error message was a great help. Thanks again, Vlad.
Glad to help you. I'm usi
Vlad "SATtva" Miller wrote on 19.01.2008 01:58:
[snip]
> Both subkeys have expired in the end of the last year, but I've chosen
> not to generate new and to simply extend life of existing subkeys for
> another few years, so I've re-signed them with extended exp
Charly Avital wrote on 19.01.2008 18:26:
> Vlad "SATtva" Miller wrote the following on 1/19/08 6:01 AM:
> [...]
> | Here for example (in the bottom) you may see two subkeys with binding
> | signatures expired at 2007-12-31:
> |
> http://pool.sks-keyservers.net:11371/pks
Simon Josefsson wrote on 19.01.2008 17:15:
> "Vlad \"SATtva\" Miller" <[EMAIL PROTECTED]> writes:
[snip]
>> If I understand this correctly and not missing something terribly here,
>> keyservers just looked at newly uploaded key, thought "huh? I alrea
While I understand that this place isn't the best for PKS bug reports,
I'm still not sure of what's happening (except it's quite weird). My key
0x8443620A consists of a main certification key and two subkeys: one for
encryption and one for signing.
Both subkeys have expired in the end of the last
Brent Hagany wrote on 19.01.2008 02:39:
> Hello,
>
> This issue has been addressed several times on this list, but after
> several hours of searching, I cannot find a solution that works for me.
> Here's a simple test case that I cannot get to work:
>
> $out = exec("/usr/bin/gpg --list-keys",$out
Richard Casella wrote on 18.01.2008 22:21:
> Sorry if this has been posted before, but for some reason I can't
> get to the list archive and I couldn't find anything about it in
> the How-tos.
>
> I have a need to synchronize gpg keychains on two machines that
> are decrypting messages behind a VI
I'd like to now publicly congratulate Werner, David and all other
contributors and developers with the remarkable achievement GnuPG is!
Kudos from me personally and from all "openPGP in Russia" community.
For those interested I've published our Russian translation of Werner's
"A Short History of t
31 matches
Mail list logo