Re: Managing the WoT with GPG

2017-06-26 Thread martin f krafft
also sprach Peter Lebbing [2017-06-23 17:56 +0200]: > There are two hard problems in computer science: Cache invalidation, > naming things, and off-by-one errors. I haven't heard that one in years. Lol. ;) > Martin, I think --no-auto-check-trustdb and a cron job will > already make it much more

Re: Managing the WoT with GPG

2017-06-23 Thread martin f krafft
also sprach Werner Koch [2017-06-22 19:02 +0200]: > For a key listing this means computing it for every listed key. And the > majority of frontends first do a key listing and show the validity of > the keys before you can encrypt something. Obviously, one could work with caching hereā€¦ Running -

Re: Key corruption: duplicate signatures and usage flags

2017-06-23 Thread martin f krafft
also sprach Werner Koch [2017-06-23 09:40 +0200]: > Those flags are tracked in self-signatures. When changing a flag > a new self-signature is used. This will be uploaded to the > keyserver. gpg uses the flags from the latest self-signature it > has. So how does this explain % export GNUPGH

Re: Key corruption: duplicate signatures and usage flags

2017-06-22 Thread martin f krafft
also sprach MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> [2017-06-23 00:33 +0200]: > I didn't know you could remove a usage flag once the key was on the > keyservers. Well, it somehow seems to work, apart from the fact that gnupg first needs to clean up the key (using --edit-key) after download

Re: Managing the WoT with GPG

2017-06-22 Thread martin f krafft
also sprach Neal H. Walfield [2017-06-22 16:15 +0200]: > I didn't say that it is not possible to have a better algorithm. It > is possible. But, it is not as easy as you suggest (and what you > suggest doesn't sound trivial). > > For instance, adding or updating a key doesn't necessarily result

Re: Managing the WoT with GPG

2017-06-22 Thread martin f krafft
also sprach Peter Lebbing [2017-06-22 15:46 +0200]: > > As far as I understand, the parameters --marginals-needed and > > --completes-needed can be used to define a maximum search depth D, > > so when I ask GPG to update the trustdb WRT key 0xdeadbeef, then I'd > > envision it to > > Don't you me

Re: Managing the WoT with GPG

2017-06-22 Thread martin f krafft
also sprach Andrew Gallagher [2017-06-21 15:57 +0200]: > I have a quick and dirty tool here: > https://github.com/andrewgdotcom/synctrust Yeah, that'll do the job, except it blindly overwrites changes made locally. It's unlikely this happens, but say I declared your key trustworthy last night at

Re: Managing the WoT with GPG

2017-06-22 Thread martin f krafft
also sprach Neal H. Walfield [2017-06-21 14:00 +0200]: > It starts with the set of ultimately trusted keys. But let's say > that you start with key X, which is not ultimately trusted. What > should GnuPG do with the result? Or, let's say that X is > ultimately trusted and it decides that key Y

Re: Key corruption: duplicate signatures and usage flags

2017-06-22 Thread martin f krafft
Hey Justus, thanks for writing in. Here are the answers you wanted: > gpg --version please? 2.1.18 > > So far, so good. Do note the [SC] usage flags. > > What are the capabilities of your primary key supposed to be? There were [SC] when I created it, but I've recently changed to a signing subk

Re: Managing the WoT with GPG

2017-06-21 Thread martin f krafft
also sprach Neal H. Walfield [2017-06-21 11:53 +0200]: > > 3. Is there a way to run --check-trustdb or --update-trustdb not > >over the entire key graph, but only traversing to a certain depth > >starting from a specific key? Then I could tell parcimonie to run > >--check-trustdb for e

Key corruption: duplicate signatures and usage flags

2017-06-21 Thread martin f krafft
ome/ssd/madduck/.tmp/cdt.p0R8ly/trustdb.gpg: trustdb created gpg: key 55C9882D999BBCC4: public key "Martin F. Krafft " imported gpg: no ultimately trusted keys found gpg: Total number processed: 1 gpg: imported: 1 % gpg --list-keys !$ gpg --list-keys 0x55C9882D999BB

Managing the WoT with GPG

2017-06-20 Thread martin f krafft
Hello, I've spent some time trying to figure out how to make actual use of the web-of-trust (the "pgp" trust-model), and I am turning to this list for some advice, related to a couple of questions: 1. My public keyring has several thousand keys and "weighs" almost 500Mb. Every couple of runs,

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread martin f krafft
also sprach MFPA [2010.10.14.0102 +0200]: > The user can type their password once per session into a text file > and paste it every time it is requested. This reduces the > annoyance factor and does not train the user to constantly re-type > the passphrase. That's a great idea. I have started wor

3072 bit keys, smartcards and bugs (was: 8192bit RSA keys)

2009-07-13 Thread martin f krafft
also sprach Werner Koch [2009.07.10.1532 +0200]: > > I have a 4096 bit RSA key -- can I create 2048 or 3072 bit > > 4096 is in fact also supported but that would require major > changes in GnuPG, thus this published limit of 3072 Could you give us a hint why GnuPG would need changing? >

Re: 8192bit RSA keys

2009-07-13 Thread martin f krafft
also sprach David Shaw [2009.07.09.2040 +0200]: > http://shop.kernelconcepts.de/product_info.php?cPath=1_26&products_id=42 > > They say they have the new cards in stock now. So they say key length up to 3k. Does that affect key generation only? If not, why wouldn't those cards be able to handle

8192bit RSA keys

2009-07-08 Thread martin f krafft
Hey folks, Two years ago, there was a thread on this list, in which RSA key sizes >2048 were discussed [0]. In these two years, the crypto-world has been shaken up a bit, and computers got yet a bit more powerful. 0. http://lists.gnupg.org/pipermail/gnupg-users/2007-June/031285.html I am trying