On 10/29/2012 8:00 PM, Christopher J. Walters wrote:
> Good idea. It'll work on any system that will run GnuPG, and produce
> pretty secure passphrases.
Speaking only for myself, I find these passphrases to be at the upper
limit of what I can reliably memorize, and I can only keep track of four
o
On 10/27/2012 02:54 AM, Robert J. Hansen wrote:
> No, I don't. I think that using passphrases longer than about 80
> characters shows you don't understand the problem. :)
Yes, and only a savant could memorize even an 80 character passphrase.
> A 1024-character passphrase is so long I doubt you
j...@dodec.lt wrote:
> Ok thanks, just found that compiling gpg without agent can be workaround
> as well.
> On 10/27/2012 10:17 PM, Robert J. Hansen wrote:
>> On 10/27/2012 3:12 PM, j...@dodec.lt wrote:
>>> Is it somehow possible to bypass ncurses dialog window?
>> You want to use GnuPG 1.4, whic
Ok thanks, just found that compiling gpg without agent can be workaround
as well.
On 10/27/2012 10:17 PM, Robert J. Hansen wrote:
On 10/27/2012 3:12 PM, j...@dodec.lt wrote:
Is it somehow possible to bypass ncurses dialog window?
You want to use GnuPG 1.4, which does not use gpg-agent for hand
Thanks Robert. One more thing, I want to revoke one my keys which has
very long password, but the thing is that I cannot do that as ncurses
does not accept long passwords. Is it somehow possible to bypass ncurses
dialog window? If not, maybe you remember from which version gpg started
to use cu
On 10/27/2012 3:12 PM, j...@dodec.lt wrote:
> Is it somehow possible to bypass ncurses dialog window?
You want to use GnuPG 1.4, which does not use gpg-agent for handling
passphrases.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnup
On 10/27/2012 3:58 AM, j...@dodec.lt wrote:
> I thought that during new key generation event I have to utilize system,
> keyboard etc all the time, I see that I was wrong.
Depends a lot on your operating system. For most modern OSes it's not
required at all -- I see that you're running on Windows
I thought that during new key generation event I have to utilize system,
keyboard etc all the time, I see that I was wrong. Thanks for all
answers, they are really helpful.
On 10/27/2012 9:54 AM, Robert J. Hansen wrote:
On 10/27/2012 1:58 AM, j...@dodec.lt wrote:
Well, I knew that there is a l
On 10/27/2012 1:58 AM, j...@dodec.lt wrote:
> Well, I knew that there is a limit somewhere, but you know, having a
> passphrase longer than 1024 and not longer lets say than 2048 chars
> should not be a limit on 2012, don't you think so ? :)
No, I don't. I think that using passphrases longer than
Hey Robert,
thanks for quick reply!
Well, I knew that there is a limit somewhere, but you know, having a
passphrase longer than 1024 and not longer lets say than 2048 chars
should not be a limit on 2012, don't you think so ? :)
To answer to your question about why I need so long psw is simpl
On 10/26/12 11:40 PM, j...@dodec.lt wrote:
> I'm not sure why, but there is a password length limit on 1.x
> version (even in the latest release), not sure why ?
There are always limits. If you're on a system with 4Gb RAM, good luck
putting in a passphrase longer than 4 billion characters. Admit
Hi,
I'm not sure why, but there is a password length limit on 1.x version
(even in the latest release), not sure why ?
An example situation:
--gen-key
<..set everything.. including any length password..>
For testing I got password which is longer than 1024 chars. Now when
trying to encrypt
12 matches
Mail list logo