Re: Revocation certificates

2014-01-24 Thread Leo Gaspard
On Fri, Jan 24, 2014 at 07:47:15AM +0100, Werner Koch wrote: > [...] > > > the usefulness of revocation certificate, just the advice always popping > > out to > > generate a revocation certificate in any case, without thinking of whether > > it > > would be useful. > > Okay, that is a different

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-24 Thread Leo Gaspard
On Thu, Jan 23, 2014 at 04:38:19PM -0800, Robert J. Hansen wrote: > >Well... I don't know how you type > > With a nine-volt battery, a paperclip, and a USB cable that has only one end > -- the other is bare wires. You wouldn't believe how difficult it is to do > the initial handshake, but once yo

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-24 Thread Heinz Diehl
On 24.01.2014, Leo Gaspard wrote: > Actually, this is something I never understood. Why should people create a > revocation certificate and store it in a safe place, instead of backing up the > main key? Because a backup only makes sense when it's stored in a diffrent place than the key itself:

Re: Revocation certificates

2014-01-23 Thread Werner Koch
On Thu, 23 Jan 2014 23:15, ekl...@gmail.com said: > Oh? I thought the most common reason was test keys, and tutorials which > explain > step-by-step how to make a keypair and push it on a keyserver, without telling Obviously, I don't have no hard evidence for the claim that forgotten passpharses

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Robert J. Hansen
Well... I don't know how you type With a nine-volt battery, a paperclip, and a USB cable that has only one end -- the other is bare wires. You wouldn't believe how difficult it is to do the initial handshake, but once you've got it down you can easily tap out oh, three or four words a min

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Leo Gaspard
On Thu, Jan 23, 2014 at 03:08:40PM -0800, Robert J. Hansen wrote: > >Yet, I agree I would not send my encrypted private key. But having your > >divorced > >spouse bruteforce 90 bit of passphrase just to annoy you... seems quite an > >unreasonable threat to me. > > It is. That's why that's not the

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Robert J. Hansen
Yet, I agree I would not send my encrypted private key. But having your divorced spouse bruteforce 90 bit of passphrase just to annoy you... seems quite an unreasonable threat to me. It is. That's why that's not the threat being defended against. The threat is against your spouse seeing you

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Leo Gaspard
On Thu, Jan 23, 2014 at 01:27:58PM -0800, Robert J. Hansen wrote: > [...] > > And yes, a strong passphrase is still the strongest bar against these > backups being misused -- but unless you've got an eye-poppingly strong > passphrase, your best bet is to rely on denying attackers access to the dat

Re: Revocation certificates

2014-01-23 Thread Leo Gaspard
On Thu, Jan 23, 2014 at 10:26:33PM +0100, Werner Koch wrote: > On Thu, 23 Jan 2014 21:25, ekl...@gmail.com said: > > > PS: Please, do not tell me one might have forgotten his passphrase. In this > > case > > there is no harm in shredding the secret key and waiting for the expiration > > Experien

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Leo Gaspard
On Thu, Jan 23, 2014 at 09:59:30PM +0100, Pete Stephenson wrote: > [...] > > They would need to be trustworthy > enough to not abuse the revocation certificate by revoking your > certificate, but otherwise would not need to be given absolute trust > that comes with having a copy of the private key

Re: Revocation certificates

2014-01-23 Thread Werner Koch
On Thu, 23 Jan 2014 21:25, ekl...@gmail.com said: > PS: Please, do not tell me one might have forgotten his passphrase. In this > case > there is no harm in shredding the secret key and waiting for the expiration Experience has shown that this is the most common reason why there are so many secr

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Robert J. Hansen
Actually, this is something I never understood. Why should people create a revocation certificate and store it in a safe place, instead of backing up the main key? A "safe place" for a revocation certificate may be vastly different from a "safe place" for a backup of your certificate. For i

Re: Revocation certificates [was: time delay unlock private key.]

2014-01-23 Thread Pete Stephenson
On Thu, Jan 23, 2014 at 9:25 PM, Leo Gaspard wrote: > On Thu, Jan 23, 2014 at 05:53:57PM +, nb.linux wrote: >> And, you can be prepared for such an event (i.e. having created the >> revocation certificates in advance, stored them in a save but accessible >> place, printed out on paper,...). >

Re: Revocation certificates

2010-01-28 Thread Robert J. Hansen
On 01/28/2010 10:44 PM, Richard Geddes wrote: > Generating a revocation certificate as soon as you generate your key > pair is a wise thing to do, in case you lose control of your passphrase > ... I did that. Good! :) > My question is, if I edit my key pair... let's say I add a new uid to my > k

Re: Revocation Certificates

2008-10-05 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Jorgen Christiansen Lysdal wrote: > Robert J. Hansen wrote: >> This deputy sheriff reported to his superior, and I wound up >> with a thirty-day delay in the paperwork while the county sheriff made >> sure that I didn't have murder afoot. Were they

Re: Revocation Certificates

2008-10-05 Thread Jorgen Christiansen Lysdal
Robert J. Hansen wrote: > This deputy sheriff reported to his superior, and I wound up > with a thirty-day delay in the paperwork while the county sheriff made > sure that I didn't have murder afoot. Were they overreacting? Sure,a > bit. But they were also doing their job. They could have been

Re: Revocation Certificates

2008-10-04 Thread Robert J. Hansen
Faramir wrote: > With due respect to USA, each time I read things like this, I am happy > for not living there... my main concern here is if economy will be > affected or not for things happening outside my country. But at least I > know I can rely on justice to don't cause me problems for things

Re: Revocation Certificates

2008-10-04 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Lawrence Chin escribió: > I'm sorry to have failed to observed Netiquette, but I was just too > afraid. I have been reported before to law enforcement as saying things You was reported? By somebody? The *proper* use of encryption should prevent

Re: Revocation Certificates

2008-10-04 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Robert J. Hansen wrote: > If you are that concerned about the intelligence and/or law-enforcement > communities seeing what you write, you should be very careful about your > involvement on this, or any of several other, mailing lists. More precise

Re: Revocation Certificates

2008-10-04 Thread Robert J. Hansen
Lawrence Chin wrote: > So I'm very paranoid about, not just what I said to others, but > precisely what others said to me. If this is of so much concern to you, you should probably consider leaving the various crypto mailing lists altogether. Members of various national intelligence communities a

Re: Revocation Certificates

2008-10-04 Thread Lawrence Chin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 markus reichelt wrote: > * Faramir <[EMAIL PROTECTED]> wrote: > >> Begin of "spoiler blank lines" >> [...] >> End of "spoiler blank lines" > > niiice, I bet he didn't catch that one! > > > >

Re: Revocation Certificates

2008-10-04 Thread markus reichelt
* Faramir <[EMAIL PROTECTED]> wrote: > Begin of "spoiler blank lines" > [...] > End of "spoiler blank lines" niiice, I bet he didn't catch that one! -- left blank, right bald pgptXuX9KPvBR.pgp Description: PGP signature ___ Gnupg-users mailing list

Re: Revocation Certificates

2008-10-04 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Lawrence, if your nerves are so shaken, maybe you should stop reading this message right now, and delete this message, or maybe keep it to read it once you are better. I will put some blank lines as "spoiler", just in case. And please note, this mess

Re: Revocation Certificates

2008-10-04 Thread John W. Moore III
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Lawrence Chin wrote: > This is another message of Kara's that's causing me nightmare last night > when I read through it. We shouldn't have words like "...Deputy > director" or "NS adviser" etc in an encrypted email! Why? Even if Reference to enti

Re: Revocation Certificates

2008-10-04 Thread Lawrence Chin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Kara wrote: > > > Reference Faramir's 27 Sep (2218 -0400) "Re: backing up keys etc" > which responded to your 27 Sep (1738 -0700) "backing up keys etc": > > Lawrence wrote in part: >>> So, if I need to revoke this public key in the future, I jus