Re: after OS update I can't use my OpenPGP card anymore

2023-09-25 Thread Matthias Apitz
El día martes, septiembre 26, 2023 a las 09:35:52a. m. +0900, NIIBE Yutaka escribió: > Matthias Apitz wrote: > > $ gdb /usr/local/libexec/scdaemon > > ... > > r --debug-all --verbose --verbose --server > > ... > > OK GNU Privacy Guard's Smartcard server ready > > SERIALNO > > [New LWP 101967 of

Re: after OS update I can't use my OpenPGP card anymore

2023-09-25 Thread NIIBE Yutaka
Matthias Apitz wrote: > $ gdb /usr/local/libexec/scdaemon > ... > r --debug-all --verbose --verbose --server > ... > OK GNU Privacy Guard's Smartcard server ready > SERIALNO > [New LWP 101967 of process 2622] > > Thread 2 "pipe-connection" received signal SIGSEGV, Segmentation fault. > Address not

Re: after OS update I can't use my OpenPGP card anymore

2023-09-24 Thread Matthias Apitz
El día lunes, septiembre 25, 2023 a las 11:03:23a. m. +0900, NIIBE Yutaka escribió: > Hello, > > Matthias Apitz wrote: > > After an update of FreeBSD from 13-CURRENT to 14-CURRENT I can't used > > my OpenPGP card with the USB token anymore. In /var/log/messages &g

Re: after OS update I can't use my OpenPGP card anymore

2023-09-24 Thread NIIBE Yutaka
Hello, Matthias Apitz wrote: > After an update of FreeBSD from 13-CURRENT to 14-CURRENT I can't used > my OpenPGP card with the USB token anymore. In /var/log/messages > it says: [...] > Any hints how to debug this You can run scdaemon as a foreground process to debug. An e

after OS update I can't use my OpenPGP card anymore

2023-09-24 Thread Matthias Apitz
Hello, After an update of FreeBSD from 13-CURRENT to 14-CURRENT I can't used my OpenPGP card with the USB token anymore. In /var/log/messages it says: Sep 24 19:33:02 c720-1400094 kernel: ugen0.4: at usbus0 Sep 24 19:33:07 c720-1400094 kernel: pid 3886 (scdaemon), jid 0, uid 1001: exit

Re: FAQ October 2019 update

2019-10-15 Thread Damien Goutte-Gattat via Gnupg-users
Hi, On Tue, Oct 15, 2019 at 03:17:58PM -0400, Robert J. Hansen wrote: ... Those were the high-priority changes that needed to be made. If anyone has other suggestions, speak up: I'm listening. :) A while ago (I can’t find the e-mail anymore) I suggested a few changes that somehow didn’t fin

Re: FAQ October 2019 update

2019-10-15 Thread Chris Narkiewicz via Gnupg-users
On 15/10/2019 21:59, Robert J. Hansen wrote: > Should they update? Yes. Is the problem mitigated by an update? Yes. > But will they? Probably not before wedging their keyring. Given that > high-profile people in the community have had our certificates defaced, > it's poss

Re: FAQ October 2019 update

2019-10-15 Thread Robert J. Hansen
ill get utterly wedged if they pull down a poisoned certificate from SKS. There are a *lot* of these older installations out there in the wild, and what we suggest to them should not lead them into wedging their system. Should they update? Yes. Is the problem mitigated by an update? Yes. But wil

Re: FAQ October 2019 update

2019-10-15 Thread Werner Koch via Gnupg-users
On Tue, 15 Oct 2019 15:17, Robert J. Hansen said: > * Every reference to the SKS keyserver network now points to > keys.openpgp.org. Reason: the SKS attacks a few months ago. I have to object against this change. The SKS server network is still useful and definitely more useful than an non-matu

FAQ October 2019 update

2019-10-15 Thread Robert J. Hansen
The last time I gave the FAQ a thorough read-and-review was in October 2017, so it was time for a review. I fought off the urge to rewrite the thing entirely -- I really don't like how it flows, but I view my job as maintainer is more about making minor incremental changes than total rewrites when

答复: Two questions about system entropy and update

2019-04-02 Thread Shaoping Xie via Gnupg-users
: 2019年3月31日 8:43 收件人: gnupg-users@gnupg.org 主题: Two questions about system entropy and update Good Morning , I have been tried to generate a key pair and gotten the error : Not enough random bytes available.  Please do some other work to give the OS a chance to collect more entropy

Two questions about system entropy and update

2019-03-31 Thread Shaoping Xie via Gnupg-users
while running iostat, mpstat and using find in other windows. Is there any way I may view the system entropy in Solaris system ?) My GPG is pretty old : gpg (GnuPG) 1.4.10; Copyright (C) 2008 Free Software Foundation, Inc. How can I update GPG ? I have the file transfers with dozens of

Re: Newbie: Installing Build Dependencies to gnupg-2.2.13 update from gnupg 2.0.22 on Ubuntu 14.04 LTS failed

2019-03-15 Thread Daniel
On 13.03.19 18:24, Peter Lebbing wrote: On 13/03/2019 14:21, David wrote: If someone posts hundreds of kilobytes or more, I agree, but in this case I argue the opposite, for these reasons. I fully agree. In fact, I much prefer someone include a lot of information and maybe include too much tha

Re: Newbie: Installing Build Dependencies to gnupg-2.2.13 update from gnupg 2.0.22 on Ubuntu 14.04 LTS failed

2019-03-13 Thread Peter Lebbing
On 13/03/2019 14:21, David wrote: > If someone posts hundreds of kilobytes or more, I agree, > but in this case I argue the opposite, for these reasons. I fully agree. In fact, I much prefer someone include a lot of information and maybe include too much than that the person trying to help has to

Re: Newbie: Installing Build Dependencies to gnupg-2.2.13 update from gnupg 2.0.22 on Ubuntu 14.04 LTS failed

2019-03-13 Thread David
On Wed, 27 Feb 2019 at 23:16, Oscar Carlsson via Gnupg-users wrote: > > And in future emails, try to [...] use pastebin like > services and/or attach logs instead of adding them inline like this. Why is that suggested? If someone posts hundreds of kilobytes or more, I agree, but in this case I a

Re: Newbie: Installing Build Dependencies to gnupg-2.2.13 update from gnupg 2.0.22 on Ubuntu 14.04 LTS failed

2019-02-27 Thread Oscar Carlsson via Gnupg-users
ve me usually a ballpark idea of what i can or cannot do via the command line. i understand that this approach doesn't always make sense or seems abit farfetched to the more experienced programmer. that said, i recently learned when trying to update my outmoded gnupg 2.0.22 on my Ubuntu 14.04 LTS di

Newbie: Installing Build Dependencies to gnupg-2.2.13 update from gnupg 2.0.22 on Ubuntu 14.04 LTS failed

2019-02-26 Thread Daniel
hat i can or cannot do via the command line. i understand that this approach doesn't always make sense or seems abit farfetched to the more experienced programmer. that said, i recently learned when trying to update my outmoded gnupg 2.0.22 on my Ubuntu 14.04 LTS distro, that i ran into

Re: Update FAQ about revocation certificates?

2018-11-12 Thread Daniel Kahn Gillmor
fwiw, i agree with Damien that the existing text in the FAQ about generating a revocation certificate should be removed. I think that there should be some text like "where can i find my key's revocation certificate?" which could be added to the FAQ. However, situations like these: On Sat 2018-11

Re: Update FAQ about revocation certificates?

2018-11-10 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 8 November 2018 at 3:21:58 PM, in , Damien Goutte-Gattat via Gnupg-users wrote:- > And with > modern GnuPG there > is no need to recommend to generate a revocation > certificate. Not immediately after generating a new GnuPG certif

Re: Update FAQ about revocation certificates?

2018-11-09 Thread Stefan Claas
On Fri, 09 Nov 2018 09:22:13 +0100, Werner Koch wrote: > On Thu, 8 Nov 2018 18:34, stefan.cl...@posteo.de said: > > > apartment and accidentally threw away the box > > in which the revocation cert was stored... :-( > > :-( > > > How would you procede now? > > Fetch your backup which for yo

Re: Update FAQ about revocation certificates?

2018-11-09 Thread Werner Koch
On Thu, 8 Nov 2018 18:34, stefan.cl...@posteo.de said: > apartment and accidentally threw away the box > in which the revocation cert was stored... :-( :-( > How would you procede now? Fetch your backup which for you will have stored at a different venue .-) Call the locksmith to open the loc

Re: Update FAQ about revocation certificates?

2018-11-08 Thread Stefan Claas
On Thu, 8 Nov 2018 15:21:58 +, Damien Goutte-Gattat via Gnupg-users wrote: > Hi GnuPG folks, > > The current version of the FAQ recommends creating a revocation > certificate at several places. > > > § 7.17 > > "We recommend you create a revocation certificate immediately >after gener

Update FAQ about revocation certificates?

2018-11-08 Thread Damien Goutte-Gattat via Gnupg-users
Hi GnuPG folks, The current version of the FAQ recommends creating a revocation certificate at several places. § 7.17 "We recommend you create a revocation certificate immediately after generating a new GnuPG certificate." § 8.5 "What should I do after making my certificate? Genera

Re: [openpgp-email] 4th OpenPGP Email Summit - Update

2018-10-19 Thread Kristian Fiskerstrand
> On 17 Oct 2018, at 14:26, Sandro Knau� wrote: > > Hey, > >> - Friday evening: we will meet at the Winery (Trois Tilleuls Street 1, 1170 >> – Brussels, www.winery.be ). People from Mailfence will be there from >> 19:30, I will arrive a little later. I’ve arrived in brussels and checked into h

Re: [openpgp-email] 4th OpenPGP Email Summit - Update

2018-10-17 Thread Sandro Knauß
Hey, > - Friday evening: we will meet at the Winery (Trois Tilleuls Street 1, 1170 > – Brussels, www.winery.be ). People from Mailfence will be there from > 19:30, I will arrive a little later. I'll arrive at 4pm in Bruxelles and after getting rid of my luggage, I'll plan to come to Winery at 19

Re: [openpgp-email] 4th OpenPGP Email Summit - Update

2018-10-08 Thread Werner Koch
On Sun, 7 Oct 2018 10:57, patr...@enigmail.net said: > - we will start on Saturday at 09:30. If you have any issues such as finding > the location or with local logistics, here is my phone number: +41 78 631 6622 Huh, that is early. Andre and me might arrive a bit later. Salam-Shalom, We

4th OpenPGP Email Summit - Update

2018-10-07 Thread Patrick Brunschwig
It's 2 weeks until the Summit. Here are some updates: - Friday evening: we will meet at the Winery (Trois Tilleuls Street 1, 1170 – Brussels, www.winery.be ). People from Mailfence will be there from 19:30, I will arrive a little later. - if you plan to come, but didn't tell me yet, please send

Update primary key on server to not expire

2018-09-27 Thread Wolfgang Pappa
Hello, I changed the expiration date on my primary key from "2018-09-22" to "never expire". On my subkeys I extended the expiration date to "2019-09-24". On my local machine, everything is fine: $ gpg --list-keys bbea93c8 pub rsa4096/BBEA93C8 2014-10-17 [SCA] Key fingerprint = A8FC 7FEC

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-07-16 Thread Andrew Gallagher
fail overnight, it would be an inconvenience but not a disaster. But there is no known alternative to the second function, which is the distribution of key updates, including revocations. Therefore I believe the immediate priority should be to protect update distribution. How to preven

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-06-13 Thread Daniel Kahn Gillmor
On Wed 2018-01-17 08:57:12 +0100, Kristian Fiskerstrand wrote: > On 01/17/2018 01:20 AM, Daniel Kahn Gillmor wrote: >> On Tue 2018-01-16 22:56:58 +0100, Kristian Fiskerstrand wrote: >>> thanks for this post Daniel, my primary question would be what advantage >>> is gained by this verification being

Re: key distribution/verification/update mechanisms other than keyservers

2018-01-17 Thread Daniel Kahn Gillmor
On Wed 2018-01-17 15:51:07 +, Andrew Gallagher wrote: > On 17/01/18 15:32, Daniel Kahn Gillmor wrote: >> i don't think you need an extension to OpenPGP at all to do this -- you >> just need policy. The policy could be (for example): > > The main technical question is where should this policy b

Re: key distribution/verification/update mechanisms other than keyservers

2018-01-17 Thread Andrew Gallagher
On 17/01/18 15:32, Daniel Kahn Gillmor wrote: > i don't think you need an extension to OpenPGP at all to do this -- you > just need policy. The policy could be (for example): The main technical question is where should this policy be applied? 1. At upload stage - easy to implement, but requires

Re: key distribution/verification/update mechanisms other than keyservers

2018-01-17 Thread Daniel Kahn Gillmor
On Wed 2018-01-17 09:58:21 +0100, Werner Koch wrote: > On Tue, 16 Jan 2018 22:56, kristian.fiskerstr...@sumptuouscapital.com > said: > >>> (c) rejected all third-party certifications -- so data attached to a >>> given primary key is only accepted when certified by that primary >>> key. >

Re: key distribution/verification/update mechanisms other than keyservers

2018-01-17 Thread Teemu Likonen
Werner Koch [2018-01-17 09:58:21+01] wrote: >>> (c) rejected all third-party certifications -- so data attached to >>> a given primary key is only accepted when certified by that primary >>> key. > This can help to avoid DoS attacks. I would love to see that to get my > key down to a reasonabl

Re: key distribution/verification/update mechanisms other than keyservers

2018-01-17 Thread Werner Koch
On Tue, 16 Jan 2018 22:56, kristian.fiskerstr...@sumptuouscapital.com said: >> (c) rejected all third-party certifications -- so data attached to a >> given primary key is only accepted when certified by that primary >> key. >> > > thanks for this post Daniel, my primary question would

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-01-17 Thread Kristian Fiskerstrand
On 01/17/2018 01:20 AM, Daniel Kahn Gillmor wrote: > On Tue 2018-01-16 22:56:58 +0100, Kristian Fiskerstrand wrote: >> thanks for this post Daniel, my primary question would be what advantage >> is gained by this verification being done by an arbitrary third party >> rather by a trusted client runn

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-01-16 Thread Daniel Kahn Gillmor
On Tue 2018-01-16 22:56:58 +0100, Kristian Fiskerstrand wrote: > thanks for this post Daniel, my primary question would be what advantage > is gained by this verification being done by an arbitrary third party > rather by a trusted client running locally, which is the current modus > operandus. Any

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-01-16 Thread Andrew Gallagher
> On 16 Jan 2018, at 22:26, Leo Gaspard wrote: > > It could also help limit the impact of the nightmare scenario RJH has > described, by making sure all the data is “cryptographically valid and > matching”, thus making it harder to just propagate arbitrary data down > the network. It would make

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-01-16 Thread Leo Gaspard
On 01/16/2018 10:56 PM, Kristian Fiskerstrand wrote: > On 01/16/2018 07:40 PM, Daniel Kahn Gillmor wrote: > >> The keyserver network (or some future variant of it) can of course play >> a role in parallel to any or all of these. for example, keyservers are >> particularly well-situated to offer k

Re: key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-01-16 Thread Kristian Fiskerstrand
On 01/16/2018 07:40 PM, Daniel Kahn Gillmor wrote: > The keyserver network (or some future variant of it) can of course play > a role in parallel to any or all of these. for example, keyservers are > particularly well-situated to offer key revocation, updates to expiry, > and subkey rotation, non

key distribution/verification/update mechanisms other than keyservers [was: Re: a step in the right direction]

2018-01-16 Thread Daniel Kahn Gillmor
he need for external distribution mechanisms for all messages but the first. https://autocrypt.org/ * VVV DNS (SRV) discovery of HKP service operated by the mail provider. https://keys4all.de/media/beschreibung-vvv-loesung.pdf I'm sure i've missed some other distr

Re: send-keys does not update my key

2017-02-15 Thread Marko Bauhardt
> On 14 Feb 2017, at 19:53, Kristian Fiskerstrand > wrote: > > Trust level is not a property of the public key, it is stored out of > band (in the local trustdb) Ah ok. Thanks. Marko --- Marko Bauhardt https://keybase.io/mbauhardt GPG Key ID: 53192101 GPG Fingerprint: DC0F E851 82A3 72E3

Re: send-keys does not update my key

2017-02-14 Thread Kristian Fiskerstrand
On 02/14/2017 07:51 PM, Marko Bauhardt wrote: > The trust level of my two IDs was `unknown` in the one public key and > `ultimate` in the other key. Trust level is not a property of the public key, it is stored out of band (in the local trustdb) -- Kristian Fiskerst

Re: send-keys does not update my key

2017-02-14 Thread Marko Bauhardt
Hi Peter, > On 13 Feb 2017, at 12:16, Peter Lebbing wrote: > > > An OpenPGP public key is composed of many parts which can be reordered > without changing the meaning. Keyservers do reorder stuff, so you can't > just compare two keys byte by byte and say anything useful about their > equivalenc

Re: send-keys does not update my key

2017-02-13 Thread Peter Lebbing
On 12/02/17 13:32, Marko Bauhardt wrote: > Hi, > The amor definition of my public key i uploaded > to hkps://hkps.pool.sks-keyservers.net differs to the public key > definition i uploaded to another web service. An OpenPGP public key is composed of many parts which can be reordered without changin

Re: send-keys does not update my key

2017-02-12 Thread Marko Bauhardt
> > Signed PGP part > You can add signatures, user-ids, subkeys, etc. to a key that is > already on the server. But you cannot delete anything from it. Sure, understood. But this does not answer the question i have why i can not upload my current local GPG public key to a key server? Again i ge

Re: send-keys does not update my key

2017-02-12 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Sunday 12 February 2017 at 12:32:06 PM, in , Marko Bauhardt wrote:- > Is there a rule or something which prevents the > update of a key? You can add signatures, user-ids, subkeys, etc. to a key that is already on the server. But you

send-keys does not update my key

2017-02-12 Thread Marko Bauhardt
Hi, The amor definition of my public key i uploaded to hkps://hkps.pool.sks-keyservers.net differs to the public key definition i uploaded to another web service. When i import both key pairs the result looks the same. I don’t know exactly what the difference is. Anyway, i want to update my

Re: Gpg key lost in self update

2016-12-31 Thread David Niklas
On Thu, 29 Dec 2016 14:15:52 + Christoffer Stjernlöf wrote: > do...@mail.com writes: > > I used a config file (hand written), and concatenated several of it's > > lines to form a super long strong passphrase for my key. > > There is no way to crack an arbitrary private key. However, since

RE: Gpg key lost in self update

2016-12-28 Thread Robert J. Hansen
> Now, I've read that you could use a program to crack the private key and I'd > rather not create a new key since my original was never compromised. For a strong passphrase, there is no effective way to crack it. Sorry, you're SOL. ___ Gnupg-users m

Gpg key lost in self update

2016-12-28 Thread doark
Hello, I used a config file (hand written), and concatenated several of it's lines to form a super long strong passphrase for my key. Bad news is that I foolishly changed the file and lack an old enough backup to find the original one. Now, I've read that you could use a program to crack the privat

Re: Trying to figure out what's going on with a key update failure...

2016-11-26 Thread Stephan Beck
Hi Anthony, Anthony Papillion: > On 11/25/2016 4:02 AM, Stephan Beck wrote: [...] > > No problem. When I try to decrypt your message, I get the follow from GPG: > > gpg: invalid radix64 character 2D skipped > gpg: invalid radix64 character 2D skipped > gpg: invalid radix64 character 2D skipped >

Re: Trying to figure out what's going on with a key update failure...

2016-11-26 Thread Stephan Beck
Stephan Beck: > > Anthony Papillion: [...] > > Thanks, Anthony. I'll have a look into libpgp-error, maybe I can find > some info. The message may have been altered (tampered). > Oops, I wrote and then I thought. To speak with the libgcrypt manual (libgcrypt uses libgpg-error) This manual is

Re: Trying to figure out what's going on with a key update failure...

2016-11-26 Thread Stephan Beck
Anthony Papillion: > On 11/25/2016 4:02 AM, Stephan Beck wrote: >> Hi Anthony, >> > No problem. When I try to decrypt your message, I get the follow from GPG: > > gpg: invalid radix64 character 2D skipped > gpg: invalid radix64 character 2D skipped > gpg: invalid radix64 character 2D skipped > gp

Re: Trying to figure out what's going on with a key update failure...

2016-11-25 Thread Anthony Papillion
On 11/25/2016 4:02 AM, Stephan Beck wrote: > Hi Anthony, > > Stephan Beck: >> >> >> Anthony Papillion: >>> Hello Everyone, >>> >>> When I run >>> >>> gpg2 --keyserver --refresh-keys > >>> >>> Can someone tell me what this error means and how can I fix it? >> >> Which gpg2 version are you running

Re: Trying to figure out what's going on with a key update failure...

2016-11-25 Thread Stephan Beck
Update: I actually tried gpg2 --keyserver hkps://hkps.pool.sks-keyservers.net --refresh-keys 4F765425380A9BBA5F0E0892CC9D1E072AC97369 --no-emit-version --display-charset utf-8 --keyserver-options ca-cert-file=~/sks-keyservers.netCA.pem use-temp-files keep-temp-files verbose as well (with

Re: Trying to figure out what's going on with a key update failure...

2016-11-25 Thread Stephan Beck
Hi Anthony, Stephan Beck: > > > Anthony Papillion: >> Hello Everyone, >> >> When I run >> >> gpg2 --keyserver --refresh-keys >> >> Can someone tell me what this error means and how can I fix it? > > Which gpg2 version are you running? 2.0x or 2.1x? sorry for the delay in getting back to you

Re: Trying to figure out what's going on with a key update failure...

2016-11-23 Thread Anthony Papillion
On 11/23/2016 3:10 PM, Stephan Beck wrote: > > > Anthony Papillion: >> Hello Everyone, >> >> When I run >> >> gpg2 --keyserver --refresh-keys >> >> I get a list of all of the keys in my keyring with the message that they >> have not been changed (this is expected). At the bottom of the output, I

Re: Trying to figure out what's going on with a key update failure...

2016-11-23 Thread Stephan Beck
Anthony Papillion: > Hello Everyone, > > When I run > > gpg2 --keyserver --refresh-keys > > I get a list of all of the keys in my keyring with the message that they > have not been changed (this is expected). At the bottom of the output, I > see the following message: > > gpg: Total number p

Trying to figure out what's going on with a key update failure...

2016-11-23 Thread Anthony Papillion
Hello Everyone, When I run gpg2 --keyserver --refresh-keys I get a list of all of the keys in my keyring with the message that they have not been changed (this is expected). At the bottom of the output, I see the following message: gpg: Total number processed: 31 gpg: unchanged: 3

Re: regular update of all keys from a keyserver

2016-10-18 Thread Martin T
Thank you for all the replies! Martin On Mon, Oct 17, 2016 at 7:52 PM, Brian Minton wrote: > > > On 10/17/2016 11:41 AM, Daniel Kahn Gillmor wrote: >> On Mon 2016-10-17 06:31:16 -0400, Martin T wrote: >> >>> I am aware that one can update all the keys in loca

Re: regular update of all keys from a keyserver

2016-10-17 Thread Brian Minton
On 10/17/2016 11:41 AM, Daniel Kahn Gillmor wrote: > On Mon 2016-10-17 06:31:16 -0400, Martin T wrote: > >> I am aware that one can update all the keys in local-keyring from a >> keyserver using "gpg --refresh-keys". Are there any disadvantages to >> simply put

Fwd: Re: regular update of all keys from a keyserver

2016-10-17 Thread Stephan Beck
I forgot to send it to the list as well... Forwarded Message Subject: Re: regular update of all keys from a keyserver Date: Mon, 17 Oct 2016 16:20:00 + From: Stephan Beck Reply-To: st...@mailbox.org To: Martin T Hi Martin, Martin T: > Hi, > > I am aware tha

Re: regular update of all keys from a keyserver

2016-10-17 Thread Daniel Kahn Gillmor
On Mon 2016-10-17 06:31:16 -0400, Martin T wrote: > I am aware that one can update all the keys in local-keyring from a > keyserver using "gpg --refresh-keys". Are there any disadvantages to > simply put this command into user crontab and execute for example once > a day?

RE: regular update of all keys from a keyserver

2016-10-17 Thread Robert J. Hansen
> I am aware that one can update all the keys in local-keyring from a keyserver > using "gpg --refresh-keys". Are there any disadvantages to simply put this > command into user crontab and execute for example once a day? Not that I know of. Some people will tell you that &qu

regular update of all keys from a keyserver

2016-10-17 Thread Martin T
Hi, I am aware that one can update all the keys in local-keyring from a keyserver using "gpg --refresh-keys". Are there any disadvantages to simply put this command into user crontab and execute for example once a day? thanks, Martin ___ G

Re: An update on poldi? [was: Re: unlock keychain with pam authentication]

2015-09-28 Thread NIIBE Yutaka
Thank you, dkg for Cc-ing. On 09/29/2015 02:05 AM, Daniel Kahn Gillmor wrote: > On Sun 2015-09-27 22:04:40 -0400, SGT. Garcia wrote: >> On Thu, Sep 24, 2015 at 11:09:28PM -0400, Daniel Kahn Gillmor wrote: >>> You might be interested in libpam-poldi: >>> >>> http://www.g10code.com/p-poldi.html >>

An update on poldi? [was: Re: unlock keychain with pam authentication]

2015-09-28 Thread Daniel Kahn Gillmor
On Sun 2015-09-27 22:04:40 -0400, SGT. Garcia wrote: > On Thu, Sep 24, 2015 at 11:09:28PM -0400, Daniel Kahn Gillmor wrote: >> You might be interested in libpam-poldi: >> >> http://www.g10code.com/p-poldi.html > > i get 'not found' error. google finds me this: > http://www.schiessle.org/howto/pol

Re: Update

2014-11-26 Thread da...@gbenet.com
On 26/11/14 19:52, Tristan Santore wrote: > On 26/11/14 19:37, da...@gbenet.com wrote: >> Hi Al, >> >> As so many have been aware, I tried LUbuntu amd64 LXDE with Thunderbird and >> Enigmail - which >> singularly failed to sign or even encrypt. I made add that Kleopatra Kgpg >> GPA also failed to

Re: Update

2014-11-26 Thread Jason Antony
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2014-11-27 07:56, Tristan Santore wrote: > Fedora is not dodgy! We only support Fedora for 2 releases + 1 > month! Stop using unsupported distributions then. Quite an ignorant > statement to make. And that is the last I am writing. More proof th

Re: Update

2014-11-26 Thread Tristan Santore
On 26/11/14 20:53, da...@gbenet.com wrote: > On 26/11/14 19:52, Tristan Santore wrote: >> On 26/11/14 19:37, da...@gbenet.com wrote: >>> Hi Al, >>> >>> As so many have been aware, I tried LUbuntu amd64 LXDE with Thunderbird and >>> Enigmail - which >>> singularly failed to sign or even encrypt. I

Re: Update

2014-11-26 Thread Tristan Santore
On 26/11/14 19:37, da...@gbenet.com wrote: > Hi Al, > > As so many have been aware, I tried LUbuntu amd64 LXDE with Thunderbird and > Enigmail - which > singularly failed to sign or even encrypt. I made add that Kleopatra Kgpg GPA > also failed to > work. > > As some of you are stuck with the min

Update

2014-11-26 Thread da...@gbenet.com
Hi Al, As so many have been aware, I tried LUbuntu amd64 LXDE with Thunderbird and Enigmail - which singularly failed to sign or even encrypt. I made add that Kleopatra Kgpg GPA also failed to work. As some of you are stuck with the mind-set that the earth is flat eg "Oh it works for me there

Re: Update existing key to ECC?

2014-11-22 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Saturday 22 November 2014 at 3:01:02 PM, in , Hauke Laging wrote: > You can change the subkeys (encryption, signing) easily > but not the mainkey (the one the fingerprint refers > to). But hardly any GnuPG out there can use ECC now. Newl

Re: Update existing key to ECC?

2014-11-22 Thread Hauke Laging
Am Fr 21.11.2014, 20:17:38 schrieb Patrick Schleizer: > is it possible to update an existing (RSA) gpg key to ECC? > > Or would a usual transition process be required? You can change the subkeys (encryption, signing) easily but not the mainkey (the one the fingerprint refers to). B

Update existing key to ECC?

2014-11-22 Thread Patrick Schleizer
Hi, is it possible to update an existing (RSA) gpg key to ECC? Or would a usual transition process be required? Cheers, Patrick ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: Update

2014-11-18 Thread Jay Sulzberger
On Tue, 18 Nov 2014, Werner Koch wrote: On Mon, 17 Nov 2014 21:01, j...@panix.com said: Have you sat down, in front of one or more of the computers at issue here, with a friend who is experienced and willing to help? That is what I was about to suggest - having a second pair of eyeballs

Re: Update

2014-11-18 Thread Werner Koch
On Mon, 17 Nov 2014 21:01, j...@panix.com said: > Have you sat down, in front of one or more of the computers at > issue here, with a friend who is experienced and willing to help? That is what I was about to suggest - having a second pair of eyeballs looking at a problem very often solves a prob

Re: Update

2014-11-17 Thread Robert J. Hansen
On 11/17/2014 3:01 PM, Jay Sulzberger wrote: > > [a lot of stuff with no quote-editing] > Please, guys. Werner has asked for us to trim our quotes, not to just quote the other person's email in full. Let's do that, okay? ___ Gnupg-users mailing list

Re: Update

2014-11-17 Thread Jay Sulzberger
On Mon, 17 Nov 2014, da...@gbenet.com wrote: Having spent many many days on this problem I have failed to come with any working solution. Running a 64 bit version of LUbuntu does not work. This is a real fact of life no matter what all you people say. It does not work for me. I have tried F

Update

2014-11-17 Thread da...@gbenet.com
Having spent many many days on this problem I have failed to come with any working solution. Running a 64 bit version of LUbuntu does not work. This is a real fact of life no matter what all you people say. It does not work for me. I have tried Fedora-16 64 bit in the past - it failed - I tried

Re: Update on USG, Software, and the First Amendment

2014-10-28 Thread Martin Behrendt
Am 27.10.2014 um 19:20 schrieb Robert J. Hansen: > Just received word back from a friend of mine who's a law professor > focusing in electronic civil liberties, and is a former Commissioner of > the FCC to boot. He's skeptical that ITAR/EAR enforcement will affect > U.S. hackers participating in l

Re: Update on USG, Software, and the First Amendment

2014-10-28 Thread Schlacta, Christ
I'll add my +1 to the request On Oct 28, 2014 12:08 AM, "Bob Holtzman" wrote: > On Mon, Oct 27, 2014 at 02:20:36PM -0400, Robert J. Hansen wrote: > > Just received word back from a friend of mine who's a law professor > > focusing in electronic civil liberties, and is a former Commissioner of > >

Re: Update on USG, Software, and the First Amendment

2014-10-28 Thread Bob Holtzman
On Mon, Oct 27, 2014 at 02:20:36PM -0400, Robert J. Hansen wrote: > Just received word back from a friend of mine who's a law professor > focusing in electronic civil liberties, and is a former Commissioner of > the FCC to boot. He's skeptical that ITAR/EAR enforcement will affect > U.S. hackers p

Re: Update on USG, Software, and the First Amendment

2014-10-27 Thread Philip Jackson
On 27/10/14 20:51, Robert J. Hansen wrote: >> Since you seem to be requesting it explicitly, I'll share that I'm >> interested personally. > > I just don't want to ask my friend to put together something on the > subject and then discover there's no interest in it -- it seems > disrespectful to Pr

Re: Update on USG, Software, and the First Amendment

2014-10-27 Thread Aaron Toponce
On Mon, Oct 27, 2014 at 03:51:04PM -0400, Robert J. Hansen wrote: > I just don't want to ask my friend to put together something on the > subject and then discover there's no interest in it -- it seems > disrespectful to Professor Johnson. :) I think there will be great interest on the list for i

Re: Update on USG, Software, and the First Amendment

2014-10-27 Thread Terry Munson
>He rather likes writing short essays on law. If there's interest, I'll >try and talk him into writing something layman-friendly about ITAR/EAR I would be interested. Thanks, Terry From: Robert J. Hansen To: "gnupg-users@gnupg.org" Sent: Monday, October 27, 201

Re: Update on USG, Software, and the First Amendment

2014-10-27 Thread Robert J. Hansen
> Since you seem to be requesting it explicitly, I'll share that I'm > interested personally. I just don't want to ask my friend to put together something on the subject and then discover there's no interest in it -- it seems disrespectful to Professor Johnson. :) __

Re: Update on USG, Software, and the First Amendment

2014-10-27 Thread charlie derr
On 10/27/2014 02:20 PM, Robert J. Hansen wrote: > If there's interest, I'll > try and talk him into writing something layman-friendly about ITAR/EAR, > cryptography, and the First Amendment. Robert, Since you seem to be requesting it explicitly, I'll share that I'm interested personally.

Update on USG, Software, and the First Amendment

2014-10-27 Thread Robert J. Hansen
Just received word back from a friend of mine who's a law professor focusing in electronic civil liberties, and is a former Commissioner of the FCC to boot. He's skeptical that ITAR/EAR enforcement will affect U.S. hackers participating in libre software development. More than that I can't/should

FAQ update

2012-10-24 Thread Robert J. Hansen
The FAQ that was mentioned earlier this year is still being worked on/revised. Werner requested that we shift to using org-mode formatting, so I took the XML markup and wrote a small script to convert it to org-mode. There is a GitHub repo set up for the FAQ at: http://github.com/rjhanse

Re: RFE: --update-before-use

2012-06-17 Thread David Shaw
turn it off: keyserver-options no-honor-keyserver-url But then of course, the user is responsible for finding updates themselves. > If such an "automatic update" is added, I'd like to have an additional > option to define the maximum update interval. This allows everybod

Re: RFE: --update-before-use

2012-06-17 Thread Michel Messerschmidt
e default configuration in my mind. If such an "automatic update" is added, I'd like to have an additional option to define the maximum update interval. This allows everybody to define his own tradeoff. With a default value of for example 24 hours, public keys are still kept fairl

Re: RFE: --update-before-use

2012-06-16 Thread David Shaw
On Jun 15, 2012, at 12:33 PM, John Clizbe wrote: >> It's a similar problem in type as auto-key-retrieve or auto-key-locate, but >> it's a different problem in degree: both AKR and AKL fire only as needed >> (either when a key is needed for sig verification, or when a key is needed >> to encrypt to

Re: RFE: --update-before-use

2012-06-16 Thread Peter Lebbing
On 15/06/12 18:33, John Clizbe wrote: > You remember where that was? Sounds interesting, and I have plenty of > keyservers here at home to choose from. Werner mentioned it[1] in his reply to this thread: > You should be able to use > > --auto-key-locate nodefault,keyserver -r f...@example.org

Re: RFE: --update-before-use

2012-06-15 Thread John Clizbe
David Shaw wrote: > On Jun 14, 2012, at 4:34 PM, Robert J. Hansen wrote: > >>> 1) If the keyserver (of whatever type) isn't reachable... >> >> As you say, easy to solve: agreed. >> >>> 2) Concern that enough people turning this feature on would add >>> significant load to the keyserver network.

Re: RFE: --update-before-use

2012-06-14 Thread David Shaw
On Jun 14, 2012, at 4:34 PM, Robert J. Hansen wrote: >> 1) If the keyserver (of whatever type) isn't reachable... > > As you say, easy to solve: agreed. > >> 2) Concern that enough people turning this feature on would add >> significant load to the keyserver network... > > An open question and

Re: RFE: --update-before-use

2012-06-14 Thread Robert J. Hansen
1) If the keyserver (of whatever type) isn't reachable... As you say, easy to solve: agreed. 2) Concern that enough people turning this feature on would add significant load to the keyserver network... An open question and one we'd need to address: agreed. 3) It leaks information more than

Re: RFE: --update-before-use

2012-06-14 Thread Werner Koch
On Thu, 14 Jun 2012 19:48, r...@sixdemonbag.org said: > We already have something similar to this in --auto-key-retrieve, and > the same warnings about that option probably also apply here. The > principal difference would seem to be that auto-key-retrieve only > fetches certificates that are not

Re: RFE: --update-before-use

2012-06-14 Thread David Shaw
always-on > and fairly reliable internet connectivity, perhaps it makes sense to add a > new option: "update-before-use" (and its "no-update-before-use"). > > This option would only be effective if a --keyserver option is also in use. > > When the update-before-

  1   2   >