On Mon, Mar 18, 2024 at 9:58 AM Werner Koch via Gnupg-users
wrote:
>
> On Sat, 16 Mar 2024 21:26, B.S. said:
> > ... (Windows 10) [DOS] cmd ... [*NOT* powershell]
> > ... cygwin gpg ...
>
> [Do not use a Cygwin build of gpg - this is not supported. Use a
> standard build for WIndows.]
Thanks kin
much you can do here.
Except (I would hope?) if gpg were to make sure nothing is written to
stdout until after passphrase was completely acquired, before
decrypting and writing the decrypt to sdtout, I don't expect less will
have cleared the screen to that point. [Less waits to clear screen
Bee via Gnupg-users wrote:
However if you known the passphrase, you can pass it to gpg directly using
--passphrase-file and --pinentry-mode=loopback.
I figured, but am trying to avoid having the passphrase land on disk at all.
Could you set up a RAM disk for this? (I think Windows st
hope?) if gpg were to make sure nothing is written to
stdout until after passphrase was completely acquired, before
decrypting and writing the decrypt to sdtout, I don't expect less will
have cleared the screen to that point. [Less waits to clear screen,
etc., until after it receives something
hope?) if gpg were to make sure nothing is written to
stdout until after passphrase was completely acquired, before
decrypting and writing the decrypt to sdtout, I don't expect less will
have cleared the screen to that point. [Less waits to clear screen,
etc., until after it receives something
On Sat, 16 Mar 2024 21:26, B.S. said:
> ... (Windows 10) [DOS] cmd ... [*NOT* powershell]
> ... cygwin gpg ...
[Do not use a Cygwin build of gpg - this is not supported. Use a
standard build for WIndows.]
> How can I have gpg pause to receive its passphrase, before it starts
> outpu
... (Windows 10) [DOS] cmd ... [*NOT* powershell]
... cygwin gpg ...
How can I have gpg pause to receive its passphrase, before it starts
outputing decrypt to stdout?
e.g. gpg -c < secretdata.json.pgp | jq | less
- less is happening before gpg has 'readlined' the passphrase, a
Hello everyone,
I've created a private key on my Windows 10 machine with Gpg4win/Kleopatra
and imported it on my Linux machine. Now, when I encrypt files with Gpg4win
on Windows (via Kleopatra) and try to decrypt them on a Linux machine, I get
the following error:
gpg: [don't know
However, I would like to question your need for requiring two gpg keys.
How are they two gpg going to be more secure?
Guessing that possibly two different people need to be in agreement in
order to access data, along the lines of needing two keys to launch
missiles? :)
Otherwise, I agree jus
On Sun, Jan 2, 2022 at 11:01 PM Ángel wrote:
> You could use a wrapper which calls gpg twice, while the user only
> calls your wrapper (as if it is gpg) once.
>
Thank you, I think that sounds like the best solution I've come across so
far! =)
> However, I would like to question your need for req
On 2021-12-26 at 04:47 +0100, Christian Chavez wrote:
> Hi!
>
> I've currently got some sensitive data I'd like to require _two_ gpg
> keys for decryption/unlocking.
>
> As in both are needed (AND operation), not that either can decrypt on
> their own (O
A small correction:
On Sun, 26 Dec 2021, 04:47 Christian Chavez, wrote:
(...)
> As in both are needed (AND operation), not that either can decrypt on
> their own (OR operation).
> I can only find description of AND operation in manpages/tutorials online.
>
The second line is suppose
Christian Chavez via Gnupg-users writes:
> Hi!
>
> I've currently got some sensitive data I'd like to require _two_ gpg keys for
> decryption/unlocking.
>
> As in both are needed (AND operation), not that either can decrypt on their
> own (OR operation).
>
Hi!
I've currently got some sensitive data I'd like to require _two_ gpg keys
for decryption/unlocking.
As in both are needed (AND operation), not that either can decrypt on their
own (OR operation).
I can only find description of AND operation in manpages/tutorials online.
I'
Thanks Ingo.
I submitted a bug report, it is here
(https://bugzilla.redhat.com/show_bug.cgi?id=2026617).
CheersSteve
On Wednesday, 24 November 2021, 10:51:52 pm AEST, Ingo Klöcker
wrote:
On Mittwoch, 24. November 2021 12:39:15 CET Stephen Jeffrey via Gnupg-users
wrote:
> After enteri
On Mittwoch, 24. November 2021 12:39:15 CET Stephen Jeffrey via Gnupg-users
wrote:
> After entering the
> password it fails. I am using a fresh install of Fedora 35 and gpg2 version
> 2.3.2.
> Why is it failing after I clear the cache?
Because symmetric encryption is broken in version 2.3.2. See
Hi all,
I wish to encrypt a file with a passphrase, possibly copy the file elsewhere,
and decrypt using the same passphrase.
If I encrypt a file (with a passphrase) it can then be decypted without
entering a passphrase:> echo "test" > test.txt> gpg -c test.txt> gpg -d
te
On Samstag, 30. Oktober 2021 14:24:58 CEST Chris Taylor wrote:
> The hash of my gpg file on my laptop is different to it's hash on the
> thumb drive.
If the hash of any file on your laptop differs from the hash of the same file
after copying it to the thumb drive this can only mean two things:
1
The hash of my gpg file on my laptop is different to it's hash on the
thumb drive. For comparison, the hash of the tar.gz file (i.e. before
encryption) is the same before and after I copy it to the thumb drive.
Are there any techniques I should be using to protect my gpg file?
Chris Taylor
On 10/29/21 07:30, Chris Taylor wrote:
> Thank you - I will check.
>
> Almost certainly the hash of my .gpg file will be different after it has
> passed through the Thumb Drive. However, no other files on the Thumb
> Drive get corrupted. So, my question will probably become how can I
> protect m
.gz
>
> I copy my-backup.tar.gz.gpg to my USB thumb drive. I am using Ubuntu so
> the USB drive is formatted to Ext4.
>
> I try to decrypt with:
>
> gpg --output my-backup.tar.gz --decrypt my-backup.tar.gz.gpg
>
> and get the following error:
>
> gpg: AES256 encr
-algo AES256 my-backup.tar.gz
I copy my-backup.tar.gz.gpg to my USB thumb drive. I am using Ubuntu so the
USB drive is formatted to Ext4.
I try to decrypt with:
gpg --output my-backup.tar.gz --decrypt my-backup.tar.gz.gpg
and get the following error:
gpg: AES256 encrypted data
gpg: encrypted with
p.tar.gz.gpg to my USB thumb drive. I am using Ubuntu so the
> USB drive is formatted to Ext4.
>
> I try to decrypt with:
>
> gpg --output my-backup.tar.gz --decrypt my-backup.tar.gz.gpg
>
> and get the following error:
>
> gpg: AES256 encrypted data
> gpg:
USB drive is formatted to Ext4.
I try to decrypt with:
gpg --output my-backup.tar.gz --decrypt my-backup.tar.gz.gpg
and get the following error:
gpg: AES256 encrypted data
gpg: encrypted with 1 passphrase
gpg: block_filter 0x556d112aa1e0: read error (size=13328,a->size=13328)
gpg: WARN
Hi,
I am experience with imapfilter to decrypt old mail archives but keeping
signatures.
The reason is that I lost already access to old mails that was encrypted
to a key which is only on a, now broken, GPG card. As the relevant
mailserver is mine and the file system is encrypted, I can accept
Behalf Of Ángel
Sent: Friday, December 18, 2020 3:50 PM
To: gnupg-users@gnupg.org
Subject: Re: GPG Decrypt Error based on a timeout function?
On 2020-12-18 at 10:25 -0800, Dave via Gnupg-users wrote:
> Angel,
> Yes, I want the script to run unattended, which the gpg process is
> not
On 2020-12-18 at 10:25 -0800, Dave via Gnupg-users wrote:
> Angel,
> Yes, I want the script to run unattended, which the gpg process is
> not the right method, as you say: " you could configure the gpg
> password in the script, but then that would be roughly equivalent to
> the email account pass
lthy,
Dave
-Original Message-
From: Gnupg-users On Behalf Of Ángel
Sent: Thursday, December 17, 2020 4:53 PM
To: gnupg-users@gnupg.org
Subject: Re: GPG Decrypt Error based on a timeout function?
On 2020-12-17 at 11:28 -0800, Dave via Gnupg-users wrote:
> Good Day,
> This very novice would
On 2020-12-17 at 11:28 -0800, Dave via Gnupg-users wrote:
> Good Day,
> This very novice would appreciate some help.
>
> My situation:
>
> I have a Raspberry Pi 4 computer running the Raspberry Operating
> System (Raspbian GNU/Linux [buster], Version ID=10) at my home. I
> need it to send
Good Day,
This very novice would appreciate some help.
My situation:
I have a Raspberry Pi 4 computer running the Raspberry Operating System
(Raspbian GNU/Linux [buster], Version ID=10) at my home. I need it to send
me an email notification when certain functions are performed.
To
* Fourhundred Thecat:
> Looks like you have no real arguments, and keep repeating same stuff
> all over again.
*You* accusing *me* of not having real arguments is just precious. :-)
> I see no benefit for anybody in continuing this discussion.
At last, we can agree on something.
-Ralph
__
> On 2020-06-30 13:27, Ralph Seichter via Gnupg-users wrote:
* Fourhundred Thecat:
Show us a body of your work which proves you have the necessary
skills to critique the GnuPG authors' work. Until you do, your
"judgment" is moot.
An idea should be considered on its own merit.
What "idea" wo
> For instance, even for basic operations (encrypt, decrypt) ‹…› gpg still
> requires my ~/.gnupg/ to be writable (cannot me on read-only filesystem)
Heh. Use of files as a temporal storage medium or just unique entities for
anything from sockets to boolean flags, and therefore a need for
> I am basing my judgment on universal principles, that apply not only to
> gpg or other software, but design of any systems in general.
There is no such universal playbook. It simply does not exist.
In his book _Lila_ the philosopher Robert M. Pirsig wrote that morality
is not a set of universa
Fourhundred Thecat <400the...@gmx.ch> wrote:
> In case of gpg, there is one mode where you generate your key pair, change
> configuration files, or any other read-write operation.
>
> But for general usage, there is no reason for the key pair to need to be
> writable.
Sure. So there is none:
On 30-06-2020 12:10, Werner Koch via Gnupg-users wrote:
>> Do not break backwards compatibility if you want all people to upgrade.
>
> Do not update so that the bad guys can exploit your legacy software ;-)
>
> There are well documented reasons what we don't support MDC and PGP3
> keys anymore -
* Fourhundred Thecat:
>> Show us a body of your work which proves you have the necessary
>> skills to critique the GnuPG authors' work. Until you do, your
>> "judgment" is moot.
>
> An idea should be considered on its own merit.
What "idea" would that be, exactly?
> You should counter my critici
> On 2020-06-30 12:26, Ralph Seichter via Gnupg-users wrote:
* Fourhundred Thecat:
I am basing my judgment on universal principles, that apply not only
to gpg or other software, but design of any systems in general.
Universal principles, oh my. In other words, you don't know nearly
enough abo
* Fourhundred Thecat:
> I am basing my judgment on universal principles, that apply not only
> to gpg or other software, but design of any systems in general.
Universal principles, oh my. In other words, you don't know nearly
enough about the finer points of GnuPG design goals, don't know much
ab
On Tue, 30 Jun 2020 00:55, Johan Wevers said:
>> Do not use 1.4 unless you have to decrypt old non-MDC protected data or
>> data encrypted to a legacy v3 key.
>
> Do not break backwards compatibility if you want all people to upgrade.
Do not update so that the bad guys can e
> On 2020-06-30 08:55, Ralph Seichter via Gnupg-users wrote:
* Fourhundred Thecat:
What insight do you have in the design and development of GnuPG; in its
goals and restrictions? There is a difference between you not liking
something for a personal reason, and objectively "bad design". You are
* Fourhundred Thecat:
>> Whining about a design detail of free software? Get a grip.
>
> There are more examples of bad design.
Are there now? GnuPG is software that has evolved since its introduction
in 1997. Can you show me any meaningful software of yours that has been
evolving over 23 years a
> In fact, gpg epitomizes a perfect anti-UNIX design. (See Eric S. Raymond
> for details, what UNIX philosophy means)
Mmmhmm.
> For instance, even for basic operations (encrypt, decrypt), where no
> modifications to my key pair are necessary, gpg still requires my
> ~/.gnupg/
ign. (See Eric S. Raymond
for details, what UNIX philosophy means)
For instance, even for basic operations (encrypt, decrypt), where no
modifications to my key pair are necessary, gpg still requires my
~/.gnupg/ to be writable (cannot me on read-only filesystem)
That is another example of hard-requir
Werner Koch via Gnupg-users wrote:
> On Mon, 29 Jun 2020 13:07, vedaal said:
>
> > otherwise , just use GnuPG 1.4.x , and unless you ever need an
>
> Do not use 1.4 unless you have to decrypt old non-MDC protected data or
> data encrypted to a legacy v3 key.
>
> S
On 29-06-2020 19:40, Werner Koch via Gnupg-users wrote:
> Do not use 1.4 unless you have to decrypt old non-MDC protected data or
> data encrypted to a legacy v3 key.
Do not break backwards compatibility if you want all people to upgrade.
--
ir. J.C.A. Wevers
PGP/GPG public keys a
Fourhundred Thecat <400the...@gmx.ch> wrote:
> I am protesting the fact, that gpg can no longer be used without the agent.
Yet you have not described the reason behind it so far, have you? Why are you
sure, that the issue, that make gpg-agent fail to start in your case, is hard
to resolve?
si
d the reason behind it so far, have you? Why are
>> you sure, that the issue, that make gpg-agent fail to start in your case, is
>> hard to resolve?
>
> I don't have gpg-agent installed, on this particular server, where I need to
> decrypt one file.
Ah, so itʼs in
* Fourhundred Thecat:
> I am protesting the fact, that gpg can no longer be used without the
> agent.
Whining about a design detail of free software? Get a grip.
-Ralph
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/
On 29/06/2020 18:38, Fourhundred Thecat wrote:
> I don't have gpg-agent installed, on this particular server, where I
> need to decrypt one file.
You could try installing sequioa-pgp[1], an alternative but also libre
OpenPGP implementation (still in its infancy). It requires a
On Mon, 29 Jun 2020 13:07, vedaal said:
> otherwise , just use GnuPG 1.4.x , and unless you ever need an
Do not use 1.4 unless you have to decrypt old non-MDC protected data or
data encrypted to a legacy v3 key.
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt
On 6/29/2020 at 12:40 PM, "Fourhundred Thecat" <400the...@gmx.ch> wrote:
>I don't have gpg-agent installed, on this particular server, where
>I
>need to decrypt one file.
=
Try this very long workaround :
[1] Install a fake homedirectory
[2] Install a fak
gpg-agent fail to start in your case, is hard
to resolve?
I don't have gpg-agent installed, on this particular server, where I
need to decrypt one file.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Sun, 28 Jun 2020 16:24, Robert J. Hansen said:
> GnuPG sees the symmetrically encrypted message and knows it needs to
> recover/derive a key. It calls gpg-agent, which in turn calls pinentry.
In addition gpg-agent also takes care of caching passphrases which makes
even symmetrically encryptio
> On 2020-06-28 21:47, Ingo Klöcker wrote:
On Freitag, 26. Juni 2020 09:33:15 CEST Fourhundred Thecat wrote:
I have file encrypted with symmetric cipher (aes256) and not signed.
How can I decrypt it without using gpg agent ?
Use openssl. Or another simple program offering symmet
> excuse me, gpg-agent might have been introduced in 2003, but it was
> optional. Until not long ago, it was still possible to decrypt file with
> password, without having the agent.
If you were using GnuPG 1.4, yes. GnuPG 2.0 and later have always used
gpg-agent.
If you want a gpg-a
velopment for so long you're surprised by a
change introduced seventeen years ago. That's on you.
excuse me, gpg-agent might have been introduced in 2003, but it was
optional. Until not long ago, it was still possible to decrypt file with
password, without having the agent.
Also, I woul
Ingo Klöcker wrote:
> On Freitag, 26. Juni 2020 09:33:15 CEST Fourhundred Thecat wrote:
> > I have file encrypted with symmetric cipher (aes256) and not signed.
> >
> > How can I decrypt it without using gpg agent ?
>
> Use openssl. Or another simple program of
ike a KDE app, on GNOME you get a GTK one that looks like a GNOME
app, and so on.
GnuPG sees the symmetrically encrypted message and knows it needs to
recover/derive a key. It calls gpg-agent, which in turn calls pinentry.
> But why do I need the agent, when no secret key is involved? I simply
&
On Freitag, 26. Juni 2020 09:33:15 CEST Fourhundred Thecat wrote:
> I have file encrypted with symmetric cipher (aes256) and not signed.
>
> How can I decrypt it without using gpg agent ?
Use openssl. Or another simple program offering symmetric encryption/
decryption with AES.
GnuPG
> On 2020-06-28 16:07, Werner Koch wrote:
On Fri, 26 Jun 2020 09:33, Fourhundred Thecat said:
How can I decrypt it without using gpg agent ?
You can't the agent is a cornerstone of gpg and is thus required.
I thought the agent is for manipulating the private key.
But why do I
On Fri, 26 Jun 2020 09:33, Fourhundred Thecat said:
> How can I decrypt it without using gpg agent ?
You can't the agent is a cornerstone of gpg and is thus required.
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
signature.asc
Descript
ved...@nym.hush.com wrote:
> can GPG2 be made to work from only the command-line without a pine entry
> window
| '--pinentry-mode MODE'
| Set the pinentry mode to MODE. Allowed values for MODE are:
| ‹…›
| loopback
| Redirect Pinentry queries to the caller. Note that in
|
On 6/26/2020 at 4:54 AM, "Fourhundred Thecat" <400the...@gmx.ch> wrote:
>
>Hello,
>
>I have file encrypted with symmetric cipher (aes256) and not
>signed.
>
>How can I decrypt it without using gpg agent ?
>
>I get these errors:
>
>$ gpg -d f
Hello,
I have file encrypted with symmetric cipher (aes256) and not signed.
How can I decrypt it without using gpg agent ?
I get these errors:
$ gpg -d file.gpg
gpg: failed to start gpg agent
...
gpg: decryption failed: no secret key
as I said above, there is no secret key involved here. It
On 2020-04-09 at 10:38 +0530, nithin reddy via Gnupg-users wrote:
> Hi All,
>
>
> We are using GnuPG 2.0.14 in CentOS linux servers. We are able to try
> to encrypt and decrypt the files as a root user. Now we are facing
> issues with the normal users who are trying
Hi All,
We are using GnuPG 2.0.14 in CentOS linux servers. We are able to try to
encrypt and decrypt the files as a root user. Now we are facing issues with
the normal users who are trying to encrypt a file.
Example:- Root user and User "nithin" are using same KEY ID for encr
t know how this happened when I generated the keys.
I assume that there's no way to shift the expiration date?
I assumed so, too, for a long time. But I was wrong:
gpg --edit-key 8BCE0232807D4CCB4F8800D17BA6AC955EAA2665
expire
...
If not, I will decrypt all files, generate new keys and c
El día Mittwoch, April 01, 2020 a las 10:19:09 +0200, Erich Eckner escribió:
> > I assume that there's no way to shift the expiration date?
>
> I assumed so, too, for a long time. But I was wrong:
>
> gpg --edit-key 8BCE0232807D4CCB4F8800D17BA6AC955EAA2665
> expire
> ...
>
Hello Ingo and Erich
> On 1 Apr 2020, at 21:11, Matthias Apitz wrote:
>
> I assume that there's no way to shift the expiration date?
`gpg --quick-set-expire $FINGERPRINT 2y`
A
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gn
rea.de
I don't know how this happened when I generated the keys.
I assume that there's no way to shift the expiration date?
If not, I will decrypt all files, generate new keys and crypt the files
again.
Thanks
matthias
--
Matthias Apitz, ✉ g...@unixarea.de, http://w
Klöcker
escribió:
> > > > On Mittwoch, 1. April 2020 17:30:29 CEST Matthias Apitz wrote:
> > > > > I encounter in my server the following situation: I can decrypt
> > > > > files
> >
> > > > > but not encrypting any file:
> > Ma
tthias Apitz wrote:
> > > > I encounter in my server the following situation: I can decrypt files
> > > > but not encrypting any file:
>
> Maybe the key is expired or not usable for encryption for some other reason.
> gpg will happily use an expired key for decrypt
On Mittwoch, 1. April 2020 19:39:24 CEST Matthias Apitz wrote:
> El día Mittwoch, April 01, 2020 a las 06:59:17 +0200, Ingo Klöcker escribió:
> > On Mittwoch, 1. April 2020 17:30:29 CEST Matthias Apitz wrote:
> > > I encounter in my server the following situation: I can decrypt f
El día Mittwoch, April 01, 2020 a las 06:59:17 +0200, Ingo Klöcker escribió:
> On Mittwoch, 1. April 2020 17:30:29 CEST Matthias Apitz wrote:
> > I encounter in my server the following situation: I can decrypt files
> > but not encrypting any file:
> >
> > $ gpg2
On Mittwoch, 1. April 2020 17:30:29 CEST Matthias Apitz wrote:
> I encounter in my server the following situation: I can decrypt files
> but not encrypting any file:
>
> $ gpg2 --version
Here you are using gpg2.
>
> $ gpg -d sybase.gpg
Now you are using gpg.
>
> $
Hello,
I encounter in my server the following situation: I can decrypt files
but not encrypting any file:
$ gpg2 --version
gpg (GnuPG) 2.1.19
libgcrypt 1.7.6
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>
T
Hello,
I have a file which has been encrypted with a symmetric cipher (using a
passphrase).
How can I decrypt this file in batch mode, without gpg-agent ?
$ gpg --lock-never --no-verbose --batch --yes -d zz.gpg
gpg: AES256 encrypted data
gpg: failed to start agent '/usr/bin/gpg-agent'
Exmos. Senhores,
Recebemos a informação que tiveram hoje a amabilidade de nos transmitir e que
muito agradecemos.
Vamos imediatamente analisar o caso e responderemos com a máxima brevidade
possível ao vosso pedido. Assim que for possível, o Serviço de Apoio ao Cliente
entrará em contacto convo
On Sun, 3 Nov 2019 10:15, Peter Lebbing said:
>> --unwrap is not documented and has the minor problem that it also keeps the
>> compression layer. However, gpgv groks that compression layer and works
I'll document it for future releases.
Salam-Shalom,
Werner
--
Die Gedanken sind frei.
Exmos. Senhores,
Recebemos a informação que tiveram hoje a amabilidade de nos transmitir e que
muito agradecemos.
Vamos imediatamente analisar o caso e responderemos com a máxima brevidade
possível ao vosso pedido. Assim que for possível, o Serviço de Apoio ao Cliente
entrará em contacto convo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/3/19 4:15 AM, Peter Lebbing wrote:
> Werner recently mentioned an undocumented command for this.[1]
>
> On 27/08/2019 11:30, Werner Koch via Gnupg-users wrote:
>> You can extra the signature from the encrypted+signed data:
>>
>> gpg --unwra
On 04/11/2019 02:12, Mark Rousell wrote:
> The same thing is happening on the mozilla.general mail list at the
> moment although with a company called 'TheFork'. It has also happened
> in the past on mozilla.general with a wholesale cut flowers supplier
> called Avas Flowers.
>
> What happens is th
On 03/11/2019 12:45, Andrew Gallagher wrote:
> Can one of the admins please unsubscribe or mute this recipient? It’s
> getting silly now. Thanks.
>
> Andrew Gallagher
>
>> On 3 Nov 2019, at 12:20, Informa D&B via Gnupg-users
>> wrote:
>>
>> Exmos. Senhores,
The same thing is happening on the mo
* Andrew Gallagher:
> Can one of the admins please unsubscribe or mute this recipient? It’s
> getting silly now. Thanks.
Hooray for email killfiles. ;-) But yeah, unsubscribing would be nice.
-Ralph
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
h
Hi Peter,
Peter Lebbing wrote:
> Werner recently mentioned an undocumented command for this.[1]
>
> On 27/08/2019 11:30, Werner Koch via Gnupg-users wrote:
>> You can extra the signature from the encrypted+signed data:
>>
>> gpg --unwrap -d -o SIG >
>> and then run
>>
>> gpgv -o SIGNEDFILE SI
Can one of the admins please unsubscribe or mute this recipient? It’s getting
silly now. Thanks.
Andrew Gallagher
> On 3 Nov 2019, at 12:20, Informa D&B via Gnupg-users
> wrote:
>
> Exmos. Senhores,
>
> Recebemos a informação que tiveram hoje a amabilidade de nos transmitir e que
> muito
Exmos. Senhores,
Recebemos a informação que tiveram hoje a amabilidade de nos transmitir e que
muito agradecemos.
Vamos imediatamente analisar o caso e responderemos com a máxima brevidade
possível ao vosso pedido. Assim que for possível, o Serviço de Apoio ao Cliente
entrará em contacto convo
Exmos. Senhores,
Recebemos a informação que tiveram hoje a amabilidade de nos transmitir e que
muito agradecemos.
Vamos imediatamente analisar o caso e responderemos com a máxima brevidade
possível ao vosso pedido. Assim que for possível, o Serviço de Apoio ao Cliente
entrará em contacto convo
Werner recently mentioned an undocumented command for this.[1]
On 27/08/2019 11:30, Werner Koch via Gnupg-users wrote:
> You can extra the signature from the encrypted+signed data:
>
> gpg --unwrap -d -o SIG
> and then run
>
> gpgv -o SIGNEDFILE SIG && echo verified!
>
> --unwrap is not
I wrote:
> I'm reading RFC 4880 now, to get my own answers. Still, I would be
> grateful if someone with deeper knowledge would answer my question.
Quoting the last paragraph of section 2.1 of RFC 4880:
Both digital signature and confidentiality services may be applied to
the same message.
Tony Lane wrote:
> On 11/3/19 1:55 AM, Mark H Weaver wrote:
>> I'm asking if there's a way to decrypt the message while preserving the
>> existing signed message. Of course, this requires the private
>> decryption key, but it should *not* require the private signin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/3/19 1:55 AM, Mark H Weaver wrote:
> I'm asking if there's a way to decrypt the message while preserving the
> existing signed message. Of course, this requires the private
> decryption key, but it should *not* require the
Tony Lane wrote:
>> Does GnuPG provide a mechanism to decrypt an encrypted-and-signed
>> message in such a way that preserves the original signature, such that
>> the original signature can be independently verified by an arbitrary
>> third-party?
>
> The term yo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> Does GnuPG provide a mechanism to decrypt an encrypted-and-signed
> message in such a way that preserves the original signature, such that
> the original signature can be independently verified by an arbitrary
> third-party?
The
Hello,
Does GnuPG provide a mechanism to decrypt an encrypted-and-signed
message in such a way that preserves the original signature, such that
the original signature can be independently verified by an arbitrary
third-party?
Thanks,
Mark
On Tue, Oct 15, 2019 at 10:52 PM NIIBE Yutaka wrote:
> Hello,
>
> I think that your configuration of smartcard is somehow broken.
>
The only thing I have been able to confirm is that gpg, at some point after
2.0.22, stopped allowing the use of the same subkey in multiple slots. As
soon as I crea
I just realized my reply did not go to the list.
-- Forwarded message -
From: alejandro Cortez
Date: Tue, Oct 15, 2019 at 9:43 AM
Subject: Re: Cannot decrypt from smartcard using gnupg-2.2, can from 2.0
To: Niibe Yutaka
On Mon, Oct 14, 2019 at 12:18 AM Niibe Yutaka wrote
alejandro Cortez wrote:
> gpg: public key decryption failed: Invalid ID
This means that something goes wrong in your private key file for
your token, I suppose.
> Can anyone help debug this?
You can see more information, by following command line:
$ gpg-connect-agent "KEYINFO --list" /bye
for/from other people during that time. I've used the
smartcard on 3 different hosts (also 14.04) by using fetch and running
card-status. On gnupg-2.2, whether signed or not, attempting to decrypt a
file with me as the recipient fails with:
gpg: public key decryption failed: Invalid I
1 - 100 of 491 matches
Mail list logo