Re: how to do

2014-07-14 Thread Peter Lebbing
On 12/07/14 22:33, Michael Anders wrote: > I think we are in danger of working with different concepts of what > "not being able to" means. The scenario painted is this: The primary key is used for creating new UIDs and certifying other people's keys. The subkeys are used for signing data and me

Re: how to do

2014-07-14 Thread Michael Anders
> >Please can you elaborate on how it is incorrect to say that somebody > >who knows the passphrase to a secret key can make changes to that key. > >Would this maybe be the case when using an encryption subkey with an > >offline main key? > > If you make encryption and signing subkeys you can exp

Re: how to do

2014-07-10 Thread J. David Boyd
"Paul R. Ramer" writes: > On July 9, 2014 11:40:06 AM PDT, MFPA > <2014-667rhzu3dc-lists-gro...@riseup.net> wrote: >>-BEGIN PGP SIGNED MESSAGE- >>Hash: SHA512 >> >>Hi >> >> >>On Wednesday 9 July 2014 at 5:54:36 PM, in >>, Hauke Laging wrote: >> >> >>> Am Di 08.07.2014, 14:41:36 schrieb J

Re: how to do

2014-07-09 Thread Paul R. Ramer
On July 9, 2014 11:40:06 AM PDT, MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA512 > >Hi > > >On Wednesday 9 July 2014 at 5:54:36 PM, in >, Hauke Laging wrote: > > >> Am Di 08.07.2014, 14:41:36 schrieb J. David Boyd: >>> which means that any of

Re: how to do

2014-07-09 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Wednesday 9 July 2014 at 5:54:36 PM, in , Hauke Laging wrote: > Am Di 08.07.2014, 14:41:36 schrieb J. David Boyd: >> which means that any of them can make changes to your >> keys. > And that is wrong. Please can you elaborate on how it is

Re: how to do

2014-07-09 Thread Schlacta, Christ
Depending on how many users are expected to have access to this file, you can just maintain a public keyring that everyone has. You then have everyone encrypt to the list of everyone, and then anyone can decrypt it with their private key and password and re encrypt to everyone. This solution scal

Re: how to do

2014-07-09 Thread Hauke Laging
Am Di 08.07.2014, 14:41:36 schrieb J. David Boyd: > The problem is that all the 'users' will have to know the > pass phrase to the secret key to be able to crypt/decrypt, That is right. > which > means that any of them can make changes to your keys. And that is wrong. Hauke -- Crypto für al

Re: how to do

2014-07-09 Thread J. David Boyd
"Gould, Michael (RIS-BCT)" writes: > Currently we use do not use pgp for email, only to decrypt and/or > encrypt customer files for processing. We currently use a single user > id for this however this doesn’t allow us to audit the use. What I was > wondering is can I create a public key that has

how to do

2014-07-08 Thread Gould, Michael (RIS-BCT)
Currently we use do not use pgp for email, only to decrypt and/or encrypt customer files for processing. We currently use a single user id for this however this doesn't allow us to audit the use. What I was wondering is can I create a public key that has everyone's email address in it that sho

Re: How to do pinentry in same screen as gpg

2014-01-03 Thread Peter Lebbing
On 03/01/14 14:31, Dan Mahoney, System Admin wrote: > Hauke, in your posts, you mention that the pinentry protocol isn't on the GPG > website. Could that please be fixed by the people who maintain the project? > I > notice it also missing from http://www.gnupg.org/documentation/manuals/ I remem

Re: How to do pinentry in same screen as gpg

2014-01-03 Thread Dan Mahoney, System Admin
On Fri, 3 Jan 2014, Hauke Laging wrote: Am Fr 03.01.2014, 01:14:22 schrieb Dan Mahoney, System Admin: It basically works perfectly with gpg1, where I can get an inline prompt for a password, but gpg2 falls short where it tries to set up some kind of a unix-socket connection to a pinentry dialo

Re: How to do pinentry in same screen as gpg

2014-01-03 Thread Dan Mahoney, System Admin
On Fri, 3 Jan 2014, Hauke Laging wrote: Am Fr 03.01.2014, 01:14:22 schrieb Dan Mahoney, System Admin: It basically works perfectly with gpg1, where I can get an inline prompt for a password, but gpg2 falls short where it tries to set up some kind of a unix-socket connection to a pinentry dialo

Re: How to do pinentry in same screen as gpg

2014-01-03 Thread Hauke Laging
Am Fr 03.01.2014, 01:14:22 schrieb Dan Mahoney, System Admin: > It basically works perfectly with gpg1, where I can get an inline > prompt for a password, but gpg2 falls short where it tries to set up > some kind of a unix-socket connection to a pinentry dialog, and this > all falls apart within t

How to do pinentry in same screen as gpg

2014-01-03 Thread Dan Mahoney, System Admin
All, I have a script that I use to send mail (as part of pine/alpine) that needs to prompt for my key passphrase. I run alpine on a private unix server, within a screen session. It basically works perfectly with gpg1, where I can get an inline prompt for a password, but gpg2 falls short wher