Re: How trust works in gpg...

2008-04-15 Thread Peter Lewis
On Monday 14 April 2008 at 23:42:43 Herbert Furting wrote: > If the new UID just contains a new email address, you should really > check if the keyholder "controlls" that email address. > You can do so, by sending him an encrypted challenge. Ah, thanks, that makes sense. And then I can sign his ne

Re: Miscellaneous questions

2008-04-15 Thread Vlad "SATtva" Miller
Robert J. Hansen (15.04.2008 06:06): > ... Rijndael is AES, incidentally. Rijndael was the name it was > submitted under to the AES competition. Once it was chosen as the > winner, it became AES. And yes, I have seen people passionately > advocating for the inclusion of Rijndael in OpenPGP, desp

Re: Miscellaneous questions

2008-04-15 Thread Herbert Furting
On Tue, Apr 15, 2008 at 3:43 AM, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > > While this doesn't make sense ("nothing" is bound to the key) it > > wouldn't hurt either. > It violates a de-facto standard. That hurts. Don't see why,.. but... however. > > I just think, that an implementation sho

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
2008/4/15 Peter Lewis <[EMAIL PROTECTED]>: > Ah, thanks, that makes sense. And then I can sign his new UIDs too? Or just > change their trust level? You'll "have" to sign his new UIDs, too. What you could to is do issue a so called non-exportable (gpg uses the term local, iirc) signature. That me

Re: How trust works in gpg...

2008-04-15 Thread Michael Kesper
Hi, On Tue, Apr 15, 2008 at 12:42:43AM +0200, Herbert Furting wrote: > On Mon, 2008-04-14 at 23:20 +0100, Peter Lewis wrote: > > Ah yes, thanks. So I have now set the owner-trust for his key to "full", > > but > > still it says "unknown" for the other UIDs. So, I should manually set the > > tru

Re: How trust works in gpg...

2008-04-15 Thread Peter Lewis
On Tuesday 15 April 2008 at 12:39:43 Herbert Furting wrote: > gpg uses a so called trust modell (there ary actually several > different), where you can each UID/key an specific amount of trust. > You can give: > n Never trust this key. > m Marginall

Re: Miscellaneous questions

2008-04-15 Thread Sven Radde
Herbert Furting schrieb: Ah you think cryptography is engineering? Always thought it would be math. Implementing crypto is purest engineering. Not even algorithm design is pure math if you think of timing or power consumption attacks that might have to be considered. Anyway if we always say

Re: Miscellaneous questions

2008-04-15 Thread Sven Radde
Herbert Furting schrieb: But imagine the following: Yours: 3DES, AES256 Mine: AES256, 3DES Which one is chosen now? But when I only include AES256 I can at least somewhat control it. If *you* send, it is AES; if RJH sent, it would be 3DES. It doesn't matter if your key indicates a preference

Re: How trust works in gpg...

2008-04-15 Thread Stan Tobias
Herbert Furting wrote: > If the new UID just contains a new email address, you should really > check if the keyholder "controlls" that email address. > You can do so, by sending him an encrypted challenge. [another newbie here] I don't understand this. If a public key has a UID1, which I already

Re: Miscellaneous questions

2008-04-15 Thread Robert J. Hansen
Herbert Furting wrote: The standard allows for terabit RSA keys. Should GnuPG allow them? Yes why not,... but only in an expert mode. You may want to consider re-reading your answer a few times and asking yourself, "why do I feel this way, and why do other people feel the way they do?" It m

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
First of all,... unfortunately Chris forgot to CC the list (at least it seems so). So I post his answer again: On Tue, Apr 15, 2008 at 12:21 PM, Michael Kesper <[EMAIL PROTECTED]> wrote: > I remember Werner saying that this was just nonsense. > Werner, can you correct me if I'm wrong? Well this i

Re: How trust works in gpg...

2008-04-15 Thread Sven Radde
Stan Tobias schrieb: If a public key has a UID1, which I already trust, and a new UID2 is added, why can't I infer trust for the new uid? (...) So the only person that could have added UID2 is the one that is in control of UID1 (supposedly, it's the same person). Why is there a need to check a

Re: Miscellaneous questions

2008-04-15 Thread Herbert Furting
On Tue, Apr 15, 2008 at 3:03 PM, Robert J. Hansen <[EMAIL PROTECTED]> wrote: > One of the best techniques available to us for controlling complexity in > software--and definitely the simplest--is to take a chainsaw to the > feature list. Go through the specification and copy down every single >

Re: How trust works in gpg...

2008-04-15 Thread Peter Lewis
On Tuesday 15 April 2008 at 14:11:48 Sven Radde wrote: > Stan Tobias schrieb: > > If a public key has a UID1, which I already > > trust, and a new UID2 is added, why can't I infer trust for the new uid? > > (...) > > So the > > only person that could have added UID2 is the one that is in control of

Re: Miscellaneous questions

2008-04-15 Thread Robert J. Hansen
Why? Just because new (perhaps incompatible) features are added in newer versions,... nobody has to use that newer versions, right? If you put GnuPG 3.0 available for download, everyone who's looking for the latest release will grab it. The people who are quite happy with 1.2, 1.4 or 2.0 won'

Re: How trust works in gpg...

2008-04-15 Thread Sven Radde
Peter Lewis schrieb: Because you do not know whether the owner of UID1 is also the owner of UID2. Let's say, someone trusts my key and my user-id on that key. Now, I add another ID: "Stan Tobias <[EMAIL PROTECTED]>"... No good idea to trust that without checking, is it? But isn't that the

Need Help

2008-04-15 Thread Debabrata Das
Hi All, Currently we are using GnuPG 1.4.7 which is under GPL V2 on HP-UX ,but we came to know that there is a security vulnerability on GnuPG 1.4.8 & earlier version.Since Gnupg 1.4.9 is under GPL V3 & we don't want to move to product under GPL v3.Can you please tell us if it is permissible

Re: Miscellaneous questions

2008-04-15 Thread Herbert Furting
1) This is the cost of advance... 2) btw: I've never said that one mustn't provide backward compatibility. Of course there are things that would break that (e.g. use something else than SHA1 for fingerprints) but my ideas about how to interpret the standard, and where to put some subpacktes wouldn'

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
Well but if Peter Lewis <[EMAIL PROTECTED]> adds a new UID "Stan Tobias <[EMAIL PROTECTED]>" you obviously can't sign it, because the keyholder is Peter Lewis and not Stan Tobias. hf ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.

Re: How trust works in gpg...

2008-04-15 Thread Sven Radde
Mark H. Wood schrieb: The safest thing for gpg to assume is that I assign no trust at all until I have instructed it otherwise. AFAIK this is the default behaviour, isn't it? You have the option of specifying "trusted introducers" (i.e. keys signed by those are automatically considered valid by

Re: How trust works in gpg...

2008-04-15 Thread Mark H. Wood
On Tue, Apr 15, 2008 at 01:23:01PM +0100, Peter Lewis wrote: > So I guess my question is: is this a guide for me, and then I should manually > set the trust level on key F myself (if I am satisfied that the chains > exist), or should gpg do this automatically for me based on the parameters in >

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
On Tue, Apr 15, 2008 at 4:56 PM, Sven Radde <[EMAIL PROTECTED]> wrote: >[snip snap] Well said :) ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: How trust works in gpg...

2008-04-15 Thread Charly Avital
Herbert Furting wrote the following on 4/15/08 9:38 AM: > Well but if Peter Lewis <[EMAIL PROTECTED]> adds a new UID "Stan > Tobias <[EMAIL PROTECTED]>" you obviously can't sign it, because the > keyholder is Peter Lewis and not Stan Tobias. > > hf > To add a new UID, whichever it is, wouldn't P

Re: How trust works in gpg...

2008-04-15 Thread Peter Lewis
On Tuesday 15 April 2008 at 15:05:45 Sven Radde wrote: > Signing a new UID with the same key that was used to sign another UID > proves that the same person that created the first UID created the > second one. > It does not prove that the person controls (or, is identified by) the > second UID. > >

Re: Miscellaneous questions

2008-04-15 Thread Werner Koch
On Tue, 15 Apr 2008 15:03, [EMAIL PROTECTED] said: > This is how GnuPG was developed, by and large. In the very early days, > GnuPG supported only the bare minimum necessary to conform to the RFC. > Features like Twofish support were not added until the MUSTs were well Actually GnuPG predates Op

Re: Need Help

2008-04-15 Thread John Clizbe
Debabrata Das wrote: > Hi All, > > Currently we are using GnuPG 1.4.7 which is under GPL V2 on HP-UX ,but > we came to know that there is a security vulnerability on GnuPG 1.4.8 & > earlier version.Since Gnupg 1.4.9 is under GPL V3 & we don't want to > move to product under GPL v3.Can you please

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 04:09:51PM +0100, Peter Lewis wrote: > Please excuse one final question: I have signed keys with one person (A), > whom > I trust fully, and he has signed keys with another person (B), whom I know, > but with whom I have not signed keys. B's key is (correctly) showing as

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 09:37:45AM -0400, Mark H. Wood wrote: > On Tue, Apr 15, 2008 at 01:23:01PM +0100, Peter Lewis wrote: > > So I guess my question is: is this a guide for me, and then I should > > manually > > set the trust level on key F myself (if I am satisfied that the chains > > exist)

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 02:13:51PM +0200, Stan Tobias wrote: > Herbert Furting wrote: > > If the new UID just contains a new email address, you should really > > check if the keyholder "controlls" that email address. > > You can do so, by sending him an encrypted challenge. > > [another newbie her

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 02:33:08PM +0100, Peter Lewis wrote: > On Tuesday 15 April 2008 at 14:11:48 Sven Radde wrote: > > Stan Tobias schrieb: > > > If a public key has a UID1, which I already > > > trust, and a new UID2 is added, why can't I infer trust for the new uid? > > > (...) > > > So the >

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 12:21:43PM +0200, Michael Kesper wrote: > Hi, > > On Tue, Apr 15, 2008 at 12:42:43AM +0200, Herbert Furting wrote: > > On Mon, 2008-04-14 at 23:20 +0100, Peter Lewis wrote: > > > Ah yes, thanks. So I have now set the owner-trust for his key to "full", > > > but > > > stil

Re: Need Help

2008-04-15 Thread Sven Radde
Hi! Am Dienstag, den 15.04.2008, 11:03 -0500 schrieb John Clizbe: > There is nothing to backport. David Shaw answered this exact same post last > Friday on both GnuPG-Users and GnuPG-Devel. I felt already last Friday that this was only a partial answer to the question. Although it might not be

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 03:10:47PM +0200, Herbert Furting wrote: > To say it short: In my opinion every information that you sign/certify > should be actually validaded. > It probably makes even sense to check if a keyholder specified all of > his given names,... and perhaps one shouldn't sign UIDs

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
On Tue, 2008-04-15 at 14:09 -0400, David Shaw wrote: > On Tue, Apr 15, 2008 at 03:10:47PM +0200, Herbert Furting wrote: > > To say it short: In my opinion every information that you sign/certify > > should be actually validaded. > > It probably makes even sense to check if a keyholder specified all

Re: How trust works in gpg...

2008-04-15 Thread Christoph Anton Mitterer
On Tue, 2008-04-15 at 13:45 -0400, David Shaw wrote: > If someone wants to sign your key, you then end up with: > > KEY + UID + SELFSIG + SIG > Nicely illustrated,.. but let me please add (I know of course that _you_ know this) that the SIG is made only over the KEY+UID data,... thus the keyhol

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 09:27:26PM +0200, Christoph Anton Mitterer wrote: > On Tue, 2008-04-15 at 13:45 -0400, David Shaw wrote: > > If someone wants to sign your key, you then end up with: > > > > KEY + UID + SELFSIG + SIG > > > Nicely illustrated,.. but let me please add (I know of course tha

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
On Tue, 2008-04-15 at 16:43 -0400, David Shaw wrote: > Yes indeed. OpenPGP even expects users to change their SELFSIGs > occasionally - the preferences and other UID-specific information is > stored there, so a change to preferences means a change in SELFSIG. Yeah,.. I just try to browse to the so

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 11:03:43PM +0200, Herbert Furting wrote: > On Tue, 2008-04-15 at 16:43 -0400, David Shaw wrote: > > Yes indeed. OpenPGP even expects users to change their SELFSIGs > > occasionally - the preferences and other UID-specific information is > > stored there, so a change to pref

Re: How trust works in gpg...

2008-04-15 Thread Christoph Anton Mitterer
Dear David. On Tue, 2008-04-15 at 16:41 -0400, David Shaw wrote: > It is irrelevant to this. There are a lot of "David Shaw"s in the > world, and it's pointless to try and prevent collisions in a set that > large. The disambiguation in OpenPGP keys is really the email > address, not the name. H

Re: How trust works in gpg...

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 09:36:04PM +0200, Herbert Furting wrote: > On Tue, 2008-04-15 at 14:09 -0400, David Shaw wrote: > > On Tue, Apr 15, 2008 at 03:10:47PM +0200, Herbert Furting wrote: > > > To say it short: In my opinion every information that you sign/certify > > > should be actually validade

Re: How trust works in gpg...

2008-04-15 Thread Herbert Furting
On Tue, 2008-04-15 at 17:09 -0400, David Shaw wrote: > Change your preferences and GPG will make a new selfsig for you. No > source hacking needed. Yes but ok let me explain what I want or would like to have ;-) My current key has the following layout: ***[Pub key packet]*** ***[UID]*** ***[0x

Re: Miscellaneous questions

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 02:31:07AM +0200, Herbert Furting wrote: > On Mon, 2008-04-14 at 18:06 -0500, Robert J. Hansen wrote: > > 1. You didn't ask for the option to allow zero-length UIDs. If you'd > > asked for that option, I would have given it. You asked "why does > > GnuPG have a m

Re: Miscellaneous questions

2008-04-15 Thread David Shaw
On Mon, Apr 14, 2008 at 11:22:59PM +0200, Herbert Furting wrote: > > > While the standard seems to allow this,.. gpg does not (it won't sign a > > > UID > > > when the a self-sig has been revoked before). > > > How can I solve this? > > GPG allows this. Add "--expert" to your command line when y

Re: Miscellaneous questions

2008-04-15 Thread David Shaw
On Mon, Apr 14, 2008 at 08:43:14PM -0500, Robert J. Hansen wrote: > Herbert Furting wrote: > > gpg is probably THE main implementation of OpenPGP (sorry to the > > commercial PGP folks ;) ),... as such I think it should support most > > of the stuff from OpenPGP, or not? > > Depends on who you as

Re: Miscellaneous questions

2008-04-15 Thread David Shaw
On Tue, Apr 15, 2008 at 08:40:17AM -0500, Robert J. Hansen wrote: >> Why? Just because new (perhaps incompatible) features are added in >> newer versions,... nobody has to use that newer versions, right? > > If you put GnuPG 3.0 available for download, everyone who's looking for the > latest relea

Re: Miscellaneous questions

2008-04-15 Thread Christoph Anton Mitterer
On Tue, 2008-04-15 at 18:04 -0400, David Shaw wrote: > It will work with GPG. I can't speak for other programs, but it's > legal by the spec, so it should work everywhere. > > Mind you, you're going to hurt yourself, but it's legal by the spec. Ok this I've already asked everything in my previous

Re: Miscellaneous questions

2008-04-15 Thread Christoph Anton Mitterer
Dear David. On Tue, 2008-04-15 at 17:54 -0400, David Shaw wrote: > > > A specification does not set a high-water mark for implementations. It > > > sets a low-water mark. Implementations are free to restrict keys in any > > > way they want, so long as the low-water mark is met. If you want to >

Re: Miscellaneous questions

2008-04-15 Thread Robert J. Hansen
Christoph Anton Mitterer wrote: > But it does not say that it has to contain the must-have algos. As has been mentioned here at least twice now, see section 13.2, where it explicitly says if the MUSTs are not listed, they are tacitly listed. I do not understand how much clearer I can make this.

Re: Need Help

2008-04-15 Thread John Clizbe
Sven Radde wrote: > Am Dienstag, den 15.04.2008, 11:03 -0500 schrieb John Clizbe: >> There is nothing to backport. David Shaw answered this exact same post last >> Friday on both GnuPG-Users and GnuPG-Devel. > > I felt already last Friday that this was only a partial answer to the > question. > A

Re: Miscellaneous questions

2008-04-15 Thread Sven Radde
Hi! Am Dienstag, den 15.04.2008, 20:35 -0500 schrieb Robert J. Hansen: > > Even if those subpacktes would be used in my suggested way, each > > implementation would know "Nanana, 3DES is a fallback, so in each case I > > can find my algorithm match", but in addition to that a user could force > >