Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-13 Thread Werner Koch
On Thu, 12 Sep 2013 07:35, d...@fifthhorseman.net said: > GnuPG 2.1 (still currently in beta, afaict) is the first version to > include ECC support for OpenPGP. the 2.0.x branch does not include ECC Right. There are no plans to support it in older versions. 2.1 also has a feature to work witho

Re: Why trust gpg4win?

2013-09-13 Thread NdK
Il 12/09/2013 23:10, Marko Randjelovic ha scritto: > All the time I read suggestions on using USB sticks and I must say > people are crazy about USB sticks. It is more convenient to use optical > media then USB stick because they are read only. Boot from Live CD, not > from USB stick and use USB s

Re: Attacking an offline system

2013-09-13 Thread Peter Lebbing
On 12/09/13 22:03, NdK wrote: > Nope. W/ Vinculum module you send it commands like "open mickey.txt" and > then "read 1024". The filesystem driver is in the module and your interface > only receives expected data. I hadn't looked at the Vinculum module[1]; that would indeed be a way to remove the

Re: Why trust gpg4win?

2013-09-13 Thread Peter Lebbing
On 13/09/13 09:19, NdK wrote: > PS: I'll tell you a secret: there are USB keys with a "write protect" > switch :) Since people were concerned about hacking the USB key, you need to define the scenario. First of all, if we are talking about hacking through a rogue firmware update for the USB key:

Re: Why trust gpg4win?

2013-09-13 Thread Jan
09/12/2013 22:03, NdK wrote: You really should define your "security perimeter". 09/13/2013 09:19, NdK wrote: I can be "reasonably sure" nobody will hack my machine just to read my mail. Obama can be "reasonably sure" that *many* attackers will try. My "security perimeter" should be "equal"

Re: Why trust gpg4win?

2013-09-13 Thread David Smith
On 09/10/13 21:42, Jan wrote: > 10/9/2013 14:19, Werner Koch wrote : >> So what about using that free USB stack for AVR's to implement a flash >> device? You would be able to audit about everything; flylogic even has >> these nice pictures of the ATmega88 masks... > > 10/9/2013 16:33, David Smit

Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-13 Thread Johan Wevers
On 9/13/2013 8:52, Werner Koch wrote: > concerns about switching to GnuPG-2. However, if at some time ECC would > really take off, we might backport it to 1.4 if we could agree to change > 1.4 to make use of Libgcrypt. Such a major change would warrant a 1.6 IMO. BTW, is there any discussion in

Re: Why trust gpg4win?

2013-09-13 Thread NdK
Il 13/09/2013 11:33, Jan ha scritto: > My "security perimeter" should be "equal" to the maximum of the > "security perimeters" of my usual communication partners. That is so > because with their private key they protect my mail and with my private > key I protect their mail. What is "usual" is not

Re: Transfer subkey to other keyring

2013-09-13 Thread Jack Bates
On 07/09/13 07:10 AM, Peter Lebbing wrote: On 27/06/13 18:55, Jack Bates wrote: except that I am using the key id of a subkey, with an exclamation mark, to export just one subkey instead of all the subkeys belonging to the primary key. The subkey with that key id definitely doesn't already exist

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Nicholas Cole
On Fri, Sep 13, 2013 at 12:22 AM, Daniel Kahn Gillmor wrote: > GnuPG is currently not able to create a non-exportable self-sig. If you > try to do this, it gives an error: > > WARNING: the signature will not be marked as non-exportable. > > But: some people might never want their keys to be pub

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Peter Lebbing
On 2013-09-13 14:24, Nicholas Cole wrote: The correct way would be to have keyservers honour the no-modify flag, or perhaps have some notation on the ID that prevents uploading to a public keyserver. I myself would favour the latter approach. The latter has the same problem as the no-modify f

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread David Shaw
On Sep 13, 2013, at 1:22 AM, Daniel Kahn Gillmor wrote: > GnuPG is currently not able to create a non-exportable self-sig. If you > try to do this, it gives an error: > > WARNING: the signature will not be marked as non-exportable. This is by design (hence the warning message), as an unsigned

newbie and smartcard, I'm lost.

2013-09-13 Thread Didier
Hi, I'm a newbie ... and I would like to do file and mail encryption from different PCs at different locations with gnupg. In any case I would not like to copy my private key on other pcs! As far as I understood, using a smartcard was the ideal solution as I won't have to store my private keys on

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Nicholas Cole
On Fri, Sep 13, 2013 at 3:29 PM, Daniel Kahn Gillmor wrote: > On 09/13/2013 08:24 AM, Nicholas Cole wrote: > >> I don't think this is sensible. What is the point of a UID that >> cannot be used by someone else? If the UID is shared with anyone else >> (even privately), it must have a self-signat

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Daniel Kahn Gillmor
On 09/13/2013 10:17 AM, David Shaw wrote: > On Sep 13, 2013, at 1:22 AM, Daniel Kahn Gillmor > wrote: > >> GnuPG is currently not able to create a non-exportable self-sig. If you >> try to do this, it gives an error: >> >> WARNING: the signature will not be marked as non-exportable. > > This i

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Nicholas Cole
On Fri, Sep 13, 2013 at 3:42 PM, Daniel Kahn Gillmor wrote: > On 09/13/2013 09:49 AM, Peter Lebbing wrote: >> On 2013-09-13 14:24, Nicholas Cole wrote: >>> The correct way would be to have keyservers >>> honour the no-modify flag, or perhaps have some notation on the ID >>> that prevents uploading

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Daniel Kahn Gillmor
On 09/13/2013 09:49 AM, Peter Lebbing wrote: > On 2013-09-13 14:24, Nicholas Cole wrote: >> The correct way would be to have keyservers >> honour the no-modify flag, or perhaps have some notation on the ID >> that prevents uploading to a public keyserver. I myself would favour >> the latter approa

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Daniel Kahn Gillmor
On 09/13/2013 08:24 AM, Nicholas Cole wrote: > I don't think this is sensible. What is the point of a UID that > cannot be used by someone else? If the UID is shared with anyone else > (even privately), it must have a self-signature, and so that signature > must be exportable. It is possible

Re: newbie and smartcard, I'm lost.

2013-09-13 Thread Pete Stephenson
On Fri, Sep 13, 2013 at 3:33 PM, Didier wrote: > > > Hi, > I'm a newbie ... and I would like to do file and mail encryption from > different PCs at different locations with gnupg. > In any case I would not like to copy my private key on other pcs! > As far as I understood, using a smartcard was th

Re: lsign produces exportable signatures when used for self-sigs

2013-09-13 Thread Daniel Kahn Gillmor
On 09/13/2013 11:35 AM, Nicholas Cole wrote: > Well. Why not trust your circle of contacts (because anyone using this > scheme must be in a small circle) not to upload the keys to > keyservers? > > Perhaps if there is enough demand gpg could even have a "Never send > these keys to keyservers" opti

Re: Why trust gpg4win?

2013-09-13 Thread Jan
In 09/13/2013 14:05, NdK wrote: > Some other approach might be to compare the output of several > versions of gnuPG, PGP etc.. This way you could check whether the > information was secretly decrypted with a second "FBI key". This is > even > possible for someone how is no programer. Do you thi

Re: Why trust gpg4win?

2013-09-13 Thread Jan
On 09/13/2013 14:05, NdK wrote: What happens if one of your correspondents is willing to undergo the whole procedure and he's an FBI agent? I'd tell him confidential information, - but I did not intent to protect me against such a thread by means of gnuPG. If you want to certify that your secu

Re: Why trust gpg4win?

2013-09-13 Thread NdK
Il 13/09/2013 21:12, Jan ha scritto: >> How can you check there isn't a weakness in RNG, for exampel [...] > There are statistical test with which you can test whether a random > number generator produces for instance uniformly distributed numbers. > This in connection with the above procedure mig

Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-13 Thread Werner Koch
On Fri, 13 Sep 2013 13:25, joh...@vulcan.xs4all.nl said: > Such a major change would warrant a 1.6 IMO. Sure. > BTW, is there any discussion in the OpenPGP community about other public > key systems, like NTRUEncrypt (see No, I am not aware of any discussions. QC resistant algorithms are not y

Re: Should the use of multiple UID per key be discouraged?

2013-09-13 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 10 September 2013 at 8:01:30 PM, in , Philipp Klaus Krause wrote: > GPG supports the feature of having multiple UIDs per > key. However this requires special care of anyone > signing such a key. AFAIK, there is no really > user-fr

Re: Where is ECC in gpg2 (specifically gnupg-2.0.21

2013-09-13 Thread Robert J. Hansen
On 9/13/2013 6:20 PM, Werner Koch wrote: > No, I am not aware of any discussions. QC resistant algorithms are not > yet something we need to rush for. Although it hasn't hit the IETF WG mailing list, I know that some list participants have had intermittent off-list conversations about lattice cry