Re: Re: problems with pinentry-0.9.0 (Werner Koch)

2014-11-21 Thread Peter Pentchev
On Thu, Nov 20, 2014 at 12:31:53PM -0800, Rex Kneisley wrote: > Gracious reply: > >Install the pkg-config package: > >apt-get install pkg-config > >Shalom-Salam, > >Werner > > Thank you! > After installing pkg-config as suggested, > Looks like I'm down to the wire: > > checking whether mlock is

How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread Schlacta, Christ
I know some encryption schemes reveal more information about the keys used when an attacker has both the plaintext and the ciphertext. In general, how much information does GPG reveal in such situations? How much plaintext/ciphertext matched data would an attacker need (An order of magnitude is fi

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread Martin Behrendt
Am 21.11.2014 um 10:57 schrieb Schlacta, Christ: > I know some encryption schemes reveal more information about the keys used > when an attacker has both the plaintext and the ciphertext. In general, > how much information does GPG reveal in such situations? Short answer: Thats no problem. google

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread Robert J. Hansen
I know some encryption schemes reveal more information about the keys used when an attacker has both the plaintext and the ciphertext. In general, how much information does GPG reveal in such situations? Virtually none. How much plaintext/ciphertext matched data would an attacker need (An

2 pka dns RRs - same email address

2014-11-21 Thread Fulano Diego Perez
i know its not strictly for this list but does anybody have a suggestion for the zone file ? i have 2 TLSA RRs in my zone file, 2 certs, and postfix automatically selects the correct cert based on the RR what would gnupg do if it encountered 2 pka RRs ? would it select the correct finger print a

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread vedaal
On 11/21/2014 at 4:57 AM, "Christ Schlacta" wrote: >how much information does GPG reveal in such situations? = GnuPG works by using hybrid encryption: [1] The plaintext is converted to ciphertext using a block cipher, with GnuPG generating a random session key for the encryption [2] The

Re: Backup of encrypted private key on uncontrolled disks

2014-11-21 Thread Robert J. Hansen
It's really easy to point fingers at them and say, "man, what chumps." But the reality is none of us on this list are different than they are. We're human, with the same foibles and weaknesses, and I'm pretty sure Robin Sage would rip through this mailing list like a chainsaw. For that matter, E

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread Schlacta, Christ
So to summarize, the best way to try this attack would be to encrypt lots of small messages to a dummy key and a target key because the only knowable plaintext is the session key. However, there's no known or reasonably suspected method of plaintext attack anyway, so all this data is believed to be

Re: How much information can be gleaned about a gpg key by possessing both plaintext and ciphertext?

2014-11-21 Thread vedaal
On 11/21/2014 at 1:01 PM, "Christ Schlacta" wrote: > >So to summarize, the best way to try this attack would be to >encrypt lots >of small messages to a dummy key and a target key because the only >knowable >plaintext is the session key. However, there's no known or >reasonably >suspected metho

Re: Symmetrical encryption or ...

2014-11-21 Thread Robert J. Hansen
Only I use the two machines, but need the file encrypted. Any alternatives to symmetrical encryption of a file? Not really. Sym would appear to be ideal for your use case. ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/ma

Re: Symmetrical encryption or ...

2014-11-21 Thread Dave Pawson
Thanks Robert. I'll give it a try. regards Dave P On 21 November 2014 18:24, Robert J. Hansen wrote: >> Only I use the two machines, but need the file encrypted. >> >> Any alternatives to symmetrical encryption of a file? > > > Not really. Sym would appear to be ideal for your use case. > > > _

Re: Symmetrical encryption or ...

2014-11-21 Thread Schlacta, Christ
For a password safe you might look into existing solutions, such as keepass(x) or other similar password storage solutions On Nov 21, 2014 10:29 AM, "Dave Pawson" wrote: > Thanks Robert. I'll give it a try. > > regards Dave P > > On 21 November 2014 18:24, Robert J. Hansen wrote: > >> Only I use

Re: Symmetrical encryption or ...

2014-11-21 Thread Dave Pawson
1. A matter of trust (low) 2. One mc is Linux, the other windows - they tend not to mix? Tks, Dave On 21 November 2014 18:36, Schlacta, Christ wrote: > For a password safe you might look into existing solutions, such as > keepass(x) or other similar password storage solutions > > On Nov 21, 2014

correct usage of gpg param 'throw-keyid(s)' ?

2014-11-21 Thread grantksupport
What is this param's correct usage: "throw-keyids" or "throw-keyid" ? I see conflicting docs online: https://www.gnupg.org/documentation/manuals/gnupg/GPG-Esoteric-Options.html & --throw-keyids --no-throw-keyids Do not put th

Re: correct usage of gpg param 'throw-keyid(s)' ?

2014-11-21 Thread Hauke Laging
Am Fr 21.11.2014, 12:16:39 schrieb grantksupp...@operamail.com: > I see conflicting docs online: > Do not put the recipient key IDs into encrypted messages. This > helps to hide the receivers of the message and is a limited > countermeasure against traffic analysis.1 On the rec

Re: correct usage of gpg param 'throw-keyid(s)' ?

2014-11-21 Thread grantksupport
> And what do you consider the conflict? >> What is this param's correct usage: >> >> "throw-keyids" or "throw-keyid" >> >> ? The obvious difference in usage ... One says the usage is throw-keyids the other says usage is throw-keyid neither one mentions the others' usage

Re: correct usage of gpg param 'throw-keyid(s)' ?

2014-11-21 Thread Daniel Kahn Gillmor
On 11/21/2014 04:58 PM, grantksupp...@operamail.com wrote: > The obvious difference in usage ... > > One says the usage is > > throw-keyids > > the other says usage is > > throw-keyid > > neither one mentions the others' usage As long as the prefix substring is unique, gpg will accept a

Re: correct usage of gpg param 'throw-keyid(s)' ?

2014-11-21 Thread grantksupport
On Fri, Nov 21, 2014, at 02:33 PM, Daniel Kahn Gillmor wrote: > As long as the prefix substring is unique, gpg will accept a truncated > long-option. > > That is, the full option is --throw-keyids, but gpg will accept > --throw-keyid as an alias for it. > > It should also accept --throw-keyi an

Re: correct usage of gpg param 'throw-keyid(s)' ?

2014-11-21 Thread Hauke Laging
Am Fr 21.11.2014, 13:58:19 schrieb grantksupp...@operamail.com: > The obvious difference in usage ... > > One says the usage is > > throw-keyids > > the other says usage is > > throw-keyid That's just a typo. The correct name for the option is "throw-keyids". You do not have to write the

Re: Symmetrical encryption or ...

2014-11-21 Thread Doug Barton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/20/14 10:40 AM, Dave Pawson wrote: | Requirement. Two machines (one Linux, one Windows). | | I want a secure file 'shared' between them, as a pwd-safe. | | Only I use the two machines, but need the file encrypted. | | Any alternatives to symme

Re: Encryption on Mailing lists sensless?

2014-11-21 Thread Ingo Klöcker
On Thursday 20 November 2014 14:36:35 Schlacta, Christ wrote: > On Nov 20, 2014 1:58 PM, "Ingo Klöcker" wrote: > > On Tuesday 18 November 2014 22:43:18 MFPA wrote: > > KMail encrypts an individual copy for each BCC recipient. I thought > > Thunderbird+Enigmail would also do this. > > > > Any mail

Re: Encryption on Mailing lists sensless?

2014-11-21 Thread Schlacta, Christ
On Nov 21, 2014 8:55 PM, "Ingo Klöcker" wrote: > > On Thursday 20 November 2014 14:36:35 Schlacta, Christ wrote: > > On Nov 20, 2014 1:58 PM, "Ingo Klöcker" wrote: > > > On Tuesday 18 November 2014 22:43:18 MFPA wrote: > > > KMail encrypts an individual copy for each BCC recipient. I thought > >

Re: Symmetrical encryption or ...

2014-11-21 Thread Dave Pawson
Thanks Doug On 22 November 2014 02:37, Doug Barton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Either symmetric or PK encryption would suit your needs, but as > someone pointed out already, a better solution is to use a password safe. > > KeePass is an excellent solution, and

Re: Symmetrical encryption or ...

2014-11-21 Thread Dave Pawson
I installed keepassx. Not much use to me. 1. Illegible with my eyesight (reported to them) 2. Insufficient fields (seems to be non expandable). regards On 22 November 2014 02:37, Doug Barton wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 11/20/14 10:40 AM, Dave Pawson wrote: >