Re: my gpg key does not conform to rfc4880?

2013-10-10 Thread Daniel Kahn Gillmor
On 10/10/2013 01:45 PM, Brian J. Murrell wrote: > I was told by a developer of a piece of software that my key does not > conform to rfc4800. He said: > > According to http://tools.ietf.org/html/rfc4880#section-5.2.2 > signatures of version 3 don't have subpackets, which are only > availabl

Re: my gpg key does not conform to rfc4880?

2013-10-10 Thread Daniel Kahn Gillmor
On 10/10/2013 03:12 PM, Brian J. Murrell wrote: > Yeah. I have considered both of those things also. I guess the only > thing that was holding me back was that the existing key has an > investment in signatures on it though. What I am unclear about is how > the authenticity and trustibility of

Re: First steps with GPG, am I off to a good start?

2013-10-10 Thread Daniel Kahn Gillmor
On 10/10/2013 09:32 PM, Hauke Laging wrote: > Am Fr 11.10.2013, 01:25:50 schrieb Robin Kipp: > >> Invoked addkey to generate a 2048 bit RSA sub key, with >> encryption and signing capabilities. > > It seems to me that the more accepted recommendation here is to have separate > subkeys for signin

Re: 2048 or 4096 for new keys? aka defaults vs. Debian

2013-10-31 Thread Daniel Kahn Gillmor
On Thu 2013-10-24 15:05:45 -0400, Sylvain wrote: > I saw a lot of activity in the Debian project about upgrading to a > 4096 RSA key, > e.g. http://lists.debian.org/debian-devel-announce/2010/09/msg3.html > > However GnuPG's default is 2048. ENISA (the European Union Agency for Network and Inf

Re: Quotes from GPG users

2013-11-03 Thread Daniel Kahn Gillmor
On 10/30/2013 06:58 AM, Sam Tuke wrote: If you want to help us, send your own statement about why GPG is important to you. Please keep it less than or equal to 130 characters, so it can be used on social networks. As a Debian user, I rely on GnuPG to ensure that the software I install hasn't b

Re: Changing default digest algo

2013-11-03 Thread Daniel Kahn Gillmor
On 11/04/2013 12:45 AM, Chuck Peters wrote: I added the following to gpg.conf: personal-digest-preferences SHA512 cert-digest-algo SHA512 default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed I changed the preferences: gpg> setpref SHA512 SHA384

Re: trust your corporation for keyowner identification?

2013-11-04 Thread Daniel Kahn Gillmor
ch to User IDs to it: * Daniel Kahn Gillmor * Alice Munroe You meet me, check my identity, verify that i'm actually dkg, and just sign the first User ID (because you have been unable to verify whether i am also somehow Alice Munroe). (in fact, i am not Alice Munroe, but i would like to

Re: trust your corporation for keyowner identification?

2013-11-07 Thread Daniel Kahn Gillmor
On 11/07/2013 11:09 AM, Leo Gaspard wrote: Except they do not have to know X, nor that he makes perfectly reasonable decisions in signing keys. And I believe it's not noise. Let's make an example in the real world : * I would entrust X with my life * X would entrust Y with his life, without

reproducible builds [was: Re: BitMail.sf.net v 0.6 - Secure Encrypting Email Client]

2013-11-15 Thread Daniel Kahn Gillmor
On 11/15/2013 12:06 PM, Robert J. Hansen wrote: > getting two > computers to generate the exact same binary code from the exact same > source code is a surprisingly difficult challenge. It requires a > perfect match of everything from compiler versions to C library versions > right down to identic

Re: a maximally simplified GUI for OpenPGP (no code)

2013-12-12 Thread Daniel Kahn Gillmor
On 12/12/2013 12:33 PM, Hauke Laging wrote: > 1) gpg not showing the UID (or overall) key validity by default What do people think about changing the default of show-uid-validity to yes? I would support this change; i think it would help users of gpg to better-understand their keyring. and users

Re: show-uid-validity default to yes

2013-12-13 Thread Daniel Kahn Gillmor
On 12/13/2013 02:09 PM, Werner Koch wrote: > I estimate that not more than 1% of all GnuPG users are using gpg in the > shell. this sounds like an argument for being willing to change the human-readable output on the shell -- there are not many people looking at it anyway, and most of those peopl

Re: show-uid-validity default to yes

2013-12-13 Thread Daniel Kahn Gillmor
On 12/13/2013 04:27 PM, Werner Koch wrote: > On Fri, 13 Dec 2013 21:24, d...@fifthhorseman.net said: >> I think for a piece of critical security infrastructure, GPG has been >> supporting some insecure practices for far too long. > > Why do you think this is insecure? Because gpg does not encrypt

Re: Revocation certificate for sub key?

2013-12-14 Thread Daniel Kahn Gillmor
On 12/14/2013 12:01 PM, adrelanos wrote: > [hauke wrote:] >> Am Fr 13.12.2013, 22:56:07 schrieb adrelanos: >>> Hi, >>> >>> Is it possible to create a revocation certificate just for sub keys and >>> not the master key? >> >> --edit-key 0x12345678 >> key 1 >> revkey > > That's doesn't create a revo

X.509 certificates for https://gnupg.org [was: Re: Another step towards crowdfunding]

2013-12-16 Thread Daniel Kahn Gillmor
On 12/16/2013 02:32 PM, Micah Lee wrote: > Also, looks like the CA is CAcert--an awesome CA, but not trusted by > browsers by default. I'd suggest getting a cert from StartSSL > [https://startssl.com/], since they're they only CA that gives certs for > free. And a wildcard cert (for *.gnupg.org) en

Re: Another step towards crowdfunding

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 08:53 AM, Sam Tuke wrote: > On 14/12/13 21:27, Zechariah Seth wrote: >> Will GnuPG blogs be cross-posted to the gnupg-users list? :) > > I could do that if others are happy with the idea. If the expected volume is low-ish (e.g. no more than once a week or so) i think that would be a

Re: encryption algorithm

2013-12-17 Thread Daniel Kahn Gillmor
Hi Matt-- On 12/17/2013 10:07 AM, Matt D wrote: > Hi! What encryption algorithm do we use in OpenPGP OpenPGP has "algorithm agility", meaning that it's possible to use different encryption algorithms at different times in the same cryptographic framework. encrypted OpenPGP messages are generall

Re: X.509 certificates for https://gnupg.org

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 10:37 AM, Werner Koch wrote: > On Mon, 16 Dec 2013 21:35, d...@fifthhorseman.net said: > >> Werner, if i can help with configuring or maintaining the web server for >> gnupg.org to address some of these issues, please let me know. > > Yes, I have problems to figure out a woking ciph

Re: encryption algorithm

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 01:22 PM, Robert J. Hansen wrote: > With respect to 2048-bit crypto, don't believe the hype. Most users and > most purposes will still be well-served with even a 1024-bit key. No > one with half a brain is going to bother trying to break RSA-1024; they > will instead come up with mo

Re: encryption algorithm

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 05:04 PM, Robert J. Hansen wrote: > I don't understand the reasoning by which you have concluded that I am > advocating RSA-1024. I'm not. I think the default of RSA-2048 is a > good one. I'm only saying that for most users and most purposes, > RSA-1024 is sufficient; to reach "vir

Re: encryption algorithm

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 08:27 PM, Robert J. Hansen wrote: > Yes -- but no one is claiming that 112-bit keyspaces are vulnerable > today, or at any time within the near future. Further, moving to a > 128-bit keyspace is not, IMO, any sort of a real win: you're only > gaining 16 bits of keyspace. At most you

Re: Another step towards crowdfunding

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 08:45 PM, Micah Lee wrote: > As far as I know these preload lists only force HTTPS for these domains. > I wonder if anyone could convince the browser vendors to also do > certificate pinning, bypassing PKI based on CAs altogether? I believe the answer for public-key-pinning is the sa

Re: encryption algorithm

2013-12-17 Thread Daniel Kahn Gillmor
On 12/17/2013 10:28 PM, Robert J. Hansen wrote: > On 12/17/2013 9:20 PM, Daniel Kahn Gillmor wrote: >> (i'm glad you still feel they're trustworthy, even in the context of >> them having issued a deliberately bad RNG, and their keylength >> recommendations be

Re: encryption algorithm

2013-12-17 Thread Daniel Kahn Gillmor
On 12/18/2013 12:29 AM, Robert J. Hansen wrote: > A flawed standard is just that, a flawed standard. It's not a cause for > a crisis of trust in an outfit that has enjoyed the community's trust > for many decades. Sorry, but NIST does face a crisis of trust, particularly in the area of cryptograp

Re: Import "Raw" RSA Secret Key?

2013-12-20 Thread Daniel Kahn Gillmor
On 12/20/2013 03:20 PM, Micah Lee wrote: > On 12/20/2013 08:21 AM, Eric Swanson wrote: >> This is exactly what I was looking for. Thanks! > > There's a script called keytrans (with a symblink called pem2openpgp) > that's bundled with the monkeysphere source code might do exactly what > you need. >

Re: Printing PGP Businesscard

2013-12-26 Thread Daniel Kahn Gillmor
On 12/24/2013 01:02 PM, Johan Wevers wrote: > You think someone will type it over? KeyID plus a URL would be more > usefull IMO (perhaps a QR code with the URL?) Please use a QR code that contains the full fingerprint (no spaces) prefixed with OPENPGP4FPR: -- this is the mechanism used by the monk

Re: Printing PGP Businesscard

2013-12-26 Thread Daniel Kahn Gillmor
On 12/26/2013 03:01 PM, Avi wrote: > Would having the e-mail address and name in the QR code adversely affect > compatibility with monkeysign? > For example, see the attached code which is similar to what I was playing > with for key-signing purposes, although I was going to print them on > mailing

Re: Printing PGP Businesscard

2013-12-27 Thread Daniel Kahn Gillmor
[rearranging top-posted-ness for chronological sanity] On 12/27/2013 01:12 PM, Avi wrote: > On Fri, Dec 27, 2013 at 1:01 PM, Olav Seyfarth wrote: >> Apart from the question about whitespace, there are no OpenPGP related >> fields defined in vCard, neither for keyIDs, key-download-URLs nor >> fi

Re: sign encrypted emails

2014-01-03 Thread Daniel Kahn Gillmor
On 01/03/2014 08:12 AM, Leo Gaspard wrote: > So changing the encryption could break an opsec. If someone's opsec is based on the question of whether a message was encrypted or not, then they've probably got their cart before their horse too. opsec requirements should indicate whether you encrypt,

Re: sign encrypted emails

2014-01-03 Thread Daniel Kahn Gillmor
On 01/03/2014 12:35 AM, Hauke Laging wrote: > From the RfC perspective (PGP/MIME) this should not be a problem; you just > need another level of nesting. Maybe the mail clients are not even prepared > for reading such messages. That would not surprise me but would not be an > argument against on

Re: sign encrypted emails

2014-01-03 Thread Daniel Kahn Gillmor
On 01/03/2014 06:56 PM, Leo Gaspard wrote: > On Fri, Jan 03, 2014 at 12:50:47PM -0500, Daniel Kahn Gillmor wrote: >> On 01/03/2014 08:12 AM, Leo Gaspard wrote: >>> So changing the encryption could break an opsec. >> >> If someone's opsec is based on th

Re: keysigning: lsign and offline master key

2014-01-04 Thread Daniel Kahn Gillmor
On 01/04/2014 04:41 PM, nb.linux wrote: > - ...here I'm stuck, because (as I understand the lsign) I cannot export > the signature... > > Is this right? > How can I lsign a key and transfer the local signature from my air > gapped system? > Maybe by copying the keyring files between the systems?

Re: Reusing signed user ID or attribute

2014-01-17 Thread Daniel Kahn Gillmor
On 01/17/2014 02:03 PM, Johannes Zarl wrote: > If the revocation is a final act, as long as I can make sure that the > revocation certificate reaches my communication partners I can be sure that > nobody can compromise the key and "reenable" it and start impersonating me. > > If, however, the re

Re: Reusing signed user ID or attribute

2014-01-19 Thread Daniel Kahn Gillmor
On 01/19/2014 09:55 AM, Daniele Ricci wrote: > Ok, so I have to conclude it's implementation specific? > I'm using a custom user attribute to store something that can change > quite often (privacy lists for a chat user). What do you suggest? I don't know what a "privacy list for a chat user" is.

Re: gnupg binaries too big? / OpenBSD Moving Towards Signed Packages — Based On D. J. Bernstein Crypto

2014-01-20 Thread Daniel Kahn Gillmor
On 01/19/2014 08:46 AM, Mark Schneider wrote: > Is there any possibility to create a minimal version of gnupg? gnupg already can produce gpgv, which (on debian at least) is 356KiB, though it also dynamically links to libresolv and libz and libbz2 and libc. I'm sure you could reduce that further

Re: time delay unlock private key.

2014-01-23 Thread Daniel Kahn Gillmor
On 01/23/2014 09:34 AM, Uwe Brauer wrote: > Hello > > A Long time ago, IBM's proprietary OS, called CMS had a particular > feature for the login: > > It gave you three attempts to login in. If you failed there was a time > delay of 20 min, if you failed again, the time delay was prolonged to > o

Re: Non email addresses in UID

2014-01-24 Thread Daniel Kahn Gillmor
On 01/23/2014 05:50 PM, Steve Jones wrote: > I've been thinking about UIDs in keys, rfc4880 section 5.1 says that by > convention a UID is an rfc2822 email address but this is not a > requirement[1]. Gnupg does enforce that restriction unless you explicitly > disable it. It would seem to make se

Re: Non email addresses in UID

2014-01-24 Thread Daniel Kahn Gillmor
On 01/24/2014 12:48 PM, Steve Jones wrote: > On Fri, 24 Jan 2014 12:15:40 -0500 Daniel Kahn Gillmor > wrote: > >> http://web.monkeysphere.info/ > > This looks pretty cool, and does cover some of the things I've been > thinking about. I've been wondering

Re: RFC3156: "application/pgp-keys" support enigmail, gnus etc

2014-01-27 Thread Daniel Kahn Gillmor
Hi Uwe-- On 01/27/2014 04:51 AM, Uwe Brauer wrote: > Hi according to > http://tools.ietf.org/html/rfc3156 > > > A pgpmime signed message contains lines such as > > Content-Type: multipart/signed; boundary="=-=-="; > micalg=pgp-sha1; protocol="application/pgp-signature" > > While an atta

Re: Setting up shared access to gpg on a UNIX server

2014-01-29 Thread Daniel Kahn Gillmor
On 01/30/2014 01:59 AM, NdK wrote: > Il 30/01/2014 02:14, DUELL, BOB ha scritto: > >> I will appreciate any and all comments. If there is a "better way" to do >> this, I'd love to learn. > Every user in the group could "leak" the secret key. At least put it > into a smartcard/token connected to

Re: making the X.509 infrastructure available for OpenPGP

2014-02-04 Thread Daniel Kahn Gillmor
On 02/04/2014 09:01 AM, Mark H. Wood wrote: > Having said that, you might look at how OpenSSH has included X.509 > certificates in its operation. There is precedent for something like > what you suggest. fwiw, the answer here is "they haven't". Roumen Petrov's X.509 patches remain outside of Ope

Re: making the X.509 infrastructure available for OpenPGP

2014-02-04 Thread Daniel Kahn Gillmor
On 02/03/2014 10:55 PM, Hauke Laging wrote: > This idea came to my mind while I was wondering why several CAs offer > free (but rather useless...) certificates for X.509 but not for OpenPGP. > Whatever they do with X.509 can be done with OpenPGP, too (e.g. setting > an expiration date for the si

Re: making the X.509 infrastructure available for OpenPGP

2014-02-04 Thread Daniel Kahn Gillmor
On 02/04/2014 12:36 PM, Hauke Laging wrote: >> I don't know of a formalized way to do the other mapping, but it seems >> like it would be pretty straightforward to embed the full X.509 >> certificate in a notation packet > > Why wouldn't the fingerprint and the DN not be enough? The whole > appro

Re: making the X.509 infrastructure available for OpenPGP

2014-02-05 Thread Daniel Kahn Gillmor
On 02/05/2014 01:04 PM, Peter Lebbing wrote: > So you could create a hybrid model: > > I assign trust to a specific CA. That CA has issued a certificate with DN > "XYZ". > In my public OpenPGP keyring, there exists a key with a UID "XYZ", and that > public key has the same raw key material as the

Re: making the X.509 infrastructure available for OpenPGP

2014-02-05 Thread Daniel Kahn Gillmor
On 02/05/2014 03:06 PM, Werner Koch wrote: > Almost all X.509 certification in public use certify only one of two > things: > > - Someone has pushed a few bucks over to the CA. > > - Someone has convinced the CA to directly or indirectly issue a >certificate. To further clarify: "Domain V

Re: Error "Need the secret key to do this" Encountered During adduid command in UNIX

2014-02-10 Thread Daniel Kahn Gillmor
On 02/10/2014 08:44 AM, Jim Ernst wrote: > After looking at it further, I did wonder whether or not it was a result of > exporting the file off of one UNIX machine and importing it onto another > (again, using just --export). Would you know if movement like that between > machines should create

Re: Trying to understand the bond between master and subordinal key pairs

2014-02-12 Thread Daniel Kahn Gillmor
On 02/12/2014 06:40 AM, Michael Anders wrote: > I am still puzzled, however. Can anyone explain the logical reason as to > why we need this jungle in OpenPGP, which thankworthily is usually more > or less hidden from the user anyways? > A good reason would help the complicated workings to stick w

Re: Safe curves in gnupg?

2014-02-17 Thread Daniel Kahn Gillmor
On 02/17/2014 07:17 PM, Nat Tuck wrote: > Does anyone know the status on the inclusion of secure ECC in gnupg? It is perhaps open for discussion whether djb's criteria for "safecurves" can be defined as "secure ECC", but you can find recent discussion about the use of edwards curves (EdDSA) in Ope

Re: key generation: paranoia mode - explicit random input

2014-02-25 Thread Daniel Kahn Gillmor
On 02/26/2014 12:08 AM, Hauke Laging wrote: > I suggest to add a new key generation mode. The only difference would be > that the random input is not read from /dev/random any more (and that > random_seed would not be used or newly initialized) but from an explicit > source: --random-source /pat

Re: key generation: paranoia mode - explicit random input

2014-03-02 Thread Daniel Kahn Gillmor
On 02/28/2014 02:58 PM, Hauke Laging wrote: > a) Maybe I was not clear enough about that but I do not suggest this as > a "Set the flag once (and do the other stuff) and after that you are > safe forever" feature. This feature would have to be used for every > encryption, too. (I guess it would

Re: Multiple Subkey Pairs

2014-03-13 Thread Daniel Kahn Gillmor
Hi Martin-- On 03/13/2014 06:44 AM, Martin Behrendt wrote: > I want to achieve the following: > 1. A Master signing key > 2. A subkey signing/enc pair for my normal machine > 3. A subkey signing/enc pair for e.g. my mobile device > Now the following problem arises (at least from the reading I hav

Re: Multiple Subkey Pairs

2014-03-13 Thread Daniel Kahn Gillmor
On 03/13/2014 12:30 PM, Martin Behrendt wrote: > Am 13.03.2014 16:42, schrieb ved...@nym.hush.com: >> = You can let all your correspondents know that they can >> encrypt simultaneously to all 3 of your keys that have the same >> e-mail address (assuming that you give them the fingerprints and >

Re: Multiple Subkey Pairs

2014-03-13 Thread Daniel Kahn Gillmor
On 03/13/2014 06:17 PM, MFPA wrote: > On Thursday 13 March 2014 at 2:31:06 PM, in > , Hauke Laging wrote: > >> gpg --recipient 0xD4BC64B8\! > > I've never see it with a backslash before the exclamation mark. > What does the backslash add? it tells your shell to avoid interpreting the ! as a shel

Re: Can't check signature, DSA key 9C973C92 requires a 256 bit or larger hash

2014-03-17 Thread Daniel Kahn Gillmor
On 03/15/2014 03:53 PM, Juha Heljoranta wrote: > I am not able to get the gpg to verify a signature. > > Any advice how to fix this? > Or could the key 9C973C92 be invalid/broken? > > > $ mkdir -m 700 newgnupg > $ echo foo > zinc-0.2.0.jar > $ wget > http://repo1.maven.org/maven2/com/typesafe/

Re: Trouble importing secret subkeys

2014-03-25 Thread Daniel Kahn Gillmor
On 03/25/2014 07:38 AM, Mikael Nordfeldth wrote: > The problem I experience is when importing back the 'pubkeys' and > 'subkeys' files (see Debian guide): Hm, i just ran through the instructions at https://wiki.debian.org/Subkeys with a dummy/test user, and they seemed to work for me. so somethin

Re: Trouble importing secret subkeys

2014-03-25 Thread Daniel Kahn Gillmor
On 03/25/2014 10:27 AM, Mikael "MMN-o" Nordfeldth wrote: > Also: One thing I noticed is that my output from 'gpg -K' for the master > keyring (which I'm exporting from) only has one UID (the JPEG photo), > but not the primary UID 'Mikael "MMN-o" Nordfeldth ' > which is listed when using the '--edi

Re: GnuPG encryption with key file

2014-03-27 Thread Daniel Kahn Gillmor
On Wed 2014-03-26 17:37:05 -0400, -- -- wrote: > is it possible to encrypt a file with a symmetric cipher (e.g., AES256) > using a key file (e.g., a binary file) instead of a password? Yes, but you will need to translate the binary file into a long ascii string first (which means the exact

Re: GnuPG encryption with key file

2014-03-28 Thread Daniel Kahn Gillmor
On 03/28/2014 07:48 AM, Peter Lebbing wrote: > And the hack presented doesn't allow for > the common scenario: a key file *as well as* a password. sorry, i think my assumption of the common scenario was very different from yours, or i wouldn't have recommended the conversion i did. i'd assumed t

Re: Encrypted file-size approximation with multiple recipients

2014-04-06 Thread Daniel Kahn Gillmor
On 04/02/2014 01:07 PM, Tim Chase wrote: > 1) I'd missed that GPG conveniently compresses the data before > encrypting which would explain some of the differences I saw. [...] > in more than half of my use cases (small plain-text/JSON messages) It sounds to me like you might be setting up some

Re: Using an RSA GnuPG key for RSA ?

2014-04-06 Thread Daniel Kahn Gillmor
On 04/02/2014 01:55 PM, ved...@nym.hush.com wrote: > Is it possible to generate an RSA key in GnuPG, and then use it (not in > GnuPG, but in other systems using RSA keys), to encrypt and decrypt RSA > messages? i think you might be interested in openpgp2pem from the monkeysphere package. > If s

Re: Use GnuPG in an automated environment?

2014-04-07 Thread Daniel Kahn Gillmor
On 04/08/2014 12:45 AM, Peter Michaux wrote: > I am creating a Debian APT repository of system packages. I need to > sign the repository's Release file, creating detached signature file > Release.gpg, so that packages can be installed on another Debian > system with `apt-get install` without the c

Re: Use GnuPG in an automated environment?

2014-04-08 Thread Daniel Kahn Gillmor
On 04/08/2014 02:16 AM, Peter Michaux wrote: > I'm concerned about the inability of reprepro to include in a single > distribution two files which are only different versions of the same > package. https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570623 sorry for the off-topic aside, i'm glad to

Re: Heartbleed attack on Openssl

2014-04-09 Thread Daniel Kahn Gillmor
On 04/09/2014 07:20 PM, Robert J. Hansen wrote: > No, it does not. Nor does Chrome. Chromium (from which chrome is based) actually embeds a copy of openssl, but doesn't use it for its TLS implementation, which is where the bug would be triggered. (i'm not sure why they do this embedding actuall

Re: UI terminology for calculated validities

2014-04-22 Thread Daniel Kahn Gillmor
On 04/22/2014 05:40 PM, Peter Lebbing wrote: > On 22/04/14 13:56, Hauke Laging wrote: >> This can easily be seen from the facts that (a) the same owner can have >> several keys and (b) there are scenarios in which you will not assign the >> same trust to these keys. > > Oh wow. I understand you ca

Re: UI terminology for calculated validities

2014-04-22 Thread Daniel Kahn Gillmor
On 04/22/2014 03:57 PM, Peter Lebbing wrote: > Perhaps the novice interface should just stick to "validity" and do away with > the whole concept of ownertrust to keep things simple. Suggest that people > meet > up with someone and sign their key personally if they want validity. > > Also, I think

Re: UI terminology for calculated validities

2014-04-22 Thread Daniel Kahn Gillmor
On 04/22/2014 06:11 PM, Peter Lebbing wrote: > In your example, you do not trust the two keys differently[1]. However, due > to a > technicality, you can't assign both the same ownertrust, because they would > add > up. I don't think this is a fundamental thing that changes the concept of > owner

Re: UI terminology for calculated validities

2014-04-23 Thread Daniel Kahn Gillmor
On 04/23/2014 05:23 AM, Peter Lebbing wrote: > On 23/04/14 00:56, Robert J. Hansen wrote: >> I can see it, actually. > > Yes, after dkg's last message yesterday I also realised I had overlooked that > scenario. I think it can be generalised as "different roles", as even the > verification effort /

Re: best practice for pgp mail service, revoking keys

2014-04-24 Thread Daniel Kahn Gillmor
On 04/23/2014 06:13 PM, t...@piratemail.se wrote: > This is a tiny bit philosophical. Perhaps a little off-topic. I think this is > probably the best list to ask never-the-less. > > So I've been working on this pgp base web based mail service. > https://github.com/timprepscius/mv > > Here is th

Re: UI terminology for calculated validities

2014-04-25 Thread Daniel Kahn Gillmor
On 04/25/2014 12:38 AM, Hauke Laging wrote: > Am Mi 23.04.2014, 20:32:27 schrieb MFPA: > >> Say a user has two keys, 0x0123456789abcdef and 0xfedcba9876543210. I >> propose each key could sign the other with a signature notation >> something like:- >> siblings-0x0123456789abcdef-0xfedcba9876543...

Re: UI terminology for calculated validities

2014-04-25 Thread Daniel Kahn Gillmor
On 04/24/2014 10:49 PM, Hauke Laging wrote: > a) Many keys are certified without being verified. This is IMHO not so > much a problem if this is transparent. Think of --ask-cert-level. BTW: I > really don't like the --min-cert-level default to be 2 because this > forces the users to either igno

Re: UI terminology for calculated validities

2014-04-25 Thread Daniel Kahn Gillmor
On 04/25/2014 09:23 AM, Mark H. Wood wrote: > What about abandoning terms of art and just saying things more simply: > "This message was signed by key . You have indicated that you > trust that key." trust that key to do what? to belong to some mystery person? to make valid OpenPGP sign

Re: UI terminology for calculated validities

2014-04-25 Thread Daniel Kahn Gillmor
On 04/22/2014 06:50 PM, Nicolai Josuttis wrote: > me: you either can sign the key > or trust somebody else who signed the key > (such as pg...@ct.heise.de) > he: Oh, I even registered my email/key there >but what else is missing? > me: load the key for pg...@ct.heise.de > he

Re: UI terminology for calculated validities

2014-04-25 Thread Daniel Kahn Gillmor
On 04/24/2014 06:19 PM, Gabriel Niebler wrote: > """ > A key on my keyring is "valid" if it is not expired or revoked. > It is "authentic" if it bears one signature from one of my keys, or > several signatures from other keys to which I have granted marginal > authority to authenticate keys. > """

Re: Managing Subkeys for Professional and Personal UIDs

2014-04-28 Thread Daniel Kahn Gillmor
On 04/26/2014 06:21 PM, John Sockwell wrote: > I’m looking for best practices in creating and managing multiple subkeys and > uids. > > In my scenario, I have a personal computer and personal email address. In > addition, I have an employer provided computer and employer email address. > > I’d

Re: Get expiration date by searching on keyservers

2014-04-30 Thread Daniel Kahn Gillmor
On 04/29/2014 06:40 PM, Koen wrote: > I use '--keyserver --search-keys to get info on a number of > keys. As far as I can tell, that doesn't return an expiration date (if > that exists). > > Are there other ways to easily check on the exp. date, besides importing > the key and then verifying th

Re: Access to www.gnupg.org only via TLS

2014-04-30 Thread Daniel Kahn Gillmor
On 04/30/2014 03:40 PM, Faramir wrote: > It is like providing free airplane tickets, and then charging for the > parachute. I like this analogy, but it only covers one part of the CA's relationships -- the relationship with the subscriber. But the CA also has other relationships, including its re

Re: UI terminology for calculated validities

2014-05-01 Thread Daniel Kahn Gillmor
On 04/26/2014 08:20 AM, MFPA wrote: > On Friday 25 April 2014 at 5:47:46 PM, in > , Daniel Kahn Gillmor wrote: > >> PS MFPA's original idea of using a notation to link two >> primary keys is interesting, and i see how it could be >> useful, but i don't think i

Re: UI terminology for calculated validities

2014-05-01 Thread Daniel Kahn Gillmor
On 04/26/2014 06:01 PM, Gabriel Niebler wrote: > GnuPG will also allow me to encrypt some text to (an encryption subkey > of) such a mixed-case certificate (I think), because it cannot > possibly know the intended recipient, so checking > validity/authenticity/... of that specific UserID is up to m

Re: UI terminology for calculated validities

2014-05-01 Thread Daniel Kahn Gillmor
On 05/01/2014 10:02 PM, Hauke Laging wrote: > Let's not try to protect the users against themselves even in non- > technical contexts. Your opinion about leaking social information is not > better that that of somebody who likes to leak it. The result should not > be you making that impossible fo

Re: Managing Subkeys for Professional and Personal UIDs

2014-05-02 Thread Daniel Kahn Gillmor
On 05/02/2014 06:03 PM, Faramir wrote: > El 28-04-2014 14:35, Daniel Kahn Gillmor escribió: > ... >> But I also want to point out that some employers may have a >> legitimate need (even a legal compulsion) to be able to decrypt >> communications coming to your work-related

Re: Signature without policy meaningless? (was Re: UI terminology for calculated validities)

2014-05-02 Thread Daniel Kahn Gillmor
On 05/02/2014 01:21 PM, Peter Lebbing wrote: > As a public statement; now we're going into trust signature territory, which > is > not really a common deployment in the WoT. But I guess you could simply make a > normal signature instead of a trust signature. True, you do not make a public > statem

Re: Managing Subkeys for Professional and Personal UIDs

2014-05-02 Thread Daniel Kahn Gillmor
texts. > > Imagine this: you're a purchasing agent at Yoyodyne. You've established > WoT connections with all your providers using a certificate whose only > UID is: > > "Daniel Kahn Gillmor (sales orders only) " > > Now you go out on vacation for th

Re: UI terminology for calculated validities

2014-05-04 Thread Daniel Kahn Gillmor
On 05/03/2014 02:56 PM, William Hay wrote: > Once you start doing things publicly one would need to pick a > certification level in order to inter-operate with the existing WoT. > It isn't clear to me that there is a good default. There is a good default for certifying someone else's key. the defa

typo on http://gpg4win.org/download.html

2014-05-05 Thread Daniel Kahn Gillmor
hi gnupg folks-- https://gpg4win.org/download.html says: Please note: Does not use portable applications - especially crypto applications - on potentially infected systems. I think you want to change "Does" to "Do" to turn the note into an imperative: Please note: Do not use portable a

Re: Best practices for securely creating master RSA key

2014-05-10 Thread Daniel Kahn Gillmor
Hi Tomer-- On 05/10/2014 05:23 AM, Tomer Altman wrote: > 1. Find a computer that you think is relatively free of malware > 2. Download a Live Linux distro CD/DVD/USB, and verify its signatures to make > sure you are not installing a tainted version > 3. Launch the verified Linux distro. > 4. Use

Re: Best practices for securely creating master RSA key

2014-05-12 Thread Daniel Kahn Gillmor
On 05/12/2014 03:35 AM, Tomer Altman wrote: > You recommend creating a revocation certificate against the private key, but > the GPG documentation seems to recommend creating the revocation certificate > against the public (sub-)key: > > https://www.gnupg.org/gph/en/manual.html#REVOCATION > >

Re: How are primary key binding signatures (0x19) handled by gpg?

2014-05-22 Thread Daniel Kahn Gillmor
On 05/22/2014 01:04 PM, martijn.list wrote: > The sub key of the following key (key ID 0549B8A5640444E6) is valid for > signing (RSA Encrypt or Sign) but it does not contain a primary key > binding signature: > > http://pgp.mit.edu/pks/lookup?search=0x0549B8A5640444E6&op=index The subkey here (0

Re: Why create offline main key without encryption capabilities

2014-06-02 Thread Daniel Kahn Gillmor
On 06/02/2014 11:30 AM, Suspekt wrote: > Am 02.06.2014 17:01, schrieb David Shaw: >> One problem with multiple encryption subkeys is that the person >> encrypting to you doesn't know which one to use. As things stand in >> OpenPGP clients today, unless the person encrypting explicitly >> specifies

Re: Engimail & Thunderbird

2014-06-04 Thread Daniel Kahn Gillmor
On 06/04/2014 12:53 PM, Michael B. Harris wrote: > I have not been able to use OpenPGP since I upgraded to > Ubuntu 14.04 on my 64 bit Laptop. > > Can anyone help? If you can state the problems you're seeing more specifically, we can probably help better. Can you describe your system in more det

Re: New user needs some help

2014-06-05 Thread Daniel Kahn Gillmor
We've had this same discussion recently, i think on this very list. please also review the archives. On 06/05/2014 05:44 AM, Suspekt wrote: > Am 05.06.2014 09:26, schrieb Cpp: >> cert-digest-algo SHA512 > This will you incompatibility with many (I think all) versions of PGP. > Maybe its not releva

Re: New user needs some help

2014-06-06 Thread Daniel Kahn Gillmor
On 06/06/2014 04:19 AM, Cpp wrote me privately (but later OKed publication): > On 6/5/14, Daniel Kahn Gillmor wrote: >> there is a link to an explanation about it. you can read the rationale >> for it here: >> >> http://thread.gmane.org/gmane.mail.notmuch.general/372

Re: New user needs some help

2014-06-06 Thread Daniel Kahn Gillmor
On 06/06/2014 12:46 PM, Cpp wrote: > Alright, thanks for elaborating it. Does this mean that the notation > (the "sig-notation issuer-...@notations.openpgp.fifthhorseman.net=%g" > line) is final, and is not going to change in the future? I don't know if anyone is going to introduce another extensi

Re: [Enigmail] 15 June nightly build

2014-06-17 Thread Daniel Kahn Gillmor
Hi Philip-- over on enigmail-users, On 06/16/2014 09:58 AM, Philip Jackson wrote: > me@me-desktop:~$ gpg --sign test-message > > You need a passphrase to unlock the secret key for > user: "Philip Jackson " > 2048-bit RSA key, ID 23543A63, created 2013-01-22 > (here I entered the passphrase) > gpg

Re: Order of keys attempted to decrypt

2014-06-18 Thread Daniel Kahn Gillmor
On 06/18/2014 04:46 AM, Richard Ulrich wrote: > $ gpg -d test.txt.gpg > gpg: Anonymer Empfänger; Versuch mit geheimem Schlüssel 0AE275A9 … > gpg: sending command `SCD PKDECRYPT' to agent failed: ec=6.91 > gpg: Anonymer Empfänger; Versuch mit geheimem Schlüssel 8760DB3E … > gpg: Alles klar, wir sin

Re: Order of keys attempted to decrypt

2014-06-18 Thread Daniel Kahn Gillmor
On 06/18/2014 09:43 AM, Daniel Kahn Gillmor wrote: > On 06/18/2014 04:46 AM, Richard Ulrich wrote: >> $ gpg -d test.txt.gpg >> gpg: Anonymer Empfänger; Versuch mit geheimem Schlüssel 0AE275A9 … >> gpg: sending command `SCD PKDECRYPT' to agent failed: ec=6.91 >>

Re: show-uid-validity default to yes

2014-06-24 Thread Daniel Kahn Gillmor
On 06/24/2014 03:55 AM, Werner Koch wrote: > On Fri, 13 Dec 2013 23:51, d...@fifthhorseman.net said: > >> securely. Exposing the UID validity is a step toward making the trust >> model calculations more visible to users, which is necessary for >> understanding. > > 2.0.24 will use > >--list

Re: riseup.net OpenPGP Best Practices article

2014-06-26 Thread Daniel Kahn Gillmor
On 06/25/2014 02:25 AM, Werner Koch wrote: > This misunderstanding is actually an indication of the problem. You are > talking 4096 vs. 2048 while the more important case is to read the > security announcements and update your gpg. That's a great point. I've just proposed a pull request on that

Re: riseup.net OpenPGP Best Practices article

2014-06-26 Thread Daniel Kahn Gillmor
On 06/26/2014 10:26 AM, Robert J. Hansen wrote: > So in a very real sense, anything past RSA-2048 is at best a "you > *might* get some additional security, depending on what symmetric > algorithm your correspondent uses. Oh, and you can't forbid your > correspondent from using 3DES, either." Of c

On the advisability of stronger digests than SHA-1 in OpenPGP certifications [was: Re: riseup.net OpenPGP Best Practices article]

2014-06-26 Thread Daniel Kahn Gillmor
On 06/24/2014 07:28 AM, Gabriel Niebler wrote: > I consider myself quite the amateur (I haven't even read most of RFC > 4880 yet), but I do take issue with one point in the riseup.net Best > Practices page, namely the bit where it says "self-signatures must not > use SHA1". > I find that statement

Re: On the advisability of stronger digests than SHA-1 in OpenPGP certifications [was: Re: riseup.net OpenPGP Best Practices article]

2014-06-26 Thread Daniel Kahn Gillmor
On 06/26/2014 05:45 PM, Robert J. Hansen wrote: > On 6/26/2014 2:25 PM, Daniel Kahn Gillmor wrote: >> If you know of a modern OpenPGP implementation that supports SHA-1 but >> not SHA-256 or SHA-512, please point it out (and no, creating one just >> to be able to point t

Re: riseup.net OpenPGP Best Practices article

2014-07-03 Thread Daniel Kahn Gillmor
On 06/28/2014 12:09 AM, Robert J. Hansen wrote: > When faced with that, it's only a matter of time until Alice decides to > put 3DES first in her own preference list. And then all her > communications to Bob have 112 bits of keyspace, not the 256 Bob > demands. I think you're talking about person

<    1   2   3   4   5   6   7   8   9   10   >