From stephane@sente.ch Fri Feb 1 17:56:02 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Fri Feb 1 17:56:02 2002 Subject: GPGME bug Message-ID: Hi, I've been playing a little bit again with gpgme, and discovered the following problem: When enumerating keys: the "secret" attribute is retrieved only if we enumerate secret keys! If we enumerate all keys, the attribute "secret" is always set to 0. I also discovered a strange thing with gpg (1.0.6): My PGP key has 2 uids; if I display them with gpg --list-secret-keys or --list-keys, main uid is not the same (swapped). About secret keys again: can a subkey be secret without the main key being secret? Consequence for gpgme is that if I retrieve only secret keys, the main uid of my PGP Key is not the same as if I retrieve all keys. I'm suspecting two other problems (I need to check again): gpgme_op_decrypt(): doesn't return an error if no valid passphrase is given gpgme_op_encrypt(): doesn't return an error if no recipient is trusted, but encrypts nothing Thanks for having written all the doc! It's been very helpful, and I could finally document a little bit the ObjC wrapper :-) Stephane From test@test.com Tue Feb 5 07:49:01 2002 From: test@test.com (test) Date: Tue Feb 5 07:49:01 2002 Subject: (no subject) Message-ID: <3c5f7fc13ca1df8a@relay2.kornet.net> (added by relay2.kornet.net)
¾È³çÇϽʴϱî?
"¿ìÀÏ»ê¾÷"ÀÔ´Ï´Ù
¸ÕÀú Çã¶ô¾øÀÌ À̱ÛÀ» ¶ç¿ö Á˼ÛÇÕ´Ï´Ù.
 
´Ù¸§ÀÌ ¾Æ´Ï¶ó ±¹³»¿¡¼­ ¼ø¼öÇÏ°Ô °³¹ßµÈ "¿ëÁ¢´ëü½ÅÁ¦Ç°'
±Ý¼Ó*ÄÜÅ©¸®Æ® Ãʰ­·Â º¸¼öÁ¢ÂøÁ¦ ¹× ³»±¸¼ºÀ̰­ÇѠƯ¼ö ¹æ½Ä ¹æ¼öÁ¦µî
½Å±â¼ú 9Á¾·ù¸¦ ¼Ò°³ÇϰíÀÚ ÇÕ´Ï´Ù.
Ư¡Àº  1.  ³²³à³ë¼Ò ´©±¸³ª ¼Õ½±°Ô »ç¿ëÇÒ ¼ö  Àִٴ°Ͱú
              2.  °¡Á¤Àº ¹°·ÐÀÌ°í °ÇÃ༳ºñ, ÁÖÅú¸¼ö, ¼±¹Úµî ´Ù¾çÇÏ°Ô »ç¿ëµÇ¸ç
              3.  ¾ÆÁÖ Àú·ÅÇÑ °¡°ÝÀ¸·Î ÆÇ¸ÅµÇ¾î  °ø»ç¹× ÀÛ¾÷º¸¼öºñ°¡
                   ¸Å¿ì ÀûÀº ºñ¿ëÀ¸·Î ÇØ°áµË´Ï´Ù... 
 
±ººÎ´ë·Î¸¸ ³³Ç°ÇÏ´ø°ÍÀ»  °ø°ø±â°üÀ̳ª,°ÇÃ༳ºñ,¼±¹Ú,
°ø°øÁÖÅÃÇÏÀÚº¸¼ö¾÷üµî ´Ù¿ëµµ·Î ³³Ç°ÀÌ µÇ°í ÀÖÀ¸¸ç,
ÀÌÁ¦´Â ¼ÒºñÀÚµé °³°³Àο¡°Ô±îÁö º¸±ÞÇϰíÀÚ ±ÛÀ» ¿Ã¸³´Ï´Ù. 
 
±×³É Áö³ªÃÄ ¹ö¸®Áö ¸¶½Ã°í Àá±ñÀÇ ½Ã°£À» ³»¼Å¼­
ÀúÈñ ȨÆäÀÌÁöÀΠ ¢Ñ www.wooil21.com  ¿À½Ã¸é
´õ ÀÚ¼¼ÇÑ ¼³¸í°ú ´õ ÁÁÀº »óǰÀ» ¸¸³ª½Ç¼ö ÀÖÀ» °ÍÀÔ´Ï´Ù.

´õ ±Ã±ÝÇÑ »çÇ×ÀÌ ÀÖÀ¸½Ã¸é 02) 967-6704·Î ¿¬¶ô ÁÖ¼¼¿ä
°¨»çÇÕ´Ï´Ù.
From jgre@tzi.de Tue Feb 5 11:41:01 2002 From: jgre@tzi.de (Janico Greifenberg) Date: Tue Feb 5 11:41:01 2002 Subject: Questions about GPGME Message-ID: <20020205103806.GC664@tzi.de> Hi, I tried asking this before in the users mailing list but did ot receive an answer so I'm trying it here. My questions are: - Is it possible to change the keyrings used by GPGME and how does it work? - How can I extract more information about importing keys and verifying signatures? I need to know whose key I'm importing and who signed the text. Using GPG itself I can get this information with the --status-fd option but how can I get it with GPGME? Thanks in advance Janico -- Warning! Taking anyone (especially yourself) too serious will be harmful From s.aparna@digital.com Tue Feb 5 11:56:02 2002 From: s.aparna@digital.com (Aparna, S) Date: Tue Feb 5 11:56:02 2002 Subject: GnuPG on Tru64 versions Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Hi, I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any of the flavors of Compaq Tru64 Unix. Any pointers would be greatly helpful. Thanks, Aparna. From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 5 14:17:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 5 14:17:01 2002 Subject: Questions about GPGME In-Reply-To: <20020205103806.GC664@tzi.de> References: <20020205103806.GC664@tzi.de> Message-ID: <20020205131518.GC792@212.23.136.22> On Tue, Feb 05, 2002 at 11:38:06AM +0100, Janico Greifenberg wrote: > Hi, > I tried asking this before in the users mailing list but did ot receive an > answer so I'm trying it here. Mmmh. I think I am not following that list but should. I will subscribe. However, GPGME is still in its development stage, so this is the appropriate forum anyway. > My questions are: > - Is it possible to change the keyrings used by GPGME and how does it work? No, currently the default keyrings of the crypto backend are used. We will need some way to list keys in a seperate file for some other project, but this is probably not what you mean. The question is of course what style of interface we choose for such configuration options of the crypto backend. I will think about it. > - How can I extract more information about importing keys and verifying > signatures? I need to know whose key I'm importing and who signed the > text. Using GPG itself I can get this information with the --status-fd option > but how can I get it with GPGME? After importing a key, you can get back some information about it with gpgme_op_info, I am not sure if that includes everything you need, please come back with more details if you tried it and need more. For verify, there are two functions you can invoke after a successful verification, gpgme_get_sig_status and gpgme_get_sig_key. In the CVS repository of gpgme is a manual in doc/gpgme.texi that documents these functions. Also read the README how to build it, please. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From toni@eyets.com Tue Feb 5 18:46:01 2002 From: toni@eyets.com (toni) Date: Tue Feb 5 18:46:01 2002 Subject: Hi.... Message-ID: <3C601AED.5070709@eyets.com> Hi, I would like to develop gpg in c for linux... where can i find documentation about functions, or example code? Thanks From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:15:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:15:02 2002 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020114004404.GD2449@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> Message-ID: <20020206011258.GD657@212.23.136.22> On Mon, Jan 14, 2002 at 01:44:05AM +0100, Marcus Brinkmann wrote: > 1. The pending flag is never reset and not resettable. This has been fixed by making gpgme_wait reset the pending flag. > 2. The resulting error value of the operation is not calculable via the > public interface. It is retrieved through internal interfaces. This has been fixed by adding a STATUS argument to gpgme_wait. It is now close to the semantics of waitpid. I also fixed the code to support ctx being non-NULL. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:24:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:24:01 2002 Subject: upcoming GPGME snapshot (call for last minute API requests) Message-ID: <20020206012210.GF657@212.23.136.22> Hi, if there is something that bugs you in the GPGME API, now would be a good time to tell me, so it can probably be fixed before the upcoming release of a new snapshot (around next weekend). There are some smaller things (and additions for GpgSM) I will do myself, and you don't need to remind me of anything that is on the TODO list (or was reported on the list recently), but if you want to be sure that something goes in, it is better to repeat it than to assume I took notice and rejected it. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:32:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:32:01 2002 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020206011258.GD657@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> <20020206011258.GD657@212.23.136.22> Message-ID: <20020206012946.GG657@212.23.136.22> On Wed, Feb 06, 2002 at 02:12:58AM +0100, Marcus Brinkmann wrote: > This has been fixed by adding a STATUS argument to gpgme_wait. It is now > close to the semantics of waitpid. I also fixed the code to support ctx > being non-NULL. NULL. Not non-NULL. NULL. Sorry for the confusion. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna@digital.com Wed Feb 6 09:48:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Wed Feb 6 09:48:01 2002 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Hi, I'm trying to compile GnuPG on Tru64 platform. Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? Thanks, Aparna. From marcus.brinkmann@ruhr-uni-bochum.de Wed Feb 6 11:04:01 2002 From: marcus.brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 11:04:01 2002 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Message-ID: <20020206110218.GA451@finnegan> On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus From s.aparna@digital.com Wed Feb 6 12:32:02 2002 From: s.aparna@digital.com (Aparna, S) Date: Wed Feb 6 12:32:02 2002 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. Is GPGME 0.3.0 the latest version ? Thanks, Aparna. -----Original Message----- From: Marcus Brinkmann [mailto:marcus.brinkmann@ruhr-uni-bochum.de] Sent: Wednesday, February 06, 2002 4:32 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GnuPG and GPGME version compatibility On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From marcus.brinkmann@ruhr-uni-bochum.de Wed Feb 6 14:16:01 2002 From: marcus.brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 14:16:01 2002 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> Message-ID: <20020206141404.GE451@finnegan> On Wed, Feb 06, 2002 at 04:56:20PM +0530, Aparna, S wrote: > I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. > Is GPGME 0.3.0 the latest version ? Yes. I will take a look at the time stamps later. Marcus From wk@gnupg.org Wed Feb 6 14:38:02 2002 From: wk@gnupg.org (Werner Koch) Date: Wed Feb 6 14:38:02 2002 Subject: GPGME bug In-Reply-To: (Stephane Corthesy's message of "Fri, 1 Feb 2002 17:54:12 +0100") References: Message-ID: <87pu3in39c.fsf@alberti.gnupg.de> On Fri, 1 Feb 2002 17:54:12 +0100, Stephane Corthesy said: > When enumerating keys: the "secret" attribute is retrieved only if > we enumerate secret keys! If we enumerate all keys, the attribute > "secret" is always set to 0. Correct. This _might_ change in future but you should not rely on this. If you want a listing of the secret keys you should list the secret keys (e.g. for deciding which key to use for signing). For most tasks you don't need the secret key. > I also discovered a strange thing with gpg (1.0.6): > My PGP key has 2 uids; if I display them with gpg --list-secret-keys > or --list-keys, main uid is not the same (swapped). The UIDs listed with --list-secret-keys are just for convenience. It needs a lot of code to keep them in sync with the ones on the public keyring. So the latest snapshots don't care anymore about packets on the secret keyring and instead do some merging with the public key information. > About secret keys again: can a subkey be secret without the main key > being secret? You should get away from the need to know wether a key is secret or not. The only relevant information is whether a key is capable of signing or decrypting. A secret is a secret is a secret :-) Eventually all secret key[*] handling will be done by gpg-agent and there will be no way for an application (except for special tools) to cope with a secret key. > I'm suspecting two other problems (I need to check again): > gpgme_op_decrypt(): doesn't return an error if no valid passphrase > is given > gpgme_op_encrypt(): doesn't return an error if no recipient is > trusted, but encrypts nothing Be prepared to get some errors after this has been fixed. > Thanks for having written all the doc! It's been very helpful, and I > could finally document a little bit the ObjC wrapper :-) That belongs to Marcus of course. Werner [*] When I talk about a secret key I usually mean the private keys of a public keypair. For conventional encryption a passphrase callback is still needed to automate some applications. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From bwpearre@alumni.princeton.edu Wed Feb 6 19:13:02 2002 From: bwpearre@alumni.princeton.edu (Ben Pearre) Date: Wed Feb 6 19:13:02 2002 Subject: Anderson's attack? Message-ID: <20020206131032.D21208@diverge.seunglab.mit.edu> --FFoLq8A0u+X9iRU8 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I'm sorry if this is in the archives - I looked but didn't find it. This seems like a legitimate concern: http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html Has this been addressed in GnuPG? The documentation doesn't mention whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or what. What's really going on in there? Should there be an option --both, which does sign/encrypt/sign or some such? I believe that the first time I installed PGP, there was an option in my MUA to encrypt the relevant headers, but I don't think that this is a problem that should be foisted upon the MUA developers, as no-one seems to know about this issue. Thoughts? Cheers! -Ben --=20 bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben --FFoLq8A0u+X9iRU8 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8YXGY+CWfKs/abNoRAkKrAKCwMJ4q5lMksE7vYtfR0Pg3LyUJzACg4iOu 4BqwborCXiG76d8LNV1YMVI= =ZQG1 -----END PGP SIGNATURE----- --FFoLq8A0u+X9iRU8-- From jgre@tzi.de Wed Feb 6 21:43:02 2002 From: jgre@tzi.de (Janico Greifenberg) Date: Wed Feb 6 21:43:02 2002 Subject: Questions about GPGME In-Reply-To: <20020205131518.GC792@212.23.136.22> References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> Message-ID: <20020206204004.GA5312@tzi.de> > No, currently the default keyrings of the crypto backend are used. We will > need some way to list keys in a seperate file for some other project, but > this is probably not what you mean. The question is of course what style > of interface we choose for such configuration options of the crypto backend. > I will think about it. What I would like is are functions like gpgme_set_pubkeyring(char *file); gpgme_set_seckeyring(char *file); gpgme_set_no_default_keyring(int ); or something like that simple setting the gpg options accordingly. > After importing a key, you can get back some information about it with > gpgme_op_info, I am not sure if that includes everything you need, please > come back with more details if you tried it and need more. I think that will work for me. > For verify, there are two functions you can invoke after a successful > verification, gpgme_get_sig_status and gpgme_get_sig_key. This sound good, I just can't get the verify (or decrypt_verify) working. I'm using the folling code: void Crypto::Test(char *msg) { size_t nread; int ret,cnt=0; char *buf_ptr; char str_out[MAX_DATA]; GpgmeSigStat stat; GpgmeData in, out, out2; err = gpgme_data_new_from_mem(&in,msg,strlen(msg),0); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_new ( &out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); if (err) throw CoreError(gpgme_strerror(err)); fflush (NULL); err = gpgme_data_rewind ( out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); if(err) throw CoreError(gpgme_strerror(err)); gpgme_data_release (in); gpgme_data_release (out); cout<; from bwpearre@mit.edu on Wed, Feb 06, 2002 at 01:10:32PM -0500 References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <20020206225706.O25763@mbsks.franken.de> Mahlzeit On Wed, Feb 06, 2002 at 01:10:32PM -0500, Ben Pearre wrote: > Has this been addressed in GnuPG? I don't think this is the correct location to fix this. GnuPG does sign the message. That's it. To understand this, you can look how it is done in the paper world, where the same attack is possible. The way to prevent it here is not to encode the recepient of a letter in your own signature, but to write it onto the letter. So the correct play to fix this would be IMO e.g. the MUA (mutt, etc.). This can include some header lines before signing. Or if you write a contract with some editor, you write the parties yourself into it. Mahlzeit endergone Zwiebeltuete From harmil@spamcop.net Wed Feb 6 23:47:02 2002 From: harmil@spamcop.net (Aaron Sherman) Date: Wed Feb 6 23:47:02 2002 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <1013035679.9324.239.camel@pps> On Wed, 2002-02-06 at 13:10, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? Doh! This is a classic example of a social problem being attacked on a technical level (which is pretty much doomed to failure). The idea is that T[1]=E(B[pub],S(A[priv],P)) can be transformed into T[2]=E(C[pub],D(B[priv],T[1])) and the encryption envelope will tell you nothing to refute the assertion that A told C P. To which we all respond... duh. The document goes on to possit that where P is some permutation on "sender owes recipient US$X", recipient is ambiguous and all values of T[2,...] yeild an unexpected result for A (i.e. owing money to everyone on the planet). When I'm home, I'll look up and cite the page in AC where this is gone into in some depth, but the core of the argument here is that there is something wrong with this scenario, and that the encryption envelope should be responsible for protecting the innocent but stupid. If you feel this way, feel free to write a mail-encrypting system that duplicates the message headers and includes them in the signed plaintext. That will provide no assurance that you did NOT divulge information of course, but no cryptosystem alone can ever do that (mathematically speaking nothing can ever do that, but for some specialized applications, a reasonable subset can be achived). Ok, back to the topic: this is not gnupg's problem. It should not be gnupg's problem. This is the plaintext's author's problem, as it should be. As for the argument that someone could be fired for leaking company secrets or end up owing people money because of ambiguous statements I say foey. Turn that upside down, and I can buy it: the recipient cannot prove that they were the intended target of the message without some external data source (subpeonaed mailer logs, etc) and thus cannot rely on using the signed message as evidence of a contract or disclosure unless it is internally unambiguous. Yes, this is true. It means that recipients must require that the body of a signed message must be internally unambiguous or only rely on external information which is unambiguous (e.g. "USPS PKI ID xxxx owes USPS PKI ID yyyy the balance of PayPal account zzzz"; if you trust the USPS PKI and PayPal to maintain an unambiguos resolution of these values, then this message is fine....). Ok, I'm done ranting. I'll be in my corner ;-) From rabbi@quickie.net Thu Feb 7 00:52:02 2002 From: rabbi@quickie.net (Len Sassaman) Date: Thu Feb 7 00:52:02 2002 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: This was addressed pretty thoroughly on the Cryptography list when Davis's paper first came out. Basically, the "flaws" the paper is discussing are social, not technical. The steps that can be taken on a technical level to prevent this are few. (FWIW, OpenPGP's timestamping helps this a bit.) As for your Encrypt/Sign question, I think you are asking the order in which that occurs? The signature is inside the encryption envelope. This is the proper way to do it, for privacy/traffic analysis purposes. On Wed, 6 Feb 2002, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? > > Should there be an option --both, which does sign/encrypt/sign or some > such? I believe that the first time I installed PGP, there was an > option in my MUA to encrypt the relevant headers, but I don't think > that this is a problem that should be foisted upon the MUA developers, > as no-one seems to know about this issue. > > Thoughts? > > Cheers! > -Ben > > -- > bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben > --Len. From s.aparna@digital.com Thu Feb 7 05:44:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 05:44:01 2002 Subject: Compilation error while building GnuPG Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B6@diexch01.xko.dec.com> Hi, I trying to build GnuPG on Tru64 V5.1. I'm getting the following compilation error while building the tools sources; Make: Don't know how to make -liconv. Stop. I'm curious to know if anyone has faced this problem. Thanks for any help, Aparna. From s.aparna@digital.com Thu Feb 7 13:16:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 13:16:01 2002 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Hi, I used the 'configure' command while building GPGME. I got the following warning message; checking for gpgsm... no configure: WARNING: Could not find GpgSM, install GpgSM or use --with-gpgsm=PATH to enable it I checked the site www.gnupg.org site to get information on GPGSM. I could not find any. Any pointers ? Thanks, Aparna. From wk@gnupg.org Thu Feb 7 13:43:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 13:43:02 2002 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> ("Aparna, S"'s message of "Thu, 7 Feb 2002 17:40:33 +0530") References: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Message-ID: <87u1sth3ih.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Thu Feb 7 13:53:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 13:53:02 2002 Subject: Questions about GPGME In-Reply-To: <20020206204004.GA5312@tzi.de> (jgre@tzi.de's message of "Wed, 6 Feb 2002 21:40:04 +0100") References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> <20020206204004.GA5312@tzi.de> Message-ID: <87pu3hh32r.fsf@alberti.gnupg.de> On Wed, 6 Feb 2002 21:40:04 +0100, Janico Greifenberg said: > What I would like is are functions like > gpgme_set_pubkeyring(char *file); > gpgme_set_seckeyring(char *file); > gpgme_set_no_default_keyring(int ); > or something like that simple setting the gpg options accordingly. No we can't do this as this would bind the API to one specific backend. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); You should not use strlen() here because the signed data is in binary format. Use the value you have in NREAD or force creation of an armored signature using gpgme_set_armor before you do the sign. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann@ruhr-uni-bochum.de Thu Feb 7 14:48:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Thu Feb 7 14:48:01 2002 Subject: [Marcus.Brinkmann@ruhr-uni-bochum.de: Re: Questions about GPGME] Message-ID: <20020207134537.GK1026@212.23.136.22> Mmh, forgot to CC the list. Sorry. ----- Forwarded message from Marcus Brinkmann ----- From: Marcus Brinkmann To: Janico Greifenberg Subject: Re: Questions about GPGME On Wed, Feb 06, 2002 at 09:40:04PM +0100, Janico Greifenberg wrote: > This sound good, I just can't get the verify (or decrypt_verify) working. I'm > using the folling code: I can debug it, but please send in complete (but small) examples that compile without changes (this time I pulled together my C++ knowledge and made it compilable myself). First, a general comment. You might consider wrapping the GPGME data types in C++ classes. They should fall in the C++ style of programming quite naturally. > err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); gpgme_op_verify does only support detached signatures, so you must use GPGME_SIG_MODE_DETACH if you want to verify it with gpgme afterwards. (Except if something is encrypted and signed, then you can use decrypt_verify). > err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); You should not use hard limits like that. Avoid it by using gpgme_data_release_and_get_mem, which returns a pointer to a buffer and its size. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); This is the next error. The string consists of binary and might contain binary zeroes. So you should use the size returned by gpgme_data_release_and_get_mem. Alternatively, you can gpgme_data_read the buffer and calculat > bzero(str_out,sizeof(str_out)); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_data_new(&out2); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_op_verify(ctx,in,out2,&stat); gpgme_op_verify does not take an in and an out argument, but a sig and a plain argument (signature and plaintext). Please check out the documentation in doc/gpgme.texi in the CVS repository. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de ----- End forwarded message ----- -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna@digital.com Thu Feb 7 15:30:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 15:30:01 2002 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Thanks for the information. I have another question. Where can I find the documentation for GPGME ? Thanks, Aparna. -----Original Message----- From: Werner Koch [mailto:wk@gnupg.org] Sent: Thursday, February 07, 2002 6:07 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GPGSM question On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From Marcus.Brinkmann@ruhr-uni-bochum.de Thu Feb 7 16:33:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Thu Feb 7 16:33:01 2002 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Message-ID: <20020207163033.A305@ulysses.alg.ruhr-uni-bochum.de> On Thu, Feb 07, 2002 at 07:54:51PM +0530, Aparna, S wrote: > Thanks for the information. > I have another question. > Where can I find the documentation for GPGME ? Check out the version from CVS, and run configure with the --enable-maintainer-mode, then it will be built along with gpgme. (see the README for more information, and the web site for more info how to use CVS). Thanks, Marcus From dres@cs.tu-berlin.de Thu Feb 7 20:11:01 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Thu Feb 7 20:11:01 2002 Subject: GnuPG PRNG insecure? Message-ID: <20020207200603.A28608@harry.cs.tu-berlin.de> Hello list, Recently, out of curiosity, I looked at GnuPG's random number generation and stumbled across something I think is problematic. However, I'm not a cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo random number generation. That's why I ask people here to comment on this. So read this with care; any or all of the things presented herein may be totally wrong. The problem: The problematic line that gave me headaches is in add_randomness() in random.c, where the random noise gathered by the (system dependant) different random code (rndlinux.c rndegd.c rndw32.c ..) is added to our random pool: rndpool[pool_writepos++] = *p++; The problem I see with this is, that previous data in our random pool is simply overwritten with new data. If our gathered data is already random in a cryptographically secure sense, this is not a problem per se. However, on non /dev/random systems such as win32 the system dependent random gather code simply puts much more "random" noise (gathered from lots of different sources of varying quality) into our pool, in the hope that the random pool code handles this correctly (like whitening the buffer via use of a hash function etc.). To further express this, imagine that the system-x random gatherer is asked to add x bytes of random data into our pool. The gatherer "decides" that to satisfy this demand he has to put out 2*POOLSIZE of random noise containing not-that-much entropy. After POOLSIZE bytes have been written, the code in random.c correctly whitens the buffer using RIPEMD160. However, the next POOLSIZE bytes of random data (of questionable quality) *overwrite* anything that was in the pool before, destroying the valuable accumulated entropy. (The worst case would be these last POOLSIZE bytes being all zeros.) The impact: This depends on the quality of the environmental noise gatherer used, but theoretically keys generated with GnuPG on systems lacking a good random source are at risk. The fix: As said, I'm not that experienced with PRNGs etc, but I think this would do just fine: rndpool[pool_writepos++] ^= *p++; This will also harden the PRNG against attacks on systems which *do* have a good random source (such as linux). Furthermore, already collected entropy is not simply thrown away (even if "used"), instead it is kept in full, still it is impossible to guess the current state of the pool based on the previous one (without knowledge of the actual random data). In short: this should always increase the PRNGs quality. Please Cc any replies, as I'm not subscribed. -- Stefan Keller From wk@gnupg.org Thu Feb 7 22:19:03 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 22:19:03 2002 Subject: New releases of libgcrypt, libksba and newpg Message-ID: <87u1st9er4.fsf@alberti.gnupg.de> Hi! I have just released some software for the Aegypten project. To demonstrate that we made some progress I bumbed some version numbers a bit ;-) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.6.tar.gz (618k) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.5-1.1.6.diff.gz (12k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/libksba-0.2.0.tar.gz (357k) [sorry, no diff file] ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.3.0.tar.gz (262k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.0.0-0.3.0.diff.gz (102k) There is no need to build OpenSC yet as we only have some stubs. you need to build libksba and libgcrypt prior to newpg. The major news is that gpg-agent does now operate as a daemon ("eval `gpg-agent`"), caches the passphrases and encrypts the secret keys. You may want to try the gpg-agent with the latest GnuPG CVS version which supports the new protocol - I am using this daily with Gnus. There is also some progress with certicate handling etc. Because theDirMngr has not yet been released the gpgsm option --disable-crl-checks might come handy. For more information consult http://www.gnupg.org/aegypten/ or ask on gpa-dev@gnupg.org. Have fun, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mooney@dogbert.cc.ndsu.NoDak.edu Fri Feb 8 03:12:02 2002 From: mooney@dogbert.cc.ndsu.NoDak.edu (Tim Mooney) Date: Fri Feb 8 03:12:02 2002 Subject: GnuPG on Tru64 versions In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Message-ID: In regard to: GnuPG on Tru64 versions, Aparna, S said (at 4:20pm on Feb 5,...: >I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any >of the flavors of Compaq Tru64 Unix. I had a lot of problems with the early 1.0.x versions not working correctly, but 1.0.6 seems to be much better. I haven't used it much yet, though. I compiled it using the vendor cc/ld on Tru64 5.1. Tim -- Tim Mooney mooney@dogbert.cc.ndsu.NoDak.edu Information Technology Services (701) 231-1076 (Voice) Room 242-J6, IACC Building (701) 231-8541 (Fax) North Dakota State University, Fargo, ND 58105-5164 From pgut001@cs.auckland.ac.nz Fri Feb 8 07:13:01 2002 From: pgut001@cs.auckland.ac.nz (Peter Gutmann) Date: Fri Feb 8 07:13:01 2002 Subject: GnuPG PRNG insecure? Message-ID: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> >Recently, out of curiosity, I looked at GnuPG's random number generation and >stumbled across something I think is problematic. However, I'm not a >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo >random number generation. That's why I ask people here to comment on this. So >read this with care; any or all of the things presented herein may be totally >wrong. It's a pretty accurate analysis. The flaw is worrying, but not fatal, since (assuming it accurately implements the design in http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from the mixed input of a significant portion of the pool, ie 640 bits of pool data are used for each output block. However, if user seeding is allowed it's a bit more problematic since an attacker can overwrite the pool contents with known values. The original implementation has the comment: /* Mix the incoming data into the pool. This operation is resistant to chosen- and known-input attacks because the pool contents are unknown to an attacker, so XOR'ing in known data won't help them. In an attacker could determine pool contents by observing the generator output (which is defeated by the postprocessing), we'd have to perform an extra input mixing operation to defeat these attacks */ which addresses chosen/known-input attacks (and just for the record, it does XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG doesn't allow outside control of the seeding, this isn't a big problem, but it's still something which should be fixed. Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search for that name will find further discussion on this topic. I think copying xorbytes is taking GPG's PGP compatibility a bit far :-). Peter. From wk@gnupg.org Fri Feb 8 08:33:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 08:33:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020207200603.A28608@harry.cs.tu-berlin.de> (Stefan Keller's message of "Thu, 7 Feb 2002 20:06:03 +0100") References: <20020207200603.A28608@harry.cs.tu-berlin.de> Message-ID: <87bsf0a0yp.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > The problem I see with this is, that previous data in our random > pool is simply overwritten with new data. If our gathered data is Thanks Stefan for pointing this out. As Peter already mentioned, this is not a serious flaw because an attacker is not able to mix data of his choice in. I fixed it of course. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Fri Feb 8 08:59:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 08:59:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <8766589zoj.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 19:10:18 +1300 (NZDT), Peter Gutmann said: > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from It should implement a CSPRNG as described in your 1998(?) paper. > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). What worries me most is that it needed *4 years* to figure this bug out _and_ report it. I'd have expected that some more people had a close look at those critical things. It is a very sad thing that there is so less truth in the claim that bugs in Free Software are figured out very fast - I have seen too many counterexamples :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From roam@ringlet.net Fri Feb 8 10:01:01 2002 From: roam@ringlet.net (Peter Pentchev) Date: Fri Feb 8 10:01:01 2002 Subject: Add a --fast option to --import and --recv-keys Message-ID: <20020208105758.A39499@straylight.oblivion.bg> --gBBFr7Ir9EOA20Yy Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, The attached patch adds the benefit of --import-fast to --recv-keys. The new --fast option works with both --import and --recv-keys, only importing the keys without updating the trustdb. --import-fast is still a valid option, but all it does is set the new 'fast' option and then fall back to the handling of --import. This speeds up things a *lot* when fetching multiple keys from a keyserver. Any comments on the patch are appreciated. G'luck, Peter --=20 Peter Pentchev roam@ringlet.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 What would this sentence be like if pi were 3? Index: g10/g10.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/g10.c,v retrieving revision 1.1.1.1 retrieving revision 1.3 diff -u -r1.1.1.1 -r1.3 --- g10/g10.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/g10.c 8 Feb 2002 07:33:51 -0000 1.3 @@ -208,6 +208,7 @@ oNoSigCreateCheck, oEmu3DESS2KBug, /* will be removed in 1.1 */ oEmuMDEncodeBug, + oFast, aTest }; =20 =20 @@ -406,6 +407,7 @@ { aDeleteSecretAndPublicKey, "delete-secret-and-public-key",256, "@" }, { oEmu3DESS2KBug, "emulate-3des-s2k-bug", 0, "@"}, { oEmuMDEncodeBug, "emulate-md-encode-bug", 0, "@"}, + { oFast, "fast", 0, "@" }, {0} }; =20 =20 @@ -751,8 +753,8 @@ switch( pargs.r_opt ) { case aCheckKeys: set_cmd( &cmd, aCheckKeys); break; case aListPackets: set_cmd( &cmd, aListPackets); break; + case aFastImport: opt.fast_import=3D1; /* FALLTHROUGH */ case aImport: set_cmd( &cmd, aImport); break; - case aFastImport: set_cmd( &cmd, aFastImport); break; case aSendKeys: set_cmd( &cmd, aSendKeys); break; case aRecvKeys: set_cmd( &cmd, aRecvKeys); break; case aExport: set_cmd( &cmd, aExport); break; @@ -991,6 +993,7 @@ iobuf_enable_special_filenames (1); break; case oNoExpensiveTrustChecks: opt.no_expensive_trust_checks=3D1;= break; + case oFast: opt.fast_import=3D1; break; =20 default : pargs.err =3D configfp? 1:2; break; } @@ -1370,9 +1373,8 @@ } break; =20 - case aFastImport: case aImport: - import_keys( argc? argv:NULL, argc, (cmd =3D=3D aFastImport) ); + import_keys( argc? argv:NULL, argc, opt.fast_import ); break; =20 case aExport: @@ -1385,7 +1387,7 @@ if( cmd =3D=3D aSendKeys ) hkp_export( sl ); else if( cmd =3D=3D aRecvKeys ) - hkp_import( sl ); + hkp_import( sl , opt.fast_import ); else export_pubkeys( sl, (cmd =3D=3D aExport) ); free_strlist(sl); Index: g10/hkp.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.c,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.c 8 Feb 2002 07:32:52 -0000 1.2 @@ -47,7 +47,7 @@ * or other error codes. */ int -hkp_ask_import( u32 *keyid ) +hkp_ask_import( u32 *keyid, int fast ) { struct http_context hd; char *request; @@ -85,7 +85,7 @@ : g10_errstr(rc) ); } else { - rc =3D import_keys_stream( hd.fp_read , 0 ); + rc =3D import_keys_stream( hd.fp_read , fast ); http_close( &hd ); } =20 @@ -96,7 +96,7 @@ =20 =20 int -hkp_import( STRLIST users ) +hkp_import( STRLIST users, int fast ) { if( !opt.keyserver_name ) { log_error(_("no keyserver known (use option --keyserver)\n")); @@ -114,7 +114,7 @@ * errorcounter ist not increaed and the program will return * with success - which is not good when this function is used. */ - if( hkp_ask_import( kid ) ) + if( hkp_ask_import( kid , fast ) ) log_inc_errorcount(); } return 0; Index: g10/hkp.h =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -23,7 +23,7 @@ =20 =20 int hkp_ask_import( u32 *keyid ); -int hkp_import( STRLIST users ); +int hkp_import( STRLIST users, int fast ); int hkp_export( STRLIST users ); =20 =20 Index: g10/options.h =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/options.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/options.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/options.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -103,6 +103,7 @@ int no_expensive_trust_checks; int no_sig_cache; int no_sig_create_check; + int fast_import; } opt; =20 =20 --gBBFr7Ir9EOA20Yy Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjxjkxYACgkQ7Ri2jRYZRVPbuQCfRbIW2nl+hJkgal5irMkbg+5w aqIAn2rtZZMU0fFHoxColzbdAKVSmPBP =C4jG -----END PGP SIGNATURE----- --gBBFr7Ir9EOA20Yy-- From wk@gnupg.org Fri Feb 8 11:07:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 11:07:01 2002 Subject: Add a --fast option to --import and --recv-keys In-Reply-To: <20020208105758.A39499@straylight.oblivion.bg> (Peter Pentchev's message of "Fri, 8 Feb 2002 10:57:59 +0200") References: <20020208105758.A39499@straylight.oblivion.bg> Message-ID: <878za48f88.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 10:57:59 +0200, Peter Pentchev said: > Any comments on the patch are appreciated. Thanks. However the CVS version and the 1.0.6c snapshot have a entirely revamped trustdb which is really fast compared to the old way. The one thing we have to improve is the speed of keylookup by replacing the sequential scans with an index and keeping some meta data. This is partly done but won't go into 1.0.7. Ciao, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw@jabberwocky.com Fri Feb 8 15:45:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Fri Feb 8 15:45:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <8766589zoj.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> Message-ID: <20020208144156.GD678@akamai.com> On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > What worries me most is that it needed *4 years* to figure this bug > out _and_ report it. I'd have expected that some more people had a > close look at those critical things. It is a very sad thing that > there is so less truth in the claim that bugs in Free Software are > figured out very fast - I have seen too many counterexamples :-( Make it worth their while. Netscape used to give out money for each verified bug report. We could give them some free beer to go with their free software. :) I'd be willing to throw some money into a pot for people who find security-related bugs in GnuPG. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From jas@extundo.com Fri Feb 8 20:07:01 2002 From: jas@extundo.com (Simon Josefsson) Date: Fri Feb 8 20:07:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: pgut001@cs.auckland.ac.nz (Peter Gutmann) writes: > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). Makes you wonder if this code was simply copied from PGP? What about license etc? From dres@cs.tu-berlin.de Fri Feb 8 23:46:01 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Fri Feb 8 23:46:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208233946.A16027@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:10:18PM +1300, Peter Gutmann wrote: > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. I've just read your excellent paper (wish I had access to it / read it beforehand). Mind it to explain why the flaw is not fatal? As I explained, on non /dev/random (or equivalent) systems there are often *much* more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have been put into the pool, the entropy collected with the first POOLSIZE bytes is lost. (Things would be different if GnuPG was keeping some state information of the previous pool mixing operation, such as the last digest computed or the whole hash buffer.) So if those last POOLSIZE bytes happen to contain zero entropy (or a very small amount), it doesn't matter how the output is generated; it will not contain very much randomness, and thus might be easily guessable by an attacker. However, I don't know if this does really happen. I don't know how many bytes e.g. the slow_gatherer in rndw32.c really puts out, but if it happens to be much more than POOLSIZE, the quality of the PRNG solely depends on the last POOLSIZE bytes collected. Unless, of course, I completely misunderstood things. -- Stefan Keller From sroberts@uniserve.com Sat Feb 9 01:33:02 2002 From: sroberts@uniserve.com (Sam Roberts) Date: Sat Feb 9 01:33:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208073557.A50024497@localhost> "just for the record, it does XOR the data" I guess I'm missing something, too, because it certainly looks to me like new data is assigned over data already in the pool, and my understanding was XORing known values into a pool could not DECREASE the entropy in the pool, but assigning seems to mean you'll lose some of the current contents of the pool. What am I missing, where's the XOR occuring? Thanks, Sam Quoting Peter Gutmann , who wrote: > >Recently, out of curiosity, I looked at GnuPG's random number generation and > >stumbled across something I think is problematic. However, I'm not a > >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo > >random number generation. That's why I ask people here to comment on this. So > >read this with care; any or all of the things presented herein may be totally > >wrong. > > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. > > However, if user seeding is allowed it's a bit more problematic since an > attacker can overwrite the pool contents with known values. The original > implementation has the comment: > > /* Mix the incoming data into the pool. This operation is resistant > to chosen- and known-input attacks because the pool contents are > unknown to an attacker, so XOR'ing in known data won't help them. > In an attacker could determine pool contents by observing the > generator output (which is defeated by the postprocessing), we'd > have to perform an extra input mixing operation to defeat these > attacks */ > > which addresses chosen/known-input attacks (and just for the record, it does > XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG > doesn't allow outside control of the seeding, this isn't a big problem, but > it's still something which should be fixed. > > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). > > Peter. > > > _______________________________________________ > Gnupg-devel mailing list > Gnupg-devel@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-devel -- Sam Roberts (Vivez sans temps mort!) From rabbi@quickie.net Sat Feb 9 02:20:01 2002 From: rabbi@quickie.net (Len Sassaman) Date: Sat Feb 9 02:20:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> Message-ID: On Fri, 8 Feb 2002, David Shaw wrote: > On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > > > What worries me most is that it needed *4 years* to figure this bug > > out _and_ report it. I'd have expected that some more people had a > > close look at those critical things. It is a very sad thing that > > there is so less truth in the claim that bugs in Free Software are > > figured out very fast - I have seen too many counterexamples :-( > > Make it worth their while. Netscape used to give out money for each > verified bug report. We could give them some free beer to go with > their free software. :) Exactly. Open source developers who expect free audits of their code simply because it is open are going to be disappointed, especially if they don't actively seek them. The reasons why source code must be available (from a security auditing perspective) are a) that a user can commission an audit if he wishes, and b) he is assured that the code he just had audited is the real deal, and not a "cleaned" version without back doors. --Len. From dres@cs.tu-berlin.de Sat Feb 9 03:56:02 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Sat Feb 9 03:56:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208073557.A50024497@localhost>; from sroberts@uniserve.com on Fri, Feb 08, 2002 at 07:35:58AM -0500 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208073557.A50024497@localhost> Message-ID: <20020209035130.A20792@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:35:58AM -0500, Sam Roberts wrote: > "just for the record, it does XOR the data" > > What am I missing, where's the XOR occuring? Peter was referring to "the original implementation", which I guess (after reading his paper) is the PRNG implementation in cryptlib. -- Stefan Keller From sroberts@uniserve.com Sat Feb 9 04:56:01 2002 From: sroberts@uniserve.com (Sam Roberts) Date: Sat Feb 9 04:56:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <87bsf0a0yp.fsf@alberti.gnupg.de>; from wk@gnupg.org on Fri, Feb 08, 2002 at 08:26:22AM +0100 References: <20020207200603.A28608@harry.cs.tu-berlin.de> <87bsf0a0yp.fsf@alberti.gnupg.de> Message-ID: <20020208105910.B73285669@localhost> Quoting Werner Koch , who wrote: > On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > Thanks Stefan for pointing this out. As Peter already mentioned, this > is not a serious flaw because an attacker is not able to mix data of > his choice in. I fixed it of course. Perhaps it should be fixed in the stable 1.0 branch as well? Sam -- Sam Roberts (Vivez sans temps mort!) From jsogo@debian.org Sat Feb 9 15:43:01 2002 From: jsogo@debian.org (Jose Carlos Garcia Sogo) Date: Sat Feb 9 15:43:01 2002 Subject: GPGME/jnlib includes gcrypt.h Message-ID: <20020209144104.GB2706@jaimedelamo.eu.org> --ftEhullJWpWg/VHq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello! I was trying to compile latest GPGME 0.3.1, but I have seen that jnlib_config.h includes gcrypt.h, which is not available in the GPGME tarball, and I guess it's part of libgcrypt. Do I need libgcrypt to compile GPGME? The error I get is: gcc -DHAVE_CONFIG_H -I. -I. -I.. -I../intl -g -O2 -Wall -Wcast-align -Wshadow -Wstrict-prototypes -c `test -f stringhelp.c || echo './'`stringhelp.c In file included from stringhelp.c:27: libjnlib-config.h:29: gcrypt.h: No such file or directory make[3]: *** [stringhelp.o] Error 1 Cheers,=20 Jose Carlos Garcia Sogo jsogo@debian.org --ftEhullJWpWg/VHq Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8ZTUAS+BYJZB4jhERAjC/AKCPzL+QimP/9rQyXpGqYVD5Xtn2owCdHhJf Z4KyIHFb0Sb7dXXsgf+aDm0= =N5wB -----END PGP SIGNATURE----- --ftEhullJWpWg/VHq-- From Marcus.Brinkmann@ruhr-uni-bochum.de Sat Feb 9 22:45:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sat Feb 9 22:45:01 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209144104.GB2706@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> Message-ID: <20020209214306.GB1387@212.23.136.22> On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > I was trying to compile latest GPGME 0.3.1, but I have seen that > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > tarball, and I guess it's part of libgcrypt. D'oh! I obviously never read the jnlib README, and when updating it I overwrote the local part of it (of which I wasn't aware at all). As I have libgcrypt installed, I didn't notice this. Thanks for spotting it! You can fix it by going back to the old version of the file, but I will also upload a gpgme 0.3.2. But I will wait until tomorrow, in case you find another bug. Here is a diff for you that reverts the change: Index: libjnlib-config.h =================================================================== RCS file: /cvs/gnupg/gpgme/jnlib/libjnlib-config.h,v retrieving revision 1.3 retrieving revision 1.4 diff -u -r1.3 -r1.4 --- libjnlib-config.h 2002/01/22 16:29:12 1.3 +++ libjnlib-config.h 2002/02/09 21:41:46 1.4 @@ -26,9 +26,11 @@ #ifndef LIBJNLIB_CONFIG_H #define LIBJNLIB_CONFIG_H -#include /* gcry_malloc & Cie. */ +#include "xmalloc.h" #include "logging.h" + + #ifdef USE_SIMPLE_GETTEXT int set_gettext_file( const char *filename ); const char *gettext( const char *msgid ); @@ -56,11 +58,11 @@ #endif /* !USE_SIMPLE_GETTEXT */ -#define jnlib_xmalloc(a) gcry_xmalloc( (a) ) -#define jnlib_xcalloc(a,b) gcry_xcalloc( (a), (b) ) -#define jnlib_xrealloc(a,n) gcry_xrealloc( (a), (n) ) -#define jnlib_xstrdup(a) gcry_xstrdup( (a) ) -#define jnlib_free(a) gcry_free( (a) ) +#define jnlib_xmalloc(a) xmalloc( (a) ) +#define jnlib_xcalloc(a,b) xcalloc( (a), (b) ) +#define jnlib_xrealloc(a,n) xrealloc( (a), (n) ) +#define jnlib_xstrdup(a) xstrdup( (a) ) +#define jnlib_free(a) free( (a) ) #define jnlib_log_debug log_debug #define jnlib_log_info log_info @@ -70,6 +72,4 @@ #endif /*LIBJNUTIL_CONFIG_H*/ - - -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From jsogo@debian.org Sun Feb 10 01:35:02 2002 From: jsogo@debian.org (Jose Carlos Garcia Sogo) Date: Sun Feb 10 01:35:02 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209214306.GB1387@212.23.136.22> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> Message-ID: <20020210003327.GA31140@jaimedelamo.eu.org> --SUOF0GtieIMvvwua Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable El Sat, Feb 09, 2002 at 10:43:06PM +0100, Marcus Brinkmann escrib=EDa: > On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > > I was trying to compile latest GPGME 0.3.1, but I have seen that > > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > > tarball, and I guess it's part of libgcrypt. >=20 [snip] >=20 > Thanks for spotting it! You can fix it by going back to the old version = of > the file, but I will also upload a gpgme 0.3.2. But I will wait until > tomorrow, in case you find another bug. It builds fine now. I'll wait to version 0.3.2 to upload it to Debian. Thank you. Jose Carlos Garcia Sogo jsogo@debian.org --SUOF0GtieIMvvwua Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8Zb/XS+BYJZB4jhERAtkDAKCGseLDmq2Xk0NmPxSZoMjthq0aigCfS7pv 4OCUODPeknR0cDi0ECSf74Y= =AcqW -----END PGP SIGNATURE----- --SUOF0GtieIMvvwua-- From Katie19@aol.com Sun Feb 10 09:07:01 2002 From: Katie19@aol.com (Katie19@aol.com) Date: Sun Feb 10 09:07:01 2002 Subject: Free Trial Membership Message-ID: <200202100751.XAA01350@web66.fenzi.com> Below is the result of your feedback form. It was submitted by (Katie19@aol.com) on Saturday, February 9, 2002 at 23:51:16 --------------------------------------------------------------------------- :: Just as a new version is getting ready to come out, the Macverse is up to 0.3.0 of GPGME. The wrappers have some improvements in the API, better documentation, and such. Also, it should work with GNUStep. You can find more info at: http://macgpg.sourceforge.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From Marcus.Brinkmann@ruhr-uni-bochum.de Sun Feb 10 15:00:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sun Feb 10 15:00:02 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020210003327.GA31140@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> <20020210003327.GA31140@jaimedelamo.eu.org> Message-ID: <20020210135752.GD696@212.23.136.22> On Sun, Feb 10, 2002 at 01:33:27AM +0100, Jose Carlos Garcia Sogo wrote: > It builds fine now. I'll wait to version 0.3.2 to upload it to > Debian. Thanks, I have uploaded 0.3.2. My announcement is stuck because of moderation, though. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From wk@gnupg.org Sun Feb 10 18:38:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:38:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: (Len Sassaman's message of "Fri, 8 Feb 2002 17:18:17 -0800 (PST)") References: Message-ID: <87heopkzr9.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 17:18:17 -0800 (PST), Len Sassaman said: > Exactly. Open source developers who expect free audits of their code > simply because it is open are going to be disappointed, especially if they However a lot of people try to sell this as the advantage of Free Software but the only evidence I have ever saw are counter examples. > The reasons why source code must be available (from a security auditing > perspective) are a) that a user can commission an audit if he wishes, and > b) he is assured that the code he just had audited is the real deal, and 100% agreed. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Sun Feb 10 18:48:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:48:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> (David Shaw's message of "Fri, 8 Feb 2002 09:41:56 -0500") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> Message-ID: <87d6zdkzc4.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > I'd be willing to throw some money into a pot for people who find > security-related bugs in GnuPG. The main problem is that it needs expierenced programmers to find the non trivial bugs. Those programmers are usually writing new code or fixing old one and don't have the time to screen other programs and it is not so interesting to do audits - especially not on a unpaid or low paid basis. So I don't believe that a little bit money will help. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Sun Feb 10 18:50:02 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:50:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: (Simon Josefsson's message of "Fri, 08 Feb 2002 20:04:58 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <878za1kz7j.fsf@alberti.gnupg.de> On Fri, 08 Feb 2002 20:04:58 +0100, Simon Josefsson said: > Makes you wonder if this code was simply copied from PGP? What about > license etc? *a++ = *b++ is quite a common construct in C as well as *a++ ^= *b++ The random code used by GnuPG is entirely different from the one in PGP. I wrote from the description in Peter's paper. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mb@g10code.de Sun Feb 10 21:04:03 2002 From: mb@g10code.de (Marcus Brinkmann) Date: Sun Feb 10 21:04:03 2002 Subject: [Announce] GPGME 0.3.2 released Message-ID: <20020210135606.GB696@212.23.136.22> We are pleased to announce version 0.3.2 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 579 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.2.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 9cb02a8c4c70bb291ea002e25eb8dd30 gpgme-0.3.1-0.3.2.diff.gz 987838060829be0235abc4f430cf6cd3 gpgme-0.3.1-0.3.2.diff.gz.sig a3d208a615ccbbc9ce1e31ee7f2f5fc3 gpgme-0.3.2.tar.gz f2b2f839ea4e2f15a2cbd4fafc3dbf6c gpgme-0.3.2.tar.gz.sig Noteworthy changes in version 0.3.2 (2002-02-10) ------------------------------------------------ * Remove erroneous dependency on libgcrypt in jnlib. This is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From Marcus.Brinkmann@ruhr-uni-bochum.de Sun Feb 10 21:06:04 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sun Feb 10 21:06:04 2002 Subject: [Announce] GPGME 0.3.1 released Message-ID: <20020209020628.GE3429@212.23.136.22> We are pleased to announce version 0.3.1 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 577 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.1.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are aa8f7033ac316458e100d3716ea7133b gpgme-0.3.1.tar.gz 518da3712aeeb10e5aeff7c02878c10c gpgme-0.3.1.tar.gz.sig 4cf626a2fd200b673e07e6de5979bedf gpgme-0.3.0-0.3.1.diff.gz 09e30e80bd5f834525ca65458c8b9db7 gpgme-0.3.0-0.3.1.diff.gz.sig Noteworthy changes in version 0.3.1 (2002-02-09) ------------------------------------------------ * There is a Texinfo manual documenting the API. * The gpgme_set_keylist_mode function returns an error, and changed its meaning. It is no longer usable to select between normal and fast mode (newer versions of GnuPG will always be fast), but selects between local keyring, remote keyserver, or both. For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the current setting, a fucntion gpgme_get_keylist_mode was added to retrieve the current mode. * gpgme_wait accepts a new argument STATUS to return the error status of the operation on the context. Its definition is closer to waitpid() now than before. * The LENGTH argument to gpgme_data_new_from_filepart changed its type from off_t to the unsigned size_t. * The R_HD argument to the GpgmePassphraseCb type changed its type from void* to void**. * New interface gpgme_op_trustlist_end() to match gpgme_op_keylist_end(). * The CryptPlug modules have been renamed to gpgme-openpgp and gpgme-smime, and they are installed in pkglibdir by `make install'. * An idle function can be registered with gpgme_register_idle(). * The GpgSM backend supports key generation with gpgme_op_genkey(). * Interface changes relative to the 0.3.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t. GpgmePassphraseCb CHANGED: Type of R_HD is void **. gpgme_wait CHANGED: New argument STATUS. gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError. The function has a new meaning! gpgme_get_keylist_mode NEW GPGME_KEYLIST_MODE_LOCAL NEW GPGME_KEYLIST_MODE_EXTERN NEW gpgme_op_trustlist_next NEW GpgmeIdleFunc NEW gpgme_register_idle NEW ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From wk@gnupg.org Sun Feb 10 22:06:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 22:06:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208233946.A16027@harry.cs.tu-berlin.de> (Stefan Keller's message of "Fri, 8 Feb 2002 23:39:46 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208233946.A16027@harry.cs.tu-berlin.de> Message-ID: <87n0yh2grw.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 23:39:46 +0100, Stefan Keller said: > As I explained, on non /dev/random (or equivalent) systems there are often *much* > more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have > been put into the pool, the entropy collected with the first POOLSIZE bytes is Okay, I did some tests on GNU/Linux (i383) to see how othen a mix_pool is done. For all relevant cases a mix is done not later than when ~65% of the buffer is filled; this carries more than 212 bytes state from one mix to the next. The usual case are mixes after 88 bytes right after a fast poll. But yes, the missing XOR is a serious bug which should be fixed in libgcrypt as ASAP because there we don't have a one-shot use of the application but might use the RNG under entirely different conditions. To make the implementaion more robust I will also carry a hash from the entrire pool between mixes. Thanks again, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From info@nakawe.se Mon Feb 11 10:16:01 2002 From: info@nakawe.se (Veronica Loell) Date: Mon Feb 11 10:16:01 2002 Subject: generate keys on win2k prof Message-ID: Hello, When I try to generate a key (using winpt) I get an access violation and gpg is shut down by windows. I have searched the mailing list archives etc but not found any clues to what might be the problem. I am using gpg 1.0.6 and win2k 5.00.2195 sp2 Just in case there is any information in the log file I'm enclosing it at the end of this message. Might there be some installation settings that I have not done? I have looked for information about that but not found any. I am not a memebr of this list so if there is someone that has an idea I would appreciate a cc. Thanks. Veronica Loell --------------------- logfile: --------------------- Application exception occurred: App: (pid=1092) When: 2002-02-11 @ 09:58:23.748 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: NAKAWE-PII-266 User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 3 Stepping 3 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 2 Current Type: Uniprocessor Free Registered Organization: Nakawe data Registered Owner: Veronica Loell State Dump for Thread Id 0x508 eax=a5a5a5a5 ebx=00000000 ecx=a5a5a5a5 edx=00000002 esi=024b0028 edi=c0000005 eip=77df9877 esp=0248ec64 ebp=0248ee28 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: 77df984a 399de0feffff cmp [ebp+0xfffffee0],ebx ss:0248ed08=a5a5a5a5 77df9850 7419 jz 77dffc6b 77df9852 64a118000000 mov eax,fs:[00000018] fs:00000018=???????? 77df9858 ffb5acfeffff push dword ptr [ebp+0xfffffeac] ss:0248ecd4=a5a5a5a5 77df985e 53 push ebx 77df985f 8b4030 mov eax,[eax+0x30] ds:a6947b77=???????? 77df9862 ff7018 push dword ptr [eax+0x18] ds:a6947b77=???????? 77df9865 ff150813db77 call dword ptr [77db1308] ds:77db1308=77fcb633 77df986b 8b8d04ffffff mov ecx,[ebp+0xffffff04] ss:0248ed2c=a5a5a5a5 77df9871 8b85e4feffff mov eax,[ebp+0xfffffee4] ss:0248ed0c=a5a5a5a5 FAULT ->77df9877 01481c add [eax+0x1c],ecx ds:a6947b77=???????? 77df987a 3bfb cmp edi,ebx 77df987c 0f8452010000 je 77df99d4 77df9882 399d0cffffff cmp [ebp+0xffffff0c],ebx ss:0248ed34=00000001 77df9888 7510 jnz 77e0199a 77df988a 81ffea000000 cmp edi,0xea 77df9890 745d jz 77e019ef 77df9892 81ff02010000 cmp edi,0x102 77df9898 7455 jz 77e01bef 77df989a 833d301fe07701 cmp dword ptr [77e01f30],0x1 ds:77e01f30=00000001 77df98a1 7c3e jl 77e021e1 77df98a3 89bd68ffffff mov [ebp+0xffffff68],edi ss:0248ed90=a5a5a5a5 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0248EE28 77DF7CC8 0248F164 00000000 7FFDEBF8 0248F2F0 advapi32! 0248F1B0 77DB8523 80000004 7FFDEBF8 00000000 0248F2E8 advapi32! 0248F288 77DB8B63 80000004 7FFDEBF8 0248F2E8 024F2008 advapi32!RegCloseKey 0248F2E0 004675C8 80000004 004671EC 00018000 00000000 advapi32!RegQueryValueExA 0248F3D0 00467829 00459F14 00000003 024D9E01 0046AE8B ! 0248F4A0 0045A10A 00459F14 00000003 0000012C 00000002 ! 0248F4D0 00459D49 00000003 0000012C 00000002 0046BE05 ! 0248F500 00459519 02497AD0 00000014 00000002 0046BD78 ! 0248F540 0045A81B 000000A0 00000002 00000001 02491378 ! 0248F580 0045AC3A 0248F5B0 00000400 0248F63C 00000000 ! 0248F5D0 00447384 00000011 00000400 0248F640 0248F63C ! 0248F600 0043FA21 00000011 00000400 0248F640 0248F63C ! 0248F660 00441827 00000400 024B0FD0 024B0398 02497870 ! 0248F6A0 00442FF3 00000011 00000400 024B0FD0 024B0398 ! 0248F750 00441EDC 024B4000 0248F7E0 00000008 74FC3CC0 ! 0248F790 0044265F 024B4000 00441F4D 0248F7E0 0248F948 ! 0248FCD0 004427B4 00441F4D 02496508 02496508 00402DF9 ! 0248FE00 0040606C 00000000 00000000 00000000 004034A3 ! 0248FF90 00401074 00000000 02492D7C 02495A80 0040105A ! 0248FFC0 77E97D08 0012E34C 00000002 7FFDF000 C0000005 ! 0248FFF0 00000000 00401044 00000000 000000C8 00000100 kernel32!CreateProcessW *----> Raw Stack Dump <----* 0248ec64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec84 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248eca4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecb4 a5 a5 a5 a5 a5 a5 a5 a5 - 05 00 00 c0 a5 a5 a5 a5 ................ 0248ecc4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecd4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ece4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecf4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed04 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed14 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed24 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed34 01 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed44 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed54 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed84 00 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ State Dump for Thread Id 0x608 eax=000001ec ebx=00007530 ecx=024b0f20 edx=00000000 esi=00000000 edi=00000000 eip=77f82837 esp=0714febc ebp=0714fee4 iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtRemoveIoCompletion 77f8282c b8a8000000 mov eax,0xa8 77f82831 8d542404 lea edx,[esp+0x4] ss:0803d48f=???????? 77f82835 cd2e int 2e 77f82837 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0714FEE4 77D470E6 00000074 0714FF1C 0714FF0C 0714FF14 ntdll!NtRemoveIoCompletion 0714FF20 77D5D195 00007530 0714FF60 0714FF5C 0714FF70 rpcrt4!I_RpcSetServerContextList 0714FF74 77D5D074 77D50D7F 0249CB58 00000008 0248E70C rpcrt4!NdrComplexArrayFree 0714FFA8 77D50C7A 024B5F98 0714FFEC 77E8758A 024B0F20 rpcrt4!NdrComplexArrayFree 0714FFB4 77E8758A 024B0F20 00000008 0248E70C 024B0F20 rpcrt4!RpcBindingSetOption 0714FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetFilePointer State Dump for Thread Id 0x300 eax=778321fe ebx=00000003 ecx=77db0260 edx=00000000 esi=77f8281e edi=00000003 eip=77f82829 esp=094afd24 ebp=094afd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f8281e b8e9000000 mov eax,0xe9 77f82823 8d542404 lea edx,[esp+0x4] ss:0a39d2f7=???????? 77f82827 cd2e int 2e 77f82829 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 094AFD70 77E86E1A 094AFD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects 094AFFB4 77E8758A 00000004 00000000 000B000A 024BEC60 kernel32!WaitForMultipleObjects 094AFFEC 00000000 778321FE 024BEC60 00000000 000000C8 kernel32!SetFilePointer *----> Raw Stack Dump <----* 094afd24 da 6d e8 77 03 00 00 00 - 48 fd 4a 09 01 00 00 00 .m.w....H.J..... 094afd34 00 00 00 00 00 00 00 00 - 00 00 00 00 60 ec 4b 02 ............`.K. 094afd44 01 00 00 00 08 03 00 00 - 0c 03 00 00 1c 03 00 00 ................ 094afd54 67 63 63 20 61 63 63 65 - 70 74 73 20 2d 67 2e 2e gcc accepts -g.. 094afd64 2e 20 79 65 73 0a 63 68 - 65 63 6b 69 b4 ff 4a 09 . yes.checki..J. 094afd74 1a 6e e8 77 48 fd 4a 09 - 01 00 00 00 00 00 00 00 .n.wH.J......... 094afd84 00 00 00 00 00 00 00 00 - b2 22 83 77 03 00 00 00 .........".w.... 094afd94 b0 fe 4a 09 00 00 00 00 - ff ff ff ff 60 ec 4b 02 ..J.........`.K. 094afda4 0a 00 0b 00 00 00 00 00 - 58 69 7a 65 64 20 49 53 ........Xized IS 094afdb4 43 2e 2e 2e 00 00 00 00 - 00 00 00 00 38 00 00 00 C...........8... 094afdc4 23 00 00 00 23 00 00 00 - 00 00 00 00 0a 00 0b 00 #...#........... 094afdd4 60 ec 4b 02 c8 43 f8 77 - 60 02 db 77 fe 21 83 77 `.K..C.w`..w.!.w 094afde4 00 00 00 00 32 75 e8 77 - 1b 00 00 00 00 02 00 00 ....2u.w........ 094afdf4 fc ff 4a 09 23 00 00 00 - 6e 2f 69 6e 73 74 61 6c ..J.#...n/instal 094afe04 6c 20 2d 63 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f l -c.checking fo 094afe14 72 20 6d 61 77 6b 2e 2e - 2e 20 6e 6f 0a 63 68 65 r mawk... no.che 094afe24 63 6b 69 6e 67 20 66 6f - 72 20 67 61 77 6b 2e 2e cking for gawk.. 094afe34 2e 20 6e 6f 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f . no.checking fo 094afe44 72 20 6e 61 77 6b 2e 2e - 2e 20 6e 61 77 6b 0a 63 r nawk... nawk.c 094afe54 68 65 63 6b 69 6e 67 20 - 66 6f 72 20 64 6f 63 62 hecking for docb State Dump for Thread Id 0x410 eax=77df9d61 ebx=00000102 ecx=024b62c0 edx=00000000 esi=77f827dd edi=00000000 eip=77f827e8 esp=0b50ff88 ebp=0b50ffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000286 function: NtWaitForSingleObject 77f827dd b8ea000000 mov eax,0xea 77f827e2 8d542404 lea edx,[esp+0x4] ss:0c3fd55b=???????? 77f827e6 cd2e int 2e 77f827e8 c20c00 ret 0xc 77f827eb 8b4124 mov eax,[ecx+0x24] ds:033a3892=???????? 77f827ee 39420c cmp [edx+0xc],eax ds:00eed5d2=???????? 77f827f1 0f85c9100000 jne NtQueryDefaultLocale+0x115 (77f838c0) 77f827f7 ff4208 inc dword ptr [edx+0x8] ds:00eed5d2=???????? 77f827fa 33c0 xor eax,eax 77f827fc c20400 ret 0x4 77f827ff 90 nop 77f82800 ff4a04 dec dword ptr [edx+0x4] ds:00eed5d2=???????? 77f82803 c20400 ret 0x4 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0B50FFB4 77E8758A 00000000 00000001 024B0880 00000000 ntdll!NtWaitForSingleObject 0B50FFEC 00000000 77DF9D61 00000000 00000000 00000000 kernel32 From webmaster@dialtalks.com Tue Feb 12 21:47:02 2002 From: webmaster@dialtalks.com (´ÙÀ̾óÅå) Date: Tue Feb 12 21:47:02 2002 Subject: [È«º¸] ¿¥ÇǾ²¸® Ç÷¹À̾ ¹«·á·Î µå¸³´Ï´Ù Message-ID:

     




 



±ÍÇÏÀÇ ½Â¶ô¾øÀÌ ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù. ÀúÈñȸ»ç´Â Á¤º¸Åë½ÅºÎÀÇ ¿ä±¸»çÇ×ÀÎ ¼ö½Å °ÅºÎ ÀåÄ¡¸¦ ÇÊÈ÷ ¸¶·ÃÇϰí ÀÖ½À´Ï´Ù. ±ÍÇÏÀÇ ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅͳݻóÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ È®ÀÎÇÏ¿´À¸¸ç, ±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ È®ÀεÇÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñ⠹ٶø´Ï´Ù. µ¿ÀÏÇÑ ³»¿ëÀÇ ¸ÞÀϼö½ÅÀ» °ÅºÎÇÏ½Å´Ù¸é ±ÍÇÏÀÇ Àǻ縦 Á¸ÁßÇÏ¿© »èÁ¦Ã³¸®ÇϰڽÀ´Ï´Ù. °¨»çÇÕ´Ï´Ù.

From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 13 01:58:04 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 13 01:58:04 2002 Subject: [Announce] GPGME 0.3.3 released Message-ID: <20020212231844.GW705@212.23.136.22> We are pleased to announce version 0.3.3 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 576 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.3.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 93cf2a873d7fcb23cc0ec0ec27d5235e gpgme-0.3.2-0.3.3.diff.gz.sig 94d9081fc72958b2c5ce6378fab64375 gpgme-0.3.3.tar.gz.sig 6e1e8254b3742bd71db880cb84f7b00f gpgme-0.3.2-0.3.3.diff.gz 4b012ab44b320096253559b04147b7d4 gpgme-0.3.3.tar.gz Noteworthy changes in version 0.3.3 (2002-02-12) ------------------------------------------------ * Fix the Makefile in jnlib. * Fix the test suite (hopefully). It should clean up all its state with `make check' now. As version 0.3.2, this is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From stephane@sente.ch Thu Feb 14 11:31:01 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Thu Feb 14 11:31:01 2002 Subject: gpgme key listing slowness question Message-ID: Hi, As I complainted sometime ago, gpgme key listing operations are very slow. Werner replied, the slowness is in fact due to gpg, but... I saw that gpg is invoked with the following arguments: gpg --batch --comment --status-fd 2 --no-tty --verbose --with-colons --fixed-list-mode --with-fingerprint --list-keys -- The argument which makes the operation so slow is the --verbose: wouldn't it be possible to get rid of this --verbose argument? Of course, we'd loose information about the web-of-trust, but if you simply want a list of all available keys, you don't care yet about the web-of-trust. You ask these informations once you've selected the keys you need. BTW, in previous version of gpgme there was a fast listing mode, which enabled the --no-expensive-trust-checks option; the option is no longer used now, though it was mentionned that all key listing operations are in fast mode now. Is it correct? Stephane From wk@gnupg.org Thu Feb 14 11:56:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 11:56:02 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 11:28:42 +0100") References: Message-ID: <87lmdwuyj3.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > Hi, > As I complainted sometime ago, gpgme key listing operations are very > slow. Werner replied, the slowness is in fact due to gpg, but... Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? It is worth to try. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Thu Feb 14 12:24:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 12:24:02 2002 Subject: Yet another problem with trust in 1.0.6c In-Reply-To: (Janusz A. Urbanowicz's message of "Sun, 6 Jan 2002 02:02:49 +0100 (CET)") References: Message-ID: <87eljoux8j.fsf@alberti.gnupg.de> On Sun, 6 Jan 2002 02:02:49 +0100 (CET), Janusz A Urbanowicz said: > Summary: for some encrypted and signed messages gpg in interactive mode > skips trust value check and reports the signature as fully valid, while in > batch mode the signature is reported as untrusted. Example: Ooops. Really strange code but simple to fix. This also fixes the other problem you reported. I think the problem with the trust calculation you reported for 1.0.6b has been fixed. Right? Thanks, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From stephane@sente.ch Thu Feb 14 12:44:01 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Thu Feb 14 12:44:01 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of"Thu, 14 Feb 2002 11:28:42 +0100") Message-ID: > On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > > > Hi, > > As I complainted sometime ago, gpgme key listing operations are very > > slow. Werner replied, the slowness is in fact due to gpg, but... > > Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? > It is worth to try. > > Werner No, I didn't. I use the official 1.0.6, and will continue until 1.0.7 is out (when?). If I list keys in my key ring with --verbose, it takes 50 seconds; if I don't use --verbose, it takes only... 5 seconds. Do you experiment such a gain with 1.0.6c? Stephane From wk@gnupg.org Thu Feb 14 13:46:01 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 13:46:01 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 12:41:53 +0100") References: Message-ID: <874rkkutgr.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 12:41:53 +0100, Stephane Corthesy said: > No, I didn't. I use the official 1.0.6, and will continue until > 1.0.7 is out (when?). Good question. I try to make a 1.0.6d this week. > If I list keys in my key ring with --verbose, it takes 50 seconds; > if I don't use --verbose, it takes only... 5 seconds. Do you > experiment such a gain with 1.0.6c? Ah yes. --verbose does also list all signatures and resolving the names is time consuming. As we currently ignore the key signature lines it does not make sense to use this option. I have just commited the fix to gpgme. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw@jabberwocky.com Thu Feb 14 20:40:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 14 20:40:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <87d6zdkzc4.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> Message-ID: <20020214193802.GB681@akamai.com> On Sun, Feb 10, 2002 at 06:42:51PM +0100, Werner Koch wrote: > On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > > > I'd be willing to throw some money into a pot for people who find > > security-related bugs in GnuPG. > > The main problem is that it needs expierenced programmers to find the > non trivial bugs. Those programmers are usually writing new code or > fixing old one and don't have the time to screen other programs and it > is not so interesting to do audits - especially not on a unpaid or low > paid basis. So I don't believe that a little bit money will help. Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms of auditing, a little bit of money doesn't help, but if 20 people all throw in a little bit of money... David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bwpearre@alumni.princeton.edu Thu Feb 14 21:27:02 2002 From: bwpearre@alumni.princeton.edu (Ben Pearre) Date: Thu Feb 14 21:27:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214193802.GB681@akamai.com> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> Message-ID: <20020214202519.GG10905@diverge.seunglab.mit.edu> --XRI2XbIfl/05pQwm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > of auditing, a little bit of money doesn't help, but if 20 people all > throw in a little bit of money... Money? Pshaw. Credit! There could be a command-line option --list-contributors or some such, which makes it trivial to see who has helped with the program. "...and the daring souls who found security flaws in the code:..." The key is being able to say during a job interview (OK, how many interviewers use GPG?) or a hot date (?!) "Run this command and see my name"... and have it take 10 seconds. --=20 bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben --XRI2XbIfl/05pQwm Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8bB0v+CWfKs/abNoRAvVcAKDDK9Rsm5t3NqOgmocIGY+PjJit/ACfbuSQ 92J/cMNc+4yNq0K5aatIFb4= =+H2P -----END PGP SIGNATURE----- --XRI2XbIfl/05pQwm-- From slg@ex.com Fri Feb 15 04:34:01 2002 From: slg@ex.com (Simson Garfinkel) Date: Fri Feb 15 04:34:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools Message-ID: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Greetings. I am trying to compile gnupg on MacOS X and am having a big problems. Every time I do a "./configure", I end up with a Makefile that is 0 bytes in length. Is this a known problem? [simsong@localhost gnupg-1.0.4] 313 % ./configure creating cache ./config.cache checking host system type... powerpc-apple-darwin5.2 checking target system type... powerpc-apple-darwin5.2 checking build system type... powerpc-apple-darwin5.2 checking for a BSD compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking whether make sets ${MAKE}... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for working makeinfo... missing checking for mawk... no checking for gawk... no checking for nawk... no checking for awk... awk checking which static random module to use... default checking whether use of /dev/random is requested... yes checking whether use of extensions is requested... yes checking whether assembler modules are requested... yes checking whether memory debugging is requested... no checking whether memory guard is requested... no checking whether included zlib is requested... no checking whether use of capabilities is requested... no checking whether to enable maintainer-specific portions of Makefiles... no checking whether make sets ${MAKE}... (cached) yes checking whether build environment is sane... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for gcc... gcc checking whether the C compiler (gcc ) works... yes checking whether the C compiler (gcc ) is a cross-compiler... no checking whether we are using GNU C... yes checking whether gcc accepts -g... yes checking how to run the C preprocessor... gcc -E -traditional-cpp checking for POSIXized ISC... no checking for a BSD compatible install... /usr/bin/install -c checking for mawk... (cached) awk checking for docbook-to-man... no checking for faqprog.pl... no configure: warning: *** *** It seems that the faqprog.pl program is not installed; *** however it is only needed if you want to change the FAQ. *** (faqprog.pl should be available at: *** ftp://ftp.gnupg.org/pub/gcrypt/contrib/faqprog.pl ) *** No need to worry about this warning. *** checking for BSD-compatible nm... /usr/bin/nm -p checking command to parse /usr/bin/nm -p output... no checking for _ prefix in compiled symbols... no checking for option to create PIC... none checking how to specify -export-dynamic... checking for ranlib... ranlib checking for ANSI C header files... yes checking for working const... yes checking for inline... inline checking for off_t... yes checking for size_t... yes checking for working alloca.h... no checking for alloca... yes checking for unistd.h... yes checking for getpagesize... yes checking for working mmap... no checking for argz.h... no checking for limits.h... yes checking for locale.h... yes checking for nl_types.h... no checking for malloc.h... no checking for string.h... yes checking for unistd.h... (cached) yes checking for sys/param.h... yes checking for getcwd... yes checking for munmap... yes checking for putenv... yes checking for setenv... yes checking for setlocale... yes checking for strchr... yes checking for strcasecmp... yes checking for strdup... yes checking for __argz_count... no checking for __argz_stringify... no checking for __argz_next... no checking for stpcpy... no checking for LC_MESSAGES... no checking whether NLS is requested... yes checking whether included gettext is requested... no checking for libintl.h... no checking whether catgets can be used... no checking for msgfmt... msgfmt checking for gmsgfmt... msgfmt checking for xgettext... : checking for catalogs to be installed... da de eo es_ES fr id it ja nl pl pt_BR pt_PT ru sv checking for gdbm.h... no checking for gethostbyname in -lnsl... no checking for socket in -lsocket... no checking for gethostbyname in -lnsl... (cached) no checking for dlopen in -ldl... no checking for dlopen... no checking for shl_load in -ldld... no checking for ANSI C header files... (cached) yes checking for unistd.h... (cached) yes checking for langinfo.h... no checking for termio.h... no checking for working const... (cached) yes checking for inline... (cached) inline checking for size_t... (cached) yes checking return type of signal handlers... void checking for sys_siglist declaration in signal.h or unistd.h... yes checking endianess... big checking for byte typedef... no checking for ushort typedef... yes checking for ulong typedef... no checking for u16 typedef... no checking for u32 typedef... no checking size of unsigned short... 2 checking size of unsigned int... 4 checking size of unsigned long... 4 checking size of unsigned long long... 8 checking for vprintf... yes checking for strerror... yes checking for stpcpy... (cached) no checking for strlwr... no checking for stricmp... no checking for tcgetattr... yes checking for rand... yes checking for strtoul... yes checking for mmap... yes checking for memmove... yes checking for gettimeofday... yes checking for getrusage... yes checking for gethrtime... no checking for setrlimit... yes checking for clock_gettime... no checking for memicmp... no checking for atexit... yes checking for raise... yes checking for getpagesize... (cached) yes checking for strftime... yes checking for nl_langinfo... no checking for waitpid... yes checking for wait4... yes checking for sigaction... yes checking for sigprocmask... yes checking for fopen64... no checking for fstat64... no checking for mlock... yes checking whether mlock is broken... yes checking for sys/stat.h... yes checking for unistd.h... (cached) yes checking for direct.h... no checking if mkdir takes one argument... no checking for sys/ipc.h... yes checking for sys/shm.h... yes checking whether IPC_RMID allowes subsequent attaches... no checking whether SHM_LOCK is available... no checking for random device... yes checking for linux/random.h... no checking for random device ioctl... no dynamically linked cipher modules: rndunix rndegd tiger statically linked cipher modules: rndlinux sha1 rmd160 md5 checking for mpi assembler functions... done checking for zlib.h... yes checking for deflateInit2_ in -lz... yes updating cache ./config.cache creating ./config.status creating Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating intl/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating po/Makefile.in sed: 46: conftest.s1: unescaped newline inside substitute pattern creating util/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating mpi/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating cipher/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating g10/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating doc/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating tools/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating zlib/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating checks/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating config.h linking ./intl/libgettext.h to intl/libintl.h linking ./mpi/powerpc32/mpih-add1.S to mpi/mpih-add1.S linking ./mpi/powerpc32/mpih-mul1.S to mpi/mpih-mul1.S linking ./mpi/powerpc32/mpih-mul2.S to mpi/mpih-mul2.S linking ./mpi/powerpc32/mpih-mul3.S to mpi/mpih-mul3.S linking ./mpi/powerpc32/mpih-lshift.S to mpi/mpih-lshift.S linking ./mpi/powerpc32/mpih-rshift.S to mpi/mpih-rshift.S linking ./mpi/powerpc32/mpih-sub1.S to mpi/mpih-sub1.S linking ./mpi/generic/mpi-asm-defs.h to mpi/mpi-asm-defs.h g10defs.h created [simsong@localhost gnupg-1.0.4] 314 % more Mak Makefile Makefile.am Makefile.in [simsong@localhost gnupg-1.0.4] 314 % more Makefile [simsong@localhost gnupg-1.0.4] 317 % ls -l Makefile -rw-rw-r-- 1 simsong staff 0 Feb 14 18:15 Makefile [simsong@localhost gnupg-1.0.4] 318 % From rguerra@yahoo.com Fri Feb 15 04:53:01 2002 From: rguerra@yahoo.com (Robert Guerra) Date: Fri Feb 15 04:53:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> References: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <1041280.1013727062@[192.168.1.101]> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Simson: There are some specific patches that have to be made to get GNUPG to compile on OS X.. It's all detailed on the mac GPG page at: http://macgpg.sourceforge.net/ regards, Robert - --- Robert Guerra Privaterra - Securing Human Rights A project of Computer Professionals for Social Responsibility (CPSR) - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile that > is 0 bytes in length. > > Is this a known problem? > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (Darwin) Comment: For info see http://www.gnupg.org iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 WtWVsQ4tOmQP1I2VnM5ld9M= =LoGh -----END PGP SIGNATURE----- From redbird@rbisland.cx Fri Feb 15 05:14:01 2002 From: redbird@rbisland.cx (Gordon Worley) Date: Fri Feb 15 05:14:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <12BB6722-21CA-11D6-89AD-000A27B4DEFC@rbisland.cx> On Thursday, February 14, 2002, at 06:17 PM, Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile > that is 0 bytes in length. > > Is this a known problem? So well known that we have a whole project devoted to porting it (and doing the GUI thing to make GnuPG accessible to the average Mac user). http://macgpg.sf.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From slg@ex.com Fri Feb 15 13:17:01 2002 From: slg@ex.com (Simson Garfinkel) Date: Fri Feb 15 13:17:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <1041280.1013727062@[192.168.1.101]> Message-ID: Robert, Thanks so much. Do you guys plan to integrate these patches onto the mainstream release? We're just a few months away from having the number of installed OS X machines being larger than all of the other UNIX platforms combined... -SImson On Thursday, February 14, 2002, at 10:51 PM, Robert Guerra wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Simson: > > > There are some specific patches that have to be made to get GNUPG to > compile on OS X.. > > It's all detailed on the mac GPG page at: > > http://macgpg.sourceforge.net/ > > > regards, > > Robert > > - --- > Robert Guerra > Privaterra - Securing Human Rights > > > A project of Computer Professionals for Social Responsibility (CPSR) > > > > > - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel > wrote: > >> Greetings. I am trying to compile gnupg on MacOS X and am having a big >> problems. Every time I do a "./configure", I end up with a Makefile >> that >> is 0 bytes in length. >> >> Is this a known problem? >> >> > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (Darwin) > Comment: For info see http://www.gnupg.org > > iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 > WtWVsQ4tOmQP1I2VnM5ld9M= > =LoGh > -----END PGP SIGNATURE----- From foxy@free.fr Fri Feb 15 19:10:02 2002 From: foxy@free.fr (Laurent CHEYLUS) Date: Fri Feb 15 19:10:02 2002 Subject: Format of text and signature for GPGME Message-ID: <3C6D4E89.F4634650@free.fr> Hi, I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I have some problems to verify a "PGP Signed Message" with "gpgme_op_verify" function :-( I have develop a function to extract text and PGP signature from the body of a mail message but when I try to verify this PGP signed message, I have GPGME_SIG_STAT_ERROR status or GPGME_SIG_STAT_BAD (when I have GPG key for sign in my pub keyring) but no GPGME_SIG_STAT_GOOD. My code is : static void gpg_sign_verify(gchar *text, gchar *sign) { GpgmeCtx ctx; GpgmeError err; GpgmeData sig, txt; GpgmeSigStat status; err = gpgme_new (&ctx); fail_if_err (err); gpg_sign_extract(ptr,text,sign); err = gpgme_data_new_from_mem ( &txt, text, strlen (text), 0 ); fail_if_err (err); err = gpgme_data_new_from_mem ( &sig, sign, strlen (sign), 0 ); fail_if_err (err); err = gpgme_op_verify (ctx, sig, txt, &status ); fail_if_err (err); print_sig_stat ( ctx, status ); gpgme_data_release (sig); gpgme_data_release (txt); gpgme_release (ctx); } where ptr is a char* with body of mail message. I think that I have some errors when I read text and sign datas from body. What must be the format for the PGP signed message and cleartext signature, in the "gpgme_op_verify" function ? Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this header must be suppress ? Must the signature begin with "-----BEGIN PGP SIGNATURE-----" and finsih with "-----END PGP SIGNATURE-----" ? Must these lines finish with "\n" or another caracter ? Foxy. From dshaw@jabberwocky.com Fri Feb 15 21:33:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Fri Feb 15 21:33:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214202519.GG10905@diverge.seunglab.mit.edu> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> <20020214202519.GG10905@diverge.seunglab.mit.edu> Message-ID: <20020215203021.GG679@akamai.com> On Thu, Feb 14, 2002 at 03:25:19PM -0500, Ben Pearre wrote: > > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > > of auditing, a little bit of money doesn't help, but if 20 people all > > throw in a little bit of money... > > Money? Pshaw. Credit! There could be a command-line option > --list-contributors or some such, which makes it trivial to see who > has helped with the program. "...and the daring souls who found > security flaws in the code:..." > > The key is being able to say during a job interview (OK, how many > interviewers use GPG?) or a hot date (?!) "Run this command and see my > name"... and have it take 10 seconds. Heh. Good point. It would be far easier than saying "Go look at the AUTHORS file"... :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Bluefire@bluefire.nu Sat Feb 16 16:13:01 2002 From: Bluefire@bluefire.nu (Andreas Agorander) Date: Sat Feb 16 16:13:01 2002 Subject: Two questions about GPGME Message-ID: <200202161516.g1GFGOK32016@mail.space2u.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi! There is some parts of GPG functionality that I haven't found out how to access through GPGME: 1. Looking through the documentation it seems like only detached signatures can be verified by GPGME, is there any possibility to verify a clearsigned message directly, or do I have to "separate" the signature from the message? 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? gpgme_op_decrypt_verify only works for me for such messages, eg. messages I first sign and then encrypt don't get their signatures recognized the same way, and as far as I can see there is no way of doing the combination directly... If this isn't implemented, is it on the TODO? /Andreas Agorander -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8boTUUhUH0wIHC6cRAg6HAJ4wJlKOF5i39jHsC5bGS+MAlLd/0QCg+3k+ 3oyBVGOtvwRShkHLwfzCUKA= =tJXQ -----END PGP SIGNATURE----- From wk@gnupg.org Sun Feb 17 12:38:02 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 17 12:38:02 2002 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> (Andreas Agorander's message of "Sat, 16 Feb 2002 17:12:04 +0100") References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <87n0y81j9k.fsf@alberti.gnupg.de> On Sat, 16 Feb 2002 17:12:04 +0100, Andreas Agorander said: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? Marcus and I are sitting here on the floor at the F.SDEM and just figured out that there is something missing. > If this isn't implemented, is it on the TODO? Yes, it is important and will be addressed soon. We probably have to change the verify API :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann@ruhr-uni-bochum.de Mon Feb 18 15:28:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Mon Feb 18 15:28:01 2002 Subject: Format of text and signature for GPGME In-Reply-To: <3C6D4E89.F4634650@free.fr> References: <3C6D4E89.F4634650@free.fr> Message-ID: <20020218142542.GF801@212.23.136.22> On Fri, Feb 15, 2002 at 07:08:09PM +0100, Laurent CHEYLUS wrote: > I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I > have some problems to verify a "PGP Signed Message" with > "gpgme_op_verify" function :-( Your problems are very likely the extraction of the correct plain text of the e-mail. You should read the relevant standard (rfc2015) to get all the details how to compose and decompose OpenPGP MIME messages. > My code is : Your code seems to be fine. > What must be the format for the PGP signed message and cleartext > signature, in the "gpgme_op_verify" function ? The same as for gpg on the command line. > Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this > header must be suppress ? Oha. That is not a MIME message, but an older format. I am not sure we support that in GPGME right now. I could only make it work here by sending the whole body to gpg, but we only support detached format right now. This will be fixed soon, though. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From foxy@free.fr Thu Feb 21 14:42:01 2002 From: foxy@free.fr (Laurent Cheylus) Date: Thu Feb 21 14:42:01 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C74F8BA.520BAAB5@free.fr> Hi, when I use the function "gpgme_op_verify" to verify GPG signature with a text message, I have the status "GPGME_SIG_STAT_GOOD" :-) when the public key for signature is in my keyring. But when I verify a signature and I have not the public key in my keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status with "gpgme_op_verify" ;-( Thx, Foxy. From dongsun2000@yahoo.co.kr Sat Feb 23 09:32:02 2002 From: dongsun2000@yahoo.co.kr (»ê¾ÇÀÎŬ·´¼îÇÎ) Date: Sat Feb 23 09:32:02 2002 Subject: [Á¤º¸] ·¹Àú,µî»ê¿ëǰ Àü¹® °øµ¿±¸¸Å »çÀÌÆ®¸¦ ¾Ë·Áµå¸²´Ï´Ù.^^ Message-ID: Untitled Document
 

>> ¼îÇθô »õ ´ÜÀå °æÇ°À» µå¸³´Ï´Ù.

>> 3¸¸¿ø ÀÌ»ó ±¸¸Å½Ã 1~2ÀÎ¿ë ¼­¸Óºí¶ûÄÏ¸ÅÆ® ÁõÁ¤

>> Çã¶ô¾øÀÌ ¸ÞÀÏÀ» º¸³» Á˼ÛÇÕ´Ï´Ù. º» ¸ÞÀÏÀº 1ȸ¼ºÀÔ´Ï´Ù.

>> ±ÍÇÏÀÇ ¸ÞÀÏÁÖ¼Ò´Â À¥¼­Çΰúȸ¿øÀÇ ÃßõÀ¸·Î ¾Ë°Ô µÇ¾úÀ¸¸ç,¸ÞÀϿܿ¡ ¾î¶°ÇÑ

>> Á¤º¸µµ ¾ø½À´Ï´Ù.

<¼ö½Å°ÅºÎ>

From kanglitape@hentaisonic.com Mon Feb 25 07:40:10 2002 From: kanglitape@hentaisonic.com (kanglitape@hentaisonic.com) Date: Mon Feb 25 07:40:10 2002 Subject: sell tansistors and diode Message-ID: --===_LikeYe_888_2fktbfxsrujyoh Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable HENTAISONIC-TRANSISTOR CO =2E LTD INTERNATIONAL ELECTRINICS BUILDING YINGBIN ROAD 75 CHANGSHA =2E P=2ER=2E CHINA TEL-0086731-2232933 FAX=2C 0086731-4429472 MOBILE 1300-7497167 EMAIL=3A jjwfa=40public=2Ecs=2Ehn=2Ecn DEAR SIR WE ARE HENTAISONIC-TRANSISTOR CO=2E LTD FOUNDED IM 1990 WE HAVE 15 PRODUCTION LINES TO-3=2C TO-66=2C TO-3P TO-220=2C TO-202=2C TO-126=2C TO-220F TO-3PML=2C TO-3PL=2C TOP-3Fa =2C TO-3P=28I=29=2C TO-247=2C TO-3P MT-100=2C MT-200 WITH LASER OEM PRINT MARKING=2E OUR ITEMS COVER 5600 AS FOLLOWS 2N SERIERS 2SA SERIERS 2SB SERIERS 3SC SERIERS 2SD SERIERS BD SERIERS BU=2FBUD=2FBUF=2FBUH=2FBUL=2FBUP=2FBUR=2FBUS=2FBUT=2FBUV=2FBUW=2FBUX=2FBUY SERIERS TIP SERIERS S SERIERS MJ=2FMJE SERIERS PLEASE SEE OUR WEBSITE www=2Ehentaisonic=2Ecom=2Ftransistor we are willing to cooperate with you=2E best regards wangjin --===_LikeYe_888_2fktbfxsrujyoh Content-Type: application/octet-stream; name="audio tape.htm" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="audio tape.htm" PGh0bWw+DQoNCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1MYW5ndWFnZSIgY29u dGVudD0iemgtY24iPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0 ZXh0L2h0bWw7IGNoYXJzZXQ9Z2IyMzEyIj4NCjxtZXRhIG5hbWU9IkdFTkVSQVRPUiIgY29udGVu dD0iTWljcm9zb2Z0IEZyb250UGFnZSA0LjAiPg0KPG1ldGEgbmFtZT0iUHJvZ0lkIiBjb250ZW50 PSJGcm9udFBhZ2UuRWRpdG9yLkRvY3VtZW50Ij4NCjx0aXRsZT5CTEFOSyBBVURJTyBDQVNTRVRU RSBNQUdORVRJQyBUQVBFPC90aXRsZT4NCjwvaGVhZD4NCg0KPGJvZHkgYmdjb2xvcj0iIzAwRkZG RiI+DQoNCjxwPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyANCjxmb250IGZhY2U9IkFyaWFsIEJsYWNrIiBjb2xvcj0i I0ZGMDAwMCI+QkxBTksgQVVESU8gQ0FTU0VUVEUgTUFHTkVUSUMgVEFQRS4gPC9mb250PjwvcD4N Cjx0YWJsZSBib3JkZXI9IjEiIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjQ4NyI+DQogIDx0cj4NCiAg ICA8dGQgd2lkdGg9IjUwJSIgaGVpZ2h0PSIyNTgiPg0KICAgICAgPHAgYWxpZ249ImNlbnRlciI+ PGltZyBib3JkZXI9IjAiIHNyYz0ia2FuZ2xpJTIwdHgtNjAuanBnIiB3aWR0aD0iMTgwIiBoZWln aHQ9IjExNCI+PC9wPg0KICAgICAgPHAgYWxpZ249ImNlbnRlciI+Qy02MDwvdGQ+DQogICAgPHRk IHdpZHRoPSI1MCUiIGhlaWdodD0iMjU4Ij5UUkFOU1BBUkVOVCBCT1guICsgNjAgTUlOVVRFJm5i c3A7IE1BR05FVElDIA0KICAgICAgVEFQRSANCiAgICAgIDxwPklOU0lERSBUSEUgQ0FTRSArIGNv bG9yIHAucCBzbGVldmU8L3A+DQogICAgICA8cD5hbHNvIHlvdXIgb3duIGxvZ28gY2FuIGJlIHBy aW50ZWQgb24gdGhlIHAucCBwYXBlciAuIDwvcD4NCiAgICAgIDxwPiZuYnNwOzIwMHBjcyB0byBh IGNhcnRvbi48L3A+DQogICAgICA8cD4mbmJzcDtwcmljZS4mbmJzcDsmbmJzcDsgc3VwaW9yJm5i c3A7IGF0IHVzZCAwLjE2Mi9wYzwvcD4NCiAgICAgIDxwPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyBjb25tbW9uLiBhdCB1c2QgMC4xNTIvcGMmbmJzcDsgDQogICAgICBmb2Im bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgY2hpbmEgcG9ydDwvcD4N CiAgICAgIDxwPiZuYnNwO05BS0VEJm5ic3A7IEEgQ0FTRSBXSVRIIDYwIE1JTlVURVMgT0YgTUFH TkVUSUMgVEFQRSArIFRSQU5QQVJFTlQgDQogICAgICBCT1guIEFUIFVTRCAwLjEzNS9QQyBGT0Ig Q0hJTkEgUE9SVC4gPC9wPg0KICAgICAgPHA+oaE8L3RkPg0KICA8L3RyPg0KICA8dHI+DQogICAg PHRkIHdpZHRoPSI1MCUiIGhlaWdodD0iMTUwIj4NCiAgICAgIDxwIGFsaWduPSJjZW50ZXIiPjxp bWcgYm9yZGVyPSIwIiBzcmM9IktBTkdMSS1DLTkwLmpwZyIgd2lkdGg9IjE0MCIgaGVpZ2h0PSIx NTAiPjwvdGQ+DQogICAgPHRkIHdpZHRoPSI1MCUiIGhlaWdodD0iMTUwIj5DLTkwJm5ic3A7Jm5i c3A7Jm5ic3A7IENPTE9SIFAuUCZuYnNwOyBTTEVFVkUgDQogICAgICA8cD4mbmJzcDtBVCBVU0Qg MC4xNzIvUEM8L3A+DQogICAgICA8cD5XRSBBTFNPJm5ic3A7IFNVUFBMWSBDLTQ1Jm5ic3A7Jm5i c3A7Jm5ic3A7IDwvcD4NCiAgICAgIDxwPjIwMFBDUyBUTyBBIENBUlRPTi4gPC90ZD4NCiAgPC90 cj4NCiAgPHRyPg0KICAgIDx0ZCB3aWR0aD0iNTAlIiBoZWlnaHQ9IjEzIj4NCiAgICAgIDxwIGFs aWduPSJjZW50ZXIiPjxpbWcgYm9yZGVyPSIwIiBzcmM9InhpbmFvbGluJTIwY2IwMS5qcGciIHdp ZHRoPSIyNzgiIGhlaWdodD0iMjgyIj48L3RkPg0KICAgIDx0ZCB3aWR0aD0iNTAlIiBoZWlnaHQ9 IjEzIj5DLTQ1Jm5ic3A7Jm5ic3A7IEFORCBDLTYwJm5ic3A7Jm5ic3A7IEJMQU5LIA0KICAgICAg TUFHTkVUSUMgQ0FTU0FUVEUgVEFQRQ0KICAgICAgPHA+Jm5ic3A7MjAwUENTIFRPIEEgQ0FSVE9O Jm5ic3A7IDwvcD4NCiAgICAgIDxwPjE4NTAwMFBDUyBUTyBBIDIwIEZUIENPTlRBSU5FUjwvdGQ+ DQogIDwvdHI+DQogIDx0cj4NCiAgICA8dGQgd2lkdGg9IjUwJSIgaGVpZ2h0PSI0MiI+DQogICAg ICA8cCBhbGlnbj0iY2VudGVyIj48aW1nIGJvcmRlcj0iMCIgc3JjPSJ4aW5hb2xpbiUyMGNlYjAy LmpwZyIgd2lkdGg9IjI3OCIgaGVpZ2h0PSIyODIiPjwvdGQ+DQogICAgPHRkIHdpZHRoPSI1MCUi IGhlaWdodD0iNDIiPiZuYnNwO0MtNjAmbmJzcDsgQU5EJm5ic3A7IEMtNDUmbmJzcDsmbmJzcDsg TE9XIA0KICAgICAgUVVBTElUWSBNQUdORVRJQyBUQVBFIC4gDQogICAgICA8cD5BVCBVU0QgMC4x MzgvUEM8L3A+DQogICAgICA8cD4yMDBQQ1MgVE8gQSBDQVJUT04uIDwvcD4NCiAgICAgIDxwPqGh PC9wPg0KICAgICAgPHA+oaE8L3RkPg0KICA8L3RyPg0KPC90YWJsZT4NCjxwPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8Zm9udCBjb2xvcj0iIzAwMDBGRiI+UkVNQVJLUzom bmJzcDsgQUxMIA0KUFJJQ0VTIEFSRSBGT1IgWU9VUiBSRUZFUkVOQ0UgT05MWSBBTkQgU1VCSkVT VCBUTyBPVVIgRklOQUwgPC9mb250PjwvcD4NCjxwPjxmb250IGNvbG9yPSIjMDAwMEZGIj4mbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgDQpDT05GSVJNQVRJT04uPC9mb250 PjwvcD4NCjxwPqGhPC9wPg0KPHA+oaE8L3A+DQo8cD6hoTwvcD4NCjxwPqGhPC9wPg0KPHA+oaE8 L3A+DQoNCjwvYm9keT4NCg0KPC9odG1sPg0K --===_LikeYe_888_2fktbfxsrujyoh From ktt21c@hananet.net Mon Feb 25 17:46:01 2002 From: ktt21c@hananet.net (Á¶È­À¯¿µ¾î) Date: Mon Feb 25 17:46:01 2002 Subject: [±¤°í]¿µ¾îµµ¹è¿ì°í ¿¥ÇǾ²¸®µµ ¹«·á·Î Message-ID:

     




 


 
±ÍÇÏÀÇ ½Â¶ô¾øÀÌ ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù. ÀúÈñȸ»ç´Â Á¤º¸Åë½ÅºÎÀÇ ¿ä±¸»çÇ×ÀÎ ¼ö½Å °ÅºÎ ÀåÄ¡¸¦ ÇÊÈ÷ ¸¶·ÃÇϰí ÀÖ½À´Ï´Ù. ±ÍÇÏÀÇ ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅͳݻóÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ È®ÀÎÇÏ¿´À¸¸ç, ±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ È®ÀεÇÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñ⠹ٶø´Ï´Ù. µ¿ÀÏÇÑ ³»¿ëÀÇ ¸ÞÀϼö½ÅÀ» °ÅºÎÇÏ½Å´Ù¸é ±ÍÇÏÀÇ Àǻ縦 Á¸ÁßÇÏ¿© »èÁ¦Ã³¸®ÇϰڽÀ´Ï´Ù. °¨»çÇÕ´Ï´Ù.

From Marcus.Brinkmann@ruhr-uni-bochum.de Mon Feb 25 20:09:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Mon Feb 25 20:09:02 2002 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C74F8BA.520BAAB5@free.fr> References: <3C74F8BA.520BAAB5@free.fr> Message-ID: <20020225190659.GA2036@212.23.136.22> On Thu, Feb 21, 2002 at 02:40:10PM +0100, Laurent Cheylus wrote: > But when I verify a signature and I have not the public key in my > keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of > "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status > with "gpgme_op_verify" ;-( Yes, that was a small thing missing in the implementation. Could you please try the following patch if that works for you? Thanks, Marcus 2002-02-25 Marcus Brinkmann * verify.c (_gpgme_verify_status_handler): Parse the args line to see if the problem is due to a missing key, and report that back to the user. Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.21 diff -u -r1.21 verify.c --- verify.c 2002/02/06 01:41:15 1.21 +++ verify.c 2002/02/25 18:49:00 @@ -191,9 +191,14 @@ break; case STATUS_ERRSIG: - ctx->result.verify->status = GPGME_SIG_STAT_ERROR; - /* FIXME: Distinguish between a regular error and a missing key. - This is encoded in the args. */ + /* The return code is the 6th argument, if it is 9, the problem + is a missing key. */ + for (p = args, i = 0; p && i < 5; i++) + p = strchr (p, ' '); + if (p && *(++p) == '9' && *(++p) == '\0') + ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; + else + ctx->result.verify->status = GPGME_SIG_STAT_ERROR; /* Store the keyID in the fpr field. */ p = ctx->result.verify->fpr; for (i = 0; i < DIM(ctx->result.verify->fpr) -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From ddcc@MIT.EDU Tue Feb 26 00:01:01 2002 From: ddcc@MIT.EDU (ddcc@MIT.EDU) Date: Tue Feb 26 00:01:01 2002 Subject: Can GPG decrypt a signed message and preserve the signature? Message-ID: I cannot seem to figure out how to decrypt a signed and encrypted message in such a way that the signature stays attached. I would need such a feature to prove to a third party that the sender actually signed a document, for example. From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 26 01:23:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 26 01:23:01 2002 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <20020226002038.GJ2036@212.23.136.22> On Sat, Feb 16, 2002 at 05:12:04PM +0100, Andreas Agorander wrote: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? As Werner said, this is a priority and will hopefully be done soon (later this week). There are some interface issues to be hashed out. > 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? Now there is :) I just checked in the necessary changes. You can access it with gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start. I have only done some rudimentary testing, a success report (or bug report ;) would be appreciated. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From rabbi@quickie.net Tue Feb 26 03:43:02 2002 From: rabbi@quickie.net (Len Sassaman) Date: Tue Feb 26 03:43:02 2002 Subject: Problems with v3 keys? Message-ID: When I try to encrypt to a certain key (I'd redacted its key ID and replaced it with 0x0000010 in the example below), I get the following error message: rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt gpg: loaded digest 2 gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) gpg: loaded digest 1 gpg: 0x00000010: skipped: unusable public key gpg: foo.txt: encryption failed: unusable public key I really don't want to provide the particular key for privacy reasons, but I know that makes debugging hard. Any idea what would trigger this error? Perhaps of use, I'm including the output of --list-packets on the key file below: rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc :public key packet: version 3, algo 1, created 781525938, expires 0 pkey[0]: [1024 bits] pkey[1]: [5 bits] :user ID packet: "Redacted (no email address in UID)" And yes, I have allow-non-selfsigned-uid in my options file. Thoughts? --Len. From j_anderson@uop.edu Tue Feb 26 06:03:02 2002 From: j_anderson@uop.edu (John Anderson) Date: Tue Feb 26 06:03:02 2002 Subject: Java + GnuPG Message-ID: <1014699635.1811.18.camel@ivory> Hi there, I have been thinking of making up a small interface between GnuPG and Java because I want to use something like that in a project I've been toying with. I was unable to find anything like this, other than Cryptix, which doesn't seem to be GPL. I found a thread on this list about problems getting Java and GnuPG to play nice together with IPC and file descriptors and such, so I decided to give it a whirl. The discussion that sparked my coding can be found here: http://lists.gnupg.org/pipermail/gnupg-devel/2002-January/006666.html I came up with a 173 line Java class that can encrypt and decrypt text strings, which can be used quite easily. I will post the code below, so that if anyone is interested they'll be able to play around with it. I look forward to any feedback and suggestions. The pertinent functions in GnuPG are: encrypt(string_to_encrypt, recipient); decrypt(string_to_decrypt, passphrase); getResult(); getError(); The ProcessStreamReader class is there to work as a small thread to gather the text that gpg spits out on its stdout and stderr file descriptors. STDERR seems to be where it puts all status text, and STDOUT is very clean, just giving the encrypted or decrypted text. The decrypt function actually puts the string_to_decrypt into a file in your system specific temporary directory, and then tells gpg to decrypt that file, because I couldn't readily see how to make gpg read both the passphrase and text to decrypt from stdin. I am running JDK 1.4.0, gpg 1.0.6 all on Debian unstable. Thanks, John Anderson PS - This stuff has worked flawlessly the few times I've tried it once completed; I make no gaurantee that it's coded very well because I did it up in a few hours. PGPMSClient.java (A start of my toy project, a GPG-based message system) ---------------- public class PGPMSClient { public static void main(String[] args) { GnuPG gpg = new GnuPG(); gpg.encrypt("The quick brown fox jumped over the lazy dog.\n", "j_anderson@uop.edu\n"); System.out.print(gpg.getResult()); // USE YOUR PASSWORD HERE... gpg.decrypt(gpg.getResult(), "YOUR_PASSWORD_HERE\n"); System.out.print(gpg.getResult()); } } GnuPG.java ---------- /* License: GPL * Author: John Anderson * Description: A small class to encrypt and decrypt text using GnuPG. */ import java.io.*; public class GnuPG { private Process p; private String gpg_result; private String gpg_err; GnuPG() { } public void encrypt(String str, String rcpt) { System.out.print("Encrypting... "); try { p = Runtime.getRuntime().exec("gpg --armor --batch --encrypt -r " + rcpt); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(str); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public void decrypt(String str, String passphrase) { File f = null; try { f = File.createTempFile("gpg-decrypt", null); FileWriter fw = new FileWriter(f); fw.write(str); fw.flush(); } catch(IOException io) { } System.out.print("Decrypting from: " + f.getAbsolutePath()); try { p = Runtime.getRuntime().exec("gpg --passphrase-fd 0 --batch --decrypt " + f.getAbsolutePath()); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(passphrase); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public String getResult() { return gpg_result; } public String getError() { return gpg_err; } } class ProcessStreamReader extends Thread { String name; StringBuffer stream; InputStreamReader in; final static int BUFFER_SIZE = 256; ProcessStreamReader(String name, InputStream in) { super(); this.name = name; this.in = new InputStreamReader(in); this.stream = new StringBuffer(); } public void run() { try { int read; char[] c = new char[BUFFER_SIZE]; while((read = in.read(c, 0, BUFFER_SIZE - 1)) > 0) { stream.append(c, 0, read); if(read < BUFFER_SIZE - 1) break; } } catch(IOException io) {} } String getString() { return stream.toString(); } } From dshaw@jabberwocky.com Tue Feb 26 06:13:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Tue Feb 26 06:13:02 2002 Subject: Problems with v3 keys? In-Reply-To: References: Message-ID: <20020226051045.GA1488@akamai.com> On Mon, Feb 25, 2002 at 06:40:49PM -0800, Len Sassaman wrote: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: > > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key > > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? [..] > And yes, I have allow-non-selfsigned-uid in my options file. The problem is the non-selfsigned uid. The allow-non-selfsigned-uid option allows you to import the key (which lets you use it to verify signatures, etc). It doesn't allow you to encrypt to it. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From disastry@saiknes.lv.NO.SPaM.NET Tue Feb 26 08:27:01 2002 From: disastry@saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Tue Feb 26 08:27:01 2002 Subject: Problems with v3 keys? Message-ID: <3C7B3719.922EAEDB@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Len Sassaman rabbi@quickie.net wrote: [snip] > I really don't want to provide the particular key for privacy reasons, but but you provided cretion time :-/ I don't think there are a lot of keys generated at the same second. > I know that makes debugging hard. Any idea what would trigger this error? > > Perhaps of use, I'm including the output of --list-packets on the key file > below: > > rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc > :public key packet: > version 3, algo 1, created 781525938, expires 0 > pkey[0]: [1024 bits] > pkey[1]: [5 bits] > :user ID packet: "Redacted (no email address in UID)" > > > And yes, I have allow-non-selfsigned-uid in my options file. try signing (or lsigning) it. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPHsarDBaTVEuJQxkEQOaSgCcDYg6Xcc6qrkX/bLxpOqiB9r+avAAnjDb I6Uyl9/CudfDHRQEioZqJJHD =44mO -----END PGP SIGNATURE----- From wk@gnupg.org Tue Feb 26 08:59:01 2002 From: wk@gnupg.org (Werner Koch) Date: Tue Feb 26 08:59:01 2002 Subject: Can GPG decrypt a signed message and preserve the signature? In-Reply-To: (ddcc@MIT.EDU's message of "Mon, 25 Feb 2002 17:59:18 -0500 (EST)") References: Message-ID: <87n0xwoeyh.fsf@alberti.gnupg.de> On Mon, 25 Feb 2002 17:59:18 -0500 (EST), ddcc said: > I cannot seem to figure out how to decrypt a signed and encrypted message > in such a way that the signature stays attached. I would need such a > feature to prove to a third party that the sender actually signed a The suggested way to do this is by using PGP/MIME in the regular mode; i.e. encapsulating the message in a multipart/signed MIME object and then wrapping this with a multipart/encrypted MIME object. Better MUAs do just this thing. IIRC, there is no instant way to do this with gpg. Well, we could add such an option of course but I can't promise you that this will happen any time soon. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From JanuszA.Urbanowicz Tue Feb 26 12:54:01 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Tue Feb 26 12:54:01 2002 Subject: Problems with v3 keys? In-Reply-To: from Len Sassaman at "Feb 25, 2002 06:40:49 pm" Message-ID: Len Sassaman wrote/napisa=B3[a]/schrieb: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: >=20 > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key >=20 > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? I got this on various occassions, in most times this is because gpg lacks IDEA support required by the key. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From foxy@free.fr Tue Feb 26 17:08:01 2002 From: foxy@free.fr (Laurent Cheylus) Date: Tue Feb 26 17:08:01 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7BB280.82B87DB9@free.fr> Hi, Marcus Brinkmann wrote : > Yes, that was a small thing missing in the implementation. Could you please try > the following patch if that works for you? Bad news, it does not work for me. I apply the patch on GPGME 0.3.3 sources and compile, but I have always "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY" :-( A++ Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From rabbi@quickie.net Tue Feb 26 19:20:01 2002 From: rabbi@quickie.net (Len Sassaman) Date: Tue Feb 26 19:20:01 2002 Subject: Problems with v3 keys? In-Reply-To: <20020226051045.GA1488@akamai.com> Message-ID: On Tue, 26 Feb 2002, David Shaw wrote: > > And yes, I have allow-non-selfsigned-uid in my options file. > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > option allows you to import the key (which lets you use it to verify > signatures, etc). It doesn't allow you to encrypt to it. Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? From dshaw@jabberwocky.com Tue Feb 26 19:30:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Tue Feb 26 19:30:01 2002 Subject: Problems with v3 keys? In-Reply-To: References: <20020226051045.GA1488@akamai.com> Message-ID: <20020226182735.GA2277@akamai.com> On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > On Tue, 26 Feb 2002, David Shaw wrote: > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > option allows you to import the key (which lets you use it to verify > > signatures, etc). It doesn't allow you to encrypt to it. > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? It's documented that way ("This only allows the import - key validation will fail and you have to check the validity of the key by other means"). The fact that --always-trust doesn't let you use such a key is certainly broken though :( David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 26 23:41:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 26 23:41:02 2002 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C7BB280.82B87DB9@free.fr> References: <3C7BB280.82B87DB9@free.fr> Message-ID: <20020226223902.GC1100@212.23.136.22> On Tue, Feb 26, 2002 at 05:06:24PM +0100, Laurent Cheylus wrote: > Marcus Brinkmann wrote : > > > Yes, that was a small thing missing in the implementation. Could you please try > > the following patch if that works for you? > > Bad news, it does not work for me. Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I am sorry about that. If you add the below diff on top of the previous diff, it should work. I did some testing now, so I am quite confident. If it doesn't work, I will need more info from you (in particular the output of gpg --status-fd 2 --verify .... and which version you are using). Thanks, Marcus Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.22 diff -u -r1.22 verify.c --- verify.c 2002/02/25 19:08:51 1.22 +++ verify.c 2002/02/26 22:39:05 @@ -193,9 +193,14 @@ case STATUS_ERRSIG: /* The return code is the 6th argument, if it is 9, the problem is a missing key. */ - for (p = args, i = 0; p && i < 5; i++) - p = strchr (p, ' '); - if (p && *(++p) == '9' && *(++p) == '\0') + for (p = args, i = 0; p && *p && i < 5; i++) + { + p = strchr (p, ' '); + if (p) + while (*p == ' ') + p++; + } + if (p && *(p++) == '9' && (*p == '\0' || *p == ' ')) ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; else ctx->result.verify->status = GPGME_SIG_STAT_ERROR; -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From dshaw@jabberwocky.com Wed Feb 27 15:32:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Wed Feb 27 15:32:02 2002 Subject: Problems with v3 keys? In-Reply-To: <20020226182735.GA2277@akamai.com> References: <20020226051045.GA1488@akamai.com> <20020226182735.GA2277@akamai.com> Message-ID: <20020227142910.GG677@akamai.com> On Tue, Feb 26, 2002 at 01:27:35PM -0500, David Shaw wrote: > On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > > On Tue, 26 Feb 2002, David Shaw wrote: > > > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > > option allows you to import the key (which lets you use it to verify > > > signatures, etc). It doesn't allow you to encrypt to it. > > > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? > > It's documented that way ("This only allows the import - key > validation will fail and you have to check the validity of the key by > other means"). > > The fact that --always-trust doesn't let you use such a key is > certainly broken though :( FYI, I just committed a fix for this. You can now use --always-trust to trust a non-selfsigned key. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From foxy@free.fr Wed Feb 27 16:01:02 2002 From: foxy@free.fr (Laurent Cheylus) Date: Wed Feb 27 16:01:02 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7CEE0B.E0D734D0@free.fr> Hi, Marcus Brinkmann wrote : > Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I > am sorry about that. If you add the below diff on top of the previous diff, it > should work. I did some testing now, so I am quite confident. Good news, your new patch works well with GPGME 0.3.3 sources and GPG 1.0.6. I have now GPGME_SIG_STAT_NOKEY status when I verify a GPG signature and I haven't public key for sign in my keyring. Thanks, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From foxy@free.fr Wed Feb 27 16:01:04 2002 From: foxy@free.fr (Laurent Cheylus) Date: Wed Feb 27 16:01:04 2002 Subject: Modify comments in GPG signature ? Message-ID: <3C7CEF17.8F0DC082@free.fr> Hi, is it possible to modify the lines "Version" and "Comment" in GPG cleartext signature with an option in command "gpg --clearsign" ? I don't want to parse the entire signature to modify these lines :-( Example : ------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Pour information voir http://www.gnupg.org will be -----BEGIN PGP SIGNATURE----- Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) Comment: See http://www.foo.org Thx, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From dshaw@jabberwocky.com Wed Feb 27 16:40:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Wed Feb 27 16:40:01 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> References: <3C7CEF17.8F0DC082@free.fr> Message-ID: <20020227153717.GI677@akamai.com> On Wed, Feb 27, 2002 at 03:37:11PM +0100, Laurent Cheylus wrote: > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? > > I don't want to parse the entire signature to modify these lines :-( > > Example : > ------- > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: Pour information voir http://www.gnupg.org > > will be > > -----BEGIN PGP SIGNATURE----- > Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) > Comment: See http://www.foo.org "Version" is hardcoded into the program. The most you can do is use --no-version to make it not appear. I suppose you could add one in later if you wanted to. "Comment" is changeable with --comment "this is my comment". David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From JanuszA.Urbanowicz Wed Feb 27 17:45:04 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Wed Feb 27 17:45:04 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> from Laurent Cheylus at "Feb 27, 2002 03:37:11 pm" Message-ID: Laurent Cheylus wrote/napisa=B3[a]/schrieb: [There is text before PGP section.] > Hi, >=20 > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? have you tried --comment option? Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From JanuszA.Urbanowicz Wed Feb 27 18:27:01 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Wed Feb 27 18:27:01 2002 Subject: problem with exporting subkeys Message-ID: Today I tried to export a secret subkey from one GPG installation to another (both run Debian Potato): Subshell:alex@FUCKUP:[~]:7:0:> gpg -a --export-secret-subkeys > subk the 'subk' file bot transferred to another machine, then I ran: Subshell:alex@syjon:[~]:100:> gpg subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Ostrze=BFenie: u=BFywana pami=EA=E6 nie jest pami=EAci=B1 bezpieczn=B1! [nothing?] Subshell:alex@syjon:[~]:101:> pgpv subk Opening file "Temporary PGP Keyfile" type binary. Copying key file to "/tmp/ptmpUWCevZ", running pgpk to process it... pgpk -a /tmp/ptmpUWCevZ Adding keys: Key ring: '/tmp/ptmpUWCevZ' Type Bits KeyID Created Expires Algorithm Use sec 1024 0x21939169 1997-09-24 ---------- DSS Sign & Encrypt sub 2048 0xA2E48564 1997-09-24 2000-12-30 Diffie-Hellman sub 2048 0x78174410 2000-03-14 ---------- Diffie-Hellman sub 1024 0x7E2E803D 2001-06-28 2003-12-31 Diffie-Hellman uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (notebook) uid Janusz A. Urbanowicz (ICM) uid Janusz A. Urbanowicz (Jabber ID) sec 1024 0x27C81BC9 1994-01-05 ---------- RSA Sign & Encrypt uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (BOFH) 2 matching keys found First question: why ALL my secret keys in the packet? I supposed only subkeys would go there. Second question: why GPG chokes on it? Subshell:alex@syjon:[~]:106:> gpg --import subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Warning: using insecure memory! gpg: read_block: read error: invalid packet gpg: import from `subk' failed: invalid keyring gpg: Total number processed: 0 Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From dshaw@jabberwocky.com Thu Feb 28 05:36:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 05:36:01 2002 Subject: problem with exporting subkeys In-Reply-To: References: Message-ID: <20020228043302.GB678@akamai.com> On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > First question: why ALL my secret keys in the packet? I supposed only > subkeys would go there. The structure of the secret primary key needs to still be there for various things to work. However, the secret parts of the key are gone. Compare the size of a --export-secret-key vs a --export-secret-subkeys. > Second question: why GPG chokes on it? Judging from the listing you posted, it seems you did --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 keys do not work with --export-secret-subkeys, and in fact cause the resulting file to be unusable. I just committed a fix which makes --export-secret-subkeys ignore v3 keys. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bobmathews@mindspring.com Thu Feb 28 08:20:01 2002 From: bobmathews@mindspring.com (Bob Mathews) Date: Thu Feb 28 08:20:01 2002 Subject: missing dsa factor Message-ID: <20020228071746.61DA49D1A@cabbit.cat> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've been looking at the factor entries that are stored in the secret ring file, and it seems that there is one missing from DSA keys. When I start with (p-1)/2 and divide off q and the other given factors, I'm still left with a large composite number. In gen_elg_prime(), prime is calculated as: 2 * q * q_factor * factor[0]..factor[n-1] + 1 But when the ret_factors array is populated, it gets: q_factor, factor[1]..factor[n] (It appears that factor[n] will always be NULL.) That leaves q and factor[0] both unknown. This behavior is in 1.0.6c, and doesn't appear to have been fixed in CVS. Should be a trivial fix. if( mode == 1 ) { (*ret_factors)[i++] = mpi_copy( q_factor ); for(; i <= n; i++ ) - (*ret_factors)[i] = mpi_copy( factors[i] ); + (*ret_factors)[i] = mpi_copy( factors[i-1] ); } Since the factors aren't currently used for anything, the missing one shouldn't hurt anything. It'll be disappointing if someone ever wants them for something, though. -bob mathews -----BEGIN PGP SIGNATURE----- Comment: What's this? http://bobmathews.home.mindspring.com/bob/ iD8DBQE8fdiwPgDecCrBEpcRAjYkAJ4lyFOvVCjUXiZO5LZs7tMzaQMe5gCdGfxT orJ8kPU1VcAkKxxtiQ71Dqg= =5Ddq -----END PGP SIGNATURE----- From wk@gnupg.org Thu Feb 28 08:53:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 28 08:53:02 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <20020227153717.GI677@akamai.com> (David Shaw's message of "Wed, 27 Feb 2002 10:37:17 -0500") References: <3C7CEF17.8F0DC082@free.fr> <20020227153717.GI677@akamai.com> Message-ID: <87g03m82rn.fsf@alberti.gnupg.de> On Wed, 27 Feb 2002 10:37:17 -0500, David Shaw said: > "Version" is hardcoded into the program. The most you can do is use > --no-version to make it not appear. I suppose you could add one in You can use sed or awk to change these lines. The header lines are not part of the signatures, they are just comments. The actiual signatures starts right behind one emty line (which must be present even if you delete all the header lines). -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From disastry@saiknes.lv.NO.SPaM.NET Thu Feb 28 11:57:01 2002 From: disastry@saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Thu Feb 28 11:57:01 2002 Subject: problem with exporting subkeys Message-ID: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > Second question: why GPG chokes on it? > > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. > > I just committed a fix which makes --export-secret-subkeys ignore v3 > keys. > David note that v3 keys also can have subkeys. OpenPGP does not forbid it. I have even seen v3 keys with subkeys. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH3vIjBaTVEuJQxkEQOL/QCeOITWEz+AtVMSOHNCA+4CLNt6IVQAn3CA oLqCCo5KYmaCVUK8zkXFEFmS =6Xvo -----END PGP SIGNATURE----- From dshaw@jabberwocky.com Thu Feb 28 14:55:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 14:55:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> References: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> Message-ID: <20020228135159.GD678@akamai.com> On Thu, Feb 28, 2002 at 12:50:05PM +0200, disastry@saiknes.lv.NO.SPaM.NET wrote: > David Shaw dshaw@jabberwocky.com wrote: > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > keys. > > David > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > I have even seen v3 keys with subkeys. Are you sure? Section 10.1 ("Transferable Public Keys") says: However, any V4 key may have subkeys, and the subkeys may be encryption-only keys, signature-only keys, or general-purpose keys. That doesn't exactly forbid it, true, but also section 11.1 ("Key structures") does not show subkeys at all in the v3 allowable format which is a stronger statement. We should construct such a key and see if any programs break with it. Where did you see it? Speaking of key versions - I spent some time looking at what versions were permitted with what a while ago and one thing that does seem to be explicitly permitted is v4 keys with v3 subkeys. I did test this and PGP supports it (though this may be accidental support). GnuPG 1.0.6 only partially supports it, but I fixed that in 1.0.7. Florian, this can give you the unchangeable expiration date that you wanted, if you're willing to accept the restrictions (RSA only, etc.) on v3 keys :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From rguerra@yahoo.com Thu Feb 28 15:06:01 2002 From: rguerra@yahoo.com (Robert Guerra) Date: Thu Feb 28 15:06:01 2002 Subject: IP: PGP products from NA a thing of the past... (fwd) Message-ID: <20020228060020.P33188-100000@trout.cpsr.org> ---------- Forwarded message ---------- Date: Thu, 28 Feb 2002 08:25:22 -0500 From: Dave Farber Reply-To: farber@cis.upenn.edu To: ip Subject: IP: PGP products from NA a thing of the past... Which raises a query. Is there a PGP-like system that works well under MAC OS X djf ------ Forwarded Message From: Stan Hanks Date: Wed, 27 Feb 2002 21:54:46 -0800 To: farber@cis.upenn.edu Subject: PGP products from NA a thing of the past... Just got this today. Grim news for those of us depending on supporting corporate Wintel users... > Date: Wed, 27 Feb 2002 15:28:35 -0800 > From: "PGP" > Reply-To: "PGP" > Subject: Important Information regarding PGP Desktop/Wireless Encryption Products > > **************************************************************** > [This message is brought to you as a subscriber to the Network > Associates or PGP websites. To unsubscribe, please follow > the instructions at the bottom of the page.] > **************************************************************** > > > February 26, 2002 > > Dear Valued Customer, > > Since October 11th of last year, we have been diligently searching to fin= d a suitable > buyer for the PGP Desktop/Wireless encryption products in order to provid= e a strong > partner for our customers. This search has not resulted in an appropriate buyer who will > continue to develop and support the products while providing value to exi= sting > customers. Therefore, the decision has been made to place our PGP Desktop/Wireless > encryption products in maintenance mode. > > The support team at Network Associates will continue to honor all support agreements > for existing PGP Desktop/Wireless customers until their date of terminati= on. However, > effective immediately Network Associates will cease new development on th= ese > products, and not sell additional licenses, services and support agreemen= ts. Once > again, we reiterate that we will continue to honor all technical support agreements for > the entire duration of the contract. > > The PGP technology and source code will remain under the control and owne= rship of > Network Associates. Other products that utilize this encryption technolog= y will remain > a part of Network Associates=92 current product portfolio and they will c= ontinue to be > developed in order to meet the security needs of both new and existing Ne= twork > Associates customers. These products currently include McAfee E-Business Server, > McAfee Desktop Firewall and McAfee VPN Client. > > We pledge to you our complete efforts to assist you through this transiti= on, and to > ensure that your experience as a customer remains positive. We continue t= o focus on > delivering to you superior technology and product solutions to help you m= eet your > business needs. Our customers are our most valuable asset, and we look fo= rward to > continuing to work in partnership with you in the future. > > > > Best Regards, > > > Sandra England > Executive Vice President of > Strategic Business Development and Research ------ End of Forwarded Message For archives see: http://www.interesting-people.org/archives/interesting-people/ From JanuszA.Urbanowicz Thu Feb 28 15:59:02 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Thu Feb 28 15:59:02 2002 Subject: problem with exporting subkeys In-Reply-To: <20020228043302.GB678@akamai.com> from David Shaw at "Feb 27, 2002 11:33:02 pm" Message-ID: David Shaw wrote/napisa=B3[a]/schrieb: > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: >=20 > > First question: why ALL my secret keys in the packet? I supposed only > > subkeys would go there. >=20 > The structure of the secret primary key needs to still be there for > various things to work. However, the secret parts of the key are > gone. Compare the size of a --export-secret-key vs a > --export-secret-subkeys. Ok. But is there a way to export a _single_ subkey? I definitely need such option. Specyfying subkey ID after --export-secret-subkeys exports all subkeys (tested). =20 > > Second question: why GPG chokes on it? >=20 > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use --export-secret-subkeys without a parameter which, I assumed, would export only subkeys, thus not affecting a legacy v3 key without one. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From dshaw@jabberwocky.com Thu Feb 28 16:44:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 16:44:01 2002 Subject: problem with exporting subkeys In-Reply-To: References: <20020228043302.GB678@akamai.com> Message-ID: <20020228154123.GF678@akamai.com> On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. One way to do it would be to export the key with all subkeys and then --edit-key and "delkey" the subkeys you don't want. > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use > --export-secret-subkeys without a parameter which, I assumed, would export > only subkeys, thus not affecting a legacy v3 key without one. That's the way it works now. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From JanuszA.Urbanowicz Thu Feb 28 16:49:02 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Thu Feb 28 16:49:02 2002 Subject: problem with exporting subkeys In-Reply-To: <20020228154123.GF678@akamai.com> from David Shaw at "Feb 28, 2002 10:41:23 am" Message-ID: David Shaw wrote/napisa=B3[a]/schrieb: > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > David Shaw wrote/napisa?[a]/schrieb: > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > >=20 > > > > First question: why ALL my secret keys in the packet? I supposed on= ly > > > > subkeys would go there. > > >=20 > > > The structure of the secret primary key needs to still be there for > > > various things to work. However, the secret parts of the key are > > > gone. Compare the size of a --export-secret-key vs a > > > --export-secret-subkeys. > >=20 > > Ok. But is there a way to export a _single_ subkey? I definitely need s= uch > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > subkeys (tested). >=20 > The single subkey isn't usable without the primary key (or rather, the > primary key minus the secret parts of the key) attached, so exporting > just a subkey won't really be helpful. One way to do it would be to > export the key with all subkeys and then --edit-key and "delkey" the > subkeys you don't want. By 'single subkey' I mean a secret subkey plus the whole data structure required to maintain it. What I mean (and I would like to be able to) is ability to be able to eport single subkeys (plus the whole stuff needed to handle them) and not all at once. I'm not sure if I'm clear enough here. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From disastry@saiknes.lv Thu Feb 28 19:55:01 2002 From: disastry@saiknes.lv (disastry@saiknes.lv) Date: Thu Feb 28 19:55:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) Message-ID: <3C7E7C82.ABA0D6AD@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > David Shaw dshaw@jabberwocky.com wrote: > > > > Second question: why GPG chokes on it? > > > > > > Judging from the listing you posted, it seems you did > > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > > keys do not work with --export-secret-subkeys, and in fact cause the > > > resulting file to be unusable. > > > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > > keys. > > > David > > > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > > I have even seen v3 keys with subkeys. > > Are you sure? yes. at lest I'm sure that such keys do exist. > Section 10.1 ("Transferable Public Keys") says: > > However, any V4 key may have subkeys, and the subkeys may be > encryption-only keys, signature-only keys, or general-purpose keys. > > That doesn't exactly forbid it, true, but also section 11.1 ("Key > structures") does not show subkeys at all in the v3 allowable format > which is a stronger statement. > > We should construct such a key and see if any programs break with it. > Where did you see it? I have one on my keyring, I put it on web page at http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc I don't remember from where I got this key, but I don't think that I generated it myself, because it have passphrase "test" (all may test keys have passphrase "a" or "12345678" :) ) but I also remember seen real (not test) key belonging to some person. I can't find it... it was RSAv3 key with Elgamal subkey. GPG allows (maybe it does not allow now, but at least older versions allowed) to add subkeys to v3 keys. > Speaking of key versions - I spent some time looking at what versions > were permitted with what a while ago and one thing that does seem to > be explicitly permitted is v4 keys with v3 subkeys. I did test this > and PGP supports it (though this may be accidental support). GnuPG > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > Florian, this can give you the unchangeable expiration date that you > wanted, if you're willing to accept the restrictions (RSA only, etc.) > on v3 keys :) > David btw, v3 subkeys are (seems to be) allowed too, section 5.5.2. Public Key Packet Formats "A version 3 public key or public subkey packet contains:" some time ago I did some experiments - added key to other key as subkey, and converted subkey to key :) it worked. test results here http://disastry.dhs.org/pgp/testkeys key subkey tstDSADSA.asc 0xA496AC49 0xCD80EA04 tstDSADSA-sub.asc 0xCD80EA04 tstRSADSA.asc 0x0FD8A43F 0xF3A46303 tstDSADSA-RSA2.asc 0xA496AC49 0x0FD8A43F __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5gFzBaTVEuJQxkEQM2xgCg8DJDWVFeW4uZS80GFWspQ83IEHAAn1/j gBeCC+4Jp6G5C0JbG4V3PkhP =TgR6 -----END PGP SIGNATURE----- From disastry@saiknes.lv Thu Feb 28 20:03:01 2002 From: disastry@saiknes.lv (disastry@saiknes.lv) Date: Thu Feb 28 20:03:01 2002 Subject: problem with exporting subkeys Message-ID: <3C7E7E68.3726253B@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. he did not asked for that. - --export-secret-subkeys exports: pubkey, fake seckey and all subkeys. I think he asked how to export: pubkey, fake seckey and ONE SELECTED subkey. well... beuckup the key, remove unwanted subkeys, do --export-secret-subkeys, restore key fom backup :) besides the single subkey IS usable without the primary key - it can be promoted to key (see my other msg). __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5h8TBaTVEuJQxkEQOe0QCfXbgjsqrCxIbTSpLcrz+BiXxg2fQAnRZT 1/LzEfMhFsFyOyBRad6sKWmg =C5n4 -----END PGP SIGNATURE----- From dshaw@jabberwocky.com Thu Feb 28 20:16:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 20:16:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E7C82.ABA0D6AD@saiknes.lv> References: <3C7E7C82.ABA0D6AD@saiknes.lv> Message-ID: <20020228191422.GA691@akamai.com> On Thu, Feb 28, 2002 at 08:52:50PM +0200, disastry@saiknes.lv wrote: > > We should construct such a key and see if any programs break with it. > > Where did you see it? > > I have one on my keyring, I put it on web page at > http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc > > I don't remember from where I got this key, but I don't think > that I generated it myself, because it have passphrase "test" > (all may test keys have passphrase "a" or "12345678" :) ) > > but I also remember seen real (not test) key belonging to some person. > I can't find it... it was RSAv3 key with Elgamal subkey. > > GPG allows (maybe it does not allow now, but at least > older versions allowed) to add subkeys to v3 keys. It still allows you, but it prints a warning "creating subkeys for v3 keys is not OpenPGP compliant". It may have warned before too. > > Speaking of key versions - I spent some time looking at what versions > > were permitted with what a while ago and one thing that does seem to > > be explicitly permitted is v4 keys with v3 subkeys. I did test this > > and PGP supports it (though this may be accidental support). GnuPG > > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > > > Florian, this can give you the unchangeable expiration date that you > > wanted, if you're willing to accept the restrictions (RSA only, etc.) > > on v3 keys :) > > btw, v3 subkeys are (seems to be) allowed too, > section 5.5.2. Public Key Packet Formats > "A version 3 public key or public subkey packet contains:" That's what I just said - one paragraph up. I can't see any really good use for it except that v3 (sub)keys have a fixed expiration date that cannot be changed in the binding self-sig. That's why I thought Florian would be interested, since he wanted that feature. I suppose it would be handy for someone who had a lot of v3 keys to gather them together into one key, but that really doesn't give you anything useful. > some time ago I did some experiments - added key to other key as subkey, > and converted subkey to key :) it worked. Yes. I tried that once as well. I was thinking it would be an interesting solution for wanting a signing subkey, but since PGP couldn't verify a signature from a signing subkey, I made my signing subkey into a regular v4 key for PGP folks. :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From dshaw@jabberwocky.com Thu Feb 28 20:25:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 20:25:02 2002 Subject: problem with exporting subkeys In-Reply-To: References: <20020228154123.GF678@akamai.com> Message-ID: <20020228192304.GB691@akamai.com> On Thu, Feb 28, 2002 at 04:40:42PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > > David Shaw wrote/napisa?[a]/schrieb: > > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > > > subkeys would go there. > > > > > > > > The structure of the secret primary key needs to still be there for > > > > various things to work. However, the secret parts of the key are > > > > gone. Compare the size of a --export-secret-key vs a > > > > --export-secret-subkeys. > > > > > > Ok. But is there a way to export a _single_ subkey? I definitely need such > > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > > subkeys (tested). > > > > The single subkey isn't usable without the primary key (or rather, the > > primary key minus the secret parts of the key) attached, so exporting > > just a subkey won't really be helpful. One way to do it would be to > > export the key with all subkeys and then --edit-key and "delkey" the > > subkeys you don't want. > > By 'single subkey' I mean a secret subkey plus the whole data structure > required to maintain it. What I mean (and I would like to be able to) is > ability to be able to eport single subkeys (plus the whole stuff needed to > handle them) and not all at once. I'm not sure if I'm clear enough here. Clear, but there is no current feature to do that. You can approximate that feature by using export-secret-subkey on the whole key and using the --edit menu on the whole key to delete any subkeys you don't want. You will end up with the empty primary key, and just the subkey you wanted to keep. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From stephane@sente.ch Fri Feb 1 17:56:02 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Fri Feb 1 17:56:02 2002 Subject: GPGME bug Message-ID: Hi, I've been playing a little bit again with gpgme, and discovered the following problem: When enumerating keys: the "secret" attribute is retrieved only if we enumerate secret keys! If we enumerate all keys, the attribute "secret" is always set to 0. I also discovered a strange thing with gpg (1.0.6): My PGP key has 2 uids; if I display them with gpg --list-secret-keys or --list-keys, main uid is not the same (swapped). About secret keys again: can a subkey be secret without the main key being secret? Consequence for gpgme is that if I retrieve only secret keys, the main uid of my PGP Key is not the same as if I retrieve all keys. I'm suspecting two other problems (I need to check again): gpgme_op_decrypt(): doesn't return an error if no valid passphrase is given gpgme_op_encrypt(): doesn't return an error if no recipient is trusted, but encrypts nothing Thanks for having written all the doc! It's been very helpful, and I could finally document a little bit the ObjC wrapper :-) Stephane From test@test.com Tue Feb 5 07:49:01 2002 From: test@test.com (test) Date: Tue Feb 5 07:49:01 2002 Subject: (no subject) Message-ID: <3c5f7fc13ca1df8a@relay2.kornet.net> (added by relay2.kornet.net)
¾È³çÇϽʴϱî?
"¿ìÀÏ»ê¾÷"ÀÔ´Ï´Ù
¸ÕÀú Çã¶ô¾øÀÌ À̱ÛÀ» ¶ç¿ö Á˼ÛÇÕ´Ï´Ù.
 
´Ù¸§ÀÌ ¾Æ´Ï¶ó ±¹³»¿¡¼­ ¼ø¼öÇÏ°Ô °³¹ßµÈ "¿ëÁ¢´ëü½ÅÁ¦Ç°'
±Ý¼Ó*ÄÜÅ©¸®Æ® Ãʰ­·Â º¸¼öÁ¢ÂøÁ¦ ¹× ³»±¸¼ºÀ̰­ÇѠƯ¼ö ¹æ½Ä ¹æ¼öÁ¦µî
½Å±â¼ú 9Á¾·ù¸¦ ¼Ò°³ÇϰíÀÚ ÇÕ´Ï´Ù.
Ư¡Àº  1.  ³²³à³ë¼Ò ´©±¸³ª ¼Õ½±°Ô »ç¿ëÇÒ ¼ö  Àִٴ°Ͱú
              2.  °¡Á¤Àº ¹°·ÐÀÌ°í °ÇÃ༳ºñ, ÁÖÅú¸¼ö, ¼±¹Úµî ´Ù¾çÇÏ°Ô »ç¿ëµÇ¸ç
              3.  ¾ÆÁÖ Àú·ÅÇÑ °¡°ÝÀ¸·Î ÆÇ¸ÅµÇ¾î  °ø»ç¹× ÀÛ¾÷º¸¼öºñ°¡
                   ¸Å¿ì ÀûÀº ºñ¿ëÀ¸·Î ÇØ°áµË´Ï´Ù... 
 
±ººÎ´ë·Î¸¸ ³³Ç°ÇÏ´ø°ÍÀ»  °ø°ø±â°üÀ̳ª,°ÇÃ༳ºñ,¼±¹Ú,
°ø°øÁÖÅÃÇÏÀÚº¸¼ö¾÷üµî ´Ù¿ëµµ·Î ³³Ç°ÀÌ µÇ°í ÀÖÀ¸¸ç,
ÀÌÁ¦´Â ¼ÒºñÀÚµé °³°³Àο¡°Ô±îÁö º¸±ÞÇϰíÀÚ ±ÛÀ» ¿Ã¸³´Ï´Ù. 
 
±×³É Áö³ªÃÄ ¹ö¸®Áö ¸¶½Ã°í Àá±ñÀÇ ½Ã°£À» ³»¼Å¼­
´õ ÀÚ¼¼ÇÑ ¼³¸í°ú ´õ ÁÁÀº »óǰÀ» ¸¸³ª½Ç¼ö ÀÖÀ» °ÍÀÔ´Ï´Ù.

´õ ±Ã±ÝÇÑ »çÇ×ÀÌ ÀÖÀ¸½Ã¸é 02) 967-6704·Î ¿¬¶ô ÁÖ¼¼¿ä
°¨»çÇÕ´Ï´Ù.
From jgre@tzi.de Tue Feb 5 11:41:01 2002 From: jgre@tzi.de (Janico Greifenberg) Date: Tue Feb 5 11:41:01 2002 Subject: Questions about GPGME Message-ID: <20020205103806.GC664@tzi.de> Hi, I tried asking this before in the users mailing list but did ot receive an answer so I'm trying it here. My questions are: - Is it possible to change the keyrings used by GPGME and how does it work? - How can I extract more information about importing keys and verifying signatures? I need to know whose key I'm importing and who signed the text. Using GPG itself I can get this information with the --status-fd option but how can I get it with GPGME? Thanks in advance Janico -- Warning! Taking anyone (especially yourself) too serious will be harmful From s.aparna@digital.com Tue Feb 5 11:56:02 2002 From: s.aparna@digital.com (Aparna, S) Date: Tue Feb 5 11:56:02 2002 Subject: GnuPG on Tru64 versions Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Hi, I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any of the flavors of Compaq Tru64 Unix. Any pointers would be greatly helpful. Thanks, Aparna. From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 5 14:17:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 5 14:17:01 2002 Subject: Questions about GPGME In-Reply-To: <20020205103806.GC664@tzi.de> References: <20020205103806.GC664@tzi.de> Message-ID: <20020205131518.GC792@212.23.136.22> On Tue, Feb 05, 2002 at 11:38:06AM +0100, Janico Greifenberg wrote: > Hi, > I tried asking this before in the users mailing list but did ot receive an > answer so I'm trying it here. Mmmh. I think I am not following that list but should. I will subscribe. However, GPGME is still in its development stage, so this is the appropriate forum anyway. > My questions are: > - Is it possible to change the keyrings used by GPGME and how does it work? No, currently the default keyrings of the crypto backend are used. We will need some way to list keys in a seperate file for some other project, but this is probably not what you mean. The question is of course what style of interface we choose for such configuration options of the crypto backend. I will think about it. > - How can I extract more information about importing keys and verifying > signatures? I need to know whose key I'm importing and who signed the > text. Using GPG itself I can get this information with the --status-fd option > but how can I get it with GPGME? After importing a key, you can get back some information about it with gpgme_op_info, I am not sure if that includes everything you need, please come back with more details if you tried it and need more. For verify, there are two functions you can invoke after a successful verification, gpgme_get_sig_status and gpgme_get_sig_key. In the CVS repository of gpgme is a manual in doc/gpgme.texi that documents these functions. Also read the README how to build it, please. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From toni@eyets.com Tue Feb 5 18:46:01 2002 From: toni@eyets.com (toni) Date: Tue Feb 5 18:46:01 2002 Subject: Hi.... Message-ID: <3C601AED.5070709@eyets.com> Hi, I would like to develop gpg in c for linux... where can i find documentation about functions, or example code? Thanks From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:15:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:15:02 2002 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020114004404.GD2449@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> Message-ID: <20020206011258.GD657@212.23.136.22> On Mon, Jan 14, 2002 at 01:44:05AM +0100, Marcus Brinkmann wrote: > 1. The pending flag is never reset and not resettable. This has been fixed by making gpgme_wait reset the pending flag. > 2. The resulting error value of the operation is not calculable via the > public interface. It is retrieved through internal interfaces. This has been fixed by adding a STATUS argument to gpgme_wait. It is now close to the semantics of waitpid. I also fixed the code to support ctx being non-NULL. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:24:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:24:01 2002 Subject: upcoming GPGME snapshot (call for last minute API requests) Message-ID: <20020206012210.GF657@212.23.136.22> Hi, if there is something that bugs you in the GPGME API, now would be a good time to tell me, so it can probably be fixed before the upcoming release of a new snapshot (around next weekend). There are some smaller things (and additions for GpgSM) I will do myself, and you don't need to remind me of anything that is on the TODO list (or was reported on the list recently), but if you want to be sure that something goes in, it is better to repeat it than to assume I took notice and rejected it. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:32:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:32:01 2002 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020206011258.GD657@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> <20020206011258.GD657@212.23.136.22> Message-ID: <20020206012946.GG657@212.23.136.22> On Wed, Feb 06, 2002 at 02:12:58AM +0100, Marcus Brinkmann wrote: > This has been fixed by adding a STATUS argument to gpgme_wait. It is now > close to the semantics of waitpid. I also fixed the code to support ctx > being non-NULL. NULL. Not non-NULL. NULL. Sorry for the confusion. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna@digital.com Wed Feb 6 09:48:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Wed Feb 6 09:48:01 2002 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Hi, I'm trying to compile GnuPG on Tru64 platform. Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? Thanks, Aparna. From marcus.brinkmann@ruhr-uni-bochum.de Wed Feb 6 11:04:01 2002 From: marcus.brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 11:04:01 2002 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Message-ID: <20020206110218.GA451@finnegan> On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus From s.aparna@digital.com Wed Feb 6 12:32:02 2002 From: s.aparna@digital.com (Aparna, S) Date: Wed Feb 6 12:32:02 2002 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. Is GPGME 0.3.0 the latest version ? Thanks, Aparna. -----Original Message----- From: Marcus Brinkmann [mailto:marcus.brinkmann@ruhr-uni-bochum.de] Sent: Wednesday, February 06, 2002 4:32 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GnuPG and GPGME version compatibility On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From marcus.brinkmann@ruhr-uni-bochum.de Wed Feb 6 14:16:01 2002 From: marcus.brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 14:16:01 2002 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> Message-ID: <20020206141404.GE451@finnegan> On Wed, Feb 06, 2002 at 04:56:20PM +0530, Aparna, S wrote: > I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. > Is GPGME 0.3.0 the latest version ? Yes. I will take a look at the time stamps later. Marcus From wk@gnupg.org Wed Feb 6 14:38:02 2002 From: wk@gnupg.org (Werner Koch) Date: Wed Feb 6 14:38:02 2002 Subject: GPGME bug In-Reply-To: (Stephane Corthesy's message of "Fri, 1 Feb 2002 17:54:12 +0100") References: Message-ID: <87pu3in39c.fsf@alberti.gnupg.de> On Fri, 1 Feb 2002 17:54:12 +0100, Stephane Corthesy said: > When enumerating keys: the "secret" attribute is retrieved only if > we enumerate secret keys! If we enumerate all keys, the attribute > "secret" is always set to 0. Correct. This _might_ change in future but you should not rely on this. If you want a listing of the secret keys you should list the secret keys (e.g. for deciding which key to use for signing). For most tasks you don't need the secret key. > I also discovered a strange thing with gpg (1.0.6): > My PGP key has 2 uids; if I display them with gpg --list-secret-keys > or --list-keys, main uid is not the same (swapped). The UIDs listed with --list-secret-keys are just for convenience. It needs a lot of code to keep them in sync with the ones on the public keyring. So the latest snapshots don't care anymore about packets on the secret keyring and instead do some merging with the public key information. > About secret keys again: can a subkey be secret without the main key > being secret? You should get away from the need to know wether a key is secret or not. The only relevant information is whether a key is capable of signing or decrypting. A secret is a secret is a secret :-) Eventually all secret key[*] handling will be done by gpg-agent and there will be no way for an application (except for special tools) to cope with a secret key. > I'm suspecting two other problems (I need to check again): > gpgme_op_decrypt(): doesn't return an error if no valid passphrase > is given > gpgme_op_encrypt(): doesn't return an error if no recipient is > trusted, but encrypts nothing Be prepared to get some errors after this has been fixed. > Thanks for having written all the doc! It's been very helpful, and I > could finally document a little bit the ObjC wrapper :-) That belongs to Marcus of course. Werner [*] When I talk about a secret key I usually mean the private keys of a public keypair. For conventional encryption a passphrase callback is still needed to automate some applications. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From bwpearre@alumni.princeton.edu Wed Feb 6 19:13:02 2002 From: bwpearre@alumni.princeton.edu (Ben Pearre) Date: Wed Feb 6 19:13:02 2002 Subject: Anderson's attack? Message-ID: <20020206131032.D21208@diverge.seunglab.mit.edu> --FFoLq8A0u+X9iRU8 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I'm sorry if this is in the archives - I looked but didn't find it. This seems like a legitimate concern: http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html Has this been addressed in GnuPG? The documentation doesn't mention whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or what. What's really going on in there? Should there be an option --both, which does sign/encrypt/sign or some such? I believe that the first time I installed PGP, there was an option in my MUA to encrypt the relevant headers, but I don't think that this is a problem that should be foisted upon the MUA developers, as no-one seems to know about this issue. Thoughts? Cheers! -Ben --=20 bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben --FFoLq8A0u+X9iRU8 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8YXGY+CWfKs/abNoRAkKrAKCwMJ4q5lMksE7vYtfR0Pg3LyUJzACg4iOu 4BqwborCXiG76d8LNV1YMVI= =ZQG1 -----END PGP SIGNATURE----- --FFoLq8A0u+X9iRU8-- From jgre@tzi.de Wed Feb 6 21:43:02 2002 From: jgre@tzi.de (Janico Greifenberg) Date: Wed Feb 6 21:43:02 2002 Subject: Questions about GPGME In-Reply-To: <20020205131518.GC792@212.23.136.22> References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> Message-ID: <20020206204004.GA5312@tzi.de> > No, currently the default keyrings of the crypto backend are used. We will > need some way to list keys in a seperate file for some other project, but > this is probably not what you mean. The question is of course what style > of interface we choose for such configuration options of the crypto backend. > I will think about it. What I would like is are functions like gpgme_set_pubkeyring(char *file); gpgme_set_seckeyring(char *file); gpgme_set_no_default_keyring(int ); or something like that simple setting the gpg options accordingly. > After importing a key, you can get back some information about it with > gpgme_op_info, I am not sure if that includes everything you need, please > come back with more details if you tried it and need more. I think that will work for me. > For verify, there are two functions you can invoke after a successful > verification, gpgme_get_sig_status and gpgme_get_sig_key. This sound good, I just can't get the verify (or decrypt_verify) working. I'm using the folling code: void Crypto::Test(char *msg) { size_t nread; int ret,cnt=0; char *buf_ptr; char str_out[MAX_DATA]; GpgmeSigStat stat; GpgmeData in, out, out2; err = gpgme_data_new_from_mem(&in,msg,strlen(msg),0); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_new ( &out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); if (err) throw CoreError(gpgme_strerror(err)); fflush (NULL); err = gpgme_data_rewind ( out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); if(err) throw CoreError(gpgme_strerror(err)); gpgme_data_release (in); gpgme_data_release (out); cout<; from bwpearre@mit.edu on Wed, Feb 06, 2002 at 01:10:32PM -0500 References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <20020206225706.O25763@mbsks.franken.de> Mahlzeit On Wed, Feb 06, 2002 at 01:10:32PM -0500, Ben Pearre wrote: > Has this been addressed in GnuPG? I don't think this is the correct location to fix this. GnuPG does sign the message. That's it. To understand this, you can look how it is done in the paper world, where the same attack is possible. The way to prevent it here is not to encode the recepient of a letter in your own signature, but to write it onto the letter. So the correct play to fix this would be IMO e.g. the MUA (mutt, etc.). This can include some header lines before signing. Or if you write a contract with some editor, you write the parties yourself into it. Mahlzeit endergone Zwiebeltuete From harmil@spamcop.net Wed Feb 6 23:47:02 2002 From: harmil@spamcop.net (Aaron Sherman) Date: Wed Feb 6 23:47:02 2002 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <1013035679.9324.239.camel@pps> On Wed, 2002-02-06 at 13:10, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? Doh! This is a classic example of a social problem being attacked on a technical level (which is pretty much doomed to failure). The idea is that T[1]=E(B[pub],S(A[priv],P)) can be transformed into T[2]=E(C[pub],D(B[priv],T[1])) and the encryption envelope will tell you nothing to refute the assertion that A told C P. To which we all respond... duh. The document goes on to possit that where P is some permutation on "sender owes recipient US$X", recipient is ambiguous and all values of T[2,...] yeild an unexpected result for A (i.e. owing money to everyone on the planet). When I'm home, I'll look up and cite the page in AC where this is gone into in some depth, but the core of the argument here is that there is something wrong with this scenario, and that the encryption envelope should be responsible for protecting the innocent but stupid. If you feel this way, feel free to write a mail-encrypting system that duplicates the message headers and includes them in the signed plaintext. That will provide no assurance that you did NOT divulge information of course, but no cryptosystem alone can ever do that (mathematically speaking nothing can ever do that, but for some specialized applications, a reasonable subset can be achived). Ok, back to the topic: this is not gnupg's problem. It should not be gnupg's problem. This is the plaintext's author's problem, as it should be. As for the argument that someone could be fired for leaking company secrets or end up owing people money because of ambiguous statements I say foey. Turn that upside down, and I can buy it: the recipient cannot prove that they were the intended target of the message without some external data source (subpeonaed mailer logs, etc) and thus cannot rely on using the signed message as evidence of a contract or disclosure unless it is internally unambiguous. Yes, this is true. It means that recipients must require that the body of a signed message must be internally unambiguous or only rely on external information which is unambiguous (e.g. "USPS PKI ID xxxx owes USPS PKI ID yyyy the balance of PayPal account zzzz"; if you trust the USPS PKI and PayPal to maintain an unambiguos resolution of these values, then this message is fine....). Ok, I'm done ranting. I'll be in my corner ;-) From rabbi@quickie.net Thu Feb 7 00:52:02 2002 From: rabbi@quickie.net (Len Sassaman) Date: Thu Feb 7 00:52:02 2002 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: This was addressed pretty thoroughly on the Cryptography list when Davis's paper first came out. Basically, the "flaws" the paper is discussing are social, not technical. The steps that can be taken on a technical level to prevent this are few. (FWIW, OpenPGP's timestamping helps this a bit.) As for your Encrypt/Sign question, I think you are asking the order in which that occurs? The signature is inside the encryption envelope. This is the proper way to do it, for privacy/traffic analysis purposes. On Wed, 6 Feb 2002, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? > > Should there be an option --both, which does sign/encrypt/sign or some > such? I believe that the first time I installed PGP, there was an > option in my MUA to encrypt the relevant headers, but I don't think > that this is a problem that should be foisted upon the MUA developers, > as no-one seems to know about this issue. > > Thoughts? > > Cheers! > -Ben > > -- > bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben > --Len. From s.aparna@digital.com Thu Feb 7 05:44:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 05:44:01 2002 Subject: Compilation error while building GnuPG Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B6@diexch01.xko.dec.com> Hi, I trying to build GnuPG on Tru64 V5.1. I'm getting the following compilation error while building the tools sources; Make: Don't know how to make -liconv. Stop. I'm curious to know if anyone has faced this problem. Thanks for any help, Aparna. From s.aparna@digital.com Thu Feb 7 13:16:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 13:16:01 2002 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Hi, I used the 'configure' command while building GPGME. I got the following warning message; checking for gpgsm... no configure: WARNING: Could not find GpgSM, install GpgSM or use --with-gpgsm=PATH to enable it I checked the site www.gnupg.org site to get information on GPGSM. I could not find any. Any pointers ? Thanks, Aparna. From wk@gnupg.org Thu Feb 7 13:43:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 13:43:02 2002 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> ("Aparna, S"'s message of "Thu, 7 Feb 2002 17:40:33 +0530") References: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Message-ID: <87u1sth3ih.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Thu Feb 7 13:53:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 13:53:02 2002 Subject: Questions about GPGME In-Reply-To: <20020206204004.GA5312@tzi.de> (jgre@tzi.de's message of "Wed, 6 Feb 2002 21:40:04 +0100") References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> <20020206204004.GA5312@tzi.de> Message-ID: <87pu3hh32r.fsf@alberti.gnupg.de> On Wed, 6 Feb 2002 21:40:04 +0100, Janico Greifenberg said: > What I would like is are functions like > gpgme_set_pubkeyring(char *file); > gpgme_set_seckeyring(char *file); > gpgme_set_no_default_keyring(int ); > or something like that simple setting the gpg options accordingly. No we can't do this as this would bind the API to one specific backend. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); You should not use strlen() here because the signed data is in binary format. Use the value you have in NREAD or force creation of an armored signature using gpgme_set_armor before you do the sign. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann@ruhr-uni-bochum.de Thu Feb 7 14:48:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Thu Feb 7 14:48:01 2002 Subject: [Marcus.Brinkmann@ruhr-uni-bochum.de: Re: Questions about GPGME] Message-ID: <20020207134537.GK1026@212.23.136.22> Mmh, forgot to CC the list. Sorry. ----- Forwarded message from Marcus Brinkmann ----- From: Marcus Brinkmann To: Janico Greifenberg Subject: Re: Questions about GPGME On Wed, Feb 06, 2002 at 09:40:04PM +0100, Janico Greifenberg wrote: > This sound good, I just can't get the verify (or decrypt_verify) working. I'm > using the folling code: I can debug it, but please send in complete (but small) examples that compile without changes (this time I pulled together my C++ knowledge and made it compilable myself). First, a general comment. You might consider wrapping the GPGME data types in C++ classes. They should fall in the C++ style of programming quite naturally. > err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); gpgme_op_verify does only support detached signatures, so you must use GPGME_SIG_MODE_DETACH if you want to verify it with gpgme afterwards. (Except if something is encrypted and signed, then you can use decrypt_verify). > err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); You should not use hard limits like that. Avoid it by using gpgme_data_release_and_get_mem, which returns a pointer to a buffer and its size. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); This is the next error. The string consists of binary and might contain binary zeroes. So you should use the size returned by gpgme_data_release_and_get_mem. Alternatively, you can gpgme_data_read the buffer and calculat > bzero(str_out,sizeof(str_out)); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_data_new(&out2); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_op_verify(ctx,in,out2,&stat); gpgme_op_verify does not take an in and an out argument, but a sig and a plain argument (signature and plaintext). Please check out the documentation in doc/gpgme.texi in the CVS repository. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de ----- End forwarded message ----- -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna@digital.com Thu Feb 7 15:30:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 15:30:01 2002 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Thanks for the information. I have another question. Where can I find the documentation for GPGME ? Thanks, Aparna. -----Original Message----- From: Werner Koch [mailto:wk@gnupg.org] Sent: Thursday, February 07, 2002 6:07 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GPGSM question On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From Marcus.Brinkmann@ruhr-uni-bochum.de Thu Feb 7 16:33:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Thu Feb 7 16:33:01 2002 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Message-ID: <20020207163033.A305@ulysses.alg.ruhr-uni-bochum.de> On Thu, Feb 07, 2002 at 07:54:51PM +0530, Aparna, S wrote: > Thanks for the information. > I have another question. > Where can I find the documentation for GPGME ? Check out the version from CVS, and run configure with the --enable-maintainer-mode, then it will be built along with gpgme. (see the README for more information, and the web site for more info how to use CVS). Thanks, Marcus From dres@cs.tu-berlin.de Thu Feb 7 20:11:01 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Thu Feb 7 20:11:01 2002 Subject: GnuPG PRNG insecure? Message-ID: <20020207200603.A28608@harry.cs.tu-berlin.de> Hello list, Recently, out of curiosity, I looked at GnuPG's random number generation and stumbled across something I think is problematic. However, I'm not a cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo random number generation. That's why I ask people here to comment on this. So read this with care; any or all of the things presented herein may be totally wrong. The problem: The problematic line that gave me headaches is in add_randomness() in random.c, where the random noise gathered by the (system dependant) different random code (rndlinux.c rndegd.c rndw32.c ..) is added to our random pool: rndpool[pool_writepos++] = *p++; The problem I see with this is, that previous data in our random pool is simply overwritten with new data. If our gathered data is already random in a cryptographically secure sense, this is not a problem per se. However, on non /dev/random systems such as win32 the system dependent random gather code simply puts much more "random" noise (gathered from lots of different sources of varying quality) into our pool, in the hope that the random pool code handles this correctly (like whitening the buffer via use of a hash function etc.). To further express this, imagine that the system-x random gatherer is asked to add x bytes of random data into our pool. The gatherer "decides" that to satisfy this demand he has to put out 2*POOLSIZE of random noise containing not-that-much entropy. After POOLSIZE bytes have been written, the code in random.c correctly whitens the buffer using RIPEMD160. However, the next POOLSIZE bytes of random data (of questionable quality) *overwrite* anything that was in the pool before, destroying the valuable accumulated entropy. (The worst case would be these last POOLSIZE bytes being all zeros.) The impact: This depends on the quality of the environmental noise gatherer used, but theoretically keys generated with GnuPG on systems lacking a good random source are at risk. The fix: As said, I'm not that experienced with PRNGs etc, but I think this would do just fine: rndpool[pool_writepos++] ^= *p++; This will also harden the PRNG against attacks on systems which *do* have a good random source (such as linux). Furthermore, already collected entropy is not simply thrown away (even if "used"), instead it is kept in full, still it is impossible to guess the current state of the pool based on the previous one (without knowledge of the actual random data). In short: this should always increase the PRNGs quality. Please Cc any replies, as I'm not subscribed. -- Stefan Keller From wk@gnupg.org Thu Feb 7 22:19:03 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 22:19:03 2002 Subject: New releases of libgcrypt, libksba and newpg Message-ID: <87u1st9er4.fsf@alberti.gnupg.de> Hi! I have just released some software for the Aegypten project. To demonstrate that we made some progress I bumbed some version numbers a bit ;-) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.6.tar.gz (618k) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.5-1.1.6.diff.gz (12k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/libksba-0.2.0.tar.gz (357k) [sorry, no diff file] ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.3.0.tar.gz (262k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.0.0-0.3.0.diff.gz (102k) There is no need to build OpenSC yet as we only have some stubs. you need to build libksba and libgcrypt prior to newpg. The major news is that gpg-agent does now operate as a daemon ("eval `gpg-agent`"), caches the passphrases and encrypts the secret keys. You may want to try the gpg-agent with the latest GnuPG CVS version which supports the new protocol - I am using this daily with Gnus. There is also some progress with certicate handling etc. Because theDirMngr has not yet been released the gpgsm option --disable-crl-checks might come handy. For more information consult http://www.gnupg.org/aegypten/ or ask on gpa-dev@gnupg.org. Have fun, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mooney@dogbert.cc.ndsu.NoDak.edu Fri Feb 8 03:12:02 2002 From: mooney@dogbert.cc.ndsu.NoDak.edu (Tim Mooney) Date: Fri Feb 8 03:12:02 2002 Subject: GnuPG on Tru64 versions In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Message-ID: In regard to: GnuPG on Tru64 versions, Aparna, S said (at 4:20pm on Feb 5,...: >I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any >of the flavors of Compaq Tru64 Unix. I had a lot of problems with the early 1.0.x versions not working correctly, but 1.0.6 seems to be much better. I haven't used it much yet, though. I compiled it using the vendor cc/ld on Tru64 5.1. Tim -- Tim Mooney mooney@dogbert.cc.ndsu.NoDak.edu Information Technology Services (701) 231-1076 (Voice) Room 242-J6, IACC Building (701) 231-8541 (Fax) North Dakota State University, Fargo, ND 58105-5164 From pgut001@cs.auckland.ac.nz Fri Feb 8 07:13:01 2002 From: pgut001@cs.auckland.ac.nz (Peter Gutmann) Date: Fri Feb 8 07:13:01 2002 Subject: GnuPG PRNG insecure? Message-ID: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> >Recently, out of curiosity, I looked at GnuPG's random number generation and >stumbled across something I think is problematic. However, I'm not a >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo >random number generation. That's why I ask people here to comment on this. So >read this with care; any or all of the things presented herein may be totally >wrong. It's a pretty accurate analysis. The flaw is worrying, but not fatal, since (assuming it accurately implements the design in http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from the mixed input of a significant portion of the pool, ie 640 bits of pool data are used for each output block. However, if user seeding is allowed it's a bit more problematic since an attacker can overwrite the pool contents with known values. The original implementation has the comment: /* Mix the incoming data into the pool. This operation is resistant to chosen- and known-input attacks because the pool contents are unknown to an attacker, so XOR'ing in known data won't help them. In an attacker could determine pool contents by observing the generator output (which is defeated by the postprocessing), we'd have to perform an extra input mixing operation to defeat these attacks */ which addresses chosen/known-input attacks (and just for the record, it does XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG doesn't allow outside control of the seeding, this isn't a big problem, but it's still something which should be fixed. Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search for that name will find further discussion on this topic. I think copying xorbytes is taking GPG's PGP compatibility a bit far :-). Peter. From wk@gnupg.org Fri Feb 8 08:33:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 08:33:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020207200603.A28608@harry.cs.tu-berlin.de> (Stefan Keller's message of "Thu, 7 Feb 2002 20:06:03 +0100") References: <20020207200603.A28608@harry.cs.tu-berlin.de> Message-ID: <87bsf0a0yp.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > The problem I see with this is, that previous data in our random > pool is simply overwritten with new data. If our gathered data is Thanks Stefan for pointing this out. As Peter already mentioned, this is not a serious flaw because an attacker is not able to mix data of his choice in. I fixed it of course. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Fri Feb 8 08:59:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 08:59:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <8766589zoj.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 19:10:18 +1300 (NZDT), Peter Gutmann said: > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from It should implement a CSPRNG as described in your 1998(?) paper. > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). What worries me most is that it needed *4 years* to figure this bug out _and_ report it. I'd have expected that some more people had a close look at those critical things. It is a very sad thing that there is so less truth in the claim that bugs in Free Software are figured out very fast - I have seen too many counterexamples :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From roam@ringlet.net Fri Feb 8 10:01:01 2002 From: roam@ringlet.net (Peter Pentchev) Date: Fri Feb 8 10:01:01 2002 Subject: Add a --fast option to --import and --recv-keys Message-ID: <20020208105758.A39499@straylight.oblivion.bg> --gBBFr7Ir9EOA20Yy Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, The attached patch adds the benefit of --import-fast to --recv-keys. The new --fast option works with both --import and --recv-keys, only importing the keys without updating the trustdb. --import-fast is still a valid option, but all it does is set the new 'fast' option and then fall back to the handling of --import. This speeds up things a *lot* when fetching multiple keys from a keyserver. Any comments on the patch are appreciated. G'luck, Peter --=20 Peter Pentchev roam@ringlet.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 What would this sentence be like if pi were 3? Index: g10/g10.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/g10.c,v retrieving revision 1.1.1.1 retrieving revision 1.3 diff -u -r1.1.1.1 -r1.3 --- g10/g10.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/g10.c 8 Feb 2002 07:33:51 -0000 1.3 @@ -208,6 +208,7 @@ oNoSigCreateCheck, oEmu3DESS2KBug, /* will be removed in 1.1 */ oEmuMDEncodeBug, + oFast, aTest }; =20 =20 @@ -406,6 +407,7 @@ { aDeleteSecretAndPublicKey, "delete-secret-and-public-key",256, "@" }, { oEmu3DESS2KBug, "emulate-3des-s2k-bug", 0, "@"}, { oEmuMDEncodeBug, "emulate-md-encode-bug", 0, "@"}, + { oFast, "fast", 0, "@" }, {0} }; =20 =20 @@ -751,8 +753,8 @@ switch( pargs.r_opt ) { case aCheckKeys: set_cmd( &cmd, aCheckKeys); break; case aListPackets: set_cmd( &cmd, aListPackets); break; + case aFastImport: opt.fast_import=3D1; /* FALLTHROUGH */ case aImport: set_cmd( &cmd, aImport); break; - case aFastImport: set_cmd( &cmd, aFastImport); break; case aSendKeys: set_cmd( &cmd, aSendKeys); break; case aRecvKeys: set_cmd( &cmd, aRecvKeys); break; case aExport: set_cmd( &cmd, aExport); break; @@ -991,6 +993,7 @@ iobuf_enable_special_filenames (1); break; case oNoExpensiveTrustChecks: opt.no_expensive_trust_checks=3D1;= break; + case oFast: opt.fast_import=3D1; break; =20 default : pargs.err =3D configfp? 1:2; break; } @@ -1370,9 +1373,8 @@ } break; =20 - case aFastImport: case aImport: - import_keys( argc? argv:NULL, argc, (cmd =3D=3D aFastImport) ); + import_keys( argc? argv:NULL, argc, opt.fast_import ); break; =20 case aExport: @@ -1385,7 +1387,7 @@ if( cmd =3D=3D aSendKeys ) hkp_export( sl ); else if( cmd =3D=3D aRecvKeys ) - hkp_import( sl ); + hkp_import( sl , opt.fast_import ); else export_pubkeys( sl, (cmd =3D=3D aExport) ); free_strlist(sl); Index: g10/hkp.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.c,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.c 8 Feb 2002 07:32:52 -0000 1.2 @@ -47,7 +47,7 @@ * or other error codes. */ int -hkp_ask_import( u32 *keyid ) +hkp_ask_import( u32 *keyid, int fast ) { struct http_context hd; char *request; @@ -85,7 +85,7 @@ : g10_errstr(rc) ); } else { - rc =3D import_keys_stream( hd.fp_read , 0 ); + rc =3D import_keys_stream( hd.fp_read , fast ); http_close( &hd ); } =20 @@ -96,7 +96,7 @@ =20 =20 int -hkp_import( STRLIST users ) +hkp_import( STRLIST users, int fast ) { if( !opt.keyserver_name ) { log_error(_("no keyserver known (use option --keyserver)\n")); @@ -114,7 +114,7 @@ * errorcounter ist not increaed and the program will return * with success - which is not good when this function is used. */ - if( hkp_ask_import( kid ) ) + if( hkp_ask_import( kid , fast ) ) log_inc_errorcount(); } return 0; Index: g10/hkp.h =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -23,7 +23,7 @@ =20 =20 int hkp_ask_import( u32 *keyid ); -int hkp_import( STRLIST users ); +int hkp_import( STRLIST users, int fast ); int hkp_export( STRLIST users ); =20 =20 Index: g10/options.h =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/options.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/options.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/options.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -103,6 +103,7 @@ int no_expensive_trust_checks; int no_sig_cache; int no_sig_create_check; + int fast_import; } opt; =20 =20 --gBBFr7Ir9EOA20Yy Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjxjkxYACgkQ7Ri2jRYZRVPbuQCfRbIW2nl+hJkgal5irMkbg+5w aqIAn2rtZZMU0fFHoxColzbdAKVSmPBP =C4jG -----END PGP SIGNATURE----- --gBBFr7Ir9EOA20Yy-- From wk@gnupg.org Fri Feb 8 11:07:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 11:07:01 2002 Subject: Add a --fast option to --import and --recv-keys In-Reply-To: <20020208105758.A39499@straylight.oblivion.bg> (Peter Pentchev's message of "Fri, 8 Feb 2002 10:57:59 +0200") References: <20020208105758.A39499@straylight.oblivion.bg> Message-ID: <878za48f88.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 10:57:59 +0200, Peter Pentchev said: > Any comments on the patch are appreciated. Thanks. However the CVS version and the 1.0.6c snapshot have a entirely revamped trustdb which is really fast compared to the old way. The one thing we have to improve is the speed of keylookup by replacing the sequential scans with an index and keeping some meta data. This is partly done but won't go into 1.0.7. Ciao, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw@jabberwocky.com Fri Feb 8 15:45:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Fri Feb 8 15:45:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <8766589zoj.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> Message-ID: <20020208144156.GD678@akamai.com> On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > What worries me most is that it needed *4 years* to figure this bug > out _and_ report it. I'd have expected that some more people had a > close look at those critical things. It is a very sad thing that > there is so less truth in the claim that bugs in Free Software are > figured out very fast - I have seen too many counterexamples :-( Make it worth their while. Netscape used to give out money for each verified bug report. We could give them some free beer to go with their free software. :) I'd be willing to throw some money into a pot for people who find security-related bugs in GnuPG. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From jas@extundo.com Fri Feb 8 20:07:01 2002 From: jas@extundo.com (Simon Josefsson) Date: Fri Feb 8 20:07:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: pgut001@cs.auckland.ac.nz (Peter Gutmann) writes: > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). Makes you wonder if this code was simply copied from PGP? What about license etc? From dres@cs.tu-berlin.de Fri Feb 8 23:46:01 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Fri Feb 8 23:46:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208233946.A16027@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:10:18PM +1300, Peter Gutmann wrote: > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. I've just read your excellent paper (wish I had access to it / read it beforehand). Mind it to explain why the flaw is not fatal? As I explained, on non /dev/random (or equivalent) systems there are often *much* more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have been put into the pool, the entropy collected with the first POOLSIZE bytes is lost. (Things would be different if GnuPG was keeping some state information of the previous pool mixing operation, such as the last digest computed or the whole hash buffer.) So if those last POOLSIZE bytes happen to contain zero entropy (or a very small amount), it doesn't matter how the output is generated; it will not contain very much randomness, and thus might be easily guessable by an attacker. However, I don't know if this does really happen. I don't know how many bytes e.g. the slow_gatherer in rndw32.c really puts out, but if it happens to be much more than POOLSIZE, the quality of the PRNG solely depends on the last POOLSIZE bytes collected. Unless, of course, I completely misunderstood things. -- Stefan Keller From sroberts@uniserve.com Sat Feb 9 01:33:02 2002 From: sroberts@uniserve.com (Sam Roberts) Date: Sat Feb 9 01:33:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208073557.A50024497@localhost> "just for the record, it does XOR the data" I guess I'm missing something, too, because it certainly looks to me like new data is assigned over data already in the pool, and my understanding was XORing known values into a pool could not DECREASE the entropy in the pool, but assigning seems to mean you'll lose some of the current contents of the pool. What am I missing, where's the XOR occuring? Thanks, Sam Quoting Peter Gutmann , who wrote: > >Recently, out of curiosity, I looked at GnuPG's random number generation and > >stumbled across something I think is problematic. However, I'm not a > >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo > >random number generation. That's why I ask people here to comment on this. So > >read this with care; any or all of the things presented herein may be totally > >wrong. > > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. > > However, if user seeding is allowed it's a bit more problematic since an > attacker can overwrite the pool contents with known values. The original > implementation has the comment: > > /* Mix the incoming data into the pool. This operation is resistant > to chosen- and known-input attacks because the pool contents are > unknown to an attacker, so XOR'ing in known data won't help them. > In an attacker could determine pool contents by observing the > generator output (which is defeated by the postprocessing), we'd > have to perform an extra input mixing operation to defeat these > attacks */ > > which addresses chosen/known-input attacks (and just for the record, it does > XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG > doesn't allow outside control of the seeding, this isn't a big problem, but > it's still something which should be fixed. > > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). > > Peter. > > > _______________________________________________ > Gnupg-devel mailing list > Gnupg-devel@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-devel -- Sam Roberts (Vivez sans temps mort!) From rabbi@quickie.net Sat Feb 9 02:20:01 2002 From: rabbi@quickie.net (Len Sassaman) Date: Sat Feb 9 02:20:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> Message-ID: On Fri, 8 Feb 2002, David Shaw wrote: > On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > > > What worries me most is that it needed *4 years* to figure this bug > > out _and_ report it. I'd have expected that some more people had a > > close look at those critical things. It is a very sad thing that > > there is so less truth in the claim that bugs in Free Software are > > figured out very fast - I have seen too many counterexamples :-( > > Make it worth their while. Netscape used to give out money for each > verified bug report. We could give them some free beer to go with > their free software. :) Exactly. Open source developers who expect free audits of their code simply because it is open are going to be disappointed, especially if they don't actively seek them. The reasons why source code must be available (from a security auditing perspective) are a) that a user can commission an audit if he wishes, and b) he is assured that the code he just had audited is the real deal, and not a "cleaned" version without back doors. --Len. From dres@cs.tu-berlin.de Sat Feb 9 03:56:02 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Sat Feb 9 03:56:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208073557.A50024497@localhost>; from sroberts@uniserve.com on Fri, Feb 08, 2002 at 07:35:58AM -0500 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208073557.A50024497@localhost> Message-ID: <20020209035130.A20792@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:35:58AM -0500, Sam Roberts wrote: > "just for the record, it does XOR the data" > > What am I missing, where's the XOR occuring? Peter was referring to "the original implementation", which I guess (after reading his paper) is the PRNG implementation in cryptlib. -- Stefan Keller From sroberts@uniserve.com Sat Feb 9 04:56:01 2002 From: sroberts@uniserve.com (Sam Roberts) Date: Sat Feb 9 04:56:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <87bsf0a0yp.fsf@alberti.gnupg.de>; from wk@gnupg.org on Fri, Feb 08, 2002 at 08:26:22AM +0100 References: <20020207200603.A28608@harry.cs.tu-berlin.de> <87bsf0a0yp.fsf@alberti.gnupg.de> Message-ID: <20020208105910.B73285669@localhost> Quoting Werner Koch , who wrote: > On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > Thanks Stefan for pointing this out. As Peter already mentioned, this > is not a serious flaw because an attacker is not able to mix data of > his choice in. I fixed it of course. Perhaps it should be fixed in the stable 1.0 branch as well? Sam -- Sam Roberts (Vivez sans temps mort!) From jsogo@debian.org Sat Feb 9 15:43:01 2002 From: jsogo@debian.org (Jose Carlos Garcia Sogo) Date: Sat Feb 9 15:43:01 2002 Subject: GPGME/jnlib includes gcrypt.h Message-ID: <20020209144104.GB2706@jaimedelamo.eu.org> --ftEhullJWpWg/VHq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello! I was trying to compile latest GPGME 0.3.1, but I have seen that jnlib_config.h includes gcrypt.h, which is not available in the GPGME tarball, and I guess it's part of libgcrypt. Do I need libgcrypt to compile GPGME? The error I get is: gcc -DHAVE_CONFIG_H -I. -I. -I.. -I../intl -g -O2 -Wall -Wcast-align -Wshadow -Wstrict-prototypes -c `test -f stringhelp.c || echo './'`stringhelp.c In file included from stringhelp.c:27: libjnlib-config.h:29: gcrypt.h: No such file or directory make[3]: *** [stringhelp.o] Error 1 Cheers,=20 Jose Carlos Garcia Sogo jsogo@debian.org --ftEhullJWpWg/VHq Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8ZTUAS+BYJZB4jhERAjC/AKCPzL+QimP/9rQyXpGqYVD5Xtn2owCdHhJf Z4KyIHFb0Sb7dXXsgf+aDm0= =N5wB -----END PGP SIGNATURE----- --ftEhullJWpWg/VHq-- From Marcus.Brinkmann@ruhr-uni-bochum.de Sat Feb 9 22:45:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sat Feb 9 22:45:01 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209144104.GB2706@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> Message-ID: <20020209214306.GB1387@212.23.136.22> On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > I was trying to compile latest GPGME 0.3.1, but I have seen that > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > tarball, and I guess it's part of libgcrypt. D'oh! I obviously never read the jnlib README, and when updating it I overwrote the local part of it (of which I wasn't aware at all). As I have libgcrypt installed, I didn't notice this. Thanks for spotting it! You can fix it by going back to the old version of the file, but I will also upload a gpgme 0.3.2. But I will wait until tomorrow, in case you find another bug. Here is a diff for you that reverts the change: Index: libjnlib-config.h =================================================================== RCS file: /cvs/gnupg/gpgme/jnlib/libjnlib-config.h,v retrieving revision 1.3 retrieving revision 1.4 diff -u -r1.3 -r1.4 --- libjnlib-config.h 2002/01/22 16:29:12 1.3 +++ libjnlib-config.h 2002/02/09 21:41:46 1.4 @@ -26,9 +26,11 @@ #ifndef LIBJNLIB_CONFIG_H #define LIBJNLIB_CONFIG_H -#include /* gcry_malloc & Cie. */ +#include "xmalloc.h" #include "logging.h" + + #ifdef USE_SIMPLE_GETTEXT int set_gettext_file( const char *filename ); const char *gettext( const char *msgid ); @@ -56,11 +58,11 @@ #endif /* !USE_SIMPLE_GETTEXT */ -#define jnlib_xmalloc(a) gcry_xmalloc( (a) ) -#define jnlib_xcalloc(a,b) gcry_xcalloc( (a), (b) ) -#define jnlib_xrealloc(a,n) gcry_xrealloc( (a), (n) ) -#define jnlib_xstrdup(a) gcry_xstrdup( (a) ) -#define jnlib_free(a) gcry_free( (a) ) +#define jnlib_xmalloc(a) xmalloc( (a) ) +#define jnlib_xcalloc(a,b) xcalloc( (a), (b) ) +#define jnlib_xrealloc(a,n) xrealloc( (a), (n) ) +#define jnlib_xstrdup(a) xstrdup( (a) ) +#define jnlib_free(a) free( (a) ) #define jnlib_log_debug log_debug #define jnlib_log_info log_info @@ -70,6 +72,4 @@ #endif /*LIBJNUTIL_CONFIG_H*/ - - -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From jsogo@debian.org Sun Feb 10 01:35:02 2002 From: jsogo@debian.org (Jose Carlos Garcia Sogo) Date: Sun Feb 10 01:35:02 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209214306.GB1387@212.23.136.22> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> Message-ID: <20020210003327.GA31140@jaimedelamo.eu.org> --SUOF0GtieIMvvwua Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable El Sat, Feb 09, 2002 at 10:43:06PM +0100, Marcus Brinkmann escrib=EDa: > On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > > I was trying to compile latest GPGME 0.3.1, but I have seen that > > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > > tarball, and I guess it's part of libgcrypt. >=20 [snip] >=20 > Thanks for spotting it! You can fix it by going back to the old version = of > the file, but I will also upload a gpgme 0.3.2. But I will wait until > tomorrow, in case you find another bug. It builds fine now. I'll wait to version 0.3.2 to upload it to Debian. Thank you. Jose Carlos Garcia Sogo jsogo@debian.org --SUOF0GtieIMvvwua Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8Zb/XS+BYJZB4jhERAtkDAKCGseLDmq2Xk0NmPxSZoMjthq0aigCfS7pv 4OCUODPeknR0cDi0ECSf74Y= =AcqW -----END PGP SIGNATURE----- --SUOF0GtieIMvvwua-- From Katie19@aol.com Sun Feb 10 09:07:01 2002 From: Katie19@aol.com (Katie19@aol.com) Date: Sun Feb 10 09:07:01 2002 Subject: Free Trial Membership Message-ID: <200202100751.XAA01350@web66.fenzi.com> Below is the result of your feedback form. It was submitted by (Katie19@aol.com) on Saturday, February 9, 2002 at 23:51:16 --------------------------------------------------------------------------- :: Just as a new version is getting ready to come out, the Macverse is up to 0.3.0 of GPGME. The wrappers have some improvements in the API, better documentation, and such. Also, it should work with GNUStep. You can find more info at: http://macgpg.sourceforge.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From Marcus.Brinkmann@ruhr-uni-bochum.de Sun Feb 10 15:00:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sun Feb 10 15:00:02 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020210003327.GA31140@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> <20020210003327.GA31140@jaimedelamo.eu.org> Message-ID: <20020210135752.GD696@212.23.136.22> On Sun, Feb 10, 2002 at 01:33:27AM +0100, Jose Carlos Garcia Sogo wrote: > It builds fine now. I'll wait to version 0.3.2 to upload it to > Debian. Thanks, I have uploaded 0.3.2. My announcement is stuck because of moderation, though. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From wk@gnupg.org Sun Feb 10 18:38:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:38:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: (Len Sassaman's message of "Fri, 8 Feb 2002 17:18:17 -0800 (PST)") References: Message-ID: <87heopkzr9.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 17:18:17 -0800 (PST), Len Sassaman said: > Exactly. Open source developers who expect free audits of their code > simply because it is open are going to be disappointed, especially if they However a lot of people try to sell this as the advantage of Free Software but the only evidence I have ever saw are counter examples. > The reasons why source code must be available (from a security auditing > perspective) are a) that a user can commission an audit if he wishes, and > b) he is assured that the code he just had audited is the real deal, and 100% agreed. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Sun Feb 10 18:48:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:48:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> (David Shaw's message of "Fri, 8 Feb 2002 09:41:56 -0500") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> Message-ID: <87d6zdkzc4.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > I'd be willing to throw some money into a pot for people who find > security-related bugs in GnuPG. The main problem is that it needs expierenced programmers to find the non trivial bugs. Those programmers are usually writing new code or fixing old one and don't have the time to screen other programs and it is not so interesting to do audits - especially not on a unpaid or low paid basis. So I don't believe that a little bit money will help. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Sun Feb 10 18:50:02 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:50:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: (Simon Josefsson's message of "Fri, 08 Feb 2002 20:04:58 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <878za1kz7j.fsf@alberti.gnupg.de> On Fri, 08 Feb 2002 20:04:58 +0100, Simon Josefsson said: > Makes you wonder if this code was simply copied from PGP? What about > license etc? *a++ = *b++ is quite a common construct in C as well as *a++ ^= *b++ The random code used by GnuPG is entirely different from the one in PGP. I wrote from the description in Peter's paper. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mb@g10code.de Sun Feb 10 21:04:03 2002 From: mb@g10code.de (Marcus Brinkmann) Date: Sun Feb 10 21:04:03 2002 Subject: [Announce] GPGME 0.3.2 released Message-ID: <20020210135606.GB696@212.23.136.22> We are pleased to announce version 0.3.2 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 579 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.2.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 9cb02a8c4c70bb291ea002e25eb8dd30 gpgme-0.3.1-0.3.2.diff.gz 987838060829be0235abc4f430cf6cd3 gpgme-0.3.1-0.3.2.diff.gz.sig a3d208a615ccbbc9ce1e31ee7f2f5fc3 gpgme-0.3.2.tar.gz f2b2f839ea4e2f15a2cbd4fafc3dbf6c gpgme-0.3.2.tar.gz.sig Noteworthy changes in version 0.3.2 (2002-02-10) ------------------------------------------------ * Remove erroneous dependency on libgcrypt in jnlib. This is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From Marcus.Brinkmann@ruhr-uni-bochum.de Sun Feb 10 21:06:04 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sun Feb 10 21:06:04 2002 Subject: [Announce] GPGME 0.3.1 released Message-ID: <20020209020628.GE3429@212.23.136.22> We are pleased to announce version 0.3.1 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 577 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.1.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are aa8f7033ac316458e100d3716ea7133b gpgme-0.3.1.tar.gz 518da3712aeeb10e5aeff7c02878c10c gpgme-0.3.1.tar.gz.sig 4cf626a2fd200b673e07e6de5979bedf gpgme-0.3.0-0.3.1.diff.gz 09e30e80bd5f834525ca65458c8b9db7 gpgme-0.3.0-0.3.1.diff.gz.sig Noteworthy changes in version 0.3.1 (2002-02-09) ------------------------------------------------ * There is a Texinfo manual documenting the API. * The gpgme_set_keylist_mode function returns an error, and changed its meaning. It is no longer usable to select between normal and fast mode (newer versions of GnuPG will always be fast), but selects between local keyring, remote keyserver, or both. For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the current setting, a fucntion gpgme_get_keylist_mode was added to retrieve the current mode. * gpgme_wait accepts a new argument STATUS to return the error status of the operation on the context. Its definition is closer to waitpid() now than before. * The LENGTH argument to gpgme_data_new_from_filepart changed its type from off_t to the unsigned size_t. * The R_HD argument to the GpgmePassphraseCb type changed its type from void* to void**. * New interface gpgme_op_trustlist_end() to match gpgme_op_keylist_end(). * The CryptPlug modules have been renamed to gpgme-openpgp and gpgme-smime, and they are installed in pkglibdir by `make install'. * An idle function can be registered with gpgme_register_idle(). * The GpgSM backend supports key generation with gpgme_op_genkey(). * Interface changes relative to the 0.3.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t. GpgmePassphraseCb CHANGED: Type of R_HD is void **. gpgme_wait CHANGED: New argument STATUS. gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError. The function has a new meaning! gpgme_get_keylist_mode NEW GPGME_KEYLIST_MODE_LOCAL NEW GPGME_KEYLIST_MODE_EXTERN NEW gpgme_op_trustlist_next NEW GpgmeIdleFunc NEW gpgme_register_idle NEW ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From wk@gnupg.org Sun Feb 10 22:06:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 22:06:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208233946.A16027@harry.cs.tu-berlin.de> (Stefan Keller's message of "Fri, 8 Feb 2002 23:39:46 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208233946.A16027@harry.cs.tu-berlin.de> Message-ID: <87n0yh2grw.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 23:39:46 +0100, Stefan Keller said: > As I explained, on non /dev/random (or equivalent) systems there are often *much* > more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have > been put into the pool, the entropy collected with the first POOLSIZE bytes is Okay, I did some tests on GNU/Linux (i383) to see how othen a mix_pool is done. For all relevant cases a mix is done not later than when ~65% of the buffer is filled; this carries more than 212 bytes state from one mix to the next. The usual case are mixes after 88 bytes right after a fast poll. But yes, the missing XOR is a serious bug which should be fixed in libgcrypt as ASAP because there we don't have a one-shot use of the application but might use the RNG under entirely different conditions. To make the implementaion more robust I will also carry a hash from the entrire pool between mixes. Thanks again, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From info@nakawe.se Mon Feb 11 10:16:01 2002 From: info@nakawe.se (Veronica Loell) Date: Mon Feb 11 10:16:01 2002 Subject: generate keys on win2k prof Message-ID: Hello, When I try to generate a key (using winpt) I get an access violation and gpg is shut down by windows. I have searched the mailing list archives etc but not found any clues to what might be the problem. I am using gpg 1.0.6 and win2k 5.00.2195 sp2 Just in case there is any information in the log file I'm enclosing it at the end of this message. Might there be some installation settings that I have not done? I have looked for information about that but not found any. I am not a memebr of this list so if there is someone that has an idea I would appreciate a cc. Thanks. Veronica Loell --------------------- logfile: --------------------- Application exception occurred: App: (pid=1092) When: 2002-02-11 @ 09:58:23.748 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: NAKAWE-PII-266 User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 3 Stepping 3 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 2 Current Type: Uniprocessor Free Registered Organization: Nakawe data Registered Owner: Veronica Loell State Dump for Thread Id 0x508 eax=a5a5a5a5 ebx=00000000 ecx=a5a5a5a5 edx=00000002 esi=024b0028 edi=c0000005 eip=77df9877 esp=0248ec64 ebp=0248ee28 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: 77df984a 399de0feffff cmp [ebp+0xfffffee0],ebx ss:0248ed08=a5a5a5a5 77df9850 7419 jz 77dffc6b 77df9852 64a118000000 mov eax,fs:[00000018] fs:00000018=???????? 77df9858 ffb5acfeffff push dword ptr [ebp+0xfffffeac] ss:0248ecd4=a5a5a5a5 77df985e 53 push ebx 77df985f 8b4030 mov eax,[eax+0x30] ds:a6947b77=???????? 77df9862 ff7018 push dword ptr [eax+0x18] ds:a6947b77=???????? 77df9865 ff150813db77 call dword ptr [77db1308] ds:77db1308=77fcb633 77df986b 8b8d04ffffff mov ecx,[ebp+0xffffff04] ss:0248ed2c=a5a5a5a5 77df9871 8b85e4feffff mov eax,[ebp+0xfffffee4] ss:0248ed0c=a5a5a5a5 FAULT ->77df9877 01481c add [eax+0x1c],ecx ds:a6947b77=???????? 77df987a 3bfb cmp edi,ebx 77df987c 0f8452010000 je 77df99d4 77df9882 399d0cffffff cmp [ebp+0xffffff0c],ebx ss:0248ed34=00000001 77df9888 7510 jnz 77e0199a 77df988a 81ffea000000 cmp edi,0xea 77df9890 745d jz 77e019ef 77df9892 81ff02010000 cmp edi,0x102 77df9898 7455 jz 77e01bef 77df989a 833d301fe07701 cmp dword ptr [77e01f30],0x1 ds:77e01f30=00000001 77df98a1 7c3e jl 77e021e1 77df98a3 89bd68ffffff mov [ebp+0xffffff68],edi ss:0248ed90=a5a5a5a5 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0248EE28 77DF7CC8 0248F164 00000000 7FFDEBF8 0248F2F0 advapi32! 0248F1B0 77DB8523 80000004 7FFDEBF8 00000000 0248F2E8 advapi32! 0248F288 77DB8B63 80000004 7FFDEBF8 0248F2E8 024F2008 advapi32!RegCloseKey 0248F2E0 004675C8 80000004 004671EC 00018000 00000000 advapi32!RegQueryValueExA 0248F3D0 00467829 00459F14 00000003 024D9E01 0046AE8B ! 0248F4A0 0045A10A 00459F14 00000003 0000012C 00000002 ! 0248F4D0 00459D49 00000003 0000012C 00000002 0046BE05 ! 0248F500 00459519 02497AD0 00000014 00000002 0046BD78 ! 0248F540 0045A81B 000000A0 00000002 00000001 02491378 ! 0248F580 0045AC3A 0248F5B0 00000400 0248F63C 00000000 ! 0248F5D0 00447384 00000011 00000400 0248F640 0248F63C ! 0248F600 0043FA21 00000011 00000400 0248F640 0248F63C ! 0248F660 00441827 00000400 024B0FD0 024B0398 02497870 ! 0248F6A0 00442FF3 00000011 00000400 024B0FD0 024B0398 ! 0248F750 00441EDC 024B4000 0248F7E0 00000008 74FC3CC0 ! 0248F790 0044265F 024B4000 00441F4D 0248F7E0 0248F948 ! 0248FCD0 004427B4 00441F4D 02496508 02496508 00402DF9 ! 0248FE00 0040606C 00000000 00000000 00000000 004034A3 ! 0248FF90 00401074 00000000 02492D7C 02495A80 0040105A ! 0248FFC0 77E97D08 0012E34C 00000002 7FFDF000 C0000005 ! 0248FFF0 00000000 00401044 00000000 000000C8 00000100 kernel32!CreateProcessW *----> Raw Stack Dump <----* 0248ec64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec84 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248eca4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecb4 a5 a5 a5 a5 a5 a5 a5 a5 - 05 00 00 c0 a5 a5 a5 a5 ................ 0248ecc4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecd4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ece4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecf4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed04 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed14 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed24 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed34 01 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed44 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed54 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed84 00 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ State Dump for Thread Id 0x608 eax=000001ec ebx=00007530 ecx=024b0f20 edx=00000000 esi=00000000 edi=00000000 eip=77f82837 esp=0714febc ebp=0714fee4 iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtRemoveIoCompletion 77f8282c b8a8000000 mov eax,0xa8 77f82831 8d542404 lea edx,[esp+0x4] ss:0803d48f=???????? 77f82835 cd2e int 2e 77f82837 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0714FEE4 77D470E6 00000074 0714FF1C 0714FF0C 0714FF14 ntdll!NtRemoveIoCompletion 0714FF20 77D5D195 00007530 0714FF60 0714FF5C 0714FF70 rpcrt4!I_RpcSetServerContextList 0714FF74 77D5D074 77D50D7F 0249CB58 00000008 0248E70C rpcrt4!NdrComplexArrayFree 0714FFA8 77D50C7A 024B5F98 0714FFEC 77E8758A 024B0F20 rpcrt4!NdrComplexArrayFree 0714FFB4 77E8758A 024B0F20 00000008 0248E70C 024B0F20 rpcrt4!RpcBindingSetOption 0714FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetFilePointer State Dump for Thread Id 0x300 eax=778321fe ebx=00000003 ecx=77db0260 edx=00000000 esi=77f8281e edi=00000003 eip=77f82829 esp=094afd24 ebp=094afd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f8281e b8e9000000 mov eax,0xe9 77f82823 8d542404 lea edx,[esp+0x4] ss:0a39d2f7=???????? 77f82827 cd2e int 2e 77f82829 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 094AFD70 77E86E1A 094AFD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects 094AFFB4 77E8758A 00000004 00000000 000B000A 024BEC60 kernel32!WaitForMultipleObjects 094AFFEC 00000000 778321FE 024BEC60 00000000 000000C8 kernel32!SetFilePointer *----> Raw Stack Dump <----* 094afd24 da 6d e8 77 03 00 00 00 - 48 fd 4a 09 01 00 00 00 .m.w....H.J..... 094afd34 00 00 00 00 00 00 00 00 - 00 00 00 00 60 ec 4b 02 ............`.K. 094afd44 01 00 00 00 08 03 00 00 - 0c 03 00 00 1c 03 00 00 ................ 094afd54 67 63 63 20 61 63 63 65 - 70 74 73 20 2d 67 2e 2e gcc accepts -g.. 094afd64 2e 20 79 65 73 0a 63 68 - 65 63 6b 69 b4 ff 4a 09 . yes.checki..J. 094afd74 1a 6e e8 77 48 fd 4a 09 - 01 00 00 00 00 00 00 00 .n.wH.J......... 094afd84 00 00 00 00 00 00 00 00 - b2 22 83 77 03 00 00 00 .........".w.... 094afd94 b0 fe 4a 09 00 00 00 00 - ff ff ff ff 60 ec 4b 02 ..J.........`.K. 094afda4 0a 00 0b 00 00 00 00 00 - 58 69 7a 65 64 20 49 53 ........Xized IS 094afdb4 43 2e 2e 2e 00 00 00 00 - 00 00 00 00 38 00 00 00 C...........8... 094afdc4 23 00 00 00 23 00 00 00 - 00 00 00 00 0a 00 0b 00 #...#........... 094afdd4 60 ec 4b 02 c8 43 f8 77 - 60 02 db 77 fe 21 83 77 `.K..C.w`..w.!.w 094afde4 00 00 00 00 32 75 e8 77 - 1b 00 00 00 00 02 00 00 ....2u.w........ 094afdf4 fc ff 4a 09 23 00 00 00 - 6e 2f 69 6e 73 74 61 6c ..J.#...n/instal 094afe04 6c 20 2d 63 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f l -c.checking fo 094afe14 72 20 6d 61 77 6b 2e 2e - 2e 20 6e 6f 0a 63 68 65 r mawk... no.che 094afe24 63 6b 69 6e 67 20 66 6f - 72 20 67 61 77 6b 2e 2e cking for gawk.. 094afe34 2e 20 6e 6f 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f . no.checking fo 094afe44 72 20 6e 61 77 6b 2e 2e - 2e 20 6e 61 77 6b 0a 63 r nawk... nawk.c 094afe54 68 65 63 6b 69 6e 67 20 - 66 6f 72 20 64 6f 63 62 hecking for docb State Dump for Thread Id 0x410 eax=77df9d61 ebx=00000102 ecx=024b62c0 edx=00000000 esi=77f827dd edi=00000000 eip=77f827e8 esp=0b50ff88 ebp=0b50ffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000286 function: NtWaitForSingleObject 77f827dd b8ea000000 mov eax,0xea 77f827e2 8d542404 lea edx,[esp+0x4] ss:0c3fd55b=???????? 77f827e6 cd2e int 2e 77f827e8 c20c00 ret 0xc 77f827eb 8b4124 mov eax,[ecx+0x24] ds:033a3892=???????? 77f827ee 39420c cmp [edx+0xc],eax ds:00eed5d2=???????? 77f827f1 0f85c9100000 jne NtQueryDefaultLocale+0x115 (77f838c0) 77f827f7 ff4208 inc dword ptr [edx+0x8] ds:00eed5d2=???????? 77f827fa 33c0 xor eax,eax 77f827fc c20400 ret 0x4 77f827ff 90 nop 77f82800 ff4a04 dec dword ptr [edx+0x4] ds:00eed5d2=???????? 77f82803 c20400 ret 0x4 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0B50FFB4 77E8758A 00000000 00000001 024B0880 00000000 ntdll!NtWaitForSingleObject 0B50FFEC 00000000 77DF9D61 00000000 00000000 00000000 kernel32 From webmaster@dialtalks.com Tue Feb 12 21:47:02 2002 From: webmaster@dialtalks.com (´ÙÀ̾óÅå) Date: Tue Feb 12 21:47:02 2002 Subject: [È«º¸] ¿¥ÇǾ²¸® Ç÷¹À̾ ¹«·á·Î µå¸³´Ï´Ù Message-ID:

     




 



±ÍÇÏÀÇ ½Â¶ô¾øÀÌ ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù. ÀúÈñȸ»ç´Â Á¤º¸Åë½ÅºÎÀÇ ¿ä±¸»çÇ×ÀÎ ¼ö½Å °ÅºÎ ÀåÄ¡¸¦ ÇÊÈ÷ ¸¶·ÃÇϰí ÀÖ½À´Ï´Ù. ±ÍÇÏÀÇ ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅͳݻóÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ È®ÀÎÇÏ¿´À¸¸ç, ±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ È®ÀεÇÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñ⠹ٶø´Ï´Ù. µ¿ÀÏÇÑ ³»¿ëÀÇ ¸ÞÀϼö½ÅÀ» °ÅºÎÇÏ½Å´Ù¸é ±ÍÇÏÀÇ Àǻ縦 Á¸ÁßÇÏ¿© »èÁ¦Ã³¸®ÇϰڽÀ´Ï´Ù. °¨»çÇÕ´Ï´Ù.

From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 13 01:58:04 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 13 01:58:04 2002 Subject: [Announce] GPGME 0.3.3 released Message-ID: <20020212231844.GW705@212.23.136.22> We are pleased to announce version 0.3.3 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 576 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.3.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 93cf2a873d7fcb23cc0ec0ec27d5235e gpgme-0.3.2-0.3.3.diff.gz.sig 94d9081fc72958b2c5ce6378fab64375 gpgme-0.3.3.tar.gz.sig 6e1e8254b3742bd71db880cb84f7b00f gpgme-0.3.2-0.3.3.diff.gz 4b012ab44b320096253559b04147b7d4 gpgme-0.3.3.tar.gz Noteworthy changes in version 0.3.3 (2002-02-12) ------------------------------------------------ * Fix the Makefile in jnlib. * Fix the test suite (hopefully). It should clean up all its state with `make check' now. As version 0.3.2, this is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From stephane@sente.ch Thu Feb 14 11:31:01 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Thu Feb 14 11:31:01 2002 Subject: gpgme key listing slowness question Message-ID: Hi, As I complainted sometime ago, gpgme key listing operations are very slow. Werner replied, the slowness is in fact due to gpg, but... I saw that gpg is invoked with the following arguments: gpg --batch --comment --status-fd 2 --no-tty --verbose --with-colons --fixed-list-mode --with-fingerprint --list-keys -- The argument which makes the operation so slow is the --verbose: wouldn't it be possible to get rid of this --verbose argument? Of course, we'd loose information about the web-of-trust, but if you simply want a list of all available keys, you don't care yet about the web-of-trust. You ask these informations once you've selected the keys you need. BTW, in previous version of gpgme there was a fast listing mode, which enabled the --no-expensive-trust-checks option; the option is no longer used now, though it was mentionned that all key listing operations are in fast mode now. Is it correct? Stephane From wk@gnupg.org Thu Feb 14 11:56:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 11:56:02 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 11:28:42 +0100") References: Message-ID: <87lmdwuyj3.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > Hi, > As I complainted sometime ago, gpgme key listing operations are very > slow. Werner replied, the slowness is in fact due to gpg, but... Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? It is worth to try. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Thu Feb 14 12:24:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 12:24:02 2002 Subject: Yet another problem with trust in 1.0.6c In-Reply-To: (Janusz A. Urbanowicz's message of "Sun, 6 Jan 2002 02:02:49 +0100 (CET)") References: Message-ID: <87eljoux8j.fsf@alberti.gnupg.de> On Sun, 6 Jan 2002 02:02:49 +0100 (CET), Janusz A Urbanowicz said: > Summary: for some encrypted and signed messages gpg in interactive mode > skips trust value check and reports the signature as fully valid, while in > batch mode the signature is reported as untrusted. Example: Ooops. Really strange code but simple to fix. This also fixes the other problem you reported. I think the problem with the trust calculation you reported for 1.0.6b has been fixed. Right? Thanks, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From stephane@sente.ch Thu Feb 14 12:44:01 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Thu Feb 14 12:44:01 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of"Thu, 14 Feb 2002 11:28:42 +0100") Message-ID: > On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > > > Hi, > > As I complainted sometime ago, gpgme key listing operations are very > > slow. Werner replied, the slowness is in fact due to gpg, but... > > Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? > It is worth to try. > > Werner No, I didn't. I use the official 1.0.6, and will continue until 1.0.7 is out (when?). If I list keys in my key ring with --verbose, it takes 50 seconds; if I don't use --verbose, it takes only... 5 seconds. Do you experiment such a gain with 1.0.6c? Stephane From wk@gnupg.org Thu Feb 14 13:46:01 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 13:46:01 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 12:41:53 +0100") References: Message-ID: <874rkkutgr.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 12:41:53 +0100, Stephane Corthesy said: > No, I didn't. I use the official 1.0.6, and will continue until > 1.0.7 is out (when?). Good question. I try to make a 1.0.6d this week. > If I list keys in my key ring with --verbose, it takes 50 seconds; > if I don't use --verbose, it takes only... 5 seconds. Do you > experiment such a gain with 1.0.6c? Ah yes. --verbose does also list all signatures and resolving the names is time consuming. As we currently ignore the key signature lines it does not make sense to use this option. I have just commited the fix to gpgme. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw@jabberwocky.com Thu Feb 14 20:40:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 14 20:40:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <87d6zdkzc4.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> Message-ID: <20020214193802.GB681@akamai.com> On Sun, Feb 10, 2002 at 06:42:51PM +0100, Werner Koch wrote: > On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > > > I'd be willing to throw some money into a pot for people who find > > security-related bugs in GnuPG. > > The main problem is that it needs expierenced programmers to find the > non trivial bugs. Those programmers are usually writing new code or > fixing old one and don't have the time to screen other programs and it > is not so interesting to do audits - especially not on a unpaid or low > paid basis. So I don't believe that a little bit money will help. Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms of auditing, a little bit of money doesn't help, but if 20 people all throw in a little bit of money... David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bwpearre@alumni.princeton.edu Thu Feb 14 21:27:02 2002 From: bwpearre@alumni.princeton.edu (Ben Pearre) Date: Thu Feb 14 21:27:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214193802.GB681@akamai.com> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> Message-ID: <20020214202519.GG10905@diverge.seunglab.mit.edu> --XRI2XbIfl/05pQwm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > of auditing, a little bit of money doesn't help, but if 20 people all > throw in a little bit of money... Money? Pshaw. Credit! There could be a command-line option --list-contributors or some such, which makes it trivial to see who has helped with the program. "...and the daring souls who found security flaws in the code:..." The key is being able to say during a job interview (OK, how many interviewers use GPG?) or a hot date (?!) "Run this command and see my name"... and have it take 10 seconds. --=20 bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben --XRI2XbIfl/05pQwm Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8bB0v+CWfKs/abNoRAvVcAKDDK9Rsm5t3NqOgmocIGY+PjJit/ACfbuSQ 92J/cMNc+4yNq0K5aatIFb4= =+H2P -----END PGP SIGNATURE----- --XRI2XbIfl/05pQwm-- From slg@ex.com Fri Feb 15 04:34:01 2002 From: slg@ex.com (Simson Garfinkel) Date: Fri Feb 15 04:34:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools Message-ID: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Greetings. I am trying to compile gnupg on MacOS X and am having a big problems. Every time I do a "./configure", I end up with a Makefile that is 0 bytes in length. Is this a known problem? [simsong@localhost gnupg-1.0.4] 313 % ./configure creating cache ./config.cache checking host system type... powerpc-apple-darwin5.2 checking target system type... powerpc-apple-darwin5.2 checking build system type... powerpc-apple-darwin5.2 checking for a BSD compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking whether make sets ${MAKE}... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for working makeinfo... missing checking for mawk... no checking for gawk... no checking for nawk... no checking for awk... awk checking which static random module to use... default checking whether use of /dev/random is requested... yes checking whether use of extensions is requested... yes checking whether assembler modules are requested... yes checking whether memory debugging is requested... no checking whether memory guard is requested... no checking whether included zlib is requested... no checking whether use of capabilities is requested... no checking whether to enable maintainer-specific portions of Makefiles... no checking whether make sets ${MAKE}... (cached) yes checking whether build environment is sane... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for gcc... gcc checking whether the C compiler (gcc ) works... yes checking whether the C compiler (gcc ) is a cross-compiler... no checking whether we are using GNU C... yes checking whether gcc accepts -g... yes checking how to run the C preprocessor... gcc -E -traditional-cpp checking for POSIXized ISC... no checking for a BSD compatible install... /usr/bin/install -c checking for mawk... (cached) awk checking for docbook-to-man... no checking for faqprog.pl... no configure: warning: *** *** It seems that the faqprog.pl program is not installed; *** however it is only needed if you want to change the FAQ. *** (faqprog.pl should be available at: *** ftp://ftp.gnupg.org/pub/gcrypt/contrib/faqprog.pl ) *** No need to worry about this warning. *** checking for BSD-compatible nm... /usr/bin/nm -p checking command to parse /usr/bin/nm -p output... no checking for _ prefix in compiled symbols... no checking for option to create PIC... none checking how to specify -export-dynamic... checking for ranlib... ranlib checking for ANSI C header files... yes checking for working const... yes checking for inline... inline checking for off_t... yes checking for size_t... yes checking for working alloca.h... no checking for alloca... yes checking for unistd.h... yes checking for getpagesize... yes checking for working mmap... no checking for argz.h... no checking for limits.h... yes checking for locale.h... yes checking for nl_types.h... no checking for malloc.h... no checking for string.h... yes checking for unistd.h... (cached) yes checking for sys/param.h... yes checking for getcwd... yes checking for munmap... yes checking for putenv... yes checking for setenv... yes checking for setlocale... yes checking for strchr... yes checking for strcasecmp... yes checking for strdup... yes checking for __argz_count... no checking for __argz_stringify... no checking for __argz_next... no checking for stpcpy... no checking for LC_MESSAGES... no checking whether NLS is requested... yes checking whether included gettext is requested... no checking for libintl.h... no checking whether catgets can be used... no checking for msgfmt... msgfmt checking for gmsgfmt... msgfmt checking for xgettext... : checking for catalogs to be installed... da de eo es_ES fr id it ja nl pl pt_BR pt_PT ru sv checking for gdbm.h... no checking for gethostbyname in -lnsl... no checking for socket in -lsocket... no checking for gethostbyname in -lnsl... (cached) no checking for dlopen in -ldl... no checking for dlopen... no checking for shl_load in -ldld... no checking for ANSI C header files... (cached) yes checking for unistd.h... (cached) yes checking for langinfo.h... no checking for termio.h... no checking for working const... (cached) yes checking for inline... (cached) inline checking for size_t... (cached) yes checking return type of signal handlers... void checking for sys_siglist declaration in signal.h or unistd.h... yes checking endianess... big checking for byte typedef... no checking for ushort typedef... yes checking for ulong typedef... no checking for u16 typedef... no checking for u32 typedef... no checking size of unsigned short... 2 checking size of unsigned int... 4 checking size of unsigned long... 4 checking size of unsigned long long... 8 checking for vprintf... yes checking for strerror... yes checking for stpcpy... (cached) no checking for strlwr... no checking for stricmp... no checking for tcgetattr... yes checking for rand... yes checking for strtoul... yes checking for mmap... yes checking for memmove... yes checking for gettimeofday... yes checking for getrusage... yes checking for gethrtime... no checking for setrlimit... yes checking for clock_gettime... no checking for memicmp... no checking for atexit... yes checking for raise... yes checking for getpagesize... (cached) yes checking for strftime... yes checking for nl_langinfo... no checking for waitpid... yes checking for wait4... yes checking for sigaction... yes checking for sigprocmask... yes checking for fopen64... no checking for fstat64... no checking for mlock... yes checking whether mlock is broken... yes checking for sys/stat.h... yes checking for unistd.h... (cached) yes checking for direct.h... no checking if mkdir takes one argument... no checking for sys/ipc.h... yes checking for sys/shm.h... yes checking whether IPC_RMID allowes subsequent attaches... no checking whether SHM_LOCK is available... no checking for random device... yes checking for linux/random.h... no checking for random device ioctl... no dynamically linked cipher modules: rndunix rndegd tiger statically linked cipher modules: rndlinux sha1 rmd160 md5 checking for mpi assembler functions... done checking for zlib.h... yes checking for deflateInit2_ in -lz... yes updating cache ./config.cache creating ./config.status creating Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating intl/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating po/Makefile.in sed: 46: conftest.s1: unescaped newline inside substitute pattern creating util/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating mpi/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating cipher/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating g10/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating doc/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating tools/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating zlib/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating checks/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating config.h linking ./intl/libgettext.h to intl/libintl.h linking ./mpi/powerpc32/mpih-add1.S to mpi/mpih-add1.S linking ./mpi/powerpc32/mpih-mul1.S to mpi/mpih-mul1.S linking ./mpi/powerpc32/mpih-mul2.S to mpi/mpih-mul2.S linking ./mpi/powerpc32/mpih-mul3.S to mpi/mpih-mul3.S linking ./mpi/powerpc32/mpih-lshift.S to mpi/mpih-lshift.S linking ./mpi/powerpc32/mpih-rshift.S to mpi/mpih-rshift.S linking ./mpi/powerpc32/mpih-sub1.S to mpi/mpih-sub1.S linking ./mpi/generic/mpi-asm-defs.h to mpi/mpi-asm-defs.h g10defs.h created [simsong@localhost gnupg-1.0.4] 314 % more Mak Makefile Makefile.am Makefile.in [simsong@localhost gnupg-1.0.4] 314 % more Makefile [simsong@localhost gnupg-1.0.4] 317 % ls -l Makefile -rw-rw-r-- 1 simsong staff 0 Feb 14 18:15 Makefile [simsong@localhost gnupg-1.0.4] 318 % From rguerra@yahoo.com Fri Feb 15 04:53:01 2002 From: rguerra@yahoo.com (Robert Guerra) Date: Fri Feb 15 04:53:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> References: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <1041280.1013727062@[192.168.1.101]> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Simson: There are some specific patches that have to be made to get GNUPG to compile on OS X.. It's all detailed on the mac GPG page at: http://macgpg.sourceforge.net/ regards, Robert - --- Robert Guerra Privaterra - Securing Human Rights A project of Computer Professionals for Social Responsibility (CPSR) - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile that > is 0 bytes in length. > > Is this a known problem? > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (Darwin) Comment: For info see http://www.gnupg.org iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 WtWVsQ4tOmQP1I2VnM5ld9M= =LoGh -----END PGP SIGNATURE----- From redbird@rbisland.cx Fri Feb 15 05:14:01 2002 From: redbird@rbisland.cx (Gordon Worley) Date: Fri Feb 15 05:14:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <12BB6722-21CA-11D6-89AD-000A27B4DEFC@rbisland.cx> On Thursday, February 14, 2002, at 06:17 PM, Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile > that is 0 bytes in length. > > Is this a known problem? So well known that we have a whole project devoted to porting it (and doing the GUI thing to make GnuPG accessible to the average Mac user). http://macgpg.sf.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From slg@ex.com Fri Feb 15 13:17:01 2002 From: slg@ex.com (Simson Garfinkel) Date: Fri Feb 15 13:17:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <1041280.1013727062@[192.168.1.101]> Message-ID: Robert, Thanks so much. Do you guys plan to integrate these patches onto the mainstream release? We're just a few months away from having the number of installed OS X machines being larger than all of the other UNIX platforms combined... -SImson On Thursday, February 14, 2002, at 10:51 PM, Robert Guerra wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Simson: > > > There are some specific patches that have to be made to get GNUPG to > compile on OS X.. > > It's all detailed on the mac GPG page at: > > http://macgpg.sourceforge.net/ > > > regards, > > Robert > > - --- > Robert Guerra > Privaterra - Securing Human Rights > > > A project of Computer Professionals for Social Responsibility (CPSR) > > > > > - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel > wrote: > >> Greetings. I am trying to compile gnupg on MacOS X and am having a big >> problems. Every time I do a "./configure", I end up with a Makefile >> that >> is 0 bytes in length. >> >> Is this a known problem? >> >> > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (Darwin) > Comment: For info see http://www.gnupg.org > > iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 > WtWVsQ4tOmQP1I2VnM5ld9M= > =LoGh > -----END PGP SIGNATURE----- From foxy@free.fr Fri Feb 15 19:10:02 2002 From: foxy@free.fr (Laurent CHEYLUS) Date: Fri Feb 15 19:10:02 2002 Subject: Format of text and signature for GPGME Message-ID: <3C6D4E89.F4634650@free.fr> Hi, I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I have some problems to verify a "PGP Signed Message" with "gpgme_op_verify" function :-( I have develop a function to extract text and PGP signature from the body of a mail message but when I try to verify this PGP signed message, I have GPGME_SIG_STAT_ERROR status or GPGME_SIG_STAT_BAD (when I have GPG key for sign in my pub keyring) but no GPGME_SIG_STAT_GOOD. My code is : static void gpg_sign_verify(gchar *text, gchar *sign) { GpgmeCtx ctx; GpgmeError err; GpgmeData sig, txt; GpgmeSigStat status; err = gpgme_new (&ctx); fail_if_err (err); gpg_sign_extract(ptr,text,sign); err = gpgme_data_new_from_mem ( &txt, text, strlen (text), 0 ); fail_if_err (err); err = gpgme_data_new_from_mem ( &sig, sign, strlen (sign), 0 ); fail_if_err (err); err = gpgme_op_verify (ctx, sig, txt, &status ); fail_if_err (err); print_sig_stat ( ctx, status ); gpgme_data_release (sig); gpgme_data_release (txt); gpgme_release (ctx); } where ptr is a char* with body of mail message. I think that I have some errors when I read text and sign datas from body. What must be the format for the PGP signed message and cleartext signature, in the "gpgme_op_verify" function ? Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this header must be suppress ? Must the signature begin with "-----BEGIN PGP SIGNATURE-----" and finsih with "-----END PGP SIGNATURE-----" ? Must these lines finish with "\n" or another caracter ? Foxy. From dshaw@jabberwocky.com Fri Feb 15 21:33:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Fri Feb 15 21:33:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214202519.GG10905@diverge.seunglab.mit.edu> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> <20020214202519.GG10905@diverge.seunglab.mit.edu> Message-ID: <20020215203021.GG679@akamai.com> On Thu, Feb 14, 2002 at 03:25:19PM -0500, Ben Pearre wrote: > > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > > of auditing, a little bit of money doesn't help, but if 20 people all > > throw in a little bit of money... > > Money? Pshaw. Credit! There could be a command-line option > --list-contributors or some such, which makes it trivial to see who > has helped with the program. "...and the daring souls who found > security flaws in the code:..." > > The key is being able to say during a job interview (OK, how many > interviewers use GPG?) or a hot date (?!) "Run this command and see my > name"... and have it take 10 seconds. Heh. Good point. It would be far easier than saying "Go look at the AUTHORS file"... :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Bluefire@bluefire.nu Sat Feb 16 16:13:01 2002 From: Bluefire@bluefire.nu (Andreas Agorander) Date: Sat Feb 16 16:13:01 2002 Subject: Two questions about GPGME Message-ID: <200202161516.g1GFGOK32016@mail.space2u.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi! There is some parts of GPG functionality that I haven't found out how to access through GPGME: 1. Looking through the documentation it seems like only detached signatures can be verified by GPGME, is there any possibility to verify a clearsigned message directly, or do I have to "separate" the signature from the message? 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? gpgme_op_decrypt_verify only works for me for such messages, eg. messages I first sign and then encrypt don't get their signatures recognized the same way, and as far as I can see there is no way of doing the combination directly... If this isn't implemented, is it on the TODO? /Andreas Agorander -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8boTUUhUH0wIHC6cRAg6HAJ4wJlKOF5i39jHsC5bGS+MAlLd/0QCg+3k+ 3oyBVGOtvwRShkHLwfzCUKA= =tJXQ -----END PGP SIGNATURE----- From wk@gnupg.org Sun Feb 17 12:38:02 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 17 12:38:02 2002 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> (Andreas Agorander's message of "Sat, 16 Feb 2002 17:12:04 +0100") References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <87n0y81j9k.fsf@alberti.gnupg.de> On Sat, 16 Feb 2002 17:12:04 +0100, Andreas Agorander said: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? Marcus and I are sitting here on the floor at the F.SDEM and just figured out that there is something missing. > If this isn't implemented, is it on the TODO? Yes, it is important and will be addressed soon. We probably have to change the verify API :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann@ruhr-uni-bochum.de Mon Feb 18 15:28:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Mon Feb 18 15:28:01 2002 Subject: Format of text and signature for GPGME In-Reply-To: <3C6D4E89.F4634650@free.fr> References: <3C6D4E89.F4634650@free.fr> Message-ID: <20020218142542.GF801@212.23.136.22> On Fri, Feb 15, 2002 at 07:08:09PM +0100, Laurent CHEYLUS wrote: > I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I > have some problems to verify a "PGP Signed Message" with > "gpgme_op_verify" function :-( Your problems are very likely the extraction of the correct plain text of the e-mail. You should read the relevant standard (rfc2015) to get all the details how to compose and decompose OpenPGP MIME messages. > My code is : Your code seems to be fine. > What must be the format for the PGP signed message and cleartext > signature, in the "gpgme_op_verify" function ? The same as for gpg on the command line. > Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this > header must be suppress ? Oha. That is not a MIME message, but an older format. I am not sure we support that in GPGME right now. I could only make it work here by sending the whole body to gpg, but we only support detached format right now. This will be fixed soon, though. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From foxy@free.fr Thu Feb 21 14:42:01 2002 From: foxy@free.fr (Laurent Cheylus) Date: Thu Feb 21 14:42:01 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C74F8BA.520BAAB5@free.fr> Hi, when I use the function "gpgme_op_verify" to verify GPG signature with a text message, I have the status "GPGME_SIG_STAT_GOOD" :-) when the public key for signature is in my keyring. But when I verify a signature and I have not the public key in my keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status with "gpgme_op_verify" ;-( Thx, Foxy. From dongsun2000@yahoo.co.kr Sat Feb 23 09:32:02 2002 From: dongsun2000@yahoo.co.kr (»ê¾ÇÀÎŬ·´¼îÇÎ) Date: Sat Feb 23 09:32:02 2002 Subject: [Á¤º¸] ·¹Àú,µî»ê¿ëǰ Àü¹® °øµ¿±¸¸Å »çÀÌÆ®¸¦ ¾Ë·Áµå¸²´Ï´Ù.^^ Message-ID: Untitled Document
 

>> ¼îÇθô »õ ´ÜÀå °æÇ°À» µå¸³´Ï´Ù.

>> 3¸¸¿ø ÀÌ»ó ±¸¸Å½Ã 1~2ÀÎ¿ë ¼­¸Óºí¶ûÄÏ¸ÅÆ® ÁõÁ¤

>> Çã¶ô¾øÀÌ ¸ÞÀÏÀ» º¸³» Á˼ÛÇÕ´Ï´Ù. º» ¸ÞÀÏÀº 1ȸ¼ºÀÔ´Ï´Ù.

>> ±ÍÇÏÀÇ ¸ÞÀÏÁÖ¼Ò´Â À¥¼­Çΰúȸ¿øÀÇ ÃßõÀ¸·Î ¾Ë°Ô µÇ¾úÀ¸¸ç,¸ÞÀϿܿ¡ ¾î¶°ÇÑ

>> Á¤º¸µµ ¾ø½À´Ï´Ù.

<¼ö½Å°ÅºÎ>

From kanglitape@hentaisonic.com Mon Feb 25 07:40:10 2002 From: kanglitape@hentaisonic.com (kanglitape@hentaisonic.com) Date: Mon Feb 25 07:40:10 2002 Subject: sell tansistors and diode Message-ID: --===_LikeYe_888_2fktbfxsrujyoh Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable HENTAISONIC-TRANSISTOR CO =2E LTD INTERNATIONAL ELECTRINICS BUILDING YINGBIN ROAD 75 CHANGSHA =2E P=2ER=2E CHINA TEL-0086731-2232933 FAX=2C 0086731-4429472 MOBILE 1300-7497167 EMAIL=3A jjwfa=40public=2Ecs=2Ehn=2Ecn DEAR SIR WE ARE HENTAISONIC-TRANSISTOR CO=2E LTD FOUNDED IM 1990 WE HAVE 15 PRODUCTION LINES TO-3=2C TO-66=2C TO-3P TO-220=2C TO-202=2C TO-126=2C TO-220F TO-3PML=2C TO-3PL=2C TOP-3Fa =2C TO-3P=28I=29=2C TO-247=2C TO-3P MT-100=2C MT-200 WITH LASER OEM PRINT MARKING=2E OUR ITEMS COVER 5600 AS FOLLOWS 2N SERIERS 2SA SERIERS 2SB SERIERS 3SC SERIERS 2SD SERIERS BD SERIERS BU=2FBUD=2FBUF=2FBUH=2FBUL=2FBUP=2FBUR=2FBUS=2FBUT=2FBUV=2FBUW=2FBUX=2FBUY SERIERS TIP SERIERS S SERIERS MJ=2FMJE SERIERS PLEASE SEE OUR WEBSITE www=2Ehentaisonic=2Ecom=2Ftransistor we are willing to cooperate with you=2E best regards wangjin --===_LikeYe_888_2fktbfxsrujyoh Content-Type: application/octet-stream; name="audio tape.htm" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="audio tape.htm" PGh0bWw+DQoNCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1MYW5ndWFnZSIgY29u dGVudD0iemgtY24iPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0 ZXh0L2h0bWw7IGNoYXJzZXQ9Z2IyMzEyIj4NCjxtZXRhIG5hbWU9IkdFTkVSQVRPUiIgY29udGVu dD0iTWljcm9zb2Z0IEZyb250UGFnZSA0LjAiPg0KPG1ldGEgbmFtZT0iUHJvZ0lkIiBjb250ZW50 PSJGcm9udFBhZ2UuRWRpdG9yLkRvY3VtZW50Ij4NCjx0aXRsZT5CTEFOSyBBVURJTyBDQVNTRVRU RSBNQUdORVRJQyBUQVBFPC90aXRsZT4NCjwvaGVhZD4NCg0KPGJvZHkgYmdjb2xvcj0iIzAwRkZG RiI+DQoNCjxwPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyANCjxmb250IGZhY2U9IkFyaWFsIEJsYWNrIiBjb2xvcj0i I0ZGMDAwMCI+QkxBTksgQVVESU8gQ0FTU0VUVEUgTUFHTkVUSUMgVEFQRS4gPC9mb250PjwvcD4N Cjx0YWJsZSBib3JkZXI9IjEiIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjQ4NyI+DQogIDx0cj4NCiAg ICA8dGQgd2lkdGg9IjUwJSIgaGVpZ2h0PSIyNTgiPg0KICAgICAgPHAgYWxpZ249ImNlbnRlciI+ PGltZyBib3JkZXI9IjAiIHNyYz0ia2FuZ2xpJTIwdHgtNjAuanBnIiB3aWR0aD0iMTgwIiBoZWln aHQ9IjExNCI+PC9wPg0KICAgICAgPHAgYWxpZ249ImNlbnRlciI+Qy02MDwvdGQ+DQogICAgPHRk IHdpZHRoPSI1MCUiIGhlaWdodD0iMjU4Ij5UUkFOU1BBUkVOVCBCT1guICsgNjAgTUlOVVRFJm5i c3A7IE1BR05FVElDIA0KICAgICAgVEFQRSANCiAgICAgIDxwPklOU0lERSBUSEUgQ0FTRSArIGNv bG9yIHAucCBzbGVldmU8L3A+DQogICAgICA8cD5hbHNvIHlvdXIgb3duIGxvZ28gY2FuIGJlIHBy aW50ZWQgb24gdGhlIHAucCBwYXBlciAuIDwvcD4NCiAgICAgIDxwPiZuYnNwOzIwMHBjcyB0byBh IGNhcnRvbi48L3A+DQogICAgICA8cD4mbmJzcDtwcmljZS4mbmJzcDsmbmJzcDsgc3VwaW9yJm5i c3A7IGF0IHVzZCAwLjE2Mi9wYzwvcD4NCiAgICAgIDxwPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyBjb25tbW9uLiBhdCB1c2QgMC4xNTIvcGMmbmJzcDsgDQogICAgICBmb2Im bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgY2hpbmEgcG9ydDwvcD4N CiAgICAgIDxwPiZuYnNwO05BS0VEJm5ic3A7IEEgQ0FTRSBXSVRIIDYwIE1JTlVURVMgT0YgTUFH TkVUSUMgVEFQRSArIFRSQU5QQVJFTlQgDQogICAgICBCT1guIEFUIFVTRCAwLjEzNS9QQyBGT0Ig Q0hJTkEgUE9SVC4gPC9wPg0KICAgICAgPHA+oaE8L3RkPg0KICA8L3RyPg0KICA8dHI+DQogICAg PHRkIHdpZHRoPSI1MCUiIGhlaWdodD0iMTUwIj4NCiAgICAgIDxwIGFsaWduPSJjZW50ZXIiPjxp bWcgYm9yZGVyPSIwIiBzcmM9IktBTkdMSS1DLTkwLmpwZyIgd2lkdGg9IjE0MCIgaGVpZ2h0PSIx NTAiPjwvdGQ+DQogICAgPHRkIHdpZHRoPSI1MCUiIGhlaWdodD0iMTUwIj5DLTkwJm5ic3A7Jm5i c3A7Jm5ic3A7IENPTE9SIFAuUCZuYnNwOyBTTEVFVkUgDQogICAgICA8cD4mbmJzcDtBVCBVU0Qg MC4xNzIvUEM8L3A+DQogICAgICA8cD5XRSBBTFNPJm5ic3A7IFNVUFBMWSBDLTQ1Jm5ic3A7Jm5i c3A7Jm5ic3A7IDwvcD4NCiAgICAgIDxwPjIwMFBDUyBUTyBBIENBUlRPTi4gPC90ZD4NCiAgPC90 cj4NCiAgPHRyPg0KICAgIDx0ZCB3aWR0aD0iNTAlIiBoZWlnaHQ9IjEzIj4NCiAgICAgIDxwIGFs aWduPSJjZW50ZXIiPjxpbWcgYm9yZGVyPSIwIiBzcmM9InhpbmFvbGluJTIwY2IwMS5qcGciIHdp ZHRoPSIyNzgiIGhlaWdodD0iMjgyIj48L3RkPg0KICAgIDx0ZCB3aWR0aD0iNTAlIiBoZWlnaHQ9 IjEzIj5DLTQ1Jm5ic3A7Jm5ic3A7IEFORCBDLTYwJm5ic3A7Jm5ic3A7IEJMQU5LIA0KICAgICAg TUFHTkVUSUMgQ0FTU0FUVEUgVEFQRQ0KICAgICAgPHA+Jm5ic3A7MjAwUENTIFRPIEEgQ0FSVE9O Jm5ic3A7IDwvcD4NCiAgICAgIDxwPjE4NTAwMFBDUyBUTyBBIDIwIEZUIENPTlRBSU5FUjwvdGQ+ DQogIDwvdHI+DQogIDx0cj4NCiAgICA8dGQgd2lkdGg9IjUwJSIgaGVpZ2h0PSI0MiI+DQogICAg ICA8cCBhbGlnbj0iY2VudGVyIj48aW1nIGJvcmRlcj0iMCIgc3JjPSJ4aW5hb2xpbiUyMGNlYjAy LmpwZyIgd2lkdGg9IjI3OCIgaGVpZ2h0PSIyODIiPjwvdGQ+DQogICAgPHRkIHdpZHRoPSI1MCUi IGhlaWdodD0iNDIiPiZuYnNwO0MtNjAmbmJzcDsgQU5EJm5ic3A7IEMtNDUmbmJzcDsmbmJzcDsg TE9XIA0KICAgICAgUVVBTElUWSBNQUdORVRJQyBUQVBFIC4gDQogICAgICA8cD5BVCBVU0QgMC4x MzgvUEM8L3A+DQogICAgICA8cD4yMDBQQ1MgVE8gQSBDQVJUT04uIDwvcD4NCiAgICAgIDxwPqGh PC9wPg0KICAgICAgPHA+oaE8L3RkPg0KICA8L3RyPg0KPC90YWJsZT4NCjxwPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8Zm9udCBjb2xvcj0iIzAwMDBGRiI+UkVNQVJLUzom bmJzcDsgQUxMIA0KUFJJQ0VTIEFSRSBGT1IgWU9VUiBSRUZFUkVOQ0UgT05MWSBBTkQgU1VCSkVT VCBUTyBPVVIgRklOQUwgPC9mb250PjwvcD4NCjxwPjxmb250IGNvbG9yPSIjMDAwMEZGIj4mbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgDQpDT05GSVJNQVRJT04uPC9mb250 PjwvcD4NCjxwPqGhPC9wPg0KPHA+oaE8L3A+DQo8cD6hoTwvcD4NCjxwPqGhPC9wPg0KPHA+oaE8 L3A+DQoNCjwvYm9keT4NCg0KPC9odG1sPg0K --===_LikeYe_888_2fktbfxsrujyoh From ktt21c@hananet.net Mon Feb 25 17:46:01 2002 From: ktt21c@hananet.net (Á¶È­À¯¿µ¾î) Date: Mon Feb 25 17:46:01 2002 Subject: [±¤°í]¿µ¾îµµ¹è¿ì°í ¿¥ÇǾ²¸®µµ ¹«·á·Î Message-ID:

     




 


 
±ÍÇÏÀÇ ½Â¶ô¾øÀÌ ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù. ÀúÈñȸ»ç´Â Á¤º¸Åë½ÅºÎÀÇ ¿ä±¸»çÇ×ÀÎ ¼ö½Å °ÅºÎ ÀåÄ¡¸¦ ÇÊÈ÷ ¸¶·ÃÇϰí ÀÖ½À´Ï´Ù. ±ÍÇÏÀÇ ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅͳݻóÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ È®ÀÎÇÏ¿´À¸¸ç, ±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ È®ÀεÇÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñ⠹ٶø´Ï´Ù. µ¿ÀÏÇÑ ³»¿ëÀÇ ¸ÞÀϼö½ÅÀ» °ÅºÎÇÏ½Å´Ù¸é ±ÍÇÏÀÇ Àǻ縦 Á¸ÁßÇÏ¿© »èÁ¦Ã³¸®ÇϰڽÀ´Ï´Ù. °¨»çÇÕ´Ï´Ù.

From Marcus.Brinkmann@ruhr-uni-bochum.de Mon Feb 25 20:09:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Mon Feb 25 20:09:02 2002 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C74F8BA.520BAAB5@free.fr> References: <3C74F8BA.520BAAB5@free.fr> Message-ID: <20020225190659.GA2036@212.23.136.22> On Thu, Feb 21, 2002 at 02:40:10PM +0100, Laurent Cheylus wrote: > But when I verify a signature and I have not the public key in my > keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of > "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status > with "gpgme_op_verify" ;-( Yes, that was a small thing missing in the implementation. Could you please try the following patch if that works for you? Thanks, Marcus 2002-02-25 Marcus Brinkmann * verify.c (_gpgme_verify_status_handler): Parse the args line to see if the problem is due to a missing key, and report that back to the user. Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.21 diff -u -r1.21 verify.c --- verify.c 2002/02/06 01:41:15 1.21 +++ verify.c 2002/02/25 18:49:00 @@ -191,9 +191,14 @@ break; case STATUS_ERRSIG: - ctx->result.verify->status = GPGME_SIG_STAT_ERROR; - /* FIXME: Distinguish between a regular error and a missing key. - This is encoded in the args. */ + /* The return code is the 6th argument, if it is 9, the problem + is a missing key. */ + for (p = args, i = 0; p && i < 5; i++) + p = strchr (p, ' '); + if (p && *(++p) == '9' && *(++p) == '\0') + ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; + else + ctx->result.verify->status = GPGME_SIG_STAT_ERROR; /* Store the keyID in the fpr field. */ p = ctx->result.verify->fpr; for (i = 0; i < DIM(ctx->result.verify->fpr) -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From ddcc@MIT.EDU Tue Feb 26 00:01:01 2002 From: ddcc@MIT.EDU (ddcc@MIT.EDU) Date: Tue Feb 26 00:01:01 2002 Subject: Can GPG decrypt a signed message and preserve the signature? Message-ID: I cannot seem to figure out how to decrypt a signed and encrypted message in such a way that the signature stays attached. I would need such a feature to prove to a third party that the sender actually signed a document, for example. From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 26 01:23:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 26 01:23:01 2002 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <20020226002038.GJ2036@212.23.136.22> On Sat, Feb 16, 2002 at 05:12:04PM +0100, Andreas Agorander wrote: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? As Werner said, this is a priority and will hopefully be done soon (later this week). There are some interface issues to be hashed out. > 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? Now there is :) I just checked in the necessary changes. You can access it with gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start. I have only done some rudimentary testing, a success report (or bug report ;) would be appreciated. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From rabbi@quickie.net Tue Feb 26 03:43:02 2002 From: rabbi@quickie.net (Len Sassaman) Date: Tue Feb 26 03:43:02 2002 Subject: Problems with v3 keys? Message-ID: When I try to encrypt to a certain key (I'd redacted its key ID and replaced it with 0x0000010 in the example below), I get the following error message: rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt gpg: loaded digest 2 gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) gpg: loaded digest 1 gpg: 0x00000010: skipped: unusable public key gpg: foo.txt: encryption failed: unusable public key I really don't want to provide the particular key for privacy reasons, but I know that makes debugging hard. Any idea what would trigger this error? Perhaps of use, I'm including the output of --list-packets on the key file below: rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc :public key packet: version 3, algo 1, created 781525938, expires 0 pkey[0]: [1024 bits] pkey[1]: [5 bits] :user ID packet: "Redacted (no email address in UID)" And yes, I have allow-non-selfsigned-uid in my options file. Thoughts? --Len. From j_anderson@uop.edu Tue Feb 26 06:03:02 2002 From: j_anderson@uop.edu (John Anderson) Date: Tue Feb 26 06:03:02 2002 Subject: Java + GnuPG Message-ID: <1014699635.1811.18.camel@ivory> Hi there, I have been thinking of making up a small interface between GnuPG and Java because I want to use something like that in a project I've been toying with. I was unable to find anything like this, other than Cryptix, which doesn't seem to be GPL. I found a thread on this list about problems getting Java and GnuPG to play nice together with IPC and file descriptors and such, so I decided to give it a whirl. The discussion that sparked my coding can be found here: http://lists.gnupg.org/pipermail/gnupg-devel/2002-January/006666.html I came up with a 173 line Java class that can encrypt and decrypt text strings, which can be used quite easily. I will post the code below, so that if anyone is interested they'll be able to play around with it. I look forward to any feedback and suggestions. The pertinent functions in GnuPG are: encrypt(string_to_encrypt, recipient); decrypt(string_to_decrypt, passphrase); getResult(); getError(); The ProcessStreamReader class is there to work as a small thread to gather the text that gpg spits out on its stdout and stderr file descriptors. STDERR seems to be where it puts all status text, and STDOUT is very clean, just giving the encrypted or decrypted text. The decrypt function actually puts the string_to_decrypt into a file in your system specific temporary directory, and then tells gpg to decrypt that file, because I couldn't readily see how to make gpg read both the passphrase and text to decrypt from stdin. I am running JDK 1.4.0, gpg 1.0.6 all on Debian unstable. Thanks, John Anderson PS - This stuff has worked flawlessly the few times I've tried it once completed; I make no gaurantee that it's coded very well because I did it up in a few hours. PGPMSClient.java (A start of my toy project, a GPG-based message system) ---------------- public class PGPMSClient { public static void main(String[] args) { GnuPG gpg = new GnuPG(); gpg.encrypt("The quick brown fox jumped over the lazy dog.\n", "j_anderson@uop.edu\n"); System.out.print(gpg.getResult()); // USE YOUR PASSWORD HERE... gpg.decrypt(gpg.getResult(), "YOUR_PASSWORD_HERE\n"); System.out.print(gpg.getResult()); } } GnuPG.java ---------- /* License: GPL * Author: John Anderson * Description: A small class to encrypt and decrypt text using GnuPG. */ import java.io.*; public class GnuPG { private Process p; private String gpg_result; private String gpg_err; GnuPG() { } public void encrypt(String str, String rcpt) { System.out.print("Encrypting... "); try { p = Runtime.getRuntime().exec("gpg --armor --batch --encrypt -r " + rcpt); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(str); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public void decrypt(String str, String passphrase) { File f = null; try { f = File.createTempFile("gpg-decrypt", null); FileWriter fw = new FileWriter(f); fw.write(str); fw.flush(); } catch(IOException io) { } System.out.print("Decrypting from: " + f.getAbsolutePath()); try { p = Runtime.getRuntime().exec("gpg --passphrase-fd 0 --batch --decrypt " + f.getAbsolutePath()); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(passphrase); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public String getResult() { return gpg_result; } public String getError() { return gpg_err; } } class ProcessStreamReader extends Thread { String name; StringBuffer stream; InputStreamReader in; final static int BUFFER_SIZE = 256; ProcessStreamReader(String name, InputStream in) { super(); this.name = name; this.in = new InputStreamReader(in); this.stream = new StringBuffer(); } public void run() { try { int read; char[] c = new char[BUFFER_SIZE]; while((read = in.read(c, 0, BUFFER_SIZE - 1)) > 0) { stream.append(c, 0, read); if(read < BUFFER_SIZE - 1) break; } } catch(IOException io) {} } String getString() { return stream.toString(); } } From dshaw@jabberwocky.com Tue Feb 26 06:13:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Tue Feb 26 06:13:02 2002 Subject: Problems with v3 keys? In-Reply-To: References: Message-ID: <20020226051045.GA1488@akamai.com> On Mon, Feb 25, 2002 at 06:40:49PM -0800, Len Sassaman wrote: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: > > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key > > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? [..] > And yes, I have allow-non-selfsigned-uid in my options file. The problem is the non-selfsigned uid. The allow-non-selfsigned-uid option allows you to import the key (which lets you use it to verify signatures, etc). It doesn't allow you to encrypt to it. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From disastry@saiknes.lv.NO.SPaM.NET Tue Feb 26 08:27:01 2002 From: disastry@saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Tue Feb 26 08:27:01 2002 Subject: Problems with v3 keys? Message-ID: <3C7B3719.922EAEDB@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Len Sassaman rabbi@quickie.net wrote: [snip] > I really don't want to provide the particular key for privacy reasons, but but you provided cretion time :-/ I don't think there are a lot of keys generated at the same second. > I know that makes debugging hard. Any idea what would trigger this error? > > Perhaps of use, I'm including the output of --list-packets on the key file > below: > > rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc > :public key packet: > version 3, algo 1, created 781525938, expires 0 > pkey[0]: [1024 bits] > pkey[1]: [5 bits] > :user ID packet: "Redacted (no email address in UID)" > > > And yes, I have allow-non-selfsigned-uid in my options file. try signing (or lsigning) it. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPHsarDBaTVEuJQxkEQOaSgCcDYg6Xcc6qrkX/bLxpOqiB9r+avAAnjDb I6Uyl9/CudfDHRQEioZqJJHD =44mO -----END PGP SIGNATURE----- From wk@gnupg.org Tue Feb 26 08:59:01 2002 From: wk@gnupg.org (Werner Koch) Date: Tue Feb 26 08:59:01 2002 Subject: Can GPG decrypt a signed message and preserve the signature? In-Reply-To: (ddcc@MIT.EDU's message of "Mon, 25 Feb 2002 17:59:18 -0500 (EST)") References: Message-ID: <87n0xwoeyh.fsf@alberti.gnupg.de> On Mon, 25 Feb 2002 17:59:18 -0500 (EST), ddcc said: > I cannot seem to figure out how to decrypt a signed and encrypted message > in such a way that the signature stays attached. I would need such a > feature to prove to a third party that the sender actually signed a The suggested way to do this is by using PGP/MIME in the regular mode; i.e. encapsulating the message in a multipart/signed MIME object and then wrapping this with a multipart/encrypted MIME object. Better MUAs do just this thing. IIRC, there is no instant way to do this with gpg. Well, we could add such an option of course but I can't promise you that this will happen any time soon. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From JanuszA.Urbanowicz Tue Feb 26 12:54:01 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Tue Feb 26 12:54:01 2002 Subject: Problems with v3 keys? In-Reply-To: from Len Sassaman at "Feb 25, 2002 06:40:49 pm" Message-ID: Len Sassaman wrote/napisa=B3[a]/schrieb: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: >=20 > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key >=20 > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? I got this on various occassions, in most times this is because gpg lacks IDEA support required by the key. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From foxy@free.fr Tue Feb 26 17:08:01 2002 From: foxy@free.fr (Laurent Cheylus) Date: Tue Feb 26 17:08:01 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7BB280.82B87DB9@free.fr> Hi, Marcus Brinkmann wrote : > Yes, that was a small thing missing in the implementation. Could you please try > the following patch if that works for you? Bad news, it does not work for me. I apply the patch on GPGME 0.3.3 sources and compile, but I have always "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY" :-( A++ Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From rabbi@quickie.net Tue Feb 26 19:20:01 2002 From: rabbi@quickie.net (Len Sassaman) Date: Tue Feb 26 19:20:01 2002 Subject: Problems with v3 keys? In-Reply-To: <20020226051045.GA1488@akamai.com> Message-ID: On Tue, 26 Feb 2002, David Shaw wrote: > > And yes, I have allow-non-selfsigned-uid in my options file. > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > option allows you to import the key (which lets you use it to verify > signatures, etc). It doesn't allow you to encrypt to it. Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? From dshaw@jabberwocky.com Tue Feb 26 19:30:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Tue Feb 26 19:30:01 2002 Subject: Problems with v3 keys? In-Reply-To: References: <20020226051045.GA1488@akamai.com> Message-ID: <20020226182735.GA2277@akamai.com> On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > On Tue, 26 Feb 2002, David Shaw wrote: > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > option allows you to import the key (which lets you use it to verify > > signatures, etc). It doesn't allow you to encrypt to it. > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? It's documented that way ("This only allows the import - key validation will fail and you have to check the validity of the key by other means"). The fact that --always-trust doesn't let you use such a key is certainly broken though :( David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 26 23:41:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 26 23:41:02 2002 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C7BB280.82B87DB9@free.fr> References: <3C7BB280.82B87DB9@free.fr> Message-ID: <20020226223902.GC1100@212.23.136.22> On Tue, Feb 26, 2002 at 05:06:24PM +0100, Laurent Cheylus wrote: > Marcus Brinkmann wrote : > > > Yes, that was a small thing missing in the implementation. Could you please try > > the following patch if that works for you? > > Bad news, it does not work for me. Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I am sorry about that. If you add the below diff on top of the previous diff, it should work. I did some testing now, so I am quite confident. If it doesn't work, I will need more info from you (in particular the output of gpg --status-fd 2 --verify .... and which version you are using). Thanks, Marcus Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.22 diff -u -r1.22 verify.c --- verify.c 2002/02/25 19:08:51 1.22 +++ verify.c 2002/02/26 22:39:05 @@ -193,9 +193,14 @@ case STATUS_ERRSIG: /* The return code is the 6th argument, if it is 9, the problem is a missing key. */ - for (p = args, i = 0; p && i < 5; i++) - p = strchr (p, ' '); - if (p && *(++p) == '9' && *(++p) == '\0') + for (p = args, i = 0; p && *p && i < 5; i++) + { + p = strchr (p, ' '); + if (p) + while (*p == ' ') + p++; + } + if (p && *(p++) == '9' && (*p == '\0' || *p == ' ')) ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; else ctx->result.verify->status = GPGME_SIG_STAT_ERROR; -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From dshaw@jabberwocky.com Wed Feb 27 15:32:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Wed Feb 27 15:32:02 2002 Subject: Problems with v3 keys? In-Reply-To: <20020226182735.GA2277@akamai.com> References: <20020226051045.GA1488@akamai.com> <20020226182735.GA2277@akamai.com> Message-ID: <20020227142910.GG677@akamai.com> On Tue, Feb 26, 2002 at 01:27:35PM -0500, David Shaw wrote: > On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > > On Tue, 26 Feb 2002, David Shaw wrote: > > > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > > option allows you to import the key (which lets you use it to verify > > > signatures, etc). It doesn't allow you to encrypt to it. > > > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? > > It's documented that way ("This only allows the import - key > validation will fail and you have to check the validity of the key by > other means"). > > The fact that --always-trust doesn't let you use such a key is > certainly broken though :( FYI, I just committed a fix for this. You can now use --always-trust to trust a non-selfsigned key. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From foxy@free.fr Wed Feb 27 16:01:02 2002 From: foxy@free.fr (Laurent Cheylus) Date: Wed Feb 27 16:01:02 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7CEE0B.E0D734D0@free.fr> Hi, Marcus Brinkmann wrote : > Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I > am sorry about that. If you add the below diff on top of the previous diff, it > should work. I did some testing now, so I am quite confident. Good news, your new patch works well with GPGME 0.3.3 sources and GPG 1.0.6. I have now GPGME_SIG_STAT_NOKEY status when I verify a GPG signature and I haven't public key for sign in my keyring. Thanks, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From foxy@free.fr Wed Feb 27 16:01:04 2002 From: foxy@free.fr (Laurent Cheylus) Date: Wed Feb 27 16:01:04 2002 Subject: Modify comments in GPG signature ? Message-ID: <3C7CEF17.8F0DC082@free.fr> Hi, is it possible to modify the lines "Version" and "Comment" in GPG cleartext signature with an option in command "gpg --clearsign" ? I don't want to parse the entire signature to modify these lines :-( Example : ------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Pour information voir http://www.gnupg.org will be -----BEGIN PGP SIGNATURE----- Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) Comment: See http://www.foo.org Thx, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From dshaw@jabberwocky.com Wed Feb 27 16:40:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Wed Feb 27 16:40:01 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> References: <3C7CEF17.8F0DC082@free.fr> Message-ID: <20020227153717.GI677@akamai.com> On Wed, Feb 27, 2002 at 03:37:11PM +0100, Laurent Cheylus wrote: > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? > > I don't want to parse the entire signature to modify these lines :-( > > Example : > ------- > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: Pour information voir http://www.gnupg.org > > will be > > -----BEGIN PGP SIGNATURE----- > Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) > Comment: See http://www.foo.org "Version" is hardcoded into the program. The most you can do is use --no-version to make it not appear. I suppose you could add one in later if you wanted to. "Comment" is changeable with --comment "this is my comment". David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From JanuszA.Urbanowicz Wed Feb 27 17:45:04 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Wed Feb 27 17:45:04 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> from Laurent Cheylus at "Feb 27, 2002 03:37:11 pm" Message-ID: Laurent Cheylus wrote/napisa=B3[a]/schrieb: [There is text before PGP section.] > Hi, >=20 > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? have you tried --comment option? Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From JanuszA.Urbanowicz Wed Feb 27 18:27:01 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Wed Feb 27 18:27:01 2002 Subject: problem with exporting subkeys Message-ID: Today I tried to export a secret subkey from one GPG installation to another (both run Debian Potato): Subshell:alex@FUCKUP:[~]:7:0:> gpg -a --export-secret-subkeys > subk the 'subk' file bot transferred to another machine, then I ran: Subshell:alex@syjon:[~]:100:> gpg subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Ostrze=BFenie: u=BFywana pami=EA=E6 nie jest pami=EAci=B1 bezpieczn=B1! [nothing?] Subshell:alex@syjon:[~]:101:> pgpv subk Opening file "Temporary PGP Keyfile" type binary. Copying key file to "/tmp/ptmpUWCevZ", running pgpk to process it... pgpk -a /tmp/ptmpUWCevZ Adding keys: Key ring: '/tmp/ptmpUWCevZ' Type Bits KeyID Created Expires Algorithm Use sec 1024 0x21939169 1997-09-24 ---------- DSS Sign & Encrypt sub 2048 0xA2E48564 1997-09-24 2000-12-30 Diffie-Hellman sub 2048 0x78174410 2000-03-14 ---------- Diffie-Hellman sub 1024 0x7E2E803D 2001-06-28 2003-12-31 Diffie-Hellman uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (notebook) uid Janusz A. Urbanowicz (ICM) uid Janusz A. Urbanowicz (Jabber ID) sec 1024 0x27C81BC9 1994-01-05 ---------- RSA Sign & Encrypt uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (BOFH) 2 matching keys found First question: why ALL my secret keys in the packet? I supposed only subkeys would go there. Second question: why GPG chokes on it? Subshell:alex@syjon:[~]:106:> gpg --import subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Warning: using insecure memory! gpg: read_block: read error: invalid packet gpg: import from `subk' failed: invalid keyring gpg: Total number processed: 0 Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From dshaw@jabberwocky.com Thu Feb 28 05:36:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 05:36:01 2002 Subject: problem with exporting subkeys In-Reply-To: References: Message-ID: <20020228043302.GB678@akamai.com> On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > First question: why ALL my secret keys in the packet? I supposed only > subkeys would go there. The structure of the secret primary key needs to still be there for various things to work. However, the secret parts of the key are gone. Compare the size of a --export-secret-key vs a --export-secret-subkeys. > Second question: why GPG chokes on it? Judging from the listing you posted, it seems you did --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 keys do not work with --export-secret-subkeys, and in fact cause the resulting file to be unusable. I just committed a fix which makes --export-secret-subkeys ignore v3 keys. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bobmathews@mindspring.com Thu Feb 28 08:20:01 2002 From: bobmathews@mindspring.com (Bob Mathews) Date: Thu Feb 28 08:20:01 2002 Subject: missing dsa factor Message-ID: <20020228071746.61DA49D1A@cabbit.cat> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've been looking at the factor entries that are stored in the secret ring file, and it seems that there is one missing from DSA keys. When I start with (p-1)/2 and divide off q and the other given factors, I'm still left with a large composite number. In gen_elg_prime(), prime is calculated as: 2 * q * q_factor * factor[0]..factor[n-1] + 1 But when the ret_factors array is populated, it gets: q_factor, factor[1]..factor[n] (It appears that factor[n] will always be NULL.) That leaves q and factor[0] both unknown. This behavior is in 1.0.6c, and doesn't appear to have been fixed in CVS. Should be a trivial fix. if( mode == 1 ) { (*ret_factors)[i++] = mpi_copy( q_factor ); for(; i <= n; i++ ) - (*ret_factors)[i] = mpi_copy( factors[i] ); + (*ret_factors)[i] = mpi_copy( factors[i-1] ); } Since the factors aren't currently used for anything, the missing one shouldn't hurt anything. It'll be disappointing if someone ever wants them for something, though. -bob mathews -----BEGIN PGP SIGNATURE----- Comment: What's this? http://bobmathews.home.mindspring.com/bob/ iD8DBQE8fdiwPgDecCrBEpcRAjYkAJ4lyFOvVCjUXiZO5LZs7tMzaQMe5gCdGfxT orJ8kPU1VcAkKxxtiQ71Dqg= =5Ddq -----END PGP SIGNATURE----- From wk@gnupg.org Thu Feb 28 08:53:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 28 08:53:02 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <20020227153717.GI677@akamai.com> (David Shaw's message of "Wed, 27 Feb 2002 10:37:17 -0500") References: <3C7CEF17.8F0DC082@free.fr> <20020227153717.GI677@akamai.com> Message-ID: <87g03m82rn.fsf@alberti.gnupg.de> On Wed, 27 Feb 2002 10:37:17 -0500, David Shaw said: > "Version" is hardcoded into the program. The most you can do is use > --no-version to make it not appear. I suppose you could add one in You can use sed or awk to change these lines. The header lines are not part of the signatures, they are just comments. The actiual signatures starts right behind one emty line (which must be present even if you delete all the header lines). -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From disastry@saiknes.lv.NO.SPaM.NET Thu Feb 28 11:57:01 2002 From: disastry@saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Thu Feb 28 11:57:01 2002 Subject: problem with exporting subkeys Message-ID: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > Second question: why GPG chokes on it? > > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. > > I just committed a fix which makes --export-secret-subkeys ignore v3 > keys. > David note that v3 keys also can have subkeys. OpenPGP does not forbid it. I have even seen v3 keys with subkeys. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH3vIjBaTVEuJQxkEQOL/QCeOITWEz+AtVMSOHNCA+4CLNt6IVQAn3CA oLqCCo5KYmaCVUK8zkXFEFmS =6Xvo -----END PGP SIGNATURE----- From dshaw@jabberwocky.com Thu Feb 28 14:55:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 14:55:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> References: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> Message-ID: <20020228135159.GD678@akamai.com> On Thu, Feb 28, 2002 at 12:50:05PM +0200, disastry@saiknes.lv.NO.SPaM.NET wrote: > David Shaw dshaw@jabberwocky.com wrote: > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > keys. > > David > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > I have even seen v3 keys with subkeys. Are you sure? Section 10.1 ("Transferable Public Keys") says: However, any V4 key may have subkeys, and the subkeys may be encryption-only keys, signature-only keys, or general-purpose keys. That doesn't exactly forbid it, true, but also section 11.1 ("Key structures") does not show subkeys at all in the v3 allowable format which is a stronger statement. We should construct such a key and see if any programs break with it. Where did you see it? Speaking of key versions - I spent some time looking at what versions were permitted with what a while ago and one thing that does seem to be explicitly permitted is v4 keys with v3 subkeys. I did test this and PGP supports it (though this may be accidental support). GnuPG 1.0.6 only partially supports it, but I fixed that in 1.0.7. Florian, this can give you the unchangeable expiration date that you wanted, if you're willing to accept the restrictions (RSA only, etc.) on v3 keys :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From rguerra@yahoo.com Thu Feb 28 15:06:01 2002 From: rguerra@yahoo.com (Robert Guerra) Date: Thu Feb 28 15:06:01 2002 Subject: IP: PGP products from NA a thing of the past... (fwd) Message-ID: <20020228060020.P33188-100000@trout.cpsr.org> ---------- Forwarded message ---------- Date: Thu, 28 Feb 2002 08:25:22 -0500 From: Dave Farber Reply-To: farber@cis.upenn.edu To: ip Subject: IP: PGP products from NA a thing of the past... Which raises a query. Is there a PGP-like system that works well under MAC OS X djf ------ Forwarded Message From: Stan Hanks Date: Wed, 27 Feb 2002 21:54:46 -0800 To: farber@cis.upenn.edu Subject: PGP products from NA a thing of the past... Just got this today. Grim news for those of us depending on supporting corporate Wintel users... > Date: Wed, 27 Feb 2002 15:28:35 -0800 > From: "PGP" > Reply-To: "PGP" > Subject: Important Information regarding PGP Desktop/Wireless Encryption Products > > **************************************************************** > [This message is brought to you as a subscriber to the Network > Associates or PGP websites. To unsubscribe, please follow > the instructions at the bottom of the page.] > **************************************************************** > > > February 26, 2002 > > Dear Valued Customer, > > Since October 11th of last year, we have been diligently searching to fin= d a suitable > buyer for the PGP Desktop/Wireless encryption products in order to provid= e a strong > partner for our customers. This search has not resulted in an appropriate buyer who will > continue to develop and support the products while providing value to exi= sting > customers. Therefore, the decision has been made to place our PGP Desktop/Wireless > encryption products in maintenance mode. > > The support team at Network Associates will continue to honor all support agreements > for existing PGP Desktop/Wireless customers until their date of terminati= on. However, > effective immediately Network Associates will cease new development on th= ese > products, and not sell additional licenses, services and support agreemen= ts. Once > again, we reiterate that we will continue to honor all technical support agreements for > the entire duration of the contract. > > The PGP technology and source code will remain under the control and owne= rship of > Network Associates. Other products that utilize this encryption technolog= y will remain > a part of Network Associates=92 current product portfolio and they will c= ontinue to be > developed in order to meet the security needs of both new and existing Ne= twork > Associates customers. These products currently include McAfee E-Business Server, > McAfee Desktop Firewall and McAfee VPN Client. > > We pledge to you our complete efforts to assist you through this transiti= on, and to > ensure that your experience as a customer remains positive. We continue t= o focus on > delivering to you superior technology and product solutions to help you m= eet your > business needs. Our customers are our most valuable asset, and we look fo= rward to > continuing to work in partnership with you in the future. > > > > Best Regards, > > > Sandra England > Executive Vice President of > Strategic Business Development and Research ------ End of Forwarded Message For archives see: http://www.interesting-people.org/archives/interesting-people/ From JanuszA.Urbanowicz Thu Feb 28 15:59:02 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Thu Feb 28 15:59:02 2002 Subject: problem with exporting subkeys In-Reply-To: <20020228043302.GB678@akamai.com> from David Shaw at "Feb 27, 2002 11:33:02 pm" Message-ID: David Shaw wrote/napisa=B3[a]/schrieb: > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: >=20 > > First question: why ALL my secret keys in the packet? I supposed only > > subkeys would go there. >=20 > The structure of the secret primary key needs to still be there for > various things to work. However, the secret parts of the key are > gone. Compare the size of a --export-secret-key vs a > --export-secret-subkeys. Ok. But is there a way to export a _single_ subkey? I definitely need such option. Specyfying subkey ID after --export-secret-subkeys exports all subkeys (tested). =20 > > Second question: why GPG chokes on it? >=20 > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use --export-secret-subkeys without a parameter which, I assumed, would export only subkeys, thus not affecting a legacy v3 key without one. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From dshaw@jabberwocky.com Thu Feb 28 16:44:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 16:44:01 2002 Subject: problem with exporting subkeys In-Reply-To: References: <20020228043302.GB678@akamai.com> Message-ID: <20020228154123.GF678@akamai.com> On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. One way to do it would be to export the key with all subkeys and then --edit-key and "delkey" the subkeys you don't want. > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use > --export-secret-subkeys without a parameter which, I assumed, would export > only subkeys, thus not affecting a legacy v3 key without one. That's the way it works now. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From JanuszA.Urbanowicz Thu Feb 28 16:49:02 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Thu Feb 28 16:49:02 2002 Subject: problem with exporting subkeys In-Reply-To: <20020228154123.GF678@akamai.com> from David Shaw at "Feb 28, 2002 10:41:23 am" Message-ID: David Shaw wrote/napisa=B3[a]/schrieb: > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > David Shaw wrote/napisa?[a]/schrieb: > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > >=20 > > > > First question: why ALL my secret keys in the packet? I supposed on= ly > > > > subkeys would go there. > > >=20 > > > The structure of the secret primary key needs to still be there for > > > various things to work. However, the secret parts of the key are > > > gone. Compare the size of a --export-secret-key vs a > > > --export-secret-subkeys. > >=20 > > Ok. But is there a way to export a _single_ subkey? I definitely need s= uch > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > subkeys (tested). >=20 > The single subkey isn't usable without the primary key (or rather, the > primary key minus the secret parts of the key) attached, so exporting > just a subkey won't really be helpful. One way to do it would be to > export the key with all subkeys and then --edit-key and "delkey" the > subkeys you don't want. By 'single subkey' I mean a secret subkey plus the whole data structure required to maintain it. What I mean (and I would like to be able to) is ability to be able to eport single subkeys (plus the whole stuff needed to handle them) and not all at once. I'm not sure if I'm clear enough here. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From disastry@saiknes.lv Thu Feb 28 19:55:01 2002 From: disastry@saiknes.lv (disastry@saiknes.lv) Date: Thu Feb 28 19:55:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) Message-ID: <3C7E7C82.ABA0D6AD@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > David Shaw dshaw@jabberwocky.com wrote: > > > > Second question: why GPG chokes on it? > > > > > > Judging from the listing you posted, it seems you did > > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > > keys do not work with --export-secret-subkeys, and in fact cause the > > > resulting file to be unusable. > > > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > > keys. > > > David > > > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > > I have even seen v3 keys with subkeys. > > Are you sure? yes. at lest I'm sure that such keys do exist. > Section 10.1 ("Transferable Public Keys") says: > > However, any V4 key may have subkeys, and the subkeys may be > encryption-only keys, signature-only keys, or general-purpose keys. > > That doesn't exactly forbid it, true, but also section 11.1 ("Key > structures") does not show subkeys at all in the v3 allowable format > which is a stronger statement. > > We should construct such a key and see if any programs break with it. > Where did you see it? I have one on my keyring, I put it on web page at http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc I don't remember from where I got this key, but I don't think that I generated it myself, because it have passphrase "test" (all may test keys have passphrase "a" or "12345678" :) ) but I also remember seen real (not test) key belonging to some person. I can't find it... it was RSAv3 key with Elgamal subkey. GPG allows (maybe it does not allow now, but at least older versions allowed) to add subkeys to v3 keys. > Speaking of key versions - I spent some time looking at what versions > were permitted with what a while ago and one thing that does seem to > be explicitly permitted is v4 keys with v3 subkeys. I did test this > and PGP supports it (though this may be accidental support). GnuPG > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > Florian, this can give you the unchangeable expiration date that you > wanted, if you're willing to accept the restrictions (RSA only, etc.) > on v3 keys :) > David btw, v3 subkeys are (seems to be) allowed too, section 5.5.2. Public Key Packet Formats "A version 3 public key or public subkey packet contains:" some time ago I did some experiments - added key to other key as subkey, and converted subkey to key :) it worked. test results here http://disastry.dhs.org/pgp/testkeys key subkey tstDSADSA.asc 0xA496AC49 0xCD80EA04 tstDSADSA-sub.asc 0xCD80EA04 tstRSADSA.asc 0x0FD8A43F 0xF3A46303 tstDSADSA-RSA2.asc 0xA496AC49 0x0FD8A43F __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5gFzBaTVEuJQxkEQM2xgCg8DJDWVFeW4uZS80GFWspQ83IEHAAn1/j gBeCC+4Jp6G5C0JbG4V3PkhP =TgR6 -----END PGP SIGNATURE----- From disastry@saiknes.lv Thu Feb 28 20:03:01 2002 From: disastry@saiknes.lv (disastry@saiknes.lv) Date: Thu Feb 28 20:03:01 2002 Subject: problem with exporting subkeys Message-ID: <3C7E7E68.3726253B@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. he did not asked for that. - --export-secret-subkeys exports: pubkey, fake seckey and all subkeys. I think he asked how to export: pubkey, fake seckey and ONE SELECTED subkey. well... beuckup the key, remove unwanted subkeys, do --export-secret-subkeys, restore key fom backup :) besides the single subkey IS usable without the primary key - it can be promoted to key (see my other msg). __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5h8TBaTVEuJQxkEQOe0QCfXbgjsqrCxIbTSpLcrz+BiXxg2fQAnRZT 1/LzEfMhFsFyOyBRad6sKWmg =C5n4 -----END PGP SIGNATURE----- From dshaw@jabberwocky.com Thu Feb 28 20:16:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 20:16:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E7C82.ABA0D6AD@saiknes.lv> References: <3C7E7C82.ABA0D6AD@saiknes.lv> Message-ID: <20020228191422.GA691@akamai.com> On Thu, Feb 28, 2002 at 08:52:50PM +0200, disastry@saiknes.lv wrote: > > We should construct such a key and see if any programs break with it. > > Where did you see it? > > I have one on my keyring, I put it on web page at > http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc > > I don't remember from where I got this key, but I don't think > that I generated it myself, because it have passphrase "test" > (all may test keys have passphrase "a" or "12345678" :) ) > > but I also remember seen real (not test) key belonging to some person. > I can't find it... it was RSAv3 key with Elgamal subkey. > > GPG allows (maybe it does not allow now, but at least > older versions allowed) to add subkeys to v3 keys. It still allows you, but it prints a warning "creating subkeys for v3 keys is not OpenPGP compliant". It may have warned before too. > > Speaking of key versions - I spent some time looking at what versions > > were permitted with what a while ago and one thing that does seem to > > be explicitly permitted is v4 keys with v3 subkeys. I did test this > > and PGP supports it (though this may be accidental support). GnuPG > > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > > > Florian, this can give you the unchangeable expiration date that you > > wanted, if you're willing to accept the restrictions (RSA only, etc.) > > on v3 keys :) > > btw, v3 subkeys are (seems to be) allowed too, > section 5.5.2. Public Key Packet Formats > "A version 3 public key or public subkey packet contains:" That's what I just said - one paragraph up. I can't see any really good use for it except that v3 (sub)keys have a fixed expiration date that cannot be changed in the binding self-sig. That's why I thought Florian would be interested, since he wanted that feature. I suppose it would be handy for someone who had a lot of v3 keys to gather them together into one key, but that really doesn't give you anything useful. > some time ago I did some experiments - added key to other key as subkey, > and converted subkey to key :) it worked. Yes. I tried that once as well. I was thinking it would be an interesting solution for wanting a signing subkey, but since PGP couldn't verify a signature from a signing subkey, I made my signing subkey into a regular v4 key for PGP folks. :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From dshaw@jabberwocky.com Thu Feb 28 20:25:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 20:25:02 2002 Subject: problem with exporting subkeys In-Reply-To: References: <20020228154123.GF678@akamai.com> Message-ID: <20020228192304.GB691@akamai.com> On Thu, Feb 28, 2002 at 04:40:42PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > > David Shaw wrote/napisa?[a]/schrieb: > > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > > > subkeys would go there. > > > > > > > > The structure of the secret primary key needs to still be there for > > > > various things to work. However, the secret parts of the key are > > > > gone. Compare the size of a --export-secret-key vs a > > > > --export-secret-subkeys. > > > > > > Ok. But is there a way to export a _single_ subkey? I definitely need such > > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > > subkeys (tested). > > > > The single subkey isn't usable without the primary key (or rather, the > > primary key minus the secret parts of the key) attached, so exporting > > just a subkey won't really be helpful. One way to do it would be to > > export the key with all subkeys and then --edit-key and "delkey" the > > subkeys you don't want. > > By 'single subkey' I mean a secret subkey plus the whole data structure > required to maintain it. What I mean (and I would like to be able to) is > ability to be able to eport single subkeys (plus the whole stuff needed to > handle them) and not all at once. I'm not sure if I'm clear enough here. Clear, but there is no current feature to do that. You can approximate that feature by using export-secret-subkey on the whole key and using the --edit menu on the whole key to delete any subkeys you don't want. You will end up with the empty primary key, and just the subkey you wanted to keep. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From stephane@sente.ch Fri Feb 1 17:56:02 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Fri Feb 1 17:56:02 2002 Subject: GPGME bug Message-ID: Hi, I've been playing a little bit again with gpgme, and discovered the following problem: When enumerating keys: the "secret" attribute is retrieved only if we enumerate secret keys! If we enumerate all keys, the attribute "secret" is always set to 0. I also discovered a strange thing with gpg (1.0.6): My PGP key has 2 uids; if I display them with gpg --list-secret-keys or --list-keys, main uid is not the same (swapped). About secret keys again: can a subkey be secret without the main key being secret? Consequence for gpgme is that if I retrieve only secret keys, the main uid of my PGP Key is not the same as if I retrieve all keys. I'm suspecting two other problems (I need to check again): gpgme_op_decrypt(): doesn't return an error if no valid passphrase is given gpgme_op_encrypt(): doesn't return an error if no recipient is trusted, but encrypts nothing Thanks for having written all the doc! It's been very helpful, and I could finally document a little bit the ObjC wrapper :-) Stephane From test@test.com Tue Feb 5 07:49:01 2002 From: test@test.com (test) Date: Tue Feb 5 07:49:01 2002 Subject: (no subject) Message-ID: <3c5f7fc13ca1df8a@relay2.kornet.net> (added by relay2.kornet.net)
¾È³çÇϽʴϱî?
"¿ìÀÏ»ê¾÷"ÀÔ´Ï´Ù
¸ÕÀú Çã¶ô¾øÀÌ À̱ÛÀ» ¶ç¿ö Á˼ÛÇÕ´Ï´Ù.
 
´Ù¸§ÀÌ ¾Æ´Ï¶ó ±¹³»¿¡¼­ ¼ø¼öÇÏ°Ô °³¹ßµÈ "¿ëÁ¢´ëü½ÅÁ¦Ç°'
±Ý¼Ó*ÄÜÅ©¸®Æ® Ãʰ­·Â º¸¼öÁ¢ÂøÁ¦ ¹× ³»±¸¼ºÀ̰­ÇѠƯ¼ö ¹æ½Ä ¹æ¼öÁ¦µî
½Å±â¼ú 9Á¾·ù¸¦ ¼Ò°³ÇϰíÀÚ ÇÕ´Ï´Ù.
Ư¡Àº  1.  ³²³à³ë¼Ò ´©±¸³ª ¼Õ½±°Ô »ç¿ëÇÒ ¼ö  Àִٴ°Ͱú
              2.  °¡Á¤Àº ¹°·ÐÀÌ°í °ÇÃ༳ºñ, ÁÖÅú¸¼ö, ¼±¹Úµî ´Ù¾çÇÏ°Ô »ç¿ëµÇ¸ç
              3.  ¾ÆÁÖ Àú·ÅÇÑ °¡°ÝÀ¸·Î ÆÇ¸ÅµÇ¾î  °ø»ç¹× ÀÛ¾÷º¸¼öºñ°¡
                   ¸Å¿ì ÀûÀº ºñ¿ëÀ¸·Î ÇØ°áµË´Ï´Ù... 
 
±ººÎ´ë·Î¸¸ ³³Ç°ÇÏ´ø°ÍÀ»  °ø°ø±â°üÀ̳ª,°ÇÃ༳ºñ,¼±¹Ú,
°ø°øÁÖÅÃÇÏÀÚº¸¼ö¾÷üµî ´Ù¿ëµµ·Î ³³Ç°ÀÌ µÇ°í ÀÖÀ¸¸ç,
ÀÌÁ¦´Â ¼ÒºñÀÚµé °³°³Àο¡°Ô±îÁö º¸±ÞÇϰíÀÚ ±ÛÀ» ¿Ã¸³´Ï´Ù. 
 
±×³É Áö³ªÃÄ ¹ö¸®Áö ¸¶½Ã°í Àá±ñÀÇ ½Ã°£À» ³»¼Å¼­
´õ ÀÚ¼¼ÇÑ ¼³¸í°ú ´õ ÁÁÀº »óǰÀ» ¸¸³ª½Ç¼ö ÀÖÀ» °ÍÀÔ´Ï´Ù.

´õ ±Ã±ÝÇÑ »çÇ×ÀÌ ÀÖÀ¸½Ã¸é 02) 967-6704·Î ¿¬¶ô ÁÖ¼¼¿ä
°¨»çÇÕ´Ï´Ù.
From jgre@tzi.de Tue Feb 5 11:41:01 2002 From: jgre@tzi.de (Janico Greifenberg) Date: Tue Feb 5 11:41:01 2002 Subject: Questions about GPGME Message-ID: <20020205103806.GC664@tzi.de> Hi, I tried asking this before in the users mailing list but did ot receive an answer so I'm trying it here. My questions are: - Is it possible to change the keyrings used by GPGME and how does it work? - How can I extract more information about importing keys and verifying signatures? I need to know whose key I'm importing and who signed the text. Using GPG itself I can get this information with the --status-fd option but how can I get it with GPGME? Thanks in advance Janico -- Warning! Taking anyone (especially yourself) too serious will be harmful From s.aparna@digital.com Tue Feb 5 11:56:02 2002 From: s.aparna@digital.com (Aparna, S) Date: Tue Feb 5 11:56:02 2002 Subject: GnuPG on Tru64 versions Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Hi, I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any of the flavors of Compaq Tru64 Unix. Any pointers would be greatly helpful. Thanks, Aparna. From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 5 14:17:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 5 14:17:01 2002 Subject: Questions about GPGME In-Reply-To: <20020205103806.GC664@tzi.de> References: <20020205103806.GC664@tzi.de> Message-ID: <20020205131518.GC792@212.23.136.22> On Tue, Feb 05, 2002 at 11:38:06AM +0100, Janico Greifenberg wrote: > Hi, > I tried asking this before in the users mailing list but did ot receive an > answer so I'm trying it here. Mmmh. I think I am not following that list but should. I will subscribe. However, GPGME is still in its development stage, so this is the appropriate forum anyway. > My questions are: > - Is it possible to change the keyrings used by GPGME and how does it work? No, currently the default keyrings of the crypto backend are used. We will need some way to list keys in a seperate file for some other project, but this is probably not what you mean. The question is of course what style of interface we choose for such configuration options of the crypto backend. I will think about it. > - How can I extract more information about importing keys and verifying > signatures? I need to know whose key I'm importing and who signed the > text. Using GPG itself I can get this information with the --status-fd option > but how can I get it with GPGME? After importing a key, you can get back some information about it with gpgme_op_info, I am not sure if that includes everything you need, please come back with more details if you tried it and need more. For verify, there are two functions you can invoke after a successful verification, gpgme_get_sig_status and gpgme_get_sig_key. In the CVS repository of gpgme is a manual in doc/gpgme.texi that documents these functions. Also read the README how to build it, please. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From toni@eyets.com Tue Feb 5 18:46:01 2002 From: toni@eyets.com (toni) Date: Tue Feb 5 18:46:01 2002 Subject: Hi.... Message-ID: <3C601AED.5070709@eyets.com> Hi, I would like to develop gpg in c for linux... where can i find documentation about functions, or example code? Thanks From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:15:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:15:02 2002 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020114004404.GD2449@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> Message-ID: <20020206011258.GD657@212.23.136.22> On Mon, Jan 14, 2002 at 01:44:05AM +0100, Marcus Brinkmann wrote: > 1. The pending flag is never reset and not resettable. This has been fixed by making gpgme_wait reset the pending flag. > 2. The resulting error value of the operation is not calculable via the > public interface. It is retrieved through internal interfaces. This has been fixed by adding a STATUS argument to gpgme_wait. It is now close to the semantics of waitpid. I also fixed the code to support ctx being non-NULL. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:24:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:24:01 2002 Subject: upcoming GPGME snapshot (call for last minute API requests) Message-ID: <20020206012210.GF657@212.23.136.22> Hi, if there is something that bugs you in the GPGME API, now would be a good time to tell me, so it can probably be fixed before the upcoming release of a new snapshot (around next weekend). There are some smaller things (and additions for GpgSM) I will do myself, and you don't need to remind me of anything that is on the TODO list (or was reported on the list recently), but if you want to be sure that something goes in, it is better to repeat it than to assume I took notice and rejected it. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 6 02:32:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 02:32:01 2002 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020206011258.GD657@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> <20020206011258.GD657@212.23.136.22> Message-ID: <20020206012946.GG657@212.23.136.22> On Wed, Feb 06, 2002 at 02:12:58AM +0100, Marcus Brinkmann wrote: > This has been fixed by adding a STATUS argument to gpgme_wait. It is now > close to the semantics of waitpid. I also fixed the code to support ctx > being non-NULL. NULL. Not non-NULL. NULL. Sorry for the confusion. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna@digital.com Wed Feb 6 09:48:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Wed Feb 6 09:48:01 2002 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Hi, I'm trying to compile GnuPG on Tru64 platform. Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? Thanks, Aparna. From marcus.brinkmann@ruhr-uni-bochum.de Wed Feb 6 11:04:01 2002 From: marcus.brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 11:04:01 2002 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Message-ID: <20020206110218.GA451@finnegan> On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus From s.aparna@digital.com Wed Feb 6 12:32:02 2002 From: s.aparna@digital.com (Aparna, S) Date: Wed Feb 6 12:32:02 2002 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. Is GPGME 0.3.0 the latest version ? Thanks, Aparna. -----Original Message----- From: Marcus Brinkmann [mailto:marcus.brinkmann@ruhr-uni-bochum.de] Sent: Wednesday, February 06, 2002 4:32 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GnuPG and GPGME version compatibility On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From marcus.brinkmann@ruhr-uni-bochum.de Wed Feb 6 14:16:01 2002 From: marcus.brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 6 14:16:01 2002 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> Message-ID: <20020206141404.GE451@finnegan> On Wed, Feb 06, 2002 at 04:56:20PM +0530, Aparna, S wrote: > I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. > Is GPGME 0.3.0 the latest version ? Yes. I will take a look at the time stamps later. Marcus From wk@gnupg.org Wed Feb 6 14:38:02 2002 From: wk@gnupg.org (Werner Koch) Date: Wed Feb 6 14:38:02 2002 Subject: GPGME bug In-Reply-To: (Stephane Corthesy's message of "Fri, 1 Feb 2002 17:54:12 +0100") References: Message-ID: <87pu3in39c.fsf@alberti.gnupg.de> On Fri, 1 Feb 2002 17:54:12 +0100, Stephane Corthesy said: > When enumerating keys: the "secret" attribute is retrieved only if > we enumerate secret keys! If we enumerate all keys, the attribute > "secret" is always set to 0. Correct. This _might_ change in future but you should not rely on this. If you want a listing of the secret keys you should list the secret keys (e.g. for deciding which key to use for signing). For most tasks you don't need the secret key. > I also discovered a strange thing with gpg (1.0.6): > My PGP key has 2 uids; if I display them with gpg --list-secret-keys > or --list-keys, main uid is not the same (swapped). The UIDs listed with --list-secret-keys are just for convenience. It needs a lot of code to keep them in sync with the ones on the public keyring. So the latest snapshots don't care anymore about packets on the secret keyring and instead do some merging with the public key information. > About secret keys again: can a subkey be secret without the main key > being secret? You should get away from the need to know wether a key is secret or not. The only relevant information is whether a key is capable of signing or decrypting. A secret is a secret is a secret :-) Eventually all secret key[*] handling will be done by gpg-agent and there will be no way for an application (except for special tools) to cope with a secret key. > I'm suspecting two other problems (I need to check again): > gpgme_op_decrypt(): doesn't return an error if no valid passphrase > is given > gpgme_op_encrypt(): doesn't return an error if no recipient is > trusted, but encrypts nothing Be prepared to get some errors after this has been fixed. > Thanks for having written all the doc! It's been very helpful, and I > could finally document a little bit the ObjC wrapper :-) That belongs to Marcus of course. Werner [*] When I talk about a secret key I usually mean the private keys of a public keypair. For conventional encryption a passphrase callback is still needed to automate some applications. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From bwpearre@alumni.princeton.edu Wed Feb 6 19:13:02 2002 From: bwpearre@alumni.princeton.edu (Ben Pearre) Date: Wed Feb 6 19:13:02 2002 Subject: Anderson's attack? Message-ID: <20020206131032.D21208@diverge.seunglab.mit.edu> --FFoLq8A0u+X9iRU8 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I'm sorry if this is in the archives - I looked but didn't find it. This seems like a legitimate concern: http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html Has this been addressed in GnuPG? The documentation doesn't mention whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or what. What's really going on in there? Should there be an option --both, which does sign/encrypt/sign or some such? I believe that the first time I installed PGP, there was an option in my MUA to encrypt the relevant headers, but I don't think that this is a problem that should be foisted upon the MUA developers, as no-one seems to know about this issue. Thoughts? Cheers! -Ben --=20 bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben --FFoLq8A0u+X9iRU8 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8YXGY+CWfKs/abNoRAkKrAKCwMJ4q5lMksE7vYtfR0Pg3LyUJzACg4iOu 4BqwborCXiG76d8LNV1YMVI= =ZQG1 -----END PGP SIGNATURE----- --FFoLq8A0u+X9iRU8-- From jgre@tzi.de Wed Feb 6 21:43:02 2002 From: jgre@tzi.de (Janico Greifenberg) Date: Wed Feb 6 21:43:02 2002 Subject: Questions about GPGME In-Reply-To: <20020205131518.GC792@212.23.136.22> References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> Message-ID: <20020206204004.GA5312@tzi.de> > No, currently the default keyrings of the crypto backend are used. We will > need some way to list keys in a seperate file for some other project, but > this is probably not what you mean. The question is of course what style > of interface we choose for such configuration options of the crypto backend. > I will think about it. What I would like is are functions like gpgme_set_pubkeyring(char *file); gpgme_set_seckeyring(char *file); gpgme_set_no_default_keyring(int ); or something like that simple setting the gpg options accordingly. > After importing a key, you can get back some information about it with > gpgme_op_info, I am not sure if that includes everything you need, please > come back with more details if you tried it and need more. I think that will work for me. > For verify, there are two functions you can invoke after a successful > verification, gpgme_get_sig_status and gpgme_get_sig_key. This sound good, I just can't get the verify (or decrypt_verify) working. I'm using the folling code: void Crypto::Test(char *msg) { size_t nread; int ret,cnt=0; char *buf_ptr; char str_out[MAX_DATA]; GpgmeSigStat stat; GpgmeData in, out, out2; err = gpgme_data_new_from_mem(&in,msg,strlen(msg),0); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_new ( &out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); if (err) throw CoreError(gpgme_strerror(err)); fflush (NULL); err = gpgme_data_rewind ( out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); if(err) throw CoreError(gpgme_strerror(err)); gpgme_data_release (in); gpgme_data_release (out); cout<; from bwpearre@mit.edu on Wed, Feb 06, 2002 at 01:10:32PM -0500 References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <20020206225706.O25763@mbsks.franken.de> Mahlzeit On Wed, Feb 06, 2002 at 01:10:32PM -0500, Ben Pearre wrote: > Has this been addressed in GnuPG? I don't think this is the correct location to fix this. GnuPG does sign the message. That's it. To understand this, you can look how it is done in the paper world, where the same attack is possible. The way to prevent it here is not to encode the recepient of a letter in your own signature, but to write it onto the letter. So the correct play to fix this would be IMO e.g. the MUA (mutt, etc.). This can include some header lines before signing. Or if you write a contract with some editor, you write the parties yourself into it. Mahlzeit endergone Zwiebeltuete From harmil@spamcop.net Wed Feb 6 23:47:02 2002 From: harmil@spamcop.net (Aaron Sherman) Date: Wed Feb 6 23:47:02 2002 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <1013035679.9324.239.camel@pps> On Wed, 2002-02-06 at 13:10, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? Doh! This is a classic example of a social problem being attacked on a technical level (which is pretty much doomed to failure). The idea is that T[1]=E(B[pub],S(A[priv],P)) can be transformed into T[2]=E(C[pub],D(B[priv],T[1])) and the encryption envelope will tell you nothing to refute the assertion that A told C P. To which we all respond... duh. The document goes on to possit that where P is some permutation on "sender owes recipient US$X", recipient is ambiguous and all values of T[2,...] yeild an unexpected result for A (i.e. owing money to everyone on the planet). When I'm home, I'll look up and cite the page in AC where this is gone into in some depth, but the core of the argument here is that there is something wrong with this scenario, and that the encryption envelope should be responsible for protecting the innocent but stupid. If you feel this way, feel free to write a mail-encrypting system that duplicates the message headers and includes them in the signed plaintext. That will provide no assurance that you did NOT divulge information of course, but no cryptosystem alone can ever do that (mathematically speaking nothing can ever do that, but for some specialized applications, a reasonable subset can be achived). Ok, back to the topic: this is not gnupg's problem. It should not be gnupg's problem. This is the plaintext's author's problem, as it should be. As for the argument that someone could be fired for leaking company secrets or end up owing people money because of ambiguous statements I say foey. Turn that upside down, and I can buy it: the recipient cannot prove that they were the intended target of the message without some external data source (subpeonaed mailer logs, etc) and thus cannot rely on using the signed message as evidence of a contract or disclosure unless it is internally unambiguous. Yes, this is true. It means that recipients must require that the body of a signed message must be internally unambiguous or only rely on external information which is unambiguous (e.g. "USPS PKI ID xxxx owes USPS PKI ID yyyy the balance of PayPal account zzzz"; if you trust the USPS PKI and PayPal to maintain an unambiguos resolution of these values, then this message is fine....). Ok, I'm done ranting. I'll be in my corner ;-) From rabbi@quickie.net Thu Feb 7 00:52:02 2002 From: rabbi@quickie.net (Len Sassaman) Date: Thu Feb 7 00:52:02 2002 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: This was addressed pretty thoroughly on the Cryptography list when Davis's paper first came out. Basically, the "flaws" the paper is discussing are social, not technical. The steps that can be taken on a technical level to prevent this are few. (FWIW, OpenPGP's timestamping helps this a bit.) As for your Encrypt/Sign question, I think you are asking the order in which that occurs? The signature is inside the encryption envelope. This is the proper way to do it, for privacy/traffic analysis purposes. On Wed, 6 Feb 2002, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? > > Should there be an option --both, which does sign/encrypt/sign or some > such? I believe that the first time I installed PGP, there was an > option in my MUA to encrypt the relevant headers, but I don't think > that this is a problem that should be foisted upon the MUA developers, > as no-one seems to know about this issue. > > Thoughts? > > Cheers! > -Ben > > -- > bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben > --Len. From s.aparna@digital.com Thu Feb 7 05:44:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 05:44:01 2002 Subject: Compilation error while building GnuPG Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B6@diexch01.xko.dec.com> Hi, I trying to build GnuPG on Tru64 V5.1. I'm getting the following compilation error while building the tools sources; Make: Don't know how to make -liconv. Stop. I'm curious to know if anyone has faced this problem. Thanks for any help, Aparna. From s.aparna@digital.com Thu Feb 7 13:16:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 13:16:01 2002 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Hi, I used the 'configure' command while building GPGME. I got the following warning message; checking for gpgsm... no configure: WARNING: Could not find GpgSM, install GpgSM or use --with-gpgsm=PATH to enable it I checked the site www.gnupg.org site to get information on GPGSM. I could not find any. Any pointers ? Thanks, Aparna. From wk@gnupg.org Thu Feb 7 13:43:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 13:43:02 2002 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> ("Aparna, S"'s message of "Thu, 7 Feb 2002 17:40:33 +0530") References: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Message-ID: <87u1sth3ih.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Thu Feb 7 13:53:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 13:53:02 2002 Subject: Questions about GPGME In-Reply-To: <20020206204004.GA5312@tzi.de> (jgre@tzi.de's message of "Wed, 6 Feb 2002 21:40:04 +0100") References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> <20020206204004.GA5312@tzi.de> Message-ID: <87pu3hh32r.fsf@alberti.gnupg.de> On Wed, 6 Feb 2002 21:40:04 +0100, Janico Greifenberg said: > What I would like is are functions like > gpgme_set_pubkeyring(char *file); > gpgme_set_seckeyring(char *file); > gpgme_set_no_default_keyring(int ); > or something like that simple setting the gpg options accordingly. No we can't do this as this would bind the API to one specific backend. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); You should not use strlen() here because the signed data is in binary format. Use the value you have in NREAD or force creation of an armored signature using gpgme_set_armor before you do the sign. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann@ruhr-uni-bochum.de Thu Feb 7 14:48:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Thu Feb 7 14:48:01 2002 Subject: [Marcus.Brinkmann@ruhr-uni-bochum.de: Re: Questions about GPGME] Message-ID: <20020207134537.GK1026@212.23.136.22> Mmh, forgot to CC the list. Sorry. ----- Forwarded message from Marcus Brinkmann ----- From: Marcus Brinkmann To: Janico Greifenberg Subject: Re: Questions about GPGME On Wed, Feb 06, 2002 at 09:40:04PM +0100, Janico Greifenberg wrote: > This sound good, I just can't get the verify (or decrypt_verify) working. I'm > using the folling code: I can debug it, but please send in complete (but small) examples that compile without changes (this time I pulled together my C++ knowledge and made it compilable myself). First, a general comment. You might consider wrapping the GPGME data types in C++ classes. They should fall in the C++ style of programming quite naturally. > err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); gpgme_op_verify does only support detached signatures, so you must use GPGME_SIG_MODE_DETACH if you want to verify it with gpgme afterwards. (Except if something is encrypted and signed, then you can use decrypt_verify). > err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); You should not use hard limits like that. Avoid it by using gpgme_data_release_and_get_mem, which returns a pointer to a buffer and its size. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); This is the next error. The string consists of binary and might contain binary zeroes. So you should use the size returned by gpgme_data_release_and_get_mem. Alternatively, you can gpgme_data_read the buffer and calculat > bzero(str_out,sizeof(str_out)); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_data_new(&out2); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_op_verify(ctx,in,out2,&stat); gpgme_op_verify does not take an in and an out argument, but a sig and a plain argument (signature and plaintext). Please check out the documentation in doc/gpgme.texi in the CVS repository. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de ----- End forwarded message ----- -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna@digital.com Thu Feb 7 15:30:01 2002 From: s.aparna@digital.com (Aparna, S) Date: Thu Feb 7 15:30:01 2002 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Thanks for the information. I have another question. Where can I find the documentation for GPGME ? Thanks, Aparna. -----Original Message----- From: Werner Koch [mailto:wk@gnupg.org] Sent: Thursday, February 07, 2002 6:07 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GPGSM question On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From Marcus.Brinkmann@ruhr-uni-bochum.de Thu Feb 7 16:33:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Thu Feb 7 16:33:01 2002 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Message-ID: <20020207163033.A305@ulysses.alg.ruhr-uni-bochum.de> On Thu, Feb 07, 2002 at 07:54:51PM +0530, Aparna, S wrote: > Thanks for the information. > I have another question. > Where can I find the documentation for GPGME ? Check out the version from CVS, and run configure with the --enable-maintainer-mode, then it will be built along with gpgme. (see the README for more information, and the web site for more info how to use CVS). Thanks, Marcus From dres@cs.tu-berlin.de Thu Feb 7 20:11:01 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Thu Feb 7 20:11:01 2002 Subject: GnuPG PRNG insecure? Message-ID: <20020207200603.A28608@harry.cs.tu-berlin.de> Hello list, Recently, out of curiosity, I looked at GnuPG's random number generation and stumbled across something I think is problematic. However, I'm not a cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo random number generation. That's why I ask people here to comment on this. So read this with care; any or all of the things presented herein may be totally wrong. The problem: The problematic line that gave me headaches is in add_randomness() in random.c, where the random noise gathered by the (system dependant) different random code (rndlinux.c rndegd.c rndw32.c ..) is added to our random pool: rndpool[pool_writepos++] = *p++; The problem I see with this is, that previous data in our random pool is simply overwritten with new data. If our gathered data is already random in a cryptographically secure sense, this is not a problem per se. However, on non /dev/random systems such as win32 the system dependent random gather code simply puts much more "random" noise (gathered from lots of different sources of varying quality) into our pool, in the hope that the random pool code handles this correctly (like whitening the buffer via use of a hash function etc.). To further express this, imagine that the system-x random gatherer is asked to add x bytes of random data into our pool. The gatherer "decides" that to satisfy this demand he has to put out 2*POOLSIZE of random noise containing not-that-much entropy. After POOLSIZE bytes have been written, the code in random.c correctly whitens the buffer using RIPEMD160. However, the next POOLSIZE bytes of random data (of questionable quality) *overwrite* anything that was in the pool before, destroying the valuable accumulated entropy. (The worst case would be these last POOLSIZE bytes being all zeros.) The impact: This depends on the quality of the environmental noise gatherer used, but theoretically keys generated with GnuPG on systems lacking a good random source are at risk. The fix: As said, I'm not that experienced with PRNGs etc, but I think this would do just fine: rndpool[pool_writepos++] ^= *p++; This will also harden the PRNG against attacks on systems which *do* have a good random source (such as linux). Furthermore, already collected entropy is not simply thrown away (even if "used"), instead it is kept in full, still it is impossible to guess the current state of the pool based on the previous one (without knowledge of the actual random data). In short: this should always increase the PRNGs quality. Please Cc any replies, as I'm not subscribed. -- Stefan Keller From wk@gnupg.org Thu Feb 7 22:19:03 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 7 22:19:03 2002 Subject: New releases of libgcrypt, libksba and newpg Message-ID: <87u1st9er4.fsf@alberti.gnupg.de> Hi! I have just released some software for the Aegypten project. To demonstrate that we made some progress I bumbed some version numbers a bit ;-) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.6.tar.gz (618k) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.5-1.1.6.diff.gz (12k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/libksba-0.2.0.tar.gz (357k) [sorry, no diff file] ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.3.0.tar.gz (262k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.0.0-0.3.0.diff.gz (102k) There is no need to build OpenSC yet as we only have some stubs. you need to build libksba and libgcrypt prior to newpg. The major news is that gpg-agent does now operate as a daemon ("eval `gpg-agent`"), caches the passphrases and encrypts the secret keys. You may want to try the gpg-agent with the latest GnuPG CVS version which supports the new protocol - I am using this daily with Gnus. There is also some progress with certicate handling etc. Because theDirMngr has not yet been released the gpgsm option --disable-crl-checks might come handy. For more information consult http://www.gnupg.org/aegypten/ or ask on gpa-dev@gnupg.org. Have fun, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mooney@dogbert.cc.ndsu.NoDak.edu Fri Feb 8 03:12:02 2002 From: mooney@dogbert.cc.ndsu.NoDak.edu (Tim Mooney) Date: Fri Feb 8 03:12:02 2002 Subject: GnuPG on Tru64 versions In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Message-ID: In regard to: GnuPG on Tru64 versions, Aparna, S said (at 4:20pm on Feb 5,...: >I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any >of the flavors of Compaq Tru64 Unix. I had a lot of problems with the early 1.0.x versions not working correctly, but 1.0.6 seems to be much better. I haven't used it much yet, though. I compiled it using the vendor cc/ld on Tru64 5.1. Tim -- Tim Mooney mooney@dogbert.cc.ndsu.NoDak.edu Information Technology Services (701) 231-1076 (Voice) Room 242-J6, IACC Building (701) 231-8541 (Fax) North Dakota State University, Fargo, ND 58105-5164 From pgut001@cs.auckland.ac.nz Fri Feb 8 07:13:01 2002 From: pgut001@cs.auckland.ac.nz (Peter Gutmann) Date: Fri Feb 8 07:13:01 2002 Subject: GnuPG PRNG insecure? Message-ID: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> >Recently, out of curiosity, I looked at GnuPG's random number generation and >stumbled across something I think is problematic. However, I'm not a >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo >random number generation. That's why I ask people here to comment on this. So >read this with care; any or all of the things presented herein may be totally >wrong. It's a pretty accurate analysis. The flaw is worrying, but not fatal, since (assuming it accurately implements the design in http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from the mixed input of a significant portion of the pool, ie 640 bits of pool data are used for each output block. However, if user seeding is allowed it's a bit more problematic since an attacker can overwrite the pool contents with known values. The original implementation has the comment: /* Mix the incoming data into the pool. This operation is resistant to chosen- and known-input attacks because the pool contents are unknown to an attacker, so XOR'ing in known data won't help them. In an attacker could determine pool contents by observing the generator output (which is defeated by the postprocessing), we'd have to perform an extra input mixing operation to defeat these attacks */ which addresses chosen/known-input attacks (and just for the record, it does XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG doesn't allow outside control of the seeding, this isn't a big problem, but it's still something which should be fixed. Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search for that name will find further discussion on this topic. I think copying xorbytes is taking GPG's PGP compatibility a bit far :-). Peter. From wk@gnupg.org Fri Feb 8 08:33:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 08:33:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020207200603.A28608@harry.cs.tu-berlin.de> (Stefan Keller's message of "Thu, 7 Feb 2002 20:06:03 +0100") References: <20020207200603.A28608@harry.cs.tu-berlin.de> Message-ID: <87bsf0a0yp.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > The problem I see with this is, that previous data in our random > pool is simply overwritten with new data. If our gathered data is Thanks Stefan for pointing this out. As Peter already mentioned, this is not a serious flaw because an attacker is not able to mix data of his choice in. I fixed it of course. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Fri Feb 8 08:59:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 08:59:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <8766589zoj.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 19:10:18 +1300 (NZDT), Peter Gutmann said: > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from It should implement a CSPRNG as described in your 1998(?) paper. > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). What worries me most is that it needed *4 years* to figure this bug out _and_ report it. I'd have expected that some more people had a close look at those critical things. It is a very sad thing that there is so less truth in the claim that bugs in Free Software are figured out very fast - I have seen too many counterexamples :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From roam@ringlet.net Fri Feb 8 10:01:01 2002 From: roam@ringlet.net (Peter Pentchev) Date: Fri Feb 8 10:01:01 2002 Subject: Add a --fast option to --import and --recv-keys Message-ID: <20020208105758.A39499@straylight.oblivion.bg> --gBBFr7Ir9EOA20Yy Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi, The attached patch adds the benefit of --import-fast to --recv-keys. The new --fast option works with both --import and --recv-keys, only importing the keys without updating the trustdb. --import-fast is still a valid option, but all it does is set the new 'fast' option and then fall back to the handling of --import. This speeds up things a *lot* when fetching multiple keys from a keyserver. Any comments on the patch are appreciated. G'luck, Peter --=20 Peter Pentchev roam@ringlet.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 What would this sentence be like if pi were 3? Index: g10/g10.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/g10.c,v retrieving revision 1.1.1.1 retrieving revision 1.3 diff -u -r1.1.1.1 -r1.3 --- g10/g10.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/g10.c 8 Feb 2002 07:33:51 -0000 1.3 @@ -208,6 +208,7 @@ oNoSigCreateCheck, oEmu3DESS2KBug, /* will be removed in 1.1 */ oEmuMDEncodeBug, + oFast, aTest }; =20 =20 @@ -406,6 +407,7 @@ { aDeleteSecretAndPublicKey, "delete-secret-and-public-key",256, "@" }, { oEmu3DESS2KBug, "emulate-3des-s2k-bug", 0, "@"}, { oEmuMDEncodeBug, "emulate-md-encode-bug", 0, "@"}, + { oFast, "fast", 0, "@" }, {0} }; =20 =20 @@ -751,8 +753,8 @@ switch( pargs.r_opt ) { case aCheckKeys: set_cmd( &cmd, aCheckKeys); break; case aListPackets: set_cmd( &cmd, aListPackets); break; + case aFastImport: opt.fast_import=3D1; /* FALLTHROUGH */ case aImport: set_cmd( &cmd, aImport); break; - case aFastImport: set_cmd( &cmd, aFastImport); break; case aSendKeys: set_cmd( &cmd, aSendKeys); break; case aRecvKeys: set_cmd( &cmd, aRecvKeys); break; case aExport: set_cmd( &cmd, aExport); break; @@ -991,6 +993,7 @@ iobuf_enable_special_filenames (1); break; case oNoExpensiveTrustChecks: opt.no_expensive_trust_checks=3D1;= break; + case oFast: opt.fast_import=3D1; break; =20 default : pargs.err =3D configfp? 1:2; break; } @@ -1370,9 +1373,8 @@ } break; =20 - case aFastImport: case aImport: - import_keys( argc? argv:NULL, argc, (cmd =3D=3D aFastImport) ); + import_keys( argc? argv:NULL, argc, opt.fast_import ); break; =20 case aExport: @@ -1385,7 +1387,7 @@ if( cmd =3D=3D aSendKeys ) hkp_export( sl ); else if( cmd =3D=3D aRecvKeys ) - hkp_import( sl ); + hkp_import( sl , opt.fast_import ); else export_pubkeys( sl, (cmd =3D=3D aExport) ); free_strlist(sl); Index: g10/hkp.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.c,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.c 8 Feb 2002 07:32:52 -0000 1.2 @@ -47,7 +47,7 @@ * or other error codes. */ int -hkp_ask_import( u32 *keyid ) +hkp_ask_import( u32 *keyid, int fast ) { struct http_context hd; char *request; @@ -85,7 +85,7 @@ : g10_errstr(rc) ); } else { - rc =3D import_keys_stream( hd.fp_read , 0 ); + rc =3D import_keys_stream( hd.fp_read , fast ); http_close( &hd ); } =20 @@ -96,7 +96,7 @@ =20 =20 int -hkp_import( STRLIST users ) +hkp_import( STRLIST users, int fast ) { if( !opt.keyserver_name ) { log_error(_("no keyserver known (use option --keyserver)\n")); @@ -114,7 +114,7 @@ * errorcounter ist not increaed and the program will return * with success - which is not good when this function is used. */ - if( hkp_ask_import( kid ) ) + if( hkp_ask_import( kid , fast ) ) log_inc_errorcount(); } return 0; Index: g10/hkp.h =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -23,7 +23,7 @@ =20 =20 int hkp_ask_import( u32 *keyid ); -int hkp_import( STRLIST users ); +int hkp_import( STRLIST users, int fast ); int hkp_export( STRLIST users ); =20 =20 Index: g10/options.h =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/options.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/options.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/options.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -103,6 +103,7 @@ int no_expensive_trust_checks; int no_sig_cache; int no_sig_create_check; + int fast_import; } opt; =20 =20 --gBBFr7Ir9EOA20Yy Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjxjkxYACgkQ7Ri2jRYZRVPbuQCfRbIW2nl+hJkgal5irMkbg+5w aqIAn2rtZZMU0fFHoxColzbdAKVSmPBP =C4jG -----END PGP SIGNATURE----- --gBBFr7Ir9EOA20Yy-- From wk@gnupg.org Fri Feb 8 11:07:01 2002 From: wk@gnupg.org (Werner Koch) Date: Fri Feb 8 11:07:01 2002 Subject: Add a --fast option to --import and --recv-keys In-Reply-To: <20020208105758.A39499@straylight.oblivion.bg> (Peter Pentchev's message of "Fri, 8 Feb 2002 10:57:59 +0200") References: <20020208105758.A39499@straylight.oblivion.bg> Message-ID: <878za48f88.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 10:57:59 +0200, Peter Pentchev said: > Any comments on the patch are appreciated. Thanks. However the CVS version and the 1.0.6c snapshot have a entirely revamped trustdb which is really fast compared to the old way. The one thing we have to improve is the speed of keylookup by replacing the sequential scans with an index and keeping some meta data. This is partly done but won't go into 1.0.7. Ciao, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw@jabberwocky.com Fri Feb 8 15:45:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Fri Feb 8 15:45:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <8766589zoj.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> Message-ID: <20020208144156.GD678@akamai.com> On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > What worries me most is that it needed *4 years* to figure this bug > out _and_ report it. I'd have expected that some more people had a > close look at those critical things. It is a very sad thing that > there is so less truth in the claim that bugs in Free Software are > figured out very fast - I have seen too many counterexamples :-( Make it worth their while. Netscape used to give out money for each verified bug report. We could give them some free beer to go with their free software. :) I'd be willing to throw some money into a pot for people who find security-related bugs in GnuPG. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From jas@extundo.com Fri Feb 8 20:07:01 2002 From: jas@extundo.com (Simon Josefsson) Date: Fri Feb 8 20:07:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: pgut001@cs.auckland.ac.nz (Peter Gutmann) writes: > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). Makes you wonder if this code was simply copied from PGP? What about license etc? From dres@cs.tu-berlin.de Fri Feb 8 23:46:01 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Fri Feb 8 23:46:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208233946.A16027@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:10:18PM +1300, Peter Gutmann wrote: > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. I've just read your excellent paper (wish I had access to it / read it beforehand). Mind it to explain why the flaw is not fatal? As I explained, on non /dev/random (or equivalent) systems there are often *much* more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have been put into the pool, the entropy collected with the first POOLSIZE bytes is lost. (Things would be different if GnuPG was keeping some state information of the previous pool mixing operation, such as the last digest computed or the whole hash buffer.) So if those last POOLSIZE bytes happen to contain zero entropy (or a very small amount), it doesn't matter how the output is generated; it will not contain very much randomness, and thus might be easily guessable by an attacker. However, I don't know if this does really happen. I don't know how many bytes e.g. the slow_gatherer in rndw32.c really puts out, but if it happens to be much more than POOLSIZE, the quality of the PRNG solely depends on the last POOLSIZE bytes collected. Unless, of course, I completely misunderstood things. -- Stefan Keller From sroberts@uniserve.com Sat Feb 9 01:33:02 2002 From: sroberts@uniserve.com (Sam Roberts) Date: Sat Feb 9 01:33:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208073557.A50024497@localhost> "just for the record, it does XOR the data" I guess I'm missing something, too, because it certainly looks to me like new data is assigned over data already in the pool, and my understanding was XORing known values into a pool could not DECREASE the entropy in the pool, but assigning seems to mean you'll lose some of the current contents of the pool. What am I missing, where's the XOR occuring? Thanks, Sam Quoting Peter Gutmann , who wrote: > >Recently, out of curiosity, I looked at GnuPG's random number generation and > >stumbled across something I think is problematic. However, I'm not a > >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo > >random number generation. That's why I ask people here to comment on this. So > >read this with care; any or all of the things presented herein may be totally > >wrong. > > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. > > However, if user seeding is allowed it's a bit more problematic since an > attacker can overwrite the pool contents with known values. The original > implementation has the comment: > > /* Mix the incoming data into the pool. This operation is resistant > to chosen- and known-input attacks because the pool contents are > unknown to an attacker, so XOR'ing in known data won't help them. > In an attacker could determine pool contents by observing the > generator output (which is defeated by the postprocessing), we'd > have to perform an extra input mixing operation to defeat these > attacks */ > > which addresses chosen/known-input attacks (and just for the record, it does > XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG > doesn't allow outside control of the seeding, this isn't a big problem, but > it's still something which should be fixed. > > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). > > Peter. > > > _______________________________________________ > Gnupg-devel mailing list > Gnupg-devel@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-devel -- Sam Roberts (Vivez sans temps mort!) From rabbi@quickie.net Sat Feb 9 02:20:01 2002 From: rabbi@quickie.net (Len Sassaman) Date: Sat Feb 9 02:20:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> Message-ID: On Fri, 8 Feb 2002, David Shaw wrote: > On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > > > What worries me most is that it needed *4 years* to figure this bug > > out _and_ report it. I'd have expected that some more people had a > > close look at those critical things. It is a very sad thing that > > there is so less truth in the claim that bugs in Free Software are > > figured out very fast - I have seen too many counterexamples :-( > > Make it worth their while. Netscape used to give out money for each > verified bug report. We could give them some free beer to go with > their free software. :) Exactly. Open source developers who expect free audits of their code simply because it is open are going to be disappointed, especially if they don't actively seek them. The reasons why source code must be available (from a security auditing perspective) are a) that a user can commission an audit if he wishes, and b) he is assured that the code he just had audited is the real deal, and not a "cleaned" version without back doors. --Len. From dres@cs.tu-berlin.de Sat Feb 9 03:56:02 2002 From: dres@cs.tu-berlin.de (Stefan Keller) Date: Sat Feb 9 03:56:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208073557.A50024497@localhost>; from sroberts@uniserve.com on Fri, Feb 08, 2002 at 07:35:58AM -0500 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208073557.A50024497@localhost> Message-ID: <20020209035130.A20792@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:35:58AM -0500, Sam Roberts wrote: > "just for the record, it does XOR the data" > > What am I missing, where's the XOR occuring? Peter was referring to "the original implementation", which I guess (after reading his paper) is the PRNG implementation in cryptlib. -- Stefan Keller From sroberts@uniserve.com Sat Feb 9 04:56:01 2002 From: sroberts@uniserve.com (Sam Roberts) Date: Sat Feb 9 04:56:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <87bsf0a0yp.fsf@alberti.gnupg.de>; from wk@gnupg.org on Fri, Feb 08, 2002 at 08:26:22AM +0100 References: <20020207200603.A28608@harry.cs.tu-berlin.de> <87bsf0a0yp.fsf@alberti.gnupg.de> Message-ID: <20020208105910.B73285669@localhost> Quoting Werner Koch , who wrote: > On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > Thanks Stefan for pointing this out. As Peter already mentioned, this > is not a serious flaw because an attacker is not able to mix data of > his choice in. I fixed it of course. Perhaps it should be fixed in the stable 1.0 branch as well? Sam -- Sam Roberts (Vivez sans temps mort!) From jsogo@debian.org Sat Feb 9 15:43:01 2002 From: jsogo@debian.org (Jose Carlos Garcia Sogo) Date: Sat Feb 9 15:43:01 2002 Subject: GPGME/jnlib includes gcrypt.h Message-ID: <20020209144104.GB2706@jaimedelamo.eu.org> --ftEhullJWpWg/VHq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello! I was trying to compile latest GPGME 0.3.1, but I have seen that jnlib_config.h includes gcrypt.h, which is not available in the GPGME tarball, and I guess it's part of libgcrypt. Do I need libgcrypt to compile GPGME? The error I get is: gcc -DHAVE_CONFIG_H -I. -I. -I.. -I../intl -g -O2 -Wall -Wcast-align -Wshadow -Wstrict-prototypes -c `test -f stringhelp.c || echo './'`stringhelp.c In file included from stringhelp.c:27: libjnlib-config.h:29: gcrypt.h: No such file or directory make[3]: *** [stringhelp.o] Error 1 Cheers,=20 Jose Carlos Garcia Sogo jsogo@debian.org --ftEhullJWpWg/VHq Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8ZTUAS+BYJZB4jhERAjC/AKCPzL+QimP/9rQyXpGqYVD5Xtn2owCdHhJf Z4KyIHFb0Sb7dXXsgf+aDm0= =N5wB -----END PGP SIGNATURE----- --ftEhullJWpWg/VHq-- From Marcus.Brinkmann@ruhr-uni-bochum.de Sat Feb 9 22:45:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sat Feb 9 22:45:01 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209144104.GB2706@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> Message-ID: <20020209214306.GB1387@212.23.136.22> On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > I was trying to compile latest GPGME 0.3.1, but I have seen that > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > tarball, and I guess it's part of libgcrypt. D'oh! I obviously never read the jnlib README, and when updating it I overwrote the local part of it (of which I wasn't aware at all). As I have libgcrypt installed, I didn't notice this. Thanks for spotting it! You can fix it by going back to the old version of the file, but I will also upload a gpgme 0.3.2. But I will wait until tomorrow, in case you find another bug. Here is a diff for you that reverts the change: Index: libjnlib-config.h =================================================================== RCS file: /cvs/gnupg/gpgme/jnlib/libjnlib-config.h,v retrieving revision 1.3 retrieving revision 1.4 diff -u -r1.3 -r1.4 --- libjnlib-config.h 2002/01/22 16:29:12 1.3 +++ libjnlib-config.h 2002/02/09 21:41:46 1.4 @@ -26,9 +26,11 @@ #ifndef LIBJNLIB_CONFIG_H #define LIBJNLIB_CONFIG_H -#include /* gcry_malloc & Cie. */ +#include "xmalloc.h" #include "logging.h" + + #ifdef USE_SIMPLE_GETTEXT int set_gettext_file( const char *filename ); const char *gettext( const char *msgid ); @@ -56,11 +58,11 @@ #endif /* !USE_SIMPLE_GETTEXT */ -#define jnlib_xmalloc(a) gcry_xmalloc( (a) ) -#define jnlib_xcalloc(a,b) gcry_xcalloc( (a), (b) ) -#define jnlib_xrealloc(a,n) gcry_xrealloc( (a), (n) ) -#define jnlib_xstrdup(a) gcry_xstrdup( (a) ) -#define jnlib_free(a) gcry_free( (a) ) +#define jnlib_xmalloc(a) xmalloc( (a) ) +#define jnlib_xcalloc(a,b) xcalloc( (a), (b) ) +#define jnlib_xrealloc(a,n) xrealloc( (a), (n) ) +#define jnlib_xstrdup(a) xstrdup( (a) ) +#define jnlib_free(a) free( (a) ) #define jnlib_log_debug log_debug #define jnlib_log_info log_info @@ -70,6 +72,4 @@ #endif /*LIBJNUTIL_CONFIG_H*/ - - -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From jsogo@debian.org Sun Feb 10 01:35:02 2002 From: jsogo@debian.org (Jose Carlos Garcia Sogo) Date: Sun Feb 10 01:35:02 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209214306.GB1387@212.23.136.22> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> Message-ID: <20020210003327.GA31140@jaimedelamo.eu.org> --SUOF0GtieIMvvwua Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable El Sat, Feb 09, 2002 at 10:43:06PM +0100, Marcus Brinkmann escrib=EDa: > On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > > I was trying to compile latest GPGME 0.3.1, but I have seen that > > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > > tarball, and I guess it's part of libgcrypt. >=20 [snip] >=20 > Thanks for spotting it! You can fix it by going back to the old version = of > the file, but I will also upload a gpgme 0.3.2. But I will wait until > tomorrow, in case you find another bug. It builds fine now. I'll wait to version 0.3.2 to upload it to Debian. Thank you. Jose Carlos Garcia Sogo jsogo@debian.org --SUOF0GtieIMvvwua Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8Zb/XS+BYJZB4jhERAtkDAKCGseLDmq2Xk0NmPxSZoMjthq0aigCfS7pv 4OCUODPeknR0cDi0ECSf74Y= =AcqW -----END PGP SIGNATURE----- --SUOF0GtieIMvvwua-- From Katie19@aol.com Sun Feb 10 09:07:01 2002 From: Katie19@aol.com (Katie19@aol.com) Date: Sun Feb 10 09:07:01 2002 Subject: Free Trial Membership Message-ID: <200202100751.XAA01350@web66.fenzi.com> Below is the result of your feedback form. It was submitted by (Katie19@aol.com) on Saturday, February 9, 2002 at 23:51:16 --------------------------------------------------------------------------- :: Just as a new version is getting ready to come out, the Macverse is up to 0.3.0 of GPGME. The wrappers have some improvements in the API, better documentation, and such. Also, it should work with GNUStep. You can find more info at: http://macgpg.sourceforge.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From Marcus.Brinkmann@ruhr-uni-bochum.de Sun Feb 10 15:00:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sun Feb 10 15:00:02 2002 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020210003327.GA31140@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> <20020210003327.GA31140@jaimedelamo.eu.org> Message-ID: <20020210135752.GD696@212.23.136.22> On Sun, Feb 10, 2002 at 01:33:27AM +0100, Jose Carlos Garcia Sogo wrote: > It builds fine now. I'll wait to version 0.3.2 to upload it to > Debian. Thanks, I have uploaded 0.3.2. My announcement is stuck because of moderation, though. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From wk@gnupg.org Sun Feb 10 18:38:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:38:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: (Len Sassaman's message of "Fri, 8 Feb 2002 17:18:17 -0800 (PST)") References: Message-ID: <87heopkzr9.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 17:18:17 -0800 (PST), Len Sassaman said: > Exactly. Open source developers who expect free audits of their code > simply because it is open are going to be disappointed, especially if they However a lot of people try to sell this as the advantage of Free Software but the only evidence I have ever saw are counter examples. > The reasons why source code must be available (from a security auditing > perspective) are a) that a user can commission an audit if he wishes, and > b) he is assured that the code he just had audited is the real deal, and 100% agreed. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Sun Feb 10 18:48:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:48:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> (David Shaw's message of "Fri, 8 Feb 2002 09:41:56 -0500") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> Message-ID: <87d6zdkzc4.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > I'd be willing to throw some money into a pot for people who find > security-related bugs in GnuPG. The main problem is that it needs expierenced programmers to find the non trivial bugs. Those programmers are usually writing new code or fixing old one and don't have the time to screen other programs and it is not so interesting to do audits - especially not on a unpaid or low paid basis. So I don't believe that a little bit money will help. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Sun Feb 10 18:50:02 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 18:50:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: (Simon Josefsson's message of "Fri, 08 Feb 2002 20:04:58 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <878za1kz7j.fsf@alberti.gnupg.de> On Fri, 08 Feb 2002 20:04:58 +0100, Simon Josefsson said: > Makes you wonder if this code was simply copied from PGP? What about > license etc? *a++ = *b++ is quite a common construct in C as well as *a++ ^= *b++ The random code used by GnuPG is entirely different from the one in PGP. I wrote from the description in Peter's paper. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mb@g10code.de Sun Feb 10 21:04:03 2002 From: mb@g10code.de (Marcus Brinkmann) Date: Sun Feb 10 21:04:03 2002 Subject: [Announce] GPGME 0.3.2 released Message-ID: <20020210135606.GB696@212.23.136.22> We are pleased to announce version 0.3.2 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 579 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.2.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 9cb02a8c4c70bb291ea002e25eb8dd30 gpgme-0.3.1-0.3.2.diff.gz 987838060829be0235abc4f430cf6cd3 gpgme-0.3.1-0.3.2.diff.gz.sig a3d208a615ccbbc9ce1e31ee7f2f5fc3 gpgme-0.3.2.tar.gz f2b2f839ea4e2f15a2cbd4fafc3dbf6c gpgme-0.3.2.tar.gz.sig Noteworthy changes in version 0.3.2 (2002-02-10) ------------------------------------------------ * Remove erroneous dependency on libgcrypt in jnlib. This is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From Marcus.Brinkmann@ruhr-uni-bochum.de Sun Feb 10 21:06:04 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Sun Feb 10 21:06:04 2002 Subject: [Announce] GPGME 0.3.1 released Message-ID: <20020209020628.GE3429@212.23.136.22> We are pleased to announce version 0.3.1 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 577 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.1.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are aa8f7033ac316458e100d3716ea7133b gpgme-0.3.1.tar.gz 518da3712aeeb10e5aeff7c02878c10c gpgme-0.3.1.tar.gz.sig 4cf626a2fd200b673e07e6de5979bedf gpgme-0.3.0-0.3.1.diff.gz 09e30e80bd5f834525ca65458c8b9db7 gpgme-0.3.0-0.3.1.diff.gz.sig Noteworthy changes in version 0.3.1 (2002-02-09) ------------------------------------------------ * There is a Texinfo manual documenting the API. * The gpgme_set_keylist_mode function returns an error, and changed its meaning. It is no longer usable to select between normal and fast mode (newer versions of GnuPG will always be fast), but selects between local keyring, remote keyserver, or both. For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the current setting, a fucntion gpgme_get_keylist_mode was added to retrieve the current mode. * gpgme_wait accepts a new argument STATUS to return the error status of the operation on the context. Its definition is closer to waitpid() now than before. * The LENGTH argument to gpgme_data_new_from_filepart changed its type from off_t to the unsigned size_t. * The R_HD argument to the GpgmePassphraseCb type changed its type from void* to void**. * New interface gpgme_op_trustlist_end() to match gpgme_op_keylist_end(). * The CryptPlug modules have been renamed to gpgme-openpgp and gpgme-smime, and they are installed in pkglibdir by `make install'. * An idle function can be registered with gpgme_register_idle(). * The GpgSM backend supports key generation with gpgme_op_genkey(). * Interface changes relative to the 0.3.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t. GpgmePassphraseCb CHANGED: Type of R_HD is void **. gpgme_wait CHANGED: New argument STATUS. gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError. The function has a new meaning! gpgme_get_keylist_mode NEW GPGME_KEYLIST_MODE_LOCAL NEW GPGME_KEYLIST_MODE_EXTERN NEW gpgme_op_trustlist_next NEW GpgmeIdleFunc NEW gpgme_register_idle NEW ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From wk@gnupg.org Sun Feb 10 22:06:01 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 10 22:06:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208233946.A16027@harry.cs.tu-berlin.de> (Stefan Keller's message of "Fri, 8 Feb 2002 23:39:46 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208233946.A16027@harry.cs.tu-berlin.de> Message-ID: <87n0yh2grw.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 23:39:46 +0100, Stefan Keller said: > As I explained, on non /dev/random (or equivalent) systems there are often *much* > more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have > been put into the pool, the entropy collected with the first POOLSIZE bytes is Okay, I did some tests on GNU/Linux (i383) to see how othen a mix_pool is done. For all relevant cases a mix is done not later than when ~65% of the buffer is filled; this carries more than 212 bytes state from one mix to the next. The usual case are mixes after 88 bytes right after a fast poll. But yes, the missing XOR is a serious bug which should be fixed in libgcrypt as ASAP because there we don't have a one-shot use of the application but might use the RNG under entirely different conditions. To make the implementaion more robust I will also carry a hash from the entrire pool between mixes. Thanks again, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From info@nakawe.se Mon Feb 11 10:16:01 2002 From: info@nakawe.se (Veronica Loell) Date: Mon Feb 11 10:16:01 2002 Subject: generate keys on win2k prof Message-ID: Hello, When I try to generate a key (using winpt) I get an access violation and gpg is shut down by windows. I have searched the mailing list archives etc but not found any clues to what might be the problem. I am using gpg 1.0.6 and win2k 5.00.2195 sp2 Just in case there is any information in the log file I'm enclosing it at the end of this message. Might there be some installation settings that I have not done? I have looked for information about that but not found any. I am not a memebr of this list so if there is someone that has an idea I would appreciate a cc. Thanks. Veronica Loell --------------------- logfile: --------------------- Application exception occurred: App: (pid=1092) When: 2002-02-11 @ 09:58:23.748 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: NAKAWE-PII-266 User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 3 Stepping 3 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 2 Current Type: Uniprocessor Free Registered Organization: Nakawe data Registered Owner: Veronica Loell State Dump for Thread Id 0x508 eax=a5a5a5a5 ebx=00000000 ecx=a5a5a5a5 edx=00000002 esi=024b0028 edi=c0000005 eip=77df9877 esp=0248ec64 ebp=0248ee28 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: 77df984a 399de0feffff cmp [ebp+0xfffffee0],ebx ss:0248ed08=a5a5a5a5 77df9850 7419 jz 77dffc6b 77df9852 64a118000000 mov eax,fs:[00000018] fs:00000018=???????? 77df9858 ffb5acfeffff push dword ptr [ebp+0xfffffeac] ss:0248ecd4=a5a5a5a5 77df985e 53 push ebx 77df985f 8b4030 mov eax,[eax+0x30] ds:a6947b77=???????? 77df9862 ff7018 push dword ptr [eax+0x18] ds:a6947b77=???????? 77df9865 ff150813db77 call dword ptr [77db1308] ds:77db1308=77fcb633 77df986b 8b8d04ffffff mov ecx,[ebp+0xffffff04] ss:0248ed2c=a5a5a5a5 77df9871 8b85e4feffff mov eax,[ebp+0xfffffee4] ss:0248ed0c=a5a5a5a5 FAULT ->77df9877 01481c add [eax+0x1c],ecx ds:a6947b77=???????? 77df987a 3bfb cmp edi,ebx 77df987c 0f8452010000 je 77df99d4 77df9882 399d0cffffff cmp [ebp+0xffffff0c],ebx ss:0248ed34=00000001 77df9888 7510 jnz 77e0199a 77df988a 81ffea000000 cmp edi,0xea 77df9890 745d jz 77e019ef 77df9892 81ff02010000 cmp edi,0x102 77df9898 7455 jz 77e01bef 77df989a 833d301fe07701 cmp dword ptr [77e01f30],0x1 ds:77e01f30=00000001 77df98a1 7c3e jl 77e021e1 77df98a3 89bd68ffffff mov [ebp+0xffffff68],edi ss:0248ed90=a5a5a5a5 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0248EE28 77DF7CC8 0248F164 00000000 7FFDEBF8 0248F2F0 advapi32! 0248F1B0 77DB8523 80000004 7FFDEBF8 00000000 0248F2E8 advapi32! 0248F288 77DB8B63 80000004 7FFDEBF8 0248F2E8 024F2008 advapi32!RegCloseKey 0248F2E0 004675C8 80000004 004671EC 00018000 00000000 advapi32!RegQueryValueExA 0248F3D0 00467829 00459F14 00000003 024D9E01 0046AE8B ! 0248F4A0 0045A10A 00459F14 00000003 0000012C 00000002 ! 0248F4D0 00459D49 00000003 0000012C 00000002 0046BE05 ! 0248F500 00459519 02497AD0 00000014 00000002 0046BD78 ! 0248F540 0045A81B 000000A0 00000002 00000001 02491378 ! 0248F580 0045AC3A 0248F5B0 00000400 0248F63C 00000000 ! 0248F5D0 00447384 00000011 00000400 0248F640 0248F63C ! 0248F600 0043FA21 00000011 00000400 0248F640 0248F63C ! 0248F660 00441827 00000400 024B0FD0 024B0398 02497870 ! 0248F6A0 00442FF3 00000011 00000400 024B0FD0 024B0398 ! 0248F750 00441EDC 024B4000 0248F7E0 00000008 74FC3CC0 ! 0248F790 0044265F 024B4000 00441F4D 0248F7E0 0248F948 ! 0248FCD0 004427B4 00441F4D 02496508 02496508 00402DF9 ! 0248FE00 0040606C 00000000 00000000 00000000 004034A3 ! 0248FF90 00401074 00000000 02492D7C 02495A80 0040105A ! 0248FFC0 77E97D08 0012E34C 00000002 7FFDF000 C0000005 ! 0248FFF0 00000000 00401044 00000000 000000C8 00000100 kernel32!CreateProcessW *----> Raw Stack Dump <----* 0248ec64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec84 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248eca4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecb4 a5 a5 a5 a5 a5 a5 a5 a5 - 05 00 00 c0 a5 a5 a5 a5 ................ 0248ecc4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecd4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ece4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecf4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed04 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed14 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed24 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed34 01 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed44 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed54 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed84 00 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ State Dump for Thread Id 0x608 eax=000001ec ebx=00007530 ecx=024b0f20 edx=00000000 esi=00000000 edi=00000000 eip=77f82837 esp=0714febc ebp=0714fee4 iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtRemoveIoCompletion 77f8282c b8a8000000 mov eax,0xa8 77f82831 8d542404 lea edx,[esp+0x4] ss:0803d48f=???????? 77f82835 cd2e int 2e 77f82837 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0714FEE4 77D470E6 00000074 0714FF1C 0714FF0C 0714FF14 ntdll!NtRemoveIoCompletion 0714FF20 77D5D195 00007530 0714FF60 0714FF5C 0714FF70 rpcrt4!I_RpcSetServerContextList 0714FF74 77D5D074 77D50D7F 0249CB58 00000008 0248E70C rpcrt4!NdrComplexArrayFree 0714FFA8 77D50C7A 024B5F98 0714FFEC 77E8758A 024B0F20 rpcrt4!NdrComplexArrayFree 0714FFB4 77E8758A 024B0F20 00000008 0248E70C 024B0F20 rpcrt4!RpcBindingSetOption 0714FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetFilePointer State Dump for Thread Id 0x300 eax=778321fe ebx=00000003 ecx=77db0260 edx=00000000 esi=77f8281e edi=00000003 eip=77f82829 esp=094afd24 ebp=094afd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f8281e b8e9000000 mov eax,0xe9 77f82823 8d542404 lea edx,[esp+0x4] ss:0a39d2f7=???????? 77f82827 cd2e int 2e 77f82829 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 094AFD70 77E86E1A 094AFD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects 094AFFB4 77E8758A 00000004 00000000 000B000A 024BEC60 kernel32!WaitForMultipleObjects 094AFFEC 00000000 778321FE 024BEC60 00000000 000000C8 kernel32!SetFilePointer *----> Raw Stack Dump <----* 094afd24 da 6d e8 77 03 00 00 00 - 48 fd 4a 09 01 00 00 00 .m.w....H.J..... 094afd34 00 00 00 00 00 00 00 00 - 00 00 00 00 60 ec 4b 02 ............`.K. 094afd44 01 00 00 00 08 03 00 00 - 0c 03 00 00 1c 03 00 00 ................ 094afd54 67 63 63 20 61 63 63 65 - 70 74 73 20 2d 67 2e 2e gcc accepts -g.. 094afd64 2e 20 79 65 73 0a 63 68 - 65 63 6b 69 b4 ff 4a 09 . yes.checki..J. 094afd74 1a 6e e8 77 48 fd 4a 09 - 01 00 00 00 00 00 00 00 .n.wH.J......... 094afd84 00 00 00 00 00 00 00 00 - b2 22 83 77 03 00 00 00 .........".w.... 094afd94 b0 fe 4a 09 00 00 00 00 - ff ff ff ff 60 ec 4b 02 ..J.........`.K. 094afda4 0a 00 0b 00 00 00 00 00 - 58 69 7a 65 64 20 49 53 ........Xized IS 094afdb4 43 2e 2e 2e 00 00 00 00 - 00 00 00 00 38 00 00 00 C...........8... 094afdc4 23 00 00 00 23 00 00 00 - 00 00 00 00 0a 00 0b 00 #...#........... 094afdd4 60 ec 4b 02 c8 43 f8 77 - 60 02 db 77 fe 21 83 77 `.K..C.w`..w.!.w 094afde4 00 00 00 00 32 75 e8 77 - 1b 00 00 00 00 02 00 00 ....2u.w........ 094afdf4 fc ff 4a 09 23 00 00 00 - 6e 2f 69 6e 73 74 61 6c ..J.#...n/instal 094afe04 6c 20 2d 63 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f l -c.checking fo 094afe14 72 20 6d 61 77 6b 2e 2e - 2e 20 6e 6f 0a 63 68 65 r mawk... no.che 094afe24 63 6b 69 6e 67 20 66 6f - 72 20 67 61 77 6b 2e 2e cking for gawk.. 094afe34 2e 20 6e 6f 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f . no.checking fo 094afe44 72 20 6e 61 77 6b 2e 2e - 2e 20 6e 61 77 6b 0a 63 r nawk... nawk.c 094afe54 68 65 63 6b 69 6e 67 20 - 66 6f 72 20 64 6f 63 62 hecking for docb State Dump for Thread Id 0x410 eax=77df9d61 ebx=00000102 ecx=024b62c0 edx=00000000 esi=77f827dd edi=00000000 eip=77f827e8 esp=0b50ff88 ebp=0b50ffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000286 function: NtWaitForSingleObject 77f827dd b8ea000000 mov eax,0xea 77f827e2 8d542404 lea edx,[esp+0x4] ss:0c3fd55b=???????? 77f827e6 cd2e int 2e 77f827e8 c20c00 ret 0xc 77f827eb 8b4124 mov eax,[ecx+0x24] ds:033a3892=???????? 77f827ee 39420c cmp [edx+0xc],eax ds:00eed5d2=???????? 77f827f1 0f85c9100000 jne NtQueryDefaultLocale+0x115 (77f838c0) 77f827f7 ff4208 inc dword ptr [edx+0x8] ds:00eed5d2=???????? 77f827fa 33c0 xor eax,eax 77f827fc c20400 ret 0x4 77f827ff 90 nop 77f82800 ff4a04 dec dword ptr [edx+0x4] ds:00eed5d2=???????? 77f82803 c20400 ret 0x4 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0B50FFB4 77E8758A 00000000 00000001 024B0880 00000000 ntdll!NtWaitForSingleObject 0B50FFEC 00000000 77DF9D61 00000000 00000000 00000000 kernel32 From webmaster@dialtalks.com Tue Feb 12 21:47:02 2002 From: webmaster@dialtalks.com (´ÙÀ̾óÅå) Date: Tue Feb 12 21:47:02 2002 Subject: [È«º¸] ¿¥ÇǾ²¸® Ç÷¹À̾ ¹«·á·Î µå¸³´Ï´Ù Message-ID:

     




 



±ÍÇÏÀÇ ½Â¶ô¾øÀÌ ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù. ÀúÈñȸ»ç´Â Á¤º¸Åë½ÅºÎÀÇ ¿ä±¸»çÇ×ÀÎ ¼ö½Å °ÅºÎ ÀåÄ¡¸¦ ÇÊÈ÷ ¸¶·ÃÇϰí ÀÖ½À´Ï´Ù. ±ÍÇÏÀÇ ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅͳݻóÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ È®ÀÎÇÏ¿´À¸¸ç, ±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ È®ÀεÇÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñ⠹ٶø´Ï´Ù. µ¿ÀÏÇÑ ³»¿ëÀÇ ¸ÞÀϼö½ÅÀ» °ÅºÎÇÏ½Å´Ù¸é ±ÍÇÏÀÇ Àǻ縦 Á¸ÁßÇÏ¿© »èÁ¦Ã³¸®ÇϰڽÀ´Ï´Ù. °¨»çÇÕ´Ï´Ù.

From Marcus.Brinkmann@ruhr-uni-bochum.de Wed Feb 13 01:58:04 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Wed Feb 13 01:58:04 2002 Subject: [Announce] GPGME 0.3.3 released Message-ID: <20020212231844.GW705@212.23.136.22> We are pleased to announce version 0.3.3 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 576 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.3.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 93cf2a873d7fcb23cc0ec0ec27d5235e gpgme-0.3.2-0.3.3.diff.gz.sig 94d9081fc72958b2c5ce6378fab64375 gpgme-0.3.3.tar.gz.sig 6e1e8254b3742bd71db880cb84f7b00f gpgme-0.3.2-0.3.3.diff.gz 4b012ab44b320096253559b04147b7d4 gpgme-0.3.3.tar.gz Noteworthy changes in version 0.3.3 (2002-02-12) ------------------------------------------------ * Fix the Makefile in jnlib. * Fix the test suite (hopefully). It should clean up all its state with `make check' now. As version 0.3.2, this is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From stephane@sente.ch Thu Feb 14 11:31:01 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Thu Feb 14 11:31:01 2002 Subject: gpgme key listing slowness question Message-ID: Hi, As I complainted sometime ago, gpgme key listing operations are very slow. Werner replied, the slowness is in fact due to gpg, but... I saw that gpg is invoked with the following arguments: gpg --batch --comment --status-fd 2 --no-tty --verbose --with-colons --fixed-list-mode --with-fingerprint --list-keys -- The argument which makes the operation so slow is the --verbose: wouldn't it be possible to get rid of this --verbose argument? Of course, we'd loose information about the web-of-trust, but if you simply want a list of all available keys, you don't care yet about the web-of-trust. You ask these informations once you've selected the keys you need. BTW, in previous version of gpgme there was a fast listing mode, which enabled the --no-expensive-trust-checks option; the option is no longer used now, though it was mentionned that all key listing operations are in fast mode now. Is it correct? Stephane From wk@gnupg.org Thu Feb 14 11:56:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 11:56:02 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 11:28:42 +0100") References: Message-ID: <87lmdwuyj3.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > Hi, > As I complainted sometime ago, gpgme key listing operations are very > slow. Werner replied, the slowness is in fact due to gpg, but... Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? It is worth to try. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk@gnupg.org Thu Feb 14 12:24:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 12:24:02 2002 Subject: Yet another problem with trust in 1.0.6c In-Reply-To: (Janusz A. Urbanowicz's message of "Sun, 6 Jan 2002 02:02:49 +0100 (CET)") References: Message-ID: <87eljoux8j.fsf@alberti.gnupg.de> On Sun, 6 Jan 2002 02:02:49 +0100 (CET), Janusz A Urbanowicz said: > Summary: for some encrypted and signed messages gpg in interactive mode > skips trust value check and reports the signature as fully valid, while in > batch mode the signature is reported as untrusted. Example: Ooops. Really strange code but simple to fix. This also fixes the other problem you reported. I think the problem with the trust calculation you reported for 1.0.6b has been fixed. Right? Thanks, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From stephane@sente.ch Thu Feb 14 12:44:01 2002 From: stephane@sente.ch (Stephane Corthesy) Date: Thu Feb 14 12:44:01 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of"Thu, 14 Feb 2002 11:28:42 +0100") Message-ID: > On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > > > Hi, > > As I complainted sometime ago, gpgme key listing operations are very > > slow. Werner replied, the slowness is in fact due to gpg, but... > > Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? > It is worth to try. > > Werner No, I didn't. I use the official 1.0.6, and will continue until 1.0.7 is out (when?). If I list keys in my key ring with --verbose, it takes 50 seconds; if I don't use --verbose, it takes only... 5 seconds. Do you experiment such a gain with 1.0.6c? Stephane From wk@gnupg.org Thu Feb 14 13:46:01 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 14 13:46:01 2002 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 12:41:53 +0100") References: Message-ID: <874rkkutgr.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 12:41:53 +0100, Stephane Corthesy said: > No, I didn't. I use the official 1.0.6, and will continue until > 1.0.7 is out (when?). Good question. I try to make a 1.0.6d this week. > If I list keys in my key ring with --verbose, it takes 50 seconds; > if I don't use --verbose, it takes only... 5 seconds. Do you > experiment such a gain with 1.0.6c? Ah yes. --verbose does also list all signatures and resolving the names is time consuming. As we currently ignore the key signature lines it does not make sense to use this option. I have just commited the fix to gpgme. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw@jabberwocky.com Thu Feb 14 20:40:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 14 20:40:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <87d6zdkzc4.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> Message-ID: <20020214193802.GB681@akamai.com> On Sun, Feb 10, 2002 at 06:42:51PM +0100, Werner Koch wrote: > On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > > > I'd be willing to throw some money into a pot for people who find > > security-related bugs in GnuPG. > > The main problem is that it needs expierenced programmers to find the > non trivial bugs. Those programmers are usually writing new code or > fixing old one and don't have the time to screen other programs and it > is not so interesting to do audits - especially not on a unpaid or low > paid basis. So I don't believe that a little bit money will help. Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms of auditing, a little bit of money doesn't help, but if 20 people all throw in a little bit of money... David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bwpearre@alumni.princeton.edu Thu Feb 14 21:27:02 2002 From: bwpearre@alumni.princeton.edu (Ben Pearre) Date: Thu Feb 14 21:27:02 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214193802.GB681@akamai.com> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> Message-ID: <20020214202519.GG10905@diverge.seunglab.mit.edu> --XRI2XbIfl/05pQwm Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > of auditing, a little bit of money doesn't help, but if 20 people all > throw in a little bit of money... Money? Pshaw. Credit! There could be a command-line option --list-contributors or some such, which makes it trivial to see who has helped with the program. "...and the daring souls who found security flaws in the code:..." The key is being able to say during a job interview (OK, how many interviewers use GPG?) or a hot date (?!) "Run this command and see my name"... and have it take 10 seconds. --=20 bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben --XRI2XbIfl/05pQwm Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8bB0v+CWfKs/abNoRAvVcAKDDK9Rsm5t3NqOgmocIGY+PjJit/ACfbuSQ 92J/cMNc+4yNq0K5aatIFb4= =+H2P -----END PGP SIGNATURE----- --XRI2XbIfl/05pQwm-- From slg@ex.com Fri Feb 15 04:34:01 2002 From: slg@ex.com (Simson Garfinkel) Date: Fri Feb 15 04:34:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools Message-ID: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Greetings. I am trying to compile gnupg on MacOS X and am having a big problems. Every time I do a "./configure", I end up with a Makefile that is 0 bytes in length. Is this a known problem? [simsong@localhost gnupg-1.0.4] 313 % ./configure creating cache ./config.cache checking host system type... powerpc-apple-darwin5.2 checking target system type... powerpc-apple-darwin5.2 checking build system type... powerpc-apple-darwin5.2 checking for a BSD compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking whether make sets ${MAKE}... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for working makeinfo... missing checking for mawk... no checking for gawk... no checking for nawk... no checking for awk... awk checking which static random module to use... default checking whether use of /dev/random is requested... yes checking whether use of extensions is requested... yes checking whether assembler modules are requested... yes checking whether memory debugging is requested... no checking whether memory guard is requested... no checking whether included zlib is requested... no checking whether use of capabilities is requested... no checking whether to enable maintainer-specific portions of Makefiles... no checking whether make sets ${MAKE}... (cached) yes checking whether build environment is sane... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for gcc... gcc checking whether the C compiler (gcc ) works... yes checking whether the C compiler (gcc ) is a cross-compiler... no checking whether we are using GNU C... yes checking whether gcc accepts -g... yes checking how to run the C preprocessor... gcc -E -traditional-cpp checking for POSIXized ISC... no checking for a BSD compatible install... /usr/bin/install -c checking for mawk... (cached) awk checking for docbook-to-man... no checking for faqprog.pl... no configure: warning: *** *** It seems that the faqprog.pl program is not installed; *** however it is only needed if you want to change the FAQ. *** (faqprog.pl should be available at: *** ftp://ftp.gnupg.org/pub/gcrypt/contrib/faqprog.pl ) *** No need to worry about this warning. *** checking for BSD-compatible nm... /usr/bin/nm -p checking command to parse /usr/bin/nm -p output... no checking for _ prefix in compiled symbols... no checking for option to create PIC... none checking how to specify -export-dynamic... checking for ranlib... ranlib checking for ANSI C header files... yes checking for working const... yes checking for inline... inline checking for off_t... yes checking for size_t... yes checking for working alloca.h... no checking for alloca... yes checking for unistd.h... yes checking for getpagesize... yes checking for working mmap... no checking for argz.h... no checking for limits.h... yes checking for locale.h... yes checking for nl_types.h... no checking for malloc.h... no checking for string.h... yes checking for unistd.h... (cached) yes checking for sys/param.h... yes checking for getcwd... yes checking for munmap... yes checking for putenv... yes checking for setenv... yes checking for setlocale... yes checking for strchr... yes checking for strcasecmp... yes checking for strdup... yes checking for __argz_count... no checking for __argz_stringify... no checking for __argz_next... no checking for stpcpy... no checking for LC_MESSAGES... no checking whether NLS is requested... yes checking whether included gettext is requested... no checking for libintl.h... no checking whether catgets can be used... no checking for msgfmt... msgfmt checking for gmsgfmt... msgfmt checking for xgettext... : checking for catalogs to be installed... da de eo es_ES fr id it ja nl pl pt_BR pt_PT ru sv checking for gdbm.h... no checking for gethostbyname in -lnsl... no checking for socket in -lsocket... no checking for gethostbyname in -lnsl... (cached) no checking for dlopen in -ldl... no checking for dlopen... no checking for shl_load in -ldld... no checking for ANSI C header files... (cached) yes checking for unistd.h... (cached) yes checking for langinfo.h... no checking for termio.h... no checking for working const... (cached) yes checking for inline... (cached) inline checking for size_t... (cached) yes checking return type of signal handlers... void checking for sys_siglist declaration in signal.h or unistd.h... yes checking endianess... big checking for byte typedef... no checking for ushort typedef... yes checking for ulong typedef... no checking for u16 typedef... no checking for u32 typedef... no checking size of unsigned short... 2 checking size of unsigned int... 4 checking size of unsigned long... 4 checking size of unsigned long long... 8 checking for vprintf... yes checking for strerror... yes checking for stpcpy... (cached) no checking for strlwr... no checking for stricmp... no checking for tcgetattr... yes checking for rand... yes checking for strtoul... yes checking for mmap... yes checking for memmove... yes checking for gettimeofday... yes checking for getrusage... yes checking for gethrtime... no checking for setrlimit... yes checking for clock_gettime... no checking for memicmp... no checking for atexit... yes checking for raise... yes checking for getpagesize... (cached) yes checking for strftime... yes checking for nl_langinfo... no checking for waitpid... yes checking for wait4... yes checking for sigaction... yes checking for sigprocmask... yes checking for fopen64... no checking for fstat64... no checking for mlock... yes checking whether mlock is broken... yes checking for sys/stat.h... yes checking for unistd.h... (cached) yes checking for direct.h... no checking if mkdir takes one argument... no checking for sys/ipc.h... yes checking for sys/shm.h... yes checking whether IPC_RMID allowes subsequent attaches... no checking whether SHM_LOCK is available... no checking for random device... yes checking for linux/random.h... no checking for random device ioctl... no dynamically linked cipher modules: rndunix rndegd tiger statically linked cipher modules: rndlinux sha1 rmd160 md5 checking for mpi assembler functions... done checking for zlib.h... yes checking for deflateInit2_ in -lz... yes updating cache ./config.cache creating ./config.status creating Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating intl/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating po/Makefile.in sed: 46: conftest.s1: unescaped newline inside substitute pattern creating util/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating mpi/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating cipher/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating g10/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating doc/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating tools/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating zlib/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating checks/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating config.h linking ./intl/libgettext.h to intl/libintl.h linking ./mpi/powerpc32/mpih-add1.S to mpi/mpih-add1.S linking ./mpi/powerpc32/mpih-mul1.S to mpi/mpih-mul1.S linking ./mpi/powerpc32/mpih-mul2.S to mpi/mpih-mul2.S linking ./mpi/powerpc32/mpih-mul3.S to mpi/mpih-mul3.S linking ./mpi/powerpc32/mpih-lshift.S to mpi/mpih-lshift.S linking ./mpi/powerpc32/mpih-rshift.S to mpi/mpih-rshift.S linking ./mpi/powerpc32/mpih-sub1.S to mpi/mpih-sub1.S linking ./mpi/generic/mpi-asm-defs.h to mpi/mpi-asm-defs.h g10defs.h created [simsong@localhost gnupg-1.0.4] 314 % more Mak Makefile Makefile.am Makefile.in [simsong@localhost gnupg-1.0.4] 314 % more Makefile [simsong@localhost gnupg-1.0.4] 317 % ls -l Makefile -rw-rw-r-- 1 simsong staff 0 Feb 14 18:15 Makefile [simsong@localhost gnupg-1.0.4] 318 % From rguerra@yahoo.com Fri Feb 15 04:53:01 2002 From: rguerra@yahoo.com (Robert Guerra) Date: Fri Feb 15 04:53:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> References: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <1041280.1013727062@[192.168.1.101]> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Simson: There are some specific patches that have to be made to get GNUPG to compile on OS X.. It's all detailed on the mac GPG page at: http://macgpg.sourceforge.net/ regards, Robert - --- Robert Guerra Privaterra - Securing Human Rights A project of Computer Professionals for Social Responsibility (CPSR) - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile that > is 0 bytes in length. > > Is this a known problem? > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (Darwin) Comment: For info see http://www.gnupg.org iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 WtWVsQ4tOmQP1I2VnM5ld9M= =LoGh -----END PGP SIGNATURE----- From redbird@rbisland.cx Fri Feb 15 05:14:01 2002 From: redbird@rbisland.cx (Gordon Worley) Date: Fri Feb 15 05:14:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <12BB6722-21CA-11D6-89AD-000A27B4DEFC@rbisland.cx> On Thursday, February 14, 2002, at 06:17 PM, Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile > that is 0 bytes in length. > > Is this a known problem? So well known that we have a whole project devoted to porting it (and doing the GUI thing to make GnuPG accessible to the average Mac user). http://macgpg.sf.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From slg@ex.com Fri Feb 15 13:17:01 2002 From: slg@ex.com (Simson Garfinkel) Date: Fri Feb 15 13:17:01 2002 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <1041280.1013727062@[192.168.1.101]> Message-ID: Robert, Thanks so much. Do you guys plan to integrate these patches onto the mainstream release? We're just a few months away from having the number of installed OS X machines being larger than all of the other UNIX platforms combined... -SImson On Thursday, February 14, 2002, at 10:51 PM, Robert Guerra wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Simson: > > > There are some specific patches that have to be made to get GNUPG to > compile on OS X.. > > It's all detailed on the mac GPG page at: > > http://macgpg.sourceforge.net/ > > > regards, > > Robert > > - --- > Robert Guerra > Privaterra - Securing Human Rights > > > A project of Computer Professionals for Social Responsibility (CPSR) > > > > > - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel > wrote: > >> Greetings. I am trying to compile gnupg on MacOS X and am having a big >> problems. Every time I do a "./configure", I end up with a Makefile >> that >> is 0 bytes in length. >> >> Is this a known problem? >> >> > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (Darwin) > Comment: For info see http://www.gnupg.org > > iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 > WtWVsQ4tOmQP1I2VnM5ld9M= > =LoGh > -----END PGP SIGNATURE----- From foxy@free.fr Fri Feb 15 19:10:02 2002 From: foxy@free.fr (Laurent CHEYLUS) Date: Fri Feb 15 19:10:02 2002 Subject: Format of text and signature for GPGME Message-ID: <3C6D4E89.F4634650@free.fr> Hi, I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I have some problems to verify a "PGP Signed Message" with "gpgme_op_verify" function :-( I have develop a function to extract text and PGP signature from the body of a mail message but when I try to verify this PGP signed message, I have GPGME_SIG_STAT_ERROR status or GPGME_SIG_STAT_BAD (when I have GPG key for sign in my pub keyring) but no GPGME_SIG_STAT_GOOD. My code is : static void gpg_sign_verify(gchar *text, gchar *sign) { GpgmeCtx ctx; GpgmeError err; GpgmeData sig, txt; GpgmeSigStat status; err = gpgme_new (&ctx); fail_if_err (err); gpg_sign_extract(ptr,text,sign); err = gpgme_data_new_from_mem ( &txt, text, strlen (text), 0 ); fail_if_err (err); err = gpgme_data_new_from_mem ( &sig, sign, strlen (sign), 0 ); fail_if_err (err); err = gpgme_op_verify (ctx, sig, txt, &status ); fail_if_err (err); print_sig_stat ( ctx, status ); gpgme_data_release (sig); gpgme_data_release (txt); gpgme_release (ctx); } where ptr is a char* with body of mail message. I think that I have some errors when I read text and sign datas from body. What must be the format for the PGP signed message and cleartext signature, in the "gpgme_op_verify" function ? Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this header must be suppress ? Must the signature begin with "-----BEGIN PGP SIGNATURE-----" and finsih with "-----END PGP SIGNATURE-----" ? Must these lines finish with "\n" or another caracter ? Foxy. From dshaw@jabberwocky.com Fri Feb 15 21:33:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Fri Feb 15 21:33:01 2002 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214202519.GG10905@diverge.seunglab.mit.edu> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> <20020214202519.GG10905@diverge.seunglab.mit.edu> Message-ID: <20020215203021.GG679@akamai.com> On Thu, Feb 14, 2002 at 03:25:19PM -0500, Ben Pearre wrote: > > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > > of auditing, a little bit of money doesn't help, but if 20 people all > > throw in a little bit of money... > > Money? Pshaw. Credit! There could be a command-line option > --list-contributors or some such, which makes it trivial to see who > has helped with the program. "...and the daring souls who found > security flaws in the code:..." > > The key is being able to say during a job interview (OK, how many > interviewers use GPG?) or a hot date (?!) "Run this command and see my > name"... and have it take 10 seconds. Heh. Good point. It would be far easier than saying "Go look at the AUTHORS file"... :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Bluefire@bluefire.nu Sat Feb 16 16:13:01 2002 From: Bluefire@bluefire.nu (Andreas Agorander) Date: Sat Feb 16 16:13:01 2002 Subject: Two questions about GPGME Message-ID: <200202161516.g1GFGOK32016@mail.space2u.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi! There is some parts of GPG functionality that I haven't found out how to access through GPGME: 1. Looking through the documentation it seems like only detached signatures can be verified by GPGME, is there any possibility to verify a clearsigned message directly, or do I have to "separate" the signature from the message? 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? gpgme_op_decrypt_verify only works for me for such messages, eg. messages I first sign and then encrypt don't get their signatures recognized the same way, and as far as I can see there is no way of doing the combination directly... If this isn't implemented, is it on the TODO? /Andreas Agorander -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8boTUUhUH0wIHC6cRAg6HAJ4wJlKOF5i39jHsC5bGS+MAlLd/0QCg+3k+ 3oyBVGOtvwRShkHLwfzCUKA= =tJXQ -----END PGP SIGNATURE----- From wk@gnupg.org Sun Feb 17 12:38:02 2002 From: wk@gnupg.org (Werner Koch) Date: Sun Feb 17 12:38:02 2002 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> (Andreas Agorander's message of "Sat, 16 Feb 2002 17:12:04 +0100") References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <87n0y81j9k.fsf@alberti.gnupg.de> On Sat, 16 Feb 2002 17:12:04 +0100, Andreas Agorander said: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? Marcus and I are sitting here on the floor at the F.SDEM and just figured out that there is something missing. > If this isn't implemented, is it on the TODO? Yes, it is important and will be addressed soon. We probably have to change the verify API :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann@ruhr-uni-bochum.de Mon Feb 18 15:28:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Mon Feb 18 15:28:01 2002 Subject: Format of text and signature for GPGME In-Reply-To: <3C6D4E89.F4634650@free.fr> References: <3C6D4E89.F4634650@free.fr> Message-ID: <20020218142542.GF801@212.23.136.22> On Fri, Feb 15, 2002 at 07:08:09PM +0100, Laurent CHEYLUS wrote: > I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I > have some problems to verify a "PGP Signed Message" with > "gpgme_op_verify" function :-( Your problems are very likely the extraction of the correct plain text of the e-mail. You should read the relevant standard (rfc2015) to get all the details how to compose and decompose OpenPGP MIME messages. > My code is : Your code seems to be fine. > What must be the format for the PGP signed message and cleartext > signature, in the "gpgme_op_verify" function ? The same as for gpg on the command line. > Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this > header must be suppress ? Oha. That is not a MIME message, but an older format. I am not sure we support that in GPGME right now. I could only make it work here by sending the whole body to gpg, but we only support detached format right now. This will be fixed soon, though. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From foxy@free.fr Thu Feb 21 14:42:01 2002 From: foxy@free.fr (Laurent Cheylus) Date: Thu Feb 21 14:42:01 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C74F8BA.520BAAB5@free.fr> Hi, when I use the function "gpgme_op_verify" to verify GPG signature with a text message, I have the status "GPGME_SIG_STAT_GOOD" :-) when the public key for signature is in my keyring. But when I verify a signature and I have not the public key in my keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status with "gpgme_op_verify" ;-( Thx, Foxy. From dongsun2000@yahoo.co.kr Sat Feb 23 09:32:02 2002 From: dongsun2000@yahoo.co.kr (»ê¾ÇÀÎŬ·´¼îÇÎ) Date: Sat Feb 23 09:32:02 2002 Subject: [Á¤º¸] ·¹Àú,µî»ê¿ëǰ Àü¹® °øµ¿±¸¸Å »çÀÌÆ®¸¦ ¾Ë·Áµå¸²´Ï´Ù.^^ Message-ID: Untitled Document
 

>> ¼îÇθô »õ ´ÜÀå °æÇ°À» µå¸³´Ï´Ù.

>> 3¸¸¿ø ÀÌ»ó ±¸¸Å½Ã 1~2ÀÎ¿ë ¼­¸Óºí¶ûÄÏ¸ÅÆ® ÁõÁ¤

>> Çã¶ô¾øÀÌ ¸ÞÀÏÀ» º¸³» Á˼ÛÇÕ´Ï´Ù. º» ¸ÞÀÏÀº 1ȸ¼ºÀÔ´Ï´Ù.

>> ±ÍÇÏÀÇ ¸ÞÀÏÁÖ¼Ò´Â À¥¼­Çΰúȸ¿øÀÇ ÃßõÀ¸·Î ¾Ë°Ô µÇ¾úÀ¸¸ç,¸ÞÀϿܿ¡ ¾î¶°ÇÑ

>> Á¤º¸µµ ¾ø½À´Ï´Ù.

<¼ö½Å°ÅºÎ>

From kanglitape@hentaisonic.com Mon Feb 25 07:40:10 2002 From: kanglitape@hentaisonic.com (kanglitape@hentaisonic.com) Date: Mon Feb 25 07:40:10 2002 Subject: sell tansistors and diode Message-ID: --===_LikeYe_888_2fktbfxsrujyoh Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable HENTAISONIC-TRANSISTOR CO =2E LTD INTERNATIONAL ELECTRINICS BUILDING YINGBIN ROAD 75 CHANGSHA =2E P=2ER=2E CHINA TEL-0086731-2232933 FAX=2C 0086731-4429472 MOBILE 1300-7497167 EMAIL=3A jjwfa=40public=2Ecs=2Ehn=2Ecn DEAR SIR WE ARE HENTAISONIC-TRANSISTOR CO=2E LTD FOUNDED IM 1990 WE HAVE 15 PRODUCTION LINES TO-3=2C TO-66=2C TO-3P TO-220=2C TO-202=2C TO-126=2C TO-220F TO-3PML=2C TO-3PL=2C TOP-3Fa =2C TO-3P=28I=29=2C TO-247=2C TO-3P MT-100=2C MT-200 WITH LASER OEM PRINT MARKING=2E OUR ITEMS COVER 5600 AS FOLLOWS 2N SERIERS 2SA SERIERS 2SB SERIERS 3SC SERIERS 2SD SERIERS BD SERIERS BU=2FBUD=2FBUF=2FBUH=2FBUL=2FBUP=2FBUR=2FBUS=2FBUT=2FBUV=2FBUW=2FBUX=2FBUY SERIERS TIP SERIERS S SERIERS MJ=2FMJE SERIERS PLEASE SEE OUR WEBSITE www=2Ehentaisonic=2Ecom=2Ftransistor we are willing to cooperate with you=2E best regards wangjin --===_LikeYe_888_2fktbfxsrujyoh Content-Type: application/octet-stream; name="audio tape.htm" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="audio tape.htm" PGh0bWw+DQoNCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1MYW5ndWFnZSIgY29u dGVudD0iemgtY24iPg0KPG1ldGEgaHR0cC1lcXVpdj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0 ZXh0L2h0bWw7IGNoYXJzZXQ9Z2IyMzEyIj4NCjxtZXRhIG5hbWU9IkdFTkVSQVRPUiIgY29udGVu dD0iTWljcm9zb2Z0IEZyb250UGFnZSA0LjAiPg0KPG1ldGEgbmFtZT0iUHJvZ0lkIiBjb250ZW50 PSJGcm9udFBhZ2UuRWRpdG9yLkRvY3VtZW50Ij4NCjx0aXRsZT5CTEFOSyBBVURJTyBDQVNTRVRU RSBNQUdORVRJQyBUQVBFPC90aXRsZT4NCjwvaGVhZD4NCg0KPGJvZHkgYmdjb2xvcj0iIzAwRkZG RiI+DQoNCjxwPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyANCjxmb250IGZhY2U9IkFyaWFsIEJsYWNrIiBjb2xvcj0i I0ZGMDAwMCI+QkxBTksgQVVESU8gQ0FTU0VUVEUgTUFHTkVUSUMgVEFQRS4gPC9mb250PjwvcD4N Cjx0YWJsZSBib3JkZXI9IjEiIHdpZHRoPSIxMDAlIiBoZWlnaHQ9IjQ4NyI+DQogIDx0cj4NCiAg ICA8dGQgd2lkdGg9IjUwJSIgaGVpZ2h0PSIyNTgiPg0KICAgICAgPHAgYWxpZ249ImNlbnRlciI+ PGltZyBib3JkZXI9IjAiIHNyYz0ia2FuZ2xpJTIwdHgtNjAuanBnIiB3aWR0aD0iMTgwIiBoZWln aHQ9IjExNCI+PC9wPg0KICAgICAgPHAgYWxpZ249ImNlbnRlciI+Qy02MDwvdGQ+DQogICAgPHRk IHdpZHRoPSI1MCUiIGhlaWdodD0iMjU4Ij5UUkFOU1BBUkVOVCBCT1guICsgNjAgTUlOVVRFJm5i c3A7IE1BR05FVElDIA0KICAgICAgVEFQRSANCiAgICAgIDxwPklOU0lERSBUSEUgQ0FTRSArIGNv bG9yIHAucCBzbGVldmU8L3A+DQogICAgICA8cD5hbHNvIHlvdXIgb3duIGxvZ28gY2FuIGJlIHBy aW50ZWQgb24gdGhlIHAucCBwYXBlciAuIDwvcD4NCiAgICAgIDxwPiZuYnNwOzIwMHBjcyB0byBh IGNhcnRvbi48L3A+DQogICAgICA8cD4mbmJzcDtwcmljZS4mbmJzcDsmbmJzcDsgc3VwaW9yJm5i c3A7IGF0IHVzZCAwLjE2Mi9wYzwvcD4NCiAgICAgIDxwPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyBjb25tbW9uLiBhdCB1c2QgMC4xNTIvcGMmbmJzcDsgDQogICAgICBmb2Im bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgY2hpbmEgcG9ydDwvcD4N CiAgICAgIDxwPiZuYnNwO05BS0VEJm5ic3A7IEEgQ0FTRSBXSVRIIDYwIE1JTlVURVMgT0YgTUFH TkVUSUMgVEFQRSArIFRSQU5QQVJFTlQgDQogICAgICBCT1guIEFUIFVTRCAwLjEzNS9QQyBGT0Ig Q0hJTkEgUE9SVC4gPC9wPg0KICAgICAgPHA+oaE8L3RkPg0KICA8L3RyPg0KICA8dHI+DQogICAg PHRkIHdpZHRoPSI1MCUiIGhlaWdodD0iMTUwIj4NCiAgICAgIDxwIGFsaWduPSJjZW50ZXIiPjxp bWcgYm9yZGVyPSIwIiBzcmM9IktBTkdMSS1DLTkwLmpwZyIgd2lkdGg9IjE0MCIgaGVpZ2h0PSIx NTAiPjwvdGQ+DQogICAgPHRkIHdpZHRoPSI1MCUiIGhlaWdodD0iMTUwIj5DLTkwJm5ic3A7Jm5i c3A7Jm5ic3A7IENPTE9SIFAuUCZuYnNwOyBTTEVFVkUgDQogICAgICA8cD4mbmJzcDtBVCBVU0Qg MC4xNzIvUEM8L3A+DQogICAgICA8cD5XRSBBTFNPJm5ic3A7IFNVUFBMWSBDLTQ1Jm5ic3A7Jm5i c3A7Jm5ic3A7IDwvcD4NCiAgICAgIDxwPjIwMFBDUyBUTyBBIENBUlRPTi4gPC90ZD4NCiAgPC90 cj4NCiAgPHRyPg0KICAgIDx0ZCB3aWR0aD0iNTAlIiBoZWlnaHQ9IjEzIj4NCiAgICAgIDxwIGFs aWduPSJjZW50ZXIiPjxpbWcgYm9yZGVyPSIwIiBzcmM9InhpbmFvbGluJTIwY2IwMS5qcGciIHdp ZHRoPSIyNzgiIGhlaWdodD0iMjgyIj48L3RkPg0KICAgIDx0ZCB3aWR0aD0iNTAlIiBoZWlnaHQ9 IjEzIj5DLTQ1Jm5ic3A7Jm5ic3A7IEFORCBDLTYwJm5ic3A7Jm5ic3A7IEJMQU5LIA0KICAgICAg TUFHTkVUSUMgQ0FTU0FUVEUgVEFQRQ0KICAgICAgPHA+Jm5ic3A7MjAwUENTIFRPIEEgQ0FSVE9O Jm5ic3A7IDwvcD4NCiAgICAgIDxwPjE4NTAwMFBDUyBUTyBBIDIwIEZUIENPTlRBSU5FUjwvdGQ+ DQogIDwvdHI+DQogIDx0cj4NCiAgICA8dGQgd2lkdGg9IjUwJSIgaGVpZ2h0PSI0MiI+DQogICAg ICA8cCBhbGlnbj0iY2VudGVyIj48aW1nIGJvcmRlcj0iMCIgc3JjPSJ4aW5hb2xpbiUyMGNlYjAy LmpwZyIgd2lkdGg9IjI3OCIgaGVpZ2h0PSIyODIiPjwvdGQ+DQogICAgPHRkIHdpZHRoPSI1MCUi IGhlaWdodD0iNDIiPiZuYnNwO0MtNjAmbmJzcDsgQU5EJm5ic3A7IEMtNDUmbmJzcDsmbmJzcDsg TE9XIA0KICAgICAgUVVBTElUWSBNQUdORVRJQyBUQVBFIC4gDQogICAgICA8cD5BVCBVU0QgMC4x MzgvUEM8L3A+DQogICAgICA8cD4yMDBQQ1MgVE8gQSBDQVJUT04uIDwvcD4NCiAgICAgIDxwPqGh PC9wPg0KICAgICAgPHA+oaE8L3RkPg0KICA8L3RyPg0KPC90YWJsZT4NCjxwPiZuYnNwOyZuYnNw OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyA8Zm9udCBjb2xvcj0iIzAwMDBGRiI+UkVNQVJLUzom bmJzcDsgQUxMIA0KUFJJQ0VTIEFSRSBGT1IgWU9VUiBSRUZFUkVOQ0UgT05MWSBBTkQgU1VCSkVT VCBUTyBPVVIgRklOQUwgPC9mb250PjwvcD4NCjxwPjxmb250IGNvbG9yPSIjMDAwMEZGIj4mbmJz cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsgDQpDT05GSVJNQVRJT04uPC9mb250 PjwvcD4NCjxwPqGhPC9wPg0KPHA+oaE8L3A+DQo8cD6hoTwvcD4NCjxwPqGhPC9wPg0KPHA+oaE8 L3A+DQoNCjwvYm9keT4NCg0KPC9odG1sPg0K --===_LikeYe_888_2fktbfxsrujyoh From ktt21c@hananet.net Mon Feb 25 17:46:01 2002 From: ktt21c@hananet.net (Á¶È­À¯¿µ¾î) Date: Mon Feb 25 17:46:01 2002 Subject: [±¤°í]¿µ¾îµµ¹è¿ì°í ¿¥ÇǾ²¸®µµ ¹«·á·Î Message-ID:

     




 


 
±ÍÇÏÀÇ ½Â¶ô¾øÀÌ ÀüÀÚ ¿ìÆíÀ» º¸³»°Ô µÈ Á¡ Á¤ÁßÈ÷ »ç°ú µå¸³´Ï´Ù. ÀúÈñȸ»ç´Â Á¤º¸Åë½ÅºÎÀÇ ¿ä±¸»çÇ×ÀÎ ¼ö½Å °ÅºÎ ÀåÄ¡¸¦ ÇÊÈ÷ ¸¶·ÃÇϰí ÀÖ½À´Ï´Ù. ±ÍÇÏÀÇ ÀüÀÚ ¿ìÆí ÁÖ¼Ò´Â ÀÎÅͳݻóÀÇ °ø°³µÈ Àå¼Ò¿¡¼­ È®ÀÎÇÏ¿´À¸¸ç, ±ÍÇÏÀÇ ÀüÀÚ¿ìÆí ÁÖ¼Ò¿Ü ¾î¶°ÇÑ °³ÀÎ Á¤º¸µµ È®ÀεÇÁö ¾ÊÀ¸¹Ç·Î ¾È½ÉÇϽñ⠹ٶø´Ï´Ù. µ¿ÀÏÇÑ ³»¿ëÀÇ ¸ÞÀϼö½ÅÀ» °ÅºÎÇÏ½Å´Ù¸é ±ÍÇÏÀÇ Àǻ縦 Á¸ÁßÇÏ¿© »èÁ¦Ã³¸®ÇϰڽÀ´Ï´Ù. °¨»çÇÕ´Ï´Ù.

From Marcus.Brinkmann@ruhr-uni-bochum.de Mon Feb 25 20:09:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Mon Feb 25 20:09:02 2002 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C74F8BA.520BAAB5@free.fr> References: <3C74F8BA.520BAAB5@free.fr> Message-ID: <20020225190659.GA2036@212.23.136.22> On Thu, Feb 21, 2002 at 02:40:10PM +0100, Laurent Cheylus wrote: > But when I verify a signature and I have not the public key in my > keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of > "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status > with "gpgme_op_verify" ;-( Yes, that was a small thing missing in the implementation. Could you please try the following patch if that works for you? Thanks, Marcus 2002-02-25 Marcus Brinkmann * verify.c (_gpgme_verify_status_handler): Parse the args line to see if the problem is due to a missing key, and report that back to the user. Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.21 diff -u -r1.21 verify.c --- verify.c 2002/02/06 01:41:15 1.21 +++ verify.c 2002/02/25 18:49:00 @@ -191,9 +191,14 @@ break; case STATUS_ERRSIG: - ctx->result.verify->status = GPGME_SIG_STAT_ERROR; - /* FIXME: Distinguish between a regular error and a missing key. - This is encoded in the args. */ + /* The return code is the 6th argument, if it is 9, the problem + is a missing key. */ + for (p = args, i = 0; p && i < 5; i++) + p = strchr (p, ' '); + if (p && *(++p) == '9' && *(++p) == '\0') + ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; + else + ctx->result.verify->status = GPGME_SIG_STAT_ERROR; /* Store the keyID in the fpr field. */ p = ctx->result.verify->fpr; for (i = 0; i < DIM(ctx->result.verify->fpr) -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From ddcc@MIT.EDU Tue Feb 26 00:01:01 2002 From: ddcc@MIT.EDU (ddcc@MIT.EDU) Date: Tue Feb 26 00:01:01 2002 Subject: Can GPG decrypt a signed message and preserve the signature? Message-ID: I cannot seem to figure out how to decrypt a signed and encrypted message in such a way that the signature stays attached. I would need such a feature to prove to a third party that the sender actually signed a document, for example. From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 26 01:23:01 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 26 01:23:01 2002 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <20020226002038.GJ2036@212.23.136.22> On Sat, Feb 16, 2002 at 05:12:04PM +0100, Andreas Agorander wrote: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? As Werner said, this is a priority and will hopefully be done soon (later this week). There are some interface issues to be hashed out. > 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? Now there is :) I just checked in the necessary changes. You can access it with gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start. I have only done some rudimentary testing, a success report (or bug report ;) would be appreciated. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From rabbi@quickie.net Tue Feb 26 03:43:02 2002 From: rabbi@quickie.net (Len Sassaman) Date: Tue Feb 26 03:43:02 2002 Subject: Problems with v3 keys? Message-ID: When I try to encrypt to a certain key (I'd redacted its key ID and replaced it with 0x0000010 in the example below), I get the following error message: rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt gpg: loaded digest 2 gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) gpg: loaded digest 1 gpg: 0x00000010: skipped: unusable public key gpg: foo.txt: encryption failed: unusable public key I really don't want to provide the particular key for privacy reasons, but I know that makes debugging hard. Any idea what would trigger this error? Perhaps of use, I'm including the output of --list-packets on the key file below: rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc :public key packet: version 3, algo 1, created 781525938, expires 0 pkey[0]: [1024 bits] pkey[1]: [5 bits] :user ID packet: "Redacted (no email address in UID)" And yes, I have allow-non-selfsigned-uid in my options file. Thoughts? --Len. From j_anderson@uop.edu Tue Feb 26 06:03:02 2002 From: j_anderson@uop.edu (John Anderson) Date: Tue Feb 26 06:03:02 2002 Subject: Java + GnuPG Message-ID: <1014699635.1811.18.camel@ivory> Hi there, I have been thinking of making up a small interface between GnuPG and Java because I want to use something like that in a project I've been toying with. I was unable to find anything like this, other than Cryptix, which doesn't seem to be GPL. I found a thread on this list about problems getting Java and GnuPG to play nice together with IPC and file descriptors and such, so I decided to give it a whirl. The discussion that sparked my coding can be found here: http://lists.gnupg.org/pipermail/gnupg-devel/2002-January/006666.html I came up with a 173 line Java class that can encrypt and decrypt text strings, which can be used quite easily. I will post the code below, so that if anyone is interested they'll be able to play around with it. I look forward to any feedback and suggestions. The pertinent functions in GnuPG are: encrypt(string_to_encrypt, recipient); decrypt(string_to_decrypt, passphrase); getResult(); getError(); The ProcessStreamReader class is there to work as a small thread to gather the text that gpg spits out on its stdout and stderr file descriptors. STDERR seems to be where it puts all status text, and STDOUT is very clean, just giving the encrypted or decrypted text. The decrypt function actually puts the string_to_decrypt into a file in your system specific temporary directory, and then tells gpg to decrypt that file, because I couldn't readily see how to make gpg read both the passphrase and text to decrypt from stdin. I am running JDK 1.4.0, gpg 1.0.6 all on Debian unstable. Thanks, John Anderson PS - This stuff has worked flawlessly the few times I've tried it once completed; I make no gaurantee that it's coded very well because I did it up in a few hours. PGPMSClient.java (A start of my toy project, a GPG-based message system) ---------------- public class PGPMSClient { public static void main(String[] args) { GnuPG gpg = new GnuPG(); gpg.encrypt("The quick brown fox jumped over the lazy dog.\n", "j_anderson@uop.edu\n"); System.out.print(gpg.getResult()); // USE YOUR PASSWORD HERE... gpg.decrypt(gpg.getResult(), "YOUR_PASSWORD_HERE\n"); System.out.print(gpg.getResult()); } } GnuPG.java ---------- /* License: GPL * Author: John Anderson * Description: A small class to encrypt and decrypt text using GnuPG. */ import java.io.*; public class GnuPG { private Process p; private String gpg_result; private String gpg_err; GnuPG() { } public void encrypt(String str, String rcpt) { System.out.print("Encrypting... "); try { p = Runtime.getRuntime().exec("gpg --armor --batch --encrypt -r " + rcpt); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(str); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public void decrypt(String str, String passphrase) { File f = null; try { f = File.createTempFile("gpg-decrypt", null); FileWriter fw = new FileWriter(f); fw.write(str); fw.flush(); } catch(IOException io) { } System.out.print("Decrypting from: " + f.getAbsolutePath()); try { p = Runtime.getRuntime().exec("gpg --passphrase-fd 0 --batch --decrypt " + f.getAbsolutePath()); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(passphrase); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public String getResult() { return gpg_result; } public String getError() { return gpg_err; } } class ProcessStreamReader extends Thread { String name; StringBuffer stream; InputStreamReader in; final static int BUFFER_SIZE = 256; ProcessStreamReader(String name, InputStream in) { super(); this.name = name; this.in = new InputStreamReader(in); this.stream = new StringBuffer(); } public void run() { try { int read; char[] c = new char[BUFFER_SIZE]; while((read = in.read(c, 0, BUFFER_SIZE - 1)) > 0) { stream.append(c, 0, read); if(read < BUFFER_SIZE - 1) break; } } catch(IOException io) {} } String getString() { return stream.toString(); } } From dshaw@jabberwocky.com Tue Feb 26 06:13:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Tue Feb 26 06:13:02 2002 Subject: Problems with v3 keys? In-Reply-To: References: Message-ID: <20020226051045.GA1488@akamai.com> On Mon, Feb 25, 2002 at 06:40:49PM -0800, Len Sassaman wrote: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: > > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key > > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? [..] > And yes, I have allow-non-selfsigned-uid in my options file. The problem is the non-selfsigned uid. The allow-non-selfsigned-uid option allows you to import the key (which lets you use it to verify signatures, etc). It doesn't allow you to encrypt to it. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From disastry@saiknes.lv.NO.SPaM.NET Tue Feb 26 08:27:01 2002 From: disastry@saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Tue Feb 26 08:27:01 2002 Subject: Problems with v3 keys? Message-ID: <3C7B3719.922EAEDB@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Len Sassaman rabbi@quickie.net wrote: [snip] > I really don't want to provide the particular key for privacy reasons, but but you provided cretion time :-/ I don't think there are a lot of keys generated at the same second. > I know that makes debugging hard. Any idea what would trigger this error? > > Perhaps of use, I'm including the output of --list-packets on the key file > below: > > rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc > :public key packet: > version 3, algo 1, created 781525938, expires 0 > pkey[0]: [1024 bits] > pkey[1]: [5 bits] > :user ID packet: "Redacted (no email address in UID)" > > > And yes, I have allow-non-selfsigned-uid in my options file. try signing (or lsigning) it. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPHsarDBaTVEuJQxkEQOaSgCcDYg6Xcc6qrkX/bLxpOqiB9r+avAAnjDb I6Uyl9/CudfDHRQEioZqJJHD =44mO -----END PGP SIGNATURE----- From wk@gnupg.org Tue Feb 26 08:59:01 2002 From: wk@gnupg.org (Werner Koch) Date: Tue Feb 26 08:59:01 2002 Subject: Can GPG decrypt a signed message and preserve the signature? In-Reply-To: (ddcc@MIT.EDU's message of "Mon, 25 Feb 2002 17:59:18 -0500 (EST)") References: Message-ID: <87n0xwoeyh.fsf@alberti.gnupg.de> On Mon, 25 Feb 2002 17:59:18 -0500 (EST), ddcc said: > I cannot seem to figure out how to decrypt a signed and encrypted message > in such a way that the signature stays attached. I would need such a > feature to prove to a third party that the sender actually signed a The suggested way to do this is by using PGP/MIME in the regular mode; i.e. encapsulating the message in a multipart/signed MIME object and then wrapping this with a multipart/encrypted MIME object. Better MUAs do just this thing. IIRC, there is no instant way to do this with gpg. Well, we could add such an option of course but I can't promise you that this will happen any time soon. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From JanuszA.Urbanowicz Tue Feb 26 12:54:01 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Tue Feb 26 12:54:01 2002 Subject: Problems with v3 keys? In-Reply-To: from Len Sassaman at "Feb 25, 2002 06:40:49 pm" Message-ID: Len Sassaman wrote/napisa=B3[a]/schrieb: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: >=20 > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key >=20 > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? I got this on various occassions, in most times this is because gpg lacks IDEA support required by the key. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From foxy@free.fr Tue Feb 26 17:08:01 2002 From: foxy@free.fr (Laurent Cheylus) Date: Tue Feb 26 17:08:01 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7BB280.82B87DB9@free.fr> Hi, Marcus Brinkmann wrote : > Yes, that was a small thing missing in the implementation. Could you please try > the following patch if that works for you? Bad news, it does not work for me. I apply the patch on GPGME 0.3.3 sources and compile, but I have always "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY" :-( A++ Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From rabbi@quickie.net Tue Feb 26 19:20:01 2002 From: rabbi@quickie.net (Len Sassaman) Date: Tue Feb 26 19:20:01 2002 Subject: Problems with v3 keys? In-Reply-To: <20020226051045.GA1488@akamai.com> Message-ID: On Tue, 26 Feb 2002, David Shaw wrote: > > And yes, I have allow-non-selfsigned-uid in my options file. > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > option allows you to import the key (which lets you use it to verify > signatures, etc). It doesn't allow you to encrypt to it. Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? From dshaw@jabberwocky.com Tue Feb 26 19:30:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Tue Feb 26 19:30:01 2002 Subject: Problems with v3 keys? In-Reply-To: References: <20020226051045.GA1488@akamai.com> Message-ID: <20020226182735.GA2277@akamai.com> On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > On Tue, 26 Feb 2002, David Shaw wrote: > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > option allows you to import the key (which lets you use it to verify > > signatures, etc). It doesn't allow you to encrypt to it. > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? It's documented that way ("This only allows the import - key validation will fail and you have to check the validity of the key by other means"). The fact that --always-trust doesn't let you use such a key is certainly broken though :( David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Marcus.Brinkmann@ruhr-uni-bochum.de Tue Feb 26 23:41:02 2002 From: Marcus.Brinkmann@ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Feb 26 23:41:02 2002 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C7BB280.82B87DB9@free.fr> References: <3C7BB280.82B87DB9@free.fr> Message-ID: <20020226223902.GC1100@212.23.136.22> On Tue, Feb 26, 2002 at 05:06:24PM +0100, Laurent Cheylus wrote: > Marcus Brinkmann wrote : > > > Yes, that was a small thing missing in the implementation. Could you please try > > the following patch if that works for you? > > Bad news, it does not work for me. Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I am sorry about that. If you add the below diff on top of the previous diff, it should work. I did some testing now, so I am quite confident. If it doesn't work, I will need more info from you (in particular the output of gpg --status-fd 2 --verify .... and which version you are using). Thanks, Marcus Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.22 diff -u -r1.22 verify.c --- verify.c 2002/02/25 19:08:51 1.22 +++ verify.c 2002/02/26 22:39:05 @@ -193,9 +193,14 @@ case STATUS_ERRSIG: /* The return code is the 6th argument, if it is 9, the problem is a missing key. */ - for (p = args, i = 0; p && i < 5; i++) - p = strchr (p, ' '); - if (p && *(++p) == '9' && *(++p) == '\0') + for (p = args, i = 0; p && *p && i < 5; i++) + { + p = strchr (p, ' '); + if (p) + while (*p == ' ') + p++; + } + if (p && *(p++) == '9' && (*p == '\0' || *p == ' ')) ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; else ctx->result.verify->status = GPGME_SIG_STAT_ERROR; -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From dshaw@jabberwocky.com Wed Feb 27 15:32:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Wed Feb 27 15:32:02 2002 Subject: Problems with v3 keys? In-Reply-To: <20020226182735.GA2277@akamai.com> References: <20020226051045.GA1488@akamai.com> <20020226182735.GA2277@akamai.com> Message-ID: <20020227142910.GG677@akamai.com> On Tue, Feb 26, 2002 at 01:27:35PM -0500, David Shaw wrote: > On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > > On Tue, 26 Feb 2002, David Shaw wrote: > > > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > > option allows you to import the key (which lets you use it to verify > > > signatures, etc). It doesn't allow you to encrypt to it. > > > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? > > It's documented that way ("This only allows the import - key > validation will fail and you have to check the validity of the key by > other means"). > > The fact that --always-trust doesn't let you use such a key is > certainly broken though :( FYI, I just committed a fix for this. You can now use --always-trust to trust a non-selfsigned key. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From foxy@free.fr Wed Feb 27 16:01:02 2002 From: foxy@free.fr (Laurent Cheylus) Date: Wed Feb 27 16:01:02 2002 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7CEE0B.E0D734D0@free.fr> Hi, Marcus Brinkmann wrote : > Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I > am sorry about that. If you add the below diff on top of the previous diff, it > should work. I did some testing now, so I am quite confident. Good news, your new patch works well with GPGME 0.3.3 sources and GPG 1.0.6. I have now GPGME_SIG_STAT_NOKEY status when I verify a GPG signature and I haven't public key for sign in my keyring. Thanks, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From foxy@free.fr Wed Feb 27 16:01:04 2002 From: foxy@free.fr (Laurent Cheylus) Date: Wed Feb 27 16:01:04 2002 Subject: Modify comments in GPG signature ? Message-ID: <3C7CEF17.8F0DC082@free.fr> Hi, is it possible to modify the lines "Version" and "Comment" in GPG cleartext signature with an option in command "gpg --clearsign" ? I don't want to parse the entire signature to modify these lines :-( Example : ------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Pour information voir http://www.gnupg.org will be -----BEGIN PGP SIGNATURE----- Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) Comment: See http://www.foo.org Thx, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From dshaw@jabberwocky.com Wed Feb 27 16:40:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Wed Feb 27 16:40:01 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> References: <3C7CEF17.8F0DC082@free.fr> Message-ID: <20020227153717.GI677@akamai.com> On Wed, Feb 27, 2002 at 03:37:11PM +0100, Laurent Cheylus wrote: > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? > > I don't want to parse the entire signature to modify these lines :-( > > Example : > ------- > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: Pour information voir http://www.gnupg.org > > will be > > -----BEGIN PGP SIGNATURE----- > Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) > Comment: See http://www.foo.org "Version" is hardcoded into the program. The most you can do is use --no-version to make it not appear. I suppose you could add one in later if you wanted to. "Comment" is changeable with --comment "this is my comment". David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From JanuszA.Urbanowicz Wed Feb 27 17:45:04 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Wed Feb 27 17:45:04 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> from Laurent Cheylus at "Feb 27, 2002 03:37:11 pm" Message-ID: Laurent Cheylus wrote/napisa=B3[a]/schrieb: [There is text before PGP section.] > Hi, >=20 > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? have you tried --comment option? Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From JanuszA.Urbanowicz Wed Feb 27 18:27:01 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Wed Feb 27 18:27:01 2002 Subject: problem with exporting subkeys Message-ID: Today I tried to export a secret subkey from one GPG installation to another (both run Debian Potato): Subshell:alex@FUCKUP:[~]:7:0:> gpg -a --export-secret-subkeys > subk the 'subk' file bot transferred to another machine, then I ran: Subshell:alex@syjon:[~]:100:> gpg subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Ostrze=BFenie: u=BFywana pami=EA=E6 nie jest pami=EAci=B1 bezpieczn=B1! [nothing?] Subshell:alex@syjon:[~]:101:> pgpv subk Opening file "Temporary PGP Keyfile" type binary. Copying key file to "/tmp/ptmpUWCevZ", running pgpk to process it... pgpk -a /tmp/ptmpUWCevZ Adding keys: Key ring: '/tmp/ptmpUWCevZ' Type Bits KeyID Created Expires Algorithm Use sec 1024 0x21939169 1997-09-24 ---------- DSS Sign & Encrypt sub 2048 0xA2E48564 1997-09-24 2000-12-30 Diffie-Hellman sub 2048 0x78174410 2000-03-14 ---------- Diffie-Hellman sub 1024 0x7E2E803D 2001-06-28 2003-12-31 Diffie-Hellman uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (notebook) uid Janusz A. Urbanowicz (ICM) uid Janusz A. Urbanowicz (Jabber ID) sec 1024 0x27C81BC9 1994-01-05 ---------- RSA Sign & Encrypt uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (BOFH) 2 matching keys found First question: why ALL my secret keys in the packet? I supposed only subkeys would go there. Second question: why GPG chokes on it? Subshell:alex@syjon:[~]:106:> gpg --import subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Warning: using insecure memory! gpg: read_block: read error: invalid packet gpg: import from `subk' failed: invalid keyring gpg: Total number processed: 0 Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From dshaw@jabberwocky.com Thu Feb 28 05:36:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 05:36:01 2002 Subject: problem with exporting subkeys In-Reply-To: References: Message-ID: <20020228043302.GB678@akamai.com> On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > First question: why ALL my secret keys in the packet? I supposed only > subkeys would go there. The structure of the secret primary key needs to still be there for various things to work. However, the secret parts of the key are gone. Compare the size of a --export-secret-key vs a --export-secret-subkeys. > Second question: why GPG chokes on it? Judging from the listing you posted, it seems you did --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 keys do not work with --export-secret-subkeys, and in fact cause the resulting file to be unusable. I just committed a fix which makes --export-secret-subkeys ignore v3 keys. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bobmathews@mindspring.com Thu Feb 28 08:20:01 2002 From: bobmathews@mindspring.com (Bob Mathews) Date: Thu Feb 28 08:20:01 2002 Subject: missing dsa factor Message-ID: <20020228071746.61DA49D1A@cabbit.cat> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've been looking at the factor entries that are stored in the secret ring file, and it seems that there is one missing from DSA keys. When I start with (p-1)/2 and divide off q and the other given factors, I'm still left with a large composite number. In gen_elg_prime(), prime is calculated as: 2 * q * q_factor * factor[0]..factor[n-1] + 1 But when the ret_factors array is populated, it gets: q_factor, factor[1]..factor[n] (It appears that factor[n] will always be NULL.) That leaves q and factor[0] both unknown. This behavior is in 1.0.6c, and doesn't appear to have been fixed in CVS. Should be a trivial fix. if( mode == 1 ) { (*ret_factors)[i++] = mpi_copy( q_factor ); for(; i <= n; i++ ) - (*ret_factors)[i] = mpi_copy( factors[i] ); + (*ret_factors)[i] = mpi_copy( factors[i-1] ); } Since the factors aren't currently used for anything, the missing one shouldn't hurt anything. It'll be disappointing if someone ever wants them for something, though. -bob mathews -----BEGIN PGP SIGNATURE----- Comment: What's this? http://bobmathews.home.mindspring.com/bob/ iD8DBQE8fdiwPgDecCrBEpcRAjYkAJ4lyFOvVCjUXiZO5LZs7tMzaQMe5gCdGfxT orJ8kPU1VcAkKxxtiQ71Dqg= =5Ddq -----END PGP SIGNATURE----- From wk@gnupg.org Thu Feb 28 08:53:02 2002 From: wk@gnupg.org (Werner Koch) Date: Thu Feb 28 08:53:02 2002 Subject: Modify comments in GPG signature ? In-Reply-To: <20020227153717.GI677@akamai.com> (David Shaw's message of "Wed, 27 Feb 2002 10:37:17 -0500") References: <3C7CEF17.8F0DC082@free.fr> <20020227153717.GI677@akamai.com> Message-ID: <87g03m82rn.fsf@alberti.gnupg.de> On Wed, 27 Feb 2002 10:37:17 -0500, David Shaw said: > "Version" is hardcoded into the program. The most you can do is use > --no-version to make it not appear. I suppose you could add one in You can use sed or awk to change these lines. The header lines are not part of the signatures, they are just comments. The actiual signatures starts right behind one emty line (which must be present even if you delete all the header lines). -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From disastry@saiknes.lv.NO.SPaM.NET Thu Feb 28 11:57:01 2002 From: disastry@saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Thu Feb 28 11:57:01 2002 Subject: problem with exporting subkeys Message-ID: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > Second question: why GPG chokes on it? > > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. > > I just committed a fix which makes --export-secret-subkeys ignore v3 > keys. > David note that v3 keys also can have subkeys. OpenPGP does not forbid it. I have even seen v3 keys with subkeys. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH3vIjBaTVEuJQxkEQOL/QCeOITWEz+AtVMSOHNCA+4CLNt6IVQAn3CA oLqCCo5KYmaCVUK8zkXFEFmS =6Xvo -----END PGP SIGNATURE----- From dshaw@jabberwocky.com Thu Feb 28 14:55:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 14:55:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> References: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> Message-ID: <20020228135159.GD678@akamai.com> On Thu, Feb 28, 2002 at 12:50:05PM +0200, disastry@saiknes.lv.NO.SPaM.NET wrote: > David Shaw dshaw@jabberwocky.com wrote: > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > keys. > > David > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > I have even seen v3 keys with subkeys. Are you sure? Section 10.1 ("Transferable Public Keys") says: However, any V4 key may have subkeys, and the subkeys may be encryption-only keys, signature-only keys, or general-purpose keys. That doesn't exactly forbid it, true, but also section 11.1 ("Key structures") does not show subkeys at all in the v3 allowable format which is a stronger statement. We should construct such a key and see if any programs break with it. Where did you see it? Speaking of key versions - I spent some time looking at what versions were permitted with what a while ago and one thing that does seem to be explicitly permitted is v4 keys with v3 subkeys. I did test this and PGP supports it (though this may be accidental support). GnuPG 1.0.6 only partially supports it, but I fixed that in 1.0.7. Florian, this can give you the unchangeable expiration date that you wanted, if you're willing to accept the restrictions (RSA only, etc.) on v3 keys :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From rguerra@yahoo.com Thu Feb 28 15:06:01 2002 From: rguerra@yahoo.com (Robert Guerra) Date: Thu Feb 28 15:06:01 2002 Subject: IP: PGP products from NA a thing of the past... (fwd) Message-ID: <20020228060020.P33188-100000@trout.cpsr.org> ---------- Forwarded message ---------- Date: Thu, 28 Feb 2002 08:25:22 -0500 From: Dave Farber Reply-To: farber@cis.upenn.edu To: ip Subject: IP: PGP products from NA a thing of the past... Which raises a query. Is there a PGP-like system that works well under MAC OS X djf ------ Forwarded Message From: Stan Hanks Date: Wed, 27 Feb 2002 21:54:46 -0800 To: farber@cis.upenn.edu Subject: PGP products from NA a thing of the past... Just got this today. Grim news for those of us depending on supporting corporate Wintel users... > Date: Wed, 27 Feb 2002 15:28:35 -0800 > From: "PGP" > Reply-To: "PGP" > Subject: Important Information regarding PGP Desktop/Wireless Encryption Products > > **************************************************************** > [This message is brought to you as a subscriber to the Network > Associates or PGP websites. To unsubscribe, please follow > the instructions at the bottom of the page.] > **************************************************************** > > > February 26, 2002 > > Dear Valued Customer, > > Since October 11th of last year, we have been diligently searching to fin= d a suitable > buyer for the PGP Desktop/Wireless encryption products in order to provid= e a strong > partner for our customers. This search has not resulted in an appropriate buyer who will > continue to develop and support the products while providing value to exi= sting > customers. Therefore, the decision has been made to place our PGP Desktop/Wireless > encryption products in maintenance mode. > > The support team at Network Associates will continue to honor all support agreements > for existing PGP Desktop/Wireless customers until their date of terminati= on. However, > effective immediately Network Associates will cease new development on th= ese > products, and not sell additional licenses, services and support agreemen= ts. Once > again, we reiterate that we will continue to honor all technical support agreements for > the entire duration of the contract. > > The PGP technology and source code will remain under the control and owne= rship of > Network Associates. Other products that utilize this encryption technolog= y will remain > a part of Network Associates=92 current product portfolio and they will c= ontinue to be > developed in order to meet the security needs of both new and existing Ne= twork > Associates customers. These products currently include McAfee E-Business Server, > McAfee Desktop Firewall and McAfee VPN Client. > > We pledge to you our complete efforts to assist you through this transiti= on, and to > ensure that your experience as a customer remains positive. We continue t= o focus on > delivering to you superior technology and product solutions to help you m= eet your > business needs. Our customers are our most valuable asset, and we look fo= rward to > continuing to work in partnership with you in the future. > > > > Best Regards, > > > Sandra England > Executive Vice President of > Strategic Business Development and Research ------ End of Forwarded Message For archives see: http://www.interesting-people.org/archives/interesting-people/ From JanuszA.Urbanowicz Thu Feb 28 15:59:02 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Thu Feb 28 15:59:02 2002 Subject: problem with exporting subkeys In-Reply-To: <20020228043302.GB678@akamai.com> from David Shaw at "Feb 27, 2002 11:33:02 pm" Message-ID: David Shaw wrote/napisa=B3[a]/schrieb: > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: >=20 > > First question: why ALL my secret keys in the packet? I supposed only > > subkeys would go there. >=20 > The structure of the secret primary key needs to still be there for > various things to work. However, the secret parts of the key are > gone. Compare the size of a --export-secret-key vs a > --export-secret-subkeys. Ok. But is there a way to export a _single_ subkey? I definitely need such option. Specyfying subkey ID after --export-secret-subkeys exports all subkeys (tested). =20 > > Second question: why GPG chokes on it? >=20 > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use --export-secret-subkeys without a parameter which, I assumed, would export only subkeys, thus not affecting a legacy v3 key without one. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From dshaw@jabberwocky.com Thu Feb 28 16:44:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 16:44:01 2002 Subject: problem with exporting subkeys In-Reply-To: References: <20020228043302.GB678@akamai.com> Message-ID: <20020228154123.GF678@akamai.com> On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. One way to do it would be to export the key with all subkeys and then --edit-key and "delkey" the subkeys you don't want. > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use > --export-secret-subkeys without a parameter which, I assumed, would export > only subkeys, thus not affecting a legacy v3 key without one. That's the way it works now. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From JanuszA.Urbanowicz Thu Feb 28 16:49:02 2002 From: JanuszA.Urbanowicz (JanuszA.Urbanowicz) Date: Thu Feb 28 16:49:02 2002 Subject: problem with exporting subkeys In-Reply-To: <20020228154123.GF678@akamai.com> from David Shaw at "Feb 28, 2002 10:41:23 am" Message-ID: David Shaw wrote/napisa=B3[a]/schrieb: > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > David Shaw wrote/napisa?[a]/schrieb: > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > >=20 > > > > First question: why ALL my secret keys in the packet? I supposed on= ly > > > > subkeys would go there. > > >=20 > > > The structure of the secret primary key needs to still be there for > > > various things to work. However, the secret parts of the key are > > > gone. Compare the size of a --export-secret-key vs a > > > --export-secret-subkeys. > >=20 > > Ok. But is there a way to export a _single_ subkey? I definitely need s= uch > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > subkeys (tested). >=20 > The single subkey isn't usable without the primary key (or rather, the > primary key minus the secret parts of the key) attached, so exporting > just a subkey won't really be helpful. One way to do it would be to > export the key with all subkeys and then --edit-key and "delkey" the > subkeys you don't want. By 'single subkey' I mean a secret subkey plus the whole data structure required to maintain it. What I mean (and I would like to be able to) is ability to be able to eport single subkeys (plus the whole stuff needed to handle them) and not all at once. I'm not sure if I'm clear enough here. Alex --=20 C _-=3D-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | = * =09 ; (_O : +-------------------------------------------------------------+ --= +~|=09 ! &~) ? | P=B3yn=B1=E6 chc=EA na Wsch=F3d, za Suez, gdzie jest dobrem ka= =BFde z=B3o | l_|/=09 A ~-=3D-~ O| Gdzie przykaza=F1 brak dziesi=EAciu, a pi=E6 mo=BFna a=BF po d= no; | | =20 From disastry@saiknes.lv Thu Feb 28 19:55:01 2002 From: disastry@saiknes.lv (disastry@saiknes.lv) Date: Thu Feb 28 19:55:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) Message-ID: <3C7E7C82.ABA0D6AD@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > David Shaw dshaw@jabberwocky.com wrote: > > > > Second question: why GPG chokes on it? > > > > > > Judging from the listing you posted, it seems you did > > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > > keys do not work with --export-secret-subkeys, and in fact cause the > > > resulting file to be unusable. > > > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > > keys. > > > David > > > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > > I have even seen v3 keys with subkeys. > > Are you sure? yes. at lest I'm sure that such keys do exist. > Section 10.1 ("Transferable Public Keys") says: > > However, any V4 key may have subkeys, and the subkeys may be > encryption-only keys, signature-only keys, or general-purpose keys. > > That doesn't exactly forbid it, true, but also section 11.1 ("Key > structures") does not show subkeys at all in the v3 allowable format > which is a stronger statement. > > We should construct such a key and see if any programs break with it. > Where did you see it? I have one on my keyring, I put it on web page at http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc I don't remember from where I got this key, but I don't think that I generated it myself, because it have passphrase "test" (all may test keys have passphrase "a" or "12345678" :) ) but I also remember seen real (not test) key belonging to some person. I can't find it... it was RSAv3 key with Elgamal subkey. GPG allows (maybe it does not allow now, but at least older versions allowed) to add subkeys to v3 keys. > Speaking of key versions - I spent some time looking at what versions > were permitted with what a while ago and one thing that does seem to > be explicitly permitted is v4 keys with v3 subkeys. I did test this > and PGP supports it (though this may be accidental support). GnuPG > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > Florian, this can give you the unchangeable expiration date that you > wanted, if you're willing to accept the restrictions (RSA only, etc.) > on v3 keys :) > David btw, v3 subkeys are (seems to be) allowed too, section 5.5.2. Public Key Packet Formats "A version 3 public key or public subkey packet contains:" some time ago I did some experiments - added key to other key as subkey, and converted subkey to key :) it worked. test results here http://disastry.dhs.org/pgp/testkeys key subkey tstDSADSA.asc 0xA496AC49 0xCD80EA04 tstDSADSA-sub.asc 0xCD80EA04 tstRSADSA.asc 0x0FD8A43F 0xF3A46303 tstDSADSA-RSA2.asc 0xA496AC49 0x0FD8A43F __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5gFzBaTVEuJQxkEQM2xgCg8DJDWVFeW4uZS80GFWspQ83IEHAAn1/j gBeCC+4Jp6G5C0JbG4V3PkhP =TgR6 -----END PGP SIGNATURE----- From disastry@saiknes.lv Thu Feb 28 20:03:01 2002 From: disastry@saiknes.lv (disastry@saiknes.lv) Date: Thu Feb 28 20:03:01 2002 Subject: problem with exporting subkeys Message-ID: <3C7E7E68.3726253B@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. he did not asked for that. - --export-secret-subkeys exports: pubkey, fake seckey and all subkeys. I think he asked how to export: pubkey, fake seckey and ONE SELECTED subkey. well... beuckup the key, remove unwanted subkeys, do --export-secret-subkeys, restore key fom backup :) besides the single subkey IS usable without the primary key - it can be promoted to key (see my other msg). __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5h8TBaTVEuJQxkEQOe0QCfXbgjsqrCxIbTSpLcrz+BiXxg2fQAnRZT 1/LzEfMhFsFyOyBRad6sKWmg =C5n4 -----END PGP SIGNATURE----- From dshaw@jabberwocky.com Thu Feb 28 20:16:01 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 20:16:01 2002 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E7C82.ABA0D6AD@saiknes.lv> References: <3C7E7C82.ABA0D6AD@saiknes.lv> Message-ID: <20020228191422.GA691@akamai.com> On Thu, Feb 28, 2002 at 08:52:50PM +0200, disastry@saiknes.lv wrote: > > We should construct such a key and see if any programs break with it. > > Where did you see it? > > I have one on my keyring, I put it on web page at > http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc > > I don't remember from where I got this key, but I don't think > that I generated it myself, because it have passphrase "test" > (all may test keys have passphrase "a" or "12345678" :) ) > > but I also remember seen real (not test) key belonging to some person. > I can't find it... it was RSAv3 key with Elgamal subkey. > > GPG allows (maybe it does not allow now, but at least > older versions allowed) to add subkeys to v3 keys. It still allows you, but it prints a warning "creating subkeys for v3 keys is not OpenPGP compliant". It may have warned before too. > > Speaking of key versions - I spent some time looking at what versions > > were permitted with what a while ago and one thing that does seem to > > be explicitly permitted is v4 keys with v3 subkeys. I did test this > > and PGP supports it (though this may be accidental support). GnuPG > > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > > > Florian, this can give you the unchangeable expiration date that you > > wanted, if you're willing to accept the restrictions (RSA only, etc.) > > on v3 keys :) > > btw, v3 subkeys are (seems to be) allowed too, > section 5.5.2. Public Key Packet Formats > "A version 3 public key or public subkey packet contains:" That's what I just said - one paragraph up. I can't see any really good use for it except that v3 (sub)keys have a fixed expiration date that cannot be changed in the binding self-sig. That's why I thought Florian would be interested, since he wanted that feature. I suppose it would be handy for someone who had a lot of v3 keys to gather them together into one key, but that really doesn't give you anything useful. > some time ago I did some experiments - added key to other key as subkey, > and converted subkey to key :) it worked. Yes. I tried that once as well. I was thinking it would be an interesting solution for wanting a signing subkey, but since PGP couldn't verify a signature from a signing subkey, I made my signing subkey into a regular v4 key for PGP folks. :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From dshaw@jabberwocky.com Thu Feb 28 20:25:02 2002 From: dshaw@jabberwocky.com (David Shaw) Date: Thu Feb 28 20:25:02 2002 Subject: problem with exporting subkeys In-Reply-To: References: <20020228154123.GF678@akamai.com> Message-ID: <20020228192304.GB691@akamai.com> On Thu, Feb 28, 2002 at 04:40:42PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > > David Shaw wrote/napisa?[a]/schrieb: > > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > > > subkeys would go there. > > > > > > > > The structure of the secret primary key needs to still be there for > > > > various things to work. However, the secret parts of the key are > > > > gone. Compare the size of a --export-secret-key vs a > > > > --export-secret-subkeys. > > > > > > Ok. But is there a way to export a _single_ subkey? I definitely need such > > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > > subkeys (tested). > > > > The single subkey isn't usable without the primary key (or rather, the > > primary key minus the secret parts of the key) attached, so exporting > > just a subkey won't really be helpful. One way to do it would be to > > export the key with all subkeys and then --edit-key and "delkey" the > > subkeys you don't want. > > By 'single subkey' I mean a secret subkey plus the whole data structure > required to maintain it. What I mean (and I would like to be able to) is > ability to be able to eport single subkeys (plus the whole stuff needed to > handle them) and not all at once. I'm not sure if I'm clear enough here. Clear, but there is no current feature to do that. You can approximate that feature by using export-secret-subkey on the whole key and using the --edit menu on the whole key to delete any subkeys you don't want. You will end up with the empty primary key, and just the subkey you wanted to keep. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From stephane at sente.ch Fri Feb 1 17:56:02 2002 From: stephane at sente.ch (Stephane Corthesy) Date: Tue Oct 7 21:28:31 2003 Subject: GPGME bug Message-ID: Hi, I've been playing a little bit again with gpgme, and discovered the following problem: When enumerating keys: the "secret" attribute is retrieved only if we enumerate secret keys! If we enumerate all keys, the attribute "secret" is always set to 0. I also discovered a strange thing with gpg (1.0.6): My PGP key has 2 uids; if I display them with gpg --list-secret-keys or --list-keys, main uid is not the same (swapped). About secret keys again: can a subkey be secret without the main key being secret? Consequence for gpgme is that if I retrieve only secret keys, the main uid of my PGP Key is not the same as if I retrieve all keys. I'm suspecting two other problems (I need to check again): gpgme_op_decrypt(): doesn't return an error if no valid passphrase is given gpgme_op_encrypt(): doesn't return an error if no recipient is trusted, but encrypts nothing Thanks for having written all the doc! It's been very helpful, and I could finally document a little bit the ObjC wrapper :-) Stephane From test at test.com Tue Feb 5 07:49:01 2002 From: test at test.com (test) Date: Tue Oct 7 21:28:31 2003 Subject: (no subject) Message-ID: <3c5f7fc13ca1df8a@relay2.kornet.net> (added by relay2.kornet.net) An HTML attachment was scrubbed... URL: /pipermail/attachments/20020205/ac7bbbd4/attachment.htm From jgre at tzi.de Tue Feb 5 11:41:01 2002 From: jgre at tzi.de (Janico Greifenberg) Date: Tue Oct 7 21:28:31 2003 Subject: Questions about GPGME Message-ID: <20020205103806.GC664@tzi.de> Hi, I tried asking this before in the users mailing list but did ot receive an answer so I'm trying it here. My questions are: - Is it possible to change the keyrings used by GPGME and how does it work? - How can I extract more information about importing keys and verifying signatures? I need to know whose key I'm importing and who signed the text. Using GPG itself I can get this information with the --status-fd option but how can I get it with GPGME? Thanks in advance Janico -- Warning! Taking anyone (especially yourself) too serious will be harmful From s.aparna at digital.com Tue Feb 5 11:56:02 2002 From: s.aparna at digital.com (Aparna, S) Date: Tue Oct 7 21:28:31 2003 Subject: GnuPG on Tru64 versions Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Hi, I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any of the flavors of Compaq Tru64 Unix. Any pointers would be greatly helpful. Thanks, Aparna. From Marcus.Brinkmann at ruhr-uni-bochum.de Tue Feb 5 14:17:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:31 2003 Subject: Questions about GPGME In-Reply-To: <20020205103806.GC664@tzi.de> References: <20020205103806.GC664@tzi.de> Message-ID: <20020205131518.GC792@212.23.136.22> On Tue, Feb 05, 2002 at 11:38:06AM +0100, Janico Greifenberg wrote: > Hi, > I tried asking this before in the users mailing list but did ot receive an > answer so I'm trying it here. Mmmh. I think I am not following that list but should. I will subscribe. However, GPGME is still in its development stage, so this is the appropriate forum anyway. > My questions are: > - Is it possible to change the keyrings used by GPGME and how does it work? No, currently the default keyrings of the crypto backend are used. We will need some way to list keys in a seperate file for some other project, but this is probably not what you mean. The question is of course what style of interface we choose for such configuration options of the crypto backend. I will think about it. > - How can I extract more information about importing keys and verifying > signatures? I need to know whose key I'm importing and who signed the > text. Using GPG itself I can get this information with the --status-fd option > but how can I get it with GPGME? After importing a key, you can get back some information about it with gpgme_op_info, I am not sure if that includes everything you need, please come back with more details if you tried it and need more. For verify, there are two functions you can invoke after a successful verification, gpgme_get_sig_status and gpgme_get_sig_key. In the CVS repository of gpgme is a manual in doc/gpgme.texi that documents these functions. Also read the README how to build it, please. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From toni at eyets.com Tue Feb 5 18:46:01 2002 From: toni at eyets.com (toni) Date: Tue Oct 7 21:28:31 2003 Subject: Hi.... Message-ID: <3C601AED.5070709@eyets.com> Hi, I would like to develop gpg in c for linux... where can i find documentation about functions, or example code? Thanks From Marcus.Brinkmann at ruhr-uni-bochum.de Wed Feb 6 02:15:02 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:31 2003 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020114004404.GD2449@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> Message-ID: <20020206011258.GD657@212.23.136.22> On Mon, Jan 14, 2002 at 01:44:05AM +0100, Marcus Brinkmann wrote: > 1. The pending flag is never reset and not resettable. This has been fixed by making gpgme_wait reset the pending flag. > 2. The resulting error value of the operation is not calculable via the > public interface. It is retrieved through internal interfaces. This has been fixed by adding a STATUS argument to gpgme_wait. It is now close to the semantics of waitpid. I also fixed the code to support ctx being non-NULL. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann at ruhr-uni-bochum.de Wed Feb 6 02:24:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:31 2003 Subject: upcoming GPGME snapshot (call for last minute API requests) Message-ID: <20020206012210.GF657@212.23.136.22> Hi, if there is something that bugs you in the GPGME API, now would be a good time to tell me, so it can probably be fixed before the upcoming release of a new snapshot (around next weekend). There are some smaller things (and additions for GpgSM) I will do myself, and you don't need to remind me of anything that is on the TODO list (or was reported on the list recently), but if you want to be sure that something goes in, it is better to repeat it than to assume I took notice and rejected it. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From Marcus.Brinkmann at ruhr-uni-bochum.de Wed Feb 6 02:32:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:31 2003 Subject: aborting (or finishing) pending operations in GPGME In-Reply-To: <20020206011258.GD657@212.23.136.22> References: <20020114004404.GD2449@212.23.136.22> <20020206011258.GD657@212.23.136.22> Message-ID: <20020206012946.GG657@212.23.136.22> On Wed, Feb 06, 2002 at 02:12:58AM +0100, Marcus Brinkmann wrote: > This has been fixed by adding a STATUS argument to gpgme_wait. It is now > close to the semantics of waitpid. I also fixed the code to support ctx > being non-NULL. NULL. Not non-NULL. NULL. Sorry for the confusion. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna at digital.com Wed Feb 6 09:48:01 2002 From: s.aparna at digital.com (Aparna, S) Date: Tue Oct 7 21:28:31 2003 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Hi, I'm trying to compile GnuPG on Tru64 platform. Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? Thanks, Aparna. From marcus.brinkmann at ruhr-uni-bochum.de Wed Feb 6 11:04:01 2002 From: marcus.brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:31 2003 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B2@diexch01.xko.dec.com> Message-ID: <20020206110218.GA451@finnegan> On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus From s.aparna at digital.com Wed Feb 6 12:32:02 2002 From: s.aparna at digital.com (Aparna, S) Date: Tue Oct 7 21:28:31 2003 Subject: GnuPG and GPGME version compatibility Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. Is GPGME 0.3.0 the latest version ? Thanks, Aparna. -----Original Message----- From: Marcus Brinkmann [mailto:marcus.brinkmann@ruhr-uni-bochum.de] Sent: Wednesday, February 06, 2002 4:32 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GnuPG and GPGME version compatibility On Wed, Feb 06, 2002 at 02:12:56PM +0530, Aparna, S wrote: > I'm trying to compile GnuPG on Tru64 platform. > Is GPGME V 0.1.4 compatible with GnuPG V1.0.6 ? I don't think you should use GPGME V 0.1.4. The current version is 0.3.0. GPGME 0.3.0 (and 0.2.3, which you might give a try as well) is compatible with GnuPG 1.0.6 Thanks, Marcus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From marcus.brinkmann at ruhr-uni-bochum.de Wed Feb 6 14:16:01 2002 From: marcus.brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:31 2003 Subject: GnuPG and GPGME version compatibility In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08B3@diexch01.xko.dec.com> Message-ID: <20020206141404.GE451@finnegan> On Wed, Feb 06, 2002 at 04:56:20PM +0530, Aparna, S wrote: > I downloaded GPGME V 0.1.4 as it had the latest timestamp on it. > Is GPGME 0.3.0 the latest version ? Yes. I will take a look at the time stamps later. Marcus From wk at gnupg.org Wed Feb 6 14:38:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:31 2003 Subject: GPGME bug In-Reply-To: (Stephane Corthesy's message of "Fri, 1 Feb 2002 17:54:12 +0100") References: Message-ID: <87pu3in39c.fsf@alberti.gnupg.de> On Fri, 1 Feb 2002 17:54:12 +0100, Stephane Corthesy said: > When enumerating keys: the "secret" attribute is retrieved only if > we enumerate secret keys! If we enumerate all keys, the attribute > "secret" is always set to 0. Correct. This _might_ change in future but you should not rely on this. If you want a listing of the secret keys you should list the secret keys (e.g. for deciding which key to use for signing). For most tasks you don't need the secret key. > I also discovered a strange thing with gpg (1.0.6): > My PGP key has 2 uids; if I display them with gpg --list-secret-keys > or --list-keys, main uid is not the same (swapped). The UIDs listed with --list-secret-keys are just for convenience. It needs a lot of code to keep them in sync with the ones on the public keyring. So the latest snapshots don't care anymore about packets on the secret keyring and instead do some merging with the public key information. > About secret keys again: can a subkey be secret without the main key > being secret? You should get away from the need to know wether a key is secret or not. The only relevant information is whether a key is capable of signing or decrypting. A secret is a secret is a secret :-) Eventually all secret key[*] handling will be done by gpg-agent and there will be no way for an application (except for special tools) to cope with a secret key. > I'm suspecting two other problems (I need to check again): > gpgme_op_decrypt(): doesn't return an error if no valid passphrase > is given > gpgme_op_encrypt(): doesn't return an error if no recipient is > trusted, but encrypts nothing Be prepared to get some errors after this has been fixed. > Thanks for having written all the doc! It's been very helpful, and I > could finally document a little bit the ObjC wrapper :-) That belongs to Marcus of course. Werner [*] When I talk about a secret key I usually mean the private keys of a public keypair. For conventional encryption a passphrase callback is still needed to automate some applications. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From bwpearre at mit.edu Wed Feb 6 19:13:02 2002 From: bwpearre at mit.edu (Ben Pearre) Date: Tue Oct 7 21:28:32 2003 Subject: Anderson's attack? Message-ID: <20020206131032.D21208@diverge.seunglab.mit.edu> I'm sorry if this is in the archives - I looked but didn't find it. This seems like a legitimate concern: http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html Has this been addressed in GnuPG? The documentation doesn't mention whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or what. What's really going on in there? Should there be an option --both, which does sign/encrypt/sign or some such? I believe that the first time I installed PGP, there was an option in my MUA to encrypt the relevant headers, but I don't think that this is a problem that should be foisted upon the MUA developers, as no-one seems to know about this issue. Thoughts? Cheers! -Ben -- bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available Url : /pipermail/attachments/20020206/9abc80ad/attachment.bin From jgre at tzi.de Wed Feb 6 21:43:02 2002 From: jgre at tzi.de (Janico Greifenberg) Date: Tue Oct 7 21:28:32 2003 Subject: Questions about GPGME In-Reply-To: <20020205131518.GC792@212.23.136.22> References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> Message-ID: <20020206204004.GA5312@tzi.de> > No, currently the default keyrings of the crypto backend are used. We will > need some way to list keys in a seperate file for some other project, but > this is probably not what you mean. The question is of course what style > of interface we choose for such configuration options of the crypto backend. > I will think about it. What I would like is are functions like gpgme_set_pubkeyring(char *file); gpgme_set_seckeyring(char *file); gpgme_set_no_default_keyring(int ); or something like that simple setting the gpg options accordingly. > After importing a key, you can get back some information about it with > gpgme_op_info, I am not sure if that includes everything you need, please > come back with more details if you tried it and need more. I think that will work for me. > For verify, there are two functions you can invoke after a successful > verification, gpgme_get_sig_status and gpgme_get_sig_key. This sound good, I just can't get the verify (or decrypt_verify) working. I'm using the folling code: void Crypto::Test(char *msg) { size_t nread; int ret,cnt=0; char *buf_ptr; char str_out[MAX_DATA]; GpgmeSigStat stat; GpgmeData in, out, out2; err = gpgme_data_new_from_mem(&in,msg,strlen(msg),0); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_new ( &out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); if (err) throw CoreError(gpgme_strerror(err)); fflush (NULL); err = gpgme_data_rewind ( out ); if (err) throw CoreError(gpgme_strerror(err)); err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); if(err) throw CoreError(gpgme_strerror(err)); gpgme_data_release (in); gpgme_data_release (out); cout<; from bwpearre@mit.edu on Wed, Feb 06, 2002 at 01:10:32PM -0500 References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <20020206225706.O25763@mbsks.franken.de> Mahlzeit On Wed, Feb 06, 2002 at 01:10:32PM -0500, Ben Pearre wrote: > Has this been addressed in GnuPG? I don't think this is the correct location to fix this. GnuPG does sign the message. That's it. To understand this, you can look how it is done in the paper world, where the same attack is possible. The way to prevent it here is not to encode the recepient of a letter in your own signature, but to write it onto the letter. So the correct play to fix this would be IMO e.g. the MUA (mutt, etc.). This can include some header lines before signing. Or if you write a contract with some editor, you write the parties yourself into it. Mahlzeit endergone Zwiebeltuete From harmil at spamcop.net Wed Feb 6 23:47:02 2002 From: harmil at spamcop.net (Aaron Sherman) Date: Tue Oct 7 21:28:32 2003 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> References: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: <1013035679.9324.239.camel@pps> On Wed, 2002-02-06 at 13:10, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? Doh! This is a classic example of a social problem being attacked on a technical level (which is pretty much doomed to failure). The idea is that T[1]=E(B[pub],S(A[priv],P)) can be transformed into T[2]=E(C[pub],D(B[priv],T[1])) and the encryption envelope will tell you nothing to refute the assertion that A told C P. To which we all respond... duh. The document goes on to possit that where P is some permutation on "sender owes recipient US$X", recipient is ambiguous and all values of T[2,...] yeild an unexpected result for A (i.e. owing money to everyone on the planet). When I'm home, I'll look up and cite the page in AC where this is gone into in some depth, but the core of the argument here is that there is something wrong with this scenario, and that the encryption envelope should be responsible for protecting the innocent but stupid. If you feel this way, feel free to write a mail-encrypting system that duplicates the message headers and includes them in the signed plaintext. That will provide no assurance that you did NOT divulge information of course, but no cryptosystem alone can ever do that (mathematically speaking nothing can ever do that, but for some specialized applications, a reasonable subset can be achived). Ok, back to the topic: this is not gnupg's problem. It should not be gnupg's problem. This is the plaintext's author's problem, as it should be. As for the argument that someone could be fired for leaking company secrets or end up owing people money because of ambiguous statements I say foey. Turn that upside down, and I can buy it: the recipient cannot prove that they were the intended target of the message without some external data source (subpeonaed mailer logs, etc) and thus cannot rely on using the signed message as evidence of a contract or disclosure unless it is internally unambiguous. Yes, this is true. It means that recipients must require that the body of a signed message must be internally unambiguous or only rely on external information which is unambiguous (e.g. "USPS PKI ID xxxx owes USPS PKI ID yyyy the balance of PayPal account zzzz"; if you trust the USPS PKI and PayPal to maintain an unambiguos resolution of these values, then this message is fine....). Ok, I'm done ranting. I'll be in my corner ;-) From rabbi at quickie.net Thu Feb 7 00:52:02 2002 From: rabbi at quickie.net (Len Sassaman) Date: Tue Oct 7 21:28:32 2003 Subject: Anderson's attack? In-Reply-To: <20020206131032.D21208@diverge.seunglab.mit.edu> Message-ID: This was addressed pretty thoroughly on the Cryptography list when Davis's paper first came out. Basically, the "flaws" the paper is discussing are social, not technical. The steps that can be taken on a technical level to prevent this are few. (FWIW, OpenPGP's timestamping helps this a bit.) As for your Encrypt/Sign question, I think you are asking the order in which that occurs? The signature is inside the encryption envelope. This is the proper way to do it, for privacy/traffic analysis purposes. On Wed, 6 Feb 2002, Ben Pearre wrote: > I'm sorry if this is in the archives - I looked but didn't find it. > > This seems like a legitimate concern: > > http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html > > Has this been addressed in GnuPG? The documentation doesn't mention > whether gpg --encrypt --sign does Encrypt/Sign or Sign/Encrypt or > what. What's really going on in there? > > Should there be an option --both, which does sign/encrypt/sign or some > such? I believe that the first time I installed PGP, there was an > option in my MUA to encrypt the relevant headers, but I don't think > that this is a problem that should be foisted upon the MUA developers, > as no-one seems to know about this issue. > > Thoughts? > > Cheers! > -Ben > > -- > bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben > --Len. From s.aparna at digital.com Thu Feb 7 05:44:01 2002 From: s.aparna at digital.com (Aparna, S) Date: Tue Oct 7 21:28:32 2003 Subject: Compilation error while building GnuPG Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08B6@diexch01.xko.dec.com> Hi, I trying to build GnuPG on Tru64 V5.1. I'm getting the following compilation error while building the tools sources; Make: Don't know how to make -liconv. Stop. I'm curious to know if anyone has faced this problem. Thanks for any help, Aparna. From s.aparna at digital.com Thu Feb 7 13:16:01 2002 From: s.aparna at digital.com (Aparna, S) Date: Tue Oct 7 21:28:32 2003 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Hi, I used the 'configure' command while building GPGME. I got the following warning message; checking for gpgsm... no configure: WARNING: Could not find GpgSM, install GpgSM or use --with-gpgsm=PATH to enable it I checked the site www.gnupg.org site to get information on GPGSM. I could not find any. Any pointers ? Thanks, Aparna. From wk at gnupg.org Thu Feb 7 13:43:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:32 2003 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> ("Aparna, S"'s message of "Thu, 7 Feb 2002 17:40:33 +0530") References: <177E503C4DA3D311BC9D0008C791C30601FE08BD@diexch01.xko.dec.com> Message-ID: <87u1sth3ih.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk at gnupg.org Thu Feb 7 13:53:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:32 2003 Subject: Questions about GPGME In-Reply-To: <20020206204004.GA5312@tzi.de> (jgre@tzi.de's message of "Wed, 6 Feb 2002 21:40:04 +0100") References: <20020205103806.GC664@tzi.de> <20020205131518.GC792@212.23.136.22> <20020206204004.GA5312@tzi.de> Message-ID: <87pu3hh32r.fsf@alberti.gnupg.de> On Wed, 6 Feb 2002 21:40:04 +0100, Janico Greifenberg said: > What I would like is are functions like > gpgme_set_pubkeyring(char *file); > gpgme_set_seckeyring(char *file); > gpgme_set_no_default_keyring(int ); > or something like that simple setting the gpg options accordingly. No we can't do this as this would bind the API to one specific backend. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); You should not use strlen() here because the signed data is in binary format. Use the value you have in NREAD or force creation of an armored signature using gpgme_set_armor before you do the sign. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann at ruhr-uni-bochum.de Thu Feb 7 14:48:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:32 2003 Subject: [Marcus.Brinkmann@ruhr-uni-bochum.de: Re: Questions about GPGME] Message-ID: <20020207134537.GK1026@212.23.136.22> Mmh, forgot to CC the list. Sorry. ----- Forwarded message from Marcus Brinkmann ----- From: Marcus Brinkmann To: Janico Greifenberg Subject: Re: Questions about GPGME On Wed, Feb 06, 2002 at 09:40:04PM +0100, Janico Greifenberg wrote: > This sound good, I just can't get the verify (or decrypt_verify) working. I'm > using the folling code: I can debug it, but please send in complete (but small) examples that compile without changes (this time I pulled together my C++ knowledge and made it compilable myself). First, a general comment. You might consider wrapping the GPGME data types in C++ classes. They should fall in the C++ style of programming quite naturally. > err = gpgme_op_sign (ctx,in,out,GPGME_SIG_MODE_NORMAL); gpgme_op_verify does only support detached signatures, so you must use GPGME_SIG_MODE_DETACH if you want to verify it with gpgme afterwards. (Except if something is encrypted and signed, then you can use decrypt_verify). > err = gpgme_data_read(out,str_out, MAX_DATA, &nread ); You should not use hard limits like that. Avoid it by using gpgme_data_release_and_get_mem, which returns a pointer to a buffer and its size. > err = gpgme_data_new_from_mem(&in,str_out,strlen(str_out),1); This is the next error. The string consists of binary and might contain binary zeroes. So you should use the size returned by gpgme_data_release_and_get_mem. Alternatively, you can gpgme_data_read the buffer and calculat > bzero(str_out,sizeof(str_out)); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_data_new(&out2); > if (err) throw CoreError(gpgme_strerror(err)); > err = gpgme_op_verify(ctx,in,out2,&stat); gpgme_op_verify does not take an in and an out argument, but a sig and a plain argument (signature and plaintext). Please check out the documentation in doc/gpgme.texi in the CVS repository. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de ----- End forwarded message ----- -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From s.aparna at digital.com Thu Feb 7 15:30:01 2002 From: s.aparna at digital.com (Aparna, S) Date: Tue Oct 7 21:28:32 2003 Subject: GPGSM question Message-ID: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Thanks for the information. I have another question. Where can I find the documentation for GPGME ? Thanks, Aparna. -----Original Message----- From: Werner Koch [mailto:wk@gnupg.org] Sent: Thursday, February 07, 2002 6:07 PM To: Aparna, S Cc: 'gnupg-devel@gnupg.org' Subject: Re: GPGSM question On Thu, 7 Feb 2002 17:40:33 +0530, Aparna, S said: > I checked the site www.gnupg.org site to get information on GPGSM. I could > not find any. > Any pointers ? It is currently under development and will eventually be part of GnuPG. See http://www.gnupg.org/aegypten/ -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus _______________________________________________ Gnupg-devel mailing list Gnupg-devel@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-devel From Marcus.Brinkmann at ruhr-uni-bochum.de Thu Feb 7 16:33:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:32 2003 Subject: GPGSM question In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> References: <177E503C4DA3D311BC9D0008C791C30601FE08BF@diexch01.xko.dec.com> Message-ID: <20020207163033.A305@ulysses.alg.ruhr-uni-bochum.de> On Thu, Feb 07, 2002 at 07:54:51PM +0530, Aparna, S wrote: > Thanks for the information. > I have another question. > Where can I find the documentation for GPGME ? Check out the version from CVS, and run configure with the --enable-maintainer-mode, then it will be built along with gpgme. (see the README for more information, and the web site for more info how to use CVS). Thanks, Marcus From dres at cs.tu-berlin.de Thu Feb 7 20:11:01 2002 From: dres at cs.tu-berlin.de (Stefan Keller) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? Message-ID: <20020207200603.A28608@harry.cs.tu-berlin.de> Hello list, Recently, out of curiosity, I looked at GnuPG's random number generation and stumbled across something I think is problematic. However, I'm not a cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo random number generation. That's why I ask people here to comment on this. So read this with care; any or all of the things presented herein may be totally wrong. The problem: The problematic line that gave me headaches is in add_randomness() in random.c, where the random noise gathered by the (system dependant) different random code (rndlinux.c rndegd.c rndw32.c ..) is added to our random pool: rndpool[pool_writepos++] = *p++; The problem I see with this is, that previous data in our random pool is simply overwritten with new data. If our gathered data is already random in a cryptographically secure sense, this is not a problem per se. However, on non /dev/random systems such as win32 the system dependent random gather code simply puts much more "random" noise (gathered from lots of different sources of varying quality) into our pool, in the hope that the random pool code handles this correctly (like whitening the buffer via use of a hash function etc.). To further express this, imagine that the system-x random gatherer is asked to add x bytes of random data into our pool. The gatherer "decides" that to satisfy this demand he has to put out 2*POOLSIZE of random noise containing not-that-much entropy. After POOLSIZE bytes have been written, the code in random.c correctly whitens the buffer using RIPEMD160. However, the next POOLSIZE bytes of random data (of questionable quality) *overwrite* anything that was in the pool before, destroying the valuable accumulated entropy. (The worst case would be these last POOLSIZE bytes being all zeros.) The impact: This depends on the quality of the environmental noise gatherer used, but theoretically keys generated with GnuPG on systems lacking a good random source are at risk. The fix: As said, I'm not that experienced with PRNGs etc, but I think this would do just fine: rndpool[pool_writepos++] ^= *p++; This will also harden the PRNG against attacks on systems which *do* have a good random source (such as linux). Furthermore, already collected entropy is not simply thrown away (even if "used"), instead it is kept in full, still it is impossible to guess the current state of the pool based on the previous one (without knowledge of the actual random data). In short: this should always increase the PRNGs quality. Please Cc any replies, as I'm not subscribed. -- Stefan Keller From wk at gnupg.org Thu Feb 7 22:19:03 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:33 2003 Subject: New releases of libgcrypt, libksba and newpg Message-ID: <87u1st9er4.fsf@alberti.gnupg.de> Hi! I have just released some software for the Aegypten project. To demonstrate that we made some progress I bumbed some version numbers a bit ;-) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.6.tar.gz (618k) ftp://ftp.gnupg.org/gcrypt/alpha/libgcrypt/libgcrypt-1.1.5-1.1.6.diff.gz (12k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/libksba-0.2.0.tar.gz (357k) [sorry, no diff file] ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.3.0.tar.gz (262k) ftp://ftp.gnupg.org/gcrypt/alpha/aegypten/newpg-0.0.0-0.3.0.diff.gz (102k) There is no need to build OpenSC yet as we only have some stubs. you need to build libksba and libgcrypt prior to newpg. The major news is that gpg-agent does now operate as a daemon ("eval `gpg-agent`"), caches the passphrases and encrypts the secret keys. You may want to try the gpg-agent with the latest GnuPG CVS version which supports the new protocol - I am using this daily with Gnus. There is also some progress with certicate handling etc. Because theDirMngr has not yet been released the gpgsm option --disable-crl-checks might come handy. For more information consult http://www.gnupg.org/aegypten/ or ask on gpa-dev@gnupg.org. Have fun, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mooney at dogbert.cc.ndsu.NoDak.edu Fri Feb 8 03:12:02 2002 From: mooney at dogbert.cc.ndsu.NoDak.edu (Tim Mooney) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG on Tru64 versions In-Reply-To: <177E503C4DA3D311BC9D0008C791C30601FE08AB@diexch01.xko.dec.com> Message-ID: In regard to: GnuPG on Tru64 versions, Aparna, S said (at 4:20pm on Feb 5,...: >I'm a newbie to GnuPG. I'm interested to know if GnuPG is available for any >of the flavors of Compaq Tru64 Unix. I had a lot of problems with the early 1.0.x versions not working correctly, but 1.0.6 seems to be much better. I haven't used it much yet, though. I compiled it using the vendor cc/ld on Tru64 5.1. Tim -- Tim Mooney mooney@dogbert.cc.ndsu.NoDak.edu Information Technology Services (701) 231-1076 (Voice) Room 242-J6, IACC Building (701) 231-8541 (Fax) North Dakota State University, Fargo, ND 58105-5164 From pgut001 at cs.auckland.ac.nz Fri Feb 8 07:13:01 2002 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? Message-ID: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> >Recently, out of curiosity, I looked at GnuPG's random number generation and >stumbled across something I think is problematic. However, I'm not a >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo >random number generation. That's why I ask people here to comment on this. So >read this with care; any or all of the things presented herein may be totally >wrong. It's a pretty accurate analysis. The flaw is worrying, but not fatal, since (assuming it accurately implements the design in http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from the mixed input of a significant portion of the pool, ie 640 bits of pool data are used for each output block. However, if user seeding is allowed it's a bit more problematic since an attacker can overwrite the pool contents with known values. The original implementation has the comment: /* Mix the incoming data into the pool. This operation is resistant to chosen- and known-input attacks because the pool contents are unknown to an attacker, so XOR'ing in known data won't help them. In an attacker could determine pool contents by observing the generator output (which is defeated by the postprocessing), we'd have to perform an extra input mixing operation to defeat these attacks */ which addresses chosen/known-input attacks (and just for the record, it does XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG doesn't allow outside control of the seeding, this isn't a big problem, but it's still something which should be fixed. Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search for that name will find further discussion on this topic. I think copying xorbytes is taking GPG's PGP compatibility a bit far :-). Peter. From wk at gnupg.org Fri Feb 8 08:33:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020207200603.A28608@harry.cs.tu-berlin.de> (Stefan Keller's message of "Thu, 7 Feb 2002 20:06:03 +0100") References: <20020207200603.A28608@harry.cs.tu-berlin.de> Message-ID: <87bsf0a0yp.fsf@alberti.gnupg.de> On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > The problem I see with this is, that previous data in our random > pool is simply overwritten with new data. If our gathered data is Thanks Stefan for pointing this out. As Peter already mentioned, this is not a serious flaw because an attacker is not able to mix data of his choice in. I fixed it of course. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk at gnupg.org Fri Feb 8 08:59:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <8766589zoj.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 19:10:18 +1300 (NZDT), Peter Gutmann said: > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from It should implement a CSPRNG as described in your 1998(?) paper. > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). What worries me most is that it needed *4 years* to figure this bug out _and_ report it. I'd have expected that some more people had a close look at those critical things. It is a very sad thing that there is so less truth in the claim that bugs in Free Software are figured out very fast - I have seen too many counterexamples :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From roam at ringlet.net Fri Feb 8 10:01:01 2002 From: roam at ringlet.net (Peter Pentchev) Date: Tue Oct 7 21:28:33 2003 Subject: Add a --fast option to --import and --recv-keys Message-ID: <20020208105758.A39499@straylight.oblivion.bg> Hi, The attached patch adds the benefit of --import-fast to --recv-keys. The new --fast option works with both --import and --recv-keys, only importing the keys without updating the trustdb. --import-fast is still a valid option, but all it does is set the new 'fast' option and then fall back to the handling of --import. This speeds up things a *lot* when fetching multiple keys from a keyserver. Any comments on the patch are appreciated. G'luck, Peter -- Peter Pentchev roam@ringlet.net roam@FreeBSD.org PGP key: http://people.FreeBSD.org/~roam/roam.key.asc Key fingerprint FDBA FD79 C26F 3C51 C95E DF9E ED18 B68D 1619 4553 What would this sentence be like if pi were 3? Index: g10/g10.c =================================================================== RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/g10.c,v retrieving revision 1.1.1.1 retrieving revision 1.3 diff -u -r1.1.1.1 -r1.3 --- g10/g10.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/g10.c 8 Feb 2002 07:33:51 -0000 1.3 @@ -208,6 +208,7 @@ oNoSigCreateCheck, oEmu3DESS2KBug, /* will be removed in 1.1 */ oEmuMDEncodeBug, + oFast, aTest }; @@ -406,6 +407,7 @@ { aDeleteSecretAndPublicKey, "delete-secret-and-public-key",256, "@" }, { oEmu3DESS2KBug, "emulate-3des-s2k-bug", 0, "@"}, { oEmuMDEncodeBug, "emulate-md-encode-bug", 0, "@"}, + { oFast, "fast", 0, "@" }, {0} }; @@ -751,8 +753,8 @@ switch( pargs.r_opt ) { case aCheckKeys: set_cmd( &cmd, aCheckKeys); break; case aListPackets: set_cmd( &cmd, aListPackets); break; + case aFastImport: opt.fast_import=1; /* FALLTHROUGH */ case aImport: set_cmd( &cmd, aImport); break; - case aFastImport: set_cmd( &cmd, aFastImport); break; case aSendKeys: set_cmd( &cmd, aSendKeys); break; case aRecvKeys: set_cmd( &cmd, aRecvKeys); break; case aExport: set_cmd( &cmd, aExport); break; @@ -991,6 +993,7 @@ iobuf_enable_special_filenames (1); break; case oNoExpensiveTrustChecks: opt.no_expensive_trust_checks=1; break; + case oFast: opt.fast_import=1; break; default : pargs.err = configfp? 1:2; break; } @@ -1370,9 +1373,8 @@ } break; - case aFastImport: case aImport: - import_keys( argc? argv:NULL, argc, (cmd == aFastImport) ); + import_keys( argc? argv:NULL, argc, opt.fast_import ); break; case aExport: @@ -1385,7 +1387,7 @@ if( cmd == aSendKeys ) hkp_export( sl ); else if( cmd == aRecvKeys ) - hkp_import( sl ); + hkp_import( sl , opt.fast_import ); else export_pubkeys( sl, (cmd == aExport) ); free_strlist(sl); Index: g10/hkp.c =================================================================== RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.c,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.c 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.c 8 Feb 2002 07:32:52 -0000 1.2 @@ -47,7 +47,7 @@ * or other error codes. */ int -hkp_ask_import( u32 *keyid ) +hkp_ask_import( u32 *keyid, int fast ) { struct http_context hd; char *request; @@ -85,7 +85,7 @@ : g10_errstr(rc) ); } else { - rc = import_keys_stream( hd.fp_read , 0 ); + rc = import_keys_stream( hd.fp_read , fast ); http_close( &hd ); } @@ -96,7 +96,7 @@ int -hkp_import( STRLIST users ) +hkp_import( STRLIST users, int fast ) { if( !opt.keyserver_name ) { log_error(_("no keyserver known (use option --keyserver)\n")); @@ -114,7 +114,7 @@ * errorcounter ist not increaed and the program will return * with success - which is not good when this function is used. */ - if( hkp_ask_import( kid ) ) + if( hkp_ask_import( kid , fast ) ) log_inc_errorcount(); } return 0; Index: g10/hkp.h =================================================================== RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/hkp.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/hkp.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/hkp.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -23,7 +23,7 @@ int hkp_ask_import( u32 *keyid ); -int hkp_import( STRLIST users ); +int hkp_import( STRLIST users, int fast ); int hkp_export( STRLIST users ); Index: g10/options.h =================================================================== RCS file: /home/cvsroot/roam/c/contrib/sec/gnupg/g10/options.h,v retrieving revision 1.1.1.1 retrieving revision 1.2 diff -u -r1.1.1.1 -r1.2 --- g10/options.h 8 Feb 2002 06:56:03 -0000 1.1.1.1 +++ g10/options.h 8 Feb 2002 07:32:52 -0000 1.2 @@ -103,6 +103,7 @@ int no_expensive_trust_checks; int no_sig_cache; int no_sig_create_check; + int fast_import; } opt; -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 246 bytes Desc: not available Url : /pipermail/attachments/20020208/a97873b9/attachment.bin From wk at gnupg.org Fri Feb 8 11:07:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:33 2003 Subject: Add a --fast option to --import and --recv-keys In-Reply-To: <20020208105758.A39499@straylight.oblivion.bg> (Peter Pentchev's message of "Fri, 8 Feb 2002 10:57:59 +0200") References: <20020208105758.A39499@straylight.oblivion.bg> Message-ID: <878za48f88.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 10:57:59 +0200, Peter Pentchev said: > Any comments on the patch are appreciated. Thanks. However the CVS version and the 1.0.6c snapshot have a entirely revamped trustdb which is really fast compared to the old way. The one thing we have to improve is the speed of keylookup by replacing the sequential scans with an index and keeping some meta data. This is partly done but won't go into 1.0.7. Ciao, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw at jabberwocky.com Fri Feb 8 15:45:02 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <8766589zoj.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> Message-ID: <20020208144156.GD678@akamai.com> On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > What worries me most is that it needed *4 years* to figure this bug > out _and_ report it. I'd have expected that some more people had a > close look at those critical things. It is a very sad thing that > there is so less truth in the claim that bugs in Free Software are > figured out very fast - I have seen too many counterexamples :-( Make it worth their while. Netscape used to give out money for each verified bug report. We could give them some free beer to go with their free software. :) I'd be willing to throw some money into a pot for people who find security-related bugs in GnuPG. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From jas at extundo.com Fri Feb 8 20:07:01 2002 From: jas at extundo.com (Simon Josefsson) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> (pgut001@cs.auckland.ac.nz's message of "Fri, 8 Feb 2002 19:10:18 +1300 (NZDT)") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: pgut001@cs.auckland.ac.nz (Peter Gutmann) writes: > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). Makes you wonder if this code was simply copied from PGP? What about license etc? From dres at cs.tu-berlin.de Fri Feb 8 23:46:01 2002 From: dres at cs.tu-berlin.de (Stefan Keller) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208233946.A16027@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:10:18PM +1300, Peter Gutmann wrote: > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. I've just read your excellent paper (wish I had access to it / read it beforehand). Mind it to explain why the flaw is not fatal? As I explained, on non /dev/random (or equivalent) systems there are often *much* more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have been put into the pool, the entropy collected with the first POOLSIZE bytes is lost. (Things would be different if GnuPG was keeping some state information of the previous pool mixing operation, such as the last digest computed or the whole hash buffer.) So if those last POOLSIZE bytes happen to contain zero entropy (or a very small amount), it doesn't matter how the output is generated; it will not contain very much randomness, and thus might be easily guessable by an attacker. However, I don't know if this does really happen. I don't know how many bytes e.g. the slow_gatherer in rndw32.c really puts out, but if it happens to be much more than POOLSIZE, the quality of the PRNG solely depends on the last POOLSIZE bytes collected. Unless, of course, I completely misunderstood things. -- Stefan Keller From sroberts at uniserve.com Sat Feb 9 01:33:02 2002 From: sroberts at uniserve.com (Sam Roberts) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <200202080610.TAA128327@ruru.cs.auckland.ac.nz>; from pgut001@cs.auckland.ac.nz on Fri, Feb 08, 2002 at 07:10:18PM +1300 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <20020208073557.A50024497@localhost> "just for the record, it does XOR the data" I guess I'm missing something, too, because it certainly looks to me like new data is assigned over data already in the pool, and my understanding was XORing known values into a pool could not DECREASE the entropy in the pool, but assigning seems to mean you'll lose some of the current contents of the pool. What am I missing, where's the XOR occuring? Thanks, Sam Quoting Peter Gutmann , who wrote: > >Recently, out of curiosity, I looked at GnuPG's random number generation and > >stumbled across something I think is problematic. However, I'm not a > >cryptographer, nor do I have in-depth knowledge on cryptographic secure pseudo > >random number generation. That's why I ask people here to comment on this. So > >read this with care; any or all of the things presented herein may be totally > >wrong. > > It's a pretty accurate analysis. The flaw is worrying, but not fatal, since > (assuming it accurately implements the design in > http://www.cryptoapps.com/~peter/06_random.pdf) the output is only taken from > the mixed input of a significant portion of the pool, ie 640 bits of pool data > are used for each output block. > > However, if user seeding is allowed it's a bit more problematic since an > attacker can overwrite the pool contents with known values. The original > implementation has the comment: > > /* Mix the incoming data into the pool. This operation is resistant > to chosen- and known-input attacks because the pool contents are > unknown to an attacker, so XOR'ing in known data won't help them. > In an attacker could determine pool contents by observing the > generator output (which is defeated by the postprocessing), we'd > have to perform an extra input mixing operation to defeat these > attacks */ > > which addresses chosen/known-input attacks (and just for the record, it does > XOR the data :-). Without the XOR, you don't have these guarantees. Since GPG > doesn't allow outside control of the seeding, this isn't a big problem, but > it's still something which should be fixed. > > Incidentally, this bug is identical to the PGP 2.x xorbytes bug, a web search > for that name will find further discussion on this topic. I think copying > xorbytes is taking GPG's PGP compatibility a bit far :-). > > Peter. > > > _______________________________________________ > Gnupg-devel mailing list > Gnupg-devel@gnupg.org > http://lists.gnupg.org/mailman/listinfo/gnupg-devel -- Sam Roberts (Vivez sans temps mort!) From rabbi at quickie.net Sat Feb 9 02:20:01 2002 From: rabbi at quickie.net (Len Sassaman) Date: Tue Oct 7 21:28:33 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> Message-ID: On Fri, 8 Feb 2002, David Shaw wrote: > On Fri, Feb 08, 2002 at 08:54:04AM +0100, Werner Koch wrote: > > > What worries me most is that it needed *4 years* to figure this bug > > out _and_ report it. I'd have expected that some more people had a > > close look at those critical things. It is a very sad thing that > > there is so less truth in the claim that bugs in Free Software are > > figured out very fast - I have seen too many counterexamples :-( > > Make it worth their while. Netscape used to give out money for each > verified bug report. We could give them some free beer to go with > their free software. :) Exactly. Open source developers who expect free audits of their code simply because it is open are going to be disappointed, especially if they don't actively seek them. The reasons why source code must be available (from a security auditing perspective) are a) that a user can commission an audit if he wishes, and b) he is assured that the code he just had audited is the real deal, and not a "cleaned" version without back doors. --Len. From dres at cs.tu-berlin.de Sat Feb 9 03:56:02 2002 From: dres at cs.tu-berlin.de (Stefan Keller) Date: Tue Oct 7 21:28:34 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208073557.A50024497@localhost>; from sroberts@uniserve.com on Fri, Feb 08, 2002 at 07:35:58AM -0500 References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208073557.A50024497@localhost> Message-ID: <20020209035130.A20792@harry.cs.tu-berlin.de> On Fri, Feb 08, 2002 at 07:35:58AM -0500, Sam Roberts wrote: > "just for the record, it does XOR the data" > > What am I missing, where's the XOR occuring? Peter was referring to "the original implementation", which I guess (after reading his paper) is the PRNG implementation in cryptlib. -- Stefan Keller From sroberts at uniserve.com Sat Feb 9 04:56:01 2002 From: sroberts at uniserve.com (Sam Roberts) Date: Tue Oct 7 21:28:34 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <87bsf0a0yp.fsf@alberti.gnupg.de>; from wk@gnupg.org on Fri, Feb 08, 2002 at 08:26:22AM +0100 References: <20020207200603.A28608@harry.cs.tu-berlin.de> <87bsf0a0yp.fsf@alberti.gnupg.de> Message-ID: <20020208105910.B73285669@localhost> Quoting Werner Koch , who wrote: > On Thu, 7 Feb 2002 20:06:03 +0100, Stefan Keller said: > Thanks Stefan for pointing this out. As Peter already mentioned, this > is not a serious flaw because an attacker is not able to mix data of > his choice in. I fixed it of course. Perhaps it should be fixed in the stable 1.0 branch as well? Sam -- Sam Roberts (Vivez sans temps mort!) From jsogo at debian.org Sat Feb 9 15:43:01 2002 From: jsogo at debian.org (Jose Carlos Garcia Sogo) Date: Tue Oct 7 21:28:34 2003 Subject: GPGME/jnlib includes gcrypt.h Message-ID: <20020209144104.GB2706@jaimedelamo.eu.org> Hello! I was trying to compile latest GPGME 0.3.1, but I have seen that jnlib_config.h includes gcrypt.h, which is not available in the GPGME tarball, and I guess it's part of libgcrypt. Do I need libgcrypt to compile GPGME? The error I get is: gcc -DHAVE_CONFIG_H -I. -I. -I.. -I../intl -g -O2 -Wall -Wcast-align -Wshadow -Wstrict-prototypes -c `test -f stringhelp.c || echo './'`stringhelp.c In file included from stringhelp.c:27: libjnlib-config.h:29: gcrypt.h: No such file or directory make[3]: *** [stringhelp.o] Error 1 Cheers, Jose Carlos Garcia Sogo jsogo@debian.org -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available Url : /pipermail/attachments/20020209/823b0536/attachment.bin From Marcus.Brinkmann at ruhr-uni-bochum.de Sat Feb 9 22:45:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:34 2003 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209144104.GB2706@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> Message-ID: <20020209214306.GB1387@212.23.136.22> On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > I was trying to compile latest GPGME 0.3.1, but I have seen that > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > tarball, and I guess it's part of libgcrypt. D'oh! I obviously never read the jnlib README, and when updating it I overwrote the local part of it (of which I wasn't aware at all). As I have libgcrypt installed, I didn't notice this. Thanks for spotting it! You can fix it by going back to the old version of the file, but I will also upload a gpgme 0.3.2. But I will wait until tomorrow, in case you find another bug. Here is a diff for you that reverts the change: Index: libjnlib-config.h =================================================================== RCS file: /cvs/gnupg/gpgme/jnlib/libjnlib-config.h,v retrieving revision 1.3 retrieving revision 1.4 diff -u -r1.3 -r1.4 --- libjnlib-config.h 2002/01/22 16:29:12 1.3 +++ libjnlib-config.h 2002/02/09 21:41:46 1.4 @@ -26,9 +26,11 @@ #ifndef LIBJNLIB_CONFIG_H #define LIBJNLIB_CONFIG_H -#include /* gcry_malloc & Cie. */ +#include "xmalloc.h" #include "logging.h" + + #ifdef USE_SIMPLE_GETTEXT int set_gettext_file( const char *filename ); const char *gettext( const char *msgid ); @@ -56,11 +58,11 @@ #endif /* !USE_SIMPLE_GETTEXT */ -#define jnlib_xmalloc(a) gcry_xmalloc( (a) ) -#define jnlib_xcalloc(a,b) gcry_xcalloc( (a), (b) ) -#define jnlib_xrealloc(a,n) gcry_xrealloc( (a), (n) ) -#define jnlib_xstrdup(a) gcry_xstrdup( (a) ) -#define jnlib_free(a) gcry_free( (a) ) +#define jnlib_xmalloc(a) xmalloc( (a) ) +#define jnlib_xcalloc(a,b) xcalloc( (a), (b) ) +#define jnlib_xrealloc(a,n) xrealloc( (a), (n) ) +#define jnlib_xstrdup(a) xstrdup( (a) ) +#define jnlib_free(a) free( (a) ) #define jnlib_log_debug log_debug #define jnlib_log_info log_info @@ -70,6 +72,4 @@ #endif /*LIBJNUTIL_CONFIG_H*/ - - -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From jsogo at debian.org Sun Feb 10 01:35:02 2002 From: jsogo at debian.org (Jose Carlos Garcia Sogo) Date: Tue Oct 7 21:28:34 2003 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020209214306.GB1387@212.23.136.22> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> Message-ID: <20020210003327.GA31140@jaimedelamo.eu.org> El Sat, Feb 09, 2002 at 10:43:06PM +0100, Marcus Brinkmann escrib?a: > On Sat, Feb 09, 2002 at 03:41:04PM +0100, Jose Carlos Garcia Sogo wrote: > > I was trying to compile latest GPGME 0.3.1, but I have seen that > > jnlib_config.h includes gcrypt.h, which is not available in the GPGME > > tarball, and I guess it's part of libgcrypt. > [snip] > > Thanks for spotting it! You can fix it by going back to the old version of > the file, but I will also upload a gpgme 0.3.2. But I will wait until > tomorrow, in case you find another bug. It builds fine now. I'll wait to version 0.3.2 to upload it to Debian. Thank you. Jose Carlos Garcia Sogo jsogo@debian.org -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available Url : /pipermail/attachments/20020210/403c1d31/attachment.bin From Katie19 at aol.com Sun Feb 10 09:07:01 2002 From: Katie19 at aol.com (Katie19@aol.com) Date: Tue Oct 7 21:28:34 2003 Subject: Free Trial Membership Message-ID: <200202100751.XAA01350@web66.fenzi.com> Below is the result of your feedback form. It was submitted by (Katie19@aol.com) on Saturday, February 9, 2002 at 23:51:16 --------------------------------------------------------------------------- ::
Just as a new version is getting ready to come out, the Macverse is up to 0.3.0 of GPGME. The wrappers have some improvements in the API, better documentation, and such. Also, it should work with GNUStep. You can find more info at: http://macgpg.sourceforge.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From Marcus.Brinkmann at ruhr-uni-bochum.de Sun Feb 10 15:00:02 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:34 2003 Subject: GPGME/jnlib includes gcrypt.h In-Reply-To: <20020210003327.GA31140@jaimedelamo.eu.org> References: <20020209144104.GB2706@jaimedelamo.eu.org> <20020209214306.GB1387@212.23.136.22> <20020210003327.GA31140@jaimedelamo.eu.org> Message-ID: <20020210135752.GD696@212.23.136.22> On Sun, Feb 10, 2002 at 01:33:27AM +0100, Jose Carlos Garcia Sogo wrote: > It builds fine now. I'll wait to version 0.3.2 to upload it to > Debian. Thanks, I have uploaded 0.3.2. My announcement is stuck because of moderation, though. Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From wk at gnupg.org Sun Feb 10 18:38:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:34 2003 Subject: GnuPG PRNG insecure? In-Reply-To: (Len Sassaman's message of "Fri, 8 Feb 2002 17:18:17 -0800 (PST)") References: Message-ID: <87heopkzr9.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 17:18:17 -0800 (PST), Len Sassaman said: > Exactly. Open source developers who expect free audits of their code > simply because it is open are going to be disappointed, especially if they However a lot of people try to sell this as the advantage of Free Software but the only evidence I have ever saw are counter examples. > The reasons why source code must be available (from a security auditing > perspective) are a) that a user can commission an audit if he wishes, and > b) he is assured that the code he just had audited is the real deal, and 100% agreed. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk at gnupg.org Sun Feb 10 18:48:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:34 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208144156.GD678@akamai.com> (David Shaw's message of "Fri, 8 Feb 2002 09:41:56 -0500") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> Message-ID: <87d6zdkzc4.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > I'd be willing to throw some money into a pot for people who find > security-related bugs in GnuPG. The main problem is that it needs expierenced programmers to find the non trivial bugs. Those programmers are usually writing new code or fixing old one and don't have the time to screen other programs and it is not so interesting to do audits - especially not on a unpaid or low paid basis. So I don't believe that a little bit money will help. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk at gnupg.org Sun Feb 10 18:50:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:34 2003 Subject: GnuPG PRNG insecure? In-Reply-To: (Simon Josefsson's message of "Fri, 08 Feb 2002 20:04:58 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> Message-ID: <878za1kz7j.fsf@alberti.gnupg.de> On Fri, 08 Feb 2002 20:04:58 +0100, Simon Josefsson said: > Makes you wonder if this code was simply copied from PGP? What about > license etc? *a++ = *b++ is quite a common construct in C as well as *a++ ^= *b++ The random code used by GnuPG is entirely different from the one in PGP. I wrote from the description in Peter's paper. -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From mb at g10code.de Sun Feb 10 21:04:03 2002 From: mb at g10code.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:34 2003 Subject: [Announce] GPGME 0.3.2 released Message-ID: <20020210135606.GB696@212.23.136.22> We are pleased to announce version 0.3.2 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 579 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.2.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 9cb02a8c4c70bb291ea002e25eb8dd30 gpgme-0.3.1-0.3.2.diff.gz 987838060829be0235abc4f430cf6cd3 gpgme-0.3.1-0.3.2.diff.gz.sig a3d208a615ccbbc9ce1e31ee7f2f5fc3 gpgme-0.3.2.tar.gz f2b2f839ea4e2f15a2cbd4fafc3dbf6c gpgme-0.3.2.tar.gz.sig Noteworthy changes in version 0.3.2 (2002-02-10) ------------------------------------------------ * Remove erroneous dependency on libgcrypt in jnlib. This is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From Marcus.Brinkmann at ruhr-uni-bochum.de Sun Feb 10 21:06:04 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:34 2003 Subject: [Announce] GPGME 0.3.1 released Message-ID: <20020209020628.GE3429@212.23.136.22> We are pleased to announce version 0.3.1 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 577 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.1.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are aa8f7033ac316458e100d3716ea7133b gpgme-0.3.1.tar.gz 518da3712aeeb10e5aeff7c02878c10c gpgme-0.3.1.tar.gz.sig 4cf626a2fd200b673e07e6de5979bedf gpgme-0.3.0-0.3.1.diff.gz 09e30e80bd5f834525ca65458c8b9db7 gpgme-0.3.0-0.3.1.diff.gz.sig Noteworthy changes in version 0.3.1 (2002-02-09) ------------------------------------------------ * There is a Texinfo manual documenting the API. * The gpgme_set_keylist_mode function returns an error, and changed its meaning. It is no longer usable to select between normal and fast mode (newer versions of GnuPG will always be fast), but selects between local keyring, remote keyserver, or both. For this, two new macros are defined, GPGME_KEYLIST_MODE_LOCAL and GPGME_KEYLIST_MODE_EXTERN. To make it possible to modify the current setting, a fucntion gpgme_get_keylist_mode was added to retrieve the current mode. * gpgme_wait accepts a new argument STATUS to return the error status of the operation on the context. Its definition is closer to waitpid() now than before. * The LENGTH argument to gpgme_data_new_from_filepart changed its type from off_t to the unsigned size_t. * The R_HD argument to the GpgmePassphraseCb type changed its type from void* to void**. * New interface gpgme_op_trustlist_end() to match gpgme_op_keylist_end(). * The CryptPlug modules have been renamed to gpgme-openpgp and gpgme-smime, and they are installed in pkglibdir by `make install'. * An idle function can be registered with gpgme_register_idle(). * The GpgSM backend supports key generation with gpgme_op_genkey(). * Interface changes relative to the 0.3.0 release: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gpgme_data_new_from_filepart CHANGED: Type of LENGTH is size_t. GpgmePassphraseCb CHANGED: Type of R_HD is void **. gpgme_wait CHANGED: New argument STATUS. gpgme_set_keylist_mode CHANGED: Type of return value is GpgmeError. The function has a new meaning! gpgme_get_keylist_mode NEW GPGME_KEYLIST_MODE_LOCAL NEW GPGME_KEYLIST_MODE_EXTERN NEW gpgme_op_trustlist_next NEW GpgmeIdleFunc NEW gpgme_register_idle NEW ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From wk at gnupg.org Sun Feb 10 22:06:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:34 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020208233946.A16027@harry.cs.tu-berlin.de> (Stefan Keller's message of "Fri, 8 Feb 2002 23:39:46 +0100") References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <20020208233946.A16027@harry.cs.tu-berlin.de> Message-ID: <87n0yh2grw.fsf@alberti.gnupg.de> On Fri, 8 Feb 2002 23:39:46 +0100, Stefan Keller said: > As I explained, on non /dev/random (or equivalent) systems there are often *much* > more bytes put into the pool than requested. As soon as 2*POOLSIZE bytes have > been put into the pool, the entropy collected with the first POOLSIZE bytes is Okay, I did some tests on GNU/Linux (i383) to see how othen a mix_pool is done. For all relevant cases a mix is done not later than when ~65% of the buffer is filled; this carries more than 212 bytes state from one mix to the next. The usual case are mixes after 88 bytes right after a fast poll. But yes, the missing XOR is a serious bug which should be fixed in libgcrypt as ASAP because there we don't have a one-shot use of the application but might use the RNG under entirely different conditions. To make the implementaion more robust I will also carry a hash from the entrire pool between mixes. Thanks again, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From info at nakawe.se Mon Feb 11 10:16:01 2002 From: info at nakawe.se (Veronica Loell) Date: Tue Oct 7 21:28:35 2003 Subject: generate keys on win2k prof Message-ID: Hello, When I try to generate a key (using winpt) I get an access violation and gpg is shut down by windows. I have searched the mailing list archives etc but not found any clues to what might be the problem. I am using gpg 1.0.6 and win2k 5.00.2195 sp2 Just in case there is any information in the log file I'm enclosing it at the end of this message. Might there be some installation settings that I have not done? I have looked for information about that but not found any. I am not a memebr of this list so if there is someone that has an idea I would appreciate a cc. Thanks. Veronica Loell --------------------- logfile: --------------------- Application exception occurred: App: (pid=1092) When: 2002-02-11 @ 09:58:23.748 Exception number: c0000005 (access violation) *----> System Information <----* Computer Name: NAKAWE-PII-266 User Name: Administrator Number of Processors: 1 Processor Type: x86 Family 6 Model 3 Stepping 3 Windows 2000 Version: 5.0 Current Build: 2195 Service Pack: 2 Current Type: Uniprocessor Free Registered Organization: Nakawe data Registered Owner: Veronica Loell State Dump for Thread Id 0x508 eax=a5a5a5a5 ebx=00000000 ecx=a5a5a5a5 edx=00000002 esi=024b0028 edi=c0000005 eip=77df9877 esp=0248ec64 ebp=0248ee28 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246 function: 77df984a 399de0feffff cmp [ebp+0xfffffee0],ebx ss:0248ed08=a5a5a5a5 77df9850 7419 jz 77dffc6b 77df9852 64a118000000 mov eax,fs:[00000018] fs:00000018=???????? 77df9858 ffb5acfeffff push dword ptr [ebp+0xfffffeac] ss:0248ecd4=a5a5a5a5 77df985e 53 push ebx 77df985f 8b4030 mov eax,[eax+0x30] ds:a6947b77=???????? 77df9862 ff7018 push dword ptr [eax+0x18] ds:a6947b77=???????? 77df9865 ff150813db77 call dword ptr [77db1308] ds:77db1308=77fcb633 77df986b 8b8d04ffffff mov ecx,[ebp+0xffffff04] ss:0248ed2c=a5a5a5a5 77df9871 8b85e4feffff mov eax,[ebp+0xfffffee4] ss:0248ed0c=a5a5a5a5 FAULT ->77df9877 01481c add [eax+0x1c],ecx ds:a6947b77=???????? 77df987a 3bfb cmp edi,ebx 77df987c 0f8452010000 je 77df99d4 77df9882 399d0cffffff cmp [ebp+0xffffff0c],ebx ss:0248ed34=00000001 77df9888 7510 jnz 77e0199a 77df988a 81ffea000000 cmp edi,0xea 77df9890 745d jz 77e019ef 77df9892 81ff02010000 cmp edi,0x102 77df9898 7455 jz 77e01bef 77df989a 833d301fe07701 cmp dword ptr [77e01f30],0x1 ds:77e01f30=00000001 77df98a1 7c3e jl 77e021e1 77df98a3 89bd68ffffff mov [ebp+0xffffff68],edi ss:0248ed90=a5a5a5a5 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0248EE28 77DF7CC8 0248F164 00000000 7FFDEBF8 0248F2F0 advapi32! 0248F1B0 77DB8523 80000004 7FFDEBF8 00000000 0248F2E8 advapi32! 0248F288 77DB8B63 80000004 7FFDEBF8 0248F2E8 024F2008 advapi32!RegCloseKey 0248F2E0 004675C8 80000004 004671EC 00018000 00000000 advapi32!RegQueryValueExA 0248F3D0 00467829 00459F14 00000003 024D9E01 0046AE8B ! 0248F4A0 0045A10A 00459F14 00000003 0000012C 00000002 ! 0248F4D0 00459D49 00000003 0000012C 00000002 0046BE05 ! 0248F500 00459519 02497AD0 00000014 00000002 0046BD78 ! 0248F540 0045A81B 000000A0 00000002 00000001 02491378 ! 0248F580 0045AC3A 0248F5B0 00000400 0248F63C 00000000 ! 0248F5D0 00447384 00000011 00000400 0248F640 0248F63C ! 0248F600 0043FA21 00000011 00000400 0248F640 0248F63C ! 0248F660 00441827 00000400 024B0FD0 024B0398 02497870 ! 0248F6A0 00442FF3 00000011 00000400 024B0FD0 024B0398 ! 0248F750 00441EDC 024B4000 0248F7E0 00000008 74FC3CC0 ! 0248F790 0044265F 024B4000 00441F4D 0248F7E0 0248F948 ! 0248FCD0 004427B4 00441F4D 02496508 02496508 00402DF9 ! 0248FE00 0040606C 00000000 00000000 00000000 004034A3 ! 0248FF90 00401074 00000000 02492D7C 02495A80 0040105A ! 0248FFC0 77E97D08 0012E34C 00000002 7FFDF000 C0000005 ! 0248FFF0 00000000 00401044 00000000 000000C8 00000100 kernel32!CreateProcessW *----> Raw Stack Dump <----* 0248ec64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec84 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ec94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248eca4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecb4 a5 a5 a5 a5 a5 a5 a5 a5 - 05 00 00 c0 a5 a5 a5 a5 ................ 0248ecc4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecd4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ece4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ecf4 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed04 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed14 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed24 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed34 01 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed44 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed54 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed64 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed74 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed84 00 00 00 00 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ 0248ed94 a5 a5 a5 a5 a5 a5 a5 a5 - a5 a5 a5 a5 a5 a5 a5 a5 ................ State Dump for Thread Id 0x608 eax=000001ec ebx=00007530 ecx=024b0f20 edx=00000000 esi=00000000 edi=00000000 eip=77f82837 esp=0714febc ebp=0714fee4 iopl=0 nv up ei ng nz ac po cy cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000297 function: NtRemoveIoCompletion 77f8282c b8a8000000 mov eax,0xa8 77f82831 8d542404 lea edx,[esp+0x4] ss:0803d48f=???????? 77f82835 cd2e int 2e 77f82837 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0714FEE4 77D470E6 00000074 0714FF1C 0714FF0C 0714FF14 ntdll!NtRemoveIoCompletion 0714FF20 77D5D195 00007530 0714FF60 0714FF5C 0714FF70 rpcrt4!I_RpcSetServerContextList 0714FF74 77D5D074 77D50D7F 0249CB58 00000008 0248E70C rpcrt4!NdrComplexArrayFree 0714FFA8 77D50C7A 024B5F98 0714FFEC 77E8758A 024B0F20 rpcrt4!NdrComplexArrayFree 0714FFB4 77E8758A 024B0F20 00000008 0248E70C 024B0F20 rpcrt4!RpcBindingSetOption 0714FFEC 00000000 00000000 00000000 00000000 00000000 kernel32!SetFilePointer State Dump for Thread Id 0x300 eax=778321fe ebx=00000003 ecx=77db0260 edx=00000000 esi=77f8281e edi=00000003 eip=77f82829 esp=094afd24 ebp=094afd70 iopl=0 nv up ei pl zr na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000246 function: NtWaitForMultipleObjects 77f8281e b8e9000000 mov eax,0xe9 77f82823 8d542404 lea edx,[esp+0x4] ss:0a39d2f7=???????? 77f82827 cd2e int 2e 77f82829 c21400 ret 0x14 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 094AFD70 77E86E1A 094AFD48 00000001 00000000 00000000 ntdll!NtWaitForMultipleObjects 094AFFB4 77E8758A 00000004 00000000 000B000A 024BEC60 kernel32!WaitForMultipleObjects 094AFFEC 00000000 778321FE 024BEC60 00000000 000000C8 kernel32!SetFilePointer *----> Raw Stack Dump <----* 094afd24 da 6d e8 77 03 00 00 00 - 48 fd 4a 09 01 00 00 00 .m.w....H.J..... 094afd34 00 00 00 00 00 00 00 00 - 00 00 00 00 60 ec 4b 02 ............`.K. 094afd44 01 00 00 00 08 03 00 00 - 0c 03 00 00 1c 03 00 00 ................ 094afd54 67 63 63 20 61 63 63 65 - 70 74 73 20 2d 67 2e 2e gcc accepts -g.. 094afd64 2e 20 79 65 73 0a 63 68 - 65 63 6b 69 b4 ff 4a 09 . yes.checki..J. 094afd74 1a 6e e8 77 48 fd 4a 09 - 01 00 00 00 00 00 00 00 .n.wH.J......... 094afd84 00 00 00 00 00 00 00 00 - b2 22 83 77 03 00 00 00 .........".w.... 094afd94 b0 fe 4a 09 00 00 00 00 - ff ff ff ff 60 ec 4b 02 ..J.........`.K. 094afda4 0a 00 0b 00 00 00 00 00 - 58 69 7a 65 64 20 49 53 ........Xized IS 094afdb4 43 2e 2e 2e 00 00 00 00 - 00 00 00 00 38 00 00 00 C...........8... 094afdc4 23 00 00 00 23 00 00 00 - 00 00 00 00 0a 00 0b 00 #...#........... 094afdd4 60 ec 4b 02 c8 43 f8 77 - 60 02 db 77 fe 21 83 77 `.K..C.w`..w.!.w 094afde4 00 00 00 00 32 75 e8 77 - 1b 00 00 00 00 02 00 00 ....2u.w........ 094afdf4 fc ff 4a 09 23 00 00 00 - 6e 2f 69 6e 73 74 61 6c ..J.#...n/instal 094afe04 6c 20 2d 63 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f l -c.checking fo 094afe14 72 20 6d 61 77 6b 2e 2e - 2e 20 6e 6f 0a 63 68 65 r mawk... no.che 094afe24 63 6b 69 6e 67 20 66 6f - 72 20 67 61 77 6b 2e 2e cking for gawk.. 094afe34 2e 20 6e 6f 0a 63 68 65 - 63 6b 69 6e 67 20 66 6f . no.checking fo 094afe44 72 20 6e 61 77 6b 2e 2e - 2e 20 6e 61 77 6b 0a 63 r nawk... nawk.c 094afe54 68 65 63 6b 69 6e 67 20 - 66 6f 72 20 64 6f 63 62 hecking for docb State Dump for Thread Id 0x410 eax=77df9d61 ebx=00000102 ecx=024b62c0 edx=00000000 esi=77f827dd edi=00000000 eip=77f827e8 esp=0b50ff88 ebp=0b50ffb4 iopl=0 nv up ei ng nz na po nc cs=001b ss=0023 ds=0023 es=0023 fs=0038 gs=0000 efl=00000286 function: NtWaitForSingleObject 77f827dd b8ea000000 mov eax,0xea 77f827e2 8d542404 lea edx,[esp+0x4] ss:0c3fd55b=???????? 77f827e6 cd2e int 2e 77f827e8 c20c00 ret 0xc 77f827eb 8b4124 mov eax,[ecx+0x24] ds:033a3892=???????? 77f827ee 39420c cmp [edx+0xc],eax ds:00eed5d2=???????? 77f827f1 0f85c9100000 jne NtQueryDefaultLocale+0x115 (77f838c0) 77f827f7 ff4208 inc dword ptr [edx+0x8] ds:00eed5d2=???????? 77f827fa 33c0 xor eax,eax 77f827fc c20400 ret 0x4 77f827ff 90 nop 77f82800 ff4a04 dec dword ptr [edx+0x4] ds:00eed5d2=???????? 77f82803 c20400 ret 0x4 *----> Stack Back Trace <----* FramePtr ReturnAd Param#1 Param#2 Param#3 Param#4 Function Name 0B50FFB4 77E8758A 00000000 00000001 024B0880 00000000 ntdll!NtWaitForSingleObject 0B50FFEC 00000000 77DF9D61 00000000 00000000 00000000 kernel32 From webmaster at dialtalks.com Tue Feb 12 21:47:02 2002 From: webmaster at dialtalks.com (´ÙÀ̾óÅå) Date: Tue Oct 7 21:28:35 2003 Subject: [È«º¸] ¿¥ÇǾ²¸® Ç÷¹À̾ ¹«·á·Î µå¸³´Ï´Ù Message-ID: An HTML attachment was scrubbed... URL: /pipermail/attachments/20020212/c410b5e2/attachment.htm From Marcus.Brinkmann at ruhr-uni-bochum.de Wed Feb 13 01:58:04 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:35 2003 Subject: [Announce] GPGME 0.3.3 released Message-ID: <20020212231844.GW705@212.23.136.22> We are pleased to announce version 0.3.3 of GnuPG Made Easy, a library designed to make access to GnuPG easier for applications. It may be found in the file (about 576 KB compressed) ftp://ftp.gnupg.org/gcrypt/alpha/gpgme/gpgme-0.3.3.tar.gz. It should soon appear on the mirrors listed at http://www.gnupg.org/mirrors.html. Bug reports and requests for assistance should be sent to gnupg-devel@gnu.org. The md5sum checksums for this distibution are 93cf2a873d7fcb23cc0ec0ec27d5235e gpgme-0.3.2-0.3.3.diff.gz.sig 94d9081fc72958b2c5ce6378fab64375 gpgme-0.3.3.tar.gz.sig 6e1e8254b3742bd71db880cb84f7b00f gpgme-0.3.2-0.3.3.diff.gz 4b012ab44b320096253559b04147b7d4 gpgme-0.3.3.tar.gz Noteworthy changes in version 0.3.3 (2002-02-12) ------------------------------------------------ * Fix the Makefile in jnlib. * Fix the test suite (hopefully). It should clean up all its state with `make check' now. As version 0.3.2, this is a bug fix release. Please also read the Noteworthy changes in version 0.3.1 (2002-02-09). Marcus Brinkmann mb@g10code.de _______________________________________________ Gnupg-announce mailing list Gnupg-announce@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-announce From stephane at sente.ch Thu Feb 14 11:31:01 2002 From: stephane at sente.ch (Stephane Corthesy) Date: Tue Oct 7 21:28:35 2003 Subject: gpgme key listing slowness question Message-ID: Hi, As I complainted sometime ago, gpgme key listing operations are very slow. Werner replied, the slowness is in fact due to gpg, but... I saw that gpg is invoked with the following arguments: gpg --batch --comment --status-fd 2 --no-tty --verbose --with-colons --fixed-list-mode --with-fingerprint --list-keys -- The argument which makes the operation so slow is the --verbose: wouldn't it be possible to get rid of this --verbose argument? Of course, we'd loose information about the web-of-trust, but if you simply want a list of all available keys, you don't care yet about the web-of-trust. You ask these informations once you've selected the keys you need. BTW, in previous version of gpgme there was a fast listing mode, which enabled the --no-expensive-trust-checks option; the option is no longer used now, though it was mentionned that all key listing operations are in fast mode now. Is it correct? Stephane From wk at gnupg.org Thu Feb 14 11:56:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:35 2003 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 11:28:42 +0100") References: Message-ID: <87lmdwuyj3.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > Hi, > As I complainted sometime ago, gpgme key listing operations are very > slow. Werner replied, the slowness is in fact due to gpg, but... Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? It is worth to try. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From wk at gnupg.org Thu Feb 14 12:24:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:35 2003 Subject: Yet another problem with trust in 1.0.6c In-Reply-To: (Janusz A. Urbanowicz's message of "Sun, 6 Jan 2002 02:02:49 +0100 (CET)") References: Message-ID: <87eljoux8j.fsf@alberti.gnupg.de> On Sun, 6 Jan 2002 02:02:49 +0100 (CET), Janusz A Urbanowicz said: > Summary: for some encrypted and signed messages gpg in interactive mode > skips trust value check and reports the signature as fully valid, while in > batch mode the signature is reported as untrusted. Example: Ooops. Really strange code but simple to fix. This also fixes the other problem you reported. I think the problem with the trust calculation you reported for 1.0.6b has been fixed. Right? Thanks, Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From stephane at sente.ch Thu Feb 14 12:44:01 2002 From: stephane at sente.ch (Stephane Corthesy) Date: Tue Oct 7 21:28:35 2003 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of"Thu, 14 Feb 2002 11:28:42 +0100") Message-ID: > On Thu, 14 Feb 2002 11:28:42 +0100, Stephane Corthesy said: > > > Hi, > > As I complainted sometime ago, gpgme key listing operations are very > > slow. Werner replied, the slowness is in fact due to gpg, but... > > Did you try gpg 1.0.6c and did you do a --rebuild-keydb-caches? > It is worth to try. > > Werner No, I didn't. I use the official 1.0.6, and will continue until 1.0.7 is out (when?). If I list keys in my key ring with --verbose, it takes 50 seconds; if I don't use --verbose, it takes only... 5 seconds. Do you experiment such a gain with 1.0.6c? Stephane From wk at gnupg.org Thu Feb 14 13:46:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:35 2003 Subject: gpgme key listing slowness question In-Reply-To: (Stephane Corthesy's message of "Thu, 14 Feb 2002 12:41:53 +0100") References: Message-ID: <874rkkutgr.fsf@alberti.gnupg.de> On Thu, 14 Feb 2002 12:41:53 +0100, Stephane Corthesy said: > No, I didn't. I use the official 1.0.6, and will continue until > 1.0.7 is out (when?). Good question. I try to make a 1.0.6d this week. > If I list keys in my key ring with --verbose, it takes 50 seconds; > if I don't use --verbose, it takes only... 5 seconds. Do you > experiment such a gain with 1.0.6c? Ah yes. --verbose does also list all signatures and resolving the names is time consuming. As we currently ignore the key signature lines it does not make sense to use this option. I have just commited the fix to gpgme. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From dshaw at jabberwocky.com Thu Feb 14 20:40:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:35 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <87d6zdkzc4.fsf@alberti.gnupg.de> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> Message-ID: <20020214193802.GB681@akamai.com> On Sun, Feb 10, 2002 at 06:42:51PM +0100, Werner Koch wrote: > On Fri, 8 Feb 2002 09:41:56 -0500, David Shaw said: > > > I'd be willing to throw some money into a pot for people who find > > security-related bugs in GnuPG. > > The main problem is that it needs expierenced programmers to find the > non trivial bugs. Those programmers are usually writing new code or > fixing old one and don't have the time to screen other programs and it > is not so interesting to do audits - especially not on a unpaid or low > paid basis. So I don't believe that a little bit money will help. Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms of auditing, a little bit of money doesn't help, but if 20 people all throw in a little bit of money... David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bwpearre at mit.edu Thu Feb 14 21:27:02 2002 From: bwpearre at mit.edu (Ben Pearre) Date: Tue Oct 7 21:28:35 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214193802.GB681@akamai.com> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> Message-ID: <20020214202519.GG10905@diverge.seunglab.mit.edu> > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > of auditing, a little bit of money doesn't help, but if 20 people all > throw in a little bit of money... Money? Pshaw. Credit! There could be a command-line option --list-contributors or some such, which makes it trivial to see who has helped with the program. "...and the daring souls who found security flaws in the code:..." The key is being able to say during a job interview (OK, how many interviewers use GPG?) or a hot date (?!) "Run this command and see my name"... and have it take 10 seconds. -- bwpearre@alumni.princeton.edu http://hebb.mit.edu/~ben -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 240 bytes Desc: not available Url : /pipermail/attachments/20020214/ff48df86/attachment.bin From slg at ex.com Fri Feb 15 04:34:01 2002 From: slg at ex.com (Simson Garfinkel) Date: Tue Oct 7 21:28:35 2003 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools Message-ID: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Greetings. I am trying to compile gnupg on MacOS X and am having a big problems. Every time I do a "./configure", I end up with a Makefile that is 0 bytes in length. Is this a known problem? [simsong@localhost gnupg-1.0.4] 313 % ./configure creating cache ./config.cache checking host system type... powerpc-apple-darwin5.2 checking target system type... powerpc-apple-darwin5.2 checking build system type... powerpc-apple-darwin5.2 checking for a BSD compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking whether make sets ${MAKE}... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for working makeinfo... missing checking for mawk... no checking for gawk... no checking for nawk... no checking for awk... awk checking which static random module to use... default checking whether use of /dev/random is requested... yes checking whether use of extensions is requested... yes checking whether assembler modules are requested... yes checking whether memory debugging is requested... no checking whether memory guard is requested... no checking whether included zlib is requested... no checking whether use of capabilities is requested... no checking whether to enable maintainer-specific portions of Makefiles... no checking whether make sets ${MAKE}... (cached) yes checking whether build environment is sane... yes checking for working aclocal... missing checking for working autoconf... found checking for working automake... missing checking for working autoheader... found checking for gcc... gcc checking whether the C compiler (gcc ) works... yes checking whether the C compiler (gcc ) is a cross-compiler... no checking whether we are using GNU C... yes checking whether gcc accepts -g... yes checking how to run the C preprocessor... gcc -E -traditional-cpp checking for POSIXized ISC... no checking for a BSD compatible install... /usr/bin/install -c checking for mawk... (cached) awk checking for docbook-to-man... no checking for faqprog.pl... no configure: warning: *** *** It seems that the faqprog.pl program is not installed; *** however it is only needed if you want to change the FAQ. *** (faqprog.pl should be available at: *** ftp://ftp.gnupg.org/pub/gcrypt/contrib/faqprog.pl ) *** No need to worry about this warning. *** checking for BSD-compatible nm... /usr/bin/nm -p checking command to parse /usr/bin/nm -p output... no checking for _ prefix in compiled symbols... no checking for option to create PIC... none checking how to specify -export-dynamic... checking for ranlib... ranlib checking for ANSI C header files... yes checking for working const... yes checking for inline... inline checking for off_t... yes checking for size_t... yes checking for working alloca.h... no checking for alloca... yes checking for unistd.h... yes checking for getpagesize... yes checking for working mmap... no checking for argz.h... no checking for limits.h... yes checking for locale.h... yes checking for nl_types.h... no checking for malloc.h... no checking for string.h... yes checking for unistd.h... (cached) yes checking for sys/param.h... yes checking for getcwd... yes checking for munmap... yes checking for putenv... yes checking for setenv... yes checking for setlocale... yes checking for strchr... yes checking for strcasecmp... yes checking for strdup... yes checking for __argz_count... no checking for __argz_stringify... no checking for __argz_next... no checking for stpcpy... no checking for LC_MESSAGES... no checking whether NLS is requested... yes checking whether included gettext is requested... no checking for libintl.h... no checking whether catgets can be used... no checking for msgfmt... msgfmt checking for gmsgfmt... msgfmt checking for xgettext... : checking for catalogs to be installed... da de eo es_ES fr id it ja nl pl pt_BR pt_PT ru sv checking for gdbm.h... no checking for gethostbyname in -lnsl... no checking for socket in -lsocket... no checking for gethostbyname in -lnsl... (cached) no checking for dlopen in -ldl... no checking for dlopen... no checking for shl_load in -ldld... no checking for ANSI C header files... (cached) yes checking for unistd.h... (cached) yes checking for langinfo.h... no checking for termio.h... no checking for working const... (cached) yes checking for inline... (cached) inline checking for size_t... (cached) yes checking return type of signal handlers... void checking for sys_siglist declaration in signal.h or unistd.h... yes checking endianess... big checking for byte typedef... no checking for ushort typedef... yes checking for ulong typedef... no checking for u16 typedef... no checking for u32 typedef... no checking size of unsigned short... 2 checking size of unsigned int... 4 checking size of unsigned long... 4 checking size of unsigned long long... 8 checking for vprintf... yes checking for strerror... yes checking for stpcpy... (cached) no checking for strlwr... no checking for stricmp... no checking for tcgetattr... yes checking for rand... yes checking for strtoul... yes checking for mmap... yes checking for memmove... yes checking for gettimeofday... yes checking for getrusage... yes checking for gethrtime... no checking for setrlimit... yes checking for clock_gettime... no checking for memicmp... no checking for atexit... yes checking for raise... yes checking for getpagesize... (cached) yes checking for strftime... yes checking for nl_langinfo... no checking for waitpid... yes checking for wait4... yes checking for sigaction... yes checking for sigprocmask... yes checking for fopen64... no checking for fstat64... no checking for mlock... yes checking whether mlock is broken... yes checking for sys/stat.h... yes checking for unistd.h... (cached) yes checking for direct.h... no checking if mkdir takes one argument... no checking for sys/ipc.h... yes checking for sys/shm.h... yes checking whether IPC_RMID allowes subsequent attaches... no checking whether SHM_LOCK is available... no checking for random device... yes checking for linux/random.h... no checking for random device ioctl... no dynamically linked cipher modules: rndunix rndegd tiger statically linked cipher modules: rndlinux sha1 rmd160 md5 checking for mpi assembler functions... done checking for zlib.h... yes checking for deflateInit2_ in -lz... yes updating cache ./config.cache creating ./config.status creating Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating intl/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating po/Makefile.in sed: 46: conftest.s1: unescaped newline inside substitute pattern creating util/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating mpi/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating cipher/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating g10/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating doc/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating tools/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating zlib/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating checks/Makefile sed: 46: conftest.s1: unescaped newline inside substitute pattern creating config.h linking ./intl/libgettext.h to intl/libintl.h linking ./mpi/powerpc32/mpih-add1.S to mpi/mpih-add1.S linking ./mpi/powerpc32/mpih-mul1.S to mpi/mpih-mul1.S linking ./mpi/powerpc32/mpih-mul2.S to mpi/mpih-mul2.S linking ./mpi/powerpc32/mpih-mul3.S to mpi/mpih-mul3.S linking ./mpi/powerpc32/mpih-lshift.S to mpi/mpih-lshift.S linking ./mpi/powerpc32/mpih-rshift.S to mpi/mpih-rshift.S linking ./mpi/powerpc32/mpih-sub1.S to mpi/mpih-sub1.S linking ./mpi/generic/mpi-asm-defs.h to mpi/mpi-asm-defs.h g10defs.h created [simsong@localhost gnupg-1.0.4] 314 % more Mak Makefile Makefile.am Makefile.in [simsong@localhost gnupg-1.0.4] 314 % more Makefile [simsong@localhost gnupg-1.0.4] 317 % ls -l Makefile -rw-rw-r-- 1 simsong staff 0 Feb 14 18:15 Makefile [simsong@localhost gnupg-1.0.4] 318 % From rguerra at yahoo.com Fri Feb 15 04:53:01 2002 From: rguerra at yahoo.com (Robert Guerra) Date: Tue Oct 7 21:28:35 2003 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> References: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <1041280.1013727062@[192.168.1.101]> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Simson: There are some specific patches that have to be made to get GNUPG to compile on OS X.. It's all detailed on the mac GPG page at: http://macgpg.sourceforge.net/ regards, Robert - --- Robert Guerra Privaterra - Securing Human Rights A project of Computer Professionals for Social Responsibility (CPSR) - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile that > is 0 bytes in length. > > Is this a known problem? > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (Darwin) Comment: For info see http://www.gnupg.org iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 WtWVsQ4tOmQP1I2VnM5ld9M= =LoGh -----END PGP SIGNATURE----- From redbird at rbisland.cx Fri Feb 15 05:14:01 2002 From: redbird at rbisland.cx (Gordon Worley) Date: Tue Oct 7 21:28:35 2003 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <0B4D7A8E-21A1-11D6-B6C6-00039303C716@ex.com> Message-ID: <12BB6722-21CA-11D6-89AD-000A27B4DEFC@rbisland.cx> On Thursday, February 14, 2002, at 06:17 PM, Simson Garfinkel wrote: > Greetings. I am trying to compile gnupg on MacOS X and am having a big > problems. Every time I do a "./configure", I end up with a Makefile > that is 0 bytes in length. > > Is this a known problem? So well known that we have a whole project devoted to porting it (and doing the GUI thing to make GnuPG accessible to the average Mac user). http://macgpg.sf.net/ -- Gordon Worley `When I use a word,' Humpty Dumpty http://www.rbisland.cx/ said, `it means just what I choose redbird@rbisland.cx it to mean--neither more nor less.' PGP: 0xBBD3B003 --Lewis Carroll From slg at ex.com Fri Feb 15 13:17:01 2002 From: slg at ex.com (Simson Garfinkel) Date: Tue Oct 7 21:28:36 2003 Subject: problems compiling gnupg-1.0.4 and gnupg-1.0.6 on MacOS X with December Developer Tools In-Reply-To: <1041280.1013727062@[192.168.1.101]> Message-ID: Robert, Thanks so much. Do you guys plan to integrate these patches onto the mainstream release? We're just a few months away from having the number of installed OS X machines being larger than all of the other UNIX platforms combined... -SImson On Thursday, February 14, 2002, at 10:51 PM, Robert Guerra wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Simson: > > > There are some specific patches that have to be made to get GNUPG to > compile on OS X.. > > It's all detailed on the mac GPG page at: > > http://macgpg.sourceforge.net/ > > > regards, > > Robert > > - --- > Robert Guerra > Privaterra - Securing Human Rights > > > A project of Computer Professionals for Social Responsibility (CPSR) > > > > > - --On Thursday, February 14, 2002 6:17 PM -0500 Simson Garfinkel > wrote: > >> Greetings. I am trying to compile gnupg on MacOS X and am having a big >> problems. Every time I do a "./configure", I end up with a Makefile >> that >> is 0 bytes in length. >> >> Is this a known problem? >> >> > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (Darwin) > Comment: For info see http://www.gnupg.org > > iD8DBQE8bIWswp0Kwcyl15IRAkgpAKDJUMljAwmMMnqf3V+1/AixDCsiyQCfd7b8 > WtWVsQ4tOmQP1I2VnM5ld9M= > =LoGh > -----END PGP SIGNATURE----- From foxy at free.fr Fri Feb 15 19:10:02 2002 From: foxy at free.fr (Laurent CHEYLUS) Date: Tue Oct 7 21:28:36 2003 Subject: Format of text and signature for GPGME Message-ID: <3C6D4E89.F4634650@free.fr> Hi, I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I have some problems to verify a "PGP Signed Message" with "gpgme_op_verify" function :-( I have develop a function to extract text and PGP signature from the body of a mail message but when I try to verify this PGP signed message, I have GPGME_SIG_STAT_ERROR status or GPGME_SIG_STAT_BAD (when I have GPG key for sign in my pub keyring) but no GPGME_SIG_STAT_GOOD. My code is : static void gpg_sign_verify(gchar *text, gchar *sign) { GpgmeCtx ctx; GpgmeError err; GpgmeData sig, txt; GpgmeSigStat status; err = gpgme_new (&ctx); fail_if_err (err); gpg_sign_extract(ptr,text,sign); err = gpgme_data_new_from_mem ( &txt, text, strlen (text), 0 ); fail_if_err (err); err = gpgme_data_new_from_mem ( &sig, sign, strlen (sign), 0 ); fail_if_err (err); err = gpgme_op_verify (ctx, sig, txt, &status ); fail_if_err (err); print_sig_stat ( ctx, status ); gpgme_data_release (sig); gpgme_data_release (txt); gpgme_release (ctx); } where ptr is a char* with body of mail message. I think that I have some errors when I read text and sign datas from body. What must be the format for the PGP signed message and cleartext signature, in the "gpgme_op_verify" function ? Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this header must be suppress ? Must the signature begin with "-----BEGIN PGP SIGNATURE-----" and finsih with "-----END PGP SIGNATURE-----" ? Must these lines finish with "\n" or another caracter ? Foxy. From dshaw at jabberwocky.com Fri Feb 15 21:33:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:36 2003 Subject: GnuPG PRNG insecure? In-Reply-To: <20020214202519.GG10905@diverge.seunglab.mit.edu> References: <200202080610.TAA128327@ruru.cs.auckland.ac.nz> <8766589zoj.fsf@alberti.gnupg.de> <20020208144156.GD678@akamai.com> <87d6zdkzc4.fsf@alberti.gnupg.de> <20020214193802.GB681@akamai.com> <20020214202519.GG10905@diverge.seunglab.mit.edu> Message-ID: <20020215203021.GG679@akamai.com> On Thu, Feb 14, 2002 at 03:25:19PM -0500, Ben Pearre wrote: > > Perhaps a cash-for-bugs "bounty" isn't the right thing, but in terms > > of auditing, a little bit of money doesn't help, but if 20 people all > > throw in a little bit of money... > > Money? Pshaw. Credit! There could be a command-line option > --list-contributors or some such, which makes it trivial to see who > has helped with the program. "...and the daring souls who found > security flaws in the code:..." > > The key is being able to say during a job interview (OK, how many > interviewers use GPG?) or a hot date (?!) "Run this command and see my > name"... and have it take 10 seconds. Heh. Good point. It would be far easier than saying "Go look at the AUTHORS file"... :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Bluefire at bluefire.nu Sat Feb 16 16:13:01 2002 From: Bluefire at bluefire.nu (Andreas Agorander) Date: Tue Oct 7 21:28:36 2003 Subject: Two questions about GPGME Message-ID: <200202161516.g1GFGOK32016@mail.space2u.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi! There is some parts of GPG functionality that I haven't found out how to access through GPGME: 1. Looking through the documentation it seems like only detached signatures can be verified by GPGME, is there any possibility to verify a clearsigned message directly, or do I have to "separate" the signature from the message? 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? gpgme_op_decrypt_verify only works for me for such messages, eg. messages I first sign and then encrypt don't get their signatures recognized the same way, and as far as I can see there is no way of doing the combination directly... If this isn't implemented, is it on the TODO? /Andreas Agorander -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8boTUUhUH0wIHC6cRAg6HAJ4wJlKOF5i39jHsC5bGS+MAlLd/0QCg+3k+ 3oyBVGOtvwRShkHLwfzCUKA= =tJXQ -----END PGP SIGNATURE----- From wk at gnupg.org Sun Feb 17 12:38:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:36 2003 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> (Andreas Agorander's message of "Sat, 16 Feb 2002 17:12:04 +0100") References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <87n0y81j9k.fsf@alberti.gnupg.de> On Sat, 16 Feb 2002 17:12:04 +0100, Andreas Agorander said: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? Marcus and I are sitting here on the floor at the F.SDEM and just figured out that there is something missing. > If this isn't implemented, is it on the TODO? Yes, it is important and will be addressed soon. We probably have to change the verify API :-( Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From Marcus.Brinkmann at ruhr-uni-bochum.de Mon Feb 18 15:28:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:36 2003 Subject: Format of text and signature for GPGME In-Reply-To: <3C6D4E89.F4634650@free.fr> References: <3C6D4E89.F4634650@free.fr> Message-ID: <20020218142542.GF801@212.23.136.22> On Fri, Feb 15, 2002 at 07:08:09PM +0100, Laurent CHEYLUS wrote: > I use GPGME library to develop GPG support in Balsa (MUA of Gnome) but I > have some problems to verify a "PGP Signed Message" with > "gpgme_op_verify" function :-( Your problems are very likely the extraction of the correct plain text of the e-mail. You should read the relevant standard (rfc2015) to get all the details how to compose and decompose OpenPGP MIME messages. > My code is : Your code seems to be fine. > What must be the format for the PGP signed message and cleartext > signature, in the "gpgme_op_verify" function ? The same as for gpg on the command line. > Must the text begin with "-----BEGIN PGP SIGNED MESSAGE-----" or this > header must be suppress ? Oha. That is not a MIME message, but an older format. I am not sure we support that in GPGME right now. I could only make it work here by sending the whole body to gpg, but we only support detached format right now. This will be fixed soon, though. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From foxy at free.fr Thu Feb 21 14:42:01 2002 From: foxy at free.fr (Laurent Cheylus) Date: Tue Oct 7 21:28:36 2003 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C74F8BA.520BAAB5@free.fr> Hi, when I use the function "gpgme_op_verify" to verify GPG signature with a text message, I have the status "GPGME_SIG_STAT_GOOD" :-) when the public key for signature is in my keyring. But when I verify a signature and I have not the public key in my keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status with "gpgme_op_verify" ;-( Thx, Foxy. From dongsun2000 at yahoo.co.kr Sat Feb 23 09:32:02 2002 From: dongsun2000 at yahoo.co.kr (»ê¾ÇÀÎŬ·´¼îÇÎ) Date: Tue Oct 7 21:28:36 2003 Subject: [Á¤º¸] ·¹Àú,µî»ê¿ëǰ Àü¹® °øµ¿±¸¸Å »çÀÌÆ®¸¦ ¾Ë·Áµå¸²´Ï´Ù.^^ Message-ID: An HTML attachment was scrubbed... URL: /pipermail/attachments/20020223/8e12760e/attachment.htm From kanglitape at hentaisonic.com Mon Feb 25 07:40:10 2002 From: kanglitape at hentaisonic.com (kanglitape@hentaisonic.com) Date: Tue Oct 7 21:28:36 2003 Subject: sell tansistors and diode Message-ID: HENTAISONIC-TRANSISTOR CO . LTD INTERNATIONAL ELECTRINICS BUILDING YINGBIN ROAD 75 CHANGSHA . P.R. CHINA TEL-0086731-2232933 FAX, 0086731-4429472 MOBILE 1300-7497167 EMAIL: jjwfa@public.cs.hn.cn DEAR SIR WE ARE HENTAISONIC-TRANSISTOR CO. LTD FOUNDED IM 1990 WE HAVE 15 PRODUCTION LINES TO-3, TO-66, TO-3P TO-220, TO-202, TO-126, TO-220F TO-3PML, TO-3PL, TOP-3Fa , TO-3P(I), TO-247, TO-3P MT-100, MT-200 WITH LASER OEM PRINT MARKING. OUR ITEMS COVER 5600 AS FOLLOWS 2N SERIERS 2SA SERIERS 2SB SERIERS 3SC SERIERS 2SD SERIERS BD SERIERS BU/BUD/BUF/BUH/BUL/BUP/BUR/BUS/BUT/BUV/BUW/BUX/BUY SERIERS TIP SERIERS S SERIERS MJ/MJE SERIERS PLEASE SEE OUR WEBSITE www.hentaisonic.com/transistor we are willing to cooperate with you. best regards wangjin -------------- next part -------------- A non-text attachment was scrubbed... Name: audio tape.htm Type: application/octet-stream Size: 2877 bytes Desc: not available Url : /pipermail/attachments/20020225/c37f8805/audiotape.obj -------------- next part -------------- From ktt21c at hananet.net Mon Feb 25 17:46:01 2002 From: ktt21c at hananet.net (Á¶È­À¯¿µ¾î) Date: Tue Oct 7 21:28:36 2003 Subject: [±¤°í]¿µ¾îµµ¹è¿ì°í ¿¥ÇǾ²¸®µµ ¹«·á·Î Message-ID: An HTML attachment was scrubbed... URL: /pipermail/attachments/20020225/a004104d/attachment.htm From Marcus.Brinkmann at ruhr-uni-bochum.de Mon Feb 25 20:09:02 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:36 2003 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C74F8BA.520BAAB5@free.fr> References: <3C74F8BA.520BAAB5@free.fr> Message-ID: <20020225190659.GA2036@212.23.136.22> On Thu, Feb 21, 2002 at 02:40:10PM +0100, Laurent Cheylus wrote: > But when I verify a signature and I have not the public key in my > keyring, I have the status "GPGME_SIG_STAT_ERROR" instead of > "GPGME_SIG_STAT_NOKEY". Is it a bug or I have not understood the status > with "gpgme_op_verify" ;-( Yes, that was a small thing missing in the implementation. Could you please try the following patch if that works for you? Thanks, Marcus 2002-02-25 Marcus Brinkmann * verify.c (_gpgme_verify_status_handler): Parse the args line to see if the problem is due to a missing key, and report that back to the user. Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.21 diff -u -r1.21 verify.c --- verify.c 2002/02/06 01:41:15 1.21 +++ verify.c 2002/02/25 18:49:00 @@ -191,9 +191,14 @@ break; case STATUS_ERRSIG: - ctx->result.verify->status = GPGME_SIG_STAT_ERROR; - /* FIXME: Distinguish between a regular error and a missing key. - This is encoded in the args. */ + /* The return code is the 6th argument, if it is 9, the problem + is a missing key. */ + for (p = args, i = 0; p && i < 5; i++) + p = strchr (p, ' '); + if (p && *(++p) == '9' && *(++p) == '\0') + ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; + else + ctx->result.verify->status = GPGME_SIG_STAT_ERROR; /* Store the keyID in the fpr field. */ p = ctx->result.verify->fpr; for (i = 0; i < DIM(ctx->result.verify->fpr) -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From ddcc at MIT.EDU Tue Feb 26 00:01:01 2002 From: ddcc at MIT.EDU (ddcc@MIT.EDU) Date: Tue Oct 7 21:28:36 2003 Subject: Can GPG decrypt a signed message and preserve the signature? Message-ID: I cannot seem to figure out how to decrypt a signed and encrypted message in such a way that the signature stays attached. I would need such a feature to prove to a third party that the sender actually signed a document, for example. From Marcus.Brinkmann at ruhr-uni-bochum.de Tue Feb 26 01:23:01 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:37 2003 Subject: Two questions about GPGME In-Reply-To: <200202161516.g1GFGOK32016@mail.space2u.com> References: <200202161516.g1GFGOK32016@mail.space2u.com> Message-ID: <20020226002038.GJ2036@212.23.136.22> On Sat, Feb 16, 2002 at 05:12:04PM +0100, Andreas Agorander wrote: > 1. Looking through the documentation it seems like only detached signatures > can be verified by GPGME, is there any possibility to verify a clearsigned > message directly, or do I have to "separate" the signature from the message? As Werner said, this is a priority and will hopefully be done soon (later this week). There are some interface issues to be hashed out. > 2. Is there a way to do the equivalent of 'gpg --sign --encrypt' with GPGME? Now there is :) I just checked in the necessary changes. You can access it with gpgme_op_encrypt_sign and gpgme_op_encrypt_sign_start. I have only done some rudimentary testing, a success report (or bug report ;) would be appreciated. Thanks, Marcus -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From rabbi at quickie.net Tue Feb 26 03:43:02 2002 From: rabbi at quickie.net (Len Sassaman) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? Message-ID: When I try to encrypt to a certain key (I'd redacted its key ID and replaced it with 0x0000010 in the example below), I get the following error message: rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt gpg: loaded digest 2 gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) gpg: loaded digest 1 gpg: 0x00000010: skipped: unusable public key gpg: foo.txt: encryption failed: unusable public key I really don't want to provide the particular key for privacy reasons, but I know that makes debugging hard. Any idea what would trigger this error? Perhaps of use, I'm including the output of --list-packets on the key file below: rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc :public key packet: version 3, algo 1, created 781525938, expires 0 pkey[0]: [1024 bits] pkey[1]: [5 bits] :user ID packet: "Redacted (no email address in UID)" And yes, I have allow-non-selfsigned-uid in my options file. Thoughts? --Len. From j_anderson at uop.edu Tue Feb 26 06:03:02 2002 From: j_anderson at uop.edu (John Anderson) Date: Tue Oct 7 21:28:37 2003 Subject: Java + GnuPG Message-ID: <1014699635.1811.18.camel@ivory> Hi there, I have been thinking of making up a small interface between GnuPG and Java because I want to use something like that in a project I've been toying with. I was unable to find anything like this, other than Cryptix, which doesn't seem to be GPL. I found a thread on this list about problems getting Java and GnuPG to play nice together with IPC and file descriptors and such, so I decided to give it a whirl. The discussion that sparked my coding can be found here: http://lists.gnupg.org/pipermail/gnupg-devel/2002-January/006666.html I came up with a 173 line Java class that can encrypt and decrypt text strings, which can be used quite easily. I will post the code below, so that if anyone is interested they'll be able to play around with it. I look forward to any feedback and suggestions. The pertinent functions in GnuPG are: encrypt(string_to_encrypt, recipient); decrypt(string_to_decrypt, passphrase); getResult(); getError(); The ProcessStreamReader class is there to work as a small thread to gather the text that gpg spits out on its stdout and stderr file descriptors. STDERR seems to be where it puts all status text, and STDOUT is very clean, just giving the encrypted or decrypted text. The decrypt function actually puts the string_to_decrypt into a file in your system specific temporary directory, and then tells gpg to decrypt that file, because I couldn't readily see how to make gpg read both the passphrase and text to decrypt from stdin. I am running JDK 1.4.0, gpg 1.0.6 all on Debian unstable. Thanks, John Anderson PS - This stuff has worked flawlessly the few times I've tried it once completed; I make no gaurantee that it's coded very well because I did it up in a few hours. PGPMSClient.java (A start of my toy project, a GPG-based message system) ---------------- public class PGPMSClient { public static void main(String[] args) { GnuPG gpg = new GnuPG(); gpg.encrypt("The quick brown fox jumped over the lazy dog.\n", "j_anderson@uop.edu\n"); System.out.print(gpg.getResult()); // USE YOUR PASSWORD HERE... gpg.decrypt(gpg.getResult(), "YOUR_PASSWORD_HERE\n"); System.out.print(gpg.getResult()); } } GnuPG.java ---------- /* License: GPL * Author: John Anderson * Description: A small class to encrypt and decrypt text using GnuPG. */ import java.io.*; public class GnuPG { private Process p; private String gpg_result; private String gpg_err; GnuPG() { } public void encrypt(String str, String rcpt) { System.out.print("Encrypting... "); try { p = Runtime.getRuntime().exec("gpg --armor --batch --encrypt -r " + rcpt); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(str); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public void decrypt(String str, String passphrase) { File f = null; try { f = File.createTempFile("gpg-decrypt", null); FileWriter fw = new FileWriter(f); fw.write(str); fw.flush(); } catch(IOException io) { } System.out.print("Decrypting from: " + f.getAbsolutePath()); try { p = Runtime.getRuntime().exec("gpg --passphrase-fd 0 --batch --decrypt " + f.getAbsolutePath()); } catch(IOException io) { System.out.println("Error creating process."); } ProcessStreamReader psr_stdout = new ProcessStreamReader("STDIN", p.getInputStream()); ProcessStreamReader psr_stderr = new ProcessStreamReader("STDERR", p.getErrorStream()); psr_stdout.start(); psr_stderr.start(); BufferedWriter out = new BufferedWriter(new OutputStreamWriter(p.getOutputStream())); try { out.write(passphrase); out.close(); } catch(IOException io) { } try { p.waitFor(); psr_stdout.join(); psr_stderr.join(); } catch(InterruptedException i) { } gpg_result = psr_stdout.getString(); gpg_err = psr_stdout.getString(); System.out.println("Done."); } public String getResult() { return gpg_result; } public String getError() { return gpg_err; } } class ProcessStreamReader extends Thread { String name; StringBuffer stream; InputStreamReader in; final static int BUFFER_SIZE = 256; ProcessStreamReader(String name, InputStream in) { super(); this.name = name; this.in = new InputStreamReader(in); this.stream = new StringBuffer(); } public void run() { try { int read; char[] c = new char[BUFFER_SIZE]; while((read = in.read(c, 0, BUFFER_SIZE - 1)) > 0) { stream.append(c, 0, read); if(read < BUFFER_SIZE - 1) break; } } catch(IOException io) {} } String getString() { return stream.toString(); } } From dshaw at jabberwocky.com Tue Feb 26 06:13:02 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? In-Reply-To: References: Message-ID: <20020226051045.GA1488@akamai.com> On Mon, Feb 25, 2002 at 06:40:49PM -0800, Len Sassaman wrote: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: > > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key > > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? [..] > And yes, I have allow-non-selfsigned-uid in my options file. The problem is the non-selfsigned uid. The allow-non-selfsigned-uid option allows you to import the key (which lets you use it to verify signatures, etc). It doesn't allow you to encrypt to it. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From disastry at saiknes.lv.NO.SPaM.NET Tue Feb 26 08:27:01 2002 From: disastry at saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? Message-ID: <3C7B3719.922EAEDB@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Len Sassaman rabbi@quickie.net wrote: [snip] > I really don't want to provide the particular key for privacy reasons, but but you provided cretion time :-/ I don't think there are a lot of keys generated at the same second. > I know that makes debugging hard. Any idea what would trigger this error? > > Perhaps of use, I'm including the output of --list-packets on the key file > below: > > rabbi@thetis:/usr/home/rabbi$ gpg --list-packets foo.asc > :public key packet: > version 3, algo 1, created 781525938, expires 0 > pkey[0]: [1024 bits] > pkey[1]: [5 bits] > :user ID packet: "Redacted (no email address in UID)" > > > And yes, I have allow-non-selfsigned-uid in my options file. try signing (or lsigning) it. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPHsarDBaTVEuJQxkEQOaSgCcDYg6Xcc6qrkX/bLxpOqiB9r+avAAnjDb I6Uyl9/CudfDHRQEioZqJJHD =44mO -----END PGP SIGNATURE----- From wk at gnupg.org Tue Feb 26 08:59:01 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:37 2003 Subject: Can GPG decrypt a signed message and preserve the signature? In-Reply-To: (ddcc@MIT.EDU's message of "Mon, 25 Feb 2002 17:59:18 -0500 (EST)") References: Message-ID: <87n0xwoeyh.fsf@alberti.gnupg.de> On Mon, 25 Feb 2002 17:59:18 -0500 (EST), ddcc said: > I cannot seem to figure out how to decrypt a signed and encrypted message > in such a way that the signature stays attached. I would need such a > feature to prove to a third party that the sender actually signed a The suggested way to do this is by using PGP/MIME in the regular mode; i.e. encapsulating the message in a multipart/signed MIME object and then wrapping this with a multipart/encrypted MIME object. Better MUAs do just this thing. IIRC, there is no instant way to do this with gpg. Well, we could add such an option of course but I can't promise you that this will happen any time soon. Werner -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From alex at bofh.torun.pl Tue Feb 26 12:54:01 2002 From: alex at bofh.torun.pl (Janusz A. Urbanowicz) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? In-Reply-To: from Len Sassaman at "Feb 25, 2002 06:40:49 pm" Message-ID: Len Sassaman wrote/napisa?[a]/schrieb: > When I try to encrypt to a certain key (I'd redacted its key ID and > replaced it with 0x0000010 in the example below), I get the following > error message: > > rabbi@thetis:/usr/home/rabbi$ gpg -vv -r 0x00000010 -e foo.txt > gpg: loaded digest 2 > gpg: /usr/local/lib/gnupg/idea: IDEA ($Revision: 1.9 $) > gpg: loaded digest 1 > gpg: 0x00000010: skipped: unusable public key > gpg: foo.txt: encryption failed: unusable public key > > I really don't want to provide the particular key for privacy reasons, but > I know that makes debugging hard. Any idea what would trigger this error? I got this on various occassions, in most times this is because gpg lacks IDEA support required by the key. Alex -- C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | * ; (_O : +-------------------------------------------------------------+ --+~| ! &~) ? | P?yn?? chc? na Wsch?d, za Suez, gdzie jest dobrem ka?de z?o | l_|/ A ~-=-~ O| Gdzie przykaza? brak dziesi?ciu, a pi? mo?na a? po dno; | | From foxy at free.fr Tue Feb 26 17:08:01 2002 From: foxy at free.fr (Laurent Cheylus) Date: Tue Oct 7 21:28:37 2003 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7BB280.82B87DB9@free.fr> Hi, Marcus Brinkmann wrote : > Yes, that was a small thing missing in the implementation. Could you please try > the following patch if that works for you? Bad news, it does not work for me. I apply the patch on GPGME 0.3.3 sources and compile, but I have always "GPGME_SIG_STAT_ERROR" instead of "GPGME_SIG_STAT_NOKEY" :-( A++ Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From rabbi at quickie.net Tue Feb 26 19:20:01 2002 From: rabbi at quickie.net (Len Sassaman) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? In-Reply-To: <20020226051045.GA1488@akamai.com> Message-ID: On Tue, 26 Feb 2002, David Shaw wrote: > > And yes, I have allow-non-selfsigned-uid in my options file. > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > option allows you to import the key (which lets you use it to verify > signatures, etc). It doesn't allow you to encrypt to it. Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? From dshaw at jabberwocky.com Tue Feb 26 19:30:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? In-Reply-To: References: <20020226051045.GA1488@akamai.com> Message-ID: <20020226182735.GA2277@akamai.com> On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > On Tue, 26 Feb 2002, David Shaw wrote: > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > option allows you to import the key (which lets you use it to verify > > signatures, etc). It doesn't allow you to encrypt to it. > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? It's documented that way ("This only allows the import - key validation will fail and you have to check the validity of the key by other means"). The fact that --always-trust doesn't let you use such a key is certainly broken though :( David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From Marcus.Brinkmann at ruhr-uni-bochum.de Tue Feb 26 23:41:02 2002 From: Marcus.Brinkmann at ruhr-uni-bochum.de (Marcus Brinkmann) Date: Tue Oct 7 21:28:37 2003 Subject: Status with gpgme_op_verify in GPGME In-Reply-To: <3C7BB280.82B87DB9@free.fr> References: <3C7BB280.82B87DB9@free.fr> Message-ID: <20020226223902.GC1100@212.23.136.22> On Tue, Feb 26, 2002 at 05:06:24PM +0100, Laurent Cheylus wrote: > Marcus Brinkmann wrote : > > > Yes, that was a small thing missing in the implementation. Could you please try > > the following patch if that works for you? > > Bad news, it does not work for me. Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I am sorry about that. If you add the below diff on top of the previous diff, it should work. I did some testing now, so I am quite confident. If it doesn't work, I will need more info from you (in particular the output of gpg --status-fd 2 --verify .... and which version you are using). Thanks, Marcus Index: verify.c =================================================================== RCS file: /cvs/gnupg/gpgme/gpgme/verify.c,v retrieving revision 1.22 diff -u -r1.22 verify.c --- verify.c 2002/02/25 19:08:51 1.22 +++ verify.c 2002/02/26 22:39:05 @@ -193,9 +193,14 @@ case STATUS_ERRSIG: /* The return code is the 6th argument, if it is 9, the problem is a missing key. */ - for (p = args, i = 0; p && i < 5; i++) - p = strchr (p, ' '); - if (p && *(++p) == '9' && *(++p) == '\0') + for (p = args, i = 0; p && *p && i < 5; i++) + { + p = strchr (p, ' '); + if (p) + while (*p == ' ') + p++; + } + if (p && *(p++) == '9' && (*p == '\0' || *p == ' ')) ctx->result.verify->status = GPGME_SIG_STAT_NOKEY; else ctx->result.verify->status = GPGME_SIG_STAT_ERROR; -- `Rhubarb is no Egyptian god.' Debian http://www.debian.org brinkmd@debian.org Marcus Brinkmann GNU http://www.gnu.org marcus@gnu.org Marcus.Brinkmann@ruhr-uni-bochum.de http://www.marcus-brinkmann.de From dshaw at jabberwocky.com Wed Feb 27 15:32:02 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:37 2003 Subject: Problems with v3 keys? In-Reply-To: <20020226182735.GA2277@akamai.com> References: <20020226051045.GA1488@akamai.com> <20020226182735.GA2277@akamai.com> Message-ID: <20020227142910.GG677@akamai.com> On Tue, Feb 26, 2002 at 01:27:35PM -0500, David Shaw wrote: > On Tue, Feb 26, 2002 at 10:18:23AM -0800, Len Sassaman wrote: > > On Tue, 26 Feb 2002, David Shaw wrote: > > > > > > And yes, I have allow-non-selfsigned-uid in my options file. > > > > > > The problem is the non-selfsigned uid. The allow-non-selfsigned-uid > > > option allows you to import the key (which lets you use it to verify > > > signatures, etc). It doesn't allow you to encrypt to it. > > > > Ugh. That's broken behavior for allow-non-selfsigned-uid, isn't it? > > It's documented that way ("This only allows the import - key > validation will fail and you have to check the validity of the key by > other means"). > > The fact that --always-trust doesn't let you use such a key is > certainly broken though :( FYI, I just committed a fix for this. You can now use --always-trust to trust a non-selfsigned key. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From foxy at free.fr Wed Feb 27 16:01:02 2002 From: foxy at free.fr (Laurent Cheylus) Date: Tue Oct 7 21:28:37 2003 Subject: Status with gpgme_op_verify in GPGME Message-ID: <3C7CEE0B.E0D734D0@free.fr> Hi, Marcus Brinkmann wrote : > Yes, I made a stupid mistake (I didn't skip the whitespace after looking for it). I > am sorry about that. If you add the below diff on top of the previous diff, it > should work. I did some testing now, so I am quite confident. Good news, your new patch works well with GPGME 0.3.3 sources and GPG 1.0.6. I have now GPGME_SIG_STAT_NOKEY status when I verify a GPG signature and I haven't public key for sign in my keyring. Thanks, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From foxy at free.fr Wed Feb 27 16:01:04 2002 From: foxy at free.fr (Laurent Cheylus) Date: Tue Oct 7 21:28:37 2003 Subject: Modify comments in GPG signature ? Message-ID: <3C7CEF17.8F0DC082@free.fr> Hi, is it possible to modify the lines "Version" and "Comment" in GPG cleartext signature with an option in command "gpg --clearsign" ? I don't want to parse the entire signature to modify these lines :-( Example : ------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Pour information voir http://www.gnupg.org will be -----BEGIN PGP SIGNATURE----- Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) Comment: See http://www.foo.org Thx, Foxy. -- Laurent Cheylus OpenPGP ID 0x5B766EC2 From dshaw at jabberwocky.com Wed Feb 27 16:40:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:37 2003 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> References: <3C7CEF17.8F0DC082@free.fr> Message-ID: <20020227153717.GI677@akamai.com> On Wed, Feb 27, 2002 at 03:37:11PM +0100, Laurent Cheylus wrote: > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? > > I don't want to parse the entire signature to modify these lines :-( > > Example : > ------- > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: Pour information voir http://www.gnupg.org > > will be > > -----BEGIN PGP SIGNATURE----- > Version: Foo MUA with GnuPG v1.0.6 (GNU/Linux) > Comment: See http://www.foo.org "Version" is hardcoded into the program. The most you can do is use --no-version to make it not appear. I suppose you could add one in later if you wanted to. "Comment" is changeable with --comment "this is my comment". David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From alex at bofh.torun.pl Wed Feb 27 17:45:04 2002 From: alex at bofh.torun.pl (Janusz A. Urbanowicz) Date: Tue Oct 7 21:28:38 2003 Subject: Modify comments in GPG signature ? In-Reply-To: <3C7CEF17.8F0DC082@free.fr> from Laurent Cheylus at "Feb 27, 2002 03:37:11 pm" Message-ID: Laurent Cheylus wrote/napisa?[a]/schrieb: [There is text before PGP section.] > Hi, > > is it possible to modify the lines "Version" and "Comment" in GPG > cleartext signature with an option in command "gpg --clearsign" ? have you tried --comment option? Alex -- C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | * ; (_O : +-------------------------------------------------------------+ --+~| ! &~) ? | P?yn?? chc? na Wsch?d, za Suez, gdzie jest dobrem ka?de z?o | l_|/ A ~-=-~ O| Gdzie przykaza? brak dziesi?ciu, a pi? mo?na a? po dno; | | From alex at bofh.torun.pl Wed Feb 27 18:27:01 2002 From: alex at bofh.torun.pl (Janusz A. Urbanowicz) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys Message-ID: Today I tried to export a secret subkey from one GPG installation to another (both run Debian Potato): Subshell:alex@FUCKUP:[~]:7:0:> gpg -a --export-secret-subkeys > subk the 'subk' file bot transferred to another machine, then I ran: Subshell:alex@syjon:[~]:100:> gpg subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Ostrze?enie: u?ywana pami?? nie jest pami?ci? bezpieczn?! [nothing?] Subshell:alex@syjon:[~]:101:> pgpv subk Opening file "Temporary PGP Keyfile" type binary. Copying key file to "/tmp/ptmpUWCevZ", running pgpk to process it... pgpk -a /tmp/ptmpUWCevZ Adding keys: Key ring: '/tmp/ptmpUWCevZ' Type Bits KeyID Created Expires Algorithm Use sec 1024 0x21939169 1997-09-24 ---------- DSS Sign & Encrypt sub 2048 0xA2E48564 1997-09-24 2000-12-30 Diffie-Hellman sub 2048 0x78174410 2000-03-14 ---------- Diffie-Hellman sub 1024 0x7E2E803D 2001-06-28 2003-12-31 Diffie-Hellman uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (notebook) uid Janusz A. Urbanowicz (ICM) uid Janusz A. Urbanowicz (Jabber ID) sec 1024 0x27C81BC9 1994-01-05 ---------- RSA Sign & Encrypt uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz uid Janusz A. Urbanowicz (BOFH) 2 matching keys found First question: why ALL my secret keys in the packet? I supposed only subkeys would go there. Second question: why GPG chokes on it? Subshell:alex@syjon:[~]:106:> gpg --import subk gpg: NOTE: THIS IS A DEVELOPMENT VERSION! gpg: It is only intended for test purposes and should NOT be gpg: used in a production environment or with production keys! gpg: Warning: using insecure memory! gpg: read_block: read error: invalid packet gpg: import from `subk' failed: invalid keyring gpg: Total number processed: 0 Alex -- C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | * ; (_O : +-------------------------------------------------------------+ --+~| ! &~) ? | P?yn?? chc? na Wsch?d, za Suez, gdzie jest dobrem ka?de z?o | l_|/ A ~-=-~ O| Gdzie przykaza? brak dziesi?ciu, a pi? mo?na a? po dno; | | From dshaw at jabberwocky.com Thu Feb 28 05:36:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys In-Reply-To: References: Message-ID: <20020228043302.GB678@akamai.com> On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > First question: why ALL my secret keys in the packet? I supposed only > subkeys would go there. The structure of the secret primary key needs to still be there for various things to work. However, the secret parts of the key are gone. Compare the size of a --export-secret-key vs a --export-secret-subkeys. > Second question: why GPG chokes on it? Judging from the listing you posted, it seems you did --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 keys do not work with --export-secret-subkeys, and in fact cause the resulting file to be unusable. I just committed a fix which makes --export-secret-subkeys ignore v3 keys. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From bobmathews at mindspring.com Thu Feb 28 08:20:01 2002 From: bobmathews at mindspring.com (Bob Mathews) Date: Tue Oct 7 21:28:38 2003 Subject: missing dsa factor Message-ID: <20020228071746.61DA49D1A@cabbit.cat> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've been looking at the factor entries that are stored in the secret ring file, and it seems that there is one missing from DSA keys. When I start with (p-1)/2 and divide off q and the other given factors, I'm still left with a large composite number. In gen_elg_prime(), prime is calculated as: 2 * q * q_factor * factor[0]..factor[n-1] + 1 But when the ret_factors array is populated, it gets: q_factor, factor[1]..factor[n] (It appears that factor[n] will always be NULL.) That leaves q and factor[0] both unknown. This behavior is in 1.0.6c, and doesn't appear to have been fixed in CVS. Should be a trivial fix. if( mode == 1 ) { (*ret_factors)[i++] = mpi_copy( q_factor ); for(; i <= n; i++ ) - (*ret_factors)[i] = mpi_copy( factors[i] ); + (*ret_factors)[i] = mpi_copy( factors[i-1] ); } Since the factors aren't currently used for anything, the missing one shouldn't hurt anything. It'll be disappointing if someone ever wants them for something, though. -bob mathews -----BEGIN PGP SIGNATURE----- Comment: What's this? http://bobmathews.home.mindspring.com/bob/ iD8DBQE8fdiwPgDecCrBEpcRAjYkAJ4lyFOvVCjUXiZO5LZs7tMzaQMe5gCdGfxT orJ8kPU1VcAkKxxtiQ71Dqg= =5Ddq -----END PGP SIGNATURE----- From wk at gnupg.org Thu Feb 28 08:53:02 2002 From: wk at gnupg.org (Werner Koch) Date: Tue Oct 7 21:28:38 2003 Subject: Modify comments in GPG signature ? In-Reply-To: <20020227153717.GI677@akamai.com> (David Shaw's message of "Wed, 27 Feb 2002 10:37:17 -0500") References: <3C7CEF17.8F0DC082@free.fr> <20020227153717.GI677@akamai.com> Message-ID: <87g03m82rn.fsf@alberti.gnupg.de> On Wed, 27 Feb 2002 10:37:17 -0500, David Shaw said: > "Version" is hardcoded into the program. The most you can do is use > --no-version to make it not appear. I suppose you could add one in You can use sed or awk to change these lines. The header lines are not part of the signatures, they are just comments. The actiual signatures starts right behind one emty line (which must be present even if you delete all the header lines). -- Werner Koch Omnis enim res, quae dando non deficit, dum habetur g10 Code GmbH et non datur, nondum habetur, quomodo habenda est. Privacy Solutions -- Augustinus From disastry at saiknes.lv.NO.SPaM.NET Thu Feb 28 11:57:01 2002 From: disastry at saiknes.lv.NO.SPaM.NET (disastry@saiknes.lv.NO.SPaM.NET) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys Message-ID: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > Second question: why GPG chokes on it? > > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. > > I just committed a fix which makes --export-secret-subkeys ignore v3 > keys. > David note that v3 keys also can have subkeys. OpenPGP does not forbid it. I have even seen v3 keys with subkeys. __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH3vIjBaTVEuJQxkEQOL/QCeOITWEz+AtVMSOHNCA+4CLNt6IVQAn3CA oLqCCo5KYmaCVUK8zkXFEFmS =6Xvo -----END PGP SIGNATURE----- From dshaw at jabberwocky.com Thu Feb 28 14:55:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:38 2003 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> References: <3C7E0B5D.25D67550@saiknes.lv.NO.SPaM.NET> Message-ID: <20020228135159.GD678@akamai.com> On Thu, Feb 28, 2002 at 12:50:05PM +0200, disastry@saiknes.lv.NO.SPaM.NET wrote: > David Shaw dshaw@jabberwocky.com wrote: > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > keys. > > David > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > I have even seen v3 keys with subkeys. Are you sure? Section 10.1 ("Transferable Public Keys") says: However, any V4 key may have subkeys, and the subkeys may be encryption-only keys, signature-only keys, or general-purpose keys. That doesn't exactly forbid it, true, but also section 11.1 ("Key structures") does not show subkeys at all in the v3 allowable format which is a stronger statement. We should construct such a key and see if any programs break with it. Where did you see it? Speaking of key versions - I spent some time looking at what versions were permitted with what a while ago and one thing that does seem to be explicitly permitted is v4 keys with v3 subkeys. I did test this and PGP supports it (though this may be accidental support). GnuPG 1.0.6 only partially supports it, but I fixed that in 1.0.7. Florian, this can give you the unchangeable expiration date that you wanted, if you're willing to accept the restrictions (RSA only, etc.) on v3 keys :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From rguerra at yahoo.com Thu Feb 28 15:06:01 2002 From: rguerra at yahoo.com (Robert Guerra) Date: Tue Oct 7 21:28:38 2003 Subject: IP: PGP products from NA a thing of the past... (fwd) Message-ID: <20020228060020.P33188-100000@trout.cpsr.org> ---------- Forwarded message ---------- Date: Thu, 28 Feb 2002 08:25:22 -0500 From: Dave Farber Reply-To: farber@cis.upenn.edu To: ip Subject: IP: PGP products from NA a thing of the past... Which raises a query. Is there a PGP-like system that works well under MAC OS X djf ------ Forwarded Message From: Stan Hanks Date: Wed, 27 Feb 2002 21:54:46 -0800 To: farber@cis.upenn.edu Subject: PGP products from NA a thing of the past... Just got this today. Grim news for those of us depending on supporting corporate Wintel users... > Date: Wed, 27 Feb 2002 15:28:35 -0800 > From: "PGP" > Reply-To: "PGP" > Subject: Important Information regarding PGP Desktop/Wireless Encryption Products > > **************************************************************** > [This message is brought to you as a subscriber to the Network > Associates or PGP websites. To unsubscribe, please follow > the instructions at the bottom of the page.] > **************************************************************** > > > February 26, 2002 > > Dear Valued Customer, > > Since October 11th of last year, we have been diligently searching to fin= d a suitable > buyer for the PGP Desktop/Wireless encryption products in order to provid= e a strong > partner for our customers. This search has not resulted in an appropriate buyer who will > continue to develop and support the products while providing value to exi= sting > customers. Therefore, the decision has been made to place our PGP Desktop/Wireless > encryption products in maintenance mode. > > The support team at Network Associates will continue to honor all support agreements > for existing PGP Desktop/Wireless customers until their date of terminati= on. However, > effective immediately Network Associates will cease new development on th= ese > products, and not sell additional licenses, services and support agreemen= ts. Once > again, we reiterate that we will continue to honor all technical support agreements for > the entire duration of the contract. > > The PGP technology and source code will remain under the control and owne= rship of > Network Associates. Other products that utilize this encryption technolog= y will remain > a part of Network Associates=92 current product portfolio and they will c= ontinue to be > developed in order to meet the security needs of both new and existing Ne= twork > Associates customers. These products currently include McAfee E-Business Server, > McAfee Desktop Firewall and McAfee VPN Client. > > We pledge to you our complete efforts to assist you through this transiti= on, and to > ensure that your experience as a customer remains positive. We continue t= o focus on > delivering to you superior technology and product solutions to help you m= eet your > business needs. Our customers are our most valuable asset, and we look fo= rward to > continuing to work in partnership with you in the future. > > > > Best Regards, > > > Sandra England > Executive Vice President of > Strategic Business Development and Research ------ End of Forwarded Message For archives see: http://www.interesting-people.org/archives/interesting-people/ From alex at bofh.torun.pl Thu Feb 28 15:59:02 2002 From: alex at bofh.torun.pl (Janusz A. Urbanowicz) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys In-Reply-To: <20020228043302.GB678@akamai.com> from David Shaw at "Feb 27, 2002 11:33:02 pm" Message-ID: David Shaw wrote/napisa?[a]/schrieb: > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > First question: why ALL my secret keys in the packet? I supposed only > > subkeys would go there. > > The structure of the secret primary key needs to still be there for > various things to work. However, the secret parts of the key are > gone. Compare the size of a --export-secret-key vs a > --export-secret-subkeys. Ok. But is there a way to export a _single_ subkey? I definitely need such option. Specyfying subkey ID after --export-secret-subkeys exports all subkeys (tested). > > Second question: why GPG chokes on it? > > Judging from the listing you posted, it seems you did > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > keys do not work with --export-secret-subkeys, and in fact cause the > resulting file to be unusable. 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use --export-secret-subkeys without a parameter which, I assumed, would export only subkeys, thus not affecting a legacy v3 key without one. Alex -- C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | * ; (_O : +-------------------------------------------------------------+ --+~| ! &~) ? | P?yn?? chc? na Wsch?d, za Suez, gdzie jest dobrem ka?de z?o | l_|/ A ~-=-~ O| Gdzie przykaza? brak dziesi?ciu, a pi? mo?na a? po dno; | | From dshaw at jabberwocky.com Thu Feb 28 16:44:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys In-Reply-To: References: <20020228043302.GB678@akamai.com> Message-ID: <20020228154123.GF678@akamai.com> On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. One way to do it would be to export the key with all subkeys and then --edit-key and "delkey" the subkeys you don't want. > > > Second question: why GPG chokes on it? > > > > Judging from the listing you posted, it seems you did > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > keys do not work with --export-secret-subkeys, and in fact cause the > > resulting file to be unusable. > > 'I' didn't do --export-secret-subkeys od na v3 key. What I did was to use > --export-secret-subkeys without a parameter which, I assumed, would export > only subkeys, thus not affecting a legacy v3 key without one. That's the way it works now. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From alex at bofh.torun.pl Thu Feb 28 16:49:02 2002 From: alex at bofh.torun.pl (Janusz A. Urbanowicz) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys In-Reply-To: <20020228154123.GF678@akamai.com> from David Shaw at "Feb 28, 2002 10:41:23 am" Message-ID: David Shaw wrote/napisa?[a]/schrieb: > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > David Shaw wrote/napisa?[a]/schrieb: > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > > subkeys would go there. > > > > > > The structure of the secret primary key needs to still be there for > > > various things to work. However, the secret parts of the key are > > > gone. Compare the size of a --export-secret-key vs a > > > --export-secret-subkeys. > > > > Ok. But is there a way to export a _single_ subkey? I definitely need such > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > subkeys (tested). > > The single subkey isn't usable without the primary key (or rather, the > primary key minus the secret parts of the key) attached, so exporting > just a subkey won't really be helpful. One way to do it would be to > export the key with all subkeys and then --edit-key and "delkey" the > subkeys you don't want. By 'single subkey' I mean a secret subkey plus the whole data structure required to maintain it. What I mean (and I would like to be able to) is ability to be able to eport single subkeys (plus the whole stuff needed to handle them) and not all at once. I'm not sure if I'm clear enough here. Alex -- C _-=-_ H| Janusz A. Urbanowicz | ALEX3-RIPE | SF-F Framling | | * ; (_O : +-------------------------------------------------------------+ --+~| ! &~) ? | P?yn?? chc? na Wsch?d, za Suez, gdzie jest dobrem ka?de z?o | l_|/ A ~-=-~ O| Gdzie przykaza? brak dziesi?ciu, a pi? mo?na a? po dno; | | From disastry at saiknes.lv Thu Feb 28 19:55:01 2002 From: disastry at saiknes.lv (disastry@saiknes.lv) Date: Tue Oct 7 21:28:38 2003 Subject: Key version games (was Re: problem with exporting subkeys) Message-ID: <3C7E7C82.ABA0D6AD@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > > David Shaw dshaw@jabberwocky.com wrote: > > > > Second question: why GPG chokes on it? > > > > > > Judging from the listing you posted, it seems you did > > > --export-secret-subkeys on a v3 key (mixed in with your v4 keys). V3 > > > keys do not work with --export-secret-subkeys, and in fact cause the > > > resulting file to be unusable. > > > > > > I just committed a fix which makes --export-secret-subkeys ignore v3 > > > keys. > > > David > > > > note that v3 keys also can have subkeys. OpenPGP does not forbid it. > > I have even seen v3 keys with subkeys. > > Are you sure? yes. at lest I'm sure that such keys do exist. > Section 10.1 ("Transferable Public Keys") says: > > However, any V4 key may have subkeys, and the subkeys may be > encryption-only keys, signature-only keys, or general-purpose keys. > > That doesn't exactly forbid it, true, but also section 11.1 ("Key > structures") does not show subkeys at all in the v3 allowable format > which is a stronger statement. > > We should construct such a key and see if any programs break with it. > Where did you see it? I have one on my keyring, I put it on web page at http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc I don't remember from where I got this key, but I don't think that I generated it myself, because it have passphrase "test" (all may test keys have passphrase "a" or "12345678" :) ) but I also remember seen real (not test) key belonging to some person. I can't find it... it was RSAv3 key with Elgamal subkey. GPG allows (maybe it does not allow now, but at least older versions allowed) to add subkeys to v3 keys. > Speaking of key versions - I spent some time looking at what versions > were permitted with what a while ago and one thing that does seem to > be explicitly permitted is v4 keys with v3 subkeys. I did test this > and PGP supports it (though this may be accidental support). GnuPG > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > Florian, this can give you the unchangeable expiration date that you > wanted, if you're willing to accept the restrictions (RSA only, etc.) > on v3 keys :) > David btw, v3 subkeys are (seems to be) allowed too, section 5.5.2. Public Key Packet Formats "A version 3 public key or public subkey packet contains:" some time ago I did some experiments - added key to other key as subkey, and converted subkey to key :) it worked. test results here http://disastry.dhs.org/pgp/testkeys key subkey tstDSADSA.asc 0xA496AC49 0xCD80EA04 tstDSADSA-sub.asc 0xCD80EA04 tstRSADSA.asc 0x0FD8A43F 0xF3A46303 tstDSADSA-RSA2.asc 0xA496AC49 0x0FD8A43F __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5gFzBaTVEuJQxkEQM2xgCg8DJDWVFeW4uZS80GFWspQ83IEHAAn1/j gBeCC+4Jp6G5C0JbG4V3PkhP =TgR6 -----END PGP SIGNATURE----- From disastry at saiknes.lv Thu Feb 28 20:03:01 2002 From: disastry at saiknes.lv (disastry@saiknes.lv) Date: Tue Oct 7 21:28:38 2003 Subject: problem with exporting subkeys Message-ID: <3C7E7E68.3726253B@saiknes.lv> -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 David Shaw dshaw@jabberwocky.com wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > subkeys would go there. > > > > The structure of the secret primary key needs to still be there for > > various things to work. However, the secret parts of the key are > > gone. Compare the size of a --export-secret-key vs a > > --export-secret-subkeys. > > Ok. But is there a way to export a _single_ subkey? I definitely need such > option. Specyfying subkey ID after --export-secret-subkeys exports all > subkeys (tested). The single subkey isn't usable without the primary key (or rather, the primary key minus the secret parts of the key) attached, so exporting just a subkey won't really be helpful. he did not asked for that. - --export-secret-subkeys exports: pubkey, fake seckey and all subkeys. I think he asked how to export: pubkey, fake seckey and ONE SELECTED subkey. well... beuckup the key, remove unwanted subkeys, do --export-secret-subkeys, restore key fom backup :) besides the single subkey IS usable without the primary key - it can be promoted to key (see my other msg). __ Disastry http://disastry.dhs.org/ http://disastry.dhs.org/pgp <----PGP plugins for Netscape and MDaemon ^----PGP 2.6.3ia-multi05 (supports IDEA, CAST5, BLOWFISH, TWOFISH, AES, 3DES ciphers and MD5, SHA1, RIPEMD160, SHA2 hashes) -----BEGIN PGP SIGNATURE----- Version: Netscape PGP half-Plugin 0.15 by Disastry / PGPsdk v1.7.1 iQA/AwUBPH5h8TBaTVEuJQxkEQOe0QCfXbgjsqrCxIbTSpLcrz+BiXxg2fQAnRZT 1/LzEfMhFsFyOyBRad6sKWmg =C5n4 -----END PGP SIGNATURE----- From dshaw at jabberwocky.com Thu Feb 28 20:16:01 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:39 2003 Subject: Key version games (was Re: problem with exporting subkeys) In-Reply-To: <3C7E7C82.ABA0D6AD@saiknes.lv> References: <3C7E7C82.ABA0D6AD@saiknes.lv> Message-ID: <20020228191422.GA691@akamai.com> On Thu, Feb 28, 2002 at 08:52:50PM +0200, disastry@saiknes.lv wrote: > > We should construct such a key and see if any programs break with it. > > Where did you see it? > > I have one on my keyring, I put it on web page at > http://disastry.dhs.org/pgp/testkeys/testv3withsubkey.asc > > I don't remember from where I got this key, but I don't think > that I generated it myself, because it have passphrase "test" > (all may test keys have passphrase "a" or "12345678" :) ) > > but I also remember seen real (not test) key belonging to some person. > I can't find it... it was RSAv3 key with Elgamal subkey. > > GPG allows (maybe it does not allow now, but at least > older versions allowed) to add subkeys to v3 keys. It still allows you, but it prints a warning "creating subkeys for v3 keys is not OpenPGP compliant". It may have warned before too. > > Speaking of key versions - I spent some time looking at what versions > > were permitted with what a while ago and one thing that does seem to > > be explicitly permitted is v4 keys with v3 subkeys. I did test this > > and PGP supports it (though this may be accidental support). GnuPG > > 1.0.6 only partially supports it, but I fixed that in 1.0.7. > > > > Florian, this can give you the unchangeable expiration date that you > > wanted, if you're willing to accept the restrictions (RSA only, etc.) > > on v3 keys :) > > btw, v3 subkeys are (seems to be) allowed too, > section 5.5.2. Public Key Packet Formats > "A version 3 public key or public subkey packet contains:" That's what I just said - one paragraph up. I can't see any really good use for it except that v3 (sub)keys have a fixed expiration date that cannot be changed in the binding self-sig. That's why I thought Florian would be interested, since he wanted that feature. I suppose it would be handy for someone who had a lot of v3 keys to gather them together into one key, but that really doesn't give you anything useful. > some time ago I did some experiments - added key to other key as subkey, > and converted subkey to key :) it worked. Yes. I tried that once as well. I was thinking it would be an interesting solution for wanting a signing subkey, but since PGP couldn't verify a signature from a signing subkey, I made my signing subkey into a regular v4 key for PGP folks. :) David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson From dshaw at jabberwocky.com Thu Feb 28 20:25:02 2002 From: dshaw at jabberwocky.com (David Shaw) Date: Tue Oct 7 21:28:39 2003 Subject: problem with exporting subkeys In-Reply-To: References: <20020228154123.GF678@akamai.com> Message-ID: <20020228192304.GB691@akamai.com> On Thu, Feb 28, 2002 at 04:40:42PM +0100, Janusz A. Urbanowicz wrote: > David Shaw wrote/napisa?[a]/schrieb: > > On Thu, Feb 28, 2002 at 03:50:15PM +0100, Janusz A. Urbanowicz wrote: > > > David Shaw wrote/napisa?[a]/schrieb: > > > > On Wed, Feb 27, 2002 at 06:17:59PM +0100, Janusz A. Urbanowicz wrote: > > > > > > > > > First question: why ALL my secret keys in the packet? I supposed only > > > > > subkeys would go there. > > > > > > > > The structure of the secret primary key needs to still be there for > > > > various things to work. However, the secret parts of the key are > > > > gone. Compare the size of a --export-secret-key vs a > > > > --export-secret-subkeys. > > > > > > Ok. But is there a way to export a _single_ subkey? I definitely need such > > > option. Specyfying subkey ID after --export-secret-subkeys exports all > > > subkeys (tested). > > > > The single subkey isn't usable without the primary key (or rather, the > > primary key minus the secret parts of the key) attached, so exporting > > just a subkey won't really be helpful. One way to do it would be to > > export the key with all subkeys and then --edit-key and "delkey" the > > subkeys you don't want. > > By 'single subkey' I mean a secret subkey plus the whole data structure > required to maintain it. What I mean (and I would like to be able to) is > ability to be able to eport single subkeys (plus the whole stuff needed to > handle them) and not all at once. I'm not sure if I'm clear enough here. Clear, but there is no current feature to do that. You can approximate that feature by using export-secret-subkey on the whole key and using the --edit menu on the whole key to delete any subkeys you don't want. You will end up with the empty primary key, and just the subkey you wanted to keep. David -- David Shaw | dshaw@jabberwocky.com | WWW http://www.jabberwocky.com/ +---------------------------------------------------------------------------+ "There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence." - Jeremy S. Anderson