From dougb at dougbarton.email Thu Jan 1 00:19:07 2015 From: dougb at dougbarton.email (Doug Barton) Date: Wed, 31 Dec 2014 15:19:07 -0800 Subject: The praise of GnuPG @31C3 In-Reply-To: <54A41C5B.3050507@josuttis.de> References: <54A41C5B.3050507@josuttis.de> Message-ID: <54A4846B.9030102@dougbarton.email> The death of IPsec has been greatly exaggerated: https://nohats.ca/wordpress/blog/2014/12/29/dont-stop-using-ipsec-just-yet/ From dougb at dougbarton.email Thu Jan 1 00:33:46 2015 From: dougb at dougbarton.email (Doug Barton) Date: Wed, 31 Dec 2014 15:33:46 -0800 Subject: The praise of GnuPG @31C3 In-Reply-To: References: <54A41C5B.3050507@josuttis.de> <54A4846B.9030102@dougbarton.email> Message-ID: <54A487DA.9000708@dougbarton.email> On 12/31/2014 3:25 PM, mark hellewell wrote: > And the ?ssh is broken? remark strikes me as a little dramatic, too. Well I've seen vague references to some of the "less secure" settings being vulnerable, but I've yet to see, "everything below this line is vulnerable, everything above this line is thought to be safe." If anyone has a reference ... Doug From mark.hellewell at gmail.com Thu Jan 1 00:25:18 2015 From: mark.hellewell at gmail.com (mark hellewell) Date: Thu, 1 Jan 2015 10:25:18 +1100 Subject: The praise of GnuPG @31C3 In-Reply-To: <54A4846B.9030102@dougbarton.email> References: <54A41C5B.3050507@josuttis.de> <54A4846B.9030102@dougbarton.email> Message-ID: On 1 January 2015 at 10:19, Doug Barton wrote: > The death of IPsec has been greatly exaggerated: > > https://nohats.ca/wordpress/blog/2014/12/29/dont-stop-using-ipsec-just-yet/ And the ?ssh is broken? remark strikes me as a little dramatic, too. From s.murthy at mykolab.com Thu Jan 1 02:26:29 2015 From: s.murthy at mykolab.com (Sandeep Murthy) Date: Thu, 1 Jan 2015 01:26:29 +0000 Subject: GPG (v. 1.4.12) is not user-friendly In-Reply-To: References: Message-ID: <7436F0C5-61A9-46DA-85FF-F78401BD5D71@mykolab.com> I agree, this output is not user friendly at all, but did you try instead `$ gpg ?edit-key which should start the `gpg` program (interactive environment with the `gpg>` prompt, and then you do `gpg> fpr` to display the fingerprint. The problem with commands of this type `gpg ?