gpg 1.0.1 also cannot decrypt stuff encrypted by gpg 1.0.4
Darxus@ChaosReigns.com
Darxus@ChaosReigns.com
Tue, 17 Oct 2000 15:44:01 -0400
Without verbose mode turned on, attempts to decrypt messages from gpg
1.0.3 or 1.0.4 with gpg 1.0.1 result in a blank message and no errors. Is
this acceptable behavior ? I, personally, don't want to encrypt anything
to anyone else using anything over gpg 1.0.2, because I want the recipient
to actually get what I send them.
example verbose output:
----------------------------------------------------------------------
$ gpg --version
gpg (GnuPG) 1.0.4
$ gpg -vv -a --encrypt -r test
gpg: loaded digest 2
gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $)
gpg: key 0E9FF879: accepted as trusted key.
gpg: loaded digest 1
gpg: key FE3821D9: accepted as trusted key.
Could not find a valid trust path to the key. Let's see whether we
can assign some missing owner trust values.
No path leading to one of our keys found.
1024g/A089BDC4 2000-10-11 "test key, delete <test@chaosreigns.com>"
Fingerprint: 00C6 877A A3F0 A130 1134 9A25 FAE1 379F A089 BDC4
It is NOT certain that the key belongs to its owner.
If you *really* know what you are doing, you may answer
the next question with yes
Use this key anyway? y
gpg: reading from `[stdin]'
gpg: writing to stdout
gpg: ELG-E/TWOFISH encrypted for: A089BDC4 test key, delete <test@chaosreigns.com>
This is a test.
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf
NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5
tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD
/il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J
lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/
5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD
iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl
bAVbhwvTdopZJV6s4Q==
=8qH9
-----END PGP MESSAGE-----
----------------------------------------------------------------------
$ gpg --version
gpg (GnuPG) 1.0.1
$ gpg -vv --decrypt
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf
NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5
tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD
/il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J
lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/
5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD
iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl
bAVbhwvTdopZJV6s4Q==
=8qH9
-----END PGP MESSAGE-----
gpg: armor: BEGIN PGP MESSAGE
gpg: armor header: Version: GnuPG v1.0.4 (GNU/Linux)
gpg: armor header: Comment: For info see http://www.gnupg.org
:pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4
data: [1021 bits]
data: [1022 bits]
gpg: public key is A089BDC4
gpg: loaded digest 2
gpg: /usr/lib/gnupg/rsa: RSA ($Revision: 1.8 $)
gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $)
You need a passphrase to unlock the secret key for
user: "test key, delete <test@chaosreigns.com>"
gpg: loaded pubkey 1 (RSA)
gpg: loaded pubkey 2 (RSA-E)
gpg: loaded pubkey 3 (RSA-S)
1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471)
gpg: loaded digest 3
gpg: key 9F2C2471: accepted as trusted key.
gpg: public key encrypted data: good DEK
:unknown packet: type 18, length 74
dump: 01 09 73 85 f8 eb c8 e8 9b d2 25 f8 83 89 0b e4 91 82 fe 3d 24 53 80 36
24: 54 cd fb 83 62 52 e0 c6 43 de 2c 13 e6 4f e5 15 9a 3e cb b7 cf 66 0c 2b
48: 03 07 3f ff cf 76 f8 47 4f 12 fd c6 25 6c 05 5b 87 0b d3 76 8a 59 25 5e
72: ac e1
----------------------------------------------------------------------
$ gpg --version
gpg (GnuPG) 1.0.2
$ gpg -vv --decrypt
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf
NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5
tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD
/il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J
lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/
5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD
iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl
bAVbhwvTdopZJV6s4Q==
=8qH9
-----END PGP MESSAGE-----
gpg: armor: BEGIN PGP MESSAGE
gpg: armor header: Version: GnuPG v1.0.4 (GNU/Linux)
gpg: armor header: Comment: For info see http://www.gnupg.org
:pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4
data: [1021 bits]
data: [1022 bits]
gpg: public key is A089BDC4
gpg: loaded digest 2
gpg: /usr/lib/gnupg/rsa: error loading extension: /usr/lib/gnupg/rsa: cannot open shared object file: No such file or directory
gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $)
You need a passphrase to unlock the secret key for
user: "test key, delete <test@chaosreigns.com>"
1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471)
gpg: loaded digest 3
gpg: key 9F2C2471: accepted as trusted key.
gpg: public key encrypted data: good DEK
:encrypted data packet:
length: 73
mdc_method: 2
gpg: TWOFISH encrypted data
:compressed packet: algo=2
:literal data packet:
mode b, created 971809947, name="",
raw data: 16 bytes
gpg: original file name=''
gpg: loaded digest 1
This is a test.
gpg: decryption okay
----------------------------------------------------------------------
$ gpg --version
gpg (GnuPG) 1.0.3
$ gpg -vv --decrypt
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf
NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5
tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD
/il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J
lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/
5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD
iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl
bAVbhwvTdopZJV6s4Q==
=8qH9
-----END PGP MESSAGE-----
gpg: armor: BEGIN PGP MESSAGE
gpg: armor header: Version: GnuPG v1.0.4 (GNU/Linux)
gpg: armor header: Comment: For info see http://www.gnupg.org
:pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4
data: [1021 bits]
data: [1022 bits]
gpg: public key is A089BDC4
gpg: loaded digest 2
gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $)
You need a passphrase to unlock the secret key for
user: "test key, delete <test@chaosreigns.com>"
1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471)
gpg: loaded digest 3
gpg: key 0E9FF879: accepted as trusted key.
gpg: loaded digest 1
gpg: key FE3821D9: accepted as trusted key.
gpg: key 9F2C2471: accepted as trusted key.
gpg: public key encrypted data: good DEK
:encrypted data packet:
length: 73
mdc_method: 2
gpg: TWOFISH encrypted data
:compressed packet: algo=2
:literal data packet:
mode b, created 971809947, name="",
raw data: 16 bytes
gpg: original file name=''
This is a test.
gpg: decryption okay
----------------------------------------------------------------------
--
http://www.ChaosReigns.com
--
Archive is at http://lists.gnupg.org - Unsubscribe by sending mail
with a subject of "unsubscribe" to gnupg-users-request@gnupg.org