gpg 1.0.1 also cannot decrypt stuff encrypted by gpg 1.0.4

Darxus@ChaosReigns.com Darxus@ChaosReigns.com
Tue, 17 Oct 2000 15:44:01 -0400


Without verbose mode turned on, attempts to decrypt messages from gpg
1.0.3 or 1.0.4 with gpg 1.0.1 result in a blank message and no errors.  Is
this acceptable behavior ?  I, personally, don't want to encrypt anything
to anyone else using anything over gpg 1.0.2, because I want the recipient
to actually get what I send them.

example verbose output:

----------------------------------------------------------------------
$ gpg --version
gpg (GnuPG) 1.0.4

$ gpg -vv -a --encrypt -r test
gpg: loaded digest 2
gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $)
gpg: key 0E9FF879: accepted as trusted key.
gpg: loaded digest 1
gpg: key FE3821D9: accepted as trusted key.
Could not find a valid trust path to the key.  Let's see whether we
can assign some missing owner trust values.

No path leading to one of our keys found.

1024g/A089BDC4 2000-10-11 "test key, delete <test@chaosreigns.com>"
             Fingerprint: 00C6 877A A3F0 A130 1134  9A25 FAE1 379F A089 BDC4

It is NOT certain that the key belongs to its owner.
If you *really* know what you are doing, you may answer
the next question with yes

Use this key anyway? y
gpg: reading from `[stdin]'
gpg: writing to stdout
gpg: ELG-E/TWOFISH encrypted for: A089BDC4 test key, delete <test@chaosreigns.com>
This is a test.
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf
NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5
tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD
/il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J
lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/
5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD
iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl
bAVbhwvTdopZJV6s4Q==
=8qH9
-----END PGP MESSAGE-----
----------------------------------------------------------------------
$ gpg --version
gpg (GnuPG) 1.0.1

$ gpg -vv --decrypt
-----BEGIN PGP MESSAGE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf
NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5
tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD
/il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J
lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/
5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD
iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl
bAVbhwvTdopZJV6s4Q==
=8qH9
-----END PGP MESSAGE-----
gpg: armor: BEGIN PGP MESSAGE
gpg: armor header: Version: GnuPG v1.0.4 (GNU/Linux)
gpg: armor header: Comment: For info see http://www.gnupg.org

:pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4
data: [1021 bits] data: [1022 bits] gpg: public key is A089BDC4 gpg: loaded digest 2 gpg: /usr/lib/gnupg/rsa: RSA ($Revision: 1.8 $) gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $) You need a passphrase to unlock the secret key for user: "test key, delete <test@chaosreigns.com>" gpg: loaded pubkey 1 (RSA) gpg: loaded pubkey 2 (RSA-E) gpg: loaded pubkey 3 (RSA-S) 1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471) gpg: loaded digest 3 gpg: key 9F2C2471: accepted as trusted key. gpg: public key encrypted data: good DEK
:unknown packet: type 18, length 74
dump: 01 09 73 85 f8 eb c8 e8 9b d2 25 f8 83 89 0b e4 91 82 fe 3d 24 53 80 36 24: 54 cd fb 83 62 52 e0 c6 43 de 2c 13 e6 4f e5 15 9a 3e cb b7 cf 66 0c 2b 48: 03 07 3f ff cf 76 f8 47 4f 12 fd c6 25 6c 05 5b 87 0b d3 76 8a 59 25 5e 72: ac e1 ---------------------------------------------------------------------- $ gpg --version gpg (GnuPG) 1.0.2 $ gpg -vv --decrypt -----BEGIN PGP MESSAGE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5 tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD /il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/ 5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl bAVbhwvTdopZJV6s4Q== =8qH9 -----END PGP MESSAGE----- gpg: armor: BEGIN PGP MESSAGE gpg: armor header: Version: GnuPG v1.0.4 (GNU/Linux) gpg: armor header: Comment: For info see http://www.gnupg.org
:pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4
data: [1021 bits] data: [1022 bits] gpg: public key is A089BDC4 gpg: loaded digest 2 gpg: /usr/lib/gnupg/rsa: error loading extension: /usr/lib/gnupg/rsa: cannot open shared object file: No such file or directory gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $) You need a passphrase to unlock the secret key for user: "test key, delete <test@chaosreigns.com>" 1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471) gpg: loaded digest 3 gpg: key 9F2C2471: accepted as trusted key. gpg: public key encrypted data: good DEK
:encrypted data packet:
length: 73 mdc_method: 2 gpg: TWOFISH encrypted data
:compressed packet: algo=2
:literal data packet:
mode b, created 971809947, name="", raw data: 16 bytes gpg: original file name='' gpg: loaded digest 1 This is a test. gpg: decryption okay ---------------------------------------------------------------------- $ gpg --version gpg (GnuPG) 1.0.3 $ gpg -vv --decrypt -----BEGIN PGP MESSAGE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org hQEOA/rhN5+gib3EEAP9HF3e/TzULrn9/FqFJAHWqY6ZL+UKCA/GjpKFuafX/cJf NETo1WqZtu7O+slkJ6psgOB1+KprKr/hvoA7h+XbjEh8zZoO9L8a/9fjutK988U5 tP9BYECAe1hYoi6+W7pjKUIVZEZj/EuqZ8QC0ReP1n8/NkyBDggFrJ11wJP6FnUD /il5ljACp2T5hotqxxBdDCT/vBJhsTwGQNrXFpfSWAdY2aJPb6VPlWSc5+C6Nv1J lsvfppBf1v9AY4LRX12Uq0F4kmAd+zl8RKwUB3P7L8atjPd/PJLENAAQHy/Dclr/ 5WJPblxmtqKmT+cJ5Rj7vLrZZTnlFRgCucrn0CVb/n6d0koBCXOF+OvI6JvSJfiD iQvkkYL+PSRTgDZUzfuDYlLgxkPeLBPmT+UVmj7Lt89mDCsDBz//z3b4R08S/cYl bAVbhwvTdopZJV6s4Q== =8qH9 -----END PGP MESSAGE----- gpg: armor: BEGIN PGP MESSAGE gpg: armor header: Version: GnuPG v1.0.4 (GNU/Linux) gpg: armor header: Comment: For info see http://www.gnupg.org
:pubkey enc packet: version 3, algo 16, keyid FAE1379FA089BDC4
data: [1021 bits] data: [1022 bits] gpg: public key is A089BDC4 gpg: loaded digest 2 gpg: /usr/lib/gnupg/idea: IDEA ($Revision: 1.8 $) You need a passphrase to unlock the secret key for user: "test key, delete <test@chaosreigns.com>" 1024-bit ELG-E key, ID A089BDC4, created 2000-10-11 (main key ID 9F2C2471) gpg: loaded digest 3 gpg: key 0E9FF879: accepted as trusted key. gpg: loaded digest 1 gpg: key FE3821D9: accepted as trusted key. gpg: key 9F2C2471: accepted as trusted key. gpg: public key encrypted data: good DEK
:encrypted data packet:
length: 73 mdc_method: 2 gpg: TWOFISH encrypted data
:compressed packet: algo=2
:literal data packet:
mode b, created 971809947, name="", raw data: 16 bytes gpg: original file name='' This is a test. gpg: decryption okay ---------------------------------------------------------------------- -- http://www.ChaosReigns.com -- Archive is at http://lists.gnupg.org - Unsubscribe by sending mail with a subject of "unsubscribe" to gnupg-users-request@gnupg.org