Perl, GPG, and --passphrase-fd

Christopher Maujean cmaujean@premierelink.com
Sat Jun 9 22:28:01 2001


(not trying to start a war)

2. Cool idea on the CRC thing, guess I should read the spec Gnupg seems 
a bit on the overkill side for simple CRC type mangling checks. MD5 
should work just fine for that, Perl's MD5 module runs on every platform 
that perl runs on...

1. Having a passphrase hard coded, or having no passphrase at all means, 
IMHO, that the origin of the message is untrusted, and unverifiable I 
can't trust that the signing key wasn't stolen and is being used by my 
arch-nemisis to impersonate my friend or business associate.

--Christopher

Anthony E . Greene wrote:


> On Thu, 07 Jun 2001 17:39:00 Christopher Maujean wrote:
>
>> umm, correct me if I'm wrong, but doesn't hardcoding the passphrase in a
>> text file somewhere Completely break, destroy, invalidate, and otherwise
>> mangle the whole point of encryption?
>
>
> True, but sometimes people feel it's needed for automated signing. They may
> as well use a key that does not have a passphrase. That's fine if you just
> need to verify the origin of the message.
>
> If the issue is making sure the message was not mangled by some mail server
> or other software along the way, then the CRC that is automatically done
> should be sufficient. The last line of text in an armored message is a 32bit
> CRC. If the armor is damaged in transit, the CRC fails and the message will
> not be decrypted.
>
> Tony
-- Christopher Maujean IT Director Premierelink Communications www.premierelink.com cmaujean@premierelink.com PLEASE encrypt all sensitive information using the following: GnuPG: 0x5DE74D38 Fingerprint: 91D4 09FE 18D0 27C1 A857 0E45 F8A4 7858 5DE7 4D38 http://blackhole.pca.dfn.de:11371/pks/lookup?op=get&search=0x5DE74D38