GPG decryption within shell scripts.

Chip Mautz CMautz@tmhsi.com
Tue Aug 5 15:21:03 2003


This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C35B54.A5B5A030
Content-Type: text/plain;
	charset="iso-8859-1"

Not all transactions can be SSL.  Some legacy apps use FTP.  Using
PGP-encrypted files in an automated processing environment allows for secure
data transfer, between systems.  This allows us HIPAA compliancy, for
instance.

I'd rather be using SSL, but being an ASP can't choose my clients
environments...

Chip

Chip Mautz
Senior Web Developer

Third Millennium Healthcare Systems, Inc.
125 Clairemont Avenue
Suite 300
Decatur, GA, 30030
(404) 687-1166 (phone)
(404) 687-2055 (fax)

I don't know.  I'm making this up as I go - Indiana Jones


> -----Original Message-----
> From: Joseph Bruni [mailto:jbruni@mac.com]
> Sent: Tuesday, July 29, 2003 7:14 PM
> To: 'gnupg-users@gnupg.org'
> Subject: Re: GPG decryption within shell scripts.
> 
> 
> Because files and data in-transit are still more secure with 
> encryption than without encryption. Don't you use SSL? That's 
> automated crypto.
> 
> 
> On Tuesday, July 29, 2003, at 04:50PM, Ben Finney 
> <ben@benfinney.id.au> wrote:
> 
> >In short: once you automate the use of crypto, your 
> authentication model
> >is reduced to the one used to access the files involved in 
> the automated
> >process.  In which case, why use encryption at all?
> >
> >
>  
> 
> -- 
> PGP Fingerprint:
> 886F 6A8A 68A1 5E90 EF3F  8EFA E2B8 3F99 7343 C1E3
> 
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 

------_=_NextPart_001_01C35B54.A5B5A030
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: GPG decryption within shell scripts.</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Not all transactions can be SSL.&nbsp; Some legacy =
apps use FTP.&nbsp; Using PGP-encrypted files in an automated =
processing environment allows for secure data transfer, between =
systems.&nbsp; This allows us HIPAA compliancy, for =
instance.</FONT></P>

<P><FONT SIZE=3D2>I'd rather be using SSL, but being an ASP can't =
choose my clients environments...</FONT>
</P>

<P><FONT SIZE=3D2>Chip</FONT>
</P>

<P><FONT SIZE=3D2>Chip Mautz</FONT>
<BR><FONT SIZE=3D2>Senior Web Developer</FONT>
</P>

<P><FONT SIZE=3D2>Third Millennium Healthcare Systems, Inc.</FONT>
<BR><FONT SIZE=3D2>125 Clairemont Avenue</FONT>
<BR><FONT SIZE=3D2>Suite 300</FONT>
<BR><FONT SIZE=3D2>Decatur, GA, 30030</FONT>
<BR><FONT SIZE=3D2>(404) 687-1166 (phone)</FONT>
<BR><FONT SIZE=3D2>(404) 687-2055 (fax)</FONT>
</P>

<P><FONT SIZE=3D2>I don't know.&nbsp; I'm making this up as I go - =
Indiana Jones</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Joseph Bruni [<A =
HREF=3D"mailto:jbruni@mac.com">mailto:jbruni@mac.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Tuesday, July 29, 2003 7:14 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: 'gnupg-users@gnupg.org'</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: GPG decryption within shell =
scripts.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Because files and data in-transit are still =
more secure with </FONT>
<BR><FONT SIZE=3D2>&gt; encryption than without encryption. Don't you =
use SSL? That's </FONT>
<BR><FONT SIZE=3D2>&gt; automated crypto.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; On Tuesday, July 29, 2003, at 04:50PM, Ben =
Finney </FONT>
<BR><FONT SIZE=3D2>&gt; &lt;ben@benfinney.id.au&gt; wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;In short: once you automate the use of =
crypto, your </FONT>
<BR><FONT SIZE=3D2>&gt; authentication model</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;is reduced to the one used to access the =
files involved in </FONT>
<BR><FONT SIZE=3D2>&gt; the automated</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;process.&nbsp; In which case, why use =
encryption at all?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; -- </FONT>
<BR><FONT SIZE=3D2>&gt; PGP Fingerprint:</FONT>
<BR><FONT SIZE=3D2>&gt; 886F 6A8A 68A1 5E90 EF3F&nbsp; 8EFA E2B8 3F99 =
7343 C1E3</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; =
_______________________________________________</FONT>
<BR><FONT SIZE=3D2>&gt; Gnupg-users mailing list</FONT>
<BR><FONT SIZE=3D2>&gt; Gnupg-users@gnupg.org</FONT>
<BR><FONT SIZE=3D2>&gt; <A =
HREF=3D"http://lists.gnupg.org/mailman/listinfo/gnupg-users" =
TARGET=3D"_blank">http://lists.gnupg.org/mailman/listinfo/gnupg-users</A=
></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C35B54.A5B5A030--