Accessing GPG from a network drive.

Gates, Scott SGates@olbh.com
Mon Aug 25 20:24:01 2003


This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C36B35.C6A3AD00
Content-Type: text/plain

I KNOW this defies ALL GPG/encryption logic, but just TRUST me a minute,
it's OK.  

I'm using WINDOWS 9X/XP: I need to get GPG working from a network drive in
order to wire together a "poor-man's secure FTP server"  (Again, I know I
could BUILD one using Linux etc, but hey, I Ain't calling the shots on this
one, I just do what they tell me, until *they* screw up then tell me to find
another job.) 

It works pretty well from my desktop, but I have GPG installed and
configured on my machine.  

I stick in a DOS.BAT the line "..\GPG --options ..\gpg.conf -er vendor.com
venfile1".  I'm in the directory that venfile1 is and gpg and all associated
keyrings and config.files are installed one directory above it.  
The gpg.conf file looks like this: 
comment "test only"   
armor                 
pgp6                  
yes                   


>From my desktop, it works pretty well.   But, I can't get it to work from
OTHER people's desktop.  (No, those who make decisions WON'T allow me to
install GPG on every system that needs it.  Secretly, they're afraid we're
all hackers and will use it to launch some sneak attack on them.  Also, they
don't understand the GNU licensing and are afraid the GNU company lawyer
will send them a nasty letter.  With only ONE copy on the network, they can
all point the finger at me when the Gnu lawyer arrives.  Maybe I should ask
for a raise, since I'm sticking my neck 'so far out' for the company.)

Anyway, if anyone has any ideas how I can slap this into working, I'd be
greatly appreciative. 


Scott Gates
Programmer/Analyst 
Information Services 
-----------------------------------
Quote: ...Computers are...stupid. Unlike human beings, computers possess the
truly profound stupidity of the inanimate. - Bruce Sterling - THE HACKER
CRACKDOWN
-----------------------------------
Confidentiality Notice: This e-mail message, including any attachments, is
for the sole use of the intended recipient(s) and may contain confidential
and privileged information.  Any unauthorized review, use, disclosure or
distribution is prohibited.  If you are not the intended recipient, please
contact the sender by reply e-mail, fax, or phone and destroy all copies of
the original message.



------_=_NextPart_001_01C36B35.C6A3AD00
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DUS-ASCII">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>Accessing GPG from a network drive.</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2 FACE=3D"Arial">I KNOW this defies ALL GPG/encryption =
logic, but just TRUST me a minute, it's OK.&nbsp; </FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">I'm using WINDOWS 9X/XP: I need to get =
GPG working from a network drive in order to wire together a =
&quot;poor-man's secure FTP server&quot;&nbsp; (Again, I know I could =
BUILD one using Linux etc, but hey, I Ain't calling the shots on this =
one, I just do what they tell me, until *they* screw up then tell me to =
find another job.) </FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">It works pretty well from my desktop, =
but I have GPG installed and configured on my machine.&nbsp; </FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">I stick in a DOS.BAT the line =
&quot;..\GPG --options ..\gpg.conf -er vendor.com venfile1&quot;.&nbsp; =
I'm in the directory that venfile1 is and gpg and all associated =
keyrings and config.files are installed one directory above it.&nbsp; =
</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">The gpg.conf file looks like this: =
</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">comment &quot;test =
only&quot;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2 =
FACE=3D"Arial">armor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2 =
FACE=3D"Arial">pgp6&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
<BR><FONT SIZE=3D2 =
FACE=3D"Arial">yes&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </FONT>
</P>
<BR>

<P><FONT SIZE=3D2 FACE=3D"Arial">From my desktop, it works pretty =
well.&nbsp;&nbsp; But, I can't get it to work from OTHER people's =
desktop.&nbsp; (No, those who make decisions WON'T allow me to install =
GPG on every system that needs it.&nbsp; Secretly, they're afraid we're =
all hackers and will use it to launch some sneak attack on them.&nbsp; =
Also, they don't understand the GNU licensing and are afraid the GNU =
company lawyer will send them a nasty letter.&nbsp; With only ONE copy =
on the network, they can all point the finger at me when the Gnu lawyer =
arrives.&nbsp; Maybe I should ask for a raise, since I'm sticking my =
neck 'so far out' for the company.)</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">Anyway, if anyone has any ideas how I =
can slap this into working, I'd be greatly appreciative. </FONT>
</P>
<BR>

<P><B><FONT FACE=3D"Times New Roman">Scott Gates</FONT></B>
<BR><FONT FACE=3D"Times New Roman">Programmer/Analyst </FONT>
<BR><FONT FACE=3D"Times New Roman">Information Services </FONT>
<BR><FONT FACE=3D"Times New =
Roman">-----------------------------------</FONT><B></B>
<BR><B><FONT FACE=3D"Times New Roman">Quote:</FONT></B><FONT =
FACE=3D"Times New Roman"> ...Computers are...stupid. Unlike human =
beings, computers possess the truly profound stupidity of the =
inanimate. - Bruce Sterling - THE HACKER CRACKDOWN</FONT></P>

<P><FONT FACE=3D"Times New =
Roman">-----------------------------------</FONT>
<BR><B><FONT SIZE=3D1 FACE=3D"Times New Roman">Confidentiality =
Notice:</FONT></B><FONT SIZE=3D1 FACE=3D"Times New Roman"> This e-mail =
message, including any attachments, is for the sole use of the intended =
recipient(s) and may contain confidential and privileged =
information.&nbsp; Any unauthorized review, use, disclosure or =
distribution is prohibited.&nbsp; If you are not the intended =
recipient, please contact the sender by reply e-mail, fax, or phone and =
destroy all copies of the original message.</FONT></P>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C36B35.C6A3AD00--