Newbie question.

Ayoub Misherghi ayoubhm at gmail.com
Wed Jul 15 01:24:10 CEST 2020


I am re-sending this text only. I made the mistake of sending it html 
previously.

--------------------------------------------------------

Sorry for splitting Peter and Philihp  into two threads.


I have probably put my gpg environment/program in a state it cannot come 
out of. I want to do what cowards do. I want to uninstall gpg and start 
all over again, escaping from the mess I put my self into somehow. With 
the advice you gave me I should do better next the time, and hopefully  
stay out of trouble.


I have not given anybody any of the IDs yet. And besides, the intended 
application is non interactive and also does not communicate anything. 
It hides everything and itself from ever body and ever thing, let alone 
the keys (or at least that is the intention if a manage to keep me out 
of trouble. I am a ASIC hardware guy venturing to do what I should not; 
obviously.)


How do I ensure I uninstall without leaving any history or state that 
could affect a new install please? Sorry for the head ache I am giving 
you. If I manage to make money and not go bankrupt I will remember my 
friends.


On 7/12/2020 11:01 AM, Ayoub Misherghi wrote:
>
> Thanks. This exposes to me how little I know and it will take me time 
> to absorb it. None of this information is in anything I read. Nothing 
> comes close. I will not come to grips with it with the kind of reading 
> material I have. Can you please suggest some good tutorial and 
> reference material preferably free (probably mutually exclusive 
> requirements) that will bring me up to your level or close to it please.
>
>
> The material I come across is just like silly preschool stuff with 1/4 
> truth which keeps you ill informed and miss informed and throws you 
> off track. They over simplify and drain education out of you making 
> you zombie.
>
>
> Thanks,
>
>
> Ayoub
>
>
> On 7/12/2020 9:15 AM, Peter Lebbing wrote:
>> On 12/07/2020 17:45, Ayoub Misherghi wrote:
>>> Sorry for going off list and messing everybody up. Now I disserve
>>> punishment.
>> Heh :-). It's just that if I reply off-list, it only helps you, but if
>> it is on-list, other people can find it in a search engine when they're
>> facing something similar.
>>
>> On 11/07/2020 21:07, Ayoub Misherghi wrote:
>>> My current intended usage is in non-interactive mode, completely.
>>> I can remove them from the gpg.conf but I would have to issue them
>>> every time. My understanding is that non-interactive mode requires
>>> those commands.
>> Well, in that case, you should supply --no-batch when you're using it
>> interactively; I'll show why further down.
>>
>> My personal choice would be to have my scripts and programs supply the
>> --batch on invocation rather than put it in the config file, because you
>> only need to write that command invocation in the script once (as you're
>> writing the script), whereas you'll be writing the --no-batch every time
>> you /do/ use it from an interactive shell.
>>
>>> I selected "expert" mode because I am using ED2599 incrpytion that is
>>> available only in this mode (I know, I am newbie)
>> You only need the --expert on commands creating or adding keys for that.
>> Once you have the key, you no longer need --expert to just use it.
>>
>>> All the config lines I showed are in my user config.
>>> A few days ago, my set up, which is still in development phase,
>>> worked until my short lived gpg keys expired. I fell in deep ***** when
>>> I created new keys. It all worked, with the passphrase-file option and
>>> without, before I fell. Can you pull this dumb newbie out?
>> I think the combination that worked might have been
>>
>> --8<---------------cut here---------------start------------->8---
>> pinentry-mode loopback
>> passphrase-file /home/ayoub/.gnupg/output.png
>> --8<---------------cut here---------------end--------------->8---
>>
>> but once you commented out the passphrase-file entry, GnuPG had no way
>> to get the passphrase. Normally you should use the pinentry (so comment
>> out the pinentry-mode line as well), but you force it to use the
>> loopback pinentry-mode. gpg _could_ ask for your passphrase that way.
>> But, you also specify --batch. --batch tells GnuPG that the human is
>> currently unavailable and it needn't bother trying to interact with it.
>> So it has no way to get the passphrase and gives up.
>>
>> It will ask you for the passphrase when you comment out --batch, but I
>> recommend also commenting out the --pinentry-mode line so it'll just
>> launch a pinentry like it wants to do.
>>
>> Now about this configuration:
>>
>> --8<---------------cut here---------------start------------->8---
>> pinentry-mode loopback
>> passphrase-file /home/ayoub/.gnupg/output.png
>> --8<---------------cut here---------------end--------------->8---
>>
>> If this file is stored with the same access conditions as
>> ~/.gnupg/private-keys-v1.d/, it serves no good purpose. You should then
>> just use a key without a passphrase. With a key without a passphrase, an
>> attacker would just need the file
>>
>> ~/.gnupg/private-keys-v1.d/[...].key
>>
>> and they're good to go. With your passphrase-file, they need two files:
>>
>> ~/.gnupg/private-keys-v1.d/[...].key
>> ~/.gnupg/output.png
>>
>> and once again they're good to go, they have your private key. Why would
>> it be more difficult to get a hold of two files rather than one? Just
>> drop the passphrase, and all your problems magically disappear :-).
>>
>> But given its name, I suppose output.png is generated by some unlocking
>> process. Suppose you did it like this before:
>>
>> $ my-unlocker >~/.gnupg/output.png
>>
>> You can actually unlock keys the way GnuPG intends to do that with:
>>
>> $ my-unlocker | /usr/lib/gnupg/gpg-preset-passphrase --preset <keygrip>
>>
>> You can find the keygrip for your keys with:
>>
>> $ gpg --with-keygrip --list-secret-keys
>>
>> You do need it for every subkey you want to use like this separately,
>> and also, it does not verify whether the passphrase was correct. Also,
>> put
>>
>> allow-preset-passphrase
>> max-cache-ttl <seconds>
>>
>> in ~/.gnupg/gpg-agent.conf
>>
>> and issue
>>
>> $ gpgconf --kill gpg-agent
>>
>> to reload. <seconds> is how long you want the passphrase to stay
>> available after gpg-preset-passphrase, and it defaults to a mere 2
>> hours. You could set it to 4294967295 to specify a lifetime of 136
>> years, i.e., infinitely for all practical purposes.
>>
>> Watch out that my-unlocker doesn't leak the passphrase in any way. I
>> thought it was unhelfpul that you can't use the pinentry with
>> gpg-preset-passphrase and I proposed a hack more than two years ago:
>>
>> https://lists.gnupg.org/pipermail/gnupg-users/2018-February/059917.html
>>
>> It's pretty hacky, but it does seem to work.
>>
>> You could actually just unlock your key by using it once when you start
>> up your system, and then use the caching feature to keep it available
>> for non-interactive use for the rest of the time. Then you don't use
>> gpg-preset-passphrase, but put, e.g., this in your gpg-agent.conf
>>
>> default-cache-ttl 4294967295
>> max-cache-ttl 4294967295
>>
>> and unlock your key by doing one decryption:
>>
>> $ echo Open Sesame | gpg -r develop1 -e | gpg -d
>>
>> This will pop up a pinentry for your passphrase, and since you set the
>> cache-ttl to infinity, it will never popup a pinentry again on
>> decryptions until you restart gpg-agent. It's a pretty good workflow
>> that uses all parts as they were intended.
>>
>> HTH,
>>
>> Peter.
>>



More information about the Gnupg-users mailing list