From: Todd Jacobs Area: Public Key Encryption To: L P 31 Dec 94 00:25:38 Subject: Re: Can I Freq Pgp? UpdReq L P's overdue library book had this message for All scribbled in the margins: > I just started getting this echo. I see that most everyone is using > PGP2.6.2. In my neck of the woods, it's all 2.3a, 2.6, and 2.6ui. > Where can I FREQ 2.6.2? Is there a text/faq that I can FREQ that > explains the difference between 2.6.2 and the others versions? If not, > could someone please fill me in on the "bottom line" differences > between the versions? 2.6.2 fixes a lot of bugs, and is fully legal. 'nuff said. You can FREQ it here with the magic name of PGP (or try PGP262.ZIP if that fails). Todd A. Jacobs SysOp, The Digital Bookshelf 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Phillip Barker 31 Dec 94 09:20:56 Subject: Freq Latest Ver of PGP? UpdReq -----BEGIN PGP SIGNED MESSAGE----- Wednesday December 28 1994, Phillip Barker writes to All: PB> Hello! and thanks for reading this: PB> If your are a Sysop and permit freqing, would you mind if I got the PB> latest ver of PGP from your system? Just reply with your consent along PB> with whatever filename and I'll do the rest! I think the standard is just freq the magicname PGP for the dos version and PGPOS2 for the OS/2 executable. You can get either from here if you don't mind the ld. Scott Anybody wanna screw? |///- Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLwVpMCP6qSQmzV0DAQEptwP/ffmiWkcNg2XG2mV9vBvZnNnKElOl/ldK XZZkuKlucjP6nO2wbAEb8K1iEqBcf+XyEBpyz+NQaVZKPo46TZWjpqvD64/E067U 5YCIiSxVlxmqO0+LkbfooeKDXElQBuKhBG4LuZA5dv/T+us28n6ieelis9EkLJ9Y GMQ6858shdY= =05s7 -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Jerry Boggs Area: Public Key Encryption To: L P 31 Dec 94 11:15:20 Subject: Can I Freq Pgp? UpdReq -----BEGIN PGP SIGNED MESSAGE----- Wednesday December 28 1994 19:46, L P wrote to All: LP> I just started getting this echo. I see that most everyone is using LP> PGP2.6.2. In my neck of the woods, it's all 2.3a, 2.6, and 2.6ui. LP> Where can I FREQ 2.6.2? Is there a text/faq that I can FREQ that LP> explains the difference between 2.6.2 and the others versions? If not, LP> could someone please fill me in on the "bottom line" differences LP> between the versions? LP> If you can't find it any closer, you can freq it from me with the magic name PGPOS2 for the OS/2 version and PGP for the DOS version. Jerry Boggs 1024/F7983445 Key fingerprint = D1 A1 41 39 04 66 AA 2E 8D 88 C5 26 06 46 38 CB Annoy Liberals: Tell them that less governmment is better. - --- GoldED 2.50.B1016+ 1626US3 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLwWD3FQAnV73mDRFAQFCGAP/RRzgvsb0tvWTwXk7ATotQ9qkZJfqzPJi bH8QyqaUZRiz8Jbp0eP8ZTUURCpT6zemVEPixCWSsL4K1rkWv3E5irBXM2DHAvch z0vjutLoAvt5UNH2Ot4slT8AoB4TdUqJjfA+nEw546uoyvsQnbxbMyD/JXqGL/uG lU7/PzO1TBg= =sR+e -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Brian McMurry Area: Public Key Encryption To: Ian Hebert 30 Dec 94 09:26:10 Subject: Re: EFF Peronnel Announcement UpdReq -----BEGIN PGP SIGNED MESSAGE----- Now I'd like an interpretation of whether these chair changes are a Good Thing or a Bad Thing. I was very disappointed with the EFF's recent capitulation to the FBI and began to think of the EFF as part of the problem rather than the solution. How does/will the CDT differ from the EFF? -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLwNhfN2dg1OWsljdAQGMfAQAwKQ+kMe32o8doEdDQfusA4e/7IhGoTmN 5G0Ntznac4uuFy86+tC6GRHJvPDVYxZbpjKT0qiB2iGIhvhlfBdlx9vPQlop+m02 j6UAN3Eh5aW7sSAeklQLLu3yRuifGBWey2H1oN8HRqZZOyRB/VkutMTUWk0gBinr syodmBX7FAk= =D8bX -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Mark Drew Area: Public Key Encryption To: All 31 Dec 94 17:57:00 Subject: Problem UpdReq -----BEGIN PGP SIGNED MESSAGE----- Hello PGP experts out there...hope you can give me some insight, I have posted my sad story elsewhere but have gotten no responses. Thanks to anyone who can help.... I am a recent user of PGP, however, on 3 separate occassions, while using PGP, my computer "losses" the A; drive (the old "drive not ready abort, retry, fail" message). Hot rebooting puts it back right I have tired to make this happen by running PGP every way I can think of, but have had no luck duplicating this other than having it occurs in a truly random fashion associated with running PGP. In other words, I can't make it do it, it just does it when it wants to during whichever PGP function it feels like doing it in. I ran 3 different virus scanners and they all say..."okay". I even FTPed PGP 2.6.2 from a second source and file compared them to guard against a "hacked" version (I know, I know, but just to be safe you know). My setup is a 486sx, 4 meg ran, running Windows. My autoexec.bat has nothing esoteric in except for maybe PKWARE's PKSFANSI.COM. THE question is what's happening here? Never had any trouble before and only occurs somehow associated with PGP. Could PGP be sending out any sort of code that PKSFANSI might think is some kind of an ANSI-bomb (obviously not a techie here folks). Any ideas out there? Thanks -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLwXtw5TeAMV8DT+pAQFc4AQAmboAYaU5e8fc4KoGDNecPYbtu0NSutoh rxJBI8PVM24mBUxPqzSw7+z148igUIH86Svz8g5Ep92diX2ag+NmVduFVhAZJ7+O PIrROCAJXBtLhQymkIDPIqtAzgE7w+HTIpW8dXlm1GEH1UWGrh6V7ODOjlVlZQlt kQwJS/ME+iU= =yhZN -----END PGP SIGNATURE----- ... "I drank WHAT!?" - Socrates ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: Geoff Gowey Area: Public Key Encryption To: All 30 Dec 94 16:26:40 Subject: GoldED/2 and PGP/2 UpdReq -----BEGIN PGP SIGNED MESSAGE----- Hello All! Gotta question here. I'm trying to rig my GoldED/2 to use PGP/2. I'm not sure if it works, but here's what I do: 1.) I del my origin line (GoldED/2 automatically appends it to the end of the message anyway) 2.) I press the F9 key which runs a CMD file (OS/2's ver of a batch file) that does the following: CD\BWAVE ; changes to my dir where PGP, and Tagdude are TAGDUDE -ADD3 %1 ; runs Tagdude PGP -STA %1 ; adds my key COPY \PORTAL\*.ASC %1 ; now here's the thing. PGP outputs the signed file ; with a .ASC extension. So this basically copies ; (overwrites) the orig file w/ the signed file. ; BTW- Made sure no other .ASC files are in there. DEL \PORTAL\*.ASC ; this takes care of the .ASC files CD\PORTAL ; changes me back to the dir where GoldED is. Ok, now here's how I verify the message: 1.) export the signed message to a plain text file. 2.) del anything beneath the PGP sig 3.) run PGP on it. But here's the quirk: If I run PGP and haven't tampered with the message I get a file with the first part the same w/ no extension measuring 0 bytes (but it is del'able), but if I tamper with it and then run PGP it outputs a 125 byte blank file. Also, for some reason it repeats the Squish, and GoldED/2 tearlines. Appreciate any help. Thanks. Geoff - ---Packed by Squish ver 1.11 ... (a short musical interlude) ___ TagDude 0.87 [Unregistered] with 54842 taglines. - ---Packed by Squish ver 1.11 - --- GoldED/2 2.42.G0615 -----BEGIN PGP SIGNATURE----- Version: 2.6.1 iQCVAwUBLwQ5lDzC5kO2MpyFAQFoyQP/dgoOC+BjO8pvjkJAiY6oUdc8Wx+uYW8/ rWRxEFNKN7AS9c5GmbpuaJUIZqbjYS03QbHmyLiUu9tNByWhQLMAn0HjwpjIPO3n m7f4NjLq1ryRpqRtO/U+AS+tAcC5fGzXPoD9Q+rCqn1Z0LeiAmCHcCDw9LCTQ7Fu RWT7id9awmA= =JakC -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Dave Hodgins Area: Public Key Encryption To: Jeff Trowbridge 31 Dec 94 15:51:00 Subject: Pgp Problems UpdReq -----BEGIN PGP SIGNED MESSAGE----- JT> MSGID: 1:215/705.6 a0b7c4c6 JT> But when I try to respond to a post in an echo I save the original JT> message, open the editor to the message, type my response, save it, JT> back to Ppoint, open the editor again, but when I run JT> pgp -sat response.asc I get a completly encrypted message. When you reply to the message, do you get a line like the MSGID line above? Or a pcboard extended header (long subject line, etc...)? I've removed it from the above, but when I select reply to a message here, the msgid word is preceded by a byte with hex 01. When PGP sees a "non-standard" text character, it forces the ascii armour mode on. What it generates, is an ascii armoured message, not an encrypted message. Regards, Dave Hodgins. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLwXEc5bACHtihSGlAQGoFwP8CgtOb7ieLZzVrrjk3eEfHRXZFa8TZAQ4 5awojXox0pJS/CL2Qhdw/OjpYBijmWDH0bjv4DRxM9XcP2/uaoPPIuiFW4WD2oNx w8hgr06pWPJyKgjkSdl09mucPI2WxLVV2qPjGXApNWDoaXRBychyd+dIDcdGnWz8 B81/l5Qc/Vg= =uFn7 -----END PGP SIGNATURE----- **EZ-PGP v1.07 --- * RM 1.3 00820 * Internet:Dave.Hodgins@Canrem.com Rime->118 Fido(1:229/15) 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: David Chessler 1 Jan 95 13:56:00 Subject: Re: key revoke UpdReq Despite the stern warnings of the tribal elders, David Chessler said this to Shawn Mcmahon: DC> Any quotation is a weak password. All true; this, and the other things you stated. However, the way human memory works, remembering a multi-character random string is a difficult and perilous course for most folks. A quotation beats a word, and it beats two words seperated by a shifted number key. :-) 201434369420143436942014343694201434369420143436942014343694718 From: Jonathan Benjamin Area: Public Key Encryption To: Uucp 29 Dec 94 13:44:00 Subject: Re: Encryption to be ban UpdReq To: president@whitehouse.gov ___--BEGIN PGP SIGNED MESSAGE----- N8> We all knew it was coming, here it is: N8> Washington, DC -- If private encryption schemes interfere with N8> the FBI's ability to wiretap, they could be outlawed, according N8> to recent comments made by the agency's Director Louis Freeh. N8> Freeh told attendees here at the recent conference on Global N8> Cryptography that if the Administration's Escrowed Encryption N8> System, otherwise known as the Clipper Chip, failed to gain N8> acceptance, giving way to private encryption technologies, he would N8> have no choice but to press Congress to pass legislation that N8> provided law enforcement access to *all* encrypted N8> communications. N8> N8> If, after having pushed Digital Telephony through Congress (which N8> hadn't yet happened when Freeh spoke at this conference), all the N8> Bureau ended up with during wiretaps were the scratchy hiss of N8> digital one's and zeros being hurled back and forth, Freeh made it N8> clear that he would seek a congressional mandate to solve the N8> problem. N8> In other words: Roll your own coded communications; go to jail. N8> Freeh's comments, made during a question and answer session at the N8> conference, are the first public statements made by an N8> Administration official hinting at a future governmental policy N8> that could result in the banning of non-governmental, unbreakable N8> encryption methods. Uh, excuse me Mr. President.....do you care about the Constitution any more? I thought that a free society, or at least a society with democratic ideals, would frown upon unwarranted (literally!) intrusions into the private communications of its citizens. Please, Mr. President, stop this madness. When the government takes away the rights of citizens in an effort to cure societal "ills", that is to some degree a compromise of the spirit upon which this country is founded. You are behaving like a paranoid autocrat. What could the US goverment possibly be afraid of, if they are doing their appointed job, that is representing the best interests of the country on the whole? Could you be afraid of the truth? Sorry to use this word, but it is true: you are behaving like the worst kind of socialist. Freedom is an easy word to talk about in flowery speeches, but hard to exercise in practice. Freedom is dangerous; freedom often involves hard choices and the courage to say "no" to those who lose spirit and want to return to the safety of dependancy. Freedom is the courage to let mankind become better in their own way, on the way making lots of mistakes, to be sure. Freedom takes faith that the divine aspects of existence lend a hand in misterious ways to our lives. Freedom knowing that the wisdom of the individual life is more profound than the blunderings of 100 well-meaning beaurocrats. Freedom involves ever- present risk, with the recognition that that same risk also contains the bountiful seedlings of opportunity. Freedom is not safe, but freedom is worth every mistake, every sacrifice, and every drop of blood shed from our forefathers to make it a possibility in our lives. But the battle for freedom is not over, not by a long shot. Mr. President, in your quest for expediency and easy answers, are you honoring the higher calling that your office demands? Are you sacrificing the personal freedoms of our citizens on the altar of social engineering? As an old piano teacher of mine used to say: "Think ten times, and play once" Please think not just with your political brain, nor your well-meaning emotions, but with your higher wisdom. The inner voice, if you will. Think ten times, and play once. Also, in the same spirit, please do what you can to call off the prosecution of Phil Zimmerman, the creator of Pretty Good Privacy, the freeware e-mail encryption program. He has done nothing wrong except beat the spooks at their own game, and given his creation to the world. I think the man deserves a medal, and not jail time. Speaking politically, the man is also becoming a hero to many of us here on the net, and further government persecution in the name of justice will not look very good. Every day there are more of us. I voted for you in '92, thinking that you were a moderate Democrat. I want from my president fiscal conservatism (real fiscal conservatism, not that stupid "well we're diminishing the growth of gov't spending, therefore we're reducing the deficit" do you really think we're all that stupid?) and openness to new ideas (as opposed to the moral conservatism of the Republicans). To be blunt I want someone with the 'nads to dismantle the bloated, power-crazed, money driven Congress, run by special interest groups (some of which are FUNDED by Congress, and WHINE over talk of cutting off that funding...I'm not naming names here). I want someone with the personal and political courage to introduce legislation aimed at taking ineffectual and oppressive laws off the books, rather than further mucking about with yet more overly complex legislation that only a team of lawyers working full time could possibly understand (and y'all wonder why NO ONE trusts the government?). Look, if the Health care reform bills takes thousands of pages, it simply has to suck.... think about it.....:) So in closing, I wish you and your family a healthful and happy New Year. Let's make this country great again, but letting freedom be a philosophy of government rather than a lovely sound bite. Sincerely, Jonathan Benjamin jonathan.benjamin@f1776.n106.z1.fidonet.org P.S. I just KNOW that you inhaled.....so I know you can't be all bad :) ___--BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBLwMJz7HLP6lAilrxAQFdDgf+JiSb9O4oxbpwWKqqM4JxgKwjKrAUagX6 HvoDTe9xFGTzyKDhvKCN5wLl9Kh71ZTZik4ZpeaTZ7SDnhIK6x9brKCbA7vx36h0 7SpDOKnouyNoGN0YOS7CpfqwILG5c/HSg+iT4kd2rjQiH5gulLaN7U6eG/Bw6BQB ajzNlAOFAP4i6jM10p1OKCbkoIJE1dUjDyJyvOXpa2teAhq/qyaaTy1LyLojsnTI BspKmaJ6cNrekXsgtal955q7Wlt0QlGSV9EeKhAwBNZt2wYh3o1rtbPyfwRGGGKb ZniRQ//5jDDM7cE4DDE3r9PjlWfyMxV8yYC4X+B7qKRAb7P8DROgqA== =++Fb ___--END PGP SIGNATURE----- PGP key available upon request ~~~ PGPBLUE v1.7 ~~~ PGPBLUE v1.7 ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: David Chessler Area: Public Key Encryption To: Shawn Mcmahon 29 Dec 94 23:15:00 Subject: Re: key revoke UpdReq On 12-26-94 (09:15), Shawn Mcmahon, in a message to Jason Carr about "RE: KEY REVOKE", stated the following: SM>Yeah. If you don't write "my PGP passphrase" on the top of the slip of >paper, this might not be a bad idea. If, say, your passphrase is a line >from a favorite poem, merely putting a copy of the poem in your box >might be enough to jog your memory. Any quotation is a weak password. There are many quotation files which can be used in dictionary attacks. Putting the text in with the PGP keyfiles is very weak--even if you habitually keep poetry stored with your computer disks. SM>If your password is a string of numbers, you could always put something >like "for emergencies, call" and the number. SM>Or variations on the above. I had a friend who used a variation on the >latter to store a copy of his ATM PIN. He put an ex-girlfriend's name >in his address book (one he hated, so he wouldn't forget ) and put >the local exchange followed by his PIN. 7 digits, looked perfectly >legit. It's weak, again. It's fine for ATM pins, but for a serious attack, the adversary is going to check every phone number to see if it works, or if it might be a disguised key to something. Indeed, every phone number in your book, including the real ones, might be the key (so having a fake phone number may make it easy for the adversary who has obtained a copy of your book). Don't you have a phone number which you will never forget, but which can't be easily traced to you? Perhaps your father's work phone 10 years ago? Perhaps your library card number, from before they went to the system with barcodes? SM>You should *ONLY* do that if the piece of paper is fairly secure, >however; a piece of paper in your desk is *NOT* secure. If you're >relying on the physical security of your office or bedroom, you might as >well use your freakin' name as the password 'cause it'll be that easy to >break. I use phrases and numbers I'll never forget, but which are not in any book of quotations, or written down, or easily traced. The use of two or more quotations, or a quotation and a number in a single passphrase, will be more secure, since it's harder for a dictionary attack. But try not to write things down. That way lies disaster. I admit, however, that the average person will have only a few good passphrases of this type. That is a bit of a problem if the pass phrases are weak. If they are very strong, there is a risk (that if one is exposed, all will be), but the risk may be a lot less than the risk that your adversary will get access to the slip of paper. I must admit that, during the PGP demo I gave this year, I messed up one pass phrase. And that was for one of the dummy keys, so Bob's passphrase was Bob, but there must have been a typo. (In Bob? I must be getting old. I should have used my grandmother's phone number {but that would have meant exposing it in public, and there's no guarantee I wouldn't have typed that wrong, too}). ___ __ chessler@trinitydc.edu d_)--/d chessler@capaccess.org * SLMR 2.1b * E-mail: ->132 1:109/459 david.chessler@neteast.com 201434369420143436942014343694201434369420143436942014343694718 From: Jeff Trowbridge Area: Public Key Encryption To: all 30 Dec 94 09:49:00 Subject: pgp problems UpdReq -----BEGIN PGP SIGNED MESSAGE----- Hi All, I'm having a problem with putting a pgp signiture on mail responses and hopefully someone can give me some help. When doing a new message (like this one), I do the following; 1) open the editor and type the message 2) save the message (EX: file.txt) 3) run pgp -sat file.txt 4) close my editor and open my mail reader (Ppoint) 5) use the enter message command to open the editor and then merge the file.asc that was created in step 3. 6) I then have a message with a pgp signiture (like this one hopefully wiill) But when I try to respond to a post in an echo I save the original message, open the editor to the message, type my response, save it, back to Ppoint, open the editor again, but when I run pgp -sat response.asc I get a completly encrypted message. Does anyone know why it does this? Thanks, Jeff -----BEGIN PGP SIGNATURE----- Version: 2.6 iQBVAwUBLwRH+2RY5iFpzdvJAQHX7AH/YCPxvXvaEpg5GC0Buu3i9y2WArwkyRJQ JGkeJk18uztWrEoE9Q8Xpj/TDmLNuhzDkPPwmUMCA6ho0MjuVJeobA== =ft3b -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: L P 30 Dec 94 12:59:26 Subject: Re: Can I Freq Pgp? UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 28 Dec 94, L P was quoted as saying: LP> Where can I FREQ 2.6.2? Is there a text/faq that I can FREQ that right here as PGP. LP> could someone please fill me in on the "bottom line" differences LP> between the versions? 2.6.2 is current. all the others are not. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBLwRKg8sQPBL4miT5AQGnFgP/SxeschLbCtwUaT4CATB8x5DC9AVxZSkU H4dhOQUO72HRW1GOgWzMmTk3HxFGj/E+MptH6maemMl8UY91OmpTdblNiX0bpFzF GYQSPnV4FzVpY0zTYTWM4CbXO2BoE/wuvOcqWZsdB7R7M6+xG2G8Bdr0tv/4KkkU tMwQvSW8hgE= =oJO1 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Glen Todd Area: Public Key Encryption To: Phillip Barker 30 Dec 94 15:41:00 Subject: Freq Latest Ver of PGP? UpdReq -----BEGIN PGP SIGNED MESSAGE----- Despite the advice of tribal elders, Phillip Barker said Freq Latest Ver of PGP? to All PB> If your are a Sysop and permit freqing, would you mind if I got the PB> latest ver of PGP from your system? Just reply with your consent along PB> with whatever filename and I'll do the rest! Phillip, I have the latest version (2.62) here at High Reaches. Will send it along with my next packet to you. Ves thu heil und Gut Jul, // Glen ********************************************************************* * 1:128/203 * High Reaches CyberSchool BBS * 93:9900/12 * * Where the Information Superhighway crosses the Rainbow Bridge * * 74:4001/0 * PGP key 669FE745 - freq PGPKEY * 19:300/400 * ********************************************************************* -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLwR+ch1IzyRmn+dFAQG7TwP8DBOtMv2+IdcJa5bB+C9Zxadnpwc+mS3T ZhGIkISUm+iVRITlt1bRninA8kg4H7tlB19SHbxAWA5uoXwDl1pHZ5HLz+so3fZO rHgiu9fli+2vI28KqdlVvRmrGpkiaeUixL+oukPwGCrhN5Kz4Y6wYi4HWW1yWzse CE47LqD9d6I= =NmnZ -----END PGP SIGNATURE----- ~~~ PGPBLUE 2.5 ... Catch the Blue Wave! 201434369420143436942014343694201434369420143436942014343694718