From: Ryan Shaw Area: Public Key Encryption To: All 22 Jan 95 17:29:32 Subject: PassPhrase UpdReq Is there a way with PGP to change your passphrase without changing one's public key? Internet: rshaw@gladstone.uoregon.edu ... Bill of Rights: Void Where Prohibited By Law 201434369420143436942014343694201434369420143436942014343694718 From: Jeffrey Bloss Area: Public Key Encryption To: Alan Pugh 22 Jan 95 17:39:00 Subject: Re: Can I Freq Pgp? UpdReq AP>> encrypted traffic _will_ become more common in the future as the AP>> tools for doing so are improving and becoming easier to use. AP>> corporations will demand it. the government, despite their best FWIW, encryption HAS seen some extensive use in some circles since about 1976. DES was made ANSI an standard on November 23, 1976. At the time it was used primarily for transmission of unclassified military communications, but by 1982 the banking industry was using DES for almost all it's security needs too (ANSI X9.8). In fact the American Bankers Association is probably THE primary user of encryption and encrypted message traffic outside the government proper. This is why the NSA is pressuring them to adopt clipper. Funny thing is, even though the NSA "guarantees the security" of the clipper and capstone algorithms, they refuse to use it themselves, or release ANY information about the algorithm. First rule of cryptography... if the security of your protocol relies on the secrecy of your algorithm, it's not. ;) jbloss@meadville.com -=- 1:2601/551.0 -=- ->5317 PGP v2.6.2 public encryption key available by request. 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Richard Dale 22 Jan 95 10:33:16 Subject: KEY REVOKE UpdReq -----BEGIN PGP SIGNED MESSAGE----- Richard Dale wrote in a message to Jason Carr: RD> If you take precautions, you can play around with PGP RD> and have no worries. If you don't make the back-ups, RD> you can find yourself erasing some files which can never RD> be decrypted. I found that out the hard way. I didn't Yep, you're right. That's the ticket. jason ... If this were an actual tagline, it would be funny. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP_ECHO: CypherEcho to the gods... iQCVAwUBLyKlM0jhGzlN9lCZAQFr/QP6A5QHGgsWfqXSJddMN11x4mr433WthMKj aJpp02hgI6O2Gn4WUnE6ZKtUAvRMgZIPt7HED/S/PBterlAFNFGfZDSh9iL4lbfU X9vxVDnY18KC/iKUlvbvIOstJS5sgyq+U6eGTnGWkJ8YgPdVp7k3WvplsB3jnmfx eDC3ZlHI9w8= =vgL9 -----END PGP SIGNATURE----- ... Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: Aaron Goldblatt Area: Public Key Encryption To: Jeff Trowbridge 22 Jan 95 07:18:58 Subject: pgp problems UpdReq JT> BTW, when you encrypt a file with the ascii armour (.asc extension) JT> is it just as secure as one encrypted by binary (.pgp extension)? Yes. D'Artagnon 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Wes Perkhiser 22 Jan 95 15:57:16 Subject: KEY REVOKE UpdReq -----BEGIN PGP SIGNED MESSAGE----- Wes Perkhiser wrote in a message to jason carr: WP> Well, I HATE to admit I might have been wrong, but it looks WP> like your way will work if you answer "NO" when PGP asks if WP> you want to remove the secret key as well. Well, I don't think of it as right or wrong; we're just trying to try out the capabilities and behavior of a complex piece of software. :) WP> I would have sworn that the revocation would also revoke the WP> secret key as well, but it looks like it only affects the WP> public half. At least, I tried your way and it DID work. WP> Is the failure to effect the secret key a bug or a feature? I 'spose it's a feature if we're aware of it and use it for our own needs. According to the docs, it looks like the whole revocation scheme was kind of an interim thing anyway, kinda kluged together. jason ... "I'll have the dark bread," said Tom wryly. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP_ECHO: CypherEcho to the gods... iQCVAwUBLyLy0EjhGzlN9lCZAQHcFgQAuHb2W6s1yHULQYOMvmWsrGDq9oiRRLjy 2X7O7JpL/VYdtQ9tyauOKTJb7haURVBxlvdLUYFVU2liOqWt5BCPGpzs+2RUcdK8 ZB5OdAvslk6RaVz/V5U9lRHyP76f+vwojBB9i7zRbtN3k8g08t5OEfm7Sxb1EHjQ lzS0xqYCUNo= =BDdl -----END PGP SIGNATURE----- ... Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Tim Witteveen 22 Jan 95 16:01:32 Subject: PGP and BWave UpdReq -----BEGIN PGP SIGNED MESSAGE----- Tim Witteveen wrote in a message to All: TW> I recently acuired PGP 2.6.2. I have tried to send a TW> message to the friend who gave it to me. I am useing BWave TW> 2.12 Off-line mail reader. How should I go about actually TW> doing this. Do you find it easier to write your messages TW> before or after you go into your Mail-reader? If you do TW> write it before, do you sign and/or encrypt it before you TW> load it into your reader, or do you wait until you have your TW> reader open, write your message, save it, shell to dos, TW> sign, encrypt and ASCII armour it, then add your address to TW> the top line? Here's how I call PGP from BWave. Keep in mind it's a work in progress, and will certainly need tweaking/rewriting on your end. @ECHO OFF :: BW-PGP.BAT, a way to make BWave call PGP for encryption, :: decryption, clearsigning, and viewing. Dissect, hack, correct :: and distribute as desired. I'm sure it needs lotsa help; let :: me know the fixes so I can update my copy, too. :: :: This .bat requires the following: :: * Dos 6.XX, b/c of the CHOICE command, or GET or something :: to make the crude menu in the :pgptest label. :: * The "editor" called in BWAVE Directories must be this .bat :: Like so: "C:\BW\BW-PGP.BAT @F" :: * When replying to a msg that has some form of PGP in it, the :: msg must first be (S)aved as BW.PGP in the directory where :: BW-PGP.BAT is. :: :: NOTES: :: 1) You will need to change the .bat to reflect your own :: directory structure, and choice of .txt editors. Qedit :: (Q.EXE) is the editor being called here. Insert your :: fave-o-rite editor wherever Q is called. BW-PGP.BAT is :: a mutant strain of CALLQ.BAT, which did the same thing :: for timEd. :: :: ----------------------------------------------------------- :: Note: The following section has been moved to the autoexec.bat :: ----------------------------------------------------------- :: Sets echo respondents in one variable (multiple recipients) :: 4df65099=me! :: 79410d5d=ls :: 98cbe9bd=th :: 01dd44a9=dh :: 08c756dd=ak ::set friends=0x4df6 0x7941 0x01dd 0x1b36 ::set echo=%friends% 0x98cb 0x08c7 :: ----------------------------------------------------------- :: RENaming the %1 parameter :: Because of a strangeness in clearsigning, the name of :: the file passed to this .bat must be changed. DOS chokes :: when you try to REN a passed parameter (like %1), thus :: the COPYing gymnastics. :: NOTE: Rumor has it that MS-Dos 6.xx can handle RENing a :: parameter. :: ----------------------------------------------------------- copy %1 c:\bw\bw.msg if exist %1 del %1 cls :: ------------------------------------------------------------ :: Needs to know whether to look for TIMED.PGP or TIMED.MSG :: because TIMED.MSG has indented quotes that choke PGP :: ------------------------------------------------------------ if exist bw.pgp goto unpack goto edit :unpack del bw.msg pgp bw.pgp -o bw.msg :: ------------------------------------------------------------ :: If the decrypt fails (sig or post), BW-PGP goes to edit :: TIMED.PGP, as the sig could've just gotten grunged. Of course, :: if you can't decrypt an encrypted post, this .bat won't do you :: any good, anyhow. :: ------------------------------------------------------------ if errorlevel 1 goto fail del bw.pgp goto edit :fail pause cls echo PGP failed! Editing armor block... pause q bw.pgp goto unpack :edit :: ------------------------------------------------------------ :: Actual editing happens here. :: ------------------------------------------------------------ q.exe bw.msg cls :: ------------------------------------------------------------ :: Poor Speller? :: ------------------------------------------------------------ get c "Spellcheck?" yn if "%get%" == "N" goto pgptest if "%get%" == "Y" goto spell :spell c:\spell\ss bw.msg :pgptest :: ------------------------------------------------------------ :: Ahhh, the goodies! :: [E] choice invokes the %echo% environmental variable :: [F] invokes the %friends% environmental variable :: ------------------------------------------------------------ cls echo C == Clearsign echo E == encrypt to the trusted participants in pgp_Echo echo N == No pgp echo Y == encrypt - specifY user id or key id when prompted echo F == encrypt to Friends echo. get c "Choice? " ynecf if "%get%" == "C" goto sign if "%get%" == "E" goto group if "%get%" == "N" goto switch if "%get%" == "Y" goto show if "%get%" == "F" goto friends :show :: ------------------------------------------------------------ :: Displays keys on keyring, in case you can't :: ember. :: ------------------------------------------------------------ cls pgp -kvm :: ------------------------------------------------------------ :: Radix-64 encryption :: ------------------------------------------------------------ pgp bw.msg -ea -o bw.msg goto switch :sign :: ------------------------------------------------------------ :: I can't seem to get the -o switch to work while clearsigning, :: hence all the file renaming excitement. I'm not saying it :: can't be done, only that I'm not going to wrestle with it. :: ------------------------------------------------------------ pgp -sta +clearsig=on bw.msg del bw.msg ren bw.asc bw.msg goto switch :group :: ------------------------------------------------------------ :: This will encrypt the msg with all the hex IDs in %ECHO% :: ------------------------------------------------------------ pgp bw.msg %echo% -ea -o bw.msg goto switch :friends :: ------------------------------------------------------------ :: This will encrypt the msg with all the hex IDs in %FRIENDS% :: ------------------------------------------------------------ pgp bw.msg %friends% -ea -o bw.msg goto switch :switch :: ------------------------------------------------------------ :: This section is for adding anything you want to the end of :: the reply. I add in my key "fingerprint," stored in FINGER. :: Then the file is copied back to its original name. :: ------------------------------------------------------------ copy bw.msg + finger %1 del bw.msg goto end :duhhh :: ------------------------------------------------------------ :: Duhhhhhh.... Forgot to save the non-quoted ver. No problem, :: will just recycle back to timEd so you can try again. :: ------------------------------------------------------------ cls echo. echo You forgot to (W)rite timEd.pgp!!! echo. pause goto end :end if exist *.bak del *.bak if exist bw.pgp del bw.pgp :: Have a beer. Get some sleep, too. :: :: jason carr :: the Penny University BBS :: Irving, Tx 214.65.0382 :: 1:124/3208 :: 88:214/109 :: 99:817/0 :: 99:817/1 :: 150:151/110 :: 250:214/100 jason ... "I need a home run hitter" he said ruthlessly. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP_ECHO: CypherEcho to the gods... iQCVAwUBLyLyckjhGzlN9lCZAQFsBwP7BGpFPfuAvZRE+MGB0uf/dpHh4ccaO1V7 y6sJNBpmlXJDF5dn1vxdEzFX3BsyR2QVxx7x6g2dw3xg4G3HSIn70ZNkKd38XCsq JZYjqMoajA1NzL+30jWUkMtD4ssNPSd84rTRyFGWhMXCBSEe+AwFic0m3qCBxN/e vMZRza8bQys= =8z0p -----END PGP SIGNATURE----- ... Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Ian Hebert 22 Jan 95 17:26:46 Subject: Re: Verifying PGP Keys˙˙˙˙˙˙˙ UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 21 Jan 95, Ian Hebert was quoted as saying: CB> you should NEVER certify a key you have not personally obtained CB> directly from the source. IH> It might be better to say that you should never certify a key that IH> you have not verified personally with the source; you could get a IH> key from a keyserver, and if the source validates the fingerprint IH> then the key is valid. i do not consider a keyserver directly from the source. the source is the home system of the originator or the originator's own hand in the above reference. IH> It is not necessary to get the key directly from the source IH> everytime, although it is a good idea when feasible. i would not sign a key from a keyserver. once i became aware of the key and had a need for it, i would go get it from the originator. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBLyLbqcsQPBL4miT5AQHZ7QP/VaMCeIOswAD9XnmaFzMzEdUD+OGGGlgT LWF7qxHpH/FIjWK2dTmQdsjXd9bmGEbjp3FPmJ5SkEwDkNtAGHTSz3IRKOW/BUWN 0GMHb+SiphwCUpCAa8fP1BqjsO9nH+B+N34wgyU3SRCPTREuDNe2CAUHbwfrGEbv TB++N+MvEeg= =Vea+ -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Tim Witteveen 22 Jan 95 17:28:02 Subject: Re: PGP and BWave UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 19 Jan 95, Tim Witteveen was quoted as saying: TW> who gave it to me. I am useing BWave 2.12 Off-line mail reader. TW> How should I go about actually doing this. Do you find it easier to there are several PGP/BlueWave shells available. freq PGPFILES from this system for a related filelist. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBLyLb9csQPBL4miT5AQEpfwP/ZJzo5FDPJqYC/q5m/X/nGyHRHGRRyyvi mT7KhGRIfI7DHLcCDXN4X4wlTEQe8B36wuprvL6mIIj9Az9P9YHy++Lw8jo3kRpU t+kgnr4lbjYAdq4O92LKYS8dTYBC3Lw7dekghxozdB7nfeRMqUM1MsOFr3y3Mtsm t6BYWHVzAXo= =Szk1 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Alvin Peh Area: Public Key Encryption To: All 5 Jan 95 15:25:10 Subject: SJI and IJ People. UpdReq Hey! I was hoping that all past and present people from SJI and IJ would write to me. Tell me which year and class please, I'm just curious....and bored. I'm a former Josephian myself. I'm politely asking that those who should not be replying to not butt in, thks If you want to chat, I'll welcome that gladly, just write a new mail and maybe flood my mailbox. ... Hello, I am part number --- 201434369420143436942014343694201434369420143436942014343694718 From: Jesus Rafael Lee Area: Public Key Encryption To: All 16 Jan 95 15:24:10 Subject: SJI and IJ People. UpdReq From: ztorrida.UUCP!jrlee (Jesus Rafael Lee) In article <789337524@f725.n600.z6.ftn> Alvin Peh writes:>Hey! I was hoping that all past and present people from SJI and IJ would write>to me. Tell me which year and class please, I'm just curious....and bored.>I'm a former Josephian myself. >I'm politely asking that those who should not be replying to not butt in, thks >If you want to chat, I'll welcome that gladly, just write a new mail and maybe >flood my mailbox. >Excuse me, this is an echomail conf., for the discussion of PGP Public Key not a chit chatting area. Please introduce yourself somewhere. -- +----------------------------+ +-----------+ Jesus Rafael LEE PUAY YORK +----------+ | jrlee%ztorrida%linuxpub@csar.csah.com | | Jesus.Rafael.Lee@p1.f203.n600.z6.fidonet.org | | uunet!m2xenix!puddle!6!600!203.1!Jesus.Rafael.Lee | +---------------------------------------------------+ --- ifmail v.2.8 201434369420143436942014343694201434369420143436942014343694718 From: Gordon Campbell Area: Public Key Encryption To: Ian Hebert 22 Jan 95 21:49:16 Subject: Can I Freq Pgp? UpdReq On (21 Jan 95) Ian Hebert wrote to Gordon Campbell... IH> & Company implemented similar controls, so that one had to apply to IH> Ottawa, but when one applied to Ottawa, they still checked with IH> Washington.... sigh....) I guess we became the 53rd - 63rd states when we weren't looking... ... . 201434369420143436942014343694201434369420143436942014343694718 From: Ryan Watson Area: Public Key Encryption To: Ryan Shaw 23 Jan 95 22:15:58 Subject: Re: PassPhrase UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message of 22 Jan 95 Ryan Shaw wrote to All: RS> Is there a way with PGP to change your passphrase without RS> changing one's public key? I believe that there is an option to edit your key, of course you'd have to know I wouldn't be able to tell you how to do it. But it can be done. R. Matthew Watson (BVFD Unit #1821) -----BEGIN PGP SIGNATURE----- Version: 2.6 Comment: PGP & Amiga, a forever winning combination! iQBVAwUBLyR++AmcRtNX1uOhAQF2OwIAg3/o7lYleWW2dARIVX5wulOdussJC5SD IgIX1284Oh7nhFVEsTzplszKojJ3+JrHdxjXAkjmsOrYfcfgSUBW1w== =wi4E -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Will Rhodes Area: Public Key Encryption To: All 23 Jan 95 11:30:24 Subject: can u FTP ol' PGP? UpdReq can a person get PGP 2.6.2, and / or PGP FAQ's via Internet FTP? IF so, at what FTP address? sincerely, U.S. citizen, living in the U.S., - Will ... Sorry, the cat ate my existence. 201434369420143436942014343694201434369420143436942014343694718 From: Chris Adams Area: Public Key Encryption To: David Chessler 23 Jan 95 19:51:12 Subject: Quotes as passphrase UpdReq On (19 Jan 95) David Chessler wrote to Jim Gorges... DC> At some point the passphrase can only be attacked by brute force (which may DC> mean rubber hoses on the person who knows the phrase). Generally, two or Which is why it would be neat if PGP had a FAKE password that, when entered, would "accidently" reformat the harddrive after wiping the key! ... tlhIngan Hol Dajatlh'a? (Translation: Do you speak Klingon?) 201434369420143436942014343694201434369420143436942014343694718 From: Chris Adams Area: Public Key Encryption To: Jim Bell 23 Jan 95 22:53:26 Subject: PGP News 2 UpdReq On (21 Jan 95) Jim Bell wrote to All... JB> Contrary to popular belief, the NSA can decrypt public keys of most JB> practical key sizes. However, the computer resources needed to decrypt JB> public-key-encrypted messages make it difficult for the NSA to perform Does anyone know what they consider practical size? Also, has anyone considered moding the PGP code for, say, 32kb keys? (Sure, it's a LITTLE slower, but most of it is done in IDEA anyway. BTW, has anyone increased the complexity of IDEA (ie, larger sizes, etc)?) Wouldn't hurt to use the added capacity of these expensive computers... JB> broadband intercept and decryption if many end users use public-key JB> encryption. Best reason for doing so! ... The current cost of taxes = your penalty for voting for Bill & Hillary 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: Ryan Shaw 24 Jan 95 00:20:54 Subject: Re: PassPhrase UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message dated: 22 Jan 95, Ryan Shaw was quoted as saying: RS> Is there a way with PGP to change your passphrase without RS> changing one's public key? sure: pgp -ke userid works for both names and phrases. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBLySOOssQPBL4miT5AQHnWQP8C1uA7e4WIeh72yegOmHOfgfnzo9rdp27 y6zdlr6e3AS5MrtS9arhnuUYBYG6OcGvQCO7YbjiSpUDaw7zPagPgjfcI8RpcRR4 IrSonVGtx9ZT0hPp+KQ/micsI1CVQ0+ZyOobbdj52ljzClX3f48SmxO1wXayDPBS sQQS74b64Qc= =yv0D -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Richard Dale Area: Public Key Encryption To: Alan Pugh 22 Jan 95 06:48:10 Subject: Re: Can I Freq Pgp? UpdReq AP>*some would claim that allowing encryption in echo traffic will cause AP>*a deluge of such posting that would swamp the public nature of the AP>*net. this is not the case, except in echos where traffic is AP>*_supposed_ to be encrypted. people have a pretty good idea of what is Four or five years ago something similar came up on the Star Trek conferences. Those of us who got to see the show on the original Sunday night satellite feed or Monday night broadcast wanted to start talking about the show. That raised a howl of protest from those who didn't get to see the show until Friday. In response, I whipped up a little program which would allow users to write up an ASCII file, run the program, and have each letter shifted down one in the alphabet (IBM = JCN). The recipient could run the program again and have the letters shifted back up. Sheesh! You wouldn't believe the response. It was claimed that sysops couldn't monitor the mail (as if sysops read every message anyway) for obscene language. That never held much weight with me. I feel that most people know when not to use obscene language, and if they're prone to use it, they'll use it in a conference whether or not the message is enciphered or encrypted. Besides, once you read a few messages that have the letters shifted down one character, you can almost read them off the screen without any deciphering. It's not like we were using anything as "complicated" as a Playfair square or anything. * 1st 2.00b #567 * My dream: CHKDSK C: = 9893567498124537564 bytes remaining 201434369420143436942014343694201434369420143436942014343694718 From: Matthew Stuart Area: Public Key Encryption To: Any User. 23 Jan 95 12:36:52 Subject: Files UpdReq I need to know were I can find .GIF and .DLL files on this BBS. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Jim Bell 24 Jan 95 14:33:10 Subject: PGP News UpdReq Despite the stern warnings of the tribal elders, Jim Bell said this to All: JB> [JB note: Somebody ought to find William Keane's _home_ address and JB> post it on the Internet. After a few hundred nasty-grams have arrived, JB> maybe this numbskull will get the picture.] Or, he might decide to retaliate by taking it out on Phil. Very, very bad idea, Jim. I'm surprised to see you posting it. 201434369420143436942014343694201434369420143436942014343694718 From: Brian Maloney Area: Public Key Encryption To: All 22 Jan 95 10:43:00 Subject: PGP for Hudson-style... UpdReq Does anyone know if there's a way to run PGP on a Hudson-Style Message Base? Right now I have to manually go into each message I want to verify... ... "My upbringing is filled with inconsistent messages." 201434369420143436942014343694201434369420143436942014343694718 From: Alan Pugh Area: Public Key Encryption To: jason carr 21 Jan 95 20:18:24 Subject: KEY REVOKE UpdReq jc> 1) Extract GOODKEY to a file (GOODKEY.ASC) jc> 2) Revoke the GOODKEY on the public ring. It is now REVKEY. jc> 3) Extract REVKEY to REVKEY.ASC (this is the stored revocation jc> all this is designed to produce). jc> 4) Delete REVKEY from the public ring. jc> 5) Import GOODKEY.ASC into the pub ring, recreating GOODKEY. jc> The =only= difference in our scenario here is that our unfortunate jc> fellow forgot to do step one. Or did he? No, he'd extracted GOODKEY jc> to GOODKEY.ASC in November. jc> So all he has to do is step five. PGP doesn't know if the jc> GOODKEY.ASC was extracted for the purpose of dissemination your key, or jc> just to be re-added after REVKEY is extracted and deleted from the jc> ring. i think something is being missed here. when you extract goodkey, you are extracting just the public component of the key, not the secret component. when you perform the above steps, would not your secret key still be revoked after you added goodkey back in? i'll play around with this a little and see what happens. i still think the easiest way to generate a safe revokation for future use would be the following... 1. COPY *.PGP *.GPG ; creates a backup of your public & private rings 2. PGP -kd MYKEY ; revoke the key 3. PGP -kx MYKEY ; extracts revoked key 4. COPY *.GPG *.PGP ; copy backup keys into production 5. DEL *.GPG ; del backup keys if you'd like, you could replace step 3. with the following... 3a. COPY *.PGP *.REV ; creates backup of revoked keys the extraction step is not necessary until you need to distribute it. should something happen like you forget your passphrase, all you'd have to do is 1. COPY *.REV *.PGP ; copy revoked key to production 2. PGP -kx MYKEY ; extract revoked key 3. PGP -kg ; generate new key amp <0003701548@mcimail.com> January 21, 1995 20:18 ... Copper wire came from two lawyers arguing over a penny. 201434369420143436942014343694201434369420143436942014343694718 From: Reed Darsey Area: Public Key Encryption To: All 25 Jan 95 03:24:48 Subject: PGP front end for Eudora? UpdReq Is there a PGP front end for "Windows Eudora Version 1.4.2b16"? Somebody I wish to communicate with has the Eudora mailer. What should I tell them to get to aid using PGP? (I am familiar with the various DOS front ends, but not the Windows ones.) 201434369420143436942014343694201434369420143436942014343694718 From: Rich Veraa Area: Public Key Encryption To: Jim Bell 23 Jan 95 16:50:10 Subject: PGP News UpdReq -----BEGIN PGP SIGNED MESSAGE----- In a message to All, Jim Bell wrote: JB> Last week, Philip Dubois, Zimmermann's lead counsel, met JB> with U.S. assistant attorney William Keane, the government JB> lawyer handling the case. Dubois sought to persuade Keane JB> not to proceed toward an indictment that could result in JB> sactions of up to 10 years in prison and $1 million in JB> fines. JB> [JB note: Somebody ought to find William Keane's _home_ JB> address and post it on the Internet. After a few hundred JB> nasty-grams have arrived, maybe this numbskull will get the JB> picture.] You'd only make him mad. Any such outburst would only convince him that we represent a real danger, and put Phil's neck in a noose sure as hell. Cheers, Rich -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: rveraa@907.sunshine.com iQCVAwUBLyP7Jp80iJ+tnwVVAQEYPwQAmzpF+4svTNzfy0URbrrEQJ+AEXFSM16d TRUc1UgsXeeFRGkT24PNCL4fyXLIFoBiJ4Zv37qAUrT96/kaueq6ztE5zyydfZ8h BUVWxSti16nQwqSGpsnd0JDVbArhy9x8FJ5Q4Gm1UmW7HOrhRla5vecuydHlD4Ej OeTQdr83Kpc= =Q0M9 -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Mark Drew Area: Public Key Encryption To: Tim Witteveen 24 Jan 95 07:57:00 Subject: Re: PGP and BWave UpdReq -----BEGIN PGP SIGNED MESSAGE----- -=> Quoting Tim Witteveen to All <=- TW> I am useing BWave 2.12 Off-line mail reader. As am I. I am also using Ezquote v. 4 as the editor TW> I would appreciate any hints or help with this. I have not had TW> any luck so far. If you are using an editor such as Ezquote, you can write internal macro(s) and assign it/them to "hot-keys" for execution from within the editor. This message was signed from the edit screen of Ezquote and before it returned to Blue Wave. The msg saved to the reply packet was for all practical purposes written and encrypted (signed) from within Blue Wave. It your editor accommodates macros, you've got it made. If you are using DOS edit, it is going to be a lot harder. Good luck -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLyQkhpTeAMV8DT+pAQHgWQP/bcMsf2CDMsVLJZ/EmTE/pbwUPZEQmKWx rJknAs5kQRoCYlO3Px8hq37ts3EWcemrIBgnIJM1OOpvz1vABUmBCVAyxAd3sxCj VIwdiqmmEHDxX5sY/op5ULVJJupGa++sK86kD/baubzgSjcKK/7yyrs5r3+TcnhU jEOE46DrMPQ= =0PRo -----END PGP SIGNATURE----- ... Madness takes its toll. Please have exact change. ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: Bill Lambdin Area: Public Key Encryption To: Ryan Shaw 24 Jan 95 18:45:10 Subject: PassPhrase UpdReq RYAN SHAW To ALL about PassPhrase on 01-22-95 RS> Is there a way with PGP to change your passphrase without RS> changing one's public key? Yes. I think the command is PGP -KE userid. Bill 9CCD47F3C765CA33 bill.lambdin@woodybbs.com C77D698B260CF808 <-PGP fingerprint codes --- * CMPQwk 1.4 #1255 * SPANISH APRIL FOOLS activates Dec 28th 201434369420143436942014343694201434369420143436942014343694718 From: Ian Hebert Area: Public Key Encryption To: Christopher Baker 24 Jan 95 10:23:10 Subject: Verifying PGP Keys˙˙˙˙˙˙˙ UpdReq -----BEGIN PGP SIGNED MESSAGE----- CB> IH> It is not necessary to get the key directly from the source CB> IH> everytime, although it is a good idea when feasible. CB> i would not sign a key from a keyserver. once i became aware of the key CB> and had a need for it, i would go get it from the originator. Ok. Now I understand what you mean. When you were referring to "certifying", I was thinking of verifying key ownership, not signing the other party's key yourself.... To clarify things, what I meant in my earlier statements is that I would *use* a key obtained from a keyserver, if verified by the source, but I certainly wouldn't sign it myself.... Looks as if we're in agreement on this issue, then. Ian Hebert London, Ontario, Canada RIME: HOMEBASE (5508) Fido: 1:2401/114 Internet: ian.hebert@homebase.com PGP Key: 1024 / 077A2F7F 1993/02/11 PGP Key Fingerprint: A2 15 DE 22 DA FE D4 DC 0F 17 43 24 1F F2 1E 7B -----BEGIN PGP SIGNATURE----- Version: 2.6.i iQCVAgUBLySoGN+oQ+cHei9/AQGw2QP8DulsCciTjGy+AqhAUQMpD4bvMmOVed9M iBxcCgnVdjc7hRUJ1JeqkwqCfFE/QJGH0HUYNbN94wqM2Y/3P3Cr4PiMEceyTFgB cwLJApwd8DHr02dcn6LFGykUfZvV6j8GLZmAE/uwb0vow/cZIPgUPsYz5rZHUTd/ mJrA9jGMEP4= =6Ct+ -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Tony Iannotti Area: Public Key Encryption To: The Satanist 25 Jan 95 21:28:54 Subject: test UpdReq The Satanist wrote in a message to All: TS> Test message. Reply requested. TS> --- Renegade v10-05 Exp TS> * Origin: the Burning Times - (318)747-5785 (1:380/666) Cheers, AnTony 201434369420143436942014343694201434369420143436942014343694718