home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 221 
 mark lewis to Paul Hayton 
 PUBLIC_KEYS Echo Rules 
 24 Feb 16 08:39:40 
 
24 Feb 16 22:16, you wrote to Moderator:

 PH> On 02/01/16, Moderator pondered and said...

 Mo>>   1. The purpose of this echo is to provide a place to discuss
 Mo>>      public-keys for data privacy within FidoNet and elsewhere. We
 Mo>> also
 Mo>>      consider electronic signature possibilities using public-keys and
 Mo>>      discuss data and software encryption and the various schemes and
 Mo>>      programs that produce them.

 PH> Would like to restart that conversation. :)

have at it :)

 Mo>>   5. No Private flagged messages in Echomail! Encrypted traffic using
 Mo>>      public-keys is permitted for the exercise so long as it is
 Mo>>      on-topic. Don't send person-specific encrypted traffic. Such
 Mo>>      specific traffic belongs in direct Netmail. Encrypted traffic
 Mo>>      should be in the form of ASCII-armored or personal key encrypted
 Mo>>      messages that can be read by anyone with PGP 2.6+ and your
 Mo>>      public-key. Include your public-key in a separate message before
 Mo>>      sending such test messages in case the other end doesn't have it
 Mo>>      or make them aware of how to get it from your system. If you just
 Mo>>      want to post your public-key, use PKEY_DROP Echo.

 PH> Walk me through this Mark, I'm just learning about public/private keys and
 PH> getting my head around all of this.

i'll try but it has been ages and ages... back then i was doing it with TimED
and the original phil zimmerman PGP on my OS/2 box... i've not even thought to
try it on this linux box but i have played about to see if i could get my
ancient signed keys copied over and used with today's privacy stuff... i don't
recall the results but it was a real ugly battle...

 PH> So I have installed a gpg4win bundle on my pc and have created a
 PH> public key which I can post here and you (or others) can then use to
 PH> encrypt a message to send to me - right?

yes... your signature should also end up on one of the public keyring servers
so that anyone can retrieve it... the trick is interfacing with FTN software
if you want to use it in this environment... the body of the message, without
control lines, has to be saved to a temp file, pgp or gpg run on it to wrap
and sign it and then the temp file gets imported to replace the original... on
my TimED/2 system, i have the following options and commands...

[C]lear Signed
  x:\pgp\pgp -ast +clearsig=on x:\timed\timed.msg > nul
  move x:\timed.timed.asc x:\timed\timed.msg > nul

Encrypt [T]o
  input /C /E ID to encrypt to : %%encto
  x:\pgp\pgp -e x:\timed\timed.msg %encto
  move x:\timed\timed.asc x:\timed\timed.msg

Encrypt [F]rom
  set encfr=0xMyKeyId
  input /C /E ID to encrypt to : %%encto
  input /C /E ID to encrypt from : %%encfr
  x:\pgp\pgp -es x:\timed\timed.msg %encto -u %encfr > nul
  move x:\timed.timed.asc x:\timed\timed.msg > nul

[P]ublic Key
  copy x:\timed\timed.msg+x:\pgp\mykey.asc x:\timed\timed.msg


ok... all the above is done using TimED's external editor capability... i
defined the editor as a BAT file... then we take steps to save a backup copy
of the message we're fixing to work on and clean up a few other intermediate
files to ensure they won't get in the way... then we fire up our external
editor (qedit in my case) and write our reply or create our new message...
when we exit the external editor, then the BAT file offers us some options to
do PGP things to the message or add a signature of which one of several can be
selected from or we can abort the message completely... the PGP things we can
do are listed next...

"[C]lear Sign" signs the message file that it is fed... the resulting file has
a different extension that we must move to the original file that the
reader/editor is expecting...

"Encrypt [T]o" uses the 4DOS "input" command to get a string from the keyboard
and save it to an environment variable... the /C clears the buffer of stray
keystrokes... /E allows us to edit the buffer... the rest is the prompt... if
i were to encrypt a message to you, then i would type in your ID... the pgp
"-e" option encrypts a plaintext file with the recipient's public key... then
the text file is encrypted using your public key... the last step is to move
the file to the original name...

"Encrypt [F]rom" does the same as "Encrypt [T]o" except that it encrypts with
the recipient's public key as well as signing with my private key...

"[P]ublic key" just adds my ascii public key to the message so that others can
add it to their keyrings...


it should be noted that TimED does also provide direct access to these
functions via its execrypt, exesign, and execryptsign options... IIRC, those
were introduced later after the above method using the external editor and
kewl BAT file majik... i've just never switched over although i do have
something that i used to use in the exesign which was another BAT file
allowing me to select a mood and have that added to the message as another
control line ;)

eg: ^AMOOD: Fat and Sassy :)

 PH> But if I were to post and encrypted message here it would be of no use
 PH> to anyone unless I had encrypted it using someone elses public key (so
 PH> they could unlock it) - right?

it works two ways...

1. if you post a message encrypted with your PRIVATE key, anyone with your
PUBLIC key can decrypt it... that proves it was you that encrypted it...
2. if you post a message encrypted with my PUBLIC key, only i will be able to
decrypt it...

then there's signing a message instead of encrypting it... signing wraps the
message and places a digital signature at the bottom... others use your public
key to verify that you really did sign the message *and* that it hasn't been
altered in transit... signing is very common and generally seen in message
posting areas... encrypted stuff may be used more in private transactions,
though... i'm not sure there is a metric for counting those...

you can also encrypt and sign a message as seen in the above "Encrypt [F]rom"
option...

we have to make sure that in FTNs, and other places like news groups and
mailing lists, that we are having the tool to emit ascii and not binary... it
is possible to encrypt a message and the result is binary which is sent but
trying to get binary into a message and get it back out without altering it is
tricky at best... much easier to use ascii which is already formatted and
wrapped to 70 characters and ready to post anywhere...

)\/(ark
PGP Fingerprint 0xB60C20C5

Always Mount a Scratch Monkey

... Chemists don't die, they just stop reacting!
---
 * Origin:  (1:3634/12.73)

<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca