Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    PUBLIC_KEYS    |    Public-Key Discussion Echo    |    845 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 221 of 845    |
|    mark lewis to Paul Hayton    |
|    PUBLIC_KEYS Echo Rules    |
|    24 Feb 16 08:39:40    |
      24 Feb 16 22:16, you wrote to Moderator:               PH> On 02/01/16, Moderator pondered and said...               Mo>> 1. The purpose of this echo is to provide a place to discuss        Mo>> public-keys for data privacy within FidoNet and elsewhere. We        Mo>> also        Mo>> consider electronic signature possibilities using public-keys and        Mo>> discuss data and software encryption and the various schemes and        Mo>> programs that produce them.               PH> Would like to restart that conversation. :)              have at it :)               Mo>> 5. No Private flagged messages in Echomail! Encrypted traffic using        Mo>> public-keys is permitted for the exercise so long as it is        Mo>> on-topic. Don't send person-specific encrypted traffic. Such        Mo>> specific traffic belongs in direct Netmail. Encrypted traffic        Mo>> should be in the form of ASCII-armored or personal key encrypted        Mo>> messages that can be read by anyone with PGP 2.6+ and your        Mo>> public-key. Include your public-key in a separate message before        Mo>> sending such test messages in case the other end doesn't have it        Mo>> or make them aware of how to get it from your system. If you just        Mo>> want to post your public-key, use PKEY_DROP Echo.               PH> Walk me through this Mark, I'm just learning about public/private keys and        PH> getting my head around all of this.              i'll try but it has been ages and ages... back then i was doing it with TimED       and the original phil zimmerman PGP on my OS/2 box... i've not even thought to       try it on this linux box but i have played about to see if i could get my       ancient signed keys copied over and used with today's privacy stuff... i don't       recall the results but it was a real ugly battle...               PH> So I have installed a gpg4win bundle on my pc and have created a        PH> public key which I can post here and you (or others) can then use to        PH> encrypt a message to send to me - right?              yes... your signature should also end up on one of the public keyring servers       so that anyone can retrieve it... the trick is interfacing with FTN software       if you want to use it in this environment... the body of the message, without       control lines, has to be saved to a temp file, pgp or gpg run on it to wrap       and sign it and then the temp file gets imported to replace the original... on       my TimED/2 system, i have the following options and commands...              [C]lear Signed        x:\pgp\pgp -ast +clearsig=on x:\timed\timed.msg > nul        move x:\timed.timed.asc x:\timed\timed.msg > nul              Encrypt [T]o        input /C /E ID to encrypt to : %%encto        x:\pgp\pgp -e x:\timed\timed.msg %encto        move x:\timed\timed.asc x:\timed\timed.msg              Encrypt [F]rom        set encfr=0xMyKeyId        input /C /E ID to encrypt to : %%encto        input /C /E ID to encrypt from : %%encfr        x:\pgp\pgp -es x:\timed\timed.msg %encto -u %encfr > nul        move x:\timed.timed.asc x:\timed\timed.msg > nul              [P]ublic Key        copy x:\timed\timed.msg+x:\pgp\mykey.asc x:\timed\timed.msg                     ok... all the above is done using TimED's external editor capability... i       defined the editor as a BAT file... then we take steps to save a backup copy       of the message we're fixing to work on and clean up a few other intermediate       files to ensure they won't get in the way... then we fire up our external       editor (qedit in my case) and write our reply or create our new message...       when we exit the external editor, then the BAT file offers us some options to       do PGP things to the message or add a signature of which one of several can be       selected from or we can abort the message completely... the PGP things we can       do are listed next...              "[C]lear Sign" signs the message file that it is fed... the resulting file has       a different extension that we must move to the original file that the       reader/editor is expecting...              "Encrypt [T]o" uses the 4DOS "input" command to get a string from the keyboard       and save it to an environment variable... the /C clears the buffer of stray       keystrokes... /E allows us to edit the buffer... the rest is the prompt... if       i were to encrypt a message to you, then i would type in your ID... the pgp       "-e" option encrypts a plaintext file with the recipient's public key... then       the text file is encrypted using your public key... the last step is to move       the file to the original name...              "Encrypt [F]rom" does the same as "Encrypt [T]o" except that it encrypts with       the recipient's public key as well as signing with my private key...              "[P]ublic key" just adds my ascii public key to the message so that others can       add it to their keyrings...                     it should be noted that TimED does also provide direct access to these       functions via its execrypt, exesign, and execryptsign options... IIRC, those       were introduced later after the above method using the external editor and       kewl BAT file majik... i've just never switched over although i do have       something that i used to use in the exesign which was another BAT file       allowing me to select a mood and have that added to the message as another       control line ;)              eg: ^AMOOD: Fat and Sassy :)               PH> But if I were to post and encrypted message here it would be of no use        PH> to anyone unless I had encrypted it using someone elses public key (so        PH> they could unlock it) - right?              it works two ways...              1. if you post a message encrypted with your PRIVATE key, anyone with your       PUBLIC key can decrypt it... that proves it was you that encrypted it...       2. if you post a message encrypted with my PUBLIC key, only i will be able to       decrypt it...              then there's signing a message instead of encrypting it... signing wraps the       message and places a digital signature at the bottom... others use your public       key to verify that you really did sign the message *and* that it hasn't been       altered in transit... signing is very common and generally seen in message       posting areas... encrypted stuff may be used more in private transactions,       though... i'm not sure there is a metric for counting those...              you can also encrypt and sign a message as seen in the above "Encrypt [F]rom"       option...              we have to make sure that in FTNs, and other places like news groups and       mailing lists, that we are having the tool to emit ascii and not binary... it       is possible to encrypt a message and the result is binary which is sent but       trying to get binary into a message and get it back out without altering it is       tricky at best... much easier to use ascii which is already formatted and       wrapped to 70 characters and ready to post anywhere...              )\/(ark       PGP Fingerprint 0xB60C20C5              Always Mount a Scratch Monkey              ... Chemists don't die, they just stop reacting!       ---        * Origin: (1:3634/12.73)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca