Signing and Encryption with GnuPG



Similar documents
Signing and Encryption with GnuPG

Pretty Good Privacy with GnuPG

Dip a toe in crypto (aka encryption and GnuPG) Zak Rogoff & Steve Revilak

GPG installation and configuration

Create Mail Profiles for Gmail, Yahoo or Hotmail Accounts for Outlook Windows

Encrypting with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

Tutorial: Encrypted with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Networks & Security Course. Web of Trust and Network Forensics

The KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer

Getting started with IMAP for Aggi What is IMAP?

Published : License : None

GPG Tutorial. 1 Introduction. 2 Creating a signing and encryption keys. 3 Generating a revocation certicate. Andreas Hirt July 12, 2009

LiteCommerce Advanced Security Module. Version 2.8

Encrypting and signing

GPG - GNU Privacy Guard

HW/Lab 1: Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

How To Send Mail From A Macbook Access To A Pc Or Ipad With A Password Protected Address (Monroe Access) On A Pc (For Macbook) Or Ipa (For Ipa) On Pc Or Macbook (For

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Introduce. your tech. Who? Why? Expectations? Operating System? Client or Webmail? Provider?

Set up Outlook for your new student e mail with IMAP/POP3 settings

THUNDERBIRD SETUP (STEP-BY-STEP)

Configuring Outlook 2013 for Windows

Sync Security and Privacy Brief

Configuring Outlook 2010 for Windows

Introduction to Cryptography

UNI - WINDOWS. How to... Access your University on your Windows Computer. Introduction. Step 1/1 - Setting Up Your Windows Computer

How to Setup Privacy Guard Encryption.

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion

Encrypting your Communications using PGP

User Guide. Please visit the Helpdesk website for more information:

isecur User Guide for iphone

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014

Ciphire Mail. Abstract

WiMAX Public Key Infrastructure (PKI) Users Overview

Set Up Setup with Microsoft Outlook 2007 using POP3

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

PGP from: Cryptography and Network Security

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Initial Setup of Mac Mail with IMAP for OS X Lion

Using Your PGP Tool to Update Your Address Settings for Encrypted Messaging

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

e- storage Mail Archive

C R E A T E D O N 8 / 2 2 / MCALLISTER SOFTWARE SYSTEMS. AVImark Software Support. S e t u p

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

CLIENT DATABASE SECURITY

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Secure Client Applications

Overview Keys. Overview

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information

ireadsmime User Guide For iphone, ipad, and ipod Touch

Configuring Outlook 2016 for Windows

How to Create and Maintain an Anonymous Identity Online

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

File and encryption with GPG4win & Enigmail

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Secure Part II Due Date: Sept 27 Points: 25 Points

An Introduction to Secure . Presented by: Addam Schroll IT Security & Privacy Analyst

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

How To Access Your Cpa.Com From Your Computer Or A Mobile Phone Or Ipad (For A Free Download) Without Having To Use A Webmail Account

Android: Configure IMAP/POP/SMTP

Receiving Secure from Citi For External Customers and Business Partners

Move Your to AT&T Website Solutions

Getting the most from Apple Mail

Configuring Apple Mail for Mac OS X (Snow Leopard)

Setting up CatMail on Outlook 2010

1 Login to your CSUF student account and click on the Settings icon ( ) at the far right.

Booth Gmail Configuration

Using Outlook with SaderApps

How To Create A Mailbox In Windows Mail On A Pc Or Mac Or Ipad (For A Mac)

Steps for: POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) setup on MAC Platforms

Configure Outlook 2007 for Brandeis Gmail

Important information for all POP users

What Are Certificates?

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

How to move to your account with MAC Mail

GPG4win / Kleopatra Documentation. Secure file and encryption by using GnuPG for Windows

How to setup your iphone client


FRCC Secure Data Transfer. Users Guide V1.0

How To Encrypt Data With Encryption

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

Contingency Access to Enterprise Encrypted Data

ENCRYPTION ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR S FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD A BLACK PAPER

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

The Case For Secure

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Cryptography & Digital Signatures

How to Setup OSX Mail to POP an Exchange Account

Guidelines to setup mobile devices to a UOITnet account Google Apps for Education. Information Technology Services

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

3. On the Accounts wizard window, select Add a new account, and then click Next.

Setting up and controlling

WS_FTP Professional 12. Security Guide

Digital certificates and SSL

BlackBerry Internet Service. Version: User Guide

Division of Information Technology Lehman College CUNY

SSL Protect your users, start with yourself

Transcription:

Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22

What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for Pretty Good Privacy PGP is a system for encrypting data, and for creating digital signatures (aka signing). Commonly used for Email, but can be used with any type of file. PGP can take a little work to set up. After that, it s easy to use. Today, we ll try to help you with the setup part. 2 / 22

Where do I get GnuPG? Mac OS https://gpgtools.org/ Windows http://gpg4win.org/ Linux GnuPG may already be installed. If not, use your package manager (yum, apt-get, zypper, synaptic, aptitude, etc.) to install it. 3 / 22

A brief introduction to keys Objective: Alice wants to (securely) send a file to Bob. Alice encrypts the file with a password Alice sends the encrypted file to Bob Bob gets the encrypted file, but... How does Alice (securely) get the password to Bob? This is the dilemma with password-based encryption. Public key cryptography avoids this problem entirely. Instead of passwords, you can use public and private keys (which GnuPG does). 4 / 22

Public and Private Keys In order to do anything with PGP, you ll need a key. Keys exist as a pair, called a keypair. There s a public key. You share this with everyone (because it s public). There s a private key, sometimes called a secret key. Don t share this with anyone (because it s a secret). The private key will undo what the public key does, and vice versa; think of them as inverse functions. If a public key encrypts a message, then the corresponding private key decrypts it. Now, Alice can encrypt the file with Bob s public key. Bob decrypts the file with his private key. 5 / 22

What can you do with a key? Keys allow you to encrypt and sign messages. Encryption The purpose is to ensure that a message is readable only by someone possessing a specific private key. Signing Guarantees that a message was sent by someone with a specific private key (and wasn t subsequently altered). (Here I use the term message in a very generic sense it could be an email message, a file, or any arbitrary piece of data). Leap of faith: You need some level of trust that a particular key belongs to a particular person. 6 / 22

Goals for this part of the workshop Generate a keypair (if you don t already have one). Upload your public key to a keyserver Download my public key. Set up your mail program to send and receive signed and encrypted email. (Mail program = Mail User Agent, or MUA) Send me a signed and encrypted message. (I should be able to decrypt your message, and verify your signature.) I ll respond with a signed and encrypted message. (You should be able to decrypt my message and verify my signature.) 7 / 22

Generating a Keypair Everything here can be done with GUI tools; I m giving command-line equivalents for reference. Generate a key (if you don t already have one). gpg --gen-key Choose RSA, RSA. Use the longest key possible (4096 bits). Upload your key to a keyserver. gpg --send-key KEYID Download my public key. gpg --search steve@srevilak.net OR gpg --recv-key 28C2A300 8 / 22

Mail Client Basics Sending: You ll use a protocol called SMTP, or Simple Mail Transfer Protocol. Receiving: Two options: IMAP (Internet Mail Access Protocol), or POP (Post Office Protocol) IMAP stores all messages on your ESP s mail server. You can move them to local folders, but you have to do this explicitly. POP downloads mail from your ESP s mail server. By default, the server copy is deleted; you can also configure your mail client to leave it on the server. If you have a lot of mail on the server, the initial synchronization might take a while, especial with POP. 9 / 22

Configuring your MUA (GMail) GMail: Enable IMAP or POP in Gmail s web interface. Sending: smtp.gmail.com, port 587, use SSL Receiving: imap.gmail.com, port 993, use SSL; OR pop.gmail.com, port 995, use SSL For help, see https://support.google.com/mail/ troubleshooter/1668960?hl=en&ref_topic=1669040 10 / 22

Configuring your MUA (Hotmail) Hotmail: Enable POP/IMAP in outlook.com s web interface Sending: smtp-mail.outlook.com, port 587, use TLS Receiving: imap-mail.outlook.com, Port 993, use SSL; OR pop-mail.outlook.com, port 995, SSL For help, see http://windows.microsoft.com/en-us/ windows/outlook/send-receive-from-app 11 / 22

Configuring your MUA (Yahoo) Yahoo: POP is only available for Yahoo Plus Accounts Sending: smtp.mail.yahoo.com, port 587, use SSL Receving: pop.mail.yahoo.com, port 995, use SSL; OR imap.mail.yahoo.com, port 993, use SSL For help, see http://help.yahoo.com/kb/index?page= content&y=prod_mail_ml&locale=en_us&id=sln4075 12 / 22

Sending and receiving mail We ll take this one step at a time. Send me a signed and encrypted message. Open your Sent Mail folder. Make sure you can read the encrypted message that you just sent! I ll respond. Work on downloading, decrypting, and reading my message. Be sure to verify the signature. 13 / 22

Backing up your keys If you lose your private key, then forget about decryption. A lost private key cannot be recovered! Backup your private key gpg -a --export-secret-keys KEYID > private-key.asc Store a copy of private-key.asc in a safe place. For example, keep electronic and printed copies in a safe deposit box. 14 / 22

Revocation Certificates What if (say) your laptop is stolen, and you lose your private key? If this happens, you ll want to revoke your key. Generate a revocation certificate gpg -a --gen-revoke KEYID > pgp-revoke.asc Uploading the revocation certificate (to a keyserver) cancels your key. Note: you cannot generate a revocation certificate without a private key! Keep the revocation certificate in a safe place. 15 / 22

Trusting and Signing Keys (1) How do you know that a given key belongs to a given person? You check the key s fingerprint. Here s my fingerprint: gpg --fingerprint 28C2A300... Key fingerprint = 6F09 15FF 59CE E093 56F4 BEEC E772 7C56 28C2 A300 The fingerprint uniquely identifies a PGP key. If the fingerprints match, you ve got the right one. Note: the key id matches the last eight characters of the fingerprint. 16 / 22

Trusting and Signing Keys (2) Signing a key indicates that you trust it. gpg --sign-key 28C2A300 OR gpg --lsign-key 28C2A300 --lsign-key makes a local signature; it s only visible to you. To distribute a non-local (--sign-key) signature: Send it to a key server: gpg --send-key 28C2A300 Export the key (containing your signature), and send it to the key holder. gpg -a --export 28C2A300 > signed-key.asc The key holder will gpg --import signed-key.asc to import your signature. 17 / 22

Some Advanced Tips $HOME/.gnupg/gpg.conf is GnuPG s configuration file. Some things you should consider adding: # Sign keys using SHA256, instead of SHA1 cert-digest-algo SHA256 # Sign messages using SHA256, too personal-digest-preferences SHA256 # Set stronger preferences on newly-generated keys # Put this all on one line. default-preference-list SHA512 SHA384 SHA256 SHA224 \ AES256 AES192 AES CAST5 ZLIB BZIP2 \ ZIP Uncompressed 18 / 22

More Advanced Tips Change the preferences of your existing key, to match the default-preference-list in the previous slide. See instructions at http://www.apache.org/dev/openpgp.html. Tip: It doesn t hurt to back up your key before trying this. 19 / 22

GnuPG Wrap Up PGP protects your privacy through encryption. PGP provides non-repudiation through digital signatures. PGP is something that you can (and should!) use every day. GnuPG is a free software implementation of a public standard. Remember: it s hard to backdoor software when the source code is public. 20 / 22

PGP Resources GnuPG: http://gnupg.org/ GPG4win: http://www.gpg4win.org/ GPG Tools: http://gpgtools.org/ Riseup.net s Best practices for OpenPGP: https://we.riseup.net/riseuplabs+paow/ openpgp-best-practices Cryptoparty handbook: https://www.cryptoparty.in/documentation/handbook Surveillance Self-Defense: https://ssd.eff.org/ 21 / 22

And Finally... Call your Legislators Oppose TPP Fast Track Support the USA Freedom Act ( Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet Collection, and Online Monitoring Act ) Support HR 3982 - Open Internet Preservation Act of 2014 Support MA Bill S.1664 - An Act to regulate the use of unmanned aerial vehicles Not sure how to contact your legislators? Go to http://wheredoivotema.com. 22 / 22