[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: GnuPG through Tor
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: GnuPG through Tor
- From: Ted Smith <teddks@xxxxxxxxx>
- Date: Tue, 21 Oct 2008 08:04:26 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 21 Oct 2008 15:24:46 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:from:to:in-reply-to :references:content-type:date:message-id:mime-version:x-mailer; bh=pXUbnINiyXkkw3CDzi5McPoWSwP73Mtm0sul4fV9fFc=; b=N/GAEF4csuLkOHwpMwSM/rEXAipRazC6Ja6ZsdgVTqKXxk3y07UppYhttQc4Ww5soI 6W7pSQ/RmqfHutl8jMMk/Hty042S8psodLobCuQ/WlCXzdFfN0qGfjOIvBQqSL8HUv2E fM+bOucuBDcyLb7KiP0pxOAXJDrSqM6qNOGtw=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:from:to:in-reply-to:references:content-type:date:message-id :mime-version:x-mailer; b=b5r7jjULr4q93JVq5CSdrX2BgqsdrkVMU8kI6oIuAxUUxmkw6etJMEIcpC9MMv+znW N2ZfqwqSNk9yKtkVs7oih+T8rFPteCDMU+UbmempfoanKwyXOCW1uUFO9Cqso1TYgLeq P+vW16R7W+ORaefQlqCLcD55HhbAjxpuI8rJQ=
- In-reply-to: <gdjfvt$r8k$1@xxxxxxxxxxxxx>
- References: <gdjfvt$r8k$1@xxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
On Mon, 2008-10-20 at 22:48 -0400, misc wrote:
> Is it possible to run GnuPG through Tor? (when connecting to LDAP and HKP
> servers to exchange keys)?
>
The way I do it is:
keyserver x-hkp://d3ettcpzlta6azsm.onion/
keyserver-options http_proxy="localhost:8118"
keyserver-options auto-key-retrieve
keyserver-options honor-http-proxy broken-http-proxy
...in my ~/.gnupg/gpg.conf.
Note that the broken-http-proxy means (according to some documentation I
found during a hell of a time getting Seahorse to work with this) that
gnupg will not try to circumvent the http proxy. This has since
disappeared from all manuals, so I'm not sure if it really means
anything. In any event, I can get my keys from the noreply hidden
service now. :)
On a side note: is there any real reason to use gpg2 over gpg? All that
it seems to do differently is have less public key ciphers. Is the fact
that gpg2 uses libgcrypt any advantage?
Attachment:
signature.asc
Description: This is a digitally signed message part