<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GNUPG Encryption/Decryption in Batch on OpenVMS in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097169#M30226</link>
    <description>how does one do a batch process using gpg which might include passing in the passphrase, and yet still keep the passphrase secure?  storing the passphrase in a plaintext file which is passes in in batch mode might be a very insecure solution, but how is it supposed to be done?</description>
    <pubDate>Fri, 13 Jun 2008 17:00:47 GMT</pubDate>
    <dc:creator>Jason Michael</dc:creator>
    <dc:date>2008-06-13T17:00:47Z</dc:date>
    <item>
      <title>GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097162#M30219</link>
      <description>I am having a problem decrypting a file in a command procedure because it keeps asking for the passphrase to be entered manually.    I want to run this script in Batch eventually, so my question is, &lt;BR /&gt;    Does anyone use GNUPG, and can anyone help me with passing the passphrase to the decrypt command from within the script?   I currently have the passphrase stored in a file which is read by the procedure, it is then placed into a symbol.&lt;BR /&gt;&lt;BR /&gt;however the decrypt command doesn't seem interested in the symbol at all.&lt;BR /&gt;&lt;BR /&gt;I saw a comment by Steven (sorry I forgot your surname, but I see you in this forum all the time) relating to a similar problem on HPUX, and I wondered if perhaps he would like to chime in.&lt;BR /&gt;&lt;BR /&gt;thanks,&lt;BR /&gt;&lt;BR /&gt;Dave.</description>
      <pubDate>Tue, 11 Mar 2008 18:17:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097162#M30219</guid>
      <dc:creator>The Brit</dc:creator>
      <dc:date>2008-03-11T18:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097163#M30220</link>
      <description>Dave,&lt;BR /&gt;&lt;BR /&gt;  It depends on how the program has been coded. Do you know if it reads from SYS$INPUT or SYS$COMMAND?&lt;BR /&gt;&lt;BR /&gt;  Have you tried PIPE? &lt;BR /&gt;&lt;BR /&gt;$ PIPE WRITE SYS$OUTPUT "passphrase" | GNUPG...&lt;BR /&gt;&lt;BR /&gt;or &lt;BR /&gt;$ PIPE TYPE PASSPHRASE.TXT | GNUPG...&lt;BR /&gt;&lt;BR /&gt;  Sometimes it may help to redirect SYS$COMMAND to convince a program it's not running interactively, and to read from SYS$INPUT instead of the terminal:&lt;BR /&gt;&lt;BR /&gt;$ PIPE WRITE SYS$OUTPUT "passphrase" | - &lt;BR /&gt;(DEFINE/USER SYS$COMMAND NL: ; GNUPG...)&lt;BR /&gt;&lt;BR /&gt;or, if the program reads from SYS$COMMAND unconditionally, maybe:&lt;BR /&gt;&lt;BR /&gt;$ PIPE WRITE SYS$OUTPUT "passphrase" | - &lt;BR /&gt;(DEFINE/USER SYS$COMMAND SYS$PIPE ; GNUPG...)&lt;BR /&gt;&lt;BR /&gt;If none of those work, please post your example code and a transcript of what happens.</description>
      <pubDate>Tue, 11 Mar 2008 22:47:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097163#M30220</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2008-03-11T22:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097164#M30221</link>
      <description>&lt;!--!*#--&gt;As usual, it mught help to know which version&lt;BR /&gt;of whose GnuPG you're using, and exactly what&lt;BR /&gt;you've tried to do with it where, but this&lt;BR /&gt;method seems to work for me (still&lt;BR /&gt;interactive here, but what could go wrong?):&lt;BR /&gt;&lt;BR /&gt;alp $ pp_symb = "(Oh, wouldn't you like to know?)"&lt;BR /&gt;&lt;BR /&gt;alp $ pipe write sys$output pp_symb | gpg --passphrase-fd 0 FRED.TXT-GPG&lt;BR /&gt;Reading passphrase from file descriptor 0&lt;BR /&gt;&lt;BR /&gt;You need a passphrase to unlock the secret key for&lt;BR /&gt;user: "Steven M. Schweda (Antinode) &lt;SMS&gt;"&lt;BR /&gt;2048-bit ELG-E key, ID 5D5FDBC7, created 2006-08-09 (main key ID FA00E2F4)&lt;BR /&gt;&lt;BR /&gt;gpg: encrypted with 2048-bit ELG-E key, ID 5D5FDBC7, created 2006-08-09&lt;BR /&gt;      "Steven M. Schweda (Antinode) &lt;SMS&gt;"&lt;BR /&gt;&lt;BR /&gt;That's using mine, of course:&lt;BR /&gt;&lt;BR /&gt;alp $ gpg --version&lt;BR /&gt;gpg (GnuPG) 1.4.8a&lt;BR /&gt;Copyright (C) 2007 Free Software Foundation, Inc.&lt;BR /&gt;License GPLv3+: GNU GPL version 3 or later &amp;lt;&amp;gt;&lt;BR /&gt;This is free software: you are free to change and redistribute it.&lt;BR /&gt;There is NO WARRANTY, to the extent permitted by law.&lt;BR /&gt;&lt;BR /&gt;Home: /SYS$LOGIN/gnupg&lt;BR /&gt;Supported algorithms:&lt;BR /&gt;Pubkey: RSA, RSA-E, RSA-S, ELG-E, DSA&lt;BR /&gt;Cipher: 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH&lt;BR /&gt;Hash: MD5, SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224&lt;BR /&gt;Compression: Uncompressed, ZIP, ZLIB, BZIP2&lt;BR /&gt;&lt;BR /&gt;alp $ write sys$output f$getsyi( "version")&lt;BR /&gt;V7.3-2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;gt; It depends on how the program has been&lt;BR /&gt;&amp;gt; coded.  [...]&lt;BR /&gt;&lt;BR /&gt;I haven't looked too closely at from what it&lt;BR /&gt;reads interactively.  I don't immediately see&lt;BR /&gt;any VMS-specific stuff, so I suspect that it&lt;BR /&gt;normally ends up using SYS$COMMAND (one way&lt;BR /&gt;or another).  (util/ttyio.c with HAVE_CTERMID&lt;BR /&gt;defined should use ctermid(), and "HELP CRTL&lt;BR /&gt;ctermid" says SYS$COMMAND, but I haven't&lt;BR /&gt;verified anything.)&lt;/SMS&gt;&lt;/SMS&gt;</description>
      <pubDate>Wed, 12 Mar 2008 11:15:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097164#M30221</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-03-12T11:15:45Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097165#M30222</link>
      <description>&lt;!--!*#--&gt;&amp;gt; I currently have the passphrase stored in a&lt;BR /&gt;&amp;gt; file [...]&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://gnupg.org/gph/en/manual.html#AEN513" target="_blank"&gt;http://gnupg.org/gph/en/manual.html#AEN513&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;      Protecting your private key&lt;BR /&gt;&lt;BR /&gt;      Protecting your private key is the most&lt;BR /&gt;      important job you have to use GnuPG&lt;BR /&gt;      correctly.  [...]</description>
      <pubDate>Wed, 12 Mar 2008 11:24:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097165#M30222</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-03-12T11:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097166#M30223</link>
      <description>Thanks for your help Guys.&lt;BR /&gt;&lt;BR /&gt;     I was able to make it work using the &lt;BR /&gt;&lt;BR /&gt;$ pipe ty &lt;PP.TXT&gt; | gpg ...&lt;BR /&gt;&lt;BR /&gt;but curiously enough, it only worked in batch.   When I ran it interactively it still seems to stick at the "Enter passphrase:" prompt, although I might be wrong about that. (I tend to think that this really is a "sys$command" issue).&lt;BR /&gt;&lt;BR /&gt;The important thing is that this solution works for me in batch, which is where it will be running.&lt;BR /&gt;&lt;BR /&gt;Thanks again.&lt;BR /&gt;&lt;BR /&gt;Dave.&lt;/PP.TXT&gt;</description>
      <pubDate>Wed, 12 Mar 2008 17:34:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097166#M30223</guid>
      <dc:creator>The Brit</dc:creator>
      <dc:date>2008-03-12T17:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097167#M30224</link>
      <description>&amp;gt; [...] but curiously enough, it only worked&lt;BR /&gt;&amp;gt; in batch. [...]&lt;BR /&gt;&lt;BR /&gt;Well, duh.  Perhaps SYS$COMMAND is different&lt;BR /&gt;in batch mode from what it is in interactive&lt;BR /&gt;mode.  You think?</description>
      <pubDate>Wed, 12 Mar 2008 17:41:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097167#M30224</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-03-12T17:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097168#M30225</link>
      <description>&lt;!--!*#--&gt;For the record, the&lt;BR /&gt;    pipe xxx | gpg --passphrase-fd 0 [...]&lt;BR /&gt;scheme seems to work in batch mode, too, as&lt;BR /&gt;expected.</description>
      <pubDate>Wed, 12 Mar 2008 17:53:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097168#M30225</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-03-12T17:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097169#M30226</link>
      <description>how does one do a batch process using gpg which might include passing in the passphrase, and yet still keep the passphrase secure?  storing the passphrase in a plaintext file which is passes in in batch mode might be a very insecure solution, but how is it supposed to be done?</description>
      <pubDate>Fri, 13 Jun 2008 17:00:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097169#M30226</guid>
      <dc:creator>Jason Michael</dc:creator>
      <dc:date>2008-06-13T17:00:47Z</dc:date>
    </item>
    <item>
      <title>Re: GNUPG Encryption/Decryption in Batch on OpenVMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097170#M30227</link>
      <description>&amp;gt; [...] but how is it supposed to be done?&lt;BR /&gt;&lt;BR /&gt;If the only secure passphrase storage is your&lt;BR /&gt;brain, and if your brain is not easily&lt;BR /&gt;accessed from a batch job, then I'd tend to&lt;BR /&gt;use keys without passphrases in batch jobs.&lt;BR /&gt;&lt;BR /&gt;Other things may be possible, depending on&lt;BR /&gt;your actual requirements, but I suspect that&lt;BR /&gt;the security provided by a passphrase stored&lt;BR /&gt;on a computer may be about as good as that&lt;BR /&gt;provided by no passphrase.</description>
      <pubDate>Fri, 13 Jun 2008 17:21:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/gnupg-encryption-decryption-in-batch-on-openvms/m-p/5097170#M30227</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2008-06-13T17:21:30Z</dc:date>
    </item>
  </channel>
</rss>

