Thanks David for the ideas - in answer to your questions:
- Can you confirm that the file looks like a "regular" ascii armored PGP file? There is only one "----BEGIN PGP MESSAGE-----" and corresponding END?
Yes, apart from the Charset: utf-8 after the version line in the header, it looks like any other armored PGP file I've seen.
- To confirm, the file does not decrypt if you run with "--pass-through" but does decrypt without that option?
Correct. The commandline pgp --decrypt myfile.asc --passphrase <phrase> works fine, however pgp --decrypt myfile.asc --passphrase <phrase> --pass-through doesn't work, and reports said errors.
- Do you get the same error if you run "pgp --verify" instead of "--decrypt"?
I do, I get exactly the same error. Below is a grab from my PC (names changed):
D:\TestFolder>pgp --verify MyFile.asc --passphrase <phrase>
MyFile.asc:verify (3093:data is encrypted to subkey ID 0x628441EE)
MyFile.asc:verify (3044:subkey ID 0x628441EE belongs to 0x2E370448 mykey)
MyFile.asc:verify (3048:data encrypted with cipher AES-128)
MyFile.asc:verify (0:verify complete)
D:\TestFolder>pgp --verify MyFile.asc --passphrase <phrase> --pass-through
MyFile.asc:verify (3032:input contains unknown data)
MyFile.asc:verify (3093:data is encrypted to subkey ID 0x628441EE)
MyFile.asc:verify (3044:subkey ID 0x628441EE belongs to 0x2E370448 mykey)
MyFile.asc:verify (3048:data encrypted with cipher AES-128)
MyFile.asc:verify (3131:multiple PGP blocks found in single input stream)
- Any additional interesting output if you run with "--debug --verbose"?
Nothing I can see which highlights any issues, apart from the fact it appears to be decrypting the file, but not writing an output. Again, please see grab of screen:
D:\TestFolder>pgp --decrypt myfile.asc --passphrase <phrase> --pass-through --debug --verbose
pgp:decrypt (3157:current local time 2011-12-23T10:37:15+00:00)
D:\TestFolder\PGPConfig\pubring.pkr:open keyrings (1006:public keyring)
D:\TestFolder\PGPConfig\secring.skr:open keyrings (1007:private keyring)
Decoding myfile.asc...
begin lex event
file contains unknown data
myfile.asc:decrypt (3032:input contains unknown data)
output event, type=? (4352)
end lex event
armor header
myfile.asc:decrypt (3188:Version, PGP Desktop 10.0.0 - not licensed for commerci
al use: www.pgp.com)
armor header
myfile.asc:decrypt (3188:Charset, utf-8)
begin lex event
file is encrypted
file is asymmetrically encrypted
trying passphrase
decrypting file
output event, type=b (98)
myfile.asc:decrypt (3131:multiple PGP blocks found in single input stream)
Decode complete
Wiping pgp-6332-0.tmp...
Wiping pgp-6332-0.tmp (stream 1)...
Wiping file pgp-6332-0.tmp... 100%
Wipe (stream 1) done
Wipe done
pgp-6332-0.tmp:decrypt (0:file wiped successfully)
- Do you see anything interesting if you run "pgp --dump-packets" on the input file? ("Interesting" is hard to clarify. Compare that output to the output of a "working" file as a starting point.)
Obviously the data looks very different, but the 'text' around is very different. I don't completely understand it, so any help would be great if you notice anything. Files are below:
Working :-
Old: Public-Key Encrypted Session Key Packet(tag 1)(268 bytes)
New version(3)
Key ID - 0xA04B1F39628441EE
Pub alg - RSA Encrypt or Sign(pub 1)
RSA m^e mod n(2045 bits) -
0: 14 f8 79 1f 1c 13 20 f0 08 75 4b 2f 2e 6e 59 0e |..y... ..uK/.nY.|
..........
240: 3a ec 61 be bc 93 d4 0b ae 7f ce b0 99 8d 77 6c |:.a...........wl|
-> m = sym alg(1 byte) + checksum(2 bytes) + PKCS-1 block type 02
Old: Symmetrically Encrypted Data Packet(tag 9)(100 bytes)
Encrypted data [sym alg is encrypted in the pub session key above]
Not working:-
Old: Marker Packet(tag 10)(3 bytes)
String - PGP
New: Public-Key Encrypted Session Key Packet(tag 1)(268 bytes)
New version(3)
Key ID - 0xA04B1F39628441EE
Pub alg - RSA Encrypt or Sign(pub 1)
RSA m^e mod n(2048 bits) -
0: 82 cd 6b ad a6 fc bf 9f 38 12 69 7f 06 9f d7 a2 |..k.....8.i.....|
........
240: c6 e6 5f dc 98 83 87 25 8e da 6b eb 1d 4d 23 ae |.._....%..k..M#.|
-> m = sym alg(1 byte) + checksum(2 bytes) + PKCS-1 block type 02
New: Symmetrically Encrypted and MDC Packet(tag 18)(4096 bytes) partial start
Ver 1
Encrypted data [sym alg is encrypted in the pub session key above]
(plain text + MDC SHA1(20 bytes))
New: (919 bytes) partial end
Many Thanks,