On Wednesday 09 December 2015 17:55:35 Benjamin Eikel wrote: > Hi, > > Am Mittwoch, 9. Dezember 2015, 02:23:27 schrieb Sandro Knauß: > > btw. kmail is installable from experimental ( and I'm running exactly this > > version for three weeks now). But you need to update akonadi from > > experimental and also need to deinstall some applications ( f.ex. kopete) > > and libs by hand. So yes not ready for unstable, but usable for > > expierinced > > users :D And so far I'm really happy about how stable and fast it is. > > sorry for my imprecise formulation. It is not installable for me, because it > means removing applications that I use regularly (kmymoney, kgpg). > Am Mittwoch, 9. Dezember 2015, 12:21:22 schrieb Tim Ruehsen: > > Ouch, sorry. I'm using an up-to-date Debian unstable. > > gpg2 and gpg are installed. > > ii gnupg 1.4.19-6 amd64 > > ii gnupg-agent 2.1.9-1 amd64 > > ii gnupg-curl 1.4.19-6 amd64 > > ii gnupg2 2.1.9-1 amd64 > > Same versions here. > > Am Mittwoch, 9. Dezember 2015, 02:23:27 schrieb Sandro Knauß: > > The second thing we need to know, what kind of key you are using > > (hopenpgp- > > tools): > > hkt export-pubkeys '<fingerprint>' | hokey lint > > My key is similar to Tim's key. > > $ hkt export-pubkeys 0x506F3F15B65A2BC1 | hokey lint > hokey (hopenpgp-tools) 0.16.3 > hkt (hopenpgp-tools) 0.16.3 > Copyright (C) 2012-2015 Clint Adams > Copyright (C) 2012-2015 Clint Adams > hokey comes with ABSOLUTELY NO WARRANTY. This is free software, and you are > welcome to redistribute it under certain conditions. > hkt comes with ABSOLUTELY NO WARRANTY. This is free software, and you are > welcome to redistribute it under certain conditions. > > Key has potential validity: good > Key has fingerprint: EDDE B43D EE84 5EE7 8EB5 234A 506F 3F15 B65A 2BC1 > Checking to see if key is OpenPGPv4: V4 > Checking to see if key is RSA or DSA (>= 2048-bit): RSA 4096 > Checking user-ID- and user-attribute-related items: > Benjamin Eikel <benjamin@eikel.org>: > Self-sig hash algorithms: [SHA1] > Preferred hash algorithms: > [SHA256,SHA1,SHA384,SHA512,SHA224] > Key expiration times: > [2y11m29d59400s = Wed Mar 21 10:15:01 UTC 2018] > Key usage flags: > [ sign-data key > , certify-keys key ] > > Am Mittwoch, 9. Dezember 2015, 02:23:27 schrieb Sandro Knauß: > > And please check first if the keys are still usable in the commandline > > with > > gpg and gpg2 etc. before blaming kmail... > > Both > gpg -u 0x506F3F15B65A2BC1 --clearsign test_file > gpg2 -u 0x506F3F15B65A2BC1 --clearsign test_file > work and create a signature in test_file.asc. > > Am Mittwoch, 9. Dezember 2015, 12:21:22 schrieb Tim Ruehsen: > > BTW, gpg2 gives me these two warnings: > > gpg: keyserver option 'ca-cert-file' is obsolete; please use 'hkp-cacert' > > in dirmngr.conf > > gpg: keyserver option 'ca-cert-file' is obsolete; please use 'hkp-cacert' > > in dirmngr.conf I have it working now, but I am not 100% sure what it was. Yesterday I added to dirmngr.conf: hkp-cacert /usr/oms/.gnupg/sks-keyservers.netCA.pem After restarting dirmngr (and other processes as well), nothing changed. Today - after reboot this morning - the problem is gone away. Maybe it was just the latest upgrades that made it ? So here my .conf files from ~/.gnupg/: ******** dirmngr.conf ******** ###+++--- GPGConf ---+++### debug-level basic log-file socket:///usr/oms/.gnupg/log-socket ###+++--- GPGConf ---+++### Tue 08 Dec 2015 12:06:27 PM CET # GPGConf edited this configuration file. # It will disable options before this marked block, but it will # never change anything below these lines. hkp-cacert /usr/oms/.gnupg/sks-keyservers.netCA.pem ******** gpgsm.conf ******** ###+++--- GPGConf ---+++### debug-level basic log-file socket:///usr/oms/.gnupg/log-socket ###+++--- GPGConf ---+++### Tue 08 Dec 2015 12:06:27 PM CET # GPGConf edited this configuration file. # It will disable options before this marked block, but it will # never change anything below these lines. ******** gpg-agent.conf ******** no-grab pinentry-program /usr/bin/pinentry-qt default-cache-ttl 36000 ###+++--- GPGConf ---+++### debug-level basic log-file socket:///usr/oms/.gnupg/log-socket ###+++--- GPGConf ---+++### Tue 08 Dec 2015 12:06:27 PM CET # GPGConf edited this configuration file. # It will disable options before this marked block, but it will # never change anything below these lines. ******** gpg-agent.conf ******** (without comments) keyserver-options auto-key-retrieve include-subkeys include-revoked use-agent default-key 2078144D utf8-strings keyserver hkps://hkps.pool.sks-keyservers.net keyserver-options ca-cert-file=/usr/oms/.gnupg/sks-keyservers.netCA.pem keyserver hkps://hkps.pool.sks-keyservers.net keyserver-options ca-cert-file=/usr/oms/.gnupg/sks-keyservers.netCA.pem keyserver-options no-honor-keyserver-url personal-digest-preferences SHA512 SHA384 SHA256 SHA224 cert-digest-algo SHA512 default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed fixed-list-mode keyid-format 0xlong with-fingerprint verify-options show-uid-validity list-options show-uid-validity I hope this helps (and that this message will be signed). Regards, Tim
Attachment:
signature.asc
Description: This is a digitally signed message part.