[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Cryptography: Key not selectable (PGP key)



On Wednesday 09 December 2015 17:55:35 Benjamin Eikel wrote:
> Hi,
> 
> Am Mittwoch, 9. Dezember 2015, 02:23:27 schrieb Sandro Knauß:
> > btw. kmail is installable from experimental ( and I'm running exactly this
> > version for three weeks now). But you need to update akonadi from
> > experimental and also need to deinstall some applications ( f.ex. kopete)
> > and libs by hand. So yes not ready for unstable, but usable for
> > expierinced
> > users :D And so far I'm really happy about how stable and fast it is.
> 
> sorry for my imprecise formulation. It is not installable for me, because it
> means removing applications that I use regularly (kmymoney, kgpg).
> Am Mittwoch, 9. Dezember 2015, 12:21:22 schrieb Tim Ruehsen:
> > Ouch, sorry. I'm using an up-to-date Debian unstable.
> > gpg2 and gpg are installed.
> > ii gnupg 1.4.19-6 amd64
> > ii gnupg-agent 2.1.9-1 amd64
> > ii gnupg-curl 1.4.19-6 amd64
> > ii gnupg2 2.1.9-1 amd64
> 
> Same versions here.
> 
> Am Mittwoch, 9. Dezember 2015, 02:23:27 schrieb Sandro Knauß:
> > The second thing we need to know, what kind of key you are using
> > (hopenpgp-
> > tools):
> > hkt export-pubkeys '<fingerprint>' | hokey lint
> 
> My key is similar to Tim's key.
> 
> $ hkt export-pubkeys 0x506F3F15B65A2BC1 | hokey lint
> hokey (hopenpgp-tools) 0.16.3
> hkt (hopenpgp-tools) 0.16.3
> Copyright (C) 2012-2015  Clint Adams
> Copyright (C) 2012-2015  Clint Adams
> hokey comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
> welcome to redistribute it under certain conditions.
> hkt comes with ABSOLUTELY NO WARRANTY. This is free software, and you are
> welcome to redistribute it under certain conditions.
> 
> Key has potential validity: good
> Key has fingerprint: EDDE B43D EE84 5EE7 8EB5  234A 506F 3F15 B65A 2BC1
> Checking to see if key is OpenPGPv4: V4
> Checking to see if key is RSA or DSA (>= 2048-bit): RSA 4096
> Checking user-ID- and user-attribute-related items:
>   Benjamin Eikel <benjamin@eikel.org>:
>     Self-sig hash algorithms: [SHA1]
>     Preferred hash algorithms:
>       [SHA256,SHA1,SHA384,SHA512,SHA224]
>     Key expiration times:
>       [2y11m29d59400s = Wed Mar 21 10:15:01 UTC 2018]
>     Key usage flags:
>       [ sign-data key
> , certify-keys key ]
> 
> Am Mittwoch, 9. Dezember 2015, 02:23:27 schrieb Sandro Knauß:
> > And please check first if the keys are still usable in the commandline
> > with
> > gpg and gpg2 etc. before blaming kmail...
> 
> Both
> gpg -u 0x506F3F15B65A2BC1 --clearsign test_file
> gpg2 -u 0x506F3F15B65A2BC1 --clearsign test_file
> work and create a signature in test_file.asc.
> 
> Am Mittwoch, 9. Dezember 2015, 12:21:22 schrieb Tim Ruehsen:
> > BTW, gpg2 gives me these two warnings:
> > gpg: keyserver option 'ca-cert-file' is obsolete; please use 'hkp-cacert'
> > in dirmngr.conf
> > gpg: keyserver option 'ca-cert-file' is obsolete; please use 'hkp-cacert'
> > in dirmngr.conf

I have it working now, but I am not 100% sure what it was.
Yesterday I added to dirmngr.conf:
 hkp-cacert /usr/oms/.gnupg/sks-keyservers.netCA.pem

After restarting dirmngr (and other processes as well), nothing changed.
Today - after reboot this morning - the problem is gone away.
Maybe it was just the latest upgrades that made it ?

So here my .conf files from ~/.gnupg/:

******** dirmngr.conf ********
###+++--- GPGConf ---+++###
debug-level basic
log-file socket:///usr/oms/.gnupg/log-socket
###+++--- GPGConf ---+++### Tue 08 Dec 2015 12:06:27 PM CET
# GPGConf edited this configuration file.
# It will disable options before this marked block, but it will
# never change anything below these lines.
hkp-cacert /usr/oms/.gnupg/sks-keyservers.netCA.pem

******** gpgsm.conf ********
###+++--- GPGConf ---+++###
debug-level basic
log-file socket:///usr/oms/.gnupg/log-socket
###+++--- GPGConf ---+++### Tue 08 Dec 2015 12:06:27 PM CET
# GPGConf edited this configuration file.
# It will disable options before this marked block, but it will
# never change anything below these lines.

******** gpg-agent.conf ********
no-grab
pinentry-program /usr/bin/pinentry-qt
default-cache-ttl 36000
###+++--- GPGConf ---+++###
debug-level basic
log-file socket:///usr/oms/.gnupg/log-socket
###+++--- GPGConf ---+++### Tue 08 Dec 2015 12:06:27 PM CET
# GPGConf edited this configuration file.
# It will disable options before this marked block, but it will
# never change anything below these lines.

******** gpg-agent.conf ******** (without comments)
keyserver-options auto-key-retrieve include-subkeys include-revoked
use-agent
default-key  2078144D
utf8-strings
keyserver  hkps://hkps.pool.sks-keyservers.net
keyserver-options ca-cert-file=/usr/oms/.gnupg/sks-keyservers.netCA.pem
keyserver  hkps://hkps.pool.sks-keyservers.net
keyserver-options ca-cert-file=/usr/oms/.gnupg/sks-keyservers.netCA.pem
keyserver-options no-honor-keyserver-url
personal-digest-preferences SHA512 SHA384 SHA256 SHA224
cert-digest-algo SHA512
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 
ZLIB BZIP2 ZIP Uncompressed
fixed-list-mode
keyid-format 0xlong
with-fingerprint
verify-options show-uid-validity
list-options show-uid-validity

I hope this helps (and that this message will be signed).

Regards, Tim

Attachment: signature.asc
Description: This is a digitally signed message part.


Reply to: