gpg --verify fails, no key?

2022-02-20 Thread mailinglisten--- via Gnupg-users
Hi there, when trying this: gpg --verify gnupg-2.3.4.tar.bz2.sig gnupg-2.3.4.tar.bz2 I get that: gpg: Signature made Mo 20 Dez 2021 22:52:45 CET gpg:using EDDSA key 6DAA6E64A76D2840571B4902528897B826403ADA gpg: Good signature from "Werner Koch (dist signing 2020)" [unknown]

Re: gpg: keyserver receive failed: No name - for gpg --keyserver hkp://pool.sks-keyservers.net

2021-06-24 Thread mailinglisten--- via Gnupg-users
Am 24.06.21 um 19:19 schrieb Alexander Polcyn via Gnupg-users: > () > Host ipv4.pool.sks-keyservers.net > not found: 3(NXDOMAIN) > () > Did these names get permanently deleted? Any workarounds or suggestions > would be appreciated. One alternative

safe curves in openPGP smartcard

2021-06-20 Thread mailinglisten--- via Gnupg-users
Hi there, is there any educated guess, when some safe curve (25519?) will find their ways into openPGP smart cards? regards ___ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: GnuPG distribution key with no trust

2021-06-12 Thread mailinglisten--- via Gnupg-users
Am 10.06.21 um 21:33 schrieb Werner Koch: > On Mon, 31 May 2021 21:08, mailinglisten--- said: >> Hello, >> >> is there a reason why the new software distribution key for GnuPG ( >> 0x528897B826403ADA ) comes with no chain of trust at all? It does not >> have any signature from any preceding key. >

Re: migration by copy of ~/.gnupg not working

2021-06-03 Thread mailinglisten--- via Gnupg-users
Am 03.06.21 um 19:50 schrieb Herr Saalfeld via Gnupg-users: > Hi, > > I though migrating my user GPG configuration onto a new computer should > be as simple as making a full copy of ~/.gnupg with rsync > > rsync -av old:/home/me/.gnupg /home/me/ > > However, on the new computer, I see nothing

GnuPG distribution key with no trust

2021-05-31 Thread mailinglisten--- via Gnupg-users
Hello, is there a reason why the new software distribution key for GnuPG ( 0x528897B826403ADA ) comes with no chain of trust at all? It does not have any signature from any preceding key. Past distribution keys like 0x53B620D01CE0C630 had signatures from other keys you might have trusted like

Re: gpg and TPM

2021-05-14 Thread mailinglisten--- via Gnupg-users
Am 14.05.21 um 08:46 schrieb Raja Saha: > Hi, > > I was reading about Debian UEFI and secure boot. If tpm isn't secured > at boot, will that make tpm less secure than key pair where user puts a > strong password? Technically, secure boot and TPM are 2 different things. You can use secure boot

Re: gpg and TPM

2021-05-14 Thread mailinglisten--- via Gnupg-users
Am 13.05.21 um 23:03 schrieb Damien Goutte-Gattat: > On Tue, May 11, 2021 at 02:03:21PM +, mailinglis...@posteo.de wrote: >> I´m not that familiar with the TPM in general > > Me neither. > > >> is the TPM owner (and SRK) password safe against brute force attacks? >> Or do you need a complex

Re: gpg and TPM

2021-05-11 Thread mailinglisten--- via Gnupg-users
Am 09.05.21 um 15:22 schrieb Damien Goutte-Gattat: > Hi, > > On Sun, May 09, 2021 at 10:00:25AM +, mailinglisten--- via > Gnupg-users wrote: >> I wasn´t aware the TPM has that much space, does the TPM hold really a >> complete key? Does it make sense to us

gpg and TPM

2021-05-09 Thread mailinglisten--- via Gnupg-users
Hi there, the blog article about using GPG with a TPM just caught my eyes, this really sounds damn interesting. I think this has so much potential. Some questions about this. I wasn´t aware the TPM has that much space, does the TPM hold really a complete key? Does it make sense to use ECC keys