Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Rainer Fiebig via Gnupg-users
Am 06.04.22 um 18:15 schrieb Robert J. Hansen via Gnupg-users:
>> You're barking up the wrong tree: It wasn't me who brought politics to
>> this list.
> 
> You're the one who is turning a single throwaway line in someone's
> signature block into an angry argument.
No. But you're the one who obviously _must_ have the last word.

> 
>> Nonsense. The OP issued a statement, I replied and that could have been
>> it. It is you who is obviously thriving on extending this discussion.
> 
> It "could have been it", I am certain, if he had apologized, removed the
> line from his signature block, and stopped.  Had he done otherwise we'd
> be right where we are now.
Assumptions are the mother of all disasters.

> 
> Regardless: I think I've made my position clear.  He is under no
> obligation to remove a line from his signature block that you object to
> on purely political grounds.  Let's drop this subject and return to
> talking about GnuPG.
Amen!

Rainer

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Rainer Fiebig via Gnupg-users
Am 06.04.22 um 17:04 schrieb Robert J. Hansen via Gnupg-users:
>> Just as I am free to comment on a political statement that I find
>> provocative, blatantly wrong and in the context of current events almost
>> derisive.
> 
> Excepting that this is not a mailing list for politics.
You're barking up the wrong tree: It wasn't me who brought politics to
this list.

> 
> Matthias has a line in his signature that you object to.  I object to
> it, too, but the only thing we need to do is nothing.  Perhaps you'd
There are times when "doing nothing" isn't an option any longer. It may
have escaped you but there is a war raging in Europe.

> like to place your own line in your own signature file making your
> pro-NATO feelings clear?  Either way, bringing it to the forefront of
> discussion is incredibly off-topic.
Nonsense. The OP issued a statement, I replied and that could have been
it. It is you who is obviously thriving on extending this discussion.

> 
> We'd like to keep this mailing list on-topic.  Thanks for
> understanding.  :)
Then heed your own advice and simply keep your wisdoms to yourself.

Rainer





___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Rainer Fiebig via Gnupg-users
Am 06.04.22 um 16:06 schrieb Robert J. Hansen via Gnupg-users:
>> Given recent events: can't you spare us your stupid signature?
> 
> Matthias should be, and is, free to advocate for his beliefs in his
> signature.
Just as I am free to comment on a political statement that I find
provocative, blatantly wrong and in the context of current events almost
derisive.

> 
> If we don't stand up for people's right to peacefully say things we
> don't like, we have failed as a community.
Then stand up for *my* right to peacefully say things as well. Or
perhaps just mind your own business.

> 
> I say this as an American who's a fanatical supporter of NATO.  Leave
> the guy alone, and let's get back to discussions about GnuPG.  Thanks.  :)
American or whatever: fanatics are always suspicious to me. Apart from
that: What I do or say is not yours to decide. And I don't need your
advice in this matter. And the OP is probably able to speak for himself.

The signature is a provocative political statement and it therefore has
to be expected and is probably even intended that people react to it.
And so I did. That's all. Like it or not.

Rainer


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: using OpenPGP card to unlock a LUKS device on boot

2022-04-06 Thread Rainer Fiebig via Gnupg-users
Am 05.04.22 um 16:57 schrieb Matthias Apitz:
> 
> Hello,
> 
> Can someone please comment in the forum or here (and I copy it over) how
> an OpenPGP card could be used to unlock a ciphered LUKS partition during
> boot of the L5 mobile device, see this posting at the end:
> 
> https://forums.puri.sm/t/librem-5-unlock-luks-volume-with-a-fido2-device/16890/7
> 
> Werner, what about your L5?
> 
> Thanks
> 
>   matthias
> 
Given recent events: can't you spare us your stupid signature? Or
replace "instead" by "through"? Even for die-hard ideologists it's about
time to adapt to reality.


Rainer



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Announce] A New Future for GnuPG

2022-01-03 Thread Rainer Fiebig via Gnupg-users
Great! This sounds like a success story that has only just begun. The
right solution at the right time!

The market for secure communication is huge and IMO still in its
infancy. And for a small fish in a big pond there's lots of room to grow. ;)

Congratulations! And good luck to you and GnuPG.com!

Rainer



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: fingerprint associated public key does not match displayed public key

2021-12-21 Thread Rainer Fiebig via Gnupg-users
Am 18.12.21 um 19:07 schrieb Ingo Klöcker:
> On Freitag, 17. Dezember 2021 18:04:04 CET S.B. via Gnupg-users wrote:
>>> Otherwise, you can simply send your exported key to the person you want to
>>> give your public key to.
>>
>> Yeah so, I can attach the .asc file that's in my Disk/users/SamiBadri
>> folder (it's the only .asc file I've seen), but I'm assuming that is
>> my public key.  Is that correct?
> 
> Well, it depends. We have no idea what the .asc file in Disk/users/SamiBadri 
> contains. It could be your public key. Or it could be somebody else's public 
> key. Or it could be something other than a public key.
> 
> Quite frankly, I suggest that you follow Robert's advice and start your 
> learning experience with OpenPGP by using an email client that supports 
> OpenPGP out-of-the-box. All decent email clients should have a functionality 
> to attach your public key to an email without you having to attach some file 
> manually.
> 
>> Is there anyway to send your private key?
> 
> Sure. You can send any file to anyone, so, of course, you can do the same 
> with 
> your private key (unless it's stored on a smartcard in a read-protected slot).
> 
> A decent email client should not offer a functionality to attach your secret 
> key to an email. So, if you stick to what your email client offers you, then 
> you should be safe.
> 
>> I want to know so that I don't do it accidentally.
> 
> Then don't attach random files you find on your disk to your emails without 
> knowing what those files contain.
> 
>> Also, if I
>> use the cat SamiB.asc command, the terminal reveals a certificate (and
>> I assume that's my public key certificate).
> 
> You shouldn't assume anything if you are dealing with encryption software. 
> You 
> should be sure what you are doing. Otherwise, in the extreme, you could 
> jeopardize the lives of other people.
> 
And then there's the one you're communicating with. Also make sure that
*he* knows what he is doing. Otherwise you might jeopardize your own
life. For example: Someone who replies to your top secret, perfectly
encrypted mail - without encrypting his reply. ;)

Rainer

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Thunderbird's hints and history for OpenPGP/MIME (new wiki page)

2021-12-03 Thread Rainer Fiebig via Gnupg-users
Am 03.12.21 um 12:04 schrieb Bernhard Reiter:
> Hi Peter,
> 
> Am Donnerstag 02 Dezember 2021 17:35:17 schrieb Dr. Peter Voigt:
>> thanks for that page. I'm not using Thunderbird but I know many people
>> who do. In particular the option to turn off the annoying dots is very
>> useful.
> 
> good to know  that you think it is useful. :)
No doubt it is useful. This three-dot-BS by default looks more like a
bug than a meaningful feature, IMO.

> 
>>  Did you toot the link through Mastodon as well
>> - I just failed to find and re-toot a correspondig content.
> 
> I didn't toot it so far.
> 
> First I wanted to gather some feedback, especially about the following 
> section, where I've added a recommendation what to use instead
> of incompatible header encryption:
> 
> 
> | Transport information in a decentral network - just like the writing on the
> | outside of a postal mail envelope - cannot be protected in principle.
> | When reflecting on this, chose  a subject that is plausible in context,
> | but without sensitive contents, to best veil potential unwanted observers. 
> | (Your thinking is right: The more sensitive this is, the more you have
> | to build up a plausible context for your unavoidable traces first.)
> 
This caters more to spies or people who have to be paranoid for an other
reason. And they will know already.

The average user, I guess, just wants to keep private communication
private. And what the subject reveals should in most cases be
negligible. So to me this paragraph seems a bit out of place.

> (Also I've just improved the phrasing and spelling.)
> 
> Best Regards,
> Bernhard

Thanks for your time and effort!

Rainer

> 
> 
> 
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [OT] English [was Re: Key Management - BSI had send private key instead of public key]

2021-11-18 Thread Rainer Fiebig via Gnupg-users
Am 18.11.21 um 22:21 schrieb Stuart Longland:
> On Thu, 18 Nov 2021 10:48:55 +0100
> Rainer Fiebig via Gnupg-users  wrote:
> 
>> That's kind of a misconception: as English is a western germanic
>> language it's not that German made its way into English but English is
>> *based* on German.
> 
> Ahh true, to the purists, English is not a language… it's a composite
> of German, French, Italian, Spanish… and lots of others.
> 
> Some might say English is a "language" that beats up other languages
> and steals their vocabulary.
That seems a bit too harsh to me. As I see it, English is a language
that evolved from its base by integrating useful or chic elements of
those languages that were present over time. A quite natural thing, I
guess. And perhaps one reason why it became so successful.

> 
> It doesn't mean the source language is immediately understandable by
> those that speak its derivative though even if individual words can be
> identified. :-)
> 
Yeah, that's a pity. But at least you have a head start should you ever
decide to go for the real thing. ;)

Cheers and good luck!

Rainer



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Management - BSI had send private key instead of public key

2021-11-18 Thread Rainer Fiebig via Gnupg-users
Am 18.11.21 um 13:27 schrieb Ineiev:
> On Thu, Nov 18, 2021 at 10:48:55AM +0100, Rainer Fiebig via Gnupg-users wrote:
>> That's kind of a misconception: as English is a western germanic
>> language it's not that German made its way into English but English is
>> *based* on German.
> 
> To be precise, not on German---it's based on the common ancestor.
> both English and German deviate considerably from it.
> 
I guess that saves the day for some. I can almost hear the sigh of
relief. ;)

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Key Management - BSI had send private key instead of public key

2021-11-18 Thread Rainer Fiebig via Gnupg-users
Am 17.11.21 um 23:49 schrieb Stuart Longland via Gnupg-users:
> On Tue, 16 Nov 2021 23:17:58 +
> Стефан Васильев via Gnupg-users  wrote:
> 
>> [1] 
>> https://www.golem.de/news/verschluesselung-bsi-verschickt-privaten-pgp-schluessel-2111-161073.html
> 
> Is there an English translation of this article somewhere?  I never
> learned German beyond what made its way into the English language or
> what I might've picked up from episodes of 'Allo 'Allo or Hogan's
> Heroes…
That's kind of a misconception: as English is a western germanic
language it's not that German made its way into English but English is
*based* on German.

You would be amazed how many words are similar or even pronounced
identically - like Haus/house, Maus/mouse, Finger/finger etc. pp. The
similarities between English and the dialect spoken in coastal regions
of northern Germany ("Plattdeutsch") are even more striking.

So you already do speak German - to some extent. In case you don't
believe me or wonder where "Anglo-Saxon" comes from, start here:
https://en.wikipedia.org/wiki/Angles.

A bit OT, I know. But I couldn't resist. Hope you're not offended. ;)

Kind regards!

Rainer

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


SOLVED: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-08-01 Thread Rainer Fiebig via Gnupg-users
Am 28.07.21 um 15:45 schrieb Bernhard Reiter:
> Hi Rainer,
> 
> Am Mittwoch 28 Juli 2021 11:22:18 schrieb Rainer Fiebig via Gnupg-users:
>> Hi! I'm having a problem when searching for keys on keyservers when
>> using "gpg --search-keys".
>>
>> The only line in dirmngr.conf (except for comments) is:
>> keyserver hkps://keys.openpgp.org

OK, I could figure it out, finally:

Beyond Linux From Scratch (BLFS) do not use ntbTLS for TLS, they use gnuTLS.

But in connection with an update of gnupg I had installed ntbTLS in my
former system because it was listed on
https://gnupg.org/download/index.html.

So I had it in my build list for my latest BLFS as well. Obviously,
gnupg prefers ntbTLS over gnuTLS. And so gnupg was built with ntbTLS
instead of gnuTLS. From the build log:
[...]
GnuPG v2.2.29 has been configured as follows:
[...]
TLS support: ntbTLS
[...]


ntbTLS was built after p11-kit but it doesn't seem to cooperate with
p11-kit in the same way that gnuTLS does and so expects the certificates
in those places that Werner has mentioned but which differ from the
setup in BLFS.

By configuring gnupg with

--disable-ntbTLS

it uses gnuTLS for TLS support.

And now gpg --search-keys works as expected in my BLFS.
My bad! Thanks to everybody involved! Sorry for having wasted your time!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [blfs-support] --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-31 Thread Rainer Fiebig via Gnupg-users
Am 31.07.21 um 21:00 schrieb Xi Ruoyao:
> On Sat, 2021-07-31 at 19:56 +0200, Rainer Fiebig wrote:
>> Am 31.07.21 um 17:40 schrieb Werner Koch:
>>> On Thu, 29 Jul 2021 18:36, Andrew Gallagher said:
>>>
 If you built gnupg from its default configuration, it does not
 automatically look in /etc/ssl/certs for CA certificates. You may
 want
>>>
>>> On Unix and unless gnupg was build with --with-default-trust-store-
>>> file
>>> the following collections of certificates are used for TLS:
>>>
>>>     { "/etc/ssl/ca-bundle.pem" },
>>>     { "/etc/ssl/certs/ca-certificates.crt" },
>>>     { "/etc/pki/tls/cert.pem" },
>>>     { "/usr/local/share/certs/ca-root-nss.crt" },
>>>     { "/etc/ssl/cert.pem" }
>>>
> 
> Hi Werner,
> 
> Our "recommended" configuration in BLFS is: gnutls is built with p11-kit
> and --with-default-trust-store-pkcs11="pkcs11:", and gnupg is built with
> gnutls.  So gnupg "should" use certificates from p11-kit trust store I
> think?  And it works for me.
> 
> I saw your discussion with "curl".  In BLFS curl uses OpenSSL instead of
> GnuTLS, so they actually have different trust stores.  GnuTLS (using
> p11-kit) uses /etc/pki/anchors, OpenSSL uses /etc/ssl/certs.
> 
> I remember once an unclean shutdown caused a similar issue on my system
> (/etc/pki/anchors is disrupted, and every program using GnuTLS just
> started to distrust every certificate).
> 
> Hi Rainer,
> 
> Try "gnutls-cli keys.openpgp.org".  If it does not get into "Simple
> Client Mode" as expected, it means p11-kit trust store may be disrupted.
> Try "make-ca -f -g" to rebuild it.
> 
> And check if your p11-kit was built with
> -Dtrust_paths=/etc/pki/anchors as the BLFS book says.  If not sure,
> rebuild it.  (I can also remember once I've mistyped the path, this also
> caused every program using GnuTLS started to distrust every
> certificate.)
> 
OK, issued "make-ca -f -g" and re-built gnupg *without* path_to_file.
But the result then was again

~> gpg --search-keys E3FF2839C048B25C084DEBE9B26995E310250568
gpg: error searching keyserver: No inquire callback in IPC

So the only way to get this reliably working on my system seems to be
building gnupg *with* path_to_file.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: [blfs-support] --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-31 Thread Rainer Fiebig via Gnupg-users
Am 31.07.21 um 21:00 schrieb Xi Ruoyao:
> On Sat, 2021-07-31 at 19:56 +0200, Rainer Fiebig wrote:
>> Am 31.07.21 um 17:40 schrieb Werner Koch:
>>> On Thu, 29 Jul 2021 18:36, Andrew Gallagher said:
>>>
 If you built gnupg from its default configuration, it does not
 automatically look in /etc/ssl/certs for CA certificates. You may
 want
>>>
>>> On Unix and unless gnupg was build with --with-default-trust-store-
>>> file
>>> the following collections of certificates are used for TLS:
>>>
>>>     { "/etc/ssl/ca-bundle.pem" },
>>>     { "/etc/ssl/certs/ca-certificates.crt" },
>>>     { "/etc/pki/tls/cert.pem" },
>>>     { "/usr/local/share/certs/ca-root-nss.crt" },
>>>     { "/etc/ssl/cert.pem" }
>>>
> 
> Hi Werner,
> 
> Our "recommended" configuration in BLFS is: gnutls is built with p11-kit
> and --with-default-trust-store-pkcs11="pkcs11:", and gnupg is built with
> gnutls.  So gnupg "should" use certificates from p11-kit trust store I
> think?  And it works for me.
> 
> I saw your discussion with "curl".  In BLFS curl uses OpenSSL instead of
> GnuTLS, so they actually have different trust stores.  GnuTLS (using
> p11-kit) uses /etc/pki/anchors, OpenSSL uses /etc/ssl/certs.
> 
> I remember once an unclean shutdown caused a similar issue on my system
> (/etc/pki/anchors is disrupted, and every program using GnuTLS just
> started to distrust every certificate).
> 
> Hi Rainer,
> 
> Try "gnutls-cli keys.openpgp.org".  If it does not get into "Simple
> Client Mode" as expected, it means p11-kit trust store may be disrupted.
> Try "make-ca -f -g" to rebuild it.
> 
Thanks. "gnutls-cli keys.openpgp.org" seems to work:

~> gnutls-cli keys.openpgp.org
Processed 145 CA certificate(s).
Resolving 'keys.openpgp.org:443'...
Connecting to '37.218.245.50:443'...
- Certificate type: X.509
- Got a certificate list of 3 certificates.
- Certificate[0] info:
[...]
- Handshake was completed

- Simple Client Mode:

- Peer has closed the GnuTLS connection
~>

> And check if your p11-kit was built with
> -Dtrust_paths=/etc/pki/anchors as the BLFS book says.  If not sure,
> rebuild it.  (I can also remember once I've mistyped the path, this also
> caused every program using GnuTLS started to distrust every
> certificate.)
> 
p11-kit was built with
--with-trust-paths=/etc/pki/anchors 
which is in accordance with BLFS-10.1. But I suppose that is equivalent
to  -Dtrust_paths=/etc/pki/anchors ?

Anyway - I'll try "make-ca -f -g" and then re-build gnupg without
--with-default-trust-store-file=/etc/pki/tls/certs/ca-bundle.crt
and report back.

So long!





___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-31 Thread Rainer Fiebig via Gnupg-users
Am 31.07.21 um 17:40 schrieb Werner Koch:
> On Thu, 29 Jul 2021 18:36, Andrew Gallagher said:
> 
>> If you built gnupg from its default configuration, it does not
>> automatically look in /etc/ssl/certs for CA certificates. You may want
> 
> On Unix and unless gnupg was build with --with-default-trust-store-file
> the following collections of certificates are used for TLS:
> 
> { "/etc/ssl/ca-bundle.pem" },
> { "/etc/ssl/certs/ca-certificates.crt" },
> { "/etc/pki/tls/cert.pem" },
> { "/usr/local/share/certs/ca-root-nss.crt" },
> { "/etc/ssl/cert.pem" }
> 
Thanks. None of those files is on my system. So it's probably no wonder
that "--search-keys" didn't work.

Either I messed up big or LFS/BLFS uses a setup for the certificates
that is not what gnupg expects. In the latter case
--with-default-trust-store-file=/etc/pki/tls/certs/ca-bundle.crt
may indeed be the way to go for LFS/BLFS systems.

I'll cc this to blfs-support so that the editors can draw their own
conclusions. Or castigate me for being too stupid to follow the
instructions somewhere. ;)

>> to add a soft link from /etc/gnupg/trusted-certs to /etc/ssl/certs so
>> that dirmngr looks in the Mozilla certificate library.
> 
> Not a too good idea becuase these certificates are used for a different
> purpose.  
> 
> 
> FWIW, here is the list of internal certificate classes used:
> 
>   CERTTRUST_CLASS_SYSTEM  = 1, /* From the system's list of trusted certs. */
>   CERTTRUST_CLASS_CONFIG  = 2, /* From dirmngr's config files. */
>   CERTTRUST_CLASS_HKP = 4, /* From --hkp-cacert*/
>   CERTTRUST_CLASS_HKPSPOOL= 8, /* The one and only from sks-keyservers */
> 
> 
> Shalom-Salam,
> 
>Werner
> 
> 


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-30 Thread Rainer Fiebig via Gnupg-users
Am 29.07.21 um 19:36 schrieb Andrew Gallagher:
> On 29/07/2021 17:52, Rainer Fiebig wrote:
>>
>> ~> openssl x509 -text > After"
>>  Not After : Sep 30 14:01:15 2021 GMT
> 
> So the file exists, and appears to have the correct contents (the
> difference in checksum is probably whitespace or commentary, I wouldn't
> worry about it).
> 
> I'm going to refer back to my earlier statement: "It looks like dirmngr
> isn't using the same set of CAs that curl is using".
> 
> If you built gnupg from its default configuration, it does not
> automatically look in /etc/ssl/certs for CA certificates. You may want
> to add a soft link from /etc/gnupg/trusted-certs to /etc/ssl/certs so
> that dirmngr looks in the Mozilla certificate library.
> 
Perhaps solved. As the main issue here seemed to be that gnupg could not
find the certificate(s) and the symlink to /etc/ssl/certs (all .pem) did
not work, I re-built gnupg with this configure-switch:

--with-default-trust-store-file=/etc/pki/tls/certs/ca-bundle.crt


And now  --search-keys is working:

~> gpg --search-keys E3FF2839C048B25C084DEBE9B26995E310250568
gpg: data source: https://keys.openpgp.org:443
(1) Łukasz Langa (GPG langa.pl) 
Łukasz Langa 
Łukasz Langa 
  4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
von Nummern, Nächste (N) oder Abbrechen (Q) >

~> gpg --keyserver hkps://keys.openpgp.org --search-keys
E3FF2839C048B25C084DEBE9B26995E310250568
gpg: data source: https://keys.openpgp.org:443
(1) Łukasz Langa (GPG langa.pl) 
Łukasz Langa 
Łukasz Langa 
  4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
von Nummern, Nächste (N) oder Abbrechen (Q) >

~> gpg --keyserver hkps://pgpkeys.eu --search-keys
E3FF2839C048B25C084DEBE9B26995E310250568
gpg: data source: https://pgpkeys.eu:443
(1) Łukasz Langa (GPG langa.pl) 
Łukasz Langa 
Łukasz Langa 
Łukasz Langa (Work e-mail account) 
  4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
von Nummern, Nächste (N) oder Abbrechen (Q) >



However, having to build gnupg with this switch feels somewhat akward,
like a workaround, not like it should be.

I'll post this solution over at blfs-supp...@lists.linuxfromscratch.org
and see what they think about it. Perhaps they have a more elegant
solution or can tell me whether I've made a configuration-mistake elsewhere.

Thank you guys for your time and suggestions. They helped a lot!



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-29 Thread Rainer Fiebig via Gnupg-users
Am 29.07.21 um 19:36 schrieb Andrew Gallagher:
> On 29/07/2021 17:52, Rainer Fiebig wrote:
>>
>> ~> openssl x509 -text > After"
>>  Not After : Sep 30 14:01:15 2021 GMT
> 
> So the file exists, and appears to have the correct contents (the
> difference in checksum is probably whitespace or commentary, I wouldn't
> worry about it).
> 
> I'm going to refer back to my earlier statement: "It looks like dirmngr
> isn't using the same set of CAs that curl is using".
Yes, that seems to be at the heart of the matter. Curl is built with
this ./configure switch:
--with-ca-path=/etc/ssl/certs

and so it finds the correct certificate.

There's no such switch for gnupg. So I guess dirmngr looks in /etc/pki
for the certs? And maybe the DST_Root_CA_X3 (in "ca-bundle.crt) there is
different (outdated?) from the one in /etc/ssl/certs.

> 
> If you built gnupg from its default configuration, it does not
> automatically look in /etc/ssl/certs for CA certificates. You may want
> to add a soft link from /etc/gnupg/trusted-certs to /etc/ssl/certs so
> that dirmngr looks in the Mozilla certificate library.
> 
The manpage for dirmngr says that the certificates in
/etc/gnupg/trusted-certs  are expected to be in .der or .crt  encoding.
Those in /etc/ssl are .pem, though.

I created a symlink /etc/gnupg/trusted-certs -> /etc/ssl/certs/ but gpg
--search-keys  still fails, probably due to the .pem encoding.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-29 Thread Rainer Fiebig via Gnupg-users
Am 29.07.21 um 18:45 schrieb Andrew Gallagher:
> On 29/07/2021 17:33, Rainer Fiebig wrote:
>> Thanks. File exists but has a different checksum:
>>
>> /etc/ssl/certs> sha256sum DST_Root_CA_X3.pem
>> 4b3ecda4db3f417f23f5dfa84eb4d59d6cc2959446ebaf89c7df5866d31e9980
>> DST_Root_CA_X3.pem
> 
> Ah, I wonder is the expiry date different. Can you incant the following
> please?
> 
> ```
> openssl x509 -text  ```
> 
> Mine says:
> 
> ```
> Not After : Sep 30 14:01:15 2021 GMT
> ```
> 

Same here:

~> openssl x509 -text http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-29 Thread Rainer Fiebig via Gnupg-users
Am 29.07.21 um 18:16 schrieb Andrew Gallagher:
> On 29/07/2021 08:41, Rainer Fiebig via Gnupg-users wrote:
>> Am 28.07.21 um 21:38 schrieb Ingo Klöcker:
>>> On Mittwoch, 28. Juli 2021 18:38:07 CEST Rainer Fiebig via Gnupg-users 
> wrote:
>>>
>>> Does 'gpg --keyserver hkps://pgpkeys.eu --search-keys ...' work for you?
>>>
>> No, same output as reported initially.
> 
> The common problem is the LetsEncrypt R3 certificate.
> 
>> * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
>> * ALPN, server accepted to use http/1.1
>> * Server certificate:
>> *  subject: CN=keys.openpgp.org
>> *  start date: Jul 26 04:32:08 2021 GMT
>> *  expire date: Oct 24 04:32:06 2021 GMT
>> *  subjectAltName: host "keys.openpgp.org" matched cert's
>> "keys.openpgp.org"
>> *  issuer: C=US; O=Let's Encrypt; CN=R3
>> *  SSL certificate verify ok.
> ...
>> Looks OK to me. The Let's Encrypt certificate is recognized and
>> verified. Or what do you think?
> 
> I think it looks like dirmngr isn't using the same set of CAs that curl
> is using.
> 
> The missing root certificate is:
> 
>> 2021-07-28 16:06:50 dirmngr[4135.6] issuer certificate: #/CN=DST Root 
> CA
>> X3,O=Digital Signature Trust Co.
> Can you confirm that /etc/ssl/certs/DST_Root_CA_X3.pem exists on your
> machine and has the following checksum?
> 
> ```
> andrewg@whippet:~$ sha256sum /etc/ssl/certs/DST_Root_CA_X3.pem
> 139a5e4a4e0fa505378c72c5f700934ce8333f4e6b1b508886c4b0eb14f4be99
> /etc/ssl/certs/DST_Root_CA_X3.pem
> ```
> 
Thanks. File exists but has a different checksum:

/etc/ssl/certs> sha256sum DST_Root_CA_X3.pem
4b3ecda4db3f417f23f5dfa84eb4d59d6cc2959446ebaf89c7df5866d31e9980
DST_Root_CA_X3.pem

> Also, is your system clock correct? (long shot, but always worth asking
> when debugging TLS cert issues)
> 
System clock is OK. No problem asking - I'm happy for every clue I can
get in this matter. ;)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-29 Thread Rainer Fiebig via Gnupg-users
Am 28.07.21 um 21:38 schrieb Ingo Klöcker:
> On Mittwoch, 28. Juli 2021 18:38:07 CEST Rainer Fiebig via Gnupg-users wrote:
>> Am 28.07.21 um 17:42 schrieb Andrew Gallagher:
>>> On 28/07/2021 15:19, Rainer Fiebig via Gnupg-users wrote:
>>>> 2021-07-28 16:06:50 dirmngr[4135.6] Fehler beim Verbinden mit
>>>> 'https://keys.openpgp.org:443': Fehlendes Herausgeberzertifikat in der
>>>> Kette
>>>> 2021-07-28 16:06:50 dirmngr[4135.6] command 'KS_SEARCH' failed:
>>>> Fehlendes Herausgeberzertifikat in der Kette
>>>> 2021-07-28 16:06:50 dirmngr[4135.6] Handhabungsroutine für den fd 6
>>>> beendet
>>>
>>> "Fehlendes Herausgeberzertifikat in der Kette" translates as "Missing
>>> publisher certificate in the chain", is that correct?
>>
>> Correct.
>>
>>> keys.openpgp.org uses LetsEncrypt as their TLS CA. Can you connect to
>>> other keyservers that also use LetsEncrypt? For example, pgpkeys.eu uses
>>> the same intermediate certificate (LetsEncrypt R3) as keys.openpgp.org.
>>
>> This works:
>>
>> ~> gpg --keyserver pgpkeys.eu --search-keys
>> E3FF2839C048B25C084DEBE9B26995E310250568
>> gpg: enabled debug flags: memstat
>> gpg: data source: http://pgpkeys.eu:11371
>> (1)  Łukasz Langa (GPG langa.pl) 
>>  Łukasz Langa 
>>  Łukasz Langa 
>>  Łukasz Langa (Work e-mail account) 
>>4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
>> Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
>> von Nummern, Nächste (N) oder Abbrechen (Q) >
> 
> Doesn't use TLS. Just plain HTTP.
> 
>> Each of these lines in dirmngr.conf also work:
>> keyserver http://keys2.andreas-puls.de/
>> keyserver http://pgpkeys.eu/
> 
> Ditto. Since your problems seem to be related to TLS it's not really 
> surprising that keyservers not using https work.
> 
At least I now know that such keyservers still exist. ;)

> Does 'gpg --keyserver hkps://pgpkeys.eu --search-keys ...' work for you?
> 
No, same output as reported initially.

> What does 'curl -v https://keys.openpgp.org' say?
> 
~> curl --max-filesize 1 -v https://keys.openpgp.org
*   Trying 37.218.245.50:443...
* Connected to keys.openpgp.org (37.218.245.50) port 443 (#0)
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*  CAfile: none
*  CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=keys.openpgp.org
*  start date: Jul 26 04:32:08 2021 GMT
*  expire date: Oct 24 04:32:06 2021 GMT
*  subjectAltName: host "keys.openpgp.org" matched cert's "keys.openpgp.org"
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify ok.
> GET / HTTP/1.1
> Host: keys.openpgp.org
> User-Agent: curl/7.77.0
> Accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: nginx/1.14.2
< Date: Thu, 29 Jul 2021 07:20:26 GMT
< Content-Type: text/html; charset=utf-8
< Content-Length: 1761
< Connection: keep-alive
< Vary: Accept-Encoding
< X-Frame-Options: SAMEORIGIN
< X-XSS-Protection: 1; mode=block
< X-Content-Type-Options: nosniff
< Referrer-Policy: no-referrer-when-downgrade
< Content-Security-Policy: default-src 'none'; script-src 'self';
img-src 'self'; style-src 'self' 'unsafe-inline'; font-src 'self';
frame-ancestors 'none'; base-uri 'none'; form-action 'self'; report-uri
https://keysopenpgporg.report-uri.com/r/d/csp/enforce
< Strict-Transport-Security: max-age=31536000; includeSubDomains
< Expect-CT: max-age=31536000,
report-uri="https://keysopenpgporg.report-uri.com/r/d/ct/reportOnly";
< alt-svc:
h2="zkaan2xfbuxia2wpf7ofnkbz6r5zdbbvxbunvp5g2iebopbfc4iqmbad.onion:443";
ma=86400; persist=1
<

[..]

Looks OK to me. The Let's Encrypt certificate is recognized and
verified. Or what do you think?

> Regards,
> Ingo
> 
Thanks for your help!

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-28 Thread Rainer Fiebig via Gnupg-users
Am 28.07.21 um 17:42 schrieb Andrew Gallagher:
> On 28/07/2021 15:19, Rainer Fiebig via Gnupg-users wrote:
>> 2021-07-28 16:06:50 dirmngr[4135.6] Fehler beim Verbinden mit
>> 'https://keys.openpgp.org:443': Fehlendes Herausgeberzertifikat in der
>> Kette
>> 2021-07-28 16:06:50 dirmngr[4135.6] command 'KS_SEARCH' failed:
>> Fehlendes Herausgeberzertifikat in der Kette
>> 2021-07-28 16:06:50 dirmngr[4135.6] Handhabungsroutine für den fd 6
>> beendet
> 
> "Fehlendes Herausgeberzertifikat in der Kette" translates as "Missing
> publisher certificate in the chain", is that correct?
> 
Correct.

> keys.openpgp.org uses LetsEncrypt as their TLS CA. Can you connect to
> other keyservers that also use LetsEncrypt? For example, pgpkeys.eu uses
> the same intermediate certificate (LetsEncrypt R3) as keys.openpgp.org.
> 
This works:

~> gpg --keyserver pgpkeys.eu --search-keys
E3FF2839C048B25C084DEBE9B26995E310250568
gpg: enabled debug flags: memstat
gpg: data source: http://pgpkeys.eu:11371
(1) Łukasz Langa (GPG langa.pl) 
Łukasz Langa 
Łukasz Langa 
Łukasz Langa (Work e-mail account) 
  4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
von Nummern, Nächste (N) oder Abbrechen (Q) >


Each of these lines in dirmngr.conf also work:
keyserver http://keys2.andreas-puls.de/
keyserver http://pgpkeys.eu/

~> gpg --search-keys E3FF2839C048B25C084DEBE9B26995E310250568
gpg: enabled debug flags: memstat
gpg: data source: http://keys2.andreas-puls.de:80
(1) Łukasz Langa (GPG langa.pl) 
Łukasz Langa 
Łukasz Langa 
Łukasz Langa (Work e-mail account) 
  4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
von Nummern, Nächste (N) oder Abbrechen (Q) >

> What OS are you using? Do you have the latest version of ca-certificates
> (or equivalent) installed?
> 
Linux From Scratch, latest stable. The ca-certificates (from
Mozilla.org) are updated regularly (automated).



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Re: --search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-28 Thread Rainer Fiebig via Gnupg-users
Am 28.07.21 um 15:45 schrieb Bernhard Reiter:
> Hi Rainer,
> 
> Am Mittwoch 28 Juli 2021 11:22:18 schrieb Rainer Fiebig via Gnupg-users:
>> Hi! I'm having a problem when searching for keys on keyservers when
>> using "gpg --search-keys".
>>
>> The only line in dirmngr.conf (except for comments) is:
>> keyserver hkps://keys.openpgp.org
> 
> note that this particular keyserver has decided to be incompatible with 
> the current OpenPGP standard, by ommitting a valid user id, unless
> it was "validated".
> (It says so it in its FAQ and there is port of a discussion here
> https://dev.gnupg.org/T4393#133695)
> This could potentially cause problems.
> 
>> However, this (and only this) works:
>>
>> ~> gpg --keyserver keyserver.ubuntu.com --search-keys
>> E3FF2839C048B25C084DEBE9B26995E310250568
> 
> Have you tried some other keyservers like http://keys2.andreas-puls.de/ ?
> Or you can set some dirmngr options to get more diagnostic output
> in its logfile. (See dirmngr's documentation.)
> 
> Regards,
> Bernhard
> 
> 
> 
> ___
> Gnupg-users mailing list
> Gnupg-users@gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
> 
Thanks for your quick reply. Set dirmngr to "verbose". The output points
to a certificate-issue (again my apologies to non German-speaking members):

~> cat dirmngr.log
2021-07-28 16:06:49 dirmngr[4134] Es wird auf Socket
`/run/user/1000/gnupg/S.dirmngr' gehört
2021-07-28 16:06:49 dirmngr[4135.0]dauerhaft geladene Zertifikate: 0
2021-07-28 16:06:49 dirmngr[4135.0]  zwischengespeicherte Zertifikate: 0
2021-07-28 16:06:49 dirmngr[4135.0] vertrauenswürdige Zertifikate: 0
(0,0,0,0)
2021-07-28 16:06:49 dirmngr[4135.6] Handhabungsroutine für fd 6 gestartet
2021-07-28 16:06:49 dirmngr[4135.6] connection from process 4132 (1000:1000)
2021-07-28 16:06:50 dirmngr[4135.6] resolve_dns_addr for
'keys.openpgp.org': 'keys.openpgp.org' [already known]
2021-07-28 16:06:50 dirmngr[4135.6] resolve_dns_addr for
'keys.openpgp.org': 'keys.openpgp.org' [already known]
2021-07-28 16:06:50 dirmngr[4135.6] detected interfaces: IPv4 IPv6
2021-07-28 16:06:50 dirmngr[4135.6] Zertifikat wurde zwischengespeichert
2021-07-28 16:06:50 dirmngr[4135.6] Zertifikat wurde zwischengespeichert
2021-07-28 16:06:50 dirmngr[4135.6] Hinweis: Die unkritische
Zertifikatsrichtlinie ist nicht erlaubt
2021-07-28 16:06:50 dirmngr[4135.6] Das Zertifikat ist korrekt
2021-07-28 16:06:50 dirmngr[4135.6] Hinweis: Die unkritische
Zertifikatsrichtlinie ist nicht erlaubt
2021-07-28 16:06:50 dirmngr[4135.6] Das Zertifikat ist korrekt
2021-07-28 16:06:50 dirmngr[4135.6] Hinweis: Die unkritische
Zertifikatsrichtlinie ist nicht erlaubt
2021-07-28 16:06:50 dirmngr[4135.6] Fehler beim Holen des Zertifikats
mittels Subject: Konfigurationsfehler
2021-07-28 16:06:50 dirmngr[4135.6] issuer certificate
{C4A7B1A47B2C71FADBE14B9075FFC41560858910} not found using
authorityKeyIdentifier
2021-07-28 16:06:50 dirmngr[4135.6] Herausgeberzertifikat nicht gefunden
2021-07-28 16:06:50 dirmngr[4135.6] issuer certificate: #/CN=DST Root CA
X3,O=Digital Signature Trust Co.
2021-07-28 16:06:50 dirmngr[4135.6] TLS handshake failed: Fehlendes
Herausgeberzertifikat in der Kette 
2021-07-28 16:06:50 dirmngr[4135.6] Fehler beim Verbinden mit
'https://keys.openpgp.org:443': Fehlendes Herausgeberzertifikat in der Kette
2021-07-28 16:06:50 dirmngr[4135.6] command 'KS_SEARCH' failed:
Fehlendes Herausgeberzertifikat in der Kette
2021-07-28 16:06:50 dirmngr[4135.6] Handhabungsroutine für den fd 6 beendet
~>

Have to admit that I'm a bit clueless here.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


--search-keys: "gpg: error searching keyserver: No inquire callback in IPC"

2021-07-28 Thread Rainer Fiebig via Gnupg-users
Hi! I'm having a problem when searching for keys on keyservers when
using "gpg --search-keys".

The only line in dirmngr.conf (except for comments) is:
keyserver hkps://keys.openpgp.org

gnupg version is 2.2.29 but I also see this with 2.2.27.

Locale is German but "Kein "Inquire" "Callback" für IPC gesetzt" should
be equivalent to "No inquire callback in IPC". Sorry.


~> gpg --search-keys E3FF2839C048B25C084DEBE9B26995E310250568
gpg: enabled debug flags: memstat
gpg: error searching keyserver: Kein "Inquire" "Callback" für IPC gesetzt
gpg: Suche auf dem Schlüsselserver fehlgeschlagen: Kein "Inquire"
"Callback" für IPC gesetzt
gpg: keydb: handles=0 locks=0 parse=0 get=0
gpg:build=0 update=0 insert=0 delete=0
gpg:reset=0 found=0 not=0 cache=0 not=0
gpg: kid_not_found_cache: count=0 peak=0 flushes=0
gpg: sig_cache: total=0 cached=0 good=0 bad=0
gpg: random usage: poolsize=600 mixed=0 polls=0/0 added=0/0
  outmix=0 getlvl1=0/0 getlvl2=0/0
gpg: rndjent stat: collector=0x calls=0 bytes=0
gpg: secmem usage: 0/32768 bytes in 0 blocks
~>


However, this (and only this) works:

~> gpg --keyserver keyserver.ubuntu.com --search-keys
E3FF2839C048B25C084DEBE9B26995E310250568
gpg: enabled debug flags: memstat
gpg: data source: http://162.213.33.8:11371
(1) Łukasz Langa (GPG langa.pl) 
Łukasz Langa 
Łukasz Langa 
Łukasz Langa (Work e-mail account) 
  4096 bit RSA key B26995E310250568, erzeugt: 2015-05-11
Keys 1-1 of 1 for "E3FF2839C048B25C084DEBE9B26995E310250568".  Eingabe
von Nummern, Nächste (N) oder Abbrechen (Q)
[...]


Any ideas? Thanks.

Rainer Fiebig

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users