What's a reasonably efficient way to fetch a lot of keys, by
fingerprint, from keyserver pools with HKPS?
Presently, the code is effectively this:
...cat-list-of-fingerprints... | xargs gpg --recv
This has the downside of causing many execs.
As an alternate, it was suggested that I could do manu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Thursday 2 November 2017 at 2:55:07 AM, in
, John Ramsden
wrote:-
> I think I may be misunderstanding how I'm supposed to
> be decrypting with
> a subkey. From what I thought, the public key should
> be the same on a
> subkey as it is on a pri
On 02/11/17 20:37, Phil Susi wrote:
> [..] but 2.0.28 on another also did it I'm pretty sure.
Yes, I'm pretty sure of that as well. 2.0 can't update secret keys; it
was introduced with 2.1 or somewhere during 2.1.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
On 11/2/2017 3:04 PM, Peter Lebbing wrote:
> On 02/11/17 16:58, Phil Susi wrote:
>> Why is this?
>
> What version of GnuPG is this? It's a well-known limitation of GnuPG 1.4
> and 2.0, but my 2.1.18 allows me to add secret subkeys through --import.
Looks like I've still got 1.4.20 on one machine
On 02/11/17 16:58, Phil Susi wrote:
> Why is this?
What version of GnuPG is this? It's a well-known limitation of GnuPG 1.4
and 2.0, but my 2.1.18 allows me to add secret subkeys through --import.
HTH,
Peter.
--
I use the GNU Privacy Guard (GnuPG) in combination with Enigmail.
You can send me
>
> so at Facebook, we checked
> the public keys that have been uploaded to people's profiles, and notified
> people whose keys are affected
Jon,
FYI your detection logic seems a bit overzealous, because (last time I
checked) it detects revoked ROCA-vulnerable subkeys as making the whole
public
Whenever my subkeys expire and I have to generate a new one, I try to
import the keys on my less secure machines and gpg stupidly refuses to
update the already existing key with the new subkey. I have to delete
the key, then import to get the new subkey into the keyring. Why is this?
__
Hello,
I have a yubikey that I use as gpg smartcard. On that yubikey I have an
authentication subkey. I uploaded the pubkey to AWS cloud. When I create
a Windows instance they use that pubkey to encrypt a password using RSA
to my privkey. Since my privkey is stored on the smartcard, I can't use
ope
I think I may be misunderstanding how I'm supposed to be decrypting with
a subkey. From what I thought, the public key should be the same on a
subkey as it is on a primary key. I see the same public key when I list
them on my machine which stores the primary key and the machine that
stores the subk