Is something not right with my ~/.gnupg/pubring.kbx

2018-06-08 Thread Ajax
Most gpg commands give me something like this: $ gpg -Kv gpg: using classic trust model gpg: keydb_search failed: Invalid value gpg: Oops: keyid_from_fingerprint: no pubkey ~/.gnupg/pubring.kbx Followed by what appears to me to be normal output. I also see: $ kbxutil --stats ~/.gnupg/pubring.kb

Re: [Announce] [security fix] GnuPG 2.2.8 released (CVE-2018-12020)

2018-06-08 Thread Werner Koch
On Fri, 8 Jun 2018 20:29, d...@fifthhorseman.net said: > I'm having the same problem. Werner, what is the passphrase for this > test example? abc Sorry. I guess i rushed this thing out a bit too fast. Salam-Shalom, Werner -- # Please read: Daniel Ellsberg - The Doomsday Machine #

Re: [Announce] [security fix] GnuPG 2.2.8 released (CVE-2018-12020)

2018-06-08 Thread Daniel Kahn Gillmor
On Fri 2018-06-08 14:29:52 -0400, Daniel Kahn Gillmor wrote: > On Fri 2018-06-08 17:03:07 +0200, Andre Heinecke wrote: > >> I have a problem with the test >> It asks me for a symetric passphrase. > > I'm having the same problem. Werner, what is the passphrase for this > test example? ah, the pass

Re: [Announce] [security fix] GnuPG 2.2.8 released (CVE-2018-12020)

2018-06-08 Thread Daniel Kahn Gillmor
On Fri 2018-06-08 17:03:07 +0200, Andre Heinecke wrote: > I have a problem with the test > It asks me for a symetric passphrase. I'm having the same problem. Werner, what is the passphrase for this test example? --dkg ___ Gnupg-users mailing lis

Re: [Announce] [security fix] GnuPG 2.2.8 released (CVE-2018-12020)

2018-06-08 Thread Andre Heinecke
Hi, I have a problem with the test On Friday 8 June 2018 15:40:55 CEST Werner Koch wrote: > [1] If you want to test whether you are affected by this bug, remove the > indentation from the following block > > -BEGIN PGP MESSAGE- > > jA0EBwMC1pW2pqoYvbXl0p4Bo5z/v7PXy7T1BY/KQxWaE9uTB

[Announce] [security fix] GnuPG 2.2.8 released (CVE-2018-12020)

2018-06-08 Thread Werner Koch
Hello! We are pleased to announce the availability of a new GnuPG release: version 2.2.8. This version fixes a critical security bug and comes with some other minor changes. Impact == All current GnuPG versions are affected on all platforms. All mail clients and other applications which m

Re: EFAIL countermeasure recommendations on your site

2018-06-08 Thread Robert J. Hansen
Would it be possible for you to make recommendations about how to respond to the EFAIL vulnerability on your site? This is the sort of thing better addressed to email plugin authors. Efail had very limited applicability to GnuPG itself. signature.asc Description: OpenPGP digital signature _