El día jueves, mayo 02, 2024 a las 07:46:33 +0200, Werner Koch via Gnupg-users
escribió:
> On Thu, 2 May 2024 15:31, Matthias Apitz said:
>
> > which locks the card again. Any ideas?
>
> If you really want to reset the card after an operation _and_ you are
> using pcscd you can use
>
> ...
On Thu, 2 May 2024 15:31, Matthias Apitz said:
> which locks the card again. Any ideas?
If you really want to reset the card after an operation _and_ you are
using pcscd you can use
gpg-connect-agent 'scd disconnect' /bye
But killing scdaemon is probably the easier and more reliable way:
On Thu, 2 May 2024 16:58, Matěj Cepl said:
> rather dubious: systemd can certainly manage a dependence on
> shared resource, and concurrent running of two processes at
Right. However, systemd does not use the same locking scheme as gnupg
uses to avoid duplicate daemon startup. The gnupg intern
On Thu May 2, 2024 at 3:55 PM CEST, Ming Kuang via Gnupg-users wrote:
> https://lists.gnupg.org/pipermail/gnupg-users/2024-March/066957.html
> https://lists.gnupg.org/pipermail/gnupg-users/2024-March/066960.html
Just for the record, I find the explanation in the later email
rather dubious: systemd
> I run the L5 with its OpenPGP card sind 2021 and I don't remember the
> exact setup now. In any case, gpg-agent is there after any reboot.
>
One issue remains with the now working OpenPGP card for SSH: When the
correct PIN was provided the card remains unlocked, regardless if or not
the SSH ses
El día jueves, mayo 02, 2024 a las 08:13:12 -0400, Henning Follmann escribió:
> On Thu, May 02, 2024 at 01:58:37PM +0200, Matthias Apitz wrote:
> >
> > gpg-agent was always there, started by system boot.
>
> Are you certain? Did you change that at some point? Because if you use the
> default pur
On Thu, May 02, 2024 at 01:58:37PM +0200, Matthias Apitz wrote:
> El día jueves, mayo 02, 2024 a las 07:44:04 -0400, Henning Follmann escribió:
>
> > On Thu, May 02, 2024 at 10:33:15AM +0200, Matthias Apitz wrote:
> > > El día jueves, mayo 02, 2024 a las 08:17:58 +0200, Werner Koch via
> > > Gnup
El día jueves, mayo 02, 2024 a las 07:44:04 -0400, Henning Follmann escribió:
> On Thu, May 02, 2024 at 10:33:15AM +0200, Matthias Apitz wrote:
> > El día jueves, mayo 02, 2024 a las 08:17:58 +0200, Werner Koch via
> > Gnupg-users escribió:
> >
> > > ...
> > > On Linux take care to add "enable-s
On Thu, May 02, 2024 at 10:33:15AM +0200, Matthias Apitz wrote:
> El día jueves, mayo 02, 2024 a las 08:17:58 +0200, Werner Koch via
> Gnupg-users escribió:
>
> > ...
> > On Linux take care to add "enable-ssh-support" to gpg-agent.conf because
> > on some distros the X config greps for this to de
El día jueves, mayo 02, 2024 a las 08:17:58 +0200, Werner Koch via Gnupg-users
escribió:
> ...
> On Linux take care to add "enable-ssh-support" to gpg-agent.conf because
> on some distros the X config greps for this to decide whether to start
> the ssh-agent or leave this to gpg-agent. Technical
On Wed, 1 May 2024 11:50, Henning Follmann said:
> Well, if you have a authentication subkey on your card you could use that
> for ssh authentication directly.
> Your gpg-agent would then act as ssh-agent.
I would even claim that this is the best way to work with ssh - I do
this now for nearly 2
On Wed, May 01, 2024 at 04:32:54PM +0200, Matthias Apitz wrote:
>
> Hello,
>
> I've on my Linux cellphone L5 my RSA key for SSH crypted with GnuPG (to
> be exactly with an OpenPGP card in the phone). I can do fine:
>
> $ gpg -d id_rsa.asc > id_rsa # which asks for the PIN of the OpenPGP card
>
Smart cards like yubikeys, and termux okcagent integrations?
_ _
Med vennlig hilsen/Kind regards,
Christian C.
Phone/Tlf: +47 922 22 603
(Sent from my smartphone device)
On Wed, 1 May 2024, 17:19 Matthias Apitz, wrote:
>
> Hello,
>
> I've on my Linux cellphone L5 my RSA key for SSH crypted with
Hello,
I've on my Linux cellphone L5 my RSA key for SSH crypted with GnuPG (to
be exactly with an OpenPGP card in the phone). I can do fine:
$ gpg -d id_rsa.asc > id_rsa # which asks for the PIN of the OpenPGP card
$ ssh www.unixarea.de
Enter passphrase for key '/home/guru/.ssh/id_rsa':
...
$ r
14 matches
Mail list logo