-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 15 Apr 2024 14:03:28 +0200
Source: rust-sequoia-gpg-agent
Architecture: source
Version: 0.3.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Alexander Kjäll
Changes:
rust-sequoia
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 11 Apr 2024 19:55:25 +0200
Source: rust-sequoia-gpg-agent
Architecture: source
Version: 0.3.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Alexander Kjäll
Changes:
rust-sequoia
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 20 Mar 2024 00:10:55 CET
Source: rust-sequoia-gpg-agent
Binary: librust-sequoia-gpg-agent-dev
Architecture: amd64 source
Version: 0.2.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 24 Mar 2024 23:40:19 +0100
Source: php-crypt-gpg
Architecture: source
Version: 1.6.9-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Changes:
php-crypt-gpg (1.6.9
Bonjour,
Y a-t-il des développeurs Debian qui pourraient signer ma clé GPG en
basse Normandie aux alentours d'Alençon ?
Dans l'Orne, la Sarthe ou éventuellement la Mayenne.
Bonne journée,
--
Patrick ZAJDA
OpenPGP_0x9D4AD35BEA273DCA.asc
Description: OpenPGP public key
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 21 Dec 2023 08:41:08 -0500
Source: rust-gpg-error
Architecture: source
Version: 0.6.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Alexander Kjäll
Changes:
rust-gpg-error (0.6.0
On 12/13/23 13:13, Jean Charles Delépine wrote:
Bonjour,
Je crois que c'est mon premier mail sur cette liste.
Admin sys au Havre puis à Lyon et finalement depuis 23 ans à Amiens
j'utilise Debian depuis 1997, GNU/Linux depuis 1994 et les logiciels
libres depuis plus longtemps. Certains d'entre
Bonjour,
Je crois que c'est mon premier mail sur cette liste.
Admin sys au Havre puis à Lyon et finalement depuis 23 ans à Amiens
j'utilise Debian depuis 1997, GNU/Linux depuis 1994 et les logiciels
libres depuis plus longtemps. Certains d'entre vous m'ont certainement
connu sur Usenet-Fr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 24 Nov 2023 13:06:55 +0100
Source: php-crypt-gpg
Architecture: source
Version: 1.6.8-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Changes:
php-crypt-gpg (1.6.8
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 28 Jan 2023 11:10:53 -0800
Source: gpg-remailer
Architecture: source
Version: 3.04.07-1
Distribution: unstable
Urgency: medium
Maintainer: Frank B. Brokken
Changed-By: tony mancill
Changes:
gpg-remailer (3.04.07-1) unstable
On Fri, Dec 16, 2022 at 01:22:30AM +0100, Juri Grabowski wrote:
> Quebes is not really RPM distribution as long I know.
It is: Qubes' dom0 is based on Fedora.
(and then you can install (almost) any other distro in domU, not
just linux however, but also BSDs, Mirage, Windows or something else.)
Hi!
On Thu, Dec 15, 2022 at 03:12:21PM +0100, Guillem Jover wrote:
> The project name talks about gpg keys, but those are really OpenPGP
> keys (or even better, certificates). I've asked upstream to rename the
> project to avoid this common confusion. So you might want to wait until
Hello,
On Thu, Dec 15, 2022 at 08:15:37AM +0100, Adam Borowski wrote:
> These are all RPM distributions, which is definitely not what one would
> expect in our context. At the very least the short desc would need to
> mention that, and I'd recommend having that in the name as well.
Thank you for
On Thu, Dec 15, 2022 at 03:12:21PM +0100, Guillem Jover wrote:
> On Wed, 2022-12-14 at 15:27:18 +0100, Juri Grabowski wrote:
> > * Package name: distribution-gpg-keys
> > Upstream Author : Miroslav Suchý
> > * URL : https://github.com/xsuchy/
Hi!
On Wed, 2022-12-14 at 15:27:18 +0100, Juri Grabowski wrote:
> Package: wnpp
> Version: 1.79
> Severity: wishlist
> Owner: Juri Grabowski
> X-Debbugs-Cc: debian-devel@lists.debian.org, deb...@jugra.de
> * Package name : distribution-gpg-keys
> Version : 1.7.
On Wed, Dec 14, 2022 at 03:27:18PM +0100, Juri Grabowski wrote:
> * Package name: distribution-gpg-keys
> Upstream Author : Miroslav Suchý
> * URL : https://github.com/xsuchy/distribution-gpg-keys/
> Description : GPG keys by various Linux distributio
Package: wnpp
Version: 1.79
Severity: wishlist
Owner: Juri Grabowski
X-Debbugs-Cc: debian-devel@lists.debian.org, deb...@jugra.de
* Package name: distribution-gpg-keys
Version : 1.7.9
Upstream Author : Miroslav Suchý
* URL : https://github.com/xsuchy/distribution-gpg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 17 Nov 2022 18:52:41 +0100
Source: rust-gpg-error
Architecture: source
Version: 0.5.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Blair Noctis
Closes: 1022405
Changes:
rust-gpg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 15 Oct 2022 09:22:51 -0400
Source: rust-gpg-error
Architecture: source
Version: 0.5.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Alexander Kjäll
Changes:
rust-gpg-error (0.5.2
* License : GPL
Programming Lang: None (data only)
Description : GPG keys for the Mobian package repository
Mobian is a Debian blend targeting mobile devices, such as phones and tablets.
This package provides the GnuPG public key(s) used to sign the Mobian package
repository
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 20 Feb 2022 19:06:11 +0100
Source: php-crypt-gpg
Architecture: source
Version: 1.6.7-2
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Closes: 1006028
Changes:
php
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 17 Feb 2022 11:36:52 +0100
Source: php-crypt-gpg
Architecture: source
Version: 1.6.7-1
Distribution: unstable
Urgency: high
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Closes: 1005921
Changes:
php
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 10 Sep 2021 16:20:45 +0200
Source: php-crypt-gpg
Architecture: source
Version: 1.6.6-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Changes:
php-crypt-gpg (1.6.6
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 08 Sep 2021 09:46:11 -0700
Source: gpg-remailer
Architecture: source
Version: 3.04.06-1
Distribution: unstable
Urgency: low
Maintainer: Frank B. Brokken
Changed-By: tony mancill
Changes:
gpg-remailer (3.04.06-1) unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 19 Aug 2021 21:40:03 +0200
Source: php-crypt-gpg
Architecture: source
Version: 1.6.5-2
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Changes:
php-crypt-gpg (1.6.5
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 15 Aug 2021 00:09:33 +0200
Source: php-crypt-gpg
Architecture: source
Version: 1.6.5-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Changes:
php-crypt-gpg (1.6.5
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 23 May 2021 15:24:33 +
Source: ruby-mail-gpg
Architecture: source
Version: 0.4.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team
Changed-By: Georg Faerber
Changes:
ruby-mail-gpg (0.4.4-1) unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 07 Jan 2021 16:05:51 +0100
Source: php-crypt-gpg
Architecture: source
Version: 1.6.4-2
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Changes:
php-crypt-gpg (1.6.4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 21 Dec 2020 00:41:52 +0100
Source: php-crypt-gpg
Architecture: source
Version: 1.6.4-1
Distribution: unstable
Urgency: low
Maintainer: Debian PHP PEAR Maintainers
Changed-By: Guilhem Moulin
Closes: 882896 911852 934432
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 20 Apr 2020 14:07:57 +0200
Source: rust-gpg-error
Architecture: source
Version: 0.5.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Sylvestre Ledru
Changes:
rust-gpg-error (0.5.1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Thu, 06 Feb 2020 20:32:58 +0100
Source: rust-gpg-error
Binary: librust-gpg-error-dev
Architecture: source amd64
Version: 0.5.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Rust Maintainers
Changed-By: Alexander
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 17 Dec 2019 15:53:50 +0100
Source: gpg-remailer
Architecture: source
Version: 3.04.05-1
Distribution: unstable
Urgency: low
Maintainer: Frank B. Brokken
Changed-By: Frank B. Brokken
Changes:
gpg-remailer (3.04.05-1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 06 Sep 2019 12:22:45 +
Source: ruby-mail-gpg
Architecture: source
Version: 0.4.2-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
Changed-By: Georg Faerber
Changes:
ruby-mail-gpg
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 25 Jul 2019 20:06:56 -0700
Source: gpg-remailer
Architecture: source
Version: 3.04.04-2
Distribution: unstable
Urgency: medium
Maintainer: Frank B. Brokken
Changed-By: tony mancill
Changes:
gpg-remailer (3.04.04-2) unstable
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 24 Jul 2019 01:13:15 +
Source: ruby-mail-gpg
Architecture: source
Version: 0.4.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
Changed-By: Georg Faerber
Changes:
ruby-mail-gpg
On Sb, 20 apr 19, 21:18:13, Sharon Dvir wrote:
> Package: wnpp
> Owner: Sharon Dvir
> Severity: wishlist
>
> (resending as I didn't get a bug nr)
Hi Sharon,
You must send the message to sub...@bugs.debian.org and add the
pseudo-header X-Debbugs-CC: debian-devel@lists.debian.org.
Hope this
++
Description : Use gpg keys to login with an OTP.
A PAM module that enables PAM to authenticate a user using a GPG key-
pair.
The module will present a challenge to the user, encrypted using his
public key.
User is then required to use his private key to decrypt,
extract the correct response
++
Description : Use gpg keys to login with an OTP.
A PAM module that enables PAM to authenticate a user using a GPG key-
pair.
The module will present a challenge to the user, encrypted using his
public key.
User is then required to use his private key to decrypt,
extract the correct response
Olá Herbert,
On Tue, 2018-12-11 at 11:07 -0200, Herbert Fortes wrote:
> Olá,
>
> Ontem decidi revogar minha chave gpg por acreditar
> que ela não é mais segura e gerar uma nova.
>
> https://pgp.key-server.io/pks/lookup?search=Herbert+Parentes+Fortes+Neto=on=vindex
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 06 Feb 2019 16:34:11 +
Source: ruby-mail-gpg
Architecture: source
Version: 0.4.0-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
Changed-By: Georg Faerber
Closes: 913843
Changes
Olá,
Ontem decidi revogar minha chave gpg por acreditar
que ela não é mais segura e gerar uma nova.
https://pgp.key-server.io/pks/lookup?search=Herbert+Parentes+Fortes+Neto=on=vindex
Moro no Rio de Janeiro - RJ. Se alguém passar por
aqui e puder fazer a troca de assinatura de chaves
por favor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 12 Nov 2018 17:47:18 -0800
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source
Version: 3.04.04-1
Distribution: unstable
Urgency: medium
Maintainer: Frank B. Brokken
Changed-By: tony mancill
Description:
gpg
On Thu, 9 Aug 2018 19:27:40 +, Holger Wansing
wrote:
>I am unable to clearsign a file with gpg, always getting
>permission denied errors.
>However it does not tell me which is the file where permissions
>are missing.
>I checked all files I am aware of:
>- the file to s
On Thu, 09 Aug 2018 at 23:58:22 +0200, Holger Wansing wrote:
> Yes! That's was exactly the problem: using gpg inside of su -.
Note that if you are trying to protect your key material from a
possibly-compromised main user account, switching from the main account
to the keyring account with
Hi,
"W. Martin Borgert" wrote:
> On 2018-08-09 19:27, Holger Wansing wrote:
> > I am unable to clearsign a file with gpg, always getting
> > permission denied errors.
>
> Maybe https://bugs.debian.org/836772 or similar?
Yes! That's was exactly the problem: us
On 2018-08-09 19:27, Holger Wansing wrote:
> I am unable to clearsign a file with gpg, always getting
> permission denied errors.
Maybe https://bugs.debian.org/836772 or similar?
Hi,
I am unable to clearsign a file with gpg, always getting
permission denied errors.
However it does not tell me which is the file where permissions
are missing.
I checked all files I am aware of:
- the file to sign,
- all files in .gnupg and the .gnupg dir itself,
They are all fine.
How can
Room application for generating and storing
offline GPG keys
The PGP Clean Room is a newt-based application designed to make generating and
storing
GPG keys offline simpler and easier.
This is the result of my GSoC 2018 project:
https://wiki.debian.org/JacobAdams/PGPCleanRoomLiveCD
Thanks
Package: wnpp
Severity: wishlist
Owner: la...@debian.org
X-Debbugs-CC: debian-devel@lists.debian.org
* Package name: gpg-encrypted-root
Version : 0~20170708+git980a0488-1
Upstream Author : Erik Nellessen
* URL : https://github.com/eriknellessen/gpg-encrypted-root
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 25 May 2018 20:00:38 +0200
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.4.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 01 Apr 2018 17:33:01 +0200
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.3.3-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
: https://github.com/dashohoxha/egpg
> * License : GPL-3
> Programming Lang: Shell
> Description : Wrapper tool to easily manage and use keys with GPG
>
> Easy GnuPG (egpg) is a wrapper script that tries to simplify the process of
> using GnuPG. In order to ma
Lang: Shell
Description : Wrapper tool to easily manage and use keys with GPG
Easy GnuPG (egpg) is a wrapper script that tries to simplify the process of
using GnuPG. In order to make things easier, it is opinionated about the
"right" way to use GnuPG.
It helps manage (e.g. generat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 07 Nov 2017 19:15:54 +0100
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.04.03-1
Distribution: unstable
Urgency: low
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By: F
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 05 Oct 2017 16:45:38 +0200
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.04.01-1
Distribution: unstable
Urgency: low
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By: F
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 29 Sep 2017 18:27:10 +0200
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.3.1-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 24 Sep 2017 15:07:22 +0200
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.04.00-1
Distribution: unstable
Urgency: low
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By: F
: Python 2.7
Description : Secure GPG-based non-SMTP email and large file transfer
Secure GPG-based non-SMTP email and large file transfer. Has a wxPython GUI
that resembles Thunderbird. Can send multi-gigabyte attachments in chunks over
clearnet, Tor, i2p. Anyone can run a server and all serv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 02 Aug 2017 12:58:39 +0700
Source: php-crypt-gpg
Binary: php-crypt-gpg
Architecture: source
Version: 1.6.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian PHP PEAR Maintainers <pkg-php-p...@lists.alioth.debian.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 22 Jun 2017 20:43:53 -0700
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.03.00-2
Distribution: unstable
Urgency: medium
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 19 Jun 2017 23:42:27 +0200
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.3.1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 10 Jun 2017 15:54:15 +0200
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.3.1-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 13 May 2017 10:27:04 +0200
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.03.00-1
Distribution: experimental
Urgency: low
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By: F
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 22 Apr 2017 09:45:07 -0700
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.02.01-1
Distribution: experimental
Urgency: low
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 28 Dec 2016 01:27:18 +0100
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.3.0-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 02 Dec 2016 17:53:09 +0100
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.2.9-3
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 25 Nov 2016 22:44:10 +0100
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source
Version: 0.2.9-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 23 Nov 2016 13:32:29 +0100
Source: ruby-mail-gpg
Binary: ruby-mail-gpg
Architecture: source all
Version: 0.2.9-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
<pkg-ruby-extras-maint
Howdy all,
I have uploaded to ‘experimental’ a pre-release of the GnuPG changes in
Dput. The version is dput “0.11.0~3”.
If your packaging workflow has unusual signing practices, or an unusual
GnuPG configuration, your help will be especially valuable to test this
change.
In particular I am
On Fri, 14 Oct 2016 21:47, d...@fifthhorseman.net said:
>> In a new temp directory do:
>>
>> GNUPGHOME=$(pwd) gpg-agent --daemon gpg .
>>
>> Or whatever you want to run under gpg-agent's control. This has been
>> there for ages.
>
> fwiw, this d
On Tue 2016-10-18 07:44:43 -0400, Ian Jackson wrote:
> Daniel Kahn Gillmor writes ("Re: [pkg-gnupg-maint] Bug#840669: Bug#840669:
> Beware of leftover gpg-agent processes"):
>> On Sat 2016-10-15 11:21:29 -0400, Ian Jackson wrote:
>> > 1. gnupg1-compatible authorisa
Ben Finney <bign...@debian.org> writes:
> I am preparing a new version of ‘dput’ that stops using ‘/usr/bin/gpg’,
> and instead uses the GPGME library for GnuPG operations.
> […]
> If your packaging workflow has unusual signing practices, or an unusual
> GnuPG con
Daniel Kahn Gillmor writes ("Re: [pkg-gnupg-maint] Bug#840669: Bug#840669:
Beware of leftover gpg-agent processes"):
> On Sat 2016-10-15 11:21:29 -0400, Ian Jackson wrote:
> > 1. gnupg1-compatible authorisation lifetime:
>
> I believe this is a deliberate change in se
On Sat 2016-10-15 11:21:29 -0400, Ian Jackson wrote:
> 1. gnupg1-compatible authorisation lifetime:
I believe this is a deliberate change in semantics from the upstream
GnuPG project. In particular, authorization for the use of secret key
material is now the responsibility of the gpg-ag
Howdy all,
I am preparing a new version of ‘dput’ that stops using ‘/usr/bin/gpg’,
and instead uses the GPGME library for GnuPG operations.
Currently, as of ‘dput’ version 0.10, GnuPG operations are done by
invoking the ‘/usr/bin/gpg’ command in a subprocess. This is fragile in
several ways
Lots of this discussion has been focusing on the test suite process
leak problem. But there are actually three separate use cases which
need something along the lines of my proposal; two of which are
regressions from gnupg1.
1. gnupg1-compatible authorisation lifetime:
Command line use of gpg
rted agent (and the corresponding
> > authorisations, if the user types in a passphrase) have a lifetime
> > limited by that of the gpg process which started the agent.
>
> fwiw, i'm not the person who needs persuading. Ian's proposal is rather
> complex, seems likely to introdu
On Fri, 14 Oct 2016 19:17, ijack...@chiark.greenend.org.uk said:
> authorisations, if the user types in a passphrase) have a lifetime
> limited by that of the gpg process which started the agent.
In a new temp directory do:
GNUPGHOME=$(pwd) gpg-agent --daemon gpg .
Or whatever yo
On Fri 2016-10-14 15:18:40 -0400, Werner Koch wrote:
> On Fri, 14 Oct 2016 19:17, ijack...@chiark.greenend.org.uk said:
>
>> authorisations, if the user types in a passphrase) have a lifetime
>> limited by that of the gpg process which started the agent.
>
> In
leanup process, we know exactly how to "un-break"
things.
> I am trying to persaude Daniel that we should provide (at least
> optionally) a mode where an autostarted agent (and the corresponding
> authorisations, if the user types in a passphrase) have a lifetime
> limited by t
Ian Jackson writes ("Beware of leftover gpg-agent processes (was: Re: Changes
for GnuPG in debian)"):
> Johannes Schauer writes ("Beware of leftover gpg-agent processes (was: Re:
> Changes for GnuPG in debian)"):
>
> > Quoting Daniel Kahn Gillmor (2016-08
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 01 Oct 2016 21:30:41 +0200
Source: gpg-remailer
Binary: gpg-remailer
Architecture: source amd64
Version: 3.02.00-2
Distribution: unstable
Urgency: medium
Maintainer: Frank B. Brokken <f.b.brok...@rug.nl>
Changed-By: F
[Please CC Johannes Thomas Nix on replies; he's not subscribed.]
* Johannes Thomas Nix <johannes.thomas@posteo.net>, 2016-08-11, 09:16:
Found on Reddit a mention of the debian-devel thread about finding GPG
key collisions for developer keys.
Why I write, a while ago I thought
On Sat, Aug 06, 2016 at 12:56:58PM -0400, Daniel Kahn Gillmor wrote:
> ouch! please do file this as a distinct bug report, it's something i
> haven't run into myself and i'd like to track it down.
Done, that's #833596.
Cheers.
--
Stefano Zacchiroli . . . . . . . z...@upsilon.cc . . . . o . .
On Sat 2016-08-06 06:32:39 -0400, Stefano Zacchiroli wrote:
>> >> systemctl --user enable gpg-agent
>> >> systemctl --user enable dirmngr
>
> OTOH, doing this inhibited a proper start of my GNOME session at next
> login: only Nautilus started (I can tell be
;> passphrase caching and smartcard management are useful features.
>
> I noticed after upgrading gnupg to experimental and monkeysphere to
> unstable, monkeysphere now has gpg-agent processes running as root:
>
> $ pgrep -a gpg | grep -i monk
> 27043 gpg-agent --homedir /var/lib/monkeys
On Sat, 6 Aug 2016 08:24, p...@debian.org said:
> BTW, does this make parcimonie obsolete? I noticed that dirmngr
We plan to add similar fucntionality to dirmngr but that has not yet
been done and I am not sure whether we will have it for 2.2.
Shalom-Salam,
Werner
--
Die Gedanken sind
expect the majority of secret key access
> >> happens), for folks who are running systemd, i recommend enabling the
> >> systemd user services, as documented in
> >> /usr/share/doc/{gnupg-agent,dirmngr}/README.Debian :
> >>
> >> systemctl --user enable gpg-ag
ced after upgrading gnupg to experimental and monkeysphere to
unstable, monkeysphere now has gpg-agent processes running as root:
$ pgrep -a gpg | grep -i monk
27043 gpg-agent --homedir /var/lib/monkeysphere/authentication/core
--use-standard-socket --daemon
27061 gpg-agent --homedir /var/lib/mon
On Fri, Aug 05, 2016 at 04:02:07PM -0400, Daniel Kahn Gillmor wrote:
> My long-term goal is to have these things Just Work without *any*
> explicit user intervention.
>
> That is, i want: "If the package is installed, it should work for you."
> and not: "oh, if you want things to actually work,
On Fri 2016-08-05 15:03:29 -0400, Peter Colberg wrote:
> On Fri, Aug 05, 2016 at 01:51:07PM -0400, Daniel Kahn Gillmor wrote:
>> I don't think there's any need to add no-autostart in this case. in
>> particular, the daemon will already be running, so any consideration of
>> autostart will just
On Fri, Aug 05, 2016 at 01:51:07PM -0400, Daniel Kahn Gillmor wrote:
> I don't think there's any need to add no-autostart in this case. in
> particular, the daemon will already be running, so any consideration of
> autostart will just detect and make use of the already-running daemon.
This is
>> systemd user services, as documented in
>> /usr/share/doc/{gnupg-agent,dirmngr}/README.Debian :
>>
>> systemctl --user enable gpg-agent
>> systemctl --user enable dirmngr
>
> Thanks for the tip. Do you know if this is needed also for GNOME (or
> other FreeD
gent,dirmngr}/README.Debian :
>
> systemctl --user enable gpg-agent
> systemctl --user enable dirmngr
Thanks for the tip. Do you know if this is needed also for GNOME (or
other FreeDesktop) session users? Within GNOME, on Debian testing, I see
that my running gpg-agent process is alr
systemd user services, as documented in
>> /usr/share/doc/{gnupg-agent,dirmngr}/README.Debian :
>>
>> systemctl --user enable gpg-agent
>> systemctl --user enable dirmngr
>
> In this case one should also add
>
> no-autostart
>
> to ~/.gnupg/gpg.conf
gent,dirmngr}/README.Debian :
>
> systemctl --user enable gpg-agent
> systemctl --user enable dirmngr
In this case one should also add
no-autostart
to ~/.gnupg/gpg.conf (or ~/.gnupg/gpg.conf-2 when using gpg1 in parallel).
Peter
Ian Jackson writes:
> Johannes Schauer writes ("Beware of leftover gpg-agent processes (was: Re:
> Changes for GnuPG in debian)"):
>
>> Quoting Daniel Kahn Gillmor (2016-08-04 18:29:03)
>> > One of the main differences is that all access to your secret key
>
an agent in the background anyway (and
know of it), but I also have some scripts that call gpg internally
with different GPGHOME (luckily at the moment still gpg1) and I would
really not have expected the gpg calls to start an agent in the
background.
Regards,
Christian
Johannes Schauer writes ("Beware of leftover gpg-agent processes (was: Re:
Changes for GnuPG in debian)"):
> Quoting Daniel Kahn Gillmor (2016-08-04 18:29:03)
> > One of the main differences is that all access to your secret key
> > will be handled throug
Hi,
Quoting Daniel Kahn Gillmor (2016-08-04 18:29:03)
> One of the main differences is that all access to your secret key will be
> handled through gpg-agent, which should be automatically launched as needed.
it might be important to note that gpg launching this gpg-agent process is not
op
1 - 100 of 481 matches
Mail list logo