Package: gpgsm
Version: 2.4.7-21+deb13u1+b1
Severity: normal

Dear Maintainer,


The following situation occurs:
$ gpgsm --list-chain --with-validation
...
Do you ultimately trust
  "CN=HARICA Client RSA Root CA 2021
   O=Hellenic Academic and Research Institutions CA
   C=GR"
to correctly certify user certificates?
  Yes
  Cancel
  No
[ycn]? y
Please verify that the certificate identified as:
  "CN=HARICA Client RSA Root CA 2021
   O=Hellenic Academic and Research Institutions CA
   C=GR"
has the fingerprint:
  46:C6:90:0A:77:3A:B6:BC:F4:65:AD:AC:FC:E3:F7:07:00:6E:DE:6E
  Correct
  Cancel
  Wrong
[ccw]? c
...

There are 2 identical [c], I'm not sure if this intended as correct or
cancel. With pinentry-curses you can choose by moving your marking, but on
pinentry-tty it's not possible.

Edit the file .gnupg/trustlist.txt by hand resolves the problem, but it's not
the point, to use gpgsm.

-- System Information:
Debian Release: 13.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 6.12.63+deb13-amd64 (SMP w/20 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages gpgsm depends on:
ii  gpgconf          2.4.7-21+deb13u1+b1
ii  libassuan9       3.0.2-2
ii  libc6            2.41-12+deb13u1
ii  libgcrypt20      1.11.0-7
ii  libgpg-error0    1.51-4
ii  libksba8         1.6.7-2+b1
ii  libnpth0t64      1.8-3
ii  libreadline8t64  8.2-6

Versions of packages gpgsm recommends:
ii  gnupg  2.4.7-21+deb13u1

gpgsm suggests no packages.

-- no debconf information

Reply via email to