On Sun, Feb 07, 2021 at 10:44:53AM -0500, tor wrote: > When I do the following command: > > :~ $ sudo gpg --keyserver keys.gnupg.net --recv > A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 > > I get: > > gpg: packet(13) too large > gpg: read_block: read error: Invalid packet > gpg: no valid OpenPGP data found. > gpg: Total number processed: 0 > > thoughts?
You are experiencing the disaster that is the public keyservers in the past few years. Jerks add garbage to keys until the keys are too big to download or use. The era where keyservers worked reliably is over. If you want that key now, your best bet is to fetch it from some source that will you give you a clean version of the key. For example, the url referenced in https://support.torproject.org/apt/tor-deb-repo/ Similarly, to get the Tor Browser signing key, you'll want to use the modern wkd feature of gpg: https://support.torproject.org/tbb/how-to-verify-signature/ or if your gpg isn't new enough to have wkd, there's a direct download link at the very bottom of that page. --Roger _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
